CN111079140B - Method, device and system for preventing cheating - Google Patents

Method, device and system for preventing cheating Download PDF

Info

Publication number
CN111079140B
CN111079140B CN201811217390.2A CN201811217390A CN111079140B CN 111079140 B CN111079140 B CN 111079140B CN 201811217390 A CN201811217390 A CN 201811217390A CN 111079140 B CN111079140 B CN 111079140B
Authority
CN
China
Prior art keywords
check
address
application
mobile device
detecting whether
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811217390.2A
Other languages
Chinese (zh)
Other versions
CN111079140A (en
Inventor
翟晨阳
戴兴邦
任宇福
李星
李山秀
唐培洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Life Insurance Co ltd
Original Assignee
China Life Insurance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Life Insurance Co ltd filed Critical China Life Insurance Co ltd
Priority to CN201811217390.2A priority Critical patent/CN111079140B/en
Publication of CN111079140A publication Critical patent/CN111079140A/en
Application granted granted Critical
Publication of CN111079140B publication Critical patent/CN111079140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/1091Recording time for administrative or management purposes
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/10Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people together with the recording, indicating or registering of other data, e.g. of signs of identity

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Software Systems (AREA)
  • Educational Administration (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Virology (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Embodiments of the present disclosure relate to a method, apparatus, and system for anti-cheating. The method includes running a check-in application on the mobile device for a swipe check-in, and detecting whether the check-in application is running on the virtualized system. The method also includes determining that there is a cheating behavior on the mobile device in response to detecting that the check-in application is running on the virtualized system. The embodiment of the disclosure can judge whether the check-in application has cheating behaviors by detecting whether the check-in application runs in the virtualized environment, thereby preventing the user from cheating check-in.

Description

用于防作弊的方法、设备和系统Method, device and system for preventing cheating

技术领域technical field

本公开的实施例总体上涉及计算机领域,并且更具体地涉及用于防作弊的方法、设备以及系统。Embodiments of the present disclosure generally relate to the field of computers, and more particularly relate to methods, devices and systems for preventing cheating.

背景技术Background technique

随着移动互联网的快速发展,在移动终端上涌现了各种各样的智能应用。取代传统的刷卡签到或者指纹签到,人们开始使用移动终端来进行签到。例如,人们点击签到应用的刷脸按钮后,服务器可以验证移动终端是否处于合法地点,此外,在通过地点验证之后,还可以通过人脸识别来验证是否由用户本人操作。以这种方式,可以实现使用移动终端上的智能签到服务。With the rapid development of the mobile Internet, various smart applications have emerged on mobile terminals. Instead of traditional card swiping sign-in or fingerprint sign-in, people began to use mobile terminals to sign in. For example, after people click the face-swiping button of the sign-in application, the server can verify whether the mobile terminal is in a legal place. In addition, after passing the location verification, it can also use face recognition to verify whether it is operated by the user himself. In this way, the smart check-in service on the mobile terminal can be realized.

由于用户的签到影响到考勤,甚至影响用户的绩效考核和经济收入,因此,某些用户会使用各种各样的方法来进行作弊,以在不到达规定地点的情况下实现成功签到。例如,用户使用某些作弊工具来模拟操作系统的应用程序接口(API)来进行欺骗,这种作弊工具只要成功地记录合法的地点信息之后,就可以绕过系统对签到地点的校验环节,从而使得用户在家甚至在任何地方可以进行刷脸签到。Since the user's check-in affects attendance, and even affects the user's performance appraisal and economic income, some users will use various methods to cheat in order to achieve successful check-in without arriving at the specified place. For example, users use some cheating tools to simulate the application program interface (API) of the operating system to cheat. As long as this cheating tool successfully records the legal location information, it can bypass the verification link of the system for the check-in location. This allows users to sign in with their faces at home or even anywhere.

发明内容Contents of the invention

本公开的实施例提供了一种用于防作弊的方法、设备和计算机程序产品。Embodiments of the present disclosure provide a method, device and computer program product for preventing cheating.

在本公开的第一方面,提供了一种用于防作弊的方法。该方法包括:在移动设备上运行用于刷脸签到的签到应用;检测签到应用是否在虚拟化系统上运行;以及响应于检测到签到应用是在虚拟化系统上运行,确定移动设备上存在作弊行为。In a first aspect of the present disclosure, a method for preventing cheating is provided. The method includes: running a sign-in application for face-swiping sign-in on the mobile device; detecting whether the sign-in application is running on a virtualization system; and determining that there is cheating on the mobile device in response to detecting that the sign-in application is running on a virtualization system Behavior.

在本公开的第二方面,提供了一种用于防作弊的方法。该方法包括:获得移动设备的IP地址,其中移动设备上正运行用于刷脸签到的签到应用;检测IP地址是否存在异常;以及响应于检测到IP地址是存在异常,确定移动设备上存在作弊行为。In a second aspect of the present disclosure, a method for preventing cheating is provided. The method includes: obtaining the IP address of the mobile device, wherein the mobile device is running a sign-in application for face-swiping sign-in; detecting whether the IP address is abnormal; and in response to detecting that the IP address is abnormal, determining that there is cheating on the mobile device Behavior.

在本公开的第三方面,提供了一种移动设备。该移动设备包括处理单元以及存储器,其中存储器被耦合至处理单元并且存储有指令。所述指令在由处理单元执行时执行以下动作:在移动设备上运行用于刷脸签到的签到应用;检测签到应用是否在虚拟化系统上运行;以及响应于检测到签到应用是在虚拟化系统上运行,确定移动设备上存在作弊行为。In a third aspect of the present disclosure, a mobile device is provided. The mobile device includes a processing unit and a memory coupled to the processing unit and storing instructions. The instructions perform the following actions when executed by the processing unit: run a sign-in application for face-scanning sign-in on the mobile device; detect whether the sign-in application is running on the virtualization system; and respond to detecting that the sign-in application is running on the virtualization system run on mobile devices to determine the presence of cheating on mobile devices.

在本公开的第四方面,提供了一种服务器。该移动设备包括处理单元以及存储器,其中存储器被耦合至处理单元并且存储有指令。所述指令在由处理单元执行时执行以下动作:获得移动设备的IP地址,其中移动设备上正运行用于刷脸签到的签到应用;检测IP地址是否存在异常;以及响应于检测到IP地址是存在异常,确定移动设备上存在作弊行为。In a fourth aspect of the present disclosure, a server is provided. The mobile device includes a processing unit and a memory coupled to the processing unit and storing instructions. The instructions perform the following actions when executed by the processing unit: obtain the IP address of the mobile device, where the mobile device is running a sign-in application for face-swiping sign-in; detect whether the IP address is abnormal; and respond to detecting that the IP address is There is an anomaly that determines that cheating has occurred on the mobile device.

在本公开的第五方面,提供了一种用于防作弊的系统。该系统包括根据本公开的实施例的移动设备以及根据本公开的实施例的服务器。In a fifth aspect of the present disclosure, a system for preventing cheating is provided. The system includes a mobile device according to an embodiment of the present disclosure and a server according to an embodiment of the present disclosure.

提供发明内容部分是为了简化的形式来介绍对概念的选择,它们在下文的具体实施方式中将被进一步描述。本发明内容部分无意标识本公开的关键特征或主要特征,也无意限制本公开的各个实施例的范围。This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or principal characteristics of the disclosure, nor is it intended to limit the scope of the various embodiments of the disclosure.

附图说明Description of drawings

通过结合附图对本公开示例性实施例进行更详细的描述,本公开的上述以及其它目的、特征和优势将变得更加明显,其中在本公开示例性实施例中,相同的附图标记通常代表相同的元素。The above and other objects, features and advantages of the present disclosure will become more apparent by describing the exemplary embodiments of the present disclosure in more detail with reference to the accompanying drawings, wherein in the exemplary embodiments of the present disclosure, the same reference numerals generally represent the same elements.

图1示出了使用虚拟化系统进行作弊的传统技术的示意图;Fig. 1 shows the schematic diagram of the conventional technique of cheating using a virtualization system;

图2示出了根据本公开的实施例的用于防作弊的示例环境的示意图;Figure 2 shows a schematic diagram of an example environment for anti-cheating according to an embodiment of the present disclosure;

图3示出了根据本公开的实施例的用于防作弊的方法的流程图;FIG. 3 shows a flowchart of a method for preventing cheating according to an embodiment of the present disclosure;

图4示出了根据本公开的实施例的用于将作弊用户添加到黑名单的方法的流程图;FIG. 4 shows a flowchart of a method for adding a cheating user to a blacklist according to an embodiment of the present disclosure;

图5示出了根据本公开的实施例的用于提示用户作弊行为的图形用户界面(GUI)的示图;FIG. 5 shows a diagram of a graphical user interface (GUI) for prompting a user to cheat according to an embodiment of the present disclosure;

图6示出了根据本公开的实施例的用于防作弊的另一方法的流程图;FIG. 6 shows a flowchart of another method for preventing cheating according to an embodiment of the present disclosure;

图7示出了根据本公开的实施例的用于防作弊的示例过程的流程图;以及Figure 7 shows a flow diagram of an example process for preventing cheating according to an embodiment of the present disclosure; and

图8示出了可以用来实施本公开的实施例的设备的示意性块图。Fig. 8 shows a schematic block diagram of an apparatus that may be used to implement embodiments of the present disclosure.

具体实施例specific embodiment

下面将参照附图更详细地描述本公开的优选实施例。虽然附图中显示了本公开的一些具体实施例,然而应该理解,可以以各种形式实现本公开,而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了使本公开更加透彻和完整,并且能够将本公开的范围完整地传达给本领域的技术人员。Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although specific embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure can be embodied in various forms and is not limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

在本文中使用的术语“包括”及其变形表示开放性包括,即“包括但不限于”。除非特别申明,术语“或”表示“和/或”。术语“基于”表示“至少部分地基于”。术语“一个示例实施例”和“一个实施例”表示“至少一个示例实施例”。术语“另一实施例”表示“至少一个另外的实施例”。术语“第一”、“第二”等可以指代不同的或相同的对象,除非明确指示不同。As used herein, the term "comprise" and its variants mean open inclusion, ie "including but not limited to". The term "or" means "and/or" unless otherwise stated. The term "based on" means "based at least in part on". The terms "one example embodiment" and "one embodiment" mean "at least one example embodiment." The term "another embodiment" means "at least one further embodiment". The terms "first", "second", etc. may refer to different or the same object, unless a different is clearly indicated.

为了破解对用户地点的检验,一些作弊工具使用虚拟化空间来模拟移动设备所处的地点。图1示出了使用虚拟化系统进行作弊的传统技术的示意图100。在移动设备上安装作弊软件之后,移动设备中除了操作系统110本身之外,还会创建一个虚拟化的空间,在虚拟化空间中存在虚拟化系统120。虚拟化系统120中存在一个应用虚拟化引擎,其允许用户在虚拟化系统120中安装、启动或卸载应用,而与操作系统110相隔离。此外,这种技术还能够获取操作系统110的任何系统服务,并在虚拟化系统120中建立与系统服务相对应的代理服务。当运行在虚拟化系统120中的签到应用调用系统服务时,实际上调用的是虚拟化系统120中提供的代理服务。如图1中箭头131所示,运行在虚拟化系统110中的签到应用125调用操作系统110的系统服务;如箭头132所示,操作系统110提供系统服务并发送给代理服务模块123。接下来,如箭头133所示,代理服务模块123将替换后的代理服务发送给签到应用125,从而实现向签到应用125提供虚假的系统服务。由此可见,现有的作弊方案能够绕过操作系统对无线路由器信息的校验,实现虚假的作弊签到,其能记录职场无线路由器信息并保存到虚拟化空间中,然后在后续的签到过程中使用已保存的无线路由器信息来进行伪造,使得用户在任何地点都能成功刷脸。To break the check on the user's location, some cheat tools use a virtualized space to simulate the location of the mobile device. FIG. 1 shows a schematic diagram 100 of a conventional technique of cheating using a virtualization system. After the cheating software is installed on the mobile device, in addition to the operating system 110 itself, a virtualized space will be created in the mobile device, and a virtualized system 120 exists in the virtualized space. There is an application virtualization engine in the virtualization system 120 , which allows users to install, start or uninstall applications in the virtualization system 120 while being isolated from the operating system 110 . In addition, this technology can also obtain any system service of the operating system 110 and establish a proxy service corresponding to the system service in the virtualization system 120 . When the sign-in application running in the virtualization system 120 calls the system service, what is actually called is the proxy service provided in the virtualization system 120 . As shown by the arrow 131 in FIG. 1 , the sign-in application 125 running in the virtualization system 110 invokes the system service of the operating system 110 ; as shown by the arrow 132 , the operating system 110 provides the system service and sends it to the proxy service module 123 . Next, as shown by arrow 133 , the proxy service module 123 sends the replaced proxy service to the sign-in application 125 , so as to provide false system services to the sign-in application 125 . It can be seen that the existing cheating scheme can bypass the verification of the wireless router information by the operating system and realize false cheating check-in. It can record the workplace wireless router information and save it in the virtualization space, and then in the subsequent check-in process Use the saved wireless router information to forge, so that users can successfully swipe their faces anywhere.

为此,本公开的实施例提出了一种用于防作弊的新方案。根据本公开的实施例,通过检测签到应用是否在虚拟化环境中运行,能够判断签到应用是否存在作弊行为,从而防止用户的作弊签到。此外,本公开的实施例还可以通过在服务器端检测移动设备的IP地址是否异常来备选地或者附加地检测作弊行为。For this reason, the embodiments of the present disclosure propose a new scheme for preventing cheating. According to the embodiments of the present disclosure, by detecting whether the sign-in application is running in a virtualized environment, it can be determined whether the sign-in application has cheating behavior, thereby preventing cheating sign-in of the user. In addition, the embodiments of the present disclosure may alternatively or additionally detect cheating by detecting whether the IP address of the mobile device is abnormal at the server side.

以下参考图2至图8来说明本公开的基本原理和若干示例实现方式。应当理解,给出这些示例性实施例仅是为了使本领域技术人员能够更好地理解进而实现本公开的实施例,而并非以任何方式限制本公开的范围。The basic principles and several example implementations of the present disclosure are explained below with reference to FIGS. 2 to 8 . It should be understood that these exemplary embodiments are given only to enable those skilled in the art to better understand and implement the embodiments of the present disclosure, but not to limit the scope of the present disclosure in any way.

图2示出了根据本公开的实施例的用于防作弊的示例环境200的示意图。如图2所示,环境200包括移动设备210(也即客户端)和服务器220,它们通过网络230互相连接,网络230可以为有线网络和/或无线网络。移动设备210可以为任何可以移动的电子设备,诸如智能手机、平板电脑等,其通常具有无线网络连接功能和摄像功能。服务器220通常指代位于远程的高性能处理设备。应当理解,图1中的移动设备和服务器还可以包括其他未示出的部件或模块。FIG. 2 shows a schematic diagram of an example environment 200 for anti-cheat according to an embodiment of the disclosure. As shown in FIG. 2, an environment 200 includes a mobile device 210 (ie, a client) and a server 220, which are connected to each other through a network 230, which may be a wired network and/or a wireless network. The mobile device 210 can be any mobile electronic device, such as a smart phone, a tablet computer, etc., which generally have a wireless network connection function and a camera function. Server 220 generally refers to a remotely located high-performance processing device. It should be understood that the mobile device and the server in FIG. 1 may also include other components or modules not shown.

参考图2,在移动设备210上正运行签到应用215,通过签到应用215可以实现基于移动网络的考勤服务。根据本公开的实施例,通过检测签到应用是否在虚拟化环境中运行,能够判断签到应用是否存在作弊行为,从而防止用户的作弊签到。此外,附加地或备选地,可以在服务器220检测移动设备210的IP地址是否异常来检测是否存在作弊行为。以下参考图3-图8进一步描述了如何检测作弊行为的示例实现。Referring to FIG. 2 , a sign-in application 215 is running on the mobile device 210 , and the attendance service based on the mobile network can be realized through the sign-in application 215 . According to the embodiments of the present disclosure, by detecting whether the sign-in application is running in a virtualized environment, it can be determined whether the sign-in application has cheating behavior, thereby preventing cheating sign-in of the user. Additionally or alternatively, the server 220 may detect whether the IP address of the mobile device 210 is abnormal to detect whether there is cheating. Example implementations of how to detect cheating are further described below with reference to FIGS. 3-8 .

图3示出了根据本公开的实施例的用于防作弊的方法300的流程图。应当理解,方法300可以由以上参考图2所描述的移动设备210来执行。在框302,在移动设备上运行用于刷脸签到的签到应用。例如,首先在移动设备210上运行签到应用215以用于后续的作弊行为检测。Fig. 3 shows a flowchart of a method 300 for preventing cheating according to an embodiment of the present disclosure. It should be understood that the method 300 may be performed by the mobile device 210 described above with reference to FIG. 2 . In block 302, a sign-in application for sign-in by facial recognition is run on the mobile device. For example, first run the check-in application 215 on the mobile device 210 for subsequent fraud detection.

在框304,检测签到应用是否在虚拟化系统上运行。在一些实施例中,可以检测移动设备的操作系统中的特定类是否由通过虚拟化技术而被提供。例如,操作系统可以为安卓操作系统,特定类可以为安卓操作系统中的Instrumentation类。然而,移动设备也可以为其他的操作系统并且检测其他操作系统中与虚拟化调用有关的特定类。At block 304, it is detected whether the sign-in application is running on the virtualization system. In some embodiments, it may be detected whether a specific class in the operating system of the mobile device is provided by virtualization technology. For example, the operating system may be an Android operating system, and the specific class may be an Instrumentation class in the Android operating system. However, the mobile device can also be other operating systems and detect specific classes related to virtualization calls in other operating systems.

在框306,响应于检测到签到应用是在虚拟化系统上运行,确定移动设备上存在作弊行为。例如,Instrumentation类在安卓操作系统和虚拟化系统中存在差异,并且虚拟化技术无法绕过检测而进行作弊。在安卓操作系统中,Instrumentation类的存在形式为android.app.Instrumentation;相反,在虚拟化系统中,Instrumentation类的存在形式为com.lody.virtual.client.hook.delegate.AppInstrumentation。因此,通过检测Instrumentation类的名称或存在形式,可以判断签到应用是否是在虚拟化系统中运行,从而检测移动设备上是否存在作弊签到行为。At block 306, in response to detecting that the check-in application is running on the virtualized system, it is determined that cheating is present on the mobile device. For example, there are differences between the Instrumentation class in the Android operating system and the virtualization system, and the virtualization technology cannot bypass detection and cheat. In the Android operating system, the existence form of the Instrumentation class is android.app.Instrumentation; on the contrary, in the virtualization system, the existence form of the Instrumentation class is com.lody.virtual.client.hook.delegate.AppInstrumentation. Therefore, by detecting the name or existence form of the Instrumentation class, it can be determined whether the sign-in application is running in a virtualization system, thereby detecting whether there is cheating sign-in behavior on the mobile device.

图4示出了根据本公开的实施例的用于将作弊用户添加到黑名单的方法400的流程图。应当理解,方法400可以由以上参考图2所描述的移动设备210来执行,并且可以在图3所描述的方法300之后进行执行。FIG. 4 shows a flowchart of a method 400 for adding a cheating user to a blacklist according to an embodiment of the present disclosure. It should be understood that the method 400 may be performed by the mobile device 210 described above with reference to FIG. 2 and may be performed after the method 300 described in FIG. 3 .

在框402,在移动设备上禁止签到应用中的刷脸签到功能。在一些实施例中,可以阻止移动设备的用户使用虚拟化来伪造无线路由器信息进行刷脸签到。在一些实施例中,可以向移动设备的用户提示运行异常,并且提示用户退出签到应用并且重新启动签到应用。例如,图5示出了根据本公开的实施例的用于提示用户作弊行为的GUI 500的示图。用户点击移动设备210的界面上的刷脸按钮211,然后进行刷脸以进行签到。当检测到签到应用是在虚拟化系统中运行时,可以向用户提示警告212,用户可以选择重启签到应用进行重试。对于使用作弊软件的用户而言,其无法实现在移动设备的签到应用中的成功签到。In block 402, the face-swiping sign-in function in the sign-in application is prohibited on the mobile device. In some embodiments, users of mobile devices can be prevented from using virtualization to forge wireless router information for facial recognition sign-in. In some embodiments, the user of the mobile device may be notified of abnormal behavior and prompted to exit the sign-in application and restart the sign-in application. For example, FIG. 5 shows a diagram of a GUI 500 for prompting a user to cheat, according to an embodiment of the present disclosure. The user clicks the facial scan button 211 on the interface of the mobile device 210, and then performs facial scan to sign in. When it is detected that the sign-in application is running in the virtualization system, a warning 212 may be prompted to the user, and the user may choose to restart the sign-in application to try again. For users who use cheating software, they cannot achieve successful sign-in in the sign-in application of the mobile device.

在框404,移动设备向服务器发送在签到应用中已经登录的用户账户信息。在框406,服务器将用户账户信息添加到黑名单。例如,如果检测到作弊行为,移动设备将把作弊的用户账户信息发送给服务器,服务器然后将该作弊用户添加到黑名单。In block 404, the mobile device sends to the server the user account information that has been logged in in the check-in application. At block 406, the server adds the user account information to a blacklist. For example, if cheating is detected, the mobile device will send the cheating user account information to the server, and the server will then add the cheating user to a blacklist.

图6示出了根据本公开的实施例的用于防作弊的另一方法600的流程图。应当理解,方法600可以由以上参考图2所描述的服务器220来执行。在框602,获得移动设备的IP地址,其中移动设备上正运行用于签到的签到应用。例如,图2中所描述的移动设备210上正运行签到应用215。FIG. 6 shows a flowchart of another method 600 for preventing cheating according to an embodiment of the present disclosure. It should be understood that the method 600 may be performed by the server 220 described above with reference to FIG. 2 . At block 602, an IP address of a mobile device on which a sign-in application for sign-in is running is obtained. For example, a check-in application 215 is running on the mobile device 210 depicted in FIG. 2 .

在框604,检测IP地址是否存在异常。在一些实施例中,可以预先设置IP地址白名单,其可以通过人工或自动的方式被收集,并且包括用户的工作场所和会议场所等合法的地点的路由器的网络地址,然后,可以检测移动设备的IP地址是否在IP地址白名单上。In block 604, it is detected whether the IP address is abnormal. In some embodiments, an IP address whitelist can be pre-set, which can be collected manually or automatically, and includes the network addresses of routers in legal places such as the user's workplace and meeting place, and then, the mobile device can be detected Whether your IP address is on the IP address whitelist.

在一些实施例中,还可以获得移动设备所连接的无线路由器的基本服务集标识符(BSSID),然后基于BSSID来检测IP地址是否存在异常。在一些实施例中,可以统计与BSSID相对应的最大概率IP地址;并且基于IP地址与最大概率IP地址的比较,确定IP地址是否存在异常。例如,针对同一个BSSID(其IP地址应当是固定和/或唯一的),三个移动设备存在两种地址,即第一设备和第二设备为第一地址,第三设备为第二地址,则可以认为这个BSSID对应的地址应当为第一地址,而第三设备存在作弊行为。此外,可以统计每个BSSID在一些天的IP地址分布,从而确定每个BSSID的最佳可信IP地址。In some embodiments, the Basic Service Set Identifier (BSSID) of the wireless router to which the mobile device is connected may also be obtained, and then based on the BSSID, it is detected whether the IP address is abnormal. In some embodiments, the IP address with the highest probability corresponding to the BSSID can be counted; and based on the comparison between the IP address and the IP address with the highest probability, it is determined whether the IP address is abnormal. For example, for the same BSSID (its IP address should be fixed and/or unique), there are two kinds of addresses for three mobile devices, that is, the first device and the second device are the first address, the third device is the second address, Then it can be considered that the address corresponding to this BSSID should be the first address, and the third device has cheating behavior. In addition, the IP address distribution of each BSSID in some days can be counted, so as to determine the best trusted IP address of each BSSID.

在框606,响应于检测到IP地址是存在异常,确定移动设备上存在作弊行为。也就是说,虽然用户端可能通过虚拟化技术等绕过BSSID的检测,绕过了对于WiFi的检测,但是其无法伪装成真实的IP地址来与服务器进行通信。例如,正常情况下,连接到对应的BSSID的移动设备应当具有某一地址,如果出现连接到BSSID的移动设备不是这一地址,则说明这一设备具有作弊嫌疑。一般来说,正常的签到对应的是职场中的路由器的IP地址,而作弊签到对应的是家中或者移动网络中的IP地址。因此,通过检测移动设备的IP地址的异常,可以备选地和/或附加地检测用户的作弊行为。在一些实施例中,通过组合移动设备端的虚拟化检测和服务器端的IP地址异常检测,可以形成双重检测的防作弊方案。At block 606, in response to detecting that the IP address is anomalous, it is determined that cheating is present on the mobile device. That is to say, although the client may bypass the detection of BSSID and WiFi through virtualization technology, etc., it cannot pretend to be a real IP address to communicate with the server. For example, under normal circumstances, the mobile device connected to the corresponding BSSID should have a certain address, if it appears that the mobile device connected to the BSSID does not have this address, it means that the device is suspected of cheating. Generally speaking, normal sign-in corresponds to the IP address of the router in the workplace, while cheating sign-in corresponds to the IP address at home or in the mobile network. Thus, by detecting anomalies in the IP address of the mobile device, cheating by the user may alternatively and/or additionally be detected. In some embodiments, by combining the virtualization detection at the mobile device end and the IP address anomaly detection at the server end, an anti-cheating solution with double detection can be formed.

在一些实施例,本公开的实施例可以用于基于移动互联网的智能签到。在一些实施例中,本公开的防作弊方案可以用于保险公司的营销员的参会签到,从而可以判断营销员是否在正确的地点和时间由本人参会。In some embodiments, the embodiments of the present disclosure can be used for smart sign-in based on mobile internet. In some embodiments, the anti-cheating scheme of the present disclosure can be used for the sign-in of the salesperson of the insurance company, so that it can be judged whether the salesperson attends the meeting by himself at the correct place and time.

图7示出了根据本公开的实施例的用于防作弊的示例过程700的流程图。在框702,用户使用其账户和密码登录签到应用,或者自动进行登录。在框704,检测签到应用是否是在虚拟化系统中运行,例如可以使用以上所描述实施例来判断签到应用是否是在虚拟化系统中运行。如果在框704检测到签到应用是在虚拟化系统中运行,则说明存在作弊行为,在框720指示签到失败。FIG. 7 shows a flow diagram of an example process 700 for preventing cheating, according to an embodiment of the disclosure. At block 702, the user logs into the sign-in application using their account and password, or the sign-in is performed automatically. In block 704, it is detected whether the sign-in application is running in the virtualization system, for example, the embodiments described above may be used to determine whether the sign-in application is running in the virtualization system. If it is detected at block 704 that the sign-in application is running in the virtualization system, it indicates that there is cheating, and at block 720 it is indicated that sign-in fails.

如果在框704检测到签到应用不是在虚拟化系统中运行,则在框706用户点击点我刷脸按钮。在框708,签到应用读取移动设备所连接的WiFi信息和IP地址。在框710,服务器检测移动设备的IP地址是否存在异常,例如可以使用以上所描述的实施例来判断IP地址是否异常。如果在710检测到IP地址存在异常,则说明存在作弊行为,在框720指示签到失败。If it is detected in block 704 that the sign-in application is not running in the virtualization system, then in block 706 the user clicks the click button to brush my face. At block 708, the check-in application reads the WiFi information and IP address to which the mobile device is connected. In block 710, the server detects whether the IP address of the mobile device is abnormal, for example, the embodiments described above may be used to determine whether the IP address is abnormal. If it is detected at 710 that there is an abnormality in the IP address, it indicates that there is cheating, and at block 720 it is indicated that the sign-in fails.

如果在710检测到IP地址不存在异常,则在框712进一步检测WiFi信息是否合规,例如,可以判断所连接的无线路由器的BSSID地址是否在预定的列表中。如果检在712测到WiFi信息不合规,则说明存在作弊行为,在框720指示签到失败。If it is detected at 710 that there is no abnormality in the IP address, then at block 712 it is further checked whether the WiFi information is compliant, for example, it may be determined whether the BSSID address of the connected wireless router is in a predetermined list. If it is detected at 712 that the WiFi information is not in compliance, it indicates that there is cheating, and at block 720 it is indicated that the sign-in failed.

如果在712检测到WiFi信息合规,则在框714调用摄像头开始用户刷脸。也就是说,当IP地址和BSSID都合规时,才能进入用户刷脸环节。接下来,在框716,检测刷脸是否通过。例如,可以检测是否是活体图像,并且检测所摄取的图像是否是用户本人。如果刷脸检测通过,则在框718指示签到成功,反之则在框720指示签到失败。应当理解,过程700中的动作可以以与图7中所示出顺序不同的顺序进行执行。If it is detected at 712 that the WiFi information is compliant, then at block 714 the camera is invoked to start the user's face scanning. That is to say, only when the IP address and BSSID are in compliance can the user scan the face. Next, at block 716, it is detected whether the face brushing is passed. For example, it is possible to detect whether or not it is a living body image, and to detect whether or not the captured image is of the user himself. If the facial recognition detection is passed, the sign-in is indicated at block 718 as successful, otherwise at block 720, the sign-in is indicated as failed. It should be appreciated that the actions in process 700 may be performed in an order different than that shown in FIG. 7 .

图8示出了可以用来实施本公开的实施例的设备800的示意性块图,设备800可以为以上参考图2所描述的移动设备210或服务器220。如图所示,设备800包括中央处理单元(CPU)801,其可以根据存储在只读存储器(ROM)802中的计算机程序指令或者从存储单元808加载到随机访问存储器(RAM)803中的计算机程序指令,来执行各种适当的动作和处理。在RAM 803中,还可存储设备800操作所需的各种程序和数据。CPU 801、ROM 802以及RAM803通过总线804彼此相连。输入/输出(I/O)接口805也连接至总线804。FIG. 8 shows a schematic block diagram of a device 800 that can be used to implement embodiments of the present disclosure, and the device 800 can be the mobile device 210 or the server 220 described above with reference to FIG. 2 . As shown, device 800 includes a central processing unit (CPU) 801 that can be programmed according to computer program instructions stored in read only memory (ROM) 802 or loaded from storage unit 808 into random access memory (RAM) 803 program instructions to perform various appropriate actions and processes. In the RAM 803, various programs and data necessary for the operation of the device 800 can also be stored. The CPU 801 , ROM 802 , and RAM 803 are connected to each other through a bus 804 . An input/output (I/O) interface 805 is also connected to the bus 804 .

设备800中的多个部件连接至I/O接口805,包括:输入单元806,例如键盘、鼠标等;输出单元807,例如各种类型的显示器、扬声器等;存储单元808,例如磁盘、光盘等;以及通信单元809,例如网卡、调制解调器、无线通信收发机等。通信单元809允许设备800通过诸如因特网的计算机网络和/或各种电信网络与其他设备交换信息/数据。Multiple components in the device 800 are connected to the I/O interface 805, including: an input unit 806, such as a keyboard, a mouse, etc.; an output unit 807, such as various types of displays, speakers, etc.; a storage unit 808, such as a magnetic disk, an optical disk, etc. ; and a communication unit 809, such as a network card, a modem, a wireless communication transceiver, and the like. The communication unit 809 allows the device 800 to exchange information/data with other devices over a computer network such as the Internet and/or various telecommunication networks.

上文所描述的各个方法或过程可由处理单元801执行。例如,在一些实施例中,方法可被实现为计算机软件程序,其被有形地包含于机器可读介质,例如存储单元808。在一些实施例中,计算机程序的部分或者全部可以经由ROM 802和/或通信单元809而被载入和/或安装到设备800上。当计算机程序被加载到RAM 803并由CPU 801执行时,可以执行上文描述的方法或过程中的一个或多个步骤或动作。Each method or process described above can be executed by the processing unit 801 . For example, in some embodiments, the methods may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 808 . In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 800 via the ROM 802 and/or the communication unit 809 . When the computer program is loaded into the RAM 803 and executed by the CPU 801, one or more steps or actions in the methods or processes described above may be performed.

在一些实施例中,以上所描述的方法和过程可以被实现为计算机程序产品。计算机程序产品可以包括计算机可读存储介质,其上载有用于执行本公开的各个方面的计算机可读程序指令。In some embodiments, the methods and processes described above can be implemented as a computer program product. A computer program product may include a computer readable storage medium having computer readable program instructions thereon for carrying out various aspects of the present disclosure.

计算机可读存储介质可以是可以保持和存储由指令执行设备使用的指令的有形设备。计算机可读存储介质例如可以是――但不限于――电存储设备、磁存储设备、光存储设备、电磁存储设备、半导体存储设备或者上述的任意合适的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:便携式计算机盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、静态随机存取存储器(SRAM)、便携式压缩盘只读存储器(CD-ROM)、数字多功能盘(DVD)、记忆棒、软盘、机械编码设备、例如其上存储有指令的打孔卡或凹槽内凸起结构、以及上述的任意合适的组合。这里所使用的计算机可读存储介质不被解释为瞬时信号本身,诸如无线电波或者其他自由传播的电磁波、通过波导或其他传输媒介传播的电磁波(例如,通过光纤电缆的光脉冲)、或者通过电线传输的电信号。A computer readable storage medium may be a tangible device that can retain and store instructions for use by an instruction execution device. A computer readable storage medium may be, for example, but is not limited to, an electrical storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of computer-readable storage media include: portable computer diskettes, hard disks, random access memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM), or flash memory), static random access memory (SRAM), compact disc read only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanically encoded device, such as a printer with instructions stored thereon A hole card or a raised structure in a groove, and any suitable combination of the above. As used herein, computer-readable storage media are not to be construed as transient signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., pulses of light through fiber optic cables), or transmitted electrical signals.

本文所描述的计算机可读程序指令可以从计算机可读存储介质下载到各个计算/处理设备,或者通过网络、例如因特网、局域网、广域网和/或无线网下载到外部计算机或外部存储设备。网络可以包括铜传输电缆、光纤传输、无线传输、路由器、防火墙、交换机、网关计算机和/或边缘服务器。每个计算/处理设备中的网络适配卡或者网络接口从网络接收计算机可读程序指令,并转发该计算机可读程序指令,以供存储在各个计算/处理设备中的计算机可读存储介质中。Computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or downloaded to an external computer or external storage device over a network, such as the Internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers, and/or edge servers. A network adapter card or a network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in each computing/processing device .

用于执行本公开操作的计算机程序指令可以是汇编指令、指令集架构(ISA)指令、机器指令、机器相关指令、微代码、固件指令、状态设置数据、或者以一种或多种编程语言的任意组合编写的源代码或目标代码,所述编程语言包括面向对象的编程语言,以及常规的过程式编程语言。计算机可读程序指令可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络—包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。在一些实施例中,通过利用计算机可读程序指令的状态信息来个性化定制电子电路,例如可编程逻辑电路、现场可编程门阵列(FPGA)或可编程逻辑阵列(PLA),该电子电路可以执行计算机可读程序指令,从而实现本公开的各个方面。Computer program instructions for performing the operations of the present disclosure may be assembly instructions, instruction set architecture (ISA) instructions, machine instructions, machine-dependent instructions, microcode, firmware instructions, state setting data, or Source or object code written in any combination, including object-oriented programming languages, and conventional procedural programming languages. Computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer, or entirely on the remote computer or server implement. In cases involving a remote computer, the remote computer can be connected to the user computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (such as via the Internet using an Internet service provider). connect). In some embodiments, an electronic circuit, such as a programmable logic circuit, field programmable gate array (FPGA), or programmable logic array (PLA), can be customized by utilizing state information of computer-readable program instructions, which can Various aspects of the present disclosure are implemented by executing computer readable program instructions.

这些计算机可读程序指令可以提供给通用计算机、专用计算机或其它可编程数据处理装置的处理单元,从而生产出一种机器,使得这些指令在通过计算机或其它可编程数据处理装置的处理单元执行时,产生了实现流程图和/或块图中的一个或多个方块中规定的功能/动作的装置。也可以把这些计算机可读程序指令存储在计算机可读存储介质中,这些指令使得计算机、可编程数据处理装置和/或其他设备以特定方式工作,从而,存储有指令的计算机可读介质则包括一个制造品,其包括实现流程图和/或块图中的一个或多个方块中规定的功能/动作的各个方面的指令。These computer readable program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine such that when executed by the processing unit of the computer or other programmable data processing apparatus , resulting in means for realizing the functions/actions specified in one or more blocks in the flowchart and/or block diagrams. These computer-readable program instructions can also be stored in a computer-readable storage medium, and these instructions cause computers, programmable data processing devices and/or other devices to work in a specific way, so that the computer-readable medium storing instructions includes An article of manufacture comprising instructions for implementing aspects of the functions/acts specified in one or more blocks in flowcharts and/or block diagrams.

也可以把计算机可读程序指令加载到计算机、其它可编程数据处理装置、或其它设备上,使得在计算机、其它可编程数据处理装置或其它设备上执行一系列操作步骤,以产生计算机实现的过程,从而使得在计算机、其它可编程数据处理装置、或其它设备上执行的指令实现流程图和/或块图中的一个或多个方块中规定的功能/动作。It is also possible to load computer-readable program instructions into a computer, other programmable data processing device, or other equipment, so that a series of operational steps are performed on the computer, other programmable data processing device, or other equipment to produce a computer-implemented process , so that instructions executed on computers, other programmable data processing devices, or other devices implement the functions/actions specified in one or more blocks in the flowcharts and/or block diagrams.

附图中的流程图和块图显示了根据本公开的多个实施例的设备、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或块图中的每个方块可以代表一个模块、程序段或指令的一部分,所述模块、程序段或指令的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。在有些作为替换的实现中,方块中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方块实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,块图和/或流程图中的每个方块、以及块图和/或流程图中的方块的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatuses, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in a flowchart or block diagram may represent a module, a program segment, or a portion of an instruction that contains one or more Executable instructions. In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It is also to be noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by a dedicated hardware-based system that performs the specified function or action , or may be implemented by a combination of dedicated hardware and computer instructions.

以上已经描述了本公开的各实施例,上述说明是示例性的,并非穷尽性的,并且也不限于所披露的各实施例。在不偏离所说明的各实施例的范围和精神的情况下,对于本技术领域的普通技术人员来说许多修改和变更都是显而易见的。本文中所用术语的选择,旨在最好地解释各实施例的原理、实际应用或对市场中技术的技术改进,或者使本技术领域的其它普通技术人员能理解本文披露的各实施例。Having described various embodiments of the present disclosure above, the foregoing description is exemplary, not exhaustive, and is not limited to the disclosed embodiments. Many modifications and alterations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen to best explain the principle of each embodiment, practical application or technical improvement over the technology in the market, or to enable other persons of ordinary skill in the art to understand each embodiment disclosed herein.

Claims (13)

1. A method for preventing cheating, comprising:
running a check-in application for a swipe check-in on a mobile device;
detecting whether the check-in application is running on a virtualized system; and
in response to detecting that the check-in application is running on the virtualized system, determining that a cheating behavior is present on the mobile device,
wherein detecting whether the check-in application is running on the virtualized system comprises:
detecting whether a particular class in the operating system of the mobile device is provided by the virtualization system,
wherein the operating system is an android operating system and the particular class is an Instrumentation class in the android operating system.
2. The method of claim 1, further comprising:
disabling a face-brushing check-in function in the check-in application; and
user account information associated with the check-in application is sent to a server for addition to a blacklist.
3. The method of claim 2, wherein disabling a face check-in function in the check-in application comprises:
users of the mobile devices are prevented from using a virtualized environment to falsify wireless router information for face-up.
4. The method of claim 3, wherein disabling a face check-in function in the check-in application comprises:
prompting a user of the mobile device for an abnormal operation; and
prompting the user to exit the check-in application and restarting the check-in application.
5. A method for preventing cheating, comprising:
obtaining an internet protocol, IP, address of a mobile device on which a check-in application for swipe-in is running;
detecting whether the IP address is abnormal; and
in response to detecting that the IP address is present as an anomaly, determining that a cheating behavior is present on the mobile device,
wherein detecting whether the IP address has an exception comprises:
obtaining a Basic Service Set Identifier (BSSID) of a wireless router connected with the mobile device; and
detecting whether the IP address has an exception based on the BSSID,
wherein detecting whether the IP address has an exception based on the BSSID comprises:
counting the maximum probability IP address corresponding to the BSSID;
based on a comparison between the IP address and the most probable IP address, it is determined whether an anomaly exists in the IP address.
6. The method of claim 5, wherein detecting whether the IP address has an exception comprises:
detecting whether the IP address is on an IP address white list, wherein the IP address white list is collected in advance.
7. A mobile device, comprising:
a processing unit; and
a memory coupled to the processing unit and storing instructions that, when executed by the processing unit, perform the actions of:
running a check-in application for a swipe check-in on the mobile device;
detecting whether the check-in application is running on a virtualized system; and
in response to detecting that the check-in application is running on the virtualized system, determining that a cheating behavior is present on the mobile device,
wherein detecting whether the check-in application is running on the virtualized system comprises:
detecting whether a particular class in the operating system of the mobile device is provided by the virtualization system,
wherein the operating system is an android operating system and the particular class is an Instrumentation class in the android operating system.
8. The apparatus of claim 7, further comprising:
disabling a face-brushing check-in function in the check-in application; and
user account information associated with the check-in application is sent to a server for addition to a blacklist.
9. The apparatus of claim 8, wherein disabling a face-swipe check-in function in the check-in application comprises:
users of the mobile devices are prevented from using a virtualized environment to falsify wireless router information for face-up.
10. The apparatus of claim 9, wherein disabling a face-swipe check-in function in the check-in application comprises:
prompting a user of the mobile device for an abnormal operation; and
prompting the user to exit the check-in application and restarting the check-in application.
11. A server, comprising:
a processing unit; and
a memory coupled to the processing unit and storing instructions that, when executed by the processing unit, perform the actions of:
obtaining an internet protocol, IP, address of a mobile device on which a check-in application for swipe-in is running;
detecting whether the IP address is abnormal; and
in response to detecting that the IP address is present as an anomaly, determining that a cheating behavior is present on the mobile device,
wherein detecting whether the IP address has an exception comprises:
obtaining a Basic Service Set Identifier (BSSID) of a wireless router connected with the mobile device; and
detecting whether the IP address has an exception based on the BSSID,
wherein detecting whether the IP address has an exception based on the BSSID comprises:
counting the maximum probability IP address corresponding to the BSSID;
based on a comparison between the IP address and the most probable IP address, it is determined whether an anomaly exists in the IP address.
12. The server of claim 11, wherein detecting whether the IP address has an exception comprises:
detecting whether the IP address is on an IP address white list, wherein the IP address white list is collected in advance.
13. A system for anti-cheating comprising a mobile device according to any of claims 7-10 and a server according to any of claims 11-12.
CN201811217390.2A 2018-10-18 2018-10-18 Method, device and system for preventing cheating Active CN111079140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811217390.2A CN111079140B (en) 2018-10-18 2018-10-18 Method, device and system for preventing cheating

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811217390.2A CN111079140B (en) 2018-10-18 2018-10-18 Method, device and system for preventing cheating

Publications (2)

Publication Number Publication Date
CN111079140A CN111079140A (en) 2020-04-28
CN111079140B true CN111079140B (en) 2023-06-27

Family

ID=70308911

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811217390.2A Active CN111079140B (en) 2018-10-18 2018-10-18 Method, device and system for preventing cheating

Country Status (1)

Country Link
CN (1) CN111079140B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112509165A (en) * 2020-11-27 2021-03-16 中国人寿保险股份有限公司 Anti-cheating attendance checking method and system
CN114360085A (en) * 2021-11-25 2022-04-15 中国人民人寿保险股份有限公司 A method for identifying cheating in attendance, service system and terminal device thereof

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007138056A1 (en) * 2006-05-30 2007-12-06 Siemens Aktiengesellschaft Method for increasing handoff speed of mobile node in wireless lan and the mobile node
CA2595830A1 (en) * 2007-08-01 2009-02-01 Nortel Networks Limited A smart communications system for integration into a workflow-engaged clinical environment

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009182490A (en) * 2008-01-29 2009-08-13 Duaxes Corp Virtual private network management device
CN101299668A (en) * 2008-06-30 2008-11-05 华为技术有限公司 Method, system and apparatus for establishing communication
CN104183027B (en) * 2013-05-21 2018-01-23 腾讯科技(深圳)有限公司 A kind of User Status determines method and device
CN103795798B (en) * 2014-02-11 2017-05-03 南京泰格金卡科技有限公司 Mobile phone checking-in method
CN105788016A (en) * 2016-02-26 2016-07-20 河南智业科技发展有限公司 Anti-counterfeiting internet attendance method
CN107820210B (en) * 2017-11-14 2021-07-06 Oppo广东移动通信有限公司 Sign-in method, mobile terminal and computer readable storage medium
CN108346191B (en) * 2018-02-06 2020-08-14 中国平安人寿保险股份有限公司 Attendance checking method and device, computer equipment and storage medium
CN108492393A (en) * 2018-03-16 2018-09-04 百度在线网络技术(北京)有限公司 Method and apparatus for registering

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007138056A1 (en) * 2006-05-30 2007-12-06 Siemens Aktiengesellschaft Method for increasing handoff speed of mobile node in wireless lan and the mobile node
CA2595830A1 (en) * 2007-08-01 2009-02-01 Nortel Networks Limited A smart communications system for integration into a workflow-engaged clinical environment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
.基于Web服务的统一虚拟系统管理;高国钊;《计算机工程与设计》;全文 *
Implementation of measurement of aircraft fault protector performance based on virtual instrument;Yan Kejun;《IEEE 2011 10th International Conference on Electronic Measurement & Instruments》;全文 *
基于Web的网络化虚拟教学实验室;李凤保;《 仪器仪表学报》;全文 *

Also Published As

Publication number Publication date
CN111079140A (en) 2020-04-28

Similar Documents

Publication Publication Date Title
US12218934B2 (en) Contextual and risk-based multi-factor authentication
US11546371B2 (en) System and method for determining actions to counter a cyber attack on computing devices based on attack vectors
US10516698B2 (en) Honeypot computing services that include simulated computing resources
US10887307B1 (en) Systems and methods for identifying users
US9569605B1 (en) Systems and methods for enabling biometric authentication options
US10320841B1 (en) Fraud score heuristic for identifying fradulent requests or sets of requests
US9529990B2 (en) Systems and methods for validating login attempts based on user location
US20180295154A1 (en) Application of advanced cybersecurity threat mitigation to rogue devices, privilege escalation, and risk-based vulnerability and patch management
US10148631B1 (en) Systems and methods for preventing session hijacking
CN104580133B (en) Malicious program protection method and system and filtering table updating method thereof
WO2020181841A1 (en) Method for automatically testing horizontal over-permission vulnerabilities and related device
US20130139233A1 (en) System and method for controlling user access to a service processor
WO2017071551A1 (en) Method and device for preventing malicious access to login/registration interface
US10582387B2 (en) Disabling a mobile device that has stolen hardware components
KR20170074959A (en) Trusted terminal verification method and apparatus
US11991210B2 (en) Machine learning-based techniques for identifying deployment environments and enhancing security thereof
US11019494B2 (en) System and method for determining dangerousness of devices for a banking service
CN109409093B (en) A system vulnerability scanning scheduling method
US11563741B2 (en) Probe-based risk analysis for multi-factor authentication
CN111079140B (en) Method, device and system for preventing cheating
US20200374287A1 (en) Mutual identity verification
US11290486B1 (en) Allocating defective computing resources for honeypot services
US10580004B2 (en) System and method of identifying new devices during a user's interaction with banking services
RU2697926C1 (en) System and method of counteracting attack on computing devices of users
JP6053646B2 (en) Monitoring device, information processing system, monitoring method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant