CN108712408A - A kind of anti-cheat method and device of user behavior verification - Google Patents
A kind of anti-cheat method and device of user behavior verification Download PDFInfo
- Publication number
- CN108712408A CN108712408A CN201810432546.2A CN201810432546A CN108712408A CN 108712408 A CN108712408 A CN 108712408A CN 201810432546 A CN201810432546 A CN 201810432546A CN 108712408 A CN108712408 A CN 108712408A
- Authority
- CN
- China
- Prior art keywords
- award
- code
- receiving
- verification
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/53—Network services using third party service providers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Pinball Game Machines (AREA)
Abstract
The present invention proposes a kind of anti-cheat method and device of user behavior verification.Method includes:Receive the user behavior information that client uploads;The incentive message that analysis generates the user is carried out to user behavior information, wherein, when analysis result meet it is default receive the award condition when, generate first receive the award code and by the additions incentive message, while by described first receive the award code relevant information storage to server code collection conjunction of effectively receiving the award;Incentive message is sent to client;The verification information of receiving the award that client uploads is received, extraction code of receiving the award is received the award code as second from the verification information of receiving the award that client uploads;The second validity for receiving the award code extracted in the verification information of receiving the award is verified according to the code collection conjunction of effectively receiving the award of server storage, is verified result;Verification result is sent to client.So as to make the verification information of receiving the award from non-customer end not have effect property, increases cheating cost, reduce cheating.
Description
Technical field
The present invention relates to anti-cheat methods and dress that technical field of internet application more particularly to a kind of user behavior are verified
It sets.
Background technology
In internet industry, number of users and the core lifeblood that frequency is product is enlivened.In order to encourage user's registration and increasing
Add user's viscosity, many products can all set up user's reward, to promote user to use.For example, by be arranged new user lead red packet,
Continuous to log in reward etc. to encourage new user to download, old user persistently logs in.Especially in mobile Internet, some apply journey
The higher reward of relative worth is often arranged in the popularization stage of sequence (APP).
For a user, user behavior (downloading, login etc.) meets certain verification condition (for example, having downloaded soft
Part, or meet registration conditions, line duration etc.) reward can be got.But under the driving of the interests of reward, often
There is the behavior of the cheating of some improper users.It even will appear and competed to pursue reward or malice, and use certainly
The extensive cheating for acting disadvantage software, pretends the mode of user behavior.If cheating cannot be identified and prevent, production will be given
Product publisher brings property loss, while may also bring shadow to product publisher or third-party institution's counting user behavior
It rings.
It is the needle in the recent period as the universal of mobile Internet just buds out into popularity on a large scale in view of the Extension Model based on reward
To the cheating problem for middle user behavior verification of receiving the award, particular study is there is no in the prior art, also without relevant specific aim solution
Certainly scheme.
Invention content
The present invention is directed to solve at least some of the technical problems in related technologies, a kind of user's row is provided
For the anti-cheat method and device of verification, the cheating during being received the award with strick precaution.
It is verified for server side user behavior in order to achieve the above object, the embodiment of first aspect present invention provides one kind
Anti- cheat method comprising:Receive the user behavior information that client uploads;Divided according to the user behavior information of reception
Analysis, the incentive message of the user is generated according to analysis result, wherein when analysis result meet it is default receive the award condition when, generate the
One receives the award code, and the first code of receiving the award is added the incentive message, and by described first receive the award code relevant information storage to service
The code collection conjunction of effectively receiving the award of device;Incentive message is sent to client;The verification information of receiving the award that client uploads is received, from client
Extraction code of receiving the award is held in the verification information of receiving the award uploaded to receive the award code as second;It is closed according to the code collection of effectively receiving the award of server storage
The second validity for receiving the award code extracted in the verification information of receiving the award is verified, result is verified;By verification result
It is sent to client.
In some embodiments, the user behavior information for receiving client upload includes:Receive what client uploaded
User name and user's login time information;Carrying out analysis according to the user behavior information of reception includes:According to currently received use
Family behavioural information and the user behavior information of accumulative reception are analyzed, when obtaining the login times distribution of user and/or logging in
Long distribution;When analysis result meet it is default receive the award condition when, generate first and receive the award code, including:When the login times of user are distributed
Meet preset condition and/or log duration distribution when meeting preset condition, generates first and receive the award code.
In some embodiments, the user behavior information for receiving client upload includes:Receive what client uploaded
User name and solicited message of receiving the award;Carrying out analysis according to the user behavior information of reception includes:Judge whether the user meets institute
State the corresponding bonus requirements of request of receiving the award;When analysis result meet it is default receive the award condition when, generate first and receive the award code, including:
When whether the user meets the corresponding bonus requirements of the request of receiving the award, generates first and receive the award code.
In some embodiments, the incentive message further includes identifying code, the character string or contain that the identifying code is 4-8
It is useful for the picture validation code of the positions the 4-8 character string of identification.
In some embodiments, first generated when each default condition of receiving the award meets code of receiving the award is different, and institute
It states first and receives the award code as scrambled.
In some embodiments, first code of receiving the award that generates includes:Obtain user's secret key of active user;According to first
Receive the award generated time of code obtains the corresponding first timestamp for receiving the award code, and user's secret key pair timestamp is used in combination to add
It is close, generate encrypted result;First coding is carried out to encrypted result, first is obtained and receives the award code.
In some embodiments, first code of receiving the award that generates further includes:When the unit interval of the corresponding minimum of timestamp
It is further the time stamp setting flag, the flag indicated in the unit interval when inside needing to generate multiple receive the award yard
It receives the award the genesis sequence number of code, and the timestamp for being provided with flag is encrypted with user's secret key to obtain encryption knot
Fruit.
In some embodiments, the code collection of effectively receiving the award that the relevant information that first receives the award code is stored to server is closed into packet
It includes:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed;To extracted in verification information of receiving the award
Two validity for receiving the award code carry out verification:It is decoded, is solved according to the second identifying code of inverse operation pair of the first coding
Code result;
It is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result;By decrypted result with have
The all first timestamps for receiving the award code imitated during code collection of receiving the award is closed are compared;It receives the award with decrypted result matched first when existing
Code timestamp when, judgement decrypted result corresponding second receive the award code corresponding with the timestamp first receive the award code match, test
Card result is that the second code of receiving the award is effective.
In some embodiments, to extracted in verification information of receiving the award second receive the award code carry out validation verification include:It will
The all first codes of receiving the award during second code collection of effectively receiving the award for receiving the award code and server storage is closed are compared, when existing and second
When code of receiving the award matched first is received the award yard, verification result is that the second code of receiving the award is effective.
In some embodiments, after second receives the award code verification effectively, deletion and institute from the code collection conjunction of effectively receiving the award
The second code matched first of receiving the award is stated to receive the award code and its relevant information.
In some embodiments, the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server is also wrapped
It includes:The code collection of effectively receiving the award that the generated time of first identifying code and the term of validity are stored in server is closed;To verification information of receiving the award
The second of middle extraction receive the award code carry out verification further include:When exist with second receive the award code matched first receive the award yard when, further
The verification time that second receives the award code is compared with the generated time of matched first identifying code, judges that described second receives the award code
Verification time whether be in the term of validity of the matched code of receiving the award, then verification result is second to receive the award code in the term of validity
Effectively;Otherwise the second code of receiving the award is invalid.
In some embodiments, the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server is also wrapped
It includes:The genesis sequence that the relevant information that first receives the award code receives the award code according to first is stored;To what is extracted in verification information of receiving the award
Second receive the award code carry out verification further include:By second receive the award code closed with code collection of effectively receiving the award in sequence first receiving the award code at first
Relevant information is compared, when described second receive the award code and the sequence at first first receive the award code match when, verification result
Two codes of receiving the award are effective;Otherwise verification result is that the second code of receiving the award is invalid.
Embodiment according to a first aspect of the present invention additionally provide a kind of user behavior for client-side verify it is anti-
Cheat method comprising:To server upload user behavioural information;Receive the incentive message of server feedback, the reward letter
Breath is generates according to the analysis result of user behavior information, when analysis result satisfaction, which is preset, receives the award condition, the information of receiving the award
It receives the award code including first;Extraction first is received the award code from the incentive message, and generates verification information of receiving the award, the verification of receiving the award
Information includes described first receiving the award code;Verification information of receiving the award is sent to server;The verification result of server feedback is received, it is described
Verification result is generated by server according to verification information of receiving the award.
In some embodiments, the user behavior information includes:User name and user's login time information or user
Name and solicited message of receiving the award.
In some embodiments, the incentive message of the server feedback of reception further includes identifying code, and the identifying code is 4-8
The character string of position or the picture validation code containing the positions 4-8 character string for identification;The verification information of receiving the award includes described
One receives the award code and identifying code.
Using the anti-cheat method of the user behavior verification of the present invention, pass through client and service during user receives the award
The interaction of device generated dynamic with uniqueness code of receiving the award by server based on user behavior and is sent in the preparation stage of receiving the award
Client is fed back to server and is verified in implementation procedure of receiving the award, realized to the behavior of receiving the award by the client code that will receive the award again
The judgement of validity.So as to effectively being identified to the request of receiving the award from non-customer end, making forgery or intercepting and capturing the neck retransmitted
Traditional cheating mode such as prize request cannot achieve, and increases cheating cost, is conducive to prevent cheating.
Second aspect of the present invention embodiment provides a kind of anti-cheating device that the user behavior for server side is verified,
It includes:
First information receiving module, the user behavior information for receiving client upload;
Incentive message generation module is generated for being analyzed according to the user behavior information of reception according to analysis result
The incentive message of the user, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, first is received the award
The incentive message is added in code, and the code collection of effectively receiving the award that the relevant information that described first receives the award code is stored to server is closed;
It receives the award a yard memory module, is closed for storing code collection of effectively receiving the award;
First information sending module, for incentive message to be sent to client;
Second information receiving module, the verification information of receiving the award for receiving client upload are received the award from what client uploaded
Extraction code of receiving the award is received the award code as second in verification information;
It receives the award a yard authentication module, for being closed in the verification information of receiving the award according to the code collection of effectively receiving the award of server storage
Second validity for receiving the award code of extraction is verified, and result is verified;
Second information sending module, for verification result to be sent to client.
In some embodiments, the incentive message generation module includes:It receives the award condition judgment unit, for according to user
Whether behavioural information judgement active user meets corresponding default condition of receiving the award;It receives the award a yard generation unit, in active user
Whether meet it is corresponding receive the award condition when generate code of receiving the award;Incentive message generation unit, for according to condition judgment unit of receiving the award
The code of receiving the award that judgement result and yard generation unit of receiving the award generate generates incentive message.
In some embodiments, yard generation unit generation of receiving the award code of receiving the award includes:The user for obtaining active user is secret
Key;The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination
Between stab and be encrypted, generate encrypted result;First coding is carried out to the encrypted result of timestamp, first is obtained and receives the award code.
In some embodiments, the incentive message generation module stores the relevant information that first receives the award code to server
Effectively receive the award code collection conjunction include:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed;It receives the award code
The validity that authentication module receives the award code to extracted in verification information of receiving the award second carries out verification:According to the inverse of the first coding
The second identifying code of operation pair is decoded, and obtains decoding result;It is solved according to user's secret key pair decoding result of active user
It is close, obtain decrypted result;The all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award are compared;
When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponding second is received the award code and time
It stabs corresponding first to receive the award code matching, verification result is that the second code of receiving the award is effective.
Second aspect of the present invention embodiment provides a kind of anti-cheating dress that the user behavior for client's end-apparatus side is verified
It sets comprising:
Third information sending module is used for server upload user behavioural information;
Third information receiving module, the incentive message for receiving server feedback, the incentive message are according to user
The analysis result of behavioural information generates, and when analysis result satisfaction, which is preset, receives the award condition, the information of receiving the award is received the award including first
Code;
Message processing module, for from the incentive message extraction first receive the award code, and it includes described first leading to generate
Encourage the verification information of receiving the award of code;
4th information sending module, for sending verification information of receiving the award to server;
4th information receiving module receives the verification result of server feedback, and the verification result is by server according to neck
Verification information is encouraged to generate.
The apparatus according to the invention is received the award process using the anti-cheat method of the user behavior verification of the present invention in user
In by the interaction of client and server, in the preparation stage of receiving the award, being generated by server based on user behavior has uniqueness
Dynamic code of receiving the award be sent to client, fed back to server by the client code that will receive the award again in implementation procedure of receiving the award and tested
Card realizes the judgement to the validity for the behavior of receiving the award.So as to effectively be identified to the request of receiving the award from non-customer end, make
It forges or intercepts and captures the traditional cheating mode of request etc. of receiving the award retransmitted cannot achieve, increase cheating cost, be conducive to prevent to practise fraud
Behavior.
Third aspect present invention embodiment provides a kind of non-transitorycomputer readable storage medium, is stored thereon with meter
Calculation machine program when the program is executed by processor, realizes the user behavior of the server side described according to a first aspect of the present invention
The anti-cheat method of verification.
Third aspect present invention embodiment additionally provides a kind of non-transitorycomputer readable storage medium, is stored thereon with
Computer program when the program is executed by processor, realizes user's row of the client-side described according to a first aspect of the present invention
For the anti-cheat method of verification.
Fourth aspect present invention embodiment provides a kind of computer program product, which is characterized in that when the computer
When instruction in program product is executed by processor, the user behavior of the client-side described according to a first aspect of the present invention is realized
The anti-cheat method of verification.
Fifth aspect present invention embodiment provides a kind of computer equipment, which is characterized in that including memory, processor
And the computer program that can be run on a memory and on a processor is stored, when the processor executes described program, realize
The anti-cheat method of the user behavior verification of the server side according to a first aspect of the present invention.
Fifth aspect present invention embodiment additionally provides a kind of computer equipment, which is characterized in that including memory, processing
Device and storage on a memory and the computer program that can run on a processor, when the processor executes described program, reality
The anti-cheat method that now user behavior of the client-side is verified according to a first aspect of the present invention.
According to third of the present invention to the non-transitorycomputer readable storage medium of five aspects, computer program product and meter
Calculating machine equipment has the advantageous effect similar with the method and apparatus according to first and second aspect of the present invention, no longer superfluous herein
It states.
Description of the drawings
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, wherein:
Fig. 1 is the flow diagram of the anti-cheat method of server side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 2 is according to the ... of the embodiment of the present invention first to receive the award code generating method flow diagram;
Fig. 3 is according to an embodiment of the invention second to receive the award code verification method flow diagram;
Fig. 4 is in accordance with another embodiment of the present invention second to receive the award code verification method flow diagram;
Fig. 5 is received the award code verification method flow diagram according to the second of another of the invention embodiment;
Fig. 6 is the flow diagram of the anti-cheat method of client side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 7 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 8 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention;
Fig. 9 is the friendship of anti-the cheat method server side and client-side of user behavior verification according to the ... of the embodiment of the present invention
Mutual process schematic;And
Figure 10 is the structural schematic diagram of computer equipment according to the ... of the embodiment of the present invention.
Specific implementation mode
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Currently, in the internet application of the overwhelming majority, normally only used in the interaction of server and client
Family authentication, and prevent the Brute Force of user account from practising fraud.Such as log in when, dynamic picture identifying code is provided, by with
Input carries out verification operation after family carries out visual identity, to avoid the Brute Force to account and password.But once user
After login, safety measure is then lacked to follow-up interactive process.It dominates the market to promote and apply, many application programs (for example,
Pc client and mobile client APP) in order to encourage user installation and use, the reward based on user behavior can be provided, for example,
User logs in reward, continuous to log in number of days reward, online hours reward, periodically robs red packet, and commodity are clicked the second and killed etc..There is reward
Just there is cheating, under interests driving, has emerged various modes and encouraged to falsely claim as one's own and receive the award more, and new cheating mode
Among continuous create.For example, be sent to the solicited message of receiving the award of server by intercepting and capturing user, reverse engineered and a large amount of is carried out
It replicates to repeat to claim.
How to judge whether user behavior is really to occur, and whether the user behavior information of received server-side is by actual
User generates in client operation, is the key that prevent one of cheating.One of main object of the present invention is to provide one kind
For the anti-fraudulent means of user behavior verification.To ensure that the true operation of real user can obtain corresponding reward, and make
Disadvantage behavior can be identified effectively.And main thinking is, before receiving the award and during receive the award, by applications client and
The backstage of server end interacts, and receives the award code using what server end provided and is authenticated to user behavior, prevents from practising fraud.
The anti-cheating of user behavior is directed in the present invention, the distribution process in addition to can be used for material reward can also be used
In other scenes.In this application, " reward " shall be understood in a broad sense, and include not only the directly profit such as red packet, card certificate, cash, material object
The delivery of benefit also includes the identification etc. of the composition, user's specific behavior of effective statistical result.For example, one of certain APP is appointed
Business, it is desirable that if user carries out dry run.After user executes these operation behaviors, assert " task has been completed ", can also regard
To be a kind of reward.
The specific implementation mode of the present invention is described in detail below in conjunction with the accompanying drawings.The method of the present invention is in client
Side and server side execute corresponding operation respectively.
Fig. 1 is the flow diagram of the anti-cheat method of server side user behavior verification according to the ... of the embodiment of the present invention.
Referring to Fig. 1, the anti-cheat method of user behavior verification may include step S100 to S600.
In step S100, the user behavior information that client uploads is received.
Can have the condition of receiving the award based on various various forms of user behaviors, it is possibility to have it is a variety of different receive the award touch
Clockwork spring part.For example, can be by the login behavior of user, the continuous number of days that logs in meets preset condition, and online hours, which meet, presets item
Whether part etc. meets trigger condition as trigger condition of receiving the award by server automatic decision.Alternatively, can also be doomed with user
Specific " receiving the award " button of client is clicked as trigger condition, process of receiving the award is opened according to the click behavior of user.For not
Same triggering form, the user behavior information that client uploads can also have different forms.
For example, the user behavior information for receiving client upload may include:Receive client upload user name and
User's login time information.Or including receiving the user name and solicited message etc. of receiving the award that client uploads.
In step S200, is analyzed according to the user behavior information of reception, the prize of the user is generated according to analysis result
Encourage information, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, first is received the award described in code is added
Incentive message, and the code collection of effectively receiving the award that the relevant information that described first receives the award code is stored to server is closed.
For example, under the first scene, condition of receiving the award is judged according to user login information by server, opens process of receiving the award.
It receives the user behavior information that client uploads and may include user name and user's login time information.At this point, according to the user of reception
Behavioural information carries out analysis and may include:It is carried out according to currently received user behavior information and the user behavior information of accumulative reception
Analysis obtains login times distribution and/or the log duration distribution of user;When the login times distribution of user meets preset condition
And/or log duration distribution is when meeting preset condition, generates first and receives the award code.When preset condition is unsatisfactory for, do not feed back or
Feedback receives the award the ungratified information of condition to client.In other words, incentive message can be for sky or comprising prize condition not at this time
The information of satisfaction.
In a second possible scenario, process of receiving the award is opened according to the request of receiving the award of user.At this point, the reception client uploads
User behavior information include:Receive the user name and solicited message of receiving the award that client uploads.Believed according to the user behavior of reception
Breath carries out analysis:Judge whether the user meets the corresponding bonus requirements of request of receiving the award.When whether the user is full
When the corresponding bonus requirements of request of receiving the award described in foot, generates first and receive the award code.Equally, when preset condition is unsatisfactory for, not instead
Feedback or feedback receive the award the ungratified information of condition to client.In other words, incentive message can be empty or include prize at this time
The ungratified information of condition.
When feeding back incentive message, in order to further strengthen safety, when the condition of receiving the award meets, the incentive message may be used also
To include identifying code.It can just be received the award after client inputs identifying code by user with realizing.Current phase can be used in the identifying code
General type in the technology of pass, for example, 4-8 character strings or the picture validation code containing the positions 4-8 character string for identification.
In order to reach better anti-cheating effect, the first code of receiving the award could be provided as dynamic generation, one yard of form.
That is, it is all different to meet the first code of receiving the award that the when of receiving the award condition generates every time.Also, cribber intercepts and captures neck in order to prevent
After encouraging code, the generation mechanism for code of receiving the award is obtained by reverse engineered, to forge code of receiving the award, code of receiving the award constructively selects to be not easy
The form being cracked.Such as various scrambleds.In other words, the first neck can be used as with dynamic non-duplicate encrypted characters string
Encourage code.Encryption secret key can be respectively set according to each user account (ID).Meanwhile for the ease of receiving the award in subsequent step
Code verification, encrypted " seed " character string can select the variable of time correlation.And the result after encrypted is convenient for
The coding of network transmission.
The code collection conjunction of effectively receiving the award of server storage can be identified according to different user, so be received the award in progress user
When verification, it need to only be verified according to the code collection conjunction of effectively receiving the award of corresponding active user's mark, verifying speed can be accelerated.
It is according to the ... of the embodiment of the present invention first to receive the award code generating method flow diagram referring to Fig. 2, Fig. 2.Wherein provide
A kind of specific code generating method of receiving the award, the method comprising the steps of S221 to S223.
In step S221, user's secret key of active user is obtained.For example, can be by the account of active user and predefined word
The combination of string is accorded with as user's secret key.In this way, user's secret key can store in the server, user account can also obtained
The time of secret key lookup is quickly directly generated and saved simultaneously.
In step S222, the generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, is used in combination
User's secret key pair timestamp is encrypted, and generates encrypted result.Encryption can use various existing Encryption Algorithm, this hair
It is bright not do particular/special requirement.
In some embodiments, in order to prevent malicious user according to client carry out reverse engineered, receive the award code client not
Carry out any decoding operate.Therefore, using symmetric encipherment algorithm, such as CRC (cyclic redundancy check, Cyclic
Redundancy Check)。
Timestamp (timestamp) is a kind of time representation, and be one kind having unique corresponding pass with specific time point
The variable of system.It can take and be accurate to the second, the different accuracy such as millisecond.For example, the timestamp of current time, may be defined as from lattice
When 1970 01 month 01 day 00 Lin Weizhi times 00 divide 00 second to current time total number of seconds.For example, time 2017/
12/4,10:00:00 corresponding timestamp is 1512352800.
Using the timestamp for yard generated time of receiving the award as encrypted " seed " parameter, on the one hand it is convenient for obtaining, on the other hand
In most cases due to the uniqueness for yard generated time of receiving the award, the encrypted probability that code repeats of receiving the award of different timestamps is several
It is 0.Also, if it is operation setting timeliness of receiving the award, the valid period that code of receiving the award is calculated using timestamp is also allowed for.
In step S223, the first coding is carried out to encrypted result, first is obtained and receives the award code.It can use to carry out the first coding
Difficulty is cracked in further increasing, and/or is easy for network transmission.For example, base64 codings can be used in the first coding.
Base64 is one of the coding mode that transmission 8Bit bytecodes are most commonly used on network, can be beaten based on 64
Lettering symbol can be used under HTTP environment transmitting longer identification information come the method for indicating binary data.
, may be in a short time by request of largely receiving the award under some scenes, such as rob red packet or the second kills activity
In, user may repeatedly request be received the award in 1 second.And if timestamp has selected to be accurate to the second, at this time when simple use
Between stamp will be unable to distinguish this more request in 1 second, these requests may correspond to identical first and receive the award code.Therefore, work as the time
It stabs when needing to generate multiple receive the award yard in the unit interval of corresponding minimum, may further be the time stamp setting flag,
The flag indicates to receive the award in the unit interval genesis sequence number of code, and will be provided with the timestamp of flag with the user
Secret key is encrypted to obtain encrypted result.Also, another benefit is, when being verified to the code of receiving the award that client returns,
It can be achieved to be verified according to transmission sequence.In this way, for malice intercept and capture after largely retransmit or user use plug-in repeating transmission
Equal cheatings, the sequence very maximum probability of the code of receiving the award provided is to be unable to a yard genesis sequence of receiving the award for match server, from
And it can identify cheating.
For example, it is according to an embodiment of the invention receive the award code and timestamp it is as shown in table 1.
Table 1
User | Serial number | It receives the award code | Timestamp |
User 1 | 1 | 1FDSFSLDFLJ12312123LKJFD | 1512352861 |
User 1 | 2 | ASDLJSDKLF12FASD0U23423 | 1512352861 |
User 1 | 3 | F3F48HF892FWDKJHWF222KS | 1512352862 |
User 2 | 1 | WEOIURWSOIU23KJ234KJ9F | 1512352811 |
User 2 | 2 | IUYWE982HKJSFSDOI203HS | 1512352821 |
User 2 | 3 | 1231KHSDFOI23H93KJNERW | 1512352832 |
…… | …… | …… | …… |
In step S300, incentive message is sent to client.Information of receiving the award can send directionally to user to meet neck
The client that the active user of prize condition is logged in.It in order to increase interception difficulty, prevents from illegally being intercepted and captured, receive the award code with first
Incentive message client can also be transferred to via comparatively safe network transmission channel (such as passing through the cryptographic protocols such as SSL)
End.
In step S400, the verification information of receiving the award that client uploads is received, from the verification information of receiving the award that client uploads
Extraction code of receiving the award is received the award code as second.For normal user, since what client may be configured as to receive first receives the award code
Server is sent back again, and therefore, the second of extraction code of receiving the award with the first code of receiving the award sent should be identical.
And for situation of practising fraud, then the verification information of receiving the award that server receives may not be to be directly transmitted by client,
But the camouflage information constructed by cribber, therefore, the second of extraction receives the award, and the first identifying code that code and server are sent may
Difference, so the validity of the second identifying code is needed to be judged.
In step S500, according to the code collection of effectively receiving the award of server storage close to extracted in the verification information of receiving the award the
Two validity for receiving the award code are verified, and result is verified.A kind of most basic verification thinking is:By second receive the award code with clothes
The all first codes of receiving the award during the code collection of effectively receiving the award of business device storage is closed are compared, and are received the award code matched the with second when existing
One when receiving the award yard, and verification result is that the second code of receiving the award is effective.
It receives the award for first the specific coding form of code, can there is further different specific verification modes.Fig. 3 is basis
The second of another embodiment of the present invention is received the award code verification method flow diagram, and the present embodiment is directed in above-mentioned steps S200,
It receives the award in the case that code built using method with reference to described in Fig. 2 to first, the second verification for receiving the award code.This embodiment
In, by first receive the award code relevant information storage to server effectively receive the award code collection close when may include:First is received the award code
The code collection of effectively receiving the award that timestamp is stored to server is closed.To second extracted in verification information of receiving the award receive the award code validity into
Row verification includes step S511 to S514.
In step S511, it is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result.
In step S512, it is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result,.
In step S513, all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award compare
Compared with.
Judge decrypted result pair when there is the timestamp for code of receiving the award with decrypted result matched first in step S514
Second answered code corresponding with the timestamp first of receiving the award is received the award code matching, and verification result is that the second code of receiving the award is effective.
In some embodiments, it can be further adopted as code setting timeliness of receiving the award, or received the award what is be verified
Code (the i.e. corresponding situation received the award) carries out the means such as deletion immediately and further enhances anti-cheating performance.
Fig. 4 is in accordance with another embodiment of the present invention second to receive the award code verification method flow diagram.Wherein, authenticated
Journey includes step S521 to S525.
In step S521, all first during the code collection of effectively receiving the award that second receives the award code and server storage is closed receive the award code
It is compared.Can be that character string after the coding by code of receiving the award directly is compared, can also be after decoding after secret just
" seed parameter " (such as timestamp) is compared indirectly.When code of receiving the award is longer or when quantity is more, referring for example to Fig. 2
The coding mode of embodiment is compared and can have higher efficiency with regard to " seed parameter " (such as timestamp).
In step S522, judges whether to receive the award code with the second code matched first of receiving the award, is to then follow the steps S523,
Otherwise S525 is executed.
In step S523, the code of receiving the award of judgement second is effective.
In step S524, the code collection of effectively receiving the award deleted in closing with described second receive the award code matched first receive the award code and
Its relevant information.Once occurring corresponding effective second to receive the award code, success of receiving the award, it is meant that the matched first code of receiving the award has lost
Effect, subsequent relatively execution efficiency can be improved by being deleted in being closed from code collection of effectively receiving the award, and can more prevent the code quilt of receiving the award of failure
Recycling.
In step S525, the code of receiving the award of judgement second is invalid.
In some embodiments, it can be the code setting term of validity of receiving the award.By the generated time of the first identifying code and the term of validity
It is stored in the code collection conjunction of effectively receiving the award of server.To second extracted in verification information of receiving the award receive the award code verified then further
Include the process of failure verification.Referring to Fig. 5, Fig. 5 received the award code verification method stream according to the second of another of the invention embodiment
Journey schematic diagram.The code verification method of receiving the award of the second of the present embodiment may include step S531 to S536.
In step S531, all first during the code collection of effectively receiving the award that second receives the award code and server storage is closed receive the award code
It is compared.
In step S532, judges whether to receive the award code with the second code matched first of receiving the award, is to then follow the steps S533,
Otherwise S536 is executed.
In step S533, when exist with second receive the award code matched first receive the award yard when, further second is received the award code
Verification time is compared with the generated time of matched first identifying code.
In step S534, judge whether the verification time that described second receives the award code is in the effective of the matched code of receiving the award
Phase thens follow the steps S535 in the term of validity, no to then follow the steps S536.
In step S535, decision verification result is that the second code of receiving the award is effective.
In step S536, decision verification result is that the second code of receiving the award is invalid.
In some embodiments, in order to further enhance safety, the genesis sequence for only receiving the award code according to first returns
The second code of receiving the award be considered effectively.At this point, storing the relevant information that first receives the award code to the effective of server
Code collection of receiving the award is closed:The genesis sequence that the relevant information that first receives the award code receives the award code according to first is stored.It tests receiving the award
Card information in extract second receive the award code carry out verification further include:By second receive the award code with effectively receive the award code collection close in sequence at first
The first relevant information for receiving the award code be compared, when the described second the first code of receiving the award of code and the sequence at first of receiving the award matches
When, verification result is that the second code of receiving the award is effective;Otherwise verification result is that the second code of receiving the award is invalid.
In step S600, verification result is sent to client.When verification result be second receive the award code it is invalid when, can send out
It send and is unsatisfactory for the prompt messages such as the condition of receiving the award to client.When verification result be second receive the award code it is effective when, it is transmittable to receive the award
The prompt messages such as success are to client.Reward can also be provided simultaneously arrives user account.
Fig. 6 is the flow diagram of the anti-cheat method of client side user behavior verification according to the ... of the embodiment of the present invention.
The anti-cheat method of client-side includes that step S100 ' arrives S500 '.
In step S100 ', to server upload user behavioural information.According to different scenes, the user behavior information
May include user name and user's login time information, or including user name and solicited message etc. of receiving the award.For details, reference can be made to
Description in conjunction with Fig. 1 to step S100, it is no longer repeated.
In step S200 ', the incentive message of server feedback is received, the incentive message is according to user behavior information
Analysis result generates.When analysis result meet it is default receive the award condition when, the information of receiving the award is received the award code including first.First receives the award
The specific composition of code can be found in conjunction with Fig. 1, descriptions of the Fig. 2 to step S200.
In some embodiments, in addition to first receives the award other than code, the incentive message of the server feedback of reception can also wrap
Include identifying code.The character string that the identifying code is 4-8 or the picture validation code containing the positions 4-8 character string for identification.
In step S300 ', first is extracted from the incentive message and is received the award code, and generates verification information of receiving the award.
It can be that client automatically generates after the incentive message for receiving server to generate verification information of receiving the award, and can also be
It is generated according to the concrete operations behavior of user.For example, user clicks " receiving the award " button, it is rear to generate verification information of receiving the award.
In general, the information of server end is not easy to obtain, and cribber is often by analyzing client wound
Cheat method is made, so not handled the first code of receiving the award in client.The verification information of receiving the award directly includes described
First receives the award code.
In step S400 ', verification information of receiving the award is sent to server.
In step S500 ', the verification result of server feedback is received, the verification result is by server according to verification of receiving the award
Information generates.The process of verification can be seen that the description in conjunction with Fig. 1 and Fig. 3-5 couples of step S500.
Using the anti-cheat method of the user behavior verification of the present invention, pass through client and service during user receives the award
The interaction of device generated dynamic with uniqueness code of receiving the award by server based on user behavior and is sent in the preparation stage of receiving the award
Client is fed back to server and is verified in implementation procedure of receiving the award, realized to the behavior of receiving the award by the client code that will receive the award again
The judgement of validity.So as to effectively being identified to the request of receiving the award from non-customer end, making forgery or intercepting and capturing the neck retransmitted
Traditional cheating mode such as prize request cannot achieve, and increases cheating cost, is conducive to prevent cheating.
In order to realize the method in above-mentioned first aspect embodiment, the embodiment of second aspect of the present invention proposes to be used respectively
In the anti-cheating device of the user behavior of server side and client-side verification.It should be noted that the aforementioned side to the present invention
The explanation of method embodiment is also applied for the device of the invention embodiment, will not in device embodiment to avoid redundancy
All details are repeated.Place, those skilled in the art not may refer to above-mentioned combination Fig. 1 to Fig. 6 to present invention side to the greatest extent
The associated description of method embodiment.
Fig. 7 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention.Its
In, the anti-cheating device 100 of server user's behavior verification includes:First information receiving module 110, incentive message generate
Module 120, yard memory module 130 of receiving the award, first information sending module 140, the second information receiving module 150, code of receiving the award verification
Module 160 and the second information sending module 170.
First information receiving module 110 is used to receive the user behavior information of client upload.Specific implementation form can join
See and combines descriptions of the Fig. 1 to step S100.
Incentive message generation module 120 is given birth to for being analyzed according to the user behavior information of reception according to analysis result
At the incentive message of the user, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, by the first neck
It encourages code and the incentive message is added, and the relevant information that described first receives the award code is stored into the code collection of effectively receiving the award to server
It closes.Specific implementation form can be found in conjunction with Fig. 1, descriptions of the Fig. 2 to step S200.
Specifically, the incentive message generation module may include:It receives the award condition judgment unit, receive the award yard generation unit and prize
Encourage information generating unit.
Condition judgment unit of receiving the award is used to judge whether active user meets corresponding default neck according to user behavior information
Prize condition.Receive the award a yard generation unit, for active user whether meet it is corresponding receive the award condition when generate code of receiving the award.Incentive message
The code of receiving the award that generation unit is used for the judgement result according to condition judgment unit of receiving the award and yard generation unit of receiving the award generates generates prize
Encourage information.
In some embodiments, yard generation unit generation of receiving the award code of receiving the award includes:The user for obtaining active user is secret
Key;The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination
Between stab and be encrypted, generate encrypted result;First coding is carried out to the encrypted result of timestamp, first is obtained and receives the award code.
Correspondingly, the relevant information that first receives the award code is stored effective neck to server by the incentive message generation module
Prize code collection, which is closed, includes:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed.
The validity that yard authentication module receives the award code to extracted in verification information of receiving the award second of receiving the award carries out verification and may include:
It is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result;According to user's secret key of active user
Decoding result is decrypted, decrypted result is obtained;All first during decrypted result is closed with code collection of effectively receiving the award receive the award code
Timestamp be compared;When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponds to
The second code corresponding with timestamp first of receiving the award receive the award code matching, verification result is that the second code of receiving the award is effective.
Yard memory module 130 of receiving the award is for storing code collection conjunction of effectively receiving the award.
First information sending module 140 is used to incentive message being sent to client.Specific implementation form can be found in combination
Descriptions of the Fig. 1 to step S300.
Second information receiving module 150, the verification information of receiving the award for receiving client upload, the neck uploaded from client
Extraction code of receiving the award is received the award code as second in prize verification information.Specific implementation form, which can be found in, retouches step S400 in conjunction with Fig. 1
It states.
It receives the award yard authentication module 160, for being closed to the verification letter of receiving the award according to the code collection of effectively receiving the award of server storage
The second validity for receiving the award code extracted in breath is verified, and result is verified.Specific implementation form can be found in conjunction with Fig. 1,
The description of Fig. 3-5 couples of step S500.
Second information sending module 170, for verification result to be sent to client.Specific implementation form can be found in combination
Descriptions of the Fig. 1 to step S600.
Fig. 8 is the structure diagram of the anti-cheating device of server side user behavior verification according to the ... of the embodiment of the present invention.Its
In, the anti-cheating device 200 of the user behavior verification of client-side includes third information sending module 210, and third information receives
Module 220, message processing module 230, the 4th information sending module 240 and the 4th information receiving module 250.
Third information sending module 210 is used for server upload user behavioural information.
Third information receiving module 220 is used to receive the incentive message of server feedback, the incentive message be according to
The analysis result of family behavioural information generates, and when analysis result satisfaction, which is preset, receives the award condition, the information of receiving the award includes the first neck
Encourage code.
Message processing module 230 is used for the extraction first from the incentive message and receives the award code, and it includes described first to generate
It receives the award the verification information of receiving the award of code.
4th information sending module 240 is used to send verification information of receiving the award to server.
4th information receiving module 250 is used to receive the verification result of server feedback, and the verification result is by server
According to receiving the award, verification information generates.
It may refer to the description of embodiment of the method about the specific implementation form of modules.
Using the anti-cheating device of the user behavior verification of the present invention, pass through client and service during user receives the award
The interaction of device generated dynamic with uniqueness code of receiving the award by server based on user behavior and is sent in the preparation stage of receiving the award
Client is fed back to server and is verified in implementation procedure of receiving the award, realized to the behavior of receiving the award by the client code that will receive the award again
The judgement of validity.So as to effectively being identified to the request of receiving the award from non-customer end, making forgery or intercepting and capturing the neck retransmitted
Traditional cheating mode such as prize request cannot achieve, and increases cheating cost, is conducive to prevent cheating.
Fig. 9 is the friendship of anti-the cheat method server side and client-side of user behavior verification according to the ... of the embodiment of the present invention
Mutual process schematic.
Preparation stage before receiving the award, by client upload user behavioural information to server end, server end according to
Family information (the user behavior record for including the user behavior information of client upload and accumulation) is analyzed, and whether judges user
Meet condition of specifically receiving the award.And when user meets and receives the award condition, code is received the award in generation and the code that will receive the award be stored in server (by
The code of receiving the award that server end generates is named as first and receives the award code).Later server end will receive the award code return to client.
During receiving the award, it includes receiving that client, which submits verification information of receiving the award, verification information of receiving the award,
First receives the award code.Server receives receive the award verification information after, carry out verification of receiving the award.It is carried from the verification information of receiving the award of client
It takes code of receiving the award (code of receiving the award of extraction be named as second receive the award code), and is carried out with the first of storage code of receiving the award by the second code of receiving the award
Comparison is verified with receiving the award yard validity to carry out second.According to second receive the award code it is effective whether, generation is received the award result.Finally will
Result of receiving the award returns to client.Completion is received the award process.
The embodiment of third aspect present invention provides a kind of non-transitorycomputer readable storage medium, is stored thereon with
Computer program when the program is executed by processor, realizes the anti-work of the user behavior verification of server side according to the present invention
Disadvantage method.
The embodiment of third aspect present invention additionally provides another non-transitorycomputer readable storage medium, deposits thereon
Computer program is contained, the anti-cheating of the user behavior verification of the client-side of the present invention is realized when which is executed by processor
Method.
In general, one or more computer-readable for realizing may be used for the computer instruction of the method for the present invention
The arbitrary combination of medium carry.Computer-readable medium can be computer-readable signal media or computer-readable deposit
Storage media.So-called non-transitory computer-readable medium may include any computer-readable medium, in addition to temporarily propagating
In signal itself.
Computer readable storage medium for example may be-but not limited to-electricity, magnetic, optical, electromagnetic, infrared ray or half
System, device or the device of conductor, or the arbitrary above combination.The more specific example of computer readable storage medium is (non-
Exhaustive list) include:Electrical connection, portable computer diskette with one or more conducting wires, hard disk, random access memory
Device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, Portable, compact magnetic
Disk read-only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document
In, computer readable storage medium, which can be any, includes or the tangible medium of storage program, which can be commanded execution
The either device use or in connection of system, device.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated,
Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including --- but
It is not limited to --- electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be
Any computer-readable medium other than computer readable storage medium, which can send, propagate or
Transmission for by instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In --- wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be write with one or more programming languages or combinations thereof for executing the computer that operates of the present invention
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partly executes or executed on a remote computer or server completely on the remote computer on the user computer.
Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or
Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as carried using Internet service
It is connected by internet for quotient).
The embodiment of fourth aspect present invention provides a kind of computer program product, when in the computer program product
Instruction when being executed by processor, realize the user behavior verification of the client-side described in embodiment according to a first aspect of the present invention
Anti- cheat method.
The embodiment of fourth aspect present invention additionally provides a kind of computer program product, when the computer program product
In instruction when being executed by processor, realize that the user behavior of the server side described in embodiment according to a first aspect of the present invention is tested
The anti-cheat method of card.
Fifth aspect present invention embodiment provides a kind of computer equipment, including memory, processor and is stored in
On reservoir and the computer program that can run on a processor, when the processor executes described program, realize according to the present invention
The anti-cheat method of server side user behavior verification described in first aspect.
Fifth aspect present invention embodiment additionally provides another computer equipment, including memory, processor and storage
On a memory and the computer program that can run on a processor, it when the processor executes described program, realizes according to this
The anti-cheat method of client side user behavior verification described in invention first aspect.
According to third of the present invention to the non-transitorycomputer readable storage medium of five aspects, computer program product and meter
Calculate machine equipment, be referred to the content that embodiment according to a first aspect of the present invention specifically describes and realize, and with according to this hair
Advantageous effect as the method class of bright first aspect, details are not described herein.
Figure 10 shows the block diagram of the exemplary computer device suitable for being used for realizing the application embodiment.Figure 10 is shown
Computer equipment 12 be only an example, any restrictions should not be brought to the function and use scope of the embodiment of the present application.
As shown in Figure 10, computer equipment 12 can be realized in the form of universal computing device.The component of computer equipment 12
It can include but is not limited to:One or more processor or processing unit 16, system storage 28 connect different system group
The bus 18 of part (including system storage 28 and processing unit 16).
Bus 18 indicates one or more in a few class bus structures, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using the arbitrary bus structures in a variety of bus structures.It lifts
For example, these architectures include but not limited to industry standard architecture (Industry Standard
Architecture;Hereinafter referred to as:ISA) bus, microchannel architecture (Micro Channel Architecture;Below
Referred to as:MAC) bus, enhanced isa bus, Video Electronics Standards Association (Video Electronics Standards
Association;Hereinafter referred to as:VESA) local bus and peripheral component interconnection (Peripheral Component
Interconnection;Hereinafter referred to as:PCI) bus.
Computer equipment 12 typically comprises a variety of computer system readable media.These media can be it is any can be by
The usable medium that computer equipment 12 accesses, including volatile and non-volatile media, moveable and immovable medium.
Memory 28 may include the computer system readable media of form of volatile memory, such as random access memory
Device (Random Access Memory;Hereinafter referred to as:RAM) 30 and/or cache memory 32.Computer equipment 12 can
To further comprise other removable/nonremovable, volatile, nonvolatile computer readable storage mediums.Only conduct
Citing, storage system 34 can be used for reading and writing immovable, non-volatile magnetic media and (do not shown in figure, commonly referred to as " hard disk
Driver ").Although being not shown in Figure 10, can provide for moving non-volatile magnetic disk (such as " floppy disk ") read-write
Disc driver, and to removable anonvolatile optical disk (such as:Compact disc read-only memory (Compact Disc Read
Only Memory;Hereinafter referred to as:CD-ROM), digital multi CD-ROM (Digital Video Disc Read Only
Memory;Hereinafter referred to as:DVD-ROM) or other optical mediums) read-write CD drive.In these cases, each driving
Device can be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one program production
Product, the program product have one group of (for example, at least one) program module, and it is each that these program modules are configured to perform the application
The function of embodiment.
Program/utility 40 with one group of (at least one) program module 42 can be stored in such as memory 28
In, such program module 42 include but not limited to operating system, one or more application program, other program modules and
Program data may include the realization of network environment in each or certain combination in these examples.Program module 42 is usual
Execute the function and/or method in embodiments described herein.
Computer equipment 12 can also be with one or more external equipments 14 (such as keyboard, sensing equipment, display 24
Deng) communication, the equipment interacted with the computer system/server 12 communication can be also enabled a user to one or more,
And/or with any equipment that the computer system/server 12 is communicated with one or more of the other computing device
(such as network interface card, modem etc.) communicates.This communication can be carried out by input/output (I/O) interface 22.Also,
Computer equipment 12 can also pass through network adapter 20 and one or more network (such as LAN (Local Area
Network;Hereinafter referred to as:LAN), wide area network (Wide Area Network;Hereinafter referred to as:WAN) and/or public network, example
Such as internet) communication.As shown, network adapter 20 is communicated by bus 18 with other modules of computer equipment 12.It wants
Illustrate, although not shown in the drawings, other hardware and/or software module can be used in conjunction with computer equipment 12, including but
It is not limited to:Microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive with
And data backup storage system etc..
Processing unit 16 is stored in program in system storage 28 by operation, to perform various functions application and
Data processing, such as realize the method referred in previous embodiment.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
In addition, term " first ", " second " are used for description purposes only, it is not understood to indicate or imply relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes
It is one or more for realizing custom logic function or process the step of executable instruction code module, segment or portion
Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable
Sequence, include according to involved function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be of the invention
Embodiment person of ordinary skill in the field understood.Expression or logic described otherwise above herein in flow charts
And/or step, for example, it is considered the order list of the executable instruction for realizing logic function, it can be specifically real
In present any computer-readable medium, for instruction execution system, device or equipment (such as computer based system including
The system of processor or other can be from instruction execution system, device or equipment instruction fetch and the system executed instruction) use, or
It is used in conjunction with these instruction execution systems, device or equipment.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned
In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be executed with storage
Or firmware is realized.Such as, if realized in another embodiment with hardware, following skill well known in the art can be used
Any one of art or their combination are realized:With for data-signal realize logic function logic gates from
Logic circuit is dissipated, the application-specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile
Journey gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries
Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium
In matter, which includes the steps that one or a combination set of embodiment of the method when being executed.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also
That each unit physically exists alone, can also two or more units be integrated in a module.Above-mentioned integrated mould
The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as
Fruit is realized in the form of software function module and when sold or used as an independent product, can also be stored in a computer
In read/write memory medium.
Although the embodiments of the present invention has been shown and described above, it should be appreciated that above-described embodiment is example
Property, it is not construed as limiting the claims, those skilled in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, changes, replacing and modification.
Claims (25)
1. a kind of anti-cheat method of user behavior verification, which is characterized in that including:
Receive the user behavior information that client uploads;
Analyzed according to the user behavior information of reception, the incentive message of the user generated according to analysis result, wherein when point
Analysis result meet it is default receive the award condition when, generate first and receive the award code, the incentive message is added in the first code of receiving the award, and will be described
The code collection of effectively receiving the award that first relevant information for receiving the award code is stored to server is closed;
Incentive message is sent to client;
Receive the verification information of receiving the award that client uploads, from the verification information of receiving the award that client uploads extraction receive the award code as the
Two receive the award code;
It is closed according to the code collection of effectively receiving the award of server storage and is received the award the effective of code to extracted in the verification information of receiving the award second
Property is verified, and result is verified;
Verification result is sent to client.
2. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that
It is described receive client upload user behavior information include:Receive the user name and user's login time that client uploads
Information;
Carrying out analysis according to the user behavior information of reception includes:According to currently received user behavior information and accumulative reception
User behavior information is analyzed, and login times distribution and/or the log duration distribution of user are obtained;
When analysis result meet it is default receive the award condition when, generate first and receive the award code, including:Meet when the login times of user are distributed
Preset condition and/or log duration distribution be when meeting preset condition, generates first and receives the award code.
3. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that
It is described receive client upload user behavior information include:Receive the user name and request letter of receiving the award that client uploads
Breath;
Carrying out analysis according to the user behavior information of reception includes:Judge whether the user meets described receive the award corresponding to request
Bonus requirements;
When analysis result meet it is default receive the award condition when, generate first and receive the award code, including:When whether the user meets described receive the award
When the corresponding bonus requirements of request, generates first and receive the award code.
4. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that the incentive message also wraps
Include identifying code, the character string that the identifying code is 4-8 or the picture validation code containing the positions 4-8 character string for identification.
5. the anti-cheat method of the user behavior verification according to any one of claim 1, which is characterized in that each
The first code of receiving the award that the default condition of receiving the award generates when meeting is different, and the described first code of receiving the award is scrambled.
6. the anti-cheat method of the user behavior verification according to any one of claim 1, which is characterized in that the life
Include at the first code of receiving the award:
Obtain user's secret key of active user;
The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination
Between stab and be encrypted, generate encrypted result;
First coding is carried out to encrypted result, first is obtained and receives the award code.
7. the anti-cheat method of user behavior verification according to claim 6, which is characterized in that the generation first is received the award
Code further include:
It is further the time stamp setting when needing to generate multiple receive the award yard in the unit interval of the corresponding minimum of timestamp
Flag, the genesis sequence number for code of receiving the award in the flag expression unit interval, and the timestamp that will be provided with flag is used
User's secret key is encrypted to obtain encrypted result.
8. the anti-cheat method of user behavior verification according to claim 5, which is characterized in that
Include by the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server:First is received the award time of code
The code collection of effectively receiving the award of stamp storage to server is closed;
To second extracted in verification information of receiving the award receive the award code validity carry out verification include:
It is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result;
It is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result;
The all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award are compared;
When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponding second receive the award code with
The timestamp corresponding first is received the award code matching, and verification result is that the second code of receiving the award is effective.
9. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that in verification information of receiving the award
Extraction second receive the award code carry out validation verification include:
All first during the code collection of effectively receiving the award that second receives the award code and server storage is closed codes of receiving the award are compared, and work as presence
With second receive the award code matched first receive the award yard when, verification result is that the second code of receiving the award is effective.
10. the anti-cheat method of user behavior verification according to claim 8 or claim 9, which is characterized in that receive the award code when second
After verification effectively, deletes in being closed from the code collection of effectively receiving the award and receive the award code and its related to the described second code matched first of receiving the award
Information.
11. the anti-cheat method of user behavior verification according to claim 8 or claim 9, which is characterized in that
Further include by the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server:By the life of the first identifying code
The code collection of effectively receiving the award that server is stored at time and the term of validity is closed;
To second extracted in verification information of receiving the award receive the award code carry out verification further include:It receives the award code matched the with second when existing
One when receiving the award yard, is further compared the verification time that second receives the award code with the generated time of matched first identifying code,
Judge described second receive the award code verification time whether be in the matched code of receiving the award the term of validity, then tested in the term of validity
Card result is that the second code of receiving the award is effective;Otherwise the second code of receiving the award is invalid.
12. the anti-cheat method of user behavior verification according to claim 8 or claim 9, which is characterized in that
Further include by the code collection conjunction of effectively receiving the award that the relevant information that first receives the award code is stored to server:First is received the award the phase of code
The genesis sequence that information receives the award code according to first is closed to store;
To second extracted in verification information of receiving the award receive the award code carry out verification further include:By second receive the award code with effectively receive the award code collection
Sequence the first relevant information for receiving the award code at first is compared in conjunction, when described second receive the award code and the sequence at first first
When code of receiving the award matches, verification result is that the second code of receiving the award is effective;Otherwise verification result is that the second code of receiving the award is invalid.
13. a kind of anti-cheat method of user behavior verification, which is characterized in that including:
To server upload user behavioural information;
The incentive message of server feedback is received, the incentive message is to be generated according to the analysis result of user behavior information, when
Analysis result meet it is default receive the award condition when, the information of receiving the award is received the award code including first;
Extraction first is received the award code from the incentive message, and generates verification information of receiving the award, and the verification information of receiving the award includes institute
First is stated to receive the award code;
Verification information of receiving the award is sent to server;
The verification result of server feedback is received, the verification result is generated by server according to verification information of receiving the award.
14. the anti-cheat method of user behavior verification according to claim 13, which is characterized in that the user behavior letter
Breath includes:User name and user's login time information or user name and solicited message of receiving the award.
15. the anti-cheat method of user behavior verification according to claim 1, which is characterized in that
The incentive message of the server feedback of reception further includes identifying code, the character string or contain useful that the identifying code is 4-8
In the picture validation code of the positions the 4-8 character string of identification;
The verification information of receiving the award includes described first receiving the award code and identifying code.
16. a kind of anti-cheating device of user behavior verification, which is characterized in that including:
First information receiving module, the user behavior information for receiving client upload;
Incentive message generation module generates the use for being analyzed according to the user behavior information of reception according to analysis result
The incentive message at family, wherein when analysis result meet it is default receive the award condition when, generate first and receive the award code, the first code of receiving the award is added
Enter the incentive message, and the code collection of effectively receiving the award that the relevant information that described first receives the award code is stored to server is closed;
It receives the award a yard memory module, is closed for storing code collection of effectively receiving the award;
First information sending module, for incentive message to be sent to client;
Second information receiving module, the verification information of receiving the award for receiving client upload, the verification of receiving the award uploaded from client
Extraction code of receiving the award is received the award code as second in information;
It receives the award a yard authentication module, for being closed according to the code collection of effectively receiving the award of server storage to being extracted in the verification information of receiving the award
The second validity for receiving the award code verified, be verified result;
Second information sending module, for verification result to be sent to client.
17. the anti-cheating device of user behavior verification according to claim 16, which is characterized in that the incentive message life
Include at module:
It receives the award condition judgment unit, for judging whether active user meets corresponding default item of receiving the award according to user behavior information
Part;
Receive the award a yard generation unit, for active user whether meet it is corresponding receive the award condition when generate code of receiving the award;
Incentive message generation unit, for according to condition judgment unit of receiving the award judgement result and yard generation unit generation of receiving the award
Code of receiving the award generates incentive message.
18. the anti-cheating device of user behavior verification according to claim 17, which is characterized in that the code generation of receiving the award
Unit generates code of receiving the award:
Obtain user's secret key of active user;
The generated time for receiving the award code according to first obtains the corresponding first timestamp for receiving the award code, when user's secret key pair is used in combination
Between stab and be encrypted, generate encrypted result;
First coding is carried out to the encrypted result of timestamp, first is obtained and receives the award code.
19. the anti-cheating device of user behavior verification according to claim 17, which is characterized in that
The code collection of effectively receiving the award that the relevant information that first receives the award code is stored to server is closed packet by the incentive message generation module
It includes:The code collection of effectively receiving the award that the timestamp that first receives the award code is stored to server is closed;
The validity that yard authentication module receives the award code to extracted in verification information of receiving the award second of receiving the award carries out verification:
It is decoded according to the second identifying code of inverse operation pair of the first coding, obtains decoding result;
It is decrypted according to user's secret key pair decoding result of active user, obtains decrypted result;
The all first timestamps for receiving the award code during decrypted result is closed with code collection of effectively receiving the award are compared;
When there is the timestamp for code of receiving the award with decrypted result matched first, judgement decrypted result corresponding second receive the award code with
Timestamp corresponding first is received the award code matching, and verification result is that the second code of receiving the award is effective.
20. a kind of anti-cheating device of user behavior verification, which is characterized in that including:
Third information sending module is used for server upload user behavioural information;
Third information receiving module, the incentive message for receiving server feedback, the incentive message are according to user behavior
The analysis result of information generates, when analysis result meet it is default receive the award condition when, the information of receiving the award is received the award code including first;
Message processing module, for from the incentive message extraction first receive the award code, and it includes described first receiving the award code to generate
Verification information of receiving the award;
4th information sending module, for sending verification information of receiving the award to server;
4th information receiving module, receives the verification result of server feedback, and the verification result is tested by server according to receiving the award
Information is demonstrate,proved to generate.
21. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the program
When being executed by processor, the anti-cheat method of the user behavior verification according to any one of claim 1-12 is realized.
22. a kind of computer equipment, which is characterized in that including memory, processor and store on a memory and can handle
The computer program run on device when the processor executes described program, is realized according to any one of claim 1-12 institutes
The anti-cheat method for the user behavior verification stated.
23. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the program
When being executed by processor, the anti-cheat method of the user behavior verification according to any one of claim 13-15 is realized.
24. a kind of computer program product, which is characterized in that when the instruction in the computer program product is executed by processor
When, realize the anti-cheat method of the user behavior verification according to any one of claim 13-15.
25. a kind of computer equipment, which is characterized in that including memory, processor and store on a memory and can handle
The computer program run on device when the processor executes described program, is realized according to any one of claim 13-15 institutes
The anti-cheat method for the user behavior verification stated.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810432546.2A CN108712408B (en) | 2018-05-08 | 2018-05-08 | Anti-cheating method and device for user behavior verification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810432546.2A CN108712408B (en) | 2018-05-08 | 2018-05-08 | Anti-cheating method and device for user behavior verification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108712408A true CN108712408A (en) | 2018-10-26 |
CN108712408B CN108712408B (en) | 2021-03-23 |
Family
ID=63868563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810432546.2A Active CN108712408B (en) | 2018-05-08 | 2018-05-08 | Anti-cheating method and device for user behavior verification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108712408B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109873921A (en) * | 2019-02-14 | 2019-06-11 | 初速度(苏州)科技有限公司 | A kind of transmission method of image temporal stamp, analysis method and device |
CN110933113A (en) * | 2019-12-30 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Block chain-based interactive behavior detection method, device, equipment and storage medium |
CN111105263A (en) * | 2018-10-29 | 2020-05-05 | 北京奇虎科技有限公司 | User identification method and device, electronic equipment and storage medium |
CN111144931A (en) * | 2019-12-10 | 2020-05-12 | 中国建设银行股份有限公司四川省分行 | System, method and related apparatus for providing customer benefit activities |
CN112261038A (en) * | 2020-10-20 | 2021-01-22 | 苏州莱锦机电自动化有限公司 | Big data acquisition method and system, computer equipment and storage medium thereof |
CN113743979A (en) * | 2021-07-26 | 2021-12-03 | 山东赤子城网络技术有限公司 | Virtual resource allocation method and device, computer equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667277A (en) * | 2008-09-05 | 2010-03-10 | 杨卫星 | Anti-counterfeiting lottery cashing method and anti-counterfeiting lottery cashing system |
CN102647461A (en) * | 2012-03-29 | 2012-08-22 | 奇智软件(北京)有限公司 | Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol) |
CN105208094A (en) * | 2015-08-21 | 2015-12-30 | 广东欧珀移动通信有限公司 | Message notification method and message notifications system |
US20160042474A1 (en) * | 2013-06-18 | 2016-02-11 | Sony Corporation | Information processing device, information processing method, and program |
CN105653944A (en) * | 2015-12-25 | 2016-06-08 | 北京奇虎科技有限公司 | Detection method and device of cheating behaviors |
CN105678530A (en) * | 2016-02-17 | 2016-06-15 | 中国建设银行股份有限公司 | Data processing method and system |
CN107563798A (en) * | 2017-08-22 | 2018-01-09 | 北京潘达互娱科技有限公司 | Prize-winning data processing method and device |
CN107888615A (en) * | 2017-12-01 | 2018-04-06 | 郑州云海信息技术有限公司 | A kind of safety certifying method of Node registry |
CN107968953A (en) * | 2017-11-28 | 2018-04-27 | 北京潘达互娱科技有限公司 | Anti- cheating user method and device |
-
2018
- 2018-05-08 CN CN201810432546.2A patent/CN108712408B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101667277A (en) * | 2008-09-05 | 2010-03-10 | 杨卫星 | Anti-counterfeiting lottery cashing method and anti-counterfeiting lottery cashing system |
CN102647461A (en) * | 2012-03-29 | 2012-08-22 | 奇智软件(北京)有限公司 | Communication method, server and terminal based on HTTP (Hypertext Transfer Protocol) |
US20160042474A1 (en) * | 2013-06-18 | 2016-02-11 | Sony Corporation | Information processing device, information processing method, and program |
CN105208094A (en) * | 2015-08-21 | 2015-12-30 | 广东欧珀移动通信有限公司 | Message notification method and message notifications system |
CN105653944A (en) * | 2015-12-25 | 2016-06-08 | 北京奇虎科技有限公司 | Detection method and device of cheating behaviors |
CN105678530A (en) * | 2016-02-17 | 2016-06-15 | 中国建设银行股份有限公司 | Data processing method and system |
CN107563798A (en) * | 2017-08-22 | 2018-01-09 | 北京潘达互娱科技有限公司 | Prize-winning data processing method and device |
CN107968953A (en) * | 2017-11-28 | 2018-04-27 | 北京潘达互娱科技有限公司 | Anti- cheating user method and device |
CN107888615A (en) * | 2017-12-01 | 2018-04-06 | 郑州云海信息技术有限公司 | A kind of safety certifying method of Node registry |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111105263A (en) * | 2018-10-29 | 2020-05-05 | 北京奇虎科技有限公司 | User identification method and device, electronic equipment and storage medium |
CN109873921A (en) * | 2019-02-14 | 2019-06-11 | 初速度(苏州)科技有限公司 | A kind of transmission method of image temporal stamp, analysis method and device |
CN109873921B (en) * | 2019-02-14 | 2023-04-07 | 魔门塔(苏州)科技有限公司 | Image timestamp transmission method, image timestamp analysis method and image timestamp analysis device |
CN111144931A (en) * | 2019-12-10 | 2020-05-12 | 中国建设银行股份有限公司四川省分行 | System, method and related apparatus for providing customer benefit activities |
CN110933113A (en) * | 2019-12-30 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Block chain-based interactive behavior detection method, device, equipment and storage medium |
CN110933113B (en) * | 2019-12-30 | 2021-04-09 | 腾讯科技(深圳)有限公司 | Block chain-based interactive behavior detection method, device, equipment and storage medium |
CN112261038A (en) * | 2020-10-20 | 2021-01-22 | 苏州莱锦机电自动化有限公司 | Big data acquisition method and system, computer equipment and storage medium thereof |
CN112261038B (en) * | 2020-10-20 | 2021-08-06 | 苏州莱锦机电自动化有限公司 | Big data acquisition method and system, computer equipment and storage medium thereof |
CN113743979A (en) * | 2021-07-26 | 2021-12-03 | 山东赤子城网络技术有限公司 | Virtual resource allocation method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108712408B (en) | 2021-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108712408A (en) | A kind of anti-cheat method and device of user behavior verification | |
CA3012822C (en) | Digital virtual currency transaction system and method having block chain between concerned parties | |
CN103095662B (en) | A kind of online transaction safety certifying method and online transaction security certification system | |
CA2711243C (en) | System and method for secure voting | |
CN1682204B (en) | Certification processing hardware, certification processing system and use management hardware | |
US20190066439A1 (en) | Encrypted electronic gaming ticket | |
US20070033102A1 (en) | Securely providing advertising subsidized computer usage | |
CN104660557B (en) | operation processing method and device | |
CN101689236B (en) | Secure login protocol | |
CN101681254B (en) | Method and apparatus for authenticating users in a network | |
CN105435451A (en) | Game cheating recognizing and processing method and device, system and server | |
EP1485843A2 (en) | System and method for performing secure remote real-time financial transactions over a public communicatons infrastructure with strong authentication | |
US10341308B2 (en) | Method for transmitting information from a first information provider to a second information provider via an information intermediary | |
CN103763104B (en) | A kind of method and system of dynamic authentication | |
CN107679149A (en) | A kind of data processing method and server | |
CN110677399A (en) | Authentication method and device | |
CN109978533A (en) | A kind of offline secure payment system and method that anti-two dimensional code is usurped | |
Krips et al. | On practical aspects of coercion-resistant remote voting systems | |
CN107248084A (en) | Ticketing service method for managing security and device | |
CN108174360A (en) | A kind of note transmission method and device, short-message verification method and device | |
CN104168117B (en) | A kind of speech digit endorsement method | |
JP2017023348A (en) | Game system, score processing program, management device for game system and score processing method | |
JP3216098U (en) | Advertising system in interactive environment | |
US20090013180A1 (en) | Method and Apparatus for Ensuring the Security of an Electronic Certificate Tool | |
CN107992525A (en) | The method and apparatus of ad click amount on a kind of statistics APP |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |