CN110022285A - It is a kind of for detecting the method, apparatus and computer equipment of user information - Google Patents

It is a kind of for detecting the method, apparatus and computer equipment of user information Download PDF

Info

Publication number
CN110022285A
CN110022285A CN201810015941.0A CN201810015941A CN110022285A CN 110022285 A CN110022285 A CN 110022285A CN 201810015941 A CN201810015941 A CN 201810015941A CN 110022285 A CN110022285 A CN 110022285A
Authority
CN
China
Prior art keywords
user
input control
data
monitoring
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810015941.0A
Other languages
Chinese (zh)
Other versions
CN110022285B (en
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201810015941.0A priority Critical patent/CN110022285B/en
Publication of CN110022285A publication Critical patent/CN110022285A/en
Application granted granted Critical
Publication of CN110022285B publication Critical patent/CN110022285B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3041Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is an input/output interface
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Power Engineering (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a kind of for detecting the method, apparatus and computer equipment of user information, which comprises establishes multiple monitoring interfaces respectively for each user's input control;Each monitoring interface is registered in application platform;The trigger event for monitoring each user's input control respectively using each monitoring interface, obtains the calling status information of the input data of each user's input control and multiple monitoring interfaces of each user's input control;Encrypt the input data and the calling status information, and the encrypted input data and the calling status information are sent to live streaming Platform Server, so that the live streaming Platform Server can detect user information according to the input data and the calling status information.

Description

It is a kind of for detecting the method, apparatus and computer equipment of user information
Technical field
The invention belongs to technical field of information processing more particularly to a kind of method, apparatus for detecting user information and Computer equipment.
Background technique
With the development of live streaming platform, various activities can also be unfolded therewith, such as main broadcaster can be flat in live streaming Watch certain time length in platform and the activity that can get free " fish ball " be provided, such as main broadcaster can beat reward spectators, allow spectators come into It robs the activities such as precious case and spectators can send the barrage spectators etc. all to full room.
And hacker can then write script to realize and rob " fish ball " automatically, rob precious case, while can also pass through the shape of transmission barrage Formula sends advertisement, although live streaming platform can carry out closing operation to the user for sending advertisement, in platform is broadcast live The user for sending advertisement barrage for the first time can not but close it, and hacker can take batch registration largely improper user, come It is continuous to replace user to send barrage advertisement, upset the order of live streaming platform.
Summary of the invention
The method that in view of the problems of the existing technology, the embodiment of the invention provides a kind of for detecting user information, Device and computer equipment send advertisement bullet in the presence of a large amount of improper user in live streaming platform in the prior art for solving The case where curtain, can not but close the improper user for sending barrage advertisement for the first time, the order that platform is broadcast live is caused to obtain not To the technical issues of guarantee.
The present invention provides a kind of method for detecting user information, which comprises
Multiple monitoring interfaces are established respectively for each user's input control;
Each monitoring interface is registered in application platform;
The trigger event for monitoring each user's input control respectively using each monitoring interface, obtains each user's input control Input data and each user's input control multiple monitoring interfaces calling status information;
Obtain the first random data;
The first random data current time stamp is spliced;
It calls the Message Digest 5 MD5 to calculate spliced data, obtains the first private key data;
Based on first private key data, calls and generate pairing key interface the first public key data of generation;
Shared code key data are generated based on the second public key data that first public key data and the server generate;
The input data and the calling status information are encrypted using the shared code key data, and will encryption The input data and the calling status information afterwards is sent to live streaming Platform Server, for the live streaming Platform Server User information can be detected according to the input data and the calling status information.
In above scheme, described establish respectively for each user's input control monitors interface, comprising:
A monitoring function is constructed respectively for each user's input control, is constructed in each monitoring function corresponding Monitor interface;
The type of each user's input control is obtained, and the type of each user's input control is arranged corresponding It monitors in function.
It is described that each monitoring interface is registered in application platform in above scheme, comprising:
It is that each user's input control defines a variable in the application platform;
By the monitoring function setup of each user's input control in corresponding variable.
In above scheme, user's input control includes: user's name input control, user password input control, uses Family password confirming input control, subscriber mailbox input control and subscriber phone number input control.
The present invention also provides a kind of for detecting the device of user information, and described device includes:
Unit is established, for establishing multiple monitoring interfaces respectively for each user's input control;
Registering unit, for each monitoring interface to be registered in application platform;
Monitoring unit is obtained every for being monitored the trigger event of each user's input control respectively using each monitoring interface The calling status information of multiple monitoring interfaces of the input data of a user's input control and each user's input control;
Encryption unit, for obtaining the first random data;
The first random data current time stamp is spliced;
It calls the Message Digest 5 MD5 to calculate spliced data, obtains the first private key data;
Based on first private key data, calls and generate pairing key interface the first public key data of generation;
Shared code key data are generated based on the second public key data that first public key data and the server generate;
The input data and the calling status information are encrypted using the shared code key data;
Transmission unit, for the encrypted input data and the calling status information to be sent to live streaming platform clothes Business device, so that the live streaming Platform Server can carry out user information according to the input data and the calling status information Detection.
In above scheme, the unit of establishing is used for:
A monitoring function is constructed respectively for each user's input control, and each monitoring function includes three monitoring interfaces;
The type of each user's input control is obtained, and the type of each user's input control is arranged corresponding It monitors in function.
In above scheme, the registering unit is used for:
It is that each user's input control defines a variable in the application platform;
By the monitoring function setup of each user's input control in corresponding variable.
In above scheme, user's input control includes: user's name input control, user password input control, uses Family password confirming input control, subscriber mailbox input control and subscriber phone number input control.
The present invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, and the program is processed Device is able to carry out when executing such as any of the above-described method.
The present invention also provides a kind of for detecting the computer equipment of user information, comprising:
At least one processor;And
At least one processor being connect with the processor communication, wherein
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to refer to Order is able to carry out such as any of the above-described method.
The embodiment of the invention provides a kind of for detecting the method, apparatus and computer equipment of user information, the side Method includes: to establish multiple monitoring interfaces respectively for each user's input control;Each monitoring interface is registered in application platform;Benefit The trigger event for monitoring each user's input control respectively with each monitoring interface, obtains the input data of each user's input control And the calling status information of multiple monitoring interfaces of each user's input control;Obtain the first random data;To described first Random data current time stamp is spliced;It calls the Message Digest 5 MD5 to calculate spliced data, obtains First private key data;Based on first private key data, calls and generate pairing key interface the first public key data of generation;Based on institute The second public key data for stating the first public key data and server generation generates shared code key data;Utilize the shared code key Data encrypt the input data and the calling status information, and by the encrypted input data and the tune It is sent to live streaming Platform Server with status information, so that the live streaming Platform Server can be according to the input data and described Status information is called to detect user information;In this way, when live streaming Platform Server is receiving each user's input control In input data after, however, it is determined that the personal account data registered are not in live streaming platform in advance by the data of user's input and user When consistent, it is determined that the user is improper user;If based on call status information, determine multiple monitoring interfaces not by When all calling, then improper user is also determined that the user is, accordingly even when user is the user for sending barrage advertisement for the first time, only When user's input control being wanted to have trigger event generation, so that it may according to the input data of user and the multiple tune for monitoring interface Detect whether the user is non-normal users with status information, however, it is determined that be that non-normal users then close it, it is ensured that live streaming The order of platform.
Detailed description of the invention
Fig. 1 is the method flow schematic diagram of detection user information provided in an embodiment of the present invention;
Fig. 2 is the apparatus structure schematic diagram of detection user information provided in an embodiment of the present invention;
Fig. 3 is the structural schematic diagram of the computer equipment of detection user information provided in an embodiment of the present invention.
Specific embodiment
In order to solve the presence of the case where a large amount of improper user sends advertisement barrage in platform is broadcast live in the prior art, But the improper user for sending barrage advertisement for the first time can not be closed, the skill for causing the order that platform is broadcast live that cannot ensure Art problem, the present invention provides a kind of for detecting the method, apparatus and computer equipment of user information, which comprises Multiple monitoring interfaces are established respectively for each user's input control;Each monitoring interface is registered in application platform;Utilize each prison It listens interface to monitor the trigger event of each user's input control respectively, obtains the input data of each user's input control and every The calling status information of multiple monitoring interfaces of a user's input control;Obtain the first random data;To first random number Spliced according to current time stamp;It calls the Message Digest 5 MD5 to calculate spliced data, it is private to obtain first Key data;Based on first private key data, calls and generate pairing key interface the first public key data of generation;Based on described first The second public key data that public key data and the server generate generates shared code key data;Utilize the shared code key data pair The input data and the calling status information are encrypted, and by the encrypted input data and the calling state Information is sent to live streaming Platform Server, so that the live streaming Platform Server can be according to the input data and the calling shape State information detects user information.
Technical solution of the present invention is described in further detail below by drawings and the specific embodiments.
Embodiment one
The present embodiment provides a kind of methods for detecting user information, apply in the application platform of client, such as Android platform, as shown in Figure 1, which comprises
S101 establishes multiple monitoring interfaces for each user's input control respectively;
In this step, user's input control includes: user's name input control, user password input control, user Password confirming input control, subscriber mailbox input control and subscriber phone number input control.It is stepped on if it is normal users When platform is broadcast live in land, the information such as title, password of input should be consistent with information when registration, then can pass through Each user's input control is monitored to detect whether user is improper user.
Accordingly, it is desirable to establish multiple monitoring interfaces respectively for each user's input control, in this step, each user is defeated Entering control includes three monitoring interfaces, is respectively as follows:
Monitoring interface before the change of user's input control text: beforeTextChanged;
Monitoring interface when user's input control text changes: onTextChanged;
Monitoring interface after the change of user's input control text: afterTextChanged.
Specifically, a monitoring function MyTextWatcher is constructed respectively for each user's input control, obtain each use The type of family input control, and the type of each user's input control is arranged in corresponding monitoring function.It can be Above three is constructed in the function monitors interface.
Code is accomplished by
public MyTextWatcher(int etype){
This.etype=etype;
}
The etype is the type of user's input control, for example is currently to establish to supervise for user's name user's input control Function is listened, then the type of user's name user's input control is inserted the position etype, the prison of other users input control The building process for listening function is also similarly to operate, and details are not described herein.
In addition, also interface need to be monitored to above three in monitoring function defines a variable respectively, and variable is carried out Initialization, each variable are used to identify the corresponding calling status information for monitoring interface, and when not being called to, variate-value is False, the variable after initialization are as follows:
G_beforeTextChangedFlag=false;
G_afterTextChangedFlag=false;
G_onTextChangedFlag=false;
Wherein, the monitoring that the g_beforeTextChangedFlag corresponds to before user's input control text changes connects Mouthful;The g_onTextChangedFlag corresponds to monitoring interface when user's input control text changes;The g_ Monitoring interface after the change of afterTextChangedFlag user's input control text.
Each monitoring interface is registered in application platform by S102;
After multiple monitoring interfaces of each user's input control establish, each monitoring interface is registered to application platform In, it is implemented as follows:
It is that each user's input control defines a variable in the application platform;By the prison of each user's input control Listen function setup in corresponding variable.
Such as user's name input control, a variable EditText is defined for user's name input control username;
If the monitoring function MyTextWatcher1 of user's name input control, by the prison of the user's name input control Function MyTextWatcher1 is listened to be arranged in variable EditText username, code is accomplished by
username.addTextChangedListener(new MyTextWatcher1());
For user password input control, a variable is defined for user password input control EditText password;
If the monitoring function MyTextWatcher2 of user password input control, by the prison of the user password input control Function MyTextWatcher1 is listened to be arranged in variable EditText password2, code is accomplished by
password.addTextChangedListener(new MyTextWatcher2());
If the monitoring function MyTextWatcher3 of user password confirmation input control, by the user password confirmation input The monitoring function MyTextWatcher3 of control is arranged in variable EditText password2, and code is accomplished by
password2.addTextChangedListener(new MyTextWatcher3());
If the monitoring function MyTextWatcher4 of subscriber mailbox input control, by the user password confirmation input control Monitoring function MyTextWatcher4 be arranged in variable EditText email, code is accomplished by
email.addTextChangedListener(new MyTextWatcher4());
This completes each registrations for monitoring interface.
S103 is monitored the trigger event of each user's input control respectively using each monitoring interface, it is defeated to obtain each user Enter the calling status information of the input data of control and multiple monitoring interfaces of each user's input control;
After each monitoring interface is completed to register, the triggering thing of each user's input control is monitored respectively using each monitoring interface Part takes the input data of each user's input control and the calling state of multiple monitoring interfaces of each user's input control to believe Breath.
For example, if corresponding trigger event is just incoming event when having user to input information in user's input control, this When will monitor accordingly interface by user's input control to monitor the incoming event, it is specific as follows:
Monitoring interface first when incoming event occurs, before user's input control text will be called to change BeforeTextChanged, this variations per hour g_beforeTextChangedFlag=true;Code is accomplished by
@Override
public void beforeTextChanged(CharSequence s,int start,int count,int after){
G_beforeTextChangedFlag=true;
}
The letter monitored interface onTextChanged and obtain user's input when then being changed by user's input control text Breath, is implemented as follows:
@Override
public void onTextChanged(CharSequence s,int start,int before,int count){
G_onTextChangedFlag=true;
String text=String.valueOf (s);
G_input_text=text;
}
It is specific that String interface valueOf is called to obtain the character string text of input, and got in this interface When the content of money user input, the character string of input is then stored in pre-set global variable g_input_text.
Terminate this finally by the monitoring interface afterTextChanged after calling user's input control text to change It monitors, code is accomplished by
@Override
public void afterTextChanged(Editable s)
G_afterTextChangedFlag=true;
}
S104 obtains the first random data;The first random data current time stamp is spliced;Disappear described in calling Breath digest algorithm MD5 calculates spliced data, obtains the first private key data;Based on first private key data, adjust The first public key data is generated with pairing key interface is generated;Second generated based on first public key data and the server Public key data generates shared code key data;Using the shared code key data to the input data and the calling status information It is encrypted;
After getting the data and each calling status information for monitoring interface that user inputs in user's input control, add The close input data and the calling status information, specific cipher mode are as follows:
Function Randdata=rand () is called to obtain the first random data;
The first random data current time stamp is spliced;Here it is possible to be spelled according to a variety of connecting methods It connects, for example is spliced in the way of the first random data+current time stamp.
Call the Message Digest 5 ClientPrivatekey=Md5.Create (Randdata+TimeStamp) Spliced data are calculated, the first private key data is obtained, first private key is calculated MD5 value;It is described Randdata is the first random data, and the TimeStamp is current time stamp.
Based on first private key data, calls and generate pairing key interface ClientPublickey= RSA.CreatePair(ClientPrivatekey);Generate the first public key data;Client just generates a pair of of public key in this way And private key data.
Similarly, server generates the second public key data and the second private key data according to above-mentioned same method, herein not It repeats again.
The second public key data generated again based on first public key data and the server generates shared code key data; Specifically, client and server can intercourse public key information, then public to described first using rivest, shamir, adelman RSA Key data and second public key data are encrypted, and the shared code key data are generated.
Here, client using function ShareKey1=RSA.CreateShareKey (ServerPublickey, ClientPrivatekey);Generate the first shared code key data ShareKey1.
Server then utilize function ShareKey2=RSA.CreateShareKey (ClientPublickey, ServerPrivatekey);Generate the second shared code key data ShareKey2.
The first shared code key data ShareKey1 should be phase with the described second shared code key data ShareKey2 With.
Using the described first shared code key data or the second shared code key data to the input data and the calling shape State information is encrypted, and the present embodiment is to be encrypted using des encryption algorithm to input data and calling status information, real It is now as follows:
EncryptData=DES.encrypt (g_beforeTextChangedFlag+
g_afterTextChangedFlag+g_onTextChangedFlag+text,ShareKey);
The encrypted input data and the calling status information are sent to live streaming Platform Server by S105, with User information can be detected according to the input data and the calling status information for the live streaming Platform Server.
After the completion of encryption, the encrypted input data and the calling status information are sent to live streaming platform service Device, so that the live streaming Platform Server can examine user information according to the input data and the calling status information It surveys.
Specifically, after server receives data, data are decrypted;When server is not received by each user's input Input data in control, i.e. data are sky, then can directly determine the improper user of the user;Or receiving each use After input data in the input control of family, however, it is determined that input data and the pre-registered information of user are inconsistent, it is determined that the use Family is improper user;If the input data received (is not received by the number of all user's input controls entirely According to), it is determined that the user is improper user;In addition, if each monitoring interface of each user's input control is not adjusted all With, it is determined that the user is also improper user, and no matter whether improper user is to send advertisement barrage for the first time in this way, is ok Detect whether the user is non-normal users, however, it is determined that be that non-normal users then close it, it is ensured that the order of platform is broadcast live.
Embodiment two
The present embodiment provides a kind of for detecting the device of user information, as shown in Fig. 2, described device includes: to establish list Member 21, registering unit 22, monitoring unit 23, encryption unit 24 and transmission unit 25;Wherein,
Unit 21 is established for establishing multiple monitoring interfaces respectively for each user's input control;Wherein, the user is defeated Entering control includes: that user's name input control, user password input control, user password confirmation input control, subscriber mailbox are defeated Enter control and subscriber phone number input control.It is the title of input, close when log in live streaming platform if it is normal users The information such as code should be consistent with information when registration, then use can be detected by monitoring each user's input control Whether family is improper user.
It establishes unit 21 and needs to establish multiple monitoring interfaces respectively for each user's input control, in this step, Mei Geyong Family input control includes three monitoring interfaces, is respectively as follows:
Monitoring interface before the change of user's input control text: beforeTextChanged;
Monitoring interface when user's input control text changes: onTextChanged;
Monitoring interface after the change of user's input control text: afterTextChanged.
Specifically, establishing unit 21 is that each user's input control constructs a monitoring function MyTextWatcher respectively, The type of each user's input control is obtained, and the type of each user's input control is arranged in corresponding monitoring function In.Above three can be constructed in the function monitors interface.
Code is accomplished by
public MyTextWatcher(int etype){
This.etype=etype;
}
The etype is the type of user's input control, for example is currently to establish to supervise for user's name user's input control Function is listened, then the type of user's name user's input control is inserted the position etype, the prison of other users input control The building process for listening function is also similarly to operate, and details are not described herein.
A variable is defined respectively in addition, establishing unit 21 and need to also monitor interface to above three in monitoring function, and Variable is initialized, each variable is used to identify the corresponding calling status information for monitoring interface, when not being called to, becomes Magnitude is false, and the variable after initialization is as follows:
G_beforeTextChangedFlag=false;
G_afterTextChangedFlag=false;
G_onTextChangedFlag=false;
Wherein, the monitoring that the g_beforeTextChangedFlag corresponds to before user's input control text changes connects Mouthful;The g_onTextChangedFlag corresponds to monitoring interface when user's input control text changes;The g_ Monitoring interface after the change of afterTextChangedFlag user's input control text.
After multiple monitoring interfaces of each user's input control establish, registering unit 22 is used for each monitoring interface It is registered in application platform, is implemented as follows:
It is that each user's input control defines a variable in the application platform;By the prison of each user's input control Listen function setup in corresponding variable.
Such as user's name input control, a variable EditText is defined for user's name input control username;
If the monitoring function MyTextWatcher1 of user's name input control, by the prison of the user's name input control Function MyTextWatcher1 is listened to be arranged in variable EditText username, code is accomplished by
username.addTextChangedListener(new MyTextWatcher1());
For user password input control, a variable is defined for user password input control EditText password;
If the monitoring function MyTextWatcher2 of user password input control, by the prison of the user password input control Function MyTextWatcher1 is listened to be arranged in variable EditText password2, code is accomplished by
password.addTextChangedListener(new MyTextWatcher2());
If the monitoring function MyTextWatcher3 of user password confirmation input control, by the user password confirmation input The monitoring function MyTextWatcher3 of control is arranged in variable EditText password2, and code is accomplished by
password2.addTextChangedListener(new MyTextWatcher3());
If the monitoring function MyTextWatcher4 of subscriber mailbox input control, by the user password confirmation input control Monitoring function MyTextWatcher4 be arranged in variable EditText email, code is accomplished by
email.addTextChangedListener(new MyTextWatcher4());
This completes each registrations for monitoring interface.
After each monitoring interface is completed to register, monitoring unit 23 is used to monitor each user respectively using each monitoring interface defeated The trigger event for entering control obtains the input data of each user's input control and multiple monitorings of each user's input control The calling status information of interface.
For example, if corresponding trigger event is just incoming event when having user to input information in user's input control, this When monitoring unit 23 will monitor accordingly interface by user's input control to monitor the incoming event, it is specific as follows:
Monitoring interface first when incoming event occurs, before user's input control text will be called to change BeforeTextChanged, this variations per hour g_beforeTextChangedFlag=true;Code is accomplished by
@Override
public void beforeTextChanged(CharSequence s,int start,int count,int after){
G_beforeTextChangedFlag=true;
}
Then monitoring interface onTextChanged when monitoring unit 23 is changed by user's input control text, which is obtained, to be used The information of family input, is implemented as follows:
@Override
public void onTextChanged(CharSequence s,int start,int before,int count){
G_onTextChangedFlag=true;
String text=String.valueOf (s);
G_input_text=text;
}
Monitoring unit 23 specifically calls String interface valueOf to obtain the character string text of input, and connects herein The content when money user input is got in mouthful, the character string of input is then stored in pre-set global variable g_input_ In text.
Terminate this finally by the monitoring interface afterTextChanged after calling user's input control text to change It monitors, code is accomplished by
@Override
public void afterTextChanged(Editable s)
G_afterTextChangedFlag=true;
}
After getting the data and each calling status information for monitoring interface that user inputs in user's input control, add Close unit 24 is for encrypting the input data and the calling status information;, specific cipher mode is as follows:
Encryption unit 24 calls function Randdata=rand () to obtain the first random data;
The first random data current time stamp is spliced;Here it is possible to be spelled according to a variety of connecting methods It connects, for example is spliced in the way of the first random data+current time stamp.
Call the Message Digest 5 ClientPrivatekey=Md5.Create (Randdata+TimeStamp) Spliced data are calculated, the first private key data is obtained, first private key is calculated MD5 value.
Based on first private key data, calls and generate pairing key interface ClientPublickey= RSA.CreatePair(ClientPrivatekey);Generate the first public key data;Client just generates a pair of of public key in this way And private key data.
Similarly, server generates the second public key data and the second private key data according to above-mentioned same method, herein not It repeats again.
The second public key data that encryption unit 24 is generated based on first public key data and the server again generates altogether Enjoy code key data;Specifically, client and server can intercourse public key information, then utilize rivest, shamir, adelman RSA First public key data and second public key data are encrypted, the shared code key data are generated.
The utilization of encryption unit 24 function ShareKey1=RSA.CreateShareKey (ServerPublickey, ClientPrivatekey);Generate the first shared code key data ShareKey1.
Server then utilize function ShareKey2=RSA.CreateShareKey (ClientPublickey, ServerPrivatekey);Generate the second shared code key data ShareKey2.
The first shared code key data ShareKey1 should be phase with the described second shared code key data ShareKey2 With.
Encryption unit 24 using the described first shared code key data or the second shared code key data to the input data and The calling status information is encrypted, the present embodiment be using des encryption algorithm to input data and call status information into Row encryption, it is accomplished by
EncryptData=DES.encrypt (g_beforeTextChangedFlag+
g_afterTextChangedFlag+g_onTextChangedFlag+text,ShareKey);
After the completion of encryption, transmission unit 25 is used to send the encrypted input data and the calling status information To live streaming Platform Server, so that the live streaming Platform Server can be according to the input data and the calling status information pair User information is detected.
Specifically, after server receives data, data are decrypted;When server is not received by each user's input Input data in control, i.e. data are sky, then can directly determine the improper user of the user;Or receiving each use After input data in the input control of family, however, it is determined that input data and the pre-registered information of user are inconsistent, it is determined that the use Family is improper user;If the input data received (is not received by the number of all user's input controls entirely According to), it is determined that the user is improper user;In addition, if each monitoring interface of each user's input control is not adjusted all With, it is determined that the user is also improper user, and no matter whether improper user is to send advertisement barrage for the first time in this way, is ok Detect whether the user is non-normal users, however, it is determined that be that non-normal users then close it, it is ensured that the order of platform is broadcast live.
Embodiment three
The present embodiment also provides a kind of computer equipment for detecting user information, as shown in figure 3, the computer equipment packet It includes: radio frequency (Radio Frequency, RF) circuit 310, memory 320, input unit 330, display unit 340, voicefrequency circuit 350, the components such as WiFi module 360, processor 370 and power supply 380.It will be understood by those skilled in the art that being shown in Fig. 3 Computer equipment structure do not constitute the restriction to computer equipment, may include than illustrating more or fewer components, or Person combines certain components or different component layouts.
It is specifically introduced below with reference to each component parts of the Fig. 3 to computer equipment:
RF circuit 310 can be used for sending and receiving for signal, particularly, after the downlink information of base station is received, to processing The processing of device 370.In general, RF circuit 310 includes but is not limited at least one amplifier, transceiver, coupler, low noise amplification Device (Low Noise Amplifier, LNA), duplexer etc..
Memory 320 can be used for storing software program and module, and processor 370 is stored in memory 320 by operation Software program and module, thereby executing the various function application and data processing of computer equipment.Memory 320 can be led It to include storing program area and storage data area, wherein storing program area can be needed for storage program area, at least one function Application program etc.;Storage data area, which can be stored, uses created data etc. according to computer equipment.In addition, memory 320 May include high-speed random access memory, can also include nonvolatile memory, a for example, at least disk memory, Flush memory device or other volatile solid-state parts.
Input unit 330 can be used for receiving the number or character information of input, and generate the user with computer equipment Setting and the related key signals input of function control.Specifically, input unit 330 may include keyboard 331 and other inputs Equipment 332.Keyboard 331 collects the input operation of user on it, and drives corresponding connection according to preset formula Device.Keyboard 331 gives processor 370 after collecting output information again.In addition to keyboard 331, input unit 330 can also include Other input equipments 332.Specifically, other input equipments 332 can include but is not limited to touch panel, function key (such as sound Measure control button, switch key etc.), trace ball, mouse, one of operating stick etc. or a variety of.
Display unit 340 can be used for showing information input by user or the information and computer equipment that are supplied to user Various menus.Display unit 340 may include display panel 341, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) To configure display panel 341.Further, keyboard 331 can cover display panel 341, when keyboard 331 detect it is on it or attached After close touch operation, processor 370 is sent to determine the type of touch event, is followed by subsequent processing device 370 according to incoming event Type corresponding visual output is provided on display panel 341.Although keyboard 331 and display panel 341 are conducts in Fig. 3 Two independent components realize the input and input function of computer equipment, but in some embodiments it is possible to by keyboard 331 is integrated with display panel 341 and that realizes computer equipment output and input function.
Voicefrequency circuit 350, loudspeaker 351, microphone 352 can provide the audio interface between user and computer equipment. Electric signal after the audio data received conversion can be transferred to loudspeaker 351, be converted by loudspeaker 351 by voicefrequency circuit 350 For voice signal output;
WiFi belongs to short range wireless transmission technology, and computer equipment can help user to receive and dispatch by WiFi module 360 Email, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 3 WiFi module 360 is shown, but it is understood that, and it is not belonging to must be configured into for computer equipment, it completely can root It is omitted within the scope of not changing the essence of the invention according to needs.
Processor 370 is the control centre of computer equipment, utilizes various interfaces and the entire computer equipment of connection Various pieces, by running or execute the software program and/or module that are stored in memory 320, and call and be stored in Data in memory 320 execute the various functions and processing data of computer equipment, to carry out to computer equipment whole Monitoring.Optionally, processor 370 may include one or more processing units;Preferably, processor 370 can be integrated using processing Device, wherein the main processing operation system of application processor, user interface and application program etc..
Computer equipment further includes the power supply 380 (such as power supply adaptor) powered to all parts, it is preferred that power supply can With logically contiguous by power-supply management system and processor 370.
Method, apparatus and computer equipment energy bring provided in an embodiment of the present invention for detecting user information is beneficial Effect is at least:
The embodiment of the invention provides a kind of for detecting the method, apparatus and computer equipment of user information, the side Method includes: to establish multiple monitoring interfaces respectively for each user's input control;Each monitoring interface is registered in application platform;Benefit The trigger event for monitoring each user's input control respectively with each monitoring interface, obtains the input data of each user's input control And the calling status information of multiple monitoring interfaces of each user's input control;Obtain the first random data;To described first Random data current time stamp is spliced;It calls the Message Digest 5 MD5 to calculate spliced data, obtains First private key data;Based on first private key data, calls and generate pairing key interface the first public key data of generation;Based on institute The second public key data for stating the first public key data and server generation generates shared code key data;Utilize the shared code key Data encrypt the input data and the calling status information, and by the encrypted input data and the tune It is sent to live streaming Platform Server with status information, so that the live streaming Platform Server can be according to the input data and described Status information is called to detect user information;In this way, when server be not received by it is defeated in each user's input control Enter data, then can directly determine the improper user of the user;Or receiving the input number in each user's input control According to rear, however, it is determined that input data and the pre-registered information of user are inconsistent, it is determined that the user is improper user;If It is not received by the data that all user's input controls report, it is determined that the user is improper user;In addition, if each use Multiple monitoring interfaces of family input control are not called all, it is determined that the user is also improper user, no matter non-in this way Whether normal users are to send advertisement barrage for the first time, can detect whether the user is non-normal users, however, it is determined that right and wrong Normal users then close it, it is ensured that the order of platform is broadcast live.
Algorithm and display are not inherently related to any particular computer, virtual system, or other device provided herein. Various general-purpose systems can also be used together with teachings based herein.As described above, it constructs required by this kind of system Structure be obvious.In addition, the present invention is also not directed to any particular programming language.It should be understood that can use various Programming language realizes summary of the invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the instructions provided here, numerous specific details are set forth.It is to be appreciated, however, that implementation of the invention Example can be practiced without these specific details.In some instances, well known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this specification.
Similarly, it should be understood that in order to simplify the disclosure and help to understand one or more of the various inventive aspects, Above in the description of exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the disclosed method should not be interpreted as reflecting the following intention: i.e. required to protect Shield the present invention claims features more more than feature expressly recited in each claim.More precisely, as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following specific embodiment are expressly incorporated in the specific embodiment, wherein each claim itself All as a separate embodiment of the present invention.
Those skilled in the art will understand that can be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more devices different from this embodiment.It can be the module or list in embodiment Member or component are combined into a module or unit or component, and furthermore they can be divided into multiple submodule or subelement or Sub-component.Other than such feature and/or at least some of process or unit exclude each other, it can use any Combination is to all features disclosed in this specification (including adjoint claim, abstract and attached drawing) and so disclosed All process or units of what method or apparatus are combined.Unless expressly stated otherwise, this specification is (including adjoint power Benefit require, abstract and attached drawing) disclosed in each feature can carry out generation with an alternative feature that provides the same, equivalent, or similar purpose It replaces.
In addition, it will be appreciated by those of skill in the art that although some embodiments in this include institute in other embodiments Including certain features rather than other feature, but the combination of the feature of different embodiment means in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment claimed it is any it One can in any combination mode come using.
Various component embodiments of the invention can be implemented in hardware, or to run on one or more processors Software module realize, or be implemented in a combination thereof.It will be understood by those of skill in the art that can be used in practice Microprocessor or digital signal processor (DSP, Digital Signal Processing) Lai Shixian are implemented according to the present invention The some or all functions of the gateway of example, proxy server, some or all components in system.The present invention can also be real Now for for executing some or all device or device programs of method as described herein (for example, computer journey Sequence and computer program product).It is such to realize that program of the invention can store on computer readable storage medium, or It may be in the form of one or more signals.Such signal can be downloaded from an internet website to obtain, or carry It provides, or is provided in any other form on body signal;The program is performed the steps of when being executed by processor as each use Family input control establishes multiple monitoring interfaces respectively;Each monitoring interface is registered in application platform;Utilize each monitoring interface point The trigger event for not monitoring each user's input control, input data and each user for obtaining each user's input control are defeated Enter the calling status information of multiple monitoring interfaces of control;Obtain the first random data;When current to first random data Between stab and spliced;It calls the Message Digest 5 MD5 to calculate spliced data, obtains the first private key data; Based on first private key data, calls and generate pairing key interface the first public key data of generation;Based on the first public key number Shared code key data are generated according to the second public key data generated with the server;Using the shared code key data to described defeated Enter data and the calling status information is encrypted, and the encrypted input data and the calling status information are sent out It send to live streaming Platform Server, so that the live streaming Platform Server can be according to the input data and the calling status information User information is detected.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and ability Field technique personnel can be designed alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between parentheses should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" located in front of the element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of several different elements and being come by means of properly programmed computer real It is existing.In the unit claims listing several devices, several in these devices can be through the same hardware branch To embody.The use of word first, second, and third does not indicate any sequence.These words can be explained and be run after fame Claim.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention, it is all Made any modifications, equivalent replacements, and improvements etc. within the spirit and principles in the present invention, should be included in protection of the invention Within the scope of.

Claims (10)

1. a kind of method for detecting user information, which is characterized in that the described method includes:
Multiple monitoring interfaces are established respectively for each user's input control;
Each monitoring interface is registered in application platform;
The trigger event for monitoring each user's input control respectively using each monitoring interface, obtains the defeated of each user's input control Enter the calling status information of multiple monitoring interfaces of data and each user's input control;
Obtain the first random data;
The first random data current time stamp is spliced;
It calls the Message Digest 5 MD5 to calculate spliced data, obtains the first private key data;
Based on first private key data, calls and generate pairing key interface the first public key data of generation;
Shared code key data are generated based on the second public key data that first public key data and the server generate;
The input data and the calling status information are encrypted using the shared code key data, and will be encrypted The input data and the calling status information are sent to live streaming Platform Server, for the live streaming Platform Server energy root User information is detected according to the input data and the calling status information.
2. the method as described in claim 1, which is characterized in that it is described for each user's input control establishes respectively monitor connect Mouthful, comprising:
A monitoring function is constructed respectively for each user's input control, and corresponding monitor is constructed in each monitoring function Interface;
The type of each user's input control is obtained, and the type of each user's input control is arranged in corresponding monitoring In function.
3. method according to claim 2, which is characterized in that described that each monitoring interface is registered in application platform, comprising:
It is that each user's input control defines a variable in the application platform;
By the monitoring function setup of each user's input control in corresponding variable.
4. the method as described in claim 1, which is characterized in that user's input control include: user's name input control, User password input control, user password confirmation input control, subscriber mailbox input control and subscriber phone number input control.
5. a kind of for detecting the device of user information, which is characterized in that described device includes:
Unit is established, for establishing multiple monitoring interfaces respectively for each user's input control;
Registering unit, for each monitoring interface to be registered in application platform;
Monitoring unit obtains each use for monitoring the trigger event of each user's input control respectively using each monitoring interface The calling status information of multiple monitoring interfaces of the input data of family input control and each user's input control;
Encryption unit, for obtaining the first random data;
The first random data current time stamp is spliced;
It calls the Message Digest 5 MD5 to calculate spliced data, obtains the first private key data;
Based on first private key data, calls and generate pairing key interface the first public key data of generation;
Shared code key data are generated based on the second public key data that first public key data and the server generate;
The input data and the calling status information are encrypted using the shared code key data;
Transmission unit, for the encrypted input data and the calling status information to be sent to live streaming platform service Device, so that the live streaming Platform Server can examine user information according to the input data and the calling status information It surveys.
6. device as claimed in claim 5, which is characterized in that the unit of establishing is used for:
A monitoring function is constructed respectively for each user's input control, and each monitoring function includes three monitoring interfaces;
The type of each user's input control is obtained, and the type of each user's input control is arranged in corresponding monitoring In function.
7. device as claimed in claim 5, which is characterized in that the registering unit is used for:
It is that each user's input control defines a variable in the application platform;
By the monitoring function setup of each user's input control in corresponding variable.
8. device as claimed in claim 5, which is characterized in that user's input control include: user's name input control, User password input control, user password confirmation input control, subscriber mailbox input control and subscriber phone number input control.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The method as described in Claims 1-4 is any is able to carry out when row.
10. a kind of for detecting the computer equipment of user information characterized by comprising
At least one processor;And
At least one processor being connect with the processor communication, wherein
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in Claims 1-4 is any.
CN201810015941.0A 2018-01-08 2018-01-08 Method and device for detecting user information and computer equipment Active CN110022285B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810015941.0A CN110022285B (en) 2018-01-08 2018-01-08 Method and device for detecting user information and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810015941.0A CN110022285B (en) 2018-01-08 2018-01-08 Method and device for detecting user information and computer equipment

Publications (2)

Publication Number Publication Date
CN110022285A true CN110022285A (en) 2019-07-16
CN110022285B CN110022285B (en) 2021-09-07

Family

ID=67187537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810015941.0A Active CN110022285B (en) 2018-01-08 2018-01-08 Method and device for detecting user information and computer equipment

Country Status (1)

Country Link
CN (1) CN110022285B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259919A (en) * 2013-02-01 2013-08-21 广州网视通信息科技有限公司 Method for overlapping scrolling subtitles on mobile phone real-time monitoring videos
CN103684765A (en) * 2013-12-24 2014-03-26 歌尔声学股份有限公司 Method and device for ciphering and deciphering data in management system
CN104486205A (en) * 2014-12-17 2015-04-01 沈文策 Information interaction method and device
CN105468374A (en) * 2015-11-26 2016-04-06 Tcl集团股份有限公司 Realization method and system for calendar and time controls of intelligent device
CN105516820A (en) * 2015-12-10 2016-04-20 腾讯科技(深圳)有限公司 Barrage interaction method and device
CN105939485A (en) * 2016-06-27 2016-09-14 武汉斗鱼网络科技有限公司 System and method for monitoring bullet screen service availability based on user bullet screen behaviors
CN106201817A (en) * 2016-06-21 2016-12-07 微梦创科网络科技(中国)有限公司 Dynamic Display content monitor method, system and device
CN107451852A (en) * 2017-06-23 2017-12-08 武汉斗鱼网络科技有限公司 The live promotion method and server using APP of third party in a kind of live platform
CN110020529A (en) * 2018-01-08 2019-07-16 武汉斗鱼网络科技有限公司 It is a kind of for detecting the method, apparatus and computer equipment of user information

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103259919A (en) * 2013-02-01 2013-08-21 广州网视通信息科技有限公司 Method for overlapping scrolling subtitles on mobile phone real-time monitoring videos
CN103684765A (en) * 2013-12-24 2014-03-26 歌尔声学股份有限公司 Method and device for ciphering and deciphering data in management system
CN104486205A (en) * 2014-12-17 2015-04-01 沈文策 Information interaction method and device
CN105468374A (en) * 2015-11-26 2016-04-06 Tcl集团股份有限公司 Realization method and system for calendar and time controls of intelligent device
CN105516820A (en) * 2015-12-10 2016-04-20 腾讯科技(深圳)有限公司 Barrage interaction method and device
CN106201817A (en) * 2016-06-21 2016-12-07 微梦创科网络科技(中国)有限公司 Dynamic Display content monitor method, system and device
CN105939485A (en) * 2016-06-27 2016-09-14 武汉斗鱼网络科技有限公司 System and method for monitoring bullet screen service availability based on user bullet screen behaviors
CN107451852A (en) * 2017-06-23 2017-12-08 武汉斗鱼网络科技有限公司 The live promotion method and server using APP of third party in a kind of live platform
CN110020529A (en) * 2018-01-08 2019-07-16 武汉斗鱼网络科技有限公司 It is a kind of for detecting the method, apparatus and computer equipment of user information

Also Published As

Publication number Publication date
CN110022285B (en) 2021-09-07

Similar Documents

Publication Publication Date Title
US10701183B2 (en) Configuring a computing device to automatically obtain data in response to a predetermined event
US8732801B2 (en) Wireless connection method and device
JP6929390B2 (en) Wireless local area network configuration method and device
CN104580167B (en) A kind of methods, devices and systems transmitting data
CN110417543B (en) Data encryption method, device and storage medium
KR20170006813A (en) Method and Apparatus for Supporting Secure Chat
CN110447215B (en) Dynamic warning method and terminal for malicious behavior of application software
CN110427738B (en) Resource distribution method, device, equipment and storage medium
CN106302325A (en) The methods, devices and systems specifying communication service are provided
CN106161176A (en) Cluster conversation message treatment method and device
CN106791955B (en) A kind of method and system of determining live streaming duration
CN104822090A (en) Video playing method, device and system
CN108574940A (en) A kind for the treatment of method and apparatus of incoming call
CN105096157A (en) Virtual article receiving method, sending method, interaction method and device
CN107451852A (en) The live promotion method and server using APP of third party in a kind of live platform
CN108306739A (en) A kind of method, server and computer equipment for detecting subscriber identity information
CN107276984A (en) Game live broadcasting method, device and mobile terminal
CN105207880A (en) Group recommendation method and apparatus
CN106790009A (en) Information processing method, device and mobile terminal
CN108200180A (en) A kind of method, apparatus and computer equipment for being used to limit request frequency
CN105430448B (en) A kind of the control processing method and video player client of video player
CN108874612A (en) A kind of method of acquisition of information, relevant device and system
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN106445660B (en) The application control method and mobile terminal of mobile terminal
CN110020529A (en) It is a kind of for detecting the method, apparatus and computer equipment of user information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant