CN110322289A - A kind of anti-cheat detection method, device, server, terminal and storage medium - Google Patents

A kind of anti-cheat detection method, device, server, terminal and storage medium Download PDF

Info

Publication number
CN110322289A
CN110322289A CN201910579138.4A CN201910579138A CN110322289A CN 110322289 A CN110322289 A CN 110322289A CN 201910579138 A CN201910579138 A CN 201910579138A CN 110322289 A CN110322289 A CN 110322289A
Authority
CN
China
Prior art keywords
control
attribute information
terminal
cheating
trigger action
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910579138.4A
Other languages
Chinese (zh)
Inventor
刘海涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN201910579138.4A priority Critical patent/CN110322289A/en
Publication of CN110322289A publication Critical patent/CN110322289A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0248Avoiding fraud

Abstract

The embodiment of the invention discloses a kind of anti-cheat detection method, device, server, terminal and storage mediums.Wherein, method includes: the control trigger request for obtaining terminal and sending, wherein, control trigger request is that terminal is generated in response to the trigger action of the operability control shown on the screen to terminal, the attribute information for the trigger action that terminal is obtained by monitoring is included at least in control trigger request, attribute information is for describing at least one behavioural characteristic that trigger action occurs on the screen;Matching verification is carried out to attribute information based on preset rules, determine whether control trigger request is cheating for the operability control, wherein, preset rules include for describing to trigger feature in cheating trigger action or non-cheating trigger action possessed by each attribute information.The embodiment of the present invention analyzes attribute information based on preset rules by obtaining the attribute information of the touch operation of terminal monitoring, to identify cheating.

Description

A kind of anti-cheat detection method, device, server, terminal and storage medium
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of anti-cheat detection methods, device, service Device, terminal and storage medium.
Background technique
With the extensive use of mobile device, various software applications and advertisement promotion emerge one after another, while different Software application and advertisement recommend business cash promote approach to cooperation it is also different.And such as software simulator, service is asked Modulus intends many behaviors such as attack, malice brush amount and has seriously affected business application dispensing and advertisement promotion realization, is more likely to directly Influence true ranking and user experience public praise.
However currently, the prior art can not effectively detect above-mentioned various malicious acts, can not find in time State malicious act.
Summary of the invention
The embodiment of the present invention provides a kind of anti-cheat detection method, device, server, terminal and storage medium, by obtaining The screen trigger recording listened to based on terminal monitoring mechanism is taken and analyzes, to reach the mesh of detection malice cheating in time 's.
In a first aspect, the embodiment of the invention provides a kind of anti-cheat detection method applied to server, this method packet It includes:
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to institute It states the trigger action of the operability control shown on the screen of terminal and generates, institute is included at least in the control trigger request The attribute information for the trigger action that terminal is obtained by monitoring is stated, the attribute information exists for describing the trigger action At least one behavioural characteristic occurred on the screen;
Matching verification is carried out to the attribute information based on preset rules, determine the control trigger request whether be for The cheating of the operability control, wherein the preset rules include for describing cheating trigger action or non-cheating Feature is triggered in trigger action possessed by each attribute information.
Second aspect, the embodiment of the invention provides a kind of anti-cheat detection methods applied to terminal, this method comprises:
Control trigger request is generated in response to the trigger action to the operability control, wherein the control triggering The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching State at least one behavioural characteristic that the trigger action occurs on the screen;
The control trigger request is sent to server, so that the server is based on preset rules and believes the attribute Breath carries out matching verification, determines whether the control trigger request is cheating for the operability control, wherein The preset rules include for describing triggering possessed by each attribute information in cheating trigger action or non-cheating trigger action Feature.
The third aspect, the embodiment of the invention also provides a kind of anti-cheating detection device for being configured at server, the devices Include:
Request module, for obtaining the control trigger request of terminal transmission, wherein the control trigger request is institute It states terminal to generate in response to the trigger action of the operability control shown on the screen to the terminal, the control triggering The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching State at least one behavioural characteristic that the trigger action occurs on the screen;
Correction verification module determines the control triggering for carrying out matching verification to the attribute information based on preset rules Whether request is cheating for the operability control, wherein the preset rules include for describing cheating touching Feature is triggered possessed by each attribute information in hair operation or non-cheating trigger action.
Fourth aspect, the embodiment of the invention also provides a kind of anti-cheating detection device for being configured at terminal, the device packets It includes:
Generation module is requested, for generating control trigger request in response to the trigger action to the operability control, Wherein, the attribute information for the trigger action that the terminal is obtained by monitoring is included at least in the control trigger request, The attribute information is for describing at least one behavioural characteristic that the trigger action occurs on the screen;
Request sending module, for the control trigger request to be sent to server, so that the server is based in advance If rule carries out matching verification to the attribute information, determine whether the control trigger request is for the operability control The cheating of part, wherein the preset rules include for describing respectively to belong in cheating trigger action or non-cheating trigger action Property information possessed by trigger feature.
5th aspect, the embodiment of the invention also provides a kind of servers, comprising:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes the anti-cheat detection method applied to server as described in any embodiment of the present invention.
6th aspect, the embodiment of the invention also provides a kind of terminals, comprising:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes the anti-cheat detection method applied to terminal as described in any embodiment of the present invention.
7th aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes that the anti-cheating applied to server as described in any embodiment of the present invention detects when the program is executed by processor Method.
Eighth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes the anti-cheating detection side applied to terminal as described in any embodiment of the present invention when the program is executed by processor Method.
The embodiment of the present invention can monitor the attribute letter of each touch operation of screen by increasing monitoring mechanism in terminal side Breath, while can also identify the real-time click event in touch operation to a certain operability control, determining can operate for this Property control trigger action and its obtained attribute information of monitoring then the attribute information is carried out by server rule-based Matching verification, it is determined whether there is the cheating for the operability control, to effectively identify and avoid such as soft Many malicious acts such as part simulator, service request simulation attack, malice brush amount.
Detailed description of the invention
Fig. 1 is the flow chart of the anti-cheat detection method applied to server in the embodiment of the present invention one;
Fig. 2 is the flow chart of the anti-cheat detection method applied to server in the embodiment of the present invention two;
Fig. 3 is the flow chart of the anti-cheat detection method applied to server in the embodiment of the present invention three;
Fig. 4 is the flow chart of the anti-cheat detection method applied to terminal in the embodiment of the present invention four;
Fig. 5 is the structural schematic diagram of the anti-cheating detection device for being configured at server in the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the anti-cheating detection device for being configured at terminal in the embodiment of the present invention six;
Fig. 7 is the structural schematic diagram of the server in the embodiment of the present invention seven.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that for convenient for It describes, only the parts related to the present invention are shown rather than entire infrastructure in attached drawing.
Embodiment one
Fig. 1 is the flow chart for the anti-cheat detection method applied to server that the embodiment of the present invention one provides, this implementation Example is applicable to the case where detecting to cheating, such as software simulator, service request simulation attack, malice brush amount etc. Many behaviors.This method can be practised fraud detection device and executed by counter, which can be real by the way of software and/or hardware It is existing, and can integrate on the server.
As shown in Figure 1, the anti-cheat detection method specifically includes:
S101, the control trigger request that terminal is sent is obtained.
Wherein, control trigger request is that terminal is grasped in response to the triggering of the operability control shown on the screen to terminal Make and generate, such as clicking operation.As an alternative embodiment, monitoring mechanism is provided in terminal, it is entire to monitor The touch operation that terminal screen occurs, obtains the attribute information of each touch operation, while also can recognize that in touch operation to can The real-time click event and moving event of operational control, determine the trigger action, such as according to operability control at end The position that occurs with touch operation of display area on the screen of end identifies, however, it is determined that out for the triggering of the operability control Operation, then generate corresponding control trigger request.And terminal is included at least in control trigger request by monitoring the triggering obtained The attribute information of operation, wherein it is special that the attribute information is used to describe at least one behavior that trigger action occurs on the screen Sign, such as the behavioural characteristics such as the position touched with screen or response time.
Optionally, trigger action includes clicking operation, i.e., triggering is realized by clicking operability control, correspondingly, point The attribute information for hitting operation then may include single click on middle pushing operation and lift the respective X axis coordinate of operation, Y axis coordinate and Response time.Wherein, according to pushing operation and the respective X axis coordinate of operation and Y axis coordinate are lifted, it may be determined that pushing operation and lift Play the coordinate position of operation respectively on a terminal screen.And generally for the clicking operation of normal human subject for, pushing operation It is all different with the coordinate position overwhelming majority of operation on the screen is lifted.
Optionally, the clicking operation further includes moving operation, correspondingly, the X axis coordinate of the pushing operation and Y-axis are sat It is designated as the X axis coordinate and Y axis coordinate of present position when the moving operation finally stops mobile, also as last shift position Coordinate.For example, user is behind the scenes in finger touch screen, possible this intends to click certain control or the clear-cut only random touching of milli It touches, user changes mind immediately, wants to click operability control described in the embodiment of the present invention, but user does not lift hand Refer to, but be moved to the region of operability control by mobile mode (i.e. Move) on the screen, then presses and lift, It should also be identified as being the trigger action to the operability control at this time.But if user is moved to button response after pinning It is lifted again outside region, is considered as and evades click, different from responding the clicking operation of this button area.
It should be noted that for general browsings such as the webpages of immobile terminal (such as the end PC), it can be illustrative Similar monitoring mechanism is set on the end PC, with full frame to the relevant portions such as business charging downloading or advertisement dispensing displaying or the end PC Region is monitored, to send control trigger request to server.The embodiment of the present invention is answered to the object of terminal monitoring and specifically Any restriction is not made of scene.
S102, matching verification is carried out to the attribute information based on preset rules, whether determines the control trigger request For the cheating for the operability control.
Wherein, preset rules include being had for describing each attribute information in cheating trigger action or non-cheating trigger action Some triggering features, meanwhile, preset rules can also be operated between cheating operation by the non-cheating of continuous analytic learning Distinguishing characteristics is constantly updated perfect.For example, its pushing operation and lifting operation on the screen in the clicking operation of normal human subject The coordinate position overwhelming majority is different, and the displacement pressed and lifted generally also will not be too long, such as only 5-10 picture Element.For another example the adjacent interval time operated twice can't be too short, and interval is usual in the non-cheating operation of normal human subject In ms rank, and each interval also can be different, but for the situation of software simulator malice brush amount, necessarily frequently It is triggered, then then can be by the response time of various operations to determine whether cheating.The above is only example, the present invention is real It applies example and this is not limited in any way.It excavates, trains real suitable for the present invention further, it is also possible to carry out AI study using big data The Knowledge Verification Model for applying example identifies the attribute information using the Knowledge Verification Model, to determine cheating.
If a certain trigger action is clicking operation, will click on the attribute of operation, for example, pushing operation coordinate, lift behaviour It the coordinate of work or respective response time, is matched with preset rules, if being unsatisfactory for preset rules, shows the click Operation is the cheating that the control trigger request of cheating operation namely clicking operation triggering is for operability control.
In addition, in the embodiment of the present invention, after identifying cheating, can also be carried out in combination with actual scene demand pair The policy response that counter should practise fraud processing, and then effectively optimize the commercial statistics billing amount such as downloading dispensing, download statistics and advertisement promotion Or ranking experiences relevant coherency.And can be fed back according to mass data and continue AI rule learning, it is constantly extended to more Among distinct device and intelligent scene.
The embodiment of the present invention can monitor the attribute letter of each touch operation of screen by increasing monitoring mechanism in terminal side Breath, while can also identify the real-time click event in touch operation to a certain operability control, determining can operate for this Property control trigger action and its obtained attribute information of monitoring then the attribute information is carried out by server rule-based Matching verification, it is determined whether there is the cheating for the operability control, to effectively identify and avoid such as soft Many malicious acts such as part simulator, service request simulation attack, malice brush amount.
Embodiment two
Fig. 2 is the flow chart of anti-cheat detection method provided by Embodiment 2 of the present invention, and the present embodiment two is in embodiment one On the basis of, the algorithmic rule for carrying out fusion calculation to attribute information is increased for preset rules, to based on default rule Matching verification then is carried out to the attribute information, determines whether control trigger request is cheating for operability control Operation be further optimized.As shown in Figure 2, which comprises
S201, the control trigger request that terminal is sent is obtained.
Wherein, control trigger request is terminal in response to the touching of the operability control shown on the screen to the terminal Hair is operated and is generated, and the attribute information for the trigger action that terminal is obtained by monitoring, attribute are included at least in control trigger request Information is for describing at least one behavioural characteristic that trigger action occurs on the screen.
It further, further include attribute of the terminal according to algorithmic rule to the trigger action listened in control trigger request Information carries out at least one verification computational item that fusion calculation obtains.Illustratively, trigger action is clicking operation, attribute letter When ceasing X axis coordinate, Y axis coordinate, response time including pushing operation, and lifting the X axis coordinate, Y axis coordinate, response of operation Between, illustratively, above-mentioned six numerical value is respectively indicated with CK1-CK6.Before passing at the terminal, CK7- is generated according to algorithmic rule This four verification computational items of CK10, wherein algorithmic rule for example can be with are as follows: CK7=CK1+CK2, CK8=CK2+CK3, CK9= CK3+CK4, CK10=CK4+CK5.It should be noted that algorithmic rule is revealed and is utilized by criminal in order to prevent, Algorithmic rule can be what dynamic updated, such as update once weekly, can be simple mathematical operation, and it is multiple to be also possible to other Miscellaneous algorithm, the embodiment of the present invention do not do any restriction to algorithmic rule itself.
After obtaining verification computational item, computational item will be verified and attribute information is used as a part of control trigger request together Upload server is verified.Herein it should be noted that when being practised fraud using software simulator, before cracking, due to not Know algorithmic rule, may only have attribute information without including verification computational item in the control trigger request of upload, thus service Device can be directly the work for operability control according to can directly verify determining control trigger request whether there is or not verification computational item Disadvantage behavior.Further, it when being practised fraud using software simulator, if it knows that there is also algorithmic rules, but does not know specific Algorithmic rule details can then generate the verification computational item of same number at random, also upload as a part of control trigger request Server can carry out cheating detection according to S202-S203 at this time.
S202, fusion calculation is carried out according to attribute information of the algorithmic rule to the trigger action got, obtained To at least one current verification computational item.
It illustratively, include attribute information CK1-CK6 in the control trigger request uploaded onto the server, and verification calculates Item CK7-CK10.Server calculates current verification computational item CK7 ', CK8 ' according to algorithmic rule and attribute information CK1-CK6, CK9 ', CK10 ', for example, CK7 '=CK1+CK2, CK8 '=CK2+CK3, CK9 '=CK3+CK4, CK10 '=CK4+CK5.
S203, at least one of described control trigger request verification computational item is worked as at least one calculated Verification is compared in preceding verification computational item, according to Inspection as a result, determine again the control trigger request whether be for The cheating of the operability control.
Illustratively, by the verification computational item CK7 for including in control trigger request and current verification computational item CK7 ' progress Compare, judge whether the two is identical, similarly may determine that whether CK8 and CK8 ', CK9 and CK9 ', CK10 and CK10 ' are identical.And And the verification computational item only in control trigger request, with when currently verification computational item is identical, just determination is not practised fraud, As long as there is a difference, determine that control trigger request is the cheating for operability control.
In the embodiment of the present invention, by increasing algorithmic rule in preset rules, in the attribute letter for receiving terminal upload After breath and verification computational item, based on algorithmic rule by being verified to the verification computational item, to detect control trigger request Whether it is cheating for operability control, thus can promotes the accuracy of cheating detection.
Embodiment three
Fig. 3 is the flow chart for the anti-cheat detection method that the embodiment of the present invention three provides, and the present embodiment is in above-described embodiment On the basis of, equipment verification rule is increased for preset rules, to match to based on preset rules to the attribute information Verification determines whether control trigger request is to be further optimized for the operation of the cheating of operability control.Such as Shown in Fig. 3, which comprises
S301, the control trigger request that terminal is sent is obtained.
Further include in the embodiment of the present invention, in control trigger request terminal facility information and terminal locating for environment letter Breath.Thus can the environmental information according to locating for the facility information of terminal and terminal according to S302 or S303 carry out cheating inspection It surveys.
S302, based on the facility information knowledge base obtained in advance, verify the consistency of the facility information, according to verifying tie Fruit determines whether the control trigger request is cheating for the operability control.
Illustratively, the facility information knowledge obtained by the facility information for the terminal for including in control trigger request and in advance Library is compared, judge terminal whether be the existing terminal in market and terminal other attributes it is whether consistent with configuration information, if It is no, it is determined that control trigger request is the cheating row for operability control.It should be noted that if uploading to clothes There is no facility information in the control trigger request of device of being engaged in, then can directly determine control trigger request is for operability control Cheating.
S303, according to equipment verification rule, verify the trigger action attribute information and the facility information and The matching degree of environmental information determines whether the control trigger request is for the operability control according to verification result Cheating.
Illustratively, trigger action is clicking operation, and attribute information is the position coordinates of pushing operation and lifts operation Position coordinates, thus in screen coordinate system, whether can determine position coordinates according to the screen size of position coordinates and equipment In screen, if not, it is determined that control trigger request is the cheating for operability control.
Illustratively, environmental information is the brightness of ambient light, may determine that by the brightness of light and is currently at night Under scene, and normal human user not will do it frequent trigger action usually under night scene.So if according to triggering The response time of operation determines the frequent progress trigger action under night scene, then can determine that control trigger request is for institute State the cheating of operability control.It should be noted that environmental information is also possible to other scenes, such as Motion Field Scape is not specifically limited herein.
It, can be further according to equipment by increasing equipment verification rule in preset rules in the embodiment of the present invention Information carries out cheating detection, but also the extension of data information model, the scope of application can be carried out for different scenes Wider, it is more accurate to judge.
Example IV
Fig. 4 is the flow chart for the anti-cheat detection method applied to terminal that the embodiment of the present invention four provides, the present embodiment It is applicable to the case where anti-cheating detection is carried out to the Internet activity, this method can be practised fraud detection device and executed by counter, should Device can be realized by the way of software and/or hardware, and can integrate at the terminal, such as smart phone or tablet computer Deng.As shown in Figure 4, which comprises
S401, control trigger request is generated in response to the trigger action to the operability control.
Wherein, the category for the trigger action that the terminal is obtained by monitoring is included at least in the control trigger request Property information, the attribute information is for describing at least one behavioural characteristic that the trigger action occurs on the screen.
In embodiments of the present invention, it is provided with monitoring mechanism in terminal, to monitor the touch behaviour that entire terminal screen occurs Make, illustratively, by customized OnClickListener () method, operates (example to monitor, respond the live touch of user Such as clicking operation), to obtain the attribute information of each touch operation.Meanwhile passing through customized OnClickListener () Method identifies the trigger action to operability control with the real-time click event of monitoring users from the touch operation, And the attribute information of the trigger action is reported while responding the trigger action.It should be noted that in order to ensure end End monitoring mechanism goes on smoothly monitoring, needs to be modified terminal system, such as matches the onTouch method that terminal system provides It is set to and returns to false always, so that Event (event) will not be consumed, do not influence the ongoing operation and monitoring processing of subsequent user.
Further, it before generating control trigger request in response to the trigger action to the operability control, monitors Real-time control trigger event, such as monitor click event, then it can be carried out according to following operation:
The touch operation occurred on the screen of the terminal is monitored, the attribute information of each touch operation is obtained;
According to the attribute of operability control display area on the screen and each touch operation letter Breath, identifies the trigger action to the operability control from the touch operation.
S402, the control trigger request is sent to server, so that the server is based on preset rules to described Attribute information carries out matching verification, determines whether the control trigger request is cheating row for the operability control For.
Wherein, the preset rules include for describing each attribute information in cheating trigger action or non-cheating trigger action Possessed triggering feature.
Further, preset rules further include the algorithmic rule for carrying out fusion calculation to the attribute information;
Correspondingly, further including the terminal in the control trigger request according to the algorithmic rule to described in listening to The attribute information of trigger action carries out at least one verification computational item that fusion calculation obtains.
Further, the preset rules further include equipment verification rule;
Correspondingly, further include in the control trigger request terminal facility information and the terminal locating for environment Information.
Wherein, detailed description and specific embodiment in relation to preset rules, reference can be made to above-described embodiment, no longer superfluous herein It states.
Further, in embodiments of the present invention, environment locating for the attribute information, facility information and the terminal is believed Breath, can be after being encrypted using rivest, shamir, adelman, such as other secure cryptographic algorithms such as AES, carries and touches in the control It is sent to the server in hair request, with the safety of improve data transfer.
The embodiment of the present invention obtains the attribute information of trigger action by monitoring screen trigger action in real time in terminal side, On facility information and ambient condition information by attribute information and its verification computational item, terminal that are calculated according to algorithmic rule etc. Server is passed to, so that passing through the above- mentioned information progress based on preset rules to trigger action and terminal in server side With verification, the operation whether trigger action belongs to cheating is automatically identified, to effectively monitor cheating.
Embodiment five
Fig. 5 is the structural schematic diagram of the anti-cheating detection device in the embodiment of the present invention five, which is configured at server. As shown in figure 5, anti-cheating detection device includes:
Request module 501, for obtaining the control trigger request of terminal transmission, wherein the control trigger request It is that the terminal generates, the control in response to the trigger action of the operability control shown on the screen to the terminal The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in trigger request, the attribute information is used In at least one behavioural characteristic that the description trigger action occurs on the screen;
Correction verification module 502 determines the control touching for carrying out matching verification to the attribute information based on preset rules Whether hair request is cheating for the operability control, wherein the preset rules include for describing cheating Feature is triggered in trigger action or non-cheating trigger action possessed by each attribute information.
On the basis of the above embodiments, the trigger action includes clicking operation;
Correspondingly, the attribute information includes single clicing on middle pushing operation and lifting to operate respective X axis coordinate, Y-axis Coordinate and response time.
The clicking operation further includes moving operation;
Correspondingly, the X axis coordinate and Y axis coordinate of the pushing operation are that the moving operation is locating when finally stopping mobile The X axis coordinate and Y axis coordinate of position.
On the basis of the above embodiments, the preset rules further include for carrying out fusion calculation to the attribute information Algorithmic rule.
It on the basis of the above embodiments, further include the terminal according to the algorithmic rule in the control trigger request At least one verification computational item that fusion calculation obtains is carried out to the attribute information of the trigger action listened to;
Correspondingly, the correction verification module further include:
Fusion calculation unit, for being carried out according to attribute information of the algorithmic rule to the trigger action got Fusion calculation obtains at least one current verification computational item;
First verification unit, for verifying computational item and calculating at least one of described control trigger request At least one current verification computational item verification is compared, asked according to Inspection as a result, determining that the control triggers again The no cheating for for the operability control of Seeking Truth.
On the basis of the above embodiments, the preset rules further include equipment verification rule.
It on the basis of the above embodiments, further include the facility information of the terminal in the control trigger request and described Environmental information locating for terminal;
Correspondingly, the correction verification module further include:
Second authentication unit, for verifying the consistent of the facility information based on the facility information knowledge base obtained in advance Property determines whether the control trigger request is cheating for the operability control according to verification result;Or
Third verification unit, for verifying attribute information and the institute of the trigger action according to the equipment verification rule The matching degree for stating facility information and environmental information, according to verification result determine the control trigger request whether be for it is described can The cheating of operational control.
Anti- work provided by any embodiment of the invention can be performed in anti-detection device of practising fraud provided by the embodiment of the present invention Disadvantage detection method has the corresponding functional module of execution method and beneficial effect.
Embodiment six
Fig. 6 is the structural schematic diagram of the anti-cheating detection device in the embodiment of the present invention six, which is configured at terminal.Such as Shown in Fig. 6, anti-detection device of practising fraud includes:
Generation module 601 is requested, is asked for generating control triggering in response to the trigger action to the operability control It asks, wherein include at least the terminal in the control trigger request and believed by monitoring the attribute of the trigger action obtained Breath, the attribute information is for describing at least one behavioural characteristic that the trigger action occurs on the screen;
Request sending module 602, for the control trigger request to be sent to server, so that the server is based on Preset rules carry out matching verification to the attribute information, determine whether the control trigger request is for the operability The cheating of control, wherein the preset rules include each in cheating trigger action or non-cheating trigger action for describing Feature is triggered possessed by attribute information.
On the basis of the above embodiments, the onTouch method of the terminal system is configured to return to false always;
Correspondingly, described device further include:
Module is monitored, the touch operation occurred on the screen to the terminal is monitored, and each touch behaviour is obtained The attribute information of work;
Identification module, for according to operability control display area on the screen and each touch The attribute information of operation identifies the trigger action to the operability control from the touch operation.
On the basis of the above embodiments, the preset rules further include for carrying out fusion calculation to the attribute information Algorithmic rule;
Correspondingly, further including the terminal in the control trigger request according to the algorithmic rule to described in listening to The attribute information of trigger action carries out at least one verification computational item that fusion calculation obtains.
On the basis of the above embodiments, the preset rules further include equipment verification rule;
Correspondingly, further include in the control trigger request terminal facility information and the terminal locating for environment Information.
On the basis of the above embodiments, environmental information locating for the attribute information, facility information and the terminal is After being encrypted using rivest, shamir, adelman, carrying is sent to the server in the control trigger request.
Anti- work provided by any embodiment of the invention can be performed in anti-detection device of practising fraud provided by the embodiment of the present invention Disadvantage detection method has the corresponding functional module of execution method and beneficial effect.
Embodiment seven
Fig. 7 is a kind of structural schematic diagram for server that the embodiment of the present invention seven provides.Fig. 7, which is shown, to be suitable for being used to realizing The block diagram of the exemplary servers 12 of embodiment of the present invention.The server 12 that Fig. 7 is shown is only an example, should not be to this The function and use scope of inventive embodiments bring any restrictions.
As shown in fig. 7, server 12 is showed in the form of universal computing device.The component of server 12 may include but not Be limited to: one or more processor or processing unit 16, system storage 28 connect different system components (including system Memory 28 and processing unit 16) bus 18.
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Server 12 typically comprises a variety of computer system readable media.These media can be and any can be serviced The usable medium that device 12 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 28 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (RAM) 30 and/or cache memory 32.Server 12 may further include other removable/nonremovable , volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing not removable Dynamic, non-volatile magnetic media (Fig. 7 do not show, commonly referred to as " hard disk drive ").Although being not shown in Fig. 7, can provide Disc driver for being read and write to removable non-volatile magnetic disk (such as " floppy disk "), and to removable anonvolatile optical disk The CD drive of (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driver can To be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one program product, The program product has one group of (for example, at least one) program module, these program modules are configured to perform each implementation of the invention The function of example.
Program/utility 40 with one group of (at least one) program module 42 can store in such as memory 28 In, such program module 42 include but is not limited to operating system, one or more application program, other program modules and It may include the realization of network environment in program data, each of these examples or certain combination.Program module 42 is usual Execute the function and/or method in embodiment described in the invention.
Server 12 can also be with one or more external servers 14 (such as keyboard, sensing equipment, display 24 etc.) Communication, can also be enabled a user to one or more equipment interact with the server 12 communicate, and/or with make the service Any equipment (such as network interface card, modem etc.) that device 12 can be communicated with one or more of the other calculating equipment is logical Letter.This communication can be carried out by input/output (I/O) interface 22.Also, server 12 can also pass through network adapter 20 is logical with one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) Letter.As shown, network adapter 20 is communicated by bus 18 with other modules of server 12.Although should be understood that in figure It is not shown, other hardware and/or software module can be used in conjunction with server 12, including but not limited to: microcode, device drives Device, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 16 by the program that is stored in system storage 28 of operation, thereby executing various function application and Data processing, such as realize the anti-cheat detection method for being applied to server provided by the embodiment of the present invention, this method comprises:
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to institute It states the trigger action of the operability control shown on the screen of terminal and generates, institute is included at least in the control trigger request The attribute information for the trigger action that terminal is obtained by monitoring is stated, the attribute information exists for describing the trigger action At least one behavioural characteristic occurred on the screen;
Matching verification is carried out to the attribute information based on preset rules, determine the control trigger request whether be for The cheating of the operability control, wherein the preset rules include for describing cheating trigger action or non-cheating Feature is triggered in trigger action possessed by each attribute information.
The embodiment of the invention also provides a kind of terminals comprising: one or more processors;Memory, for storing One or more programs, when one or more of programs are executed by one or more of processors so that it is one or Multiple processors realize the anti-cheat detection method for being applied to terminal provided by the embodiment of the present invention, comprising:
Control trigger request is generated in response to the trigger action to the operability control, wherein the control triggering The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching State at least one behavioural characteristic that the trigger action occurs on the screen;
The control trigger request is sent to server, so that the server is based on preset rules and believes the attribute Breath carries out matching verification, determines whether the control trigger request is cheating for the operability control, wherein The preset rules include for describing triggering possessed by each attribute information in cheating trigger action or non-cheating trigger action Feature.
Certainly, it will be understood by those skilled in the art that processor can also realize it is provided by any embodiment of the invention The technical solution of anti-cheat detection method applied to terminal.The hardware configuration and function of the mobile terminal can be found in embodiment Seven content is explained.
Embodiment eight
The embodiment of the present invention eight additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should The anti-cheat detection method for being applied to server as provided by the embodiment of the present invention, the party are realized when program is executed by processor Method includes:
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to institute It states the trigger action of the operability control shown on the screen of terminal and generates, institute is included at least in the control trigger request The attribute information for the trigger action that terminal is obtained by monitoring is stated, the attribute information exists for describing the trigger action At least one behavioural characteristic occurred on the screen;
Matching verification is carried out to the attribute information based on preset rules, determine the control trigger request whether be for The cheating of the operability control, wherein the preset rules include for describing cheating trigger action or non-cheating Feature is triggered in trigger action possessed by each attribute information.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.? Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service It is connected for quotient by internet).
The embodiment of the invention also provides another computer readable storage medium, the computer executable instructions by For executing a kind of anti-cheat detection method applied to terminal when computer processor executes, this method comprises:
Control trigger request is generated in response to the trigger action to the operability control, wherein the control triggering The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching State at least one behavioural characteristic that the trigger action occurs on the screen;
The control trigger request is sent to server, so that the server is based on preset rules and believes the attribute Breath carries out matching verification, determines whether the control trigger request is cheating for the operability control, wherein The preset rules include for describing triggering possessed by each attribute information in cheating trigger action or non-cheating trigger action Feature.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention The method operation that executable instruction is not limited to the described above, can also be performed provided by any embodiment of the invention be applied to eventually Relevant operation in the anti-cheat detection method at end.It can be found in the content in embodiment eight to the introduction of storage medium to explain.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (16)

1. a kind of anti-cheat detection method is applied to server characterized by comprising
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to the end The trigger action of the operability control shown on the screen at end and generate, in the control trigger request include at least the end The attribute information for the trigger action that end is obtained by monitoring, the attribute information is for describing the trigger action described At least one behavioural characteristic occurred on screen;
Matching verification is carried out to the attribute information based on preset rules, determines whether the control trigger request is for described The cheating of operability control, wherein the preset rules include for describing cheating trigger action or non-cheating triggering Feature is triggered in operation possessed by each attribute information.
2. the method according to claim 1, wherein
The trigger action includes clicking operation;Correspondingly, the attribute information includes single clicing on middle pushing operation and lifting Operate respective X axis coordinate, Y axis coordinate and response time;
The clicking operation further includes moving operation;Correspondingly, the X axis coordinate and Y axis coordinate of the pushing operation are the shifting The dynamic last X axis coordinate and Y axis coordinate for stopping present position when movement of operation.
3. the method according to claim 1, wherein the preset rules further include for the attribute information Carry out the algorithmic rule of fusion calculation.
4. according to the method described in claim 3, further including that the terminal is advised according to the algorithm in the control trigger request At least one verification computational item that fusion calculation obtains then is carried out to the attribute information of the trigger action listened to;
Correspondingly, described carry out matching verification to the attribute information based on preset rules, determine that the control trigger request is The no cheating for for the operability control, further includes:
Fusion calculation is carried out according to attribute information of the algorithmic rule to the trigger action got, obtains at least one Current verification computational item;
At least one the current master gage that at least one of described control will trigger request verification computational item and calculate It calculates item and verification is compared, according to Inspection as a result, determining whether the control trigger request is to grasp for described again The cheating of the property made control.
5. the method according to claim 1, wherein the preset rules further include equipment verification rule.
6. according to the method described in claim 5, it is characterized in that, further including setting for the terminal in the control trigger request Environmental information locating for standby information and the terminal;
Correspondingly, described carry out matching verification to the attribute information based on preset rules, determine that the control trigger request is The no cheating for for the operability control, further includes:
Based on the facility information knowledge base obtained in advance, the consistency of the facility information is verified, institute is determined according to verification result State whether control trigger request is cheating for the operability control;Or
According to equipment verification rule, the attribute information and the facility information and environmental information of the trigger action are verified Matching degree determines whether the control trigger request is cheating for the operability control according to verification result.
7. a kind of anti-cheat detection method is applied to terminal, shows operability control, feature on the screen of the terminal It is, which comprises
Control trigger request is generated in response to the trigger action to the operability control, wherein the control trigger request In include at least the terminal by monitoring the attribute information of the trigger action obtained, the attribute information is for describing institute State at least one behavioural characteristic that trigger action occurs on the screen;
The control trigger request is sent to server so that the server be based on preset rules to the attribute information into Row matching verification determines whether the control trigger request is cheating for the operability control, wherein described Preset rules include for describing to trigger feature in cheating trigger action or non-cheating trigger action possessed by each attribute information.
8. the method according to the description of claim 7 is characterized in that the onTouch method of the terminal system is configured to always Return to false;
Correspondingly, before generating control trigger request in response to the trigger action to the operability control, the method Further include:
The touch operation occurred on the screen of the terminal is monitored, the attribute information of each touch operation is obtained;
According to operability control display area on the screen and the attribute information of each touch operation, from The trigger action to the operability control is identified in the touch operation.
9. the method according to the description of claim 7 is characterized in that the preset rules further include for the attribute information Carry out the algorithmic rule of fusion calculation;
Correspondingly, further including the triggering of the terminal according to the algorithmic rule to listening in the control trigger request The attribute information of operation carries out at least one verification computational item that fusion calculation obtains.
10. the method according to the description of claim 7 is characterized in that the preset rules further include equipment verification rule;
Correspondingly, further include in the control trigger request terminal facility information and the terminal locating for environment letter Breath.
11. a kind of anti-cheating detection device, is configured at server, which is characterized in that described device includes:
Request module, for obtaining the control trigger request of terminal transmission, wherein the control trigger request is the end It holds the trigger action in response to the operability control shown on the screen to the terminal and generates, the control trigger request In include at least the terminal by monitoring the attribute information of the trigger action obtained, the attribute information is for describing institute State at least one behavioural characteristic that trigger action occurs on the screen;
Correction verification module determines the control trigger request for carrying out matching verification to the attribute information based on preset rules It whether is cheating for the operability control, wherein the preset rules include for describing cheating triggering behaviour Feature is triggered in work or non-cheating trigger action possessed by each attribute information.
12. a kind of anti-cheating detection device, is configured at terminal, operability control is shown on the screen of the terminal, special Sign is that described device includes:
Generation module is requested, for generating control trigger request in response to the trigger action to the operability control, wherein The attribute information for the trigger action that the terminal is obtained by monitoring, the category are included at least in the control trigger request Property information for describing at least one behavioural characteristic that the trigger action occurs on the screen;
Request sending module, for the control trigger request to be sent to server, so that the server is based on default rule Matching verification then is carried out to the attribute information, determines whether the control trigger request is for the operability control Cheating, wherein the preset rules include for describing each attribute letter in cheating trigger action or non-cheating trigger action Feature is triggered possessed by breath.
13. a kind of server characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as anti-cheat detection method as claimed in any one of claims 1 to 6.
14. a kind of terminal characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now anti-cheat detection method as described in any in claim 7-10.
15. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor Such as anti-cheat detection method as claimed in any one of claims 1 to 6 is realized when execution.
16. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The anti-cheat detection method as described in any in claim 7-10 is realized when execution.
CN201910579138.4A 2019-06-28 2019-06-28 A kind of anti-cheat detection method, device, server, terminal and storage medium Pending CN110322289A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910579138.4A CN110322289A (en) 2019-06-28 2019-06-28 A kind of anti-cheat detection method, device, server, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910579138.4A CN110322289A (en) 2019-06-28 2019-06-28 A kind of anti-cheat detection method, device, server, terminal and storage medium

Publications (1)

Publication Number Publication Date
CN110322289A true CN110322289A (en) 2019-10-11

Family

ID=68120666

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910579138.4A Pending CN110322289A (en) 2019-06-28 2019-06-28 A kind of anti-cheat detection method, device, server, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110322289A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116070180A (en) * 2022-11-10 2023-05-05 支付宝(杭州)信息技术有限公司 Security service execution method and device, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150326604A1 (en) * 2014-05-08 2015-11-12 Popo Technologies, Inc. Rules based monitoring and intrusion detection system
CN107483443A (en) * 2017-08-22 2017-12-15 北京京东尚科信息技术有限公司 advertisement information processing method, client, storage medium and electronic equipment
CN108109011A (en) * 2017-12-28 2018-06-01 北京皮尔布莱尼软件有限公司 A kind of anti-cheat method of advertisement and computing device
CN109829300A (en) * 2019-01-02 2019-05-31 广州大学 APP dynamic depth malicious act detection device, method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150326604A1 (en) * 2014-05-08 2015-11-12 Popo Technologies, Inc. Rules based monitoring and intrusion detection system
CN107483443A (en) * 2017-08-22 2017-12-15 北京京东尚科信息技术有限公司 advertisement information processing method, client, storage medium and electronic equipment
CN108109011A (en) * 2017-12-28 2018-06-01 北京皮尔布莱尼软件有限公司 A kind of anti-cheat method of advertisement and computing device
CN109829300A (en) * 2019-01-02 2019-05-31 广州大学 APP dynamic depth malicious act detection device, method and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116070180A (en) * 2022-11-10 2023-05-05 支付宝(杭州)信息技术有限公司 Security service execution method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US10970026B2 (en) Application launching in a multi-display device
CN105378624A (en) Showing interactions as they occur on a whiteboard
US10275341B2 (en) Mobile application usability testing
CN109614207A (en) Processing method, equipment and the computer readable storage medium of boarding application
US10546509B2 (en) Evaluating user contribution in collaborative environments
CN110225104A (en) Data capture method, device and terminal device
CN107194213A (en) A kind of personal identification method and device
WO2020038089A1 (en) Terminal, method and device for performing operations on terminal, and storage medium
CN109710332A (en) Processing method, equipment and the computer readable storage medium of boarding application
CN109806591A (en) Signature generating method and device in scene of game
CN110322289A (en) A kind of anti-cheat detection method, device, server, terminal and storage medium
CN105474164A (en) Disambiguation of indirect input
CN107862035A (en) Network read method, device, Intelligent flat and the storage medium of minutes
CN112818733A (en) Information processing method, device, storage medium and terminal
CN115171222B (en) Behavior detection method and device, computer equipment and storage medium
CN116542740A (en) Live broadcasting room commodity recommendation method and device, electronic equipment and readable storage medium
CN115690373A (en) Road network generation method and device, computer readable storage medium and computer equipment
CN112669057B (en) Data prediction method and device, electronic equipment and storage medium
CN109444905A (en) A kind of dynamic object detection method, device and terminal device based on laser
CN110188532A (en) A kind of cipher code protection method and device
CN108804007A (en) Image-pickup method, device, storage medium and electronic equipment
CN109348236A (en) A kind of storage capacity evaluation method, apparatus, server and storage medium
CN116980236B (en) Network security detection method, device, equipment and storage medium
CN116112556A (en) Data processing method, device, medium and equipment
CN114780504A (en) Web end interaction management method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination