CN108712408A - A kind of anti-cheat method and device of user behavior verification - Google Patents

A kind of anti-cheat method and device of user behavior verification Download PDF

Info

Publication number
CN108712408A
CN108712408A CN201810432546.2A CN201810432546A CN108712408A CN 108712408 A CN108712408 A CN 108712408A CN 201810432546 A CN201810432546 A CN 201810432546A CN 108712408 A CN108712408 A CN 108712408A
Authority
CN
China
Prior art keywords
award
code
receiving
verification
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810432546.2A
Other languages
Chinese (zh)
Other versions
CN108712408B (en
Inventor
杜英豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201810432546.2A priority Critical patent/CN108712408B/en
Publication of CN108712408A publication Critical patent/CN108712408A/en
Application granted granted Critical
Publication of CN108712408B publication Critical patent/CN108712408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Pinball Game Machines (AREA)

Abstract

The present invention proposes a kind of anti-cheat method and device of user behavior verification.Method includes:Receive the user behavior information that client uploads;The incentive message that analysis generates the user is carried out to user behavior information, wherein, when analysis result meet it is default receive the award condition when, generate first receive the award code and by the additions incentive message, while by described first receive the award code relevant information storage to server code collection conjunction of effectively receiving the award;Incentive message is sent to client;The verification information of receiving the award that client uploads is received, extraction code of receiving the award is received the award code as second from the verification information of receiving the award that client uploads;The second validity for receiving the award code extracted in the verification information of receiving the award is verified according to the code collection conjunction of effectively receiving the award of server storage, is verified result;Verification result is sent to client.So as to make the verification information of receiving the award from non-customer end not have effect property, increases cheating cost, reduce cheating.

Description

A kind of anti-cheat method and device of user behavior verification
Technical field
The present invention relates to anti-cheat methods and dress that technical field of internet application more particularly to a kind of user behavior are verified It sets.
Background technology
In internet industry, number of users and the core lifeblood that frequency is product is enlivened.In order to encourage user's registration and increasing Add user's viscosity, many products can all set up user's reward, to promote user to use.For example, by be arranged new user lead red packet, Continuous to log in reward etc. to encourage new user to download, old user persistently logs in.Especially in mobile Internet, some apply journey The higher reward of relative worth is often arranged in the popularization stage of sequence (APP).
For a user, user behavior (downloading, login etc.) meets certain verification condition (for example, having downloaded soft Part, or meet registration conditions, line duration etc.) reward can be got.But under the driving of the interests of reward, often There is the behavior of the cheating of some improper users.It even will appear and competed to pursue reward or malice, and use certainly The extensive cheating for acting disadvantage software, pretends the mode of user behavior.If cheating cannot be identified and prevent, production will be given Product publisher brings property loss, while may also bring shadow to product publisher or third-party institution's counting user behavior It rings.
It is the needle in the recent period as the universal of mobile Internet just buds out into popularity on a large scale in view of the Extension Model based on reward To the cheating problem for middle user behavior verification of receiving the award, particular study is there is no in the prior art, also without relevant specific aim solution Certainly scheme.
Invention content
The present invention is directed to solve at least some of the technical problems in related technologies, a kind of user's row is provided For the anti-cheat method and device of verification, the cheating during being received the award with strick precaution.
It is verified for server side user behavior in order to achieve the above object, the embodiment of first aspect present invention provides one kind Anti- cheat method comprising:Receive the user behavior information that client uploads;Divided according to the user behavior information of reception Analysis, the incentive message of the user is generated according to analysis result, wherein when analysis result meet it is default receive the award condition when, generate the One receives the award code, and the first code of receiving the award is added the incentive message, and by described first receive the award code relevant information storage to service The code collection conjunction of effectively receiving the award of device;Incentive message is sent to client;The verification information of receiving the award that client uploads is received, from client Extraction code of receiving the award is held in the verification information of receiving the award uploaded to receive the award code as second;It is closed according to the code collection of effectively receiving the award of server storage The second validity for receiving the award code extracted in the verification information of receiving the award is verified, result is verified;By verification result It is sent to client.
In some embodiments, the user behavior information for receiving client upload includes:Receive what client uploaded User name and user's login time information;Carrying out analysis according to the user behavior information of reception includes:According to currently received use Family behavioural information and the user behavior information of accumulative reception are analyzed, when obtaining the login times distribution of user and/or logging in Long distribution;When analysis result meet it is default receive the award condition when, generate first and receive the award code, including:When the login times of user are distributed Meet preset condition and/or log duration distribution when meeting preset condition, generates first and receive the award code.
In some embodiments, the user behavior information for receiving client upload includes:Receive what client uploaded User name and solicited message of receiving the award;Carrying out analysis according to the user behavior information of reception includes:Judge whether the user meets institute State the corresponding bonus requirements of request of receiving the award;When analysis result meet it is default receive the award condition when, generate first and receive the award code, including: When whether the user meets the corresponding bonus requirements of the request of receiving the award, generates first and receive the award code.
In some embodiments, the incentive message further includes identifying code, the character string or contain that the identifying code is 4-8 It is useful for the picture validation code of the positions the 4-8 character string of identification.
In some embodiments, first generated when each default condition of receiving the award meets code of receiving the award is different, and institute It states first and receives the award code as scrambled.
In some embodiments, first code of receiving the award that generates includes:Obtain user's secret key of active user;According to first Receive the award generated time of code obtains the corresponding first timestamp for receiving the award code, and user's secret key pair timestamp is used in combination to add It is close, generate encrypted result;First coding is carried out to encrypted result, first is obtained and receives the award code.
In some embodiments, first code of receiving the award that generates further includes:When the unit interval of the corresponding minimum of timestamp It is further the time stamp setting flag, the flag indicated in the unit interval when inside needing to generate multiple receive the award yard It receives the award the genesis sequence number of code, and the timestamp for being provided with flag is encrypted with user's secret key to obtain encryption knot Fruit.
In some embodiments, the code collection of effectively receiving the award that the relevant information that first receives the award code is stored to server is closed into packet It includes:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed;To extracted in verification information of receiving the award Two validity for receiving the award code carry out verification:It is decoded, is solved according to the second identifying code of inverse operation pair of the first coding Code result;
It is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result;By decrypted result with have The all first timestamps for receiving the award code imitated during code collection of receiving the award is closed are compared;It receives the award with decrypted result matched first when existing Code timestamp when, judgement decrypted result corresponding second receive the award code corresponding with the timestamp first receive the award code match, test Card result is that the second code of receiving the award is effective.
In some embodiments, to extracted in verification information of receiving the award second receive the award code carry out validation verification include:It will The all first codes of receiving the award during second code collection of effectively receiving the award for receiving the award code and server storage is closed are compared, when existing and second When code of receiving the award matched first is received the award yard, verification result is that the second code of receiving the award is effective.
In some embodiments, after second receives the award code verification effectively, deletion and institute from the code collection conjunction of effectively receiving the award The second code matched first of receiving the award is stated to receive the award code and its relevant information.
In some embodiments, the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server is also wrapped It includes:The code collection of effectively receiving the award that the generated time of first identifying code and the term of validity are stored in server is closed;To verification information of receiving the award The second of middle extraction receive the award code carry out verification further include:When exist with second receive the award code matched first receive the award yard when, further The verification time that second receives the award code is compared with the generated time of matched first identifying code, judges that described second receives the award code Verification time whether be in the term of validity of the matched code of receiving the award, then verification result is second to receive the award code in the term of validity Effectively;Otherwise the second code of receiving the award is invalid.
In some embodiments, the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server is also wrapped It includes:The genesis sequence that the relevant information that first receives the award code receives the award code according to first is stored;To what is extracted in verification information of receiving the award Second receive the award code carry out verification further include:By second receive the award code closed with code collection of effectively receiving the award in sequence first receiving the award code at first Relevant information is compared, when described second receive the award code and the sequence at first first receive the award code match when, verification result Two codes of receiving the award are effective;Otherwise verification result is that the second code of receiving the award is invalid.
Embodiment according to a first aspect of the present invention additionally provide a kind of user behavior for client-side verify it is anti- Cheat method comprising:To server upload user behavioural information;Receive the incentive message of server feedback, the reward letter Breath is generates according to the analysis result of user behavior information, when analysis result satisfaction, which is preset, receives the award condition, the information of receiving the award It receives the award code including first;Extraction first is received the award code from the incentive message, and generates verification information of receiving the award, the verification of receiving the award Information includes described first receiving the award code;Verification information of receiving the award is sent to server;The verification result of server feedback is received, it is described Verification result is generated by server according to verification information of receiving the award.
In some embodiments, the user behavior information includes:User name and user's login time information or user Name and solicited message of receiving the award.
In some embodiments, the incentive message of the server feedback of reception further includes identifying code, and the identifying code is 4-8 The character string of position or the picture validation code containing the positions 4-8 character string for identification;The verification information of receiving the award includes described One receives the award code and identifying code.
Using the anti-cheat method of the user behavior verification of the present invention, pass through client and service during user receives the award The interaction of device generated dynamic with uniqueness code of receiving the award by server based on user behavior and is sent in the preparation stage of receiving the award Client is fed back to server and is verified in implementation procedure of receiving the award, realized to the behavior of receiving the award by the client code that will receive the award again The judgement of validity.So as to effectively being identified to the request of receiving the award from non-customer end, making forgery or intercepting and capturing the neck retransmitted Traditional cheating mode such as prize request cannot achieve, and increases cheating cost, is conducive to prevent cheating.
Second aspect of the present invention embodiment provides a kind of anti-cheating device that the user behavior for server side is verified, It includes:
First information receiving module, the user behavior information for receiving client upload;
Incentive message generation module is generated for being analyzed according to the user behavior information of reception according to analysis result The incentive message of the user, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, first is received the award The incentive message is added in code, and the code collection of effectively receiving the award that the relevant information that described first receives the award code is stored to server is closed;
It receives the award a yard memory module, is closed for storing code collection of effectively receiving the award;
First information sending module, for incentive message to be sent to client;
Second information receiving module, the verification information of receiving the award for receiving client upload are received the award from what client uploaded Extraction code of receiving the award is received the award code as second in verification information;
It receives the award a yard authentication module, for being closed in the verification information of receiving the award according to the code collection of effectively receiving the award of server storage Second validity for receiving the award code of extraction is verified, and result is verified;
Second information sending module, for verification result to be sent to client.
In some embodiments, the incentive message generation module includes:It receives the award condition judgment unit, for according to user Whether behavioural information judgement active user meets corresponding default condition of receiving the award;It receives the award a yard generation unit, in active user Whether meet it is corresponding receive the award condition when generate code of receiving the award;Incentive message generation unit, for according to condition judgment unit of receiving the award The code of receiving the award that judgement result and yard generation unit of receiving the award generate generates incentive message.
In some embodiments, yard generation unit generation of receiving the award code of receiving the award includes:The user for obtaining active user is secret Key;The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination Between stab and be encrypted, generate encrypted result;First coding is carried out to the encrypted result of timestamp, first is obtained and receives the award code.
In some embodiments, the incentive message generation module stores the relevant information that first receives the award code to server Effectively receive the award code collection conjunction include:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed;It receives the award code The validity that authentication module receives the award code to extracted in verification information of receiving the award second carries out verification:According to the inverse of the first coding The second identifying code of operation pair is decoded, and obtains decoding result;It is solved according to user's secret key pair decoding result of active user It is close, obtain decrypted result;The all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award are compared; When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponding second is received the award code and time It stabs corresponding first to receive the award code matching, verification result is that the second code of receiving the award is effective.
Second aspect of the present invention embodiment provides a kind of anti-cheating dress that the user behavior for client's end-apparatus side is verified It sets comprising:
Third information sending module is used for server upload user behavioural information;
Third information receiving module, the incentive message for receiving server feedback, the incentive message are according to user The analysis result of behavioural information generates, and when analysis result satisfaction, which is preset, receives the award condition, the information of receiving the award is received the award including first Code;
Message processing module, for from the incentive message extraction first receive the award code, and it includes described first leading to generate Encourage the verification information of receiving the award of code;
4th information sending module, for sending verification information of receiving the award to server;
4th information receiving module receives the verification result of server feedback, and the verification result is by server according to neck Verification information is encouraged to generate.
The apparatus according to the invention is received the award process using the anti-cheat method of the user behavior verification of the present invention in user In by the interaction of client and server, in the preparation stage of receiving the award, being generated by server based on user behavior has uniqueness Dynamic code of receiving the award be sent to client, fed back to server by the client code that will receive the award again in implementation procedure of receiving the award and tested Card realizes the judgement to the validity for the behavior of receiving the award.So as to effectively be identified to the request of receiving the award from non-customer end, make It forges or intercepts and captures the traditional cheating mode of request etc. of receiving the award retransmitted cannot achieve, increase cheating cost, be conducive to prevent to practise fraud Behavior.
Third aspect present invention embodiment provides a kind of non-transitorycomputer readable storage medium, is stored thereon with meter Calculation machine program when the program is executed by processor, realizes the user behavior of the server side described according to a first aspect of the present invention The anti-cheat method of verification.
Third aspect present invention embodiment additionally provides a kind of non-transitorycomputer readable storage medium, is stored thereon with Computer program when the program is executed by processor, realizes user's row of the client-side described according to a first aspect of the present invention For the anti-cheat method of verification.
Fourth aspect present invention embodiment provides a kind of computer program product, which is characterized in that when the computer When instruction in program product is executed by processor, the user behavior of the client-side described according to a first aspect of the present invention is realized The anti-cheat method of verification.
Fifth aspect present invention embodiment provides a kind of computer equipment, which is characterized in that including memory, processor And the computer program that can be run on a memory and on a processor is stored, when the processor executes described program, realize The anti-cheat method of the user behavior verification of the server side according to a first aspect of the present invention.
Fifth aspect present invention embodiment additionally provides a kind of computer equipment, which is characterized in that including memory, processing Device and storage on a memory and the computer program that can run on a processor, when the processor executes described program, reality The anti-cheat method that now user behavior of the client-side is verified according to a first aspect of the present invention.
According to third of the present invention to the non-transitorycomputer readable storage medium of five aspects, computer program product and meter Calculating machine equipment has the advantageous effect similar with the method and apparatus according to first and second aspect of the present invention, no longer superfluous herein It states.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, wherein:
Fig. 1 is the flow diagram of the anti-cheat method of server side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 2 is according to the ... of the embodiment of the present invention first to receive the award code generating method flow diagram;
Fig. 3 is according to an embodiment of the invention second to receive the award code verification method flow diagram;
Fig. 4 is in accordance with another embodiment of the present invention second to receive the award code verification method flow diagram;
Fig. 5 is received the award code verification method flow diagram according to the second of another of the invention embodiment;
Fig. 6 is the flow diagram of the anti-cheat method of client side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 7 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 8 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 9 is the friendship of anti-the cheat method server side and client-side of user behavior verification according to the ... of the embodiment of the present invention Mutual process schematic;And
Figure 10 is the structural schematic diagram of computer equipment according to the ... of the embodiment of the present invention.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Currently, in the internet application of the overwhelming majority, normally only used in the interaction of server and client Family authentication, and prevent the Brute Force of user account from practising fraud.Such as log in when, dynamic picture identifying code is provided, by with Input carries out verification operation after family carries out visual identity, to avoid the Brute Force to account and password.But once user After login, safety measure is then lacked to follow-up interactive process.It dominates the market to promote and apply, many application programs (for example, Pc client and mobile client APP) in order to encourage user installation and use, the reward based on user behavior can be provided, for example, User logs in reward, continuous to log in number of days reward, online hours reward, periodically robs red packet, and commodity are clicked the second and killed etc..There is reward Just there is cheating, under interests driving, has emerged various modes and encouraged to falsely claim as one's own and receive the award more, and new cheating mode Among continuous create.For example, be sent to the solicited message of receiving the award of server by intercepting and capturing user, reverse engineered and a large amount of is carried out It replicates to repeat to claim.
How to judge whether user behavior is really to occur, and whether the user behavior information of received server-side is by actual User generates in client operation, is the key that prevent one of cheating.One of main object of the present invention is to provide one kind For the anti-fraudulent means of user behavior verification.To ensure that the true operation of real user can obtain corresponding reward, and make Disadvantage behavior can be identified effectively.And main thinking is, before receiving the award and during receive the award, by applications client and The backstage of server end interacts, and receives the award code using what server end provided and is authenticated to user behavior, prevents from practising fraud.
The anti-cheating of user behavior is directed in the present invention, the distribution process in addition to can be used for material reward can also be used In other scenes.In this application, " reward " shall be understood in a broad sense, and include not only the directly profit such as red packet, card certificate, cash, material object The delivery of benefit also includes the identification etc. of the composition, user's specific behavior of effective statistical result.For example, one of certain APP is appointed Business, it is desirable that if user carries out dry run.After user executes these operation behaviors, assert " task has been completed ", can also regard To be a kind of reward.
The specific implementation mode of the present invention is described in detail below in conjunction with the accompanying drawings.The method of the present invention is in client Side and server side execute corresponding operation respectively.
Fig. 1 is the flow diagram of the anti-cheat method of server side user behavior verification according to the ... of the embodiment of the present invention. Referring to Fig. 1, the anti-cheat method of user behavior verification may include step S100 to S600.
In step S100, the user behavior information that client uploads is received.
Can have the condition of receiving the award based on various various forms of user behaviors, it is possibility to have it is a variety of different receive the award touch Clockwork spring part.For example, can be by the login behavior of user, the continuous number of days that logs in meets preset condition, and online hours, which meet, presets item Whether part etc. meets trigger condition as trigger condition of receiving the award by server automatic decision.Alternatively, can also be doomed with user Specific " receiving the award " button of client is clicked as trigger condition, process of receiving the award is opened according to the click behavior of user.For not Same triggering form, the user behavior information that client uploads can also have different forms.
For example, the user behavior information for receiving client upload may include:Receive client upload user name and User's login time information.Or including receiving the user name and solicited message etc. of receiving the award that client uploads.
In step S200, is analyzed according to the user behavior information of reception, the prize of the user is generated according to analysis result Encourage information, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, first is received the award described in code is added Incentive message, and the code collection of effectively receiving the award that the relevant information that described first receives the award code is stored to server is closed.
For example, under the first scene, condition of receiving the award is judged according to user login information by server, opens process of receiving the award. It receives the user behavior information that client uploads and may include user name and user's login time information.At this point, according to the user of reception Behavioural information carries out analysis and may include:It is carried out according to currently received user behavior information and the user behavior information of accumulative reception Analysis obtains login times distribution and/or the log duration distribution of user;When the login times distribution of user meets preset condition And/or log duration distribution is when meeting preset condition, generates first and receives the award code.When preset condition is unsatisfactory for, do not feed back or Feedback receives the award the ungratified information of condition to client.In other words, incentive message can be for sky or comprising prize condition not at this time The information of satisfaction.
In a second possible scenario, process of receiving the award is opened according to the request of receiving the award of user.At this point, the reception client uploads User behavior information include:Receive the user name and solicited message of receiving the award that client uploads.Believed according to the user behavior of reception Breath carries out analysis:Judge whether the user meets the corresponding bonus requirements of request of receiving the award.When whether the user is full When the corresponding bonus requirements of request of receiving the award described in foot, generates first and receive the award code.Equally, when preset condition is unsatisfactory for, not instead Feedback or feedback receive the award the ungratified information of condition to client.In other words, incentive message can be empty or include prize at this time The ungratified information of condition.
When feeding back incentive message, in order to further strengthen safety, when the condition of receiving the award meets, the incentive message may be used also To include identifying code.It can just be received the award after client inputs identifying code by user with realizing.Current phase can be used in the identifying code General type in the technology of pass, for example, 4-8 character strings or the picture validation code containing the positions 4-8 character string for identification.
In order to reach better anti-cheating effect, the first code of receiving the award could be provided as dynamic generation, one yard of form. That is, it is all different to meet the first code of receiving the award that the when of receiving the award condition generates every time.Also, cribber intercepts and captures neck in order to prevent After encouraging code, the generation mechanism for code of receiving the award is obtained by reverse engineered, to forge code of receiving the award, code of receiving the award constructively selects to be not easy The form being cracked.Such as various scrambleds.In other words, the first neck can be used as with dynamic non-duplicate encrypted characters string Encourage code.Encryption secret key can be respectively set according to each user account (ID).Meanwhile for the ease of receiving the award in subsequent step Code verification, encrypted " seed " character string can select the variable of time correlation.And the result after encrypted is convenient for The coding of network transmission.
The code collection conjunction of effectively receiving the award of server storage can be identified according to different user, so be received the award in progress user When verification, it need to only be verified according to the code collection conjunction of effectively receiving the award of corresponding active user's mark, verifying speed can be accelerated.
It is according to the ... of the embodiment of the present invention first to receive the award code generating method flow diagram referring to Fig. 2, Fig. 2.Wherein provide A kind of specific code generating method of receiving the award, the method comprising the steps of S221 to S223.
In step S221, user's secret key of active user is obtained.For example, can be by the account of active user and predefined word The combination of string is accorded with as user's secret key.In this way, user's secret key can store in the server, user account can also obtained The time of secret key lookup is quickly directly generated and saved simultaneously.
In step S222, the generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, is used in combination User's secret key pair timestamp is encrypted, and generates encrypted result.Encryption can use various existing Encryption Algorithm, this hair It is bright not do particular/special requirement.
In some embodiments, in order to prevent malicious user according to client carry out reverse engineered, receive the award code client not Carry out any decoding operate.Therefore, using symmetric encipherment algorithm, such as CRC (cyclic redundancy check, Cyclic Redundancy Check)。
Timestamp (timestamp) is a kind of time representation, and be one kind having unique corresponding pass with specific time point The variable of system.It can take and be accurate to the second, the different accuracy such as millisecond.For example, the timestamp of current time, may be defined as from lattice When 1970 01 month 01 day 00 Lin Weizhi times 00 divide 00 second to current time total number of seconds.For example, time 2017/ 12/4,10:00:00 corresponding timestamp is 1512352800.
Using the timestamp for yard generated time of receiving the award as encrypted " seed " parameter, on the one hand it is convenient for obtaining, on the other hand In most cases due to the uniqueness for yard generated time of receiving the award, the encrypted probability that code repeats of receiving the award of different timestamps is several It is 0.Also, if it is operation setting timeliness of receiving the award, the valid period that code of receiving the award is calculated using timestamp is also allowed for.
In step S223, the first coding is carried out to encrypted result, first is obtained and receives the award code.It can use to carry out the first coding Difficulty is cracked in further increasing, and/or is easy for network transmission.For example, base64 codings can be used in the first coding.
Base64 is one of the coding mode that transmission 8Bit bytecodes are most commonly used on network, can be beaten based on 64 Lettering symbol can be used under HTTP environment transmitting longer identification information come the method for indicating binary data.
, may be in a short time by request of largely receiving the award under some scenes, such as rob red packet or the second kills activity In, user may repeatedly request be received the award in 1 second.And if timestamp has selected to be accurate to the second, at this time when simple use Between stamp will be unable to distinguish this more request in 1 second, these requests may correspond to identical first and receive the award code.Therefore, work as the time It stabs when needing to generate multiple receive the award yard in the unit interval of corresponding minimum, may further be the time stamp setting flag, The flag indicates to receive the award in the unit interval genesis sequence number of code, and will be provided with the timestamp of flag with the user Secret key is encrypted to obtain encrypted result.Also, another benefit is, when being verified to the code of receiving the award that client returns, It can be achieved to be verified according to transmission sequence.In this way, for malice intercept and capture after largely retransmit or user use plug-in repeating transmission Equal cheatings, the sequence very maximum probability of the code of receiving the award provided is to be unable to a yard genesis sequence of receiving the award for match server, from And it can identify cheating.
For example, it is according to an embodiment of the invention receive the award code and timestamp it is as shown in table 1.
Table 1
User Serial number It receives the award code Timestamp
User 1 1 1FDSFSLDFLJ12312123LKJFD 1512352861
User 1 2 ASDLJSDKLF12FASD0U23423 1512352861
User 1 3 F3F48HF892FWDKJHWF222KS 1512352862
User 2 1 WEOIURWSOIU23KJ234KJ9F 1512352811
User 2 2 IUYWE982HKJSFSDOI203HS 1512352821
User 2 3 1231KHSDFOI23H93KJNERW 1512352832
…… …… …… ……
In step S300, incentive message is sent to client.Information of receiving the award can send directionally to user to meet neck The client that the active user of prize condition is logged in.It in order to increase interception difficulty, prevents from illegally being intercepted and captured, receive the award code with first Incentive message client can also be transferred to via comparatively safe network transmission channel (such as passing through the cryptographic protocols such as SSL) End.
In step S400, the verification information of receiving the award that client uploads is received, from the verification information of receiving the award that client uploads Extraction code of receiving the award is received the award code as second.For normal user, since what client may be configured as to receive first receives the award code Server is sent back again, and therefore, the second of extraction code of receiving the award with the first code of receiving the award sent should be identical.
And for situation of practising fraud, then the verification information of receiving the award that server receives may not be to be directly transmitted by client, But the camouflage information constructed by cribber, therefore, the second of extraction receives the award, and the first identifying code that code and server are sent may Difference, so the validity of the second identifying code is needed to be judged.
In step S500, according to the code collection of effectively receiving the award of server storage close to extracted in the verification information of receiving the award the Two validity for receiving the award code are verified, and result is verified.A kind of most basic verification thinking is:By second receive the award code with clothes The all first codes of receiving the award during the code collection of effectively receiving the award of business device storage is closed are compared, and are received the award code matched the with second when existing One when receiving the award yard, and verification result is that the second code of receiving the award is effective.
It receives the award for first the specific coding form of code, can there is further different specific verification modes.Fig. 3 is basis The second of another embodiment of the present invention is received the award code verification method flow diagram, and the present embodiment is directed in above-mentioned steps S200, It receives the award in the case that code built using method with reference to described in Fig. 2 to first, the second verification for receiving the award code.This embodiment In, by first receive the award code relevant information storage to server effectively receive the award code collection close when may include:First is received the award code The code collection of effectively receiving the award that timestamp is stored to server is closed.To second extracted in verification information of receiving the award receive the award code validity into Row verification includes step S511 to S514.
In step S511, it is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result.
In step S512, it is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result,.
In step S513, all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award compare Compared with.
Judge decrypted result pair when there is the timestamp for code of receiving the award with decrypted result matched first in step S514 Second answered code corresponding with the timestamp first of receiving the award is received the award code matching, and verification result is that the second code of receiving the award is effective.
In some embodiments, it can be further adopted as code setting timeliness of receiving the award, or received the award what is be verified Code (the i.e. corresponding situation received the award) carries out the means such as deletion immediately and further enhances anti-cheating performance.
Fig. 4 is in accordance with another embodiment of the present invention second to receive the award code verification method flow diagram.Wherein, authenticated Journey includes step S521 to S525.
In step S521, all first during the code collection of effectively receiving the award that second receives the award code and server storage is closed receive the award code It is compared.Can be that character string after the coding by code of receiving the award directly is compared, can also be after decoding after secret just " seed parameter " (such as timestamp) is compared indirectly.When code of receiving the award is longer or when quantity is more, referring for example to Fig. 2 The coding mode of embodiment is compared and can have higher efficiency with regard to " seed parameter " (such as timestamp).
In step S522, judges whether to receive the award code with the second code matched first of receiving the award, is to then follow the steps S523, Otherwise S525 is executed.
In step S523, the code of receiving the award of judgement second is effective.
In step S524, the code collection of effectively receiving the award deleted in closing with described second receive the award code matched first receive the award code and Its relevant information.Once occurring corresponding effective second to receive the award code, success of receiving the award, it is meant that the matched first code of receiving the award has lost Effect, subsequent relatively execution efficiency can be improved by being deleted in being closed from code collection of effectively receiving the award, and can more prevent the code quilt of receiving the award of failure Recycling.
In step S525, the code of receiving the award of judgement second is invalid.
In some embodiments, it can be the code setting term of validity of receiving the award.By the generated time of the first identifying code and the term of validity It is stored in the code collection conjunction of effectively receiving the award of server.To second extracted in verification information of receiving the award receive the award code verified then further Include the process of failure verification.Referring to Fig. 5, Fig. 5 received the award code verification method stream according to the second of another of the invention embodiment Journey schematic diagram.The code verification method of receiving the award of the second of the present embodiment may include step S531 to S536.
In step S531, all first during the code collection of effectively receiving the award that second receives the award code and server storage is closed receive the award code It is compared.
In step S532, judges whether to receive the award code with the second code matched first of receiving the award, is to then follow the steps S533, Otherwise S536 is executed.
In step S533, when exist with second receive the award code matched first receive the award yard when, further second is received the award code Verification time is compared with the generated time of matched first identifying code.
In step S534, judge whether the verification time that described second receives the award code is in the effective of the matched code of receiving the award Phase thens follow the steps S535 in the term of validity, no to then follow the steps S536.
In step S535, decision verification result is that the second code of receiving the award is effective.
In step S536, decision verification result is that the second code of receiving the award is invalid.
In some embodiments, in order to further enhance safety, the genesis sequence for only receiving the award code according to first returns The second code of receiving the award be considered effectively.At this point, storing the relevant information that first receives the award code to the effective of server Code collection of receiving the award is closed:The genesis sequence that the relevant information that first receives the award code receives the award code according to first is stored.It tests receiving the award Card information in extract second receive the award code carry out verification further include:By second receive the award code with effectively receive the award code collection close in sequence at first The first relevant information for receiving the award code be compared, when the described second the first code of receiving the award of code and the sequence at first of receiving the award matches When, verification result is that the second code of receiving the award is effective;Otherwise verification result is that the second code of receiving the award is invalid.
In step S600, verification result is sent to client.When verification result be second receive the award code it is invalid when, can send out It send and is unsatisfactory for the prompt messages such as the condition of receiving the award to client.When verification result be second receive the award code it is effective when, it is transmittable to receive the award The prompt messages such as success are to client.Reward can also be provided simultaneously arrives user account.
Fig. 6 is the flow diagram of the anti-cheat method of client side user behavior verification according to the ... of the embodiment of the present invention. The anti-cheat method of client-side includes that step S100 ' arrives S500 '.
In step S100 ', to server upload user behavioural information.According to different scenes, the user behavior information May include user name and user's login time information, or including user name and solicited message etc. of receiving the award.For details, reference can be made to Description in conjunction with Fig. 1 to step S100, it is no longer repeated.
In step S200 ', the incentive message of server feedback is received, the incentive message is according to user behavior information Analysis result generates.When analysis result meet it is default receive the award condition when, the information of receiving the award is received the award code including first.First receives the award The specific composition of code can be found in conjunction with Fig. 1, descriptions of the Fig. 2 to step S200.
In some embodiments, in addition to first receives the award other than code, the incentive message of the server feedback of reception can also wrap Include identifying code.The character string that the identifying code is 4-8 or the picture validation code containing the positions 4-8 character string for identification.
In step S300 ', first is extracted from the incentive message and is received the award code, and generates verification information of receiving the award.
It can be that client automatically generates after the incentive message for receiving server to generate verification information of receiving the award, and can also be It is generated according to the concrete operations behavior of user.For example, user clicks " receiving the award " button, it is rear to generate verification information of receiving the award.
In general, the information of server end is not easy to obtain, and cribber is often by analyzing client wound Cheat method is made, so not handled the first code of receiving the award in client.The verification information of receiving the award directly includes described First receives the award code.
In step S400 ', verification information of receiving the award is sent to server.
In step S500 ', the verification result of server feedback is received, the verification result is by server according to verification of receiving the award Information generates.The process of verification can be seen that the description in conjunction with Fig. 1 and Fig. 3-5 couples of step S500.
Using the anti-cheat method of the user behavior verification of the present invention, pass through client and service during user receives the award The interaction of device generated dynamic with uniqueness code of receiving the award by server based on user behavior and is sent in the preparation stage of receiving the award Client is fed back to server and is verified in implementation procedure of receiving the award, realized to the behavior of receiving the award by the client code that will receive the award again The judgement of validity.So as to effectively being identified to the request of receiving the award from non-customer end, making forgery or intercepting and capturing the neck retransmitted Traditional cheating mode such as prize request cannot achieve, and increases cheating cost, is conducive to prevent cheating.
In order to realize the method in above-mentioned first aspect embodiment, the embodiment of second aspect of the present invention proposes to be used respectively In the anti-cheating device of the user behavior of server side and client-side verification.It should be noted that the aforementioned side to the present invention The explanation of method embodiment is also applied for the device of the invention embodiment, will not in device embodiment to avoid redundancy All details are repeated.Place, those skilled in the art not may refer to above-mentioned combination Fig. 1 to Fig. 6 to present invention side to the greatest extent The associated description of method embodiment.
Fig. 7 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention.Its In, the anti-cheating device 100 of server user's behavior verification includes:First information receiving module 110, incentive message generate Module 120, yard memory module 130 of receiving the award, first information sending module 140, the second information receiving module 150, code of receiving the award verification Module 160 and the second information sending module 170.
First information receiving module 110 is used to receive the user behavior information of client upload.Specific implementation form can join See and combines descriptions of the Fig. 1 to step S100.
Incentive message generation module 120 is given birth to for being analyzed according to the user behavior information of reception according to analysis result At the incentive message of the user, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, by the first neck It encourages code and the incentive message is added, and the relevant information that described first receives the award code is stored into the code collection of effectively receiving the award to server It closes.Specific implementation form can be found in conjunction with Fig. 1, descriptions of the Fig. 2 to step S200.
Specifically, the incentive message generation module may include:It receives the award condition judgment unit, receive the award yard generation unit and prize Encourage information generating unit.
Condition judgment unit of receiving the award is used to judge whether active user meets corresponding default neck according to user behavior information Prize condition.Receive the award a yard generation unit, for active user whether meet it is corresponding receive the award condition when generate code of receiving the award.Incentive message The code of receiving the award that generation unit is used for the judgement result according to condition judgment unit of receiving the award and yard generation unit of receiving the award generates generates prize Encourage information.
In some embodiments, yard generation unit generation of receiving the award code of receiving the award includes:The user for obtaining active user is secret Key;The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination Between stab and be encrypted, generate encrypted result;First coding is carried out to the encrypted result of timestamp, first is obtained and receives the award code.
Correspondingly, the relevant information that first receives the award code is stored effective neck to server by the incentive message generation module Prize code collection, which is closed, includes:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed.
The validity that yard authentication module receives the award code to extracted in verification information of receiving the award second of receiving the award carries out verification and may include: It is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result;According to user's secret key of active user Decoding result is decrypted, decrypted result is obtained;All first during decrypted result is closed with code collection of effectively receiving the award receive the award code Timestamp be compared;When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponds to The second code corresponding with timestamp first of receiving the award receive the award code matching, verification result is that the second code of receiving the award is effective.
Yard memory module 130 of receiving the award is for storing code collection conjunction of effectively receiving the award.
First information sending module 140 is used to incentive message being sent to client.Specific implementation form can be found in combination Descriptions of the Fig. 1 to step S300.
Second information receiving module 150, the verification information of receiving the award for receiving client upload, the neck uploaded from client Extraction code of receiving the award is received the award code as second in prize verification information.Specific implementation form, which can be found in, retouches step S400 in conjunction with Fig. 1 It states.
It receives the award yard authentication module 160, for being closed to the verification letter of receiving the award according to the code collection of effectively receiving the award of server storage The second validity for receiving the award code extracted in breath is verified, and result is verified.Specific implementation form can be found in conjunction with Fig. 1, The description of Fig. 3-5 couples of step S500.
Second information sending module 170, for verification result to be sent to client.Specific implementation form can be found in combination Descriptions of the Fig. 1 to step S600.
Fig. 8 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention.Its In, the anti-cheating device 200 of the user behavior verification of client-side includes third information sending module 210, and third information receives Module 220, message processing module 230, the 4th information sending module 240 and the 4th information receiving module 250.
Third information sending module 210 is used for server upload user behavioural information.
Third information receiving module 220 is used to receive the incentive message of server feedback, the incentive message be according to The analysis result of family behavioural information generates, and when analysis result satisfaction, which is preset, receives the award condition, the information of receiving the award includes the first neck Encourage code.
Message processing module 230 is used for the extraction first from the incentive message and receives the award code, and it includes described first to generate It receives the award the verification information of receiving the award of code.
4th information sending module 240 is used to send verification information of receiving the award to server.
4th information receiving module 250 is used to receive the verification result of server feedback, and the verification result is by server According to receiving the award, verification information generates.
It may refer to the description of embodiment of the method about the specific implementation form of modules.
Using the anti-cheating device of the user behavior verification of the present invention, pass through client and service during user receives the award The interaction of device generated dynamic with uniqueness code of receiving the award by server based on user behavior and is sent in the preparation stage of receiving the award Client is fed back to server and is verified in implementation procedure of receiving the award, realized to the behavior of receiving the award by the client code that will receive the award again The judgement of validity.So as to effectively being identified to the request of receiving the award from non-customer end, making forgery or intercepting and capturing the neck retransmitted Traditional cheating mode such as prize request cannot achieve, and increases cheating cost, is conducive to prevent cheating.
Fig. 9 is the friendship of anti-the cheat method server side and client-side of user behavior verification according to the ... of the embodiment of the present invention Mutual process schematic.
Preparation stage before receiving the award, by client upload user behavioural information to server end, server end according to Family information (the user behavior record for including the user behavior information of client upload and accumulation) is analyzed, and whether judges user Meet condition of specifically receiving the award.And when user meets and receives the award condition, code is received the award in generation and the code that will receive the award be stored in server (by The code of receiving the award that server end generates is named as first and receives the award code).Later server end will receive the award code return to client.
During receiving the award, it includes receiving that client, which submits verification information of receiving the award, verification information of receiving the award, First receives the award code.Server receives receive the award verification information after, carry out verification of receiving the award.It is carried from the verification information of receiving the award of client It takes code of receiving the award (code of receiving the award of extraction be named as second receive the award code), and is carried out with the first of storage code of receiving the award by the second code of receiving the award Comparison is verified with receiving the award yard validity to carry out second.According to second receive the award code it is effective whether, generation is received the award result.Finally will Result of receiving the award returns to client.Completion is received the award process.
The embodiment of third aspect present invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with Computer program when the program is executed by processor, realizes the anti-work of the user behavior verification of server side according to the present invention Disadvantage method.
The embodiment of third aspect present invention additionally provides another non-transitorycomputer readable storage medium, deposits thereon Computer program is contained, the anti-cheating of the user behavior verification of the client-side of the present invention is realized when which is executed by processor Method.
In general, one or more computer-readable for realizing may be used for the computer instruction of the method for the present invention The arbitrary combination of medium carry.Computer-readable medium can be computer-readable signal media or computer-readable deposit Storage media.So-called non-transitory computer-readable medium may include any computer-readable medium, in addition to temporarily propagating In signal itself.
Computer readable storage medium for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, infrared ray or half System, device or the device of conductor, or the arbitrary above combination.The more specific example of computer readable storage medium is (non- Exhaustive list) include:Electrical connection, portable computer diskette with one or more conducting wires, hard disk, random access memory Device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, Portable, compact magnetic Disk read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document In, computer readable storage medium, which can be any, includes or the tangible medium of storage program, which can be commanded execution The either device use or in connection of system, device.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including --- but It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be Any computer-readable medium other than computer readable storage medium, which can send, propagate or Transmission for by instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be write with one or more programming languages or combinations thereof for executing the computer that operates of the present invention Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partly executes or executed on a remote computer or server completely on the remote computer on the user computer. Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as carried using Internet service It is connected by internet for quotient).
The embodiment of fourth aspect present invention provides a kind of computer program product, when in the computer program product Instruction when being executed by processor, realize the user behavior verification of the client-side described in embodiment according to a first aspect of the present invention Anti- cheat method.
The embodiment of fourth aspect present invention additionally provides a kind of computer program product, when the computer program product In instruction when being executed by processor, realize that the user behavior of the server side described in embodiment according to a first aspect of the present invention is tested The anti-cheat method of card.
Fifth aspect present invention embodiment provides a kind of computer equipment, including memory, processor and is stored in On reservoir and the computer program that can run on a processor, when the processor executes described program, realize according to the present invention The anti-cheat method of server side user behavior verification described in first aspect.
Fifth aspect present invention embodiment additionally provides another computer equipment, including memory, processor and storage On a memory and the computer program that can run on a processor, it when the processor executes described program, realizes according to this The anti-cheat method of client side user behavior verification described in invention first aspect.
According to third of the present invention to the non-transitorycomputer readable storage medium of five aspects, computer program product and meter Calculate machine equipment, be referred to the content that embodiment according to a first aspect of the present invention specifically describes and realize, and with according to this hair Advantageous effect as the method class of bright first aspect, details are not described herein.
Figure 10 shows the block diagram of the exemplary computer device suitable for being used for realizing the application embodiment.Figure 10 is shown Computer equipment 12 be only an example, any restrictions should not be brought to the function and use scope of the embodiment of the present application.
As shown in Figure 10, computer equipment 12 can be realized in the form of universal computing device.The component of computer equipment 12 It can include but is not limited to:One or more processor or processing unit 16, system storage 28 connect different system group The bus 18 of part (including system storage 28 and processing unit 16).
Bus 18 indicates one or more in a few class bus structures, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts For example, these architectures include but not limited to industry standard architecture (Industry Standard Architecture;Hereinafter referred to as:ISA) bus, microchannel architecture (Micro Channel Architecture;Below Referred to as:MAC) bus, enhanced isa bus, Video Electronics Standards Association (Video Electronics Standards Association;Hereinafter referred to as:VESA) local bus and peripheral component interconnection (Peripheral Component Interconnection;Hereinafter referred to as:PCI) bus.
Computer equipment 12 typically comprises a variety of computer system readable media.These media can be it is any can be by The usable medium that computer equipment 12 accesses, including volatile and non-volatile media, moveable and immovable medium.
Memory 28 may include the computer system readable media of form of volatile memory, such as random access memory Device (Random Access Memory;Hereinafter referred to as:RAM) 30 and/or cache memory 32.Computer equipment 12 can To further comprise other removable/nonremovable, volatile, nonvolatile computer readable storage mediums.Only conduct Citing, storage system 34 can be used for reading and writing immovable, non-volatile magnetic media and (do not shown in figure, commonly referred to as " hard disk Driver ").Although being not shown in Figure 10, can provide for moving non-volatile magnetic disk (such as " floppy disk ") read-write Disc driver, and to removable anonvolatile optical disk (such as:Compact disc read-only memory (Compact Disc Read Only Memory;Hereinafter referred to as:CD-ROM), digital multi CD-ROM (Digital Video Disc Read Only Memory;Hereinafter referred to as:DVD-ROM) or other optical mediums) read-write CD drive.In these cases, each driving Device can be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one program production Product, the program product have one group of (for example, at least one) program module, and it is each that these program modules are configured to perform the application The function of embodiment.
Program/utility 40 with one group of (at least one) program module 42 can be stored in such as memory 28 In, such program module 42 include but not limited to operating system, one or more application program, other program modules and Program data may include the realization of network environment in each or certain combination in these examples.Program module 42 is usual Execute the function and/or method in embodiments described herein.
Computer equipment 12 can also be with one or more external equipments 14 (such as keyboard, sensing equipment, display 24 Deng) communication, the equipment interacted with the computer system/server 12 communication can be also enabled a user to one or more, And/or with any equipment that the computer system/server 12 is communicated with one or more of the other computing device (such as network interface card, modem etc.) communicates.This communication can be carried out by input/output (I/O) interface 22.Also, Computer equipment 12 can also pass through network adapter 20 and one or more network (such as LAN (Local Area Network;Hereinafter referred to as:LAN), wide area network (Wide Area Network;Hereinafter referred to as:WAN) and/or public network, example Such as internet) communication.As shown, network adapter 20 is communicated by bus 18 with other modules of computer equipment 12.It wants Illustrate, although not shown in the drawings, other hardware and/or software module can be used in conjunction with computer equipment 12, including but It is not limited to:Microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive with And data backup storage system etc..
Processing unit 16 is stored in program in system storage 28 by operation, to perform various functions application and Data processing, such as realize the method referred in previous embodiment.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention Embodiment person of ordinary skill in the field understood.Expression or logic described otherwise above herein in flow charts And/or step, for example, it is considered the order list of the executable instruction for realizing logic function, it can be specifically real In present any computer-readable medium, for instruction execution system, device or equipment (such as computer based system including The system of processor or other can be from instruction execution system, device or equipment instruction fetch and the system executed instruction) use, or It is used in conjunction with these instruction execution systems, device or equipment.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage Or firmware is realized.Such as, if realized in another embodiment with hardware, following skill well known in the art can be used Any one of art or their combination are realized:With for data-signal realize logic function logic gates from Logic circuit is dissipated, the application-specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile Journey gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also That each unit physically exists alone, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and when sold or used as an independent product, can also be stored in a computer In read/write memory medium.
Although the embodiments of the present invention has been shown and described above, it should be appreciated that above-described embodiment is example Property, it is not construed as limiting the claims, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, changes, replacing and modification.

Claims (25)

1. a kind of anti-cheat method of user behavior verification, which is characterized in that including:
Receive the user behavior information that client uploads;
Analyzed according to the user behavior information of reception, the incentive message of the user generated according to analysis result, wherein when point Analysis result meet it is default receive the award condition when, generate first and receive the award code, the incentive message is added in the first code of receiving the award, and will be described The code collection of effectively receiving the award that first relevant information for receiving the award code is stored to server is closed;
Incentive message is sent to client;
Receive the verification information of receiving the award that client uploads, from the verification information of receiving the award that client uploads extraction receive the award code as the Two receive the award code;
It is closed according to the code collection of effectively receiving the award of server storage and is received the award the effective of code to extracted in the verification information of receiving the award second Property is verified, and result is verified;
Verification result is sent to client.
2. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that
It is described receive client upload user behavior information include:Receive the user name and user's login time that client uploads Information;
Carrying out analysis according to the user behavior information of reception includes:According to currently received user behavior information and accumulative reception User behavior information is analyzed, and login times distribution and/or the log duration distribution of user are obtained;
When analysis result meet it is default receive the award condition when, generate first and receive the award code, including:Meet when the login times of user are distributed Preset condition and/or log duration distribution be when meeting preset condition, generates first and receives the award code.
3. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that
It is described receive client upload user behavior information include:Receive the user name and request letter of receiving the award that client uploads Breath;
Carrying out analysis according to the user behavior information of reception includes:Judge whether the user meets described receive the award corresponding to request Bonus requirements;
When analysis result meet it is default receive the award condition when, generate first and receive the award code, including:When whether the user meets described receive the award When the corresponding bonus requirements of request, generates first and receive the award code.
4. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that the incentive message also wraps Include identifying code, the character string that the identifying code is 4-8 or the picture validation code containing the positions 4-8 character string for identification.
5. the anti-cheat method of the user behavior verification according to any one of claim 1, which is characterized in that each The first code of receiving the award that the default condition of receiving the award generates when meeting is different, and the described first code of receiving the award is scrambled.
6. the anti-cheat method of the user behavior verification according to any one of claim 1, which is characterized in that the life Include at the first code of receiving the award:
Obtain user's secret key of active user;
The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination Between stab and be encrypted, generate encrypted result;
First coding is carried out to encrypted result, first is obtained and receives the award code.
7. the anti-cheat method of user behavior verification according to claim 6, which is characterized in that the generation first is received the award Code further include:
It is further the time stamp setting when needing to generate multiple receive the award yard in the unit interval of the corresponding minimum of timestamp Flag, the genesis sequence number for code of receiving the award in the flag expression unit interval, and the timestamp that will be provided with flag is used User's secret key is encrypted to obtain encrypted result.
8. the anti-cheat method of user behavior verification according to claim 5, which is characterized in that
Include by the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server:First is received the award time of code The code collection of effectively receiving the award of stamp storage to server is closed;
To second extracted in verification information of receiving the award receive the award code validity carry out verification include:
It is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result;
It is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result;
The all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award are compared;
When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponding second receive the award code with The timestamp corresponding first is received the award code matching, and verification result is that the second code of receiving the award is effective.
9. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that in verification information of receiving the award Extraction second receive the award code carry out validation verification include:
All first during the code collection of effectively receiving the award that second receives the award code and server storage is closed codes of receiving the award are compared, and work as presence With second receive the award code matched first receive the award yard when, verification result is that the second code of receiving the award is effective.
10. the anti-cheat method of user behavior verification according to claim 8 or claim 9, which is characterized in that receive the award code when second After verification effectively, deletes in being closed from the code collection of effectively receiving the award and receive the award code and its related to the described second code matched first of receiving the award Information.
11. the anti-cheat method of user behavior verification according to claim 8 or claim 9, which is characterized in that
Further include by the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server:By the life of the first identifying code The code collection of effectively receiving the award that server is stored at time and the term of validity is closed;
To second extracted in verification information of receiving the award receive the award code carry out verification further include:It receives the award code matched the with second when existing One when receiving the award yard, is further compared the verification time that second receives the award code with the generated time of matched first identifying code, Judge described second receive the award code verification time whether be in the matched code of receiving the award the term of validity, then tested in the term of validity Card result is that the second code of receiving the award is effective;Otherwise the second code of receiving the award is invalid.
12. the anti-cheat method of user behavior verification according to claim 8 or claim 9, which is characterized in that
Further include by the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server:First is received the award the phase of code The genesis sequence that information receives the award code according to first is closed to store;
To second extracted in verification information of receiving the award receive the award code carry out verification further include:By second receive the award code with effectively receive the award code collection Sequence the first relevant information for receiving the award code at first is compared in conjunction, when described second receive the award code and the sequence at first first When code of receiving the award matches, verification result is that the second code of receiving the award is effective;Otherwise verification result is that the second code of receiving the award is invalid.
13. a kind of anti-cheat method of user behavior verification, which is characterized in that including:
To server upload user behavioural information;
The incentive message of server feedback is received, the incentive message is to be generated according to the analysis result of user behavior information, when Analysis result meet it is default receive the award condition when, the information of receiving the award is received the award code including first;
Extraction first is received the award code from the incentive message, and generates verification information of receiving the award, and the verification information of receiving the award includes institute First is stated to receive the award code;
Verification information of receiving the award is sent to server;
The verification result of server feedback is received, the verification result is generated by server according to verification information of receiving the award.
14. the anti-cheat method of user behavior verification according to claim 13, which is characterized in that the user behavior letter Breath includes:User name and user's login time information or user name and solicited message of receiving the award.
15. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that
The incentive message of the server feedback of reception further includes identifying code, the character string or contain useful that the identifying code is 4-8 In the picture validation code of the positions the 4-8 character string of identification;
The verification information of receiving the award includes described first receiving the award code and identifying code.
16. a kind of anti-cheating device of user behavior verification, which is characterized in that including:
First information receiving module, the user behavior information for receiving client upload;
Incentive message generation module generates the use for being analyzed according to the user behavior information of reception according to analysis result The incentive message at family, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, the first code of receiving the award is added Enter the incentive message, and the code collection of effectively receiving the award that the relevant information that described first receives the award code is stored to server is closed;
It receives the award a yard memory module, is closed for storing code collection of effectively receiving the award;
First information sending module, for incentive message to be sent to client;
Second information receiving module, the verification information of receiving the award for receiving client upload, the verification of receiving the award uploaded from client Extraction code of receiving the award is received the award code as second in information;
It receives the award a yard authentication module, for being closed according to the code collection of effectively receiving the award of server storage to being extracted in the verification information of receiving the award The second validity for receiving the award code verified, be verified result;
Second information sending module, for verification result to be sent to client.
17. the anti-cheating device of user behavior verification according to claim 16, which is characterized in that the incentive message life Include at module:
It receives the award condition judgment unit, for judging whether active user meets corresponding default item of receiving the award according to user behavior information Part;
Receive the award a yard generation unit, for active user whether meet it is corresponding receive the award condition when generate code of receiving the award;
Incentive message generation unit, for according to condition judgment unit of receiving the award judgement result and yard generation unit generation of receiving the award Code of receiving the award generates incentive message.
18. the anti-cheating device of user behavior verification according to claim 17, which is characterized in that the code generation of receiving the award Unit generates code of receiving the award:
Obtain user's secret key of active user;
The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination Between stab and be encrypted, generate encrypted result;
First coding is carried out to the encrypted result of timestamp, first is obtained and receives the award code.
19. the anti-cheating device of user behavior verification according to claim 17, which is characterized in that
The code collection of effectively receiving the award that the relevant information that first receives the award code is stored to server is closed packet by the incentive message generation module It includes:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed;
The validity that yard authentication module receives the award code to extracted in verification information of receiving the award second of receiving the award carries out verification:
It is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result;
It is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result;
The all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award are compared;
When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponding second receive the award code with Timestamp corresponding first is received the award code matching, and verification result is that the second code of receiving the award is effective.
20. a kind of anti-cheating device of user behavior verification, which is characterized in that including:
Third information sending module is used for server upload user behavioural information;
Third information receiving module, the incentive message for receiving server feedback, the incentive message are according to user behavior The analysis result of information generates, when analysis result meet it is default receive the award condition when, the information of receiving the award is received the award code including first;
Message processing module, for from the incentive message extraction first receive the award code, and it includes described first receiving the award code to generate Verification information of receiving the award;
4th information sending module, for sending verification information of receiving the award to server;
4th information receiving module, receives the verification result of server feedback, and the verification result is tested by server according to receiving the award Information is demonstrate,proved to generate.
21. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the program When being executed by processor, the anti-cheat method of the user behavior verification according to any one of claim 1-12 is realized.
22. a kind of computer equipment, which is characterized in that including memory, processor and store on a memory and can handle The computer program run on device when the processor executes described program, is realized according to any one of claim 1-12 institutes The anti-cheat method for the user behavior verification stated.
23. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the program When being executed by processor, the anti-cheat method of the user behavior verification according to any one of claim 13-15 is realized.
24. a kind of computer program product, which is characterized in that when the instruction in the computer program product is executed by processor When, realize the anti-cheat method of the user behavior verification according to any one of claim 13-15.
25. a kind of computer equipment, which is characterized in that including memory, processor and store on a memory and can handle The computer program run on device when the processor executes described program, is realized according to any one of claim 13-15 institutes The anti-cheat method for the user behavior verification stated.
CN201810432546.2A 2018-05-08 2018-05-08 Anti-cheating method and device for user behavior verification Active CN108712408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810432546.2A CN108712408B (en) 2018-05-08 2018-05-08 Anti-cheating method and device for user behavior verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810432546.2A CN108712408B (en) 2018-05-08 2018-05-08 Anti-cheating method and device for user behavior verification

Publications (2)

Publication Number Publication Date
CN108712408A true CN108712408A (en) 2018-10-26
CN108712408B CN108712408B (en) 2021-03-23

Family

ID=63868563

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810432546.2A Active CN108712408B (en) 2018-05-08 2018-05-08 Anti-cheating method and device for user behavior verification

Country Status (1)

Country Link
CN (1) CN108712408B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109873921A (en) * 2019-02-14 2019-06-11 初速度(苏州)科技有限公司 A kind of transmission method of image temporal stamp, analysis method and device
CN110933113A (en) * 2019-12-30 2020-03-27 腾讯科技(深圳)有限公司 Block chain-based interactive behavior detection method, device, equipment and storage medium
CN111105263A (en) * 2018-10-29 2020-05-05 北京奇虎科技有限公司 User identification method and device, electronic equipment and storage medium
CN111144931A (en) * 2019-12-10 2020-05-12 中国建设银行股份有限公司四川省分行 System, method and related apparatus for providing customer benefit activities
CN112261038A (en) * 2020-10-20 2021-01-22 苏州莱锦机电自动化有限公司 Big data acquisition method and system, computer equipment and storage medium thereof
CN113743979A (en) * 2021-07-26 2021-12-03 山东赤子城网络技术有限公司 Virtual resource allocation method and device, computer equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667277A (en) * 2008-09-05 2010-03-10 杨卫星 Anti-counterfeiting lottery cashing method and anti-counterfeiting lottery cashing system
CN102647461A (en) * 2012-03-29 2012-08-22 奇智软件(北京)有限公司 Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
CN105208094A (en) * 2015-08-21 2015-12-30 广东欧珀移动通信有限公司 Message notification method and message notifications system
US20160042474A1 (en) * 2013-06-18 2016-02-11 Sony Corporation Information processing device, information processing method, and program
CN105653944A (en) * 2015-12-25 2016-06-08 北京奇虎科技有限公司 Detection method and device of cheating behaviors
CN105678530A (en) * 2016-02-17 2016-06-15 中国建设银行股份有限公司 Data processing method and system
CN107563798A (en) * 2017-08-22 2018-01-09 北京潘达互娱科技有限公司 Prize-winning data processing method and device
CN107888615A (en) * 2017-12-01 2018-04-06 郑州云海信息技术有限公司 A kind of safety certifying method of Node registry
CN107968953A (en) * 2017-11-28 2018-04-27 北京潘达互娱科技有限公司 Anti- cheating user method and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101667277A (en) * 2008-09-05 2010-03-10 杨卫星 Anti-counterfeiting lottery cashing method and anti-counterfeiting lottery cashing system
CN102647461A (en) * 2012-03-29 2012-08-22 奇智软件(北京)有限公司 Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol)
US20160042474A1 (en) * 2013-06-18 2016-02-11 Sony Corporation Information processing device, information processing method, and program
CN105208094A (en) * 2015-08-21 2015-12-30 广东欧珀移动通信有限公司 Message notification method and message notifications system
CN105653944A (en) * 2015-12-25 2016-06-08 北京奇虎科技有限公司 Detection method and device of cheating behaviors
CN105678530A (en) * 2016-02-17 2016-06-15 中国建设银行股份有限公司 Data processing method and system
CN107563798A (en) * 2017-08-22 2018-01-09 北京潘达互娱科技有限公司 Prize-winning data processing method and device
CN107968953A (en) * 2017-11-28 2018-04-27 北京潘达互娱科技有限公司 Anti- cheating user method and device
CN107888615A (en) * 2017-12-01 2018-04-06 郑州云海信息技术有限公司 A kind of safety certifying method of Node registry

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111105263A (en) * 2018-10-29 2020-05-05 北京奇虎科技有限公司 User identification method and device, electronic equipment and storage medium
CN109873921A (en) * 2019-02-14 2019-06-11 初速度(苏州)科技有限公司 A kind of transmission method of image temporal stamp, analysis method and device
CN109873921B (en) * 2019-02-14 2023-04-07 魔门塔(苏州)科技有限公司 Image timestamp transmission method, image timestamp analysis method and image timestamp analysis device
CN111144931A (en) * 2019-12-10 2020-05-12 中国建设银行股份有限公司四川省分行 System, method and related apparatus for providing customer benefit activities
CN110933113A (en) * 2019-12-30 2020-03-27 腾讯科技(深圳)有限公司 Block chain-based interactive behavior detection method, device, equipment and storage medium
CN110933113B (en) * 2019-12-30 2021-04-09 腾讯科技(深圳)有限公司 Block chain-based interactive behavior detection method, device, equipment and storage medium
CN112261038A (en) * 2020-10-20 2021-01-22 苏州莱锦机电自动化有限公司 Big data acquisition method and system, computer equipment and storage medium thereof
CN112261038B (en) * 2020-10-20 2021-08-06 苏州莱锦机电自动化有限公司 Big data acquisition method and system, computer equipment and storage medium thereof
CN113743979A (en) * 2021-07-26 2021-12-03 山东赤子城网络技术有限公司 Virtual resource allocation method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN108712408B (en) 2021-03-23

Similar Documents

Publication Publication Date Title
CN108712408A (en) A kind of anti-cheat method and device of user behavior verification
CA3012822C (en) Digital virtual currency transaction system and method having block chain between concerned parties
CN103095662B (en) A kind of online transaction safety certifying method and online transaction security certification system
CA2711243C (en) System and method for secure voting
CN1682204B (en) Certification processing hardware, certification processing system and use management hardware
US20190066439A1 (en) Encrypted electronic gaming ticket
US20070033102A1 (en) Securely providing advertising subsidized computer usage
CN104660557B (en) operation processing method and device
CN101689236B (en) Secure login protocol
CN101681254B (en) Method and apparatus for authenticating users in a network
CN105435451A (en) Game cheating recognizing and processing method and device, system and server
EP1485843A2 (en) System and method for performing secure remote real-time financial transactions over a public communicatons infrastructure with strong authentication
US10341308B2 (en) Method for transmitting information from a first information provider to a second information provider via an information intermediary
CN103763104B (en) A kind of method and system of dynamic authentication
CN107679149A (en) A kind of data processing method and server
CN110677399A (en) Authentication method and device
CN109978533A (en) A kind of offline secure payment system and method that anti-two dimensional code is usurped
Krips et al. On practical aspects of coercion-resistant remote voting systems
CN107248084A (en) Ticketing service method for managing security and device
CN108174360A (en) A kind of note transmission method and device, short-message verification method and device
CN104168117B (en) A kind of speech digit endorsement method
JP2017023348A (en) Game system, score processing program, management device for game system and score processing method
JP3216098U (en) Advertising system in interactive environment
US20090013180A1 (en) Method and Apparatus for Ensuring the Security of an Electronic Certificate Tool
CN107992525A (en) The method and apparatus of ad click amount on a kind of statistics APP

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant