CN111079140B - Method, device and system for preventing cheating - Google Patents
Method, device and system for preventing cheating Download PDFInfo
- Publication number
- CN111079140B CN111079140B CN201811217390.2A CN201811217390A CN111079140B CN 111079140 B CN111079140 B CN 111079140B CN 201811217390 A CN201811217390 A CN 201811217390A CN 111079140 B CN111079140 B CN 111079140B
- Authority
- CN
- China
- Prior art keywords
- check
- address
- application
- mobile device
- detecting whether
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 41
- 230000006399 behavior Effects 0.000 claims abstract description 12
- 230000004044 response Effects 0.000 claims abstract description 9
- 238000012545 processing Methods 0.000 claims description 26
- 230000002159 abnormal effect Effects 0.000 claims description 14
- 230000006870 function Effects 0.000 claims description 14
- 230000009471 action Effects 0.000 claims description 10
- 238000003860 storage Methods 0.000 description 18
- 238000010586 diagram Methods 0.000 description 17
- 238000004590 computer program Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 8
- 238000001514 detection method Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 5
- 230000001815 facial effect Effects 0.000 description 5
- 230000005540 biological transmission Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 230000005856 abnormality Effects 0.000 description 2
- 238000007796 conventional method Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- 206010000117 Abnormal behaviour Diseases 0.000 description 1
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 230000002547 anomalous effect Effects 0.000 description 1
- 230000001680 brushing effect Effects 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/109—Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/1091—Recording time for administrative or management purposes
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C1/00—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
- G07C1/10—Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Software Systems (AREA)
- Educational Administration (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- Marketing (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Information Transfer Between Computers (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域technical field
本公开的实施例总体上涉及计算机领域,并且更具体地涉及用于防作弊的方法、设备以及系统。Embodiments of the present disclosure generally relate to the field of computers, and more particularly relate to methods, devices and systems for preventing cheating.
背景技术Background technique
随着移动互联网的快速发展,在移动终端上涌现了各种各样的智能应用。取代传统的刷卡签到或者指纹签到,人们开始使用移动终端来进行签到。例如,人们点击签到应用的刷脸按钮后,服务器可以验证移动终端是否处于合法地点,此外,在通过地点验证之后,还可以通过人脸识别来验证是否由用户本人操作。以这种方式,可以实现使用移动终端上的智能签到服务。With the rapid development of the mobile Internet, various smart applications have emerged on mobile terminals. Instead of traditional card swiping sign-in or fingerprint sign-in, people began to use mobile terminals to sign in. For example, after people click the face-swiping button of the sign-in application, the server can verify whether the mobile terminal is in a legal place. In addition, after passing the location verification, it can also use face recognition to verify whether it is operated by the user himself. In this way, the smart check-in service on the mobile terminal can be realized.
由于用户的签到影响到考勤,甚至影响用户的绩效考核和经济收入,因此,某些用户会使用各种各样的方法来进行作弊,以在不到达规定地点的情况下实现成功签到。例如,用户使用某些作弊工具来模拟操作系统的应用程序接口(API)来进行欺骗,这种作弊工具只要成功地记录合法的地点信息之后,就可以绕过系统对签到地点的校验环节,从而使得用户在家甚至在任何地方可以进行刷脸签到。Since the user's check-in affects attendance, and even affects the user's performance appraisal and economic income, some users will use various methods to cheat in order to achieve successful check-in without arriving at the specified place. For example, users use some cheating tools to simulate the application program interface (API) of the operating system to cheat. As long as this cheating tool successfully records the legal location information, it can bypass the verification link of the system for the check-in location. This allows users to sign in with their faces at home or even anywhere.
发明内容Contents of the invention
本公开的实施例提供了一种用于防作弊的方法、设备和计算机程序产品。Embodiments of the present disclosure provide a method, device and computer program product for preventing cheating.
在本公开的第一方面,提供了一种用于防作弊的方法。该方法包括:在移动设备上运行用于刷脸签到的签到应用;检测签到应用是否在虚拟化系统上运行;以及响应于检测到签到应用是在虚拟化系统上运行,确定移动设备上存在作弊行为。In a first aspect of the present disclosure, a method for preventing cheating is provided. The method includes: running a sign-in application for face-swiping sign-in on the mobile device; detecting whether the sign-in application is running on a virtualization system; and determining that there is cheating on the mobile device in response to detecting that the sign-in application is running on a virtualization system Behavior.
在本公开的第二方面,提供了一种用于防作弊的方法。该方法包括:获得移动设备的IP地址,其中移动设备上正运行用于刷脸签到的签到应用;检测IP地址是否存在异常;以及响应于检测到IP地址是存在异常,确定移动设备上存在作弊行为。In a second aspect of the present disclosure, a method for preventing cheating is provided. The method includes: obtaining the IP address of the mobile device, wherein the mobile device is running a sign-in application for face-swiping sign-in; detecting whether the IP address is abnormal; and in response to detecting that the IP address is abnormal, determining that there is cheating on the mobile device Behavior.
在本公开的第三方面,提供了一种移动设备。该移动设备包括处理单元以及存储器,其中存储器被耦合至处理单元并且存储有指令。所述指令在由处理单元执行时执行以下动作:在移动设备上运行用于刷脸签到的签到应用;检测签到应用是否在虚拟化系统上运行;以及响应于检测到签到应用是在虚拟化系统上运行,确定移动设备上存在作弊行为。In a third aspect of the present disclosure, a mobile device is provided. The mobile device includes a processing unit and a memory coupled to the processing unit and storing instructions. The instructions perform the following actions when executed by the processing unit: run a sign-in application for face-scanning sign-in on the mobile device; detect whether the sign-in application is running on the virtualization system; and respond to detecting that the sign-in application is running on the virtualization system run on mobile devices to determine the presence of cheating on mobile devices.
在本公开的第四方面,提供了一种服务器。该移动设备包括处理单元以及存储器,其中存储器被耦合至处理单元并且存储有指令。所述指令在由处理单元执行时执行以下动作:获得移动设备的IP地址,其中移动设备上正运行用于刷脸签到的签到应用;检测IP地址是否存在异常;以及响应于检测到IP地址是存在异常,确定移动设备上存在作弊行为。In a fourth aspect of the present disclosure, a server is provided. The mobile device includes a processing unit and a memory coupled to the processing unit and storing instructions. The instructions perform the following actions when executed by the processing unit: obtain the IP address of the mobile device, where the mobile device is running a sign-in application for face-swiping sign-in; detect whether the IP address is abnormal; and respond to detecting that the IP address is There is an anomaly that determines that cheating has occurred on the mobile device.
在本公开的第五方面,提供了一种用于防作弊的系统。该系统包括根据本公开的实施例的移动设备以及根据本公开的实施例的服务器。In a fifth aspect of the present disclosure, a system for preventing cheating is provided. The system includes a mobile device according to an embodiment of the present disclosure and a server according to an embodiment of the present disclosure.
提供发明内容部分是为了简化的形式来介绍对概念的选择,它们在下文的具体实施方式中将被进一步描述。本发明内容部分无意标识本公开的关键特征或主要特征,也无意限制本公开的各个实施例的范围。This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or principal characteristics of the disclosure, nor is it intended to limit the scope of the various embodiments of the disclosure.
附图说明Description of drawings
通过结合附图对本公开示例性实施例进行更详细的描述,本公开的上述以及其它目的、特征和优势将变得更加明显,其中在本公开示例性实施例中,相同的附图标记通常代表相同的元素。The above and other objects, features and advantages of the present disclosure will become more apparent by describing the exemplary embodiments of the present disclosure in more detail with reference to the accompanying drawings, wherein in the exemplary embodiments of the present disclosure, the same reference numerals generally represent the same elements.
图1示出了使用虚拟化系统进行作弊的传统技术的示意图;Fig. 1 shows the schematic diagram of the conventional technique of cheating using a virtualization system;
图2示出了根据本公开的实施例的用于防作弊的示例环境的示意图;Figure 2 shows a schematic diagram of an example environment for anti-cheating according to an embodiment of the present disclosure;
图3示出了根据本公开的实施例的用于防作弊的方法的流程图;FIG. 3 shows a flowchart of a method for preventing cheating according to an embodiment of the present disclosure;
图4示出了根据本公开的实施例的用于将作弊用户添加到黑名单的方法的流程图;FIG. 4 shows a flowchart of a method for adding a cheating user to a blacklist according to an embodiment of the present disclosure;
图5示出了根据本公开的实施例的用于提示用户作弊行为的图形用户界面(GUI)的示图;FIG. 5 shows a diagram of a graphical user interface (GUI) for prompting a user to cheat according to an embodiment of the present disclosure;
图6示出了根据本公开的实施例的用于防作弊的另一方法的流程图;FIG. 6 shows a flowchart of another method for preventing cheating according to an embodiment of the present disclosure;
图7示出了根据本公开的实施例的用于防作弊的示例过程的流程图;以及Figure 7 shows a flow diagram of an example process for preventing cheating according to an embodiment of the present disclosure; and
图8示出了可以用来实施本公开的实施例的设备的示意性块图。Fig. 8 shows a schematic block diagram of an apparatus that may be used to implement embodiments of the present disclosure.
具体实施例specific embodiment
下面将参照附图更详细地描述本公开的优选实施例。虽然附图中显示了本公开的一些具体实施例,然而应该理解,可以以各种形式实现本公开,而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了使本公开更加透彻和完整,并且能够将本公开的范围完整地传达给本领域的技术人员。Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although specific embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be embodied in various forms and is not limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
在本文中使用的术语“包括”及其变形表示开放性包括,即“包括但不限于”。除非特别申明,术语“或”表示“和/或”。术语“基于”表示“至少部分地基于”。术语“一个示例实施例”和“一个实施例”表示“至少一个示例实施例”。术语“另一实施例”表示“至少一个另外的实施例”。术语“第一”、“第二”等可以指代不同的或相同的对象,除非明确指示不同。As used herein, the term "comprise" and its variants mean open inclusion, ie "including but not limited to". The term "or" means "and/or" unless otherwise stated. The term "based on" means "based at least in part on". The terms "one example embodiment" and "one embodiment" mean "at least one example embodiment." The term "another embodiment" means "at least one further embodiment". The terms "first", "second", etc. may refer to different or the same object, unless a different is clearly indicated.
为了破解对用户地点的检验,一些作弊工具使用虚拟化空间来模拟移动设备所处的地点。图1示出了使用虚拟化系统进行作弊的传统技术的示意图100。在移动设备上安装作弊软件之后,移动设备中除了操作系统110本身之外,还会创建一个虚拟化的空间,在虚拟化空间中存在虚拟化系统120。虚拟化系统120中存在一个应用虚拟化引擎,其允许用户在虚拟化系统120中安装、启动或卸载应用,而与操作系统110相隔离。此外,这种技术还能够获取操作系统110的任何系统服务,并在虚拟化系统120中建立与系统服务相对应的代理服务。当运行在虚拟化系统120中的签到应用调用系统服务时,实际上调用的是虚拟化系统120中提供的代理服务。如图1中箭头131所示,运行在虚拟化系统110中的签到应用125调用操作系统110的系统服务;如箭头132所示,操作系统110提供系统服务并发送给代理服务模块123。接下来,如箭头133所示,代理服务模块123将替换后的代理服务发送给签到应用125,从而实现向签到应用125提供虚假的系统服务。由此可见,现有的作弊方案能够绕过操作系统对无线路由器信息的校验,实现虚假的作弊签到,其能记录职场无线路由器信息并保存到虚拟化空间中,然后在后续的签到过程中使用已保存的无线路由器信息来进行伪造,使得用户在任何地点都能成功刷脸。To break the check on the user's location, some cheat tools use a virtualized space to simulate the location of the mobile device. FIG. 1 shows a schematic diagram 100 of a conventional technique of cheating using a virtualization system. After the cheating software is installed on the mobile device, in addition to the
为此,本公开的实施例提出了一种用于防作弊的新方案。根据本公开的实施例,通过检测签到应用是否在虚拟化环境中运行,能够判断签到应用是否存在作弊行为,从而防止用户的作弊签到。此外,本公开的实施例还可以通过在服务器端检测移动设备的IP地址是否异常来备选地或者附加地检测作弊行为。For this reason, the embodiments of the present disclosure propose a new scheme for preventing cheating. According to the embodiments of the present disclosure, by detecting whether the sign-in application is running in a virtualized environment, it can be determined whether the sign-in application has cheating behavior, thereby preventing cheating sign-in of the user. In addition, the embodiments of the present disclosure may alternatively or additionally detect cheating by detecting whether the IP address of the mobile device is abnormal at the server side.
以下参考图2至图8来说明本公开的基本原理和若干示例实现方式。应当理解,给出这些示例性实施例仅是为了使本领域技术人员能够更好地理解进而实现本公开的实施例,而并非以任何方式限制本公开的范围。The basic principles and several example implementations of the present disclosure are explained below with reference to FIGS. 2 to 8 . It should be understood that these exemplary embodiments are given only to enable those skilled in the art to better understand and implement the embodiments of the present disclosure, but not to limit the scope of the present disclosure in any way.
图2示出了根据本公开的实施例的用于防作弊的示例环境200的示意图。如图2所示,环境200包括移动设备210(也即客户端)和服务器220,它们通过网络230互相连接,网络230可以为有线网络和/或无线网络。移动设备210可以为任何可以移动的电子设备,诸如智能手机、平板电脑等,其通常具有无线网络连接功能和摄像功能。服务器220通常指代位于远程的高性能处理设备。应当理解,图1中的移动设备和服务器还可以包括其他未示出的部件或模块。FIG. 2 shows a schematic diagram of an
参考图2,在移动设备210上正运行签到应用215,通过签到应用215可以实现基于移动网络的考勤服务。根据本公开的实施例,通过检测签到应用是否在虚拟化环境中运行,能够判断签到应用是否存在作弊行为,从而防止用户的作弊签到。此外,附加地或备选地,可以在服务器220检测移动设备210的IP地址是否异常来检测是否存在作弊行为。以下参考图3-图8进一步描述了如何检测作弊行为的示例实现。Referring to FIG. 2 , a sign-in
图3示出了根据本公开的实施例的用于防作弊的方法300的流程图。应当理解,方法300可以由以上参考图2所描述的移动设备210来执行。在框302,在移动设备上运行用于刷脸签到的签到应用。例如,首先在移动设备210上运行签到应用215以用于后续的作弊行为检测。Fig. 3 shows a flowchart of a
在框304,检测签到应用是否在虚拟化系统上运行。在一些实施例中,可以检测移动设备的操作系统中的特定类是否由通过虚拟化技术而被提供。例如,操作系统可以为安卓操作系统,特定类可以为安卓操作系统中的Instrumentation类。然而,移动设备也可以为其他的操作系统并且检测其他操作系统中与虚拟化调用有关的特定类。At
在框306,响应于检测到签到应用是在虚拟化系统上运行,确定移动设备上存在作弊行为。例如,Instrumentation类在安卓操作系统和虚拟化系统中存在差异,并且虚拟化技术无法绕过检测而进行作弊。在安卓操作系统中,Instrumentation类的存在形式为android.app.Instrumentation;相反,在虚拟化系统中,Instrumentation类的存在形式为com.lody.virtual.client.hook.delegate.AppInstrumentation。因此,通过检测Instrumentation类的名称或存在形式,可以判断签到应用是否是在虚拟化系统中运行,从而检测移动设备上是否存在作弊签到行为。At
图4示出了根据本公开的实施例的用于将作弊用户添加到黑名单的方法400的流程图。应当理解,方法400可以由以上参考图2所描述的移动设备210来执行,并且可以在图3所描述的方法300之后进行执行。FIG. 4 shows a flowchart of a
在框402,在移动设备上禁止签到应用中的刷脸签到功能。在一些实施例中,可以阻止移动设备的用户使用虚拟化来伪造无线路由器信息进行刷脸签到。在一些实施例中,可以向移动设备的用户提示运行异常,并且提示用户退出签到应用并且重新启动签到应用。例如,图5示出了根据本公开的实施例的用于提示用户作弊行为的GUI 500的示图。用户点击移动设备210的界面上的刷脸按钮211,然后进行刷脸以进行签到。当检测到签到应用是在虚拟化系统中运行时,可以向用户提示警告212,用户可以选择重启签到应用进行重试。对于使用作弊软件的用户而言,其无法实现在移动设备的签到应用中的成功签到。In
在框404,移动设备向服务器发送在签到应用中已经登录的用户账户信息。在框406,服务器将用户账户信息添加到黑名单。例如,如果检测到作弊行为,移动设备将把作弊的用户账户信息发送给服务器,服务器然后将该作弊用户添加到黑名单。In
图6示出了根据本公开的实施例的用于防作弊的另一方法600的流程图。应当理解,方法600可以由以上参考图2所描述的服务器220来执行。在框602,获得移动设备的IP地址,其中移动设备上正运行用于签到的签到应用。例如,图2中所描述的移动设备210上正运行签到应用215。FIG. 6 shows a flowchart of another
在框604,检测IP地址是否存在异常。在一些实施例中,可以预先设置IP地址白名单,其可以通过人工或自动的方式被收集,并且包括用户的工作场所和会议场所等合法的地点的路由器的网络地址,然后,可以检测移动设备的IP地址是否在IP地址白名单上。In
在一些实施例中,还可以获得移动设备所连接的无线路由器的基本服务集标识符(BSSID),然后基于BSSID来检测IP地址是否存在异常。在一些实施例中,可以统计与BSSID相对应的最大概率IP地址;并且基于IP地址与最大概率IP地址的比较,确定IP地址是否存在异常。例如,针对同一个BSSID(其IP地址应当是固定和/或唯一的),三个移动设备存在两种地址,即第一设备和第二设备为第一地址,第三设备为第二地址,则可以认为这个BSSID对应的地址应当为第一地址,而第三设备存在作弊行为。此外,可以统计每个BSSID在一些天的IP地址分布,从而确定每个BSSID的最佳可信IP地址。In some embodiments, the Basic Service Set Identifier (BSSID) of the wireless router to which the mobile device is connected may also be obtained, and then based on the BSSID, it is detected whether the IP address is abnormal. In some embodiments, the IP address with the highest probability corresponding to the BSSID can be counted; and based on the comparison between the IP address and the IP address with the highest probability, it is determined whether the IP address is abnormal. For example, for the same BSSID (its IP address should be fixed and/or unique), there are two kinds of addresses for three mobile devices, that is, the first device and the second device are the first address, the third device is the second address, Then it can be considered that the address corresponding to this BSSID should be the first address, and the third device has cheating behavior. In addition, the IP address distribution of each BSSID in some days can be counted, so as to determine the best trusted IP address of each BSSID.
在框606,响应于检测到IP地址是存在异常,确定移动设备上存在作弊行为。也就是说,虽然用户端可能通过虚拟化技术等绕过BSSID的检测,绕过了对于WiFi的检测,但是其无法伪装成真实的IP地址来与服务器进行通信。例如,正常情况下,连接到对应的BSSID的移动设备应当具有某一地址,如果出现连接到BSSID的移动设备不是这一地址,则说明这一设备具有作弊嫌疑。一般来说,正常的签到对应的是职场中的路由器的IP地址,而作弊签到对应的是家中或者移动网络中的IP地址。因此,通过检测移动设备的IP地址的异常,可以备选地和/或附加地检测用户的作弊行为。在一些实施例中,通过组合移动设备端的虚拟化检测和服务器端的IP地址异常检测,可以形成双重检测的防作弊方案。At
在一些实施例,本公开的实施例可以用于基于移动互联网的智能签到。在一些实施例中,本公开的防作弊方案可以用于保险公司的营销员的参会签到,从而可以判断营销员是否在正确的地点和时间由本人参会。In some embodiments, the embodiments of the present disclosure can be used for smart sign-in based on mobile internet. In some embodiments, the anti-cheating scheme of the present disclosure can be used for the sign-in of the salesperson of the insurance company, so that it can be judged whether the salesperson attends the meeting by himself at the correct place and time.
图7示出了根据本公开的实施例的用于防作弊的示例过程700的流程图。在框702,用户使用其账户和密码登录签到应用,或者自动进行登录。在框704,检测签到应用是否是在虚拟化系统中运行,例如可以使用以上所描述实施例来判断签到应用是否是在虚拟化系统中运行。如果在框704检测到签到应用是在虚拟化系统中运行,则说明存在作弊行为,在框720指示签到失败。FIG. 7 shows a flow diagram of an
如果在框704检测到签到应用不是在虚拟化系统中运行,则在框706用户点击点我刷脸按钮。在框708,签到应用读取移动设备所连接的WiFi信息和IP地址。在框710,服务器检测移动设备的IP地址是否存在异常,例如可以使用以上所描述的实施例来判断IP地址是否异常。如果在710检测到IP地址存在异常,则说明存在作弊行为,在框720指示签到失败。If it is detected in
如果在710检测到IP地址不存在异常,则在框712进一步检测WiFi信息是否合规,例如,可以判断所连接的无线路由器的BSSID地址是否在预定的列表中。如果检在712测到WiFi信息不合规,则说明存在作弊行为,在框720指示签到失败。If it is detected at 710 that there is no abnormality in the IP address, then at
如果在712检测到WiFi信息合规,则在框714调用摄像头开始用户刷脸。也就是说,当IP地址和BSSID都合规时,才能进入用户刷脸环节。接下来,在框716,检测刷脸是否通过。例如,可以检测是否是活体图像,并且检测所摄取的图像是否是用户本人。如果刷脸检测通过,则在框718指示签到成功,反之则在框720指示签到失败。应当理解,过程700中的动作可以以与图7中所示出顺序不同的顺序进行执行。If it is detected at 712 that the WiFi information is compliant, then at
图8示出了可以用来实施本公开的实施例的设备800的示意性块图,设备800可以为以上参考图2所描述的移动设备210或服务器220。如图所示,设备800包括中央处理单元(CPU)801,其可以根据存储在只读存储器(ROM)802中的计算机程序指令或者从存储单元808加载到随机访问存储器(RAM)803中的计算机程序指令,来执行各种适当的动作和处理。在RAM 803中,还可存储设备800操作所需的各种程序和数据。CPU 801、ROM 802以及RAM803通过总线804彼此相连。输入/输出(I/O)接口805也连接至总线804。FIG. 8 shows a schematic block diagram of a
设备800中的多个部件连接至I/O接口805,包括:输入单元806,例如键盘、鼠标等;输出单元807,例如各种类型的显示器、扬声器等;存储单元808,例如磁盘、光盘等;以及通信单元809,例如网卡、调制解调器、无线通信收发机等。通信单元809允许设备800通过诸如因特网的计算机网络和/或各种电信网络与其他设备交换信息/数据。Multiple components in the
上文所描述的各个方法或过程可由处理单元801执行。例如,在一些实施例中,方法可被实现为计算机软件程序,其被有形地包含于机器可读介质,例如存储单元808。在一些实施例中,计算机程序的部分或者全部可以经由ROM 802和/或通信单元809而被载入和/或安装到设备800上。当计算机程序被加载到RAM 803并由CPU 801执行时,可以执行上文描述的方法或过程中的一个或多个步骤或动作。Each method or process described above can be executed by the
在一些实施例中,以上所描述的方法和过程可以被实现为计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于执行本公开的各个方面的计算机可读程序指令。In some embodiments, the methods and processes described above can be implemented as a computer program product. A computer program product may include a computer readable storage medium having computer readable program instructions thereon for carrying out various aspects of the present disclosure.
计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是――但不限于――电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。A computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device. A computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of computer-readable storage media include: portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or flash memory), static random access memory (SRAM), compact disc read only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanically encoded device, such as a printer with instructions stored thereon A hole card or a raised structure in a groove, and any suitable combination of the above. As used herein, computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., pulses of light through fiber optic cables), or transmitted electrical signals.
本文所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。Computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers. A network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .
用于执行本公开操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言,以及常规的过程式编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读程序指令,从而实现本公开的各个方面。Computer program instructions for performing the operations of the present disclosure may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or Source or object code written in any combination, including object-oriented programming languages, and conventional procedural programming languages. Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement. In cases involving a remote computer, the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as via the Internet using an Internet service provider). connect). In some embodiments, an electronic circuit, such as a programmable logic circuit, field programmable gate array (FPGA), or programmable logic array (PLA), can be customized by utilizing state information of computer-readable program instructions, which can Various aspects of the present disclosure are implemented by executing computer readable program instructions.
这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理单元,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理单元执行时,产生了实现流程图和/或块图中的一个或多个方块中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或块图中的一个或多个方块中规定的功能/动作的各个方面的指令。These computer readable program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processing unit of the computer or other programmable data processing apparatus , resulting in means for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagrams. These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.
也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或块图中的一个或多个方块中规定的功能/动作。It is also possible to load computer-readable program instructions into a computer, other programmable data processing device, or other equipment, so that a series of operational steps are performed on the computer, other programmable data processing device, or other equipment to produce a computer-implemented process , so that instructions executed on computers, other programmable data processing devices, or other devices implement the functions/actions specified in one or more blocks in the flowcharts and/or block diagrams.
附图中的流程图和块图显示了根据本公开的多个实施例的设备、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或块图中的每个方块可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方块中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方块实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,块图和/或流程图中的每个方块、以及块图和/或流程图中的方块的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatuses, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in a flowchart or block diagram may represent a module, a program segment, or a portion of an instruction that contains one or more Executable instructions. In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It is also to be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions.
以上已经描述了本公开的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中技术的技术改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。Having described various embodiments of the present disclosure above, the foregoing description is exemplary, not exhaustive, and is not limited to the disclosed embodiments. Many modifications and alterations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen to best explain the principle of each embodiment, practical application or technical improvement over the technology in the market, or to enable other persons of ordinary skill in the art to understand each embodiment disclosed herein.
Claims (13)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811217390.2A CN111079140B (en) | 2018-10-18 | 2018-10-18 | Method, device and system for preventing cheating |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811217390.2A CN111079140B (en) | 2018-10-18 | 2018-10-18 | Method, device and system for preventing cheating |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111079140A CN111079140A (en) | 2020-04-28 |
CN111079140B true CN111079140B (en) | 2023-06-27 |
Family
ID=70308911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811217390.2A Active CN111079140B (en) | 2018-10-18 | 2018-10-18 | Method, device and system for preventing cheating |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111079140B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112509165A (en) * | 2020-11-27 | 2021-03-16 | 中国人寿保险股份有限公司 | Anti-cheating attendance checking method and system |
CN114360085A (en) * | 2021-11-25 | 2022-04-15 | 中国人民人寿保险股份有限公司 | A method for identifying cheating in attendance, service system and terminal device thereof |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007138056A1 (en) * | 2006-05-30 | 2007-12-06 | Siemens Aktiengesellschaft | Method for increasing handoff speed of mobile node in wireless lan and the mobile node |
CA2595830A1 (en) * | 2007-08-01 | 2009-02-01 | Nortel Networks Limited | A smart communications system for integration into a workflow-engaged clinical environment |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2009182490A (en) * | 2008-01-29 | 2009-08-13 | Duaxes Corp | Virtual private network management device |
CN101299668A (en) * | 2008-06-30 | 2008-11-05 | 华为技术有限公司 | Method, system and apparatus for establishing communication |
CN104183027B (en) * | 2013-05-21 | 2018-01-23 | 腾讯科技(深圳)有限公司 | A kind of User Status determines method and device |
CN103795798B (en) * | 2014-02-11 | 2017-05-03 | 南京泰格金卡科技有限公司 | Mobile phone checking-in method |
CN105788016A (en) * | 2016-02-26 | 2016-07-20 | 河南智业科技发展有限公司 | Anti-counterfeiting internet attendance method |
CN107820210B (en) * | 2017-11-14 | 2021-07-06 | Oppo广东移动通信有限公司 | Sign-in method, mobile terminal and computer readable storage medium |
CN108346191B (en) * | 2018-02-06 | 2020-08-14 | 中国平安人寿保险股份有限公司 | Attendance checking method and device, computer equipment and storage medium |
CN108492393A (en) * | 2018-03-16 | 2018-09-04 | 百度在线网络技术(北京)有限公司 | Method and apparatus for registering |
-
2018
- 2018-10-18 CN CN201811217390.2A patent/CN111079140B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007138056A1 (en) * | 2006-05-30 | 2007-12-06 | Siemens Aktiengesellschaft | Method for increasing handoff speed of mobile node in wireless lan and the mobile node |
CA2595830A1 (en) * | 2007-08-01 | 2009-02-01 | Nortel Networks Limited | A smart communications system for integration into a workflow-engaged clinical environment |
Non-Patent Citations (3)
Title |
---|
.基于Web服务的统一虚拟系统管理;高国钊;《计算机工程与设计》;全文 * |
Implementation of measurement of aircraft fault protector performance based on virtual instrument;Yan Kejun;《IEEE 2011 10th International Conference on Electronic Measurement & Instruments》;全文 * |
基于Web的网络化虚拟教学实验室;李凤保;《 仪器仪表学报》;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111079140A (en) | 2020-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12218934B2 (en) | Contextual and risk-based multi-factor authentication | |
US11546371B2 (en) | System and method for determining actions to counter a cyber attack on computing devices based on attack vectors | |
US10516698B2 (en) | Honeypot computing services that include simulated computing resources | |
US10887307B1 (en) | Systems and methods for identifying users | |
US9569605B1 (en) | Systems and methods for enabling biometric authentication options | |
US10320841B1 (en) | Fraud score heuristic for identifying fradulent requests or sets of requests | |
US9529990B2 (en) | Systems and methods for validating login attempts based on user location | |
US20180295154A1 (en) | Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management | |
US10148631B1 (en) | Systems and methods for preventing session hijacking | |
CN104580133B (en) | Malicious program protection method and system and filtering table updating method thereof | |
WO2020181841A1 (en) | Method for automatically testing horizontal over-permission vulnerabilities and related device | |
US20130139233A1 (en) | System and method for controlling user access to a service processor | |
WO2017071551A1 (en) | Method and device for preventing malicious access to login/registration interface | |
US10582387B2 (en) | Disabling a mobile device that has stolen hardware components | |
KR20170074959A (en) | Trusted terminal verification method and apparatus | |
US11991210B2 (en) | Machine learning-based techniques for identifying deployment environments and enhancing security thereof | |
US11019494B2 (en) | System and method for determining dangerousness of devices for a banking service | |
CN109409093B (en) | A system vulnerability scanning scheduling method | |
US11563741B2 (en) | Probe-based risk analysis for multi-factor authentication | |
CN111079140B (en) | Method, device and system for preventing cheating | |
US20200374287A1 (en) | Mutual identity verification | |
US11290486B1 (en) | Allocating defective computing resources for honeypot services | |
US10580004B2 (en) | System and method of identifying new devices during a user's interaction with banking services | |
RU2697926C1 (en) | System and method of counteracting attack on computing devices of users | |
JP6053646B2 (en) | Monitoring device, information processing system, monitoring method, and program |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |