CN110322289A - A kind of anti-cheat detection method, device, server, terminal and storage medium - Google Patents
A kind of anti-cheat detection method, device, server, terminal and storage medium Download PDFInfo
- Publication number
- CN110322289A CN110322289A CN201910579138.4A CN201910579138A CN110322289A CN 110322289 A CN110322289 A CN 110322289A CN 201910579138 A CN201910579138 A CN 201910579138A CN 110322289 A CN110322289 A CN 110322289A
- Authority
- CN
- China
- Prior art keywords
- control
- attribute information
- terminal
- cheating
- trigger action
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0248—Avoiding fraud
Abstract
The embodiment of the invention discloses a kind of anti-cheat detection method, device, server, terminal and storage mediums.Wherein, method includes: the control trigger request for obtaining terminal and sending, wherein, control trigger request is that terminal is generated in response to the trigger action of the operability control shown on the screen to terminal, the attribute information for the trigger action that terminal is obtained by monitoring is included at least in control trigger request, attribute information is for describing at least one behavioural characteristic that trigger action occurs on the screen;Matching verification is carried out to attribute information based on preset rules, determine whether control trigger request is cheating for the operability control, wherein, preset rules include for describing to trigger feature in cheating trigger action or non-cheating trigger action possessed by each attribute information.The embodiment of the present invention analyzes attribute information based on preset rules by obtaining the attribute information of the touch operation of terminal monitoring, to identify cheating.
Description
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of anti-cheat detection methods, device, service
Device, terminal and storage medium.
Background technique
With the extensive use of mobile device, various software applications and advertisement promotion emerge one after another, while different
Software application and advertisement recommend business cash promote approach to cooperation it is also different.And such as software simulator, service is asked
Modulus intends many behaviors such as attack, malice brush amount and has seriously affected business application dispensing and advertisement promotion realization, is more likely to directly
Influence true ranking and user experience public praise.
However currently, the prior art can not effectively detect above-mentioned various malicious acts, can not find in time
State malicious act.
Summary of the invention
The embodiment of the present invention provides a kind of anti-cheat detection method, device, server, terminal and storage medium, by obtaining
The screen trigger recording listened to based on terminal monitoring mechanism is taken and analyzes, to reach the mesh of detection malice cheating in time
's.
In a first aspect, the embodiment of the invention provides a kind of anti-cheat detection method applied to server, this method packet
It includes:
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to institute
It states the trigger action of the operability control shown on the screen of terminal and generates, institute is included at least in the control trigger request
The attribute information for the trigger action that terminal is obtained by monitoring is stated, the attribute information exists for describing the trigger action
At least one behavioural characteristic occurred on the screen;
Matching verification is carried out to the attribute information based on preset rules, determine the control trigger request whether be for
The cheating of the operability control, wherein the preset rules include for describing cheating trigger action or non-cheating
Feature is triggered in trigger action possessed by each attribute information.
Second aspect, the embodiment of the invention provides a kind of anti-cheat detection methods applied to terminal, this method comprises:
Control trigger request is generated in response to the trigger action to the operability control, wherein the control triggering
The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching
State at least one behavioural characteristic that the trigger action occurs on the screen;
The control trigger request is sent to server, so that the server is based on preset rules and believes the attribute
Breath carries out matching verification, determines whether the control trigger request is cheating for the operability control, wherein
The preset rules include for describing triggering possessed by each attribute information in cheating trigger action or non-cheating trigger action
Feature.
The third aspect, the embodiment of the invention also provides a kind of anti-cheating detection device for being configured at server, the devices
Include:
Request module, for obtaining the control trigger request of terminal transmission, wherein the control trigger request is institute
It states terminal to generate in response to the trigger action of the operability control shown on the screen to the terminal, the control triggering
The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching
State at least one behavioural characteristic that the trigger action occurs on the screen;
Correction verification module determines the control triggering for carrying out matching verification to the attribute information based on preset rules
Whether request is cheating for the operability control, wherein the preset rules include for describing cheating touching
Feature is triggered possessed by each attribute information in hair operation or non-cheating trigger action.
Fourth aspect, the embodiment of the invention also provides a kind of anti-cheating detection device for being configured at terminal, the device packets
It includes:
Generation module is requested, for generating control trigger request in response to the trigger action to the operability control,
Wherein, the attribute information for the trigger action that the terminal is obtained by monitoring is included at least in the control trigger request,
The attribute information is for describing at least one behavioural characteristic that the trigger action occurs on the screen;
Request sending module, for the control trigger request to be sent to server, so that the server is based in advance
If rule carries out matching verification to the attribute information, determine whether the control trigger request is for the operability control
The cheating of part, wherein the preset rules include for describing respectively to belong in cheating trigger action or non-cheating trigger action
Property information possessed by trigger feature.
5th aspect, the embodiment of the invention also provides a kind of servers, comprising:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes the anti-cheat detection method applied to server as described in any embodiment of the present invention.
6th aspect, the embodiment of the invention also provides a kind of terminals, comprising:
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processing
Device realizes the anti-cheat detection method applied to terminal as described in any embodiment of the present invention.
7th aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer
Program realizes that the anti-cheating applied to server as described in any embodiment of the present invention detects when the program is executed by processor
Method.
Eighth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer
Program realizes the anti-cheating detection side applied to terminal as described in any embodiment of the present invention when the program is executed by processor
Method.
The embodiment of the present invention can monitor the attribute letter of each touch operation of screen by increasing monitoring mechanism in terminal side
Breath, while can also identify the real-time click event in touch operation to a certain operability control, determining can operate for this
Property control trigger action and its obtained attribute information of monitoring then the attribute information is carried out by server rule-based
Matching verification, it is determined whether there is the cheating for the operability control, to effectively identify and avoid such as soft
Many malicious acts such as part simulator, service request simulation attack, malice brush amount.
Detailed description of the invention
Fig. 1 is the flow chart of the anti-cheat detection method applied to server in the embodiment of the present invention one;
Fig. 2 is the flow chart of the anti-cheat detection method applied to server in the embodiment of the present invention two;
Fig. 3 is the flow chart of the anti-cheat detection method applied to server in the embodiment of the present invention three;
Fig. 4 is the flow chart of the anti-cheat detection method applied to terminal in the embodiment of the present invention four;
Fig. 5 is the structural schematic diagram of the anti-cheating detection device for being configured at server in the embodiment of the present invention five;
Fig. 6 is the structural schematic diagram of the anti-cheating detection device for being configured at terminal in the embodiment of the present invention six;
Fig. 7 is the structural schematic diagram of the server in the embodiment of the present invention seven.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that for convenient for
It describes, only the parts related to the present invention are shown rather than entire infrastructure in attached drawing.
Embodiment one
Fig. 1 is the flow chart for the anti-cheat detection method applied to server that the embodiment of the present invention one provides, this implementation
Example is applicable to the case where detecting to cheating, such as software simulator, service request simulation attack, malice brush amount etc.
Many behaviors.This method can be practised fraud detection device and executed by counter, which can be real by the way of software and/or hardware
It is existing, and can integrate on the server.
As shown in Figure 1, the anti-cheat detection method specifically includes:
S101, the control trigger request that terminal is sent is obtained.
Wherein, control trigger request is that terminal is grasped in response to the triggering of the operability control shown on the screen to terminal
Make and generate, such as clicking operation.As an alternative embodiment, monitoring mechanism is provided in terminal, it is entire to monitor
The touch operation that terminal screen occurs, obtains the attribute information of each touch operation, while also can recognize that in touch operation to can
The real-time click event and moving event of operational control, determine the trigger action, such as according to operability control at end
The position that occurs with touch operation of display area on the screen of end identifies, however, it is determined that out for the triggering of the operability control
Operation, then generate corresponding control trigger request.And terminal is included at least in control trigger request by monitoring the triggering obtained
The attribute information of operation, wherein it is special that the attribute information is used to describe at least one behavior that trigger action occurs on the screen
Sign, such as the behavioural characteristics such as the position touched with screen or response time.
Optionally, trigger action includes clicking operation, i.e., triggering is realized by clicking operability control, correspondingly, point
The attribute information for hitting operation then may include single click on middle pushing operation and lift the respective X axis coordinate of operation, Y axis coordinate and
Response time.Wherein, according to pushing operation and the respective X axis coordinate of operation and Y axis coordinate are lifted, it may be determined that pushing operation and lift
Play the coordinate position of operation respectively on a terminal screen.And generally for the clicking operation of normal human subject for, pushing operation
It is all different with the coordinate position overwhelming majority of operation on the screen is lifted.
Optionally, the clicking operation further includes moving operation, correspondingly, the X axis coordinate of the pushing operation and Y-axis are sat
It is designated as the X axis coordinate and Y axis coordinate of present position when the moving operation finally stops mobile, also as last shift position
Coordinate.For example, user is behind the scenes in finger touch screen, possible this intends to click certain control or the clear-cut only random touching of milli
It touches, user changes mind immediately, wants to click operability control described in the embodiment of the present invention, but user does not lift hand
Refer to, but be moved to the region of operability control by mobile mode (i.e. Move) on the screen, then presses and lift,
It should also be identified as being the trigger action to the operability control at this time.But if user is moved to button response after pinning
It is lifted again outside region, is considered as and evades click, different from responding the clicking operation of this button area.
It should be noted that for general browsings such as the webpages of immobile terminal (such as the end PC), it can be illustrative
Similar monitoring mechanism is set on the end PC, with full frame to the relevant portions such as business charging downloading or advertisement dispensing displaying or the end PC
Region is monitored, to send control trigger request to server.The embodiment of the present invention is answered to the object of terminal monitoring and specifically
Any restriction is not made of scene.
S102, matching verification is carried out to the attribute information based on preset rules, whether determines the control trigger request
For the cheating for the operability control.
Wherein, preset rules include being had for describing each attribute information in cheating trigger action or non-cheating trigger action
Some triggering features, meanwhile, preset rules can also be operated between cheating operation by the non-cheating of continuous analytic learning
Distinguishing characteristics is constantly updated perfect.For example, its pushing operation and lifting operation on the screen in the clicking operation of normal human subject
The coordinate position overwhelming majority is different, and the displacement pressed and lifted generally also will not be too long, such as only 5-10 picture
Element.For another example the adjacent interval time operated twice can't be too short, and interval is usual in the non-cheating operation of normal human subject
In ms rank, and each interval also can be different, but for the situation of software simulator malice brush amount, necessarily frequently
It is triggered, then then can be by the response time of various operations to determine whether cheating.The above is only example, the present invention is real
It applies example and this is not limited in any way.It excavates, trains real suitable for the present invention further, it is also possible to carry out AI study using big data
The Knowledge Verification Model for applying example identifies the attribute information using the Knowledge Verification Model, to determine cheating.
If a certain trigger action is clicking operation, will click on the attribute of operation, for example, pushing operation coordinate, lift behaviour
It the coordinate of work or respective response time, is matched with preset rules, if being unsatisfactory for preset rules, shows the click
Operation is the cheating that the control trigger request of cheating operation namely clicking operation triggering is for operability control.
In addition, in the embodiment of the present invention, after identifying cheating, can also be carried out in combination with actual scene demand pair
The policy response that counter should practise fraud processing, and then effectively optimize the commercial statistics billing amount such as downloading dispensing, download statistics and advertisement promotion
Or ranking experiences relevant coherency.And can be fed back according to mass data and continue AI rule learning, it is constantly extended to more
Among distinct device and intelligent scene.
The embodiment of the present invention can monitor the attribute letter of each touch operation of screen by increasing monitoring mechanism in terminal side
Breath, while can also identify the real-time click event in touch operation to a certain operability control, determining can operate for this
Property control trigger action and its obtained attribute information of monitoring then the attribute information is carried out by server rule-based
Matching verification, it is determined whether there is the cheating for the operability control, to effectively identify and avoid such as soft
Many malicious acts such as part simulator, service request simulation attack, malice brush amount.
Embodiment two
Fig. 2 is the flow chart of anti-cheat detection method provided by Embodiment 2 of the present invention, and the present embodiment two is in embodiment one
On the basis of, the algorithmic rule for carrying out fusion calculation to attribute information is increased for preset rules, to based on default rule
Matching verification then is carried out to the attribute information, determines whether control trigger request is cheating for operability control
Operation be further optimized.As shown in Figure 2, which comprises
S201, the control trigger request that terminal is sent is obtained.
Wherein, control trigger request is terminal in response to the touching of the operability control shown on the screen to the terminal
Hair is operated and is generated, and the attribute information for the trigger action that terminal is obtained by monitoring, attribute are included at least in control trigger request
Information is for describing at least one behavioural characteristic that trigger action occurs on the screen.
It further, further include attribute of the terminal according to algorithmic rule to the trigger action listened in control trigger request
Information carries out at least one verification computational item that fusion calculation obtains.Illustratively, trigger action is clicking operation, attribute letter
When ceasing X axis coordinate, Y axis coordinate, response time including pushing operation, and lifting the X axis coordinate, Y axis coordinate, response of operation
Between, illustratively, above-mentioned six numerical value is respectively indicated with CK1-CK6.Before passing at the terminal, CK7- is generated according to algorithmic rule
This four verification computational items of CK10, wherein algorithmic rule for example can be with are as follows: CK7=CK1+CK2, CK8=CK2+CK3, CK9=
CK3+CK4, CK10=CK4+CK5.It should be noted that algorithmic rule is revealed and is utilized by criminal in order to prevent,
Algorithmic rule can be what dynamic updated, such as update once weekly, can be simple mathematical operation, and it is multiple to be also possible to other
Miscellaneous algorithm, the embodiment of the present invention do not do any restriction to algorithmic rule itself.
After obtaining verification computational item, computational item will be verified and attribute information is used as a part of control trigger request together
Upload server is verified.Herein it should be noted that when being practised fraud using software simulator, before cracking, due to not
Know algorithmic rule, may only have attribute information without including verification computational item in the control trigger request of upload, thus service
Device can be directly the work for operability control according to can directly verify determining control trigger request whether there is or not verification computational item
Disadvantage behavior.Further, it when being practised fraud using software simulator, if it knows that there is also algorithmic rules, but does not know specific
Algorithmic rule details can then generate the verification computational item of same number at random, also upload as a part of control trigger request
Server can carry out cheating detection according to S202-S203 at this time.
S202, fusion calculation is carried out according to attribute information of the algorithmic rule to the trigger action got, obtained
To at least one current verification computational item.
It illustratively, include attribute information CK1-CK6 in the control trigger request uploaded onto the server, and verification calculates
Item CK7-CK10.Server calculates current verification computational item CK7 ', CK8 ' according to algorithmic rule and attribute information CK1-CK6,
CK9 ', CK10 ', for example, CK7 '=CK1+CK2, CK8 '=CK2+CK3, CK9 '=CK3+CK4, CK10 '=CK4+CK5.
S203, at least one of described control trigger request verification computational item is worked as at least one calculated
Verification is compared in preceding verification computational item, according to Inspection as a result, determine again the control trigger request whether be for
The cheating of the operability control.
Illustratively, by the verification computational item CK7 for including in control trigger request and current verification computational item CK7 ' progress
Compare, judge whether the two is identical, similarly may determine that whether CK8 and CK8 ', CK9 and CK9 ', CK10 and CK10 ' are identical.And
And the verification computational item only in control trigger request, with when currently verification computational item is identical, just determination is not practised fraud,
As long as there is a difference, determine that control trigger request is the cheating for operability control.
In the embodiment of the present invention, by increasing algorithmic rule in preset rules, in the attribute letter for receiving terminal upload
After breath and verification computational item, based on algorithmic rule by being verified to the verification computational item, to detect control trigger request
Whether it is cheating for operability control, thus can promotes the accuracy of cheating detection.
Embodiment three
Fig. 3 is the flow chart for the anti-cheat detection method that the embodiment of the present invention three provides, and the present embodiment is in above-described embodiment
On the basis of, equipment verification rule is increased for preset rules, to match to based on preset rules to the attribute information
Verification determines whether control trigger request is to be further optimized for the operation of the cheating of operability control.Such as
Shown in Fig. 3, which comprises
S301, the control trigger request that terminal is sent is obtained.
Further include in the embodiment of the present invention, in control trigger request terminal facility information and terminal locating for environment letter
Breath.Thus can the environmental information according to locating for the facility information of terminal and terminal according to S302 or S303 carry out cheating inspection
It surveys.
S302, based on the facility information knowledge base obtained in advance, verify the consistency of the facility information, according to verifying tie
Fruit determines whether the control trigger request is cheating for the operability control.
Illustratively, the facility information knowledge obtained by the facility information for the terminal for including in control trigger request and in advance
Library is compared, judge terminal whether be the existing terminal in market and terminal other attributes it is whether consistent with configuration information, if
It is no, it is determined that control trigger request is the cheating row for operability control.It should be noted that if uploading to clothes
There is no facility information in the control trigger request of device of being engaged in, then can directly determine control trigger request is for operability control
Cheating.
S303, according to equipment verification rule, verify the trigger action attribute information and the facility information and
The matching degree of environmental information determines whether the control trigger request is for the operability control according to verification result
Cheating.
Illustratively, trigger action is clicking operation, and attribute information is the position coordinates of pushing operation and lifts operation
Position coordinates, thus in screen coordinate system, whether can determine position coordinates according to the screen size of position coordinates and equipment
In screen, if not, it is determined that control trigger request is the cheating for operability control.
Illustratively, environmental information is the brightness of ambient light, may determine that by the brightness of light and is currently at night
Under scene, and normal human user not will do it frequent trigger action usually under night scene.So if according to triggering
The response time of operation determines the frequent progress trigger action under night scene, then can determine that control trigger request is for institute
State the cheating of operability control.It should be noted that environmental information is also possible to other scenes, such as Motion Field
Scape is not specifically limited herein.
It, can be further according to equipment by increasing equipment verification rule in preset rules in the embodiment of the present invention
Information carries out cheating detection, but also the extension of data information model, the scope of application can be carried out for different scenes
Wider, it is more accurate to judge.
Example IV
Fig. 4 is the flow chart for the anti-cheat detection method applied to terminal that the embodiment of the present invention four provides, the present embodiment
It is applicable to the case where anti-cheating detection is carried out to the Internet activity, this method can be practised fraud detection device and executed by counter, should
Device can be realized by the way of software and/or hardware, and can integrate at the terminal, such as smart phone or tablet computer
Deng.As shown in Figure 4, which comprises
S401, control trigger request is generated in response to the trigger action to the operability control.
Wherein, the category for the trigger action that the terminal is obtained by monitoring is included at least in the control trigger request
Property information, the attribute information is for describing at least one behavioural characteristic that the trigger action occurs on the screen.
In embodiments of the present invention, it is provided with monitoring mechanism in terminal, to monitor the touch behaviour that entire terminal screen occurs
Make, illustratively, by customized OnClickListener () method, operates (example to monitor, respond the live touch of user
Such as clicking operation), to obtain the attribute information of each touch operation.Meanwhile passing through customized OnClickListener ()
Method identifies the trigger action to operability control with the real-time click event of monitoring users from the touch operation,
And the attribute information of the trigger action is reported while responding the trigger action.It should be noted that in order to ensure end
End monitoring mechanism goes on smoothly monitoring, needs to be modified terminal system, such as matches the onTouch method that terminal system provides
It is set to and returns to false always, so that Event (event) will not be consumed, do not influence the ongoing operation and monitoring processing of subsequent user.
Further, it before generating control trigger request in response to the trigger action to the operability control, monitors
Real-time control trigger event, such as monitor click event, then it can be carried out according to following operation:
The touch operation occurred on the screen of the terminal is monitored, the attribute information of each touch operation is obtained;
According to the attribute of operability control display area on the screen and each touch operation letter
Breath, identifies the trigger action to the operability control from the touch operation.
S402, the control trigger request is sent to server, so that the server is based on preset rules to described
Attribute information carries out matching verification, determines whether the control trigger request is cheating row for the operability control
For.
Wherein, the preset rules include for describing each attribute information in cheating trigger action or non-cheating trigger action
Possessed triggering feature.
Further, preset rules further include the algorithmic rule for carrying out fusion calculation to the attribute information;
Correspondingly, further including the terminal in the control trigger request according to the algorithmic rule to described in listening to
The attribute information of trigger action carries out at least one verification computational item that fusion calculation obtains.
Further, the preset rules further include equipment verification rule;
Correspondingly, further include in the control trigger request terminal facility information and the terminal locating for environment
Information.
Wherein, detailed description and specific embodiment in relation to preset rules, reference can be made to above-described embodiment, no longer superfluous herein
It states.
Further, in embodiments of the present invention, environment locating for the attribute information, facility information and the terminal is believed
Breath, can be after being encrypted using rivest, shamir, adelman, such as other secure cryptographic algorithms such as AES, carries and touches in the control
It is sent to the server in hair request, with the safety of improve data transfer.
The embodiment of the present invention obtains the attribute information of trigger action by monitoring screen trigger action in real time in terminal side,
On facility information and ambient condition information by attribute information and its verification computational item, terminal that are calculated according to algorithmic rule etc.
Server is passed to, so that passing through the above- mentioned information progress based on preset rules to trigger action and terminal in server side
With verification, the operation whether trigger action belongs to cheating is automatically identified, to effectively monitor cheating.
Embodiment five
Fig. 5 is the structural schematic diagram of the anti-cheating detection device in the embodiment of the present invention five, which is configured at server.
As shown in figure 5, anti-cheating detection device includes:
Request module 501, for obtaining the control trigger request of terminal transmission, wherein the control trigger request
It is that the terminal generates, the control in response to the trigger action of the operability control shown on the screen to the terminal
The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in trigger request, the attribute information is used
In at least one behavioural characteristic that the description trigger action occurs on the screen;
Correction verification module 502 determines the control touching for carrying out matching verification to the attribute information based on preset rules
Whether hair request is cheating for the operability control, wherein the preset rules include for describing cheating
Feature is triggered in trigger action or non-cheating trigger action possessed by each attribute information.
On the basis of the above embodiments, the trigger action includes clicking operation;
Correspondingly, the attribute information includes single clicing on middle pushing operation and lifting to operate respective X axis coordinate, Y-axis
Coordinate and response time.
The clicking operation further includes moving operation;
Correspondingly, the X axis coordinate and Y axis coordinate of the pushing operation are that the moving operation is locating when finally stopping mobile
The X axis coordinate and Y axis coordinate of position.
On the basis of the above embodiments, the preset rules further include for carrying out fusion calculation to the attribute information
Algorithmic rule.
It on the basis of the above embodiments, further include the terminal according to the algorithmic rule in the control trigger request
At least one verification computational item that fusion calculation obtains is carried out to the attribute information of the trigger action listened to;
Correspondingly, the correction verification module further include:
Fusion calculation unit, for being carried out according to attribute information of the algorithmic rule to the trigger action got
Fusion calculation obtains at least one current verification computational item;
First verification unit, for verifying computational item and calculating at least one of described control trigger request
At least one current verification computational item verification is compared, asked according to Inspection as a result, determining that the control triggers again
The no cheating for for the operability control of Seeking Truth.
On the basis of the above embodiments, the preset rules further include equipment verification rule.
It on the basis of the above embodiments, further include the facility information of the terminal in the control trigger request and described
Environmental information locating for terminal;
Correspondingly, the correction verification module further include:
Second authentication unit, for verifying the consistent of the facility information based on the facility information knowledge base obtained in advance
Property determines whether the control trigger request is cheating for the operability control according to verification result;Or
Third verification unit, for verifying attribute information and the institute of the trigger action according to the equipment verification rule
The matching degree for stating facility information and environmental information, according to verification result determine the control trigger request whether be for it is described can
The cheating of operational control.
Anti- work provided by any embodiment of the invention can be performed in anti-detection device of practising fraud provided by the embodiment of the present invention
Disadvantage detection method has the corresponding functional module of execution method and beneficial effect.
Embodiment six
Fig. 6 is the structural schematic diagram of the anti-cheating detection device in the embodiment of the present invention six, which is configured at terminal.Such as
Shown in Fig. 6, anti-detection device of practising fraud includes:
Generation module 601 is requested, is asked for generating control triggering in response to the trigger action to the operability control
It asks, wherein include at least the terminal in the control trigger request and believed by monitoring the attribute of the trigger action obtained
Breath, the attribute information is for describing at least one behavioural characteristic that the trigger action occurs on the screen;
Request sending module 602, for the control trigger request to be sent to server, so that the server is based on
Preset rules carry out matching verification to the attribute information, determine whether the control trigger request is for the operability
The cheating of control, wherein the preset rules include each in cheating trigger action or non-cheating trigger action for describing
Feature is triggered possessed by attribute information.
On the basis of the above embodiments, the onTouch method of the terminal system is configured to return to false always;
Correspondingly, described device further include:
Module is monitored, the touch operation occurred on the screen to the terminal is monitored, and each touch behaviour is obtained
The attribute information of work;
Identification module, for according to operability control display area on the screen and each touch
The attribute information of operation identifies the trigger action to the operability control from the touch operation.
On the basis of the above embodiments, the preset rules further include for carrying out fusion calculation to the attribute information
Algorithmic rule;
Correspondingly, further including the terminal in the control trigger request according to the algorithmic rule to described in listening to
The attribute information of trigger action carries out at least one verification computational item that fusion calculation obtains.
On the basis of the above embodiments, the preset rules further include equipment verification rule;
Correspondingly, further include in the control trigger request terminal facility information and the terminal locating for environment
Information.
On the basis of the above embodiments, environmental information locating for the attribute information, facility information and the terminal is
After being encrypted using rivest, shamir, adelman, carrying is sent to the server in the control trigger request.
Anti- work provided by any embodiment of the invention can be performed in anti-detection device of practising fraud provided by the embodiment of the present invention
Disadvantage detection method has the corresponding functional module of execution method and beneficial effect.
Embodiment seven
Fig. 7 is a kind of structural schematic diagram for server that the embodiment of the present invention seven provides.Fig. 7, which is shown, to be suitable for being used to realizing
The block diagram of the exemplary servers 12 of embodiment of the present invention.The server 12 that Fig. 7 is shown is only an example, should not be to this
The function and use scope of inventive embodiments bring any restrictions.
As shown in fig. 7, server 12 is showed in the form of universal computing device.The component of server 12 may include but not
Be limited to: one or more processor or processing unit 16, system storage 28 connect different system components (including system
Memory 28 and processing unit 16) bus 18.
Bus 18 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller,
Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts
For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC)
Bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) bus.
Server 12 typically comprises a variety of computer system readable media.These media can be and any can be serviced
The usable medium that device 12 accesses, including volatile and non-volatile media, moveable and immovable medium.
System storage 28 may include the computer system readable media of form of volatile memory, such as arbitrary access
Memory (RAM) 30 and/or cache memory 32.Server 12 may further include other removable/nonremovable
, volatile/non-volatile computer system storage medium.Only as an example, storage system 34 can be used for reading and writing not removable
Dynamic, non-volatile magnetic media (Fig. 7 do not show, commonly referred to as " hard disk drive ").Although being not shown in Fig. 7, can provide
Disc driver for being read and write to removable non-volatile magnetic disk (such as " floppy disk "), and to removable anonvolatile optical disk
The CD drive of (such as CD-ROM, DVD-ROM or other optical mediums) read-write.In these cases, each driver can
To be connected by one or more data media interfaces with bus 18.Memory 28 may include at least one program product,
The program product has one group of (for example, at least one) program module, these program modules are configured to perform each implementation of the invention
The function of example.
Program/utility 40 with one group of (at least one) program module 42 can store in such as memory 28
In, such program module 42 include but is not limited to operating system, one or more application program, other program modules and
It may include the realization of network environment in program data, each of these examples or certain combination.Program module 42 is usual
Execute the function and/or method in embodiment described in the invention.
Server 12 can also be with one or more external servers 14 (such as keyboard, sensing equipment, display 24 etc.)
Communication, can also be enabled a user to one or more equipment interact with the server 12 communicate, and/or with make the service
Any equipment (such as network interface card, modem etc.) that device 12 can be communicated with one or more of the other calculating equipment is logical
Letter.This communication can be carried out by input/output (I/O) interface 22.Also, server 12 can also pass through network adapter
20 is logical with one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet)
Letter.As shown, network adapter 20 is communicated by bus 18 with other modules of server 12.Although should be understood that in figure
It is not shown, other hardware and/or software module can be used in conjunction with server 12, including but not limited to: microcode, device drives
Device, redundant processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Processing unit 16 by the program that is stored in system storage 28 of operation, thereby executing various function application and
Data processing, such as realize the anti-cheat detection method for being applied to server provided by the embodiment of the present invention, this method comprises:
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to institute
It states the trigger action of the operability control shown on the screen of terminal and generates, institute is included at least in the control trigger request
The attribute information for the trigger action that terminal is obtained by monitoring is stated, the attribute information exists for describing the trigger action
At least one behavioural characteristic occurred on the screen;
Matching verification is carried out to the attribute information based on preset rules, determine the control trigger request whether be for
The cheating of the operability control, wherein the preset rules include for describing cheating trigger action or non-cheating
Feature is triggered in trigger action possessed by each attribute information.
The embodiment of the invention also provides a kind of terminals comprising: one or more processors;Memory, for storing
One or more programs, when one or more of programs are executed by one or more of processors so that it is one or
Multiple processors realize the anti-cheat detection method for being applied to terminal provided by the embodiment of the present invention, comprising:
Control trigger request is generated in response to the trigger action to the operability control, wherein the control triggering
The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching
State at least one behavioural characteristic that the trigger action occurs on the screen;
The control trigger request is sent to server, so that the server is based on preset rules and believes the attribute
Breath carries out matching verification, determines whether the control trigger request is cheating for the operability control, wherein
The preset rules include for describing triggering possessed by each attribute information in cheating trigger action or non-cheating trigger action
Feature.
Certainly, it will be understood by those skilled in the art that processor can also realize it is provided by any embodiment of the invention
The technical solution of anti-cheat detection method applied to terminal.The hardware configuration and function of the mobile terminal can be found in embodiment
Seven content is explained.
Embodiment eight
The embodiment of the present invention eight additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should
The anti-cheat detection method for being applied to server as provided by the embodiment of the present invention, the party are realized when program is executed by processor
Method includes:
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to institute
It states the trigger action of the operability control shown on the screen of terminal and generates, institute is included at least in the control trigger request
The attribute information for the trigger action that terminal is obtained by monitoring is stated, the attribute information exists for describing the trigger action
At least one behavioural characteristic occurred on the screen;
Matching verification is carried out to the attribute information based on preset rules, determine the control trigger request whether be for
The cheating of the operability control, wherein the preset rules include for describing cheating trigger action or non-cheating
Feature is triggered in trigger action possessed by each attribute information.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media
Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable
Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or
Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool
There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires
(ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-
ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage
Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device
Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited
In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can
Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for
By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited
In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof
Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++,
Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with
It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion
Divide and partially executes or executed on a remote computer or server completely on the remote computer on the user computer.?
Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or
Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service
It is connected for quotient by internet).
The embodiment of the invention also provides another computer readable storage medium, the computer executable instructions by
For executing a kind of anti-cheat detection method applied to terminal when computer processor executes, this method comprises:
Control trigger request is generated in response to the trigger action to the operability control, wherein the control triggering
The attribute information for the trigger action that the terminal is obtained by monitoring is included at least in request, the attribute information is for retouching
State at least one behavioural characteristic that the trigger action occurs on the screen;
The control trigger request is sent to server, so that the server is based on preset rules and believes the attribute
Breath carries out matching verification, determines whether the control trigger request is cheating for the operability control, wherein
The preset rules include for describing triggering possessed by each attribute information in cheating trigger action or non-cheating trigger action
Feature.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention
The method operation that executable instruction is not limited to the described above, can also be performed provided by any embodiment of the invention be applied to eventually
Relevant operation in the anti-cheat detection method at end.It can be found in the content in embodiment eight to the introduction of storage medium to explain.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that
The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation,
It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention
It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also
It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.
Claims (16)
1. a kind of anti-cheat detection method is applied to server characterized by comprising
Obtain the control trigger request that terminal is sent, wherein the control trigger request is the terminal in response to the end
The trigger action of the operability control shown on the screen at end and generate, in the control trigger request include at least the end
The attribute information for the trigger action that end is obtained by monitoring, the attribute information is for describing the trigger action described
At least one behavioural characteristic occurred on screen;
Matching verification is carried out to the attribute information based on preset rules, determines whether the control trigger request is for described
The cheating of operability control, wherein the preset rules include for describing cheating trigger action or non-cheating triggering
Feature is triggered in operation possessed by each attribute information.
2. the method according to claim 1, wherein
The trigger action includes clicking operation;Correspondingly, the attribute information includes single clicing on middle pushing operation and lifting
Operate respective X axis coordinate, Y axis coordinate and response time;
The clicking operation further includes moving operation;Correspondingly, the X axis coordinate and Y axis coordinate of the pushing operation are the shifting
The dynamic last X axis coordinate and Y axis coordinate for stopping present position when movement of operation.
3. the method according to claim 1, wherein the preset rules further include for the attribute information
Carry out the algorithmic rule of fusion calculation.
4. according to the method described in claim 3, further including that the terminal is advised according to the algorithm in the control trigger request
At least one verification computational item that fusion calculation obtains then is carried out to the attribute information of the trigger action listened to;
Correspondingly, described carry out matching verification to the attribute information based on preset rules, determine that the control trigger request is
The no cheating for for the operability control, further includes:
Fusion calculation is carried out according to attribute information of the algorithmic rule to the trigger action got, obtains at least one
Current verification computational item;
At least one the current master gage that at least one of described control will trigger request verification computational item and calculate
It calculates item and verification is compared, according to Inspection as a result, determining whether the control trigger request is to grasp for described again
The cheating of the property made control.
5. the method according to claim 1, wherein the preset rules further include equipment verification rule.
6. according to the method described in claim 5, it is characterized in that, further including setting for the terminal in the control trigger request
Environmental information locating for standby information and the terminal;
Correspondingly, described carry out matching verification to the attribute information based on preset rules, determine that the control trigger request is
The no cheating for for the operability control, further includes:
Based on the facility information knowledge base obtained in advance, the consistency of the facility information is verified, institute is determined according to verification result
State whether control trigger request is cheating for the operability control;Or
According to equipment verification rule, the attribute information and the facility information and environmental information of the trigger action are verified
Matching degree determines whether the control trigger request is cheating for the operability control according to verification result.
7. a kind of anti-cheat detection method is applied to terminal, shows operability control, feature on the screen of the terminal
It is, which comprises
Control trigger request is generated in response to the trigger action to the operability control, wherein the control trigger request
In include at least the terminal by monitoring the attribute information of the trigger action obtained, the attribute information is for describing institute
State at least one behavioural characteristic that trigger action occurs on the screen;
The control trigger request is sent to server so that the server be based on preset rules to the attribute information into
Row matching verification determines whether the control trigger request is cheating for the operability control, wherein described
Preset rules include for describing to trigger feature in cheating trigger action or non-cheating trigger action possessed by each attribute information.
8. the method according to the description of claim 7 is characterized in that the onTouch method of the terminal system is configured to always
Return to false;
Correspondingly, before generating control trigger request in response to the trigger action to the operability control, the method
Further include:
The touch operation occurred on the screen of the terminal is monitored, the attribute information of each touch operation is obtained;
According to operability control display area on the screen and the attribute information of each touch operation, from
The trigger action to the operability control is identified in the touch operation.
9. the method according to the description of claim 7 is characterized in that the preset rules further include for the attribute information
Carry out the algorithmic rule of fusion calculation;
Correspondingly, further including the triggering of the terminal according to the algorithmic rule to listening in the control trigger request
The attribute information of operation carries out at least one verification computational item that fusion calculation obtains.
10. the method according to the description of claim 7 is characterized in that the preset rules further include equipment verification rule;
Correspondingly, further include in the control trigger request terminal facility information and the terminal locating for environment letter
Breath.
11. a kind of anti-cheating detection device, is configured at server, which is characterized in that described device includes:
Request module, for obtaining the control trigger request of terminal transmission, wherein the control trigger request is the end
It holds the trigger action in response to the operability control shown on the screen to the terminal and generates, the control trigger request
In include at least the terminal by monitoring the attribute information of the trigger action obtained, the attribute information is for describing institute
State at least one behavioural characteristic that trigger action occurs on the screen;
Correction verification module determines the control trigger request for carrying out matching verification to the attribute information based on preset rules
It whether is cheating for the operability control, wherein the preset rules include for describing cheating triggering behaviour
Feature is triggered in work or non-cheating trigger action possessed by each attribute information.
12. a kind of anti-cheating detection device, is configured at terminal, operability control is shown on the screen of the terminal, special
Sign is that described device includes:
Generation module is requested, for generating control trigger request in response to the trigger action to the operability control, wherein
The attribute information for the trigger action that the terminal is obtained by monitoring, the category are included at least in the control trigger request
Property information for describing at least one behavioural characteristic that the trigger action occurs on the screen;
Request sending module, for the control trigger request to be sent to server, so that the server is based on default rule
Matching verification then is carried out to the attribute information, determines whether the control trigger request is for the operability control
Cheating, wherein the preset rules include for describing each attribute letter in cheating trigger action or non-cheating trigger action
Feature is triggered possessed by breath.
13. a kind of server characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
Now such as anti-cheat detection method as claimed in any one of claims 1 to 6.
14. a kind of terminal characterized by comprising
One or more processors;
Storage device, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors are real
The now anti-cheat detection method as described in any in claim 7-10.
15. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
Such as anti-cheat detection method as claimed in any one of claims 1 to 6 is realized when execution.
16. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The anti-cheat detection method as described in any in claim 7-10 is realized when execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910579138.4A CN110322289A (en) | 2019-06-28 | 2019-06-28 | A kind of anti-cheat detection method, device, server, terminal and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910579138.4A CN110322289A (en) | 2019-06-28 | 2019-06-28 | A kind of anti-cheat detection method, device, server, terminal and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110322289A true CN110322289A (en) | 2019-10-11 |
Family
ID=68120666
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910579138.4A Pending CN110322289A (en) | 2019-06-28 | 2019-06-28 | A kind of anti-cheat detection method, device, server, terminal and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110322289A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116070180A (en) * | 2022-11-10 | 2023-05-05 | 支付宝(杭州)信息技术有限公司 | Security service execution method and device, storage medium and electronic equipment |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150326604A1 (en) * | 2014-05-08 | 2015-11-12 | Popo Technologies, Inc. | Rules based monitoring and intrusion detection system |
CN107483443A (en) * | 2017-08-22 | 2017-12-15 | 北京京东尚科信息技术有限公司 | advertisement information processing method, client, storage medium and electronic equipment |
CN108109011A (en) * | 2017-12-28 | 2018-06-01 | 北京皮尔布莱尼软件有限公司 | A kind of anti-cheat method of advertisement and computing device |
CN109829300A (en) * | 2019-01-02 | 2019-05-31 | 广州大学 | APP dynamic depth malicious act detection device, method and system |
-
2019
- 2019-06-28 CN CN201910579138.4A patent/CN110322289A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150326604A1 (en) * | 2014-05-08 | 2015-11-12 | Popo Technologies, Inc. | Rules based monitoring and intrusion detection system |
CN107483443A (en) * | 2017-08-22 | 2017-12-15 | 北京京东尚科信息技术有限公司 | advertisement information processing method, client, storage medium and electronic equipment |
CN108109011A (en) * | 2017-12-28 | 2018-06-01 | 北京皮尔布莱尼软件有限公司 | A kind of anti-cheat method of advertisement and computing device |
CN109829300A (en) * | 2019-01-02 | 2019-05-31 | 广州大学 | APP dynamic depth malicious act detection device, method and system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116070180A (en) * | 2022-11-10 | 2023-05-05 | 支付宝(杭州)信息技术有限公司 | Security service execution method and device, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10970026B2 (en) | Application launching in a multi-display device | |
CN105378624A (en) | Showing interactions as they occur on a whiteboard | |
US10275341B2 (en) | Mobile application usability testing | |
CN109614207A (en) | Processing method, equipment and the computer readable storage medium of boarding application | |
US10546509B2 (en) | Evaluating user contribution in collaborative environments | |
CN110225104A (en) | Data capture method, device and terminal device | |
CN107194213A (en) | A kind of personal identification method and device | |
WO2020038089A1 (en) | Terminal, method and device for performing operations on terminal, and storage medium | |
CN109710332A (en) | Processing method, equipment and the computer readable storage medium of boarding application | |
CN109806591A (en) | Signature generating method and device in scene of game | |
CN110322289A (en) | A kind of anti-cheat detection method, device, server, terminal and storage medium | |
CN105474164A (en) | Disambiguation of indirect input | |
CN107862035A (en) | Network read method, device, Intelligent flat and the storage medium of minutes | |
CN112818733A (en) | Information processing method, device, storage medium and terminal | |
CN115171222B (en) | Behavior detection method and device, computer equipment and storage medium | |
CN116542740A (en) | Live broadcasting room commodity recommendation method and device, electronic equipment and readable storage medium | |
CN115690373A (en) | Road network generation method and device, computer readable storage medium and computer equipment | |
CN112669057B (en) | Data prediction method and device, electronic equipment and storage medium | |
CN109444905A (en) | A kind of dynamic object detection method, device and terminal device based on laser | |
CN110188532A (en) | A kind of cipher code protection method and device | |
CN108804007A (en) | Image-pickup method, device, storage medium and electronic equipment | |
CN109348236A (en) | A kind of storage capacity evaluation method, apparatus, server and storage medium | |
CN116980236B (en) | Network security detection method, device, equipment and storage medium | |
CN116112556A (en) | Data processing method, device, medium and equipment | |
CN114780504A (en) | Web end interaction management method and device, storage medium and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |