CN111489184A - Method, device, server, client and medium for verifying click behavior - Google Patents

Method, device, server, client and medium for verifying click behavior Download PDF

Info

Publication number
CN111489184A
CN111489184A CN201910086795.5A CN201910086795A CN111489184A CN 111489184 A CN111489184 A CN 111489184A CN 201910086795 A CN201910086795 A CN 201910086795A CN 111489184 A CN111489184 A CN 111489184A
Authority
CN
China
Prior art keywords
advertisement content
key
server
behavior
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910086795.5A
Other languages
Chinese (zh)
Inventor
董英姿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201910086795.5A priority Critical patent/CN111489184A/en
Publication of CN111489184A publication Critical patent/CN111489184A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0248Avoiding fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention provides a method for verifying click behaviors, which is applied to a server and can verify various types of cheating behaviors, and the click behaviors can be verified only by requesting data once in the verification process, so that whether the click behaviors belong to the cheating behaviors or not can be verified. For example, the server may respond to the request and return the web page content and a key, where the key may be a key of the advertisement content in the web page content, then receive an encrypted character string of the advertisement content and a sliding track generated when the mouse moves on the web page content, decrypt the encrypted character string of the advertisement content using the key, if decryption is successful, verify the encrypted character string, record the click behavior, verify the sliding track, and determine whether the click behavior belongs to the cheating behavior according to the verification result. The disclosure provides a method for verifying click behavior, which is applied to a client.

Description

Method, device, server, client and medium for verifying click behavior
Technical Field
The present disclosure relates to the field of click behavior verification technologies, and in particular, to a method, an apparatus, a server, a client, and a medium for verifying a click behavior.
Background
Currently, the identification of the click behavior for the advertisement content is based on big data to identify whether the click behavior belongs to a cheating behavior. For example, whether a click behavior belongs to a cheating behavior is identified by obtaining data of multiple clicks from the same IP address. For another example, whether the click behavior belongs to the cheating behavior is identified by acquiring data that the IP addresses are different but the Cookies are the same. For another example, whether the click behavior belongs to the cheating behavior is identified by acquiring data of a click whose dwell time in the advertisement content is too short. However, in the process of implementing the inventive concept of the present invention, the inventor finds that the prior art has at least the following problems: in the prior art, the identification mode of the click behavior needs the accumulation of big data to identify whether the click behavior belongs to the cheating behavior, and only the same type of cheating behavior can be identified by one kind of data during identification. In addition, the acquired click data may be falsified, but cannot be verified by the encrypted information by this identification method.
Disclosure of Invention
Accordingly, the present disclosure is directed to a method, apparatus, server, client, and medium for verifying click behavior that at least partially solve one or more of the problems due to limitations and disadvantages of the related art.
A first aspect of the present disclosure provides a method for verifying click behavior, applied to a server, the method including: in response to a request, returning webpage content and a key, wherein the key comprises a key of advertisement content in the webpage content; receiving an encrypted character string of the advertisement content and a sliding track generated when a mouse moves on the webpage content; decrypting the encrypted character string of the advertisement content by using the key, if the decryption is successful, verifying the character string and recording the click behavior; and checking the sliding track, and determining whether the clicking behavior belongs to the cheating behavior according to the checking result.
According to an embodiment of the disclosure, the method further comprises: if decryption fails, verification fails and the click behavior is discarded.
According to an embodiment of the present disclosure, verifying the sliding trajectory includes: and judging whether the coordinates of the mouse entering the advertisement content are correct or not in the process of generating the sliding track.
According to an embodiment of the present disclosure, verifying the sliding trajectory includes: and judging whether the sliding track is in the range of the normal track.
According to an embodiment of the present disclosure, verifying the sliding trajectory includes: and judging whether the time for generating the sliding track is within a preset time range.
A second aspect of the present disclosure provides a method for verifying click behavior, which is applied to a client, and the method includes: receiving webpage content and a key, wherein the key comprises a key of advertisement content in the webpage content; when a user clicks the advertisement content, generating an encrypted character string of the advertisement content based on the website of the advertisement content and the key, and sending the encrypted character string of the advertisement content to a server so that the server can decrypt the encrypted character string of the advertisement content by using the key; and detecting a sliding track generated when the mouse moves on the webpage content, and sending the detected sliding track to the server so as to judge whether the clicking behavior belongs to a cheating behavior.
According to an embodiment of the disclosure, the method further comprises: sending coordinates of the mouse entering the advertisement content in the sliding track generation process to the server; and/or recording the time taken for generating the sliding track and sending the sliding track to the server.
According to an embodiment of the present disclosure, generating an encrypted string of the advertisement content based on the website of the advertisement content and the key includes: and splitting the website of the advertisement content into equal parts, and generating an encrypted character string of the advertisement content based on the first character of each equal part of character string and the MD5 value of the key.
A third aspect of the present disclosure provides an apparatus for verifying click behavior, applied to a server, the apparatus including: the response module is used for responding to the request and returning webpage content and a key, wherein the key comprises a key of advertisement content in the webpage content; the receiving module is used for receiving the encrypted character string of the advertisement content and the sliding track generated when the mouse moves on the webpage content; the decryption module is used for decrypting the encrypted character string of the advertisement content by using the secret key, and if the decryption is successful, the verification is passed, and the click behavior is recorded; and the checking module is used for checking the sliding track and determining whether the clicking behavior belongs to the cheating behavior according to the checking result.
According to an embodiment of the present disclosure, the apparatus further comprises: and the discarding module is used for failing to verify if the decryption fails and discarding the click behavior.
According to an embodiment of the disclosure, the verification module is further configured to: and judging whether the coordinates of the mouse entering the advertisement content are correct or not in the process of generating the sliding track.
According to an embodiment of the disclosure, the verification module is further configured to: and judging whether the sliding track is in the range of the normal track.
According to an embodiment of the disclosure, the verification module is further configured to: and judging whether the time for generating the sliding track is within a preset time range.
A fourth aspect of the present disclosure provides an apparatus for verifying click behavior, applied to a client, the apparatus including: the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving webpage content and keys, and the keys comprise keys of advertisement content in the webpage content; the generation module is used for generating an encrypted character string of the advertisement content based on the website of the advertisement content and the secret key when the user clicks the advertisement content, and sending the encrypted character string of the advertisement content to a server so that the server can decrypt the encrypted character string of the advertisement content by using the secret key; and the detection module is used for detecting a sliding track generated when the mouse moves on the webpage content and sending the detected sliding track to the server so as to judge whether the clicking behavior belongs to the cheating behavior.
According to an embodiment of the present disclosure, the apparatus further comprises: the sending module is used for sending the coordinates of the mouse entering the advertisement content in the sliding track generating process to the server; and/or; and the recording module is used for recording the time for generating the sliding track and sending the time to the server.
According to the embodiment of the disclosure, the generating module is further configured to split the website of the advertisement content into equal parts, and generate the encrypted character string of the advertisement content based on the first letter of each equal part of the character string and the md5 value of the key.
A fifth aspect of the present disclosure provides a server comprising: one or more processors, and a storage device. The storage device is used for storing one or more programs. Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of verifying click behavior provided in the first aspect.
A sixth aspect of the present disclosure provides a computer-readable medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the method of verifying click behavior as provided by the first aspect.
A seventh aspect of the present disclosure provides a computer program comprising computer executable instructions for implementing the method of verifying click behavior as provided by the first aspect when executed.
An eighth aspect of the present disclosure provides a client, comprising: one or more processors, and a storage device. The storage device is used for storing one or more programs. Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of verifying click behavior provided by the second aspect.
A ninth aspect of the present disclosure provides a computer-readable medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the method of verifying click behavior as provided by the second aspect.
A tenth aspect of the present disclosure provides a computer program comprising computer executable instructions for implementing the method of verifying click behavior as provided by the second aspect when executed.
The method for verifying click behaviors applied to the server provided by the first aspect can verify various types of cheating behaviors, and can complete verification of the click behaviors only by requesting data once in the verification process, so that whether the cheating behaviors belong to the cheating behaviors or not can be verified. For example, the server may respond to the request and return the web page content and a key, where the key may be a key of the advertisement content in the web page content, then receive an encrypted character string of the advertisement content and a sliding track generated when the mouse moves on the web page content, decrypt the encrypted character string of the advertisement content using the key, if decryption is successful, verify the encrypted character string, record the click behavior, verify the sliding track, and determine whether the click behavior belongs to the cheating behavior according to the verification result.
The verification click behavior method applied to the client side provided by the second aspect can detect the click behavior of the user on the advertisement content, and when the user clicks the advertisement content, the encryption character string of the advertisement content is generated based on the website of the advertisement content and the key, so that the server decrypts the encryption character string of the advertisement content by using the key, and whether the click behavior belongs to the cheating behavior or not is judged conveniently.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
FIG. 1 schematically illustrates a flow chart of a method of verifying click behavior applied to a server in accordance with an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow diagram of a method of verifying click behavior applied to a server, according to another embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of a method of verifying click behavior applied to a client in accordance with an embodiment of the present disclosure;
FIG. 4 schematically illustrates a block diagram of a device for verifying click behavior applied to a server according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a block diagram of a device for verifying click behavior applied to a server according to another embodiment of the present disclosure;
FIG. 6 schematically illustrates a block diagram of a device for verifying click behavior applied to a client in accordance with an embodiment of the present disclosure;
FIG. 7 schematically illustrates a block diagram of a device for verifying click behavior applied to a client, in accordance with another embodiment of the present disclosure;
FIG. 8 schematically illustrates a block diagram of a computer system of a server according to an embodiment of the present disclosure;
FIG. 9 schematically illustrates a block diagram of a computer system of a client in accordance with an embodiment of the present disclosure;
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). It will be further understood by those within the art that virtually any disjunctive word and/or phrase presenting two or more alternative terms, whether in the description, claims, or drawings, should be understood to contemplate the possibilities of including one of the terms, either of the terms, or both terms. For example, the phrase "a or B" should be understood to include the possibility of "a" or "B", or "a and B".
Fig. 1 schematically shows a flowchart of a verification click behavior method applied to a server according to an embodiment of the present disclosure.
As shown in fig. 1, the method for verifying click behavior applied to the server includes steps S101 to S104.
In step S101, in response to the request, the web page content and the key are returned, the key including the key of the advertisement content in the web page content.
In step S102, an encrypted character string of the advertisement content and a sliding track generated when a mouse moves on the web page content are received.
In step S103, the encrypted character string of the advertisement content is decrypted by using the key, and if the decryption is successful, the verification is passed, and the click behavior is recorded.
In step S104, the sliding track is verified, and whether the click behavior is a cheating behavior is determined according to the verification result. .
By the method, various types of cheating behaviors can be verified, and the verification of the click behavior can be completed only by one time of requested data in the verification process, so that whether the cheating behavior belongs to the cheating behavior or not is verified. For example, the server may respond to the request and return the web page content and a key, where the key may be a key of the advertisement content in the web page content, then receive an encrypted character string of the advertisement content and a sliding track generated when the mouse moves on the web page content, decrypt the encrypted character string of the advertisement content using the key, if decryption is successful, verify the encrypted character string, record the click behavior, verify the sliding track, and determine whether the click behavior belongs to the cheating behavior according to the verification result.
In some embodiments of the present disclosure, the server may interact with the client over a network to receive and send messages. For example, the server may receive a request sent by the client to respond to the request and return the web page content and keys. The server can also receive various feedback information sent by the client, such as an encrypted character string encrypted by the client for the advertisement content and a sliding track generated when the mouse moves on the webpage content.
In some embodiments of the present disclosure, the server may be a server with various functions (e.g., a server with functions of returning a key, decrypting, verifying, etc.), or a server cluster, which may include a server with a function of returning a key, a server with a function of decrypting, and a server with a function of verifying. In some embodiments of the present disclosure, the server may be a server that provides various services, such as a background management server (for example only) that provides support for users to send requests with clients. The background management server can analyze and process the received request and then return the webpage content and the key.
The method for verifying click behavior provided by the embodiments of the present disclosure may be generally performed by a server. Accordingly, the device for verifying click behavior provided by the embodiments of the present disclosure may be generally disposed in a server. The method for verifying click behavior provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server and is capable of communicating with the client. Correspondingly, the device for verifying click behavior provided by the embodiment of the disclosure may also be disposed in a server or a server cluster different from the server and capable of communicating with the client
In some embodiments of the present disclosure, the key may be a key set by the server for the advertisement content in the web page content, and is used to decrypt an encrypted character string of the advertisement content received by the server to determine whether the click behavior belongs to a cheating behavior.
For example, the client may split UR L of the advertisement content equally, then extract the first character of each character string, and then generate the encrypted character string of the advertisement content with reference to the key and the respective first character.
In some embodiments of the present disclosure, decrypting the encrypted string of the advertisement content using the key may specifically use comparing the MD value of the key with the MD5 value of the advertisement content, if the comparison fails, it indicates that the UR L of the advertisement content is forged, i.e., the behavior of the advertisement content on the click belongs to a cheating behavior, if the comparison succeeds, it indicates that the UR L of the advertisement content is the UR L of the advertisement content itself, i.e., the behavior of the advertisement content on the click does not belong to a cheating behavior, and recording the click behavior, which enables verification of the click behavior.
Fig. 2 schematically shows a flow chart of a verification click behavior method applied to a server according to another embodiment of the present disclosure.
As shown in fig. 2, the method further includes step S201 in addition to step S101 to step S104 described in the embodiment of fig. 1.
In step S201, if the decryption fails, the verification is not passed, and the click behavior is discarded.
In the method, if the result of decrypting the encrypted character string of the advertisement content by using the key is failure, namely verification is not passed, the click behavior is discarded, namely the click behavior is a cheating behavior, so that the cheating click behavior can be prevented from being charged, and the advertisement cost of enterprises or merchants is reduced.
In some embodiments of the present disclosure, a sliding track generated when a mouse moves on a web page content may be received, the sliding track is verified to obtain a verification result, and then whether a click behavior belongs to a cheating behavior is determined according to the verification result, so that a flow of verifying the click behavior is simplified, and a workload of a server is reduced.
In some embodiments of the present disclosure, the sliding track generated when the mouse moves on the web page content may specifically refer to a track generated when the mouse moves from another area of the web page content to an area where the advertisement content is located.
In some embodiments of the present disclosure, if it is determined that the clicking action belongs to the cheating action, it indicates that the change of the coordinate values of the sliding trajectory generated when the mouse moves on the web page content is irregular. For example, if the jitter of a plurality of coordinate values generated during the movement of the mouse is large, it is determined that the clicking behavior belongs to the cheating behavior. If the clicking behavior is determined not to belong to the cheating behavior, the change of the coordinate value of the sliding track generated when the mouse moves on the webpage content is regular. For example, if the coordinate values generated during the movement of the mouse are continuously changed, it indicates that the click behavior does not belong to the cheating behavior.
In some embodiments of the present disclosure, checking the sliding track may include determining whether coordinates of the mouse entering the advertisement content are correct in the process of generating the sliding track.
In some embodiments of the present disclosure, the determining whether the coordinates of the mouse entering the advertisement content during the generation of the sliding track are correct may be specifically determining whether the coordinates of the mouse entering the advertisement content coincide with the coordinates of the edge of the area where the advertisement content is located. For example, the area where the advertisement content is located is a 4 × 4 square area, and the coordinates when the mouse enters the advertisement content may refer to the coordinates when the mouse first slides over the edge of the 4 × 4 square area. And if the coordinates of the mouse entering the advertisement content do not accord with the coordinates of the edge of the 4 x 4 square area, determining that the clicking behavior belongs to the cheating behavior.
In some embodiments of the present disclosure, verifying the sliding trajectory may include determining whether the sliding trajectory is within a range of a normal trajectory.
In some embodiments of the present disclosure, the determining whether the sliding track is within the range of the normal track may specifically be determining whether a coordinate value of the sliding track generated when the mouse moves on the web page content changes regularly, and if so, determining that the clicking behavior does not belong to the cheating behavior. Otherwise, if the click behavior is irregular, the click behavior is determined to belong to the cheating behavior.
In some embodiments of the present disclosure, verifying the sliding trajectory may include determining whether a time taken to generate the sliding trajectory is within a preset time range.
In some embodiments of the present disclosure, the determination of whether the time taken to generate the sliding trajectory is within the preset time range may be specifically a determination of whether the mouse moves from one point of the web page content to another point of the advertisement content, and a time taken to press and bounce is within the preset time range. For example, the preset time range may be 1-2.5 s, and if the mouse moves from one point of the web page content to another point of the advertisement content and the time taken to press and bounce is not within the range of 1-2.5 s, it is determined that the clicking behavior belongs to the cheating behavior. On the contrary, if the mouse moves from one point of the webpage content to another point of the advertisement content and the time taken for pressing and bouncing is within the range of 1-2.5 s, the clicking behavior is determined not to belong to the cheating behavior.
In some embodiments of the present disclosure, it may also be determined whether the clicking behavior is the cheating behavior by determining whether a time taken for the mouse to click on the advertisement content is within a preset time range. For example, the time of a mouse click on advertising content is recorded, which may refer to the time it takes for the mouse to bounce from the press. At this time, whether the time taken from the pressing to the bouncing of the mouse is within the preset time range can be judged to determine whether the clicking behavior is the cheating behavior. Generally, the time for the mouse to press and bounce must be a positive value, and if the time for the mouse to press and bounce exceeds a preset time range, the machine can be considered as a simulated click, and the preset time range can be a time range obtained by verifying a large amount of correct data by the machine.
FIG. 3 schematically shows a flowchart of a method for verifying click behavior applied to a client according to an embodiment of the present disclosure.
As shown in fig. 3, the method of verifying click behavior includes steps S301 to S303.
In step S301, web page content and a key are received, wherein the key includes a key of advertisement content in the web page content.
In step S302, when the user clicks on the advertisement content, an encrypted character string of the advertisement content is generated based on the website of the advertisement content and the key, and the encrypted character string of the advertisement content is sent to a server, so that the server decrypts the encrypted character string of the advertisement content by using the key.
In step S303, a sliding track generated when the mouse moves on the web content is detected, and the detected sliding track is sent to the server, so as to determine whether the click behavior is a cheating behavior.
The method can detect the clicking behavior of the user on the advertisement content, and when the user clicks the advertisement content, the encrypted character string of the advertisement content is generated based on the website of the advertisement content and the secret key, so that the server decrypts the encrypted character string of the advertisement content by using the secret key, and whether the clicking behavior belongs to the cheating behavior or not is judged conveniently.
In some embodiments of the present disclosure, the client may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
For example, the website of the advertisement content is split equally, and the encrypted character string of the advertisement content is generated based on the first character of each equal part of the character string and the MD5 value of the key.
In some embodiments of the present disclosure, a sliding track generated when the mouse moves on the web content may be detected, the detected sliding track may be sent to the server, and a coordinate of the mouse entering the advertisement content during the sliding track generation process may be sent to the server, so that the server may determine whether the click behavior is a cheating behavior according to a sliding track check result.
In some embodiments of the present disclosure, the script may detect a sliding track generated when the mouse moves on the web content, and record coordinates when the mouse enters the advertisement content and a time taken for generating the sliding track, and record a time taken for the mouse to click on the advertisement content, and the like.
FIG. 4 is a block diagram schematically illustrating a device for verifying click behavior applied to a server according to an embodiment of the present disclosure.
As shown in fig. 4, the verification click behavior device 400 applied to the server includes: a response module 410, a receiving module 420, a decryption module 430, and a verification module 440.
A response module 410, configured to return, in response to the request, the web page content and a key, where the key includes a key of the advertisement content in the web page content.
A receiving module 420, configured to receive the encrypted character string of the advertisement content and a sliding track generated when the mouse moves on the web page content.
And the decryption module 430 decrypts the encrypted character string of the advertisement content by using the key, and if the decryption is successful, the verification is passed, and the click behavior is recorded.
The checking module 440 is configured to check the sliding track, and determine whether the click behavior is a cheating behavior according to the check result.
The device 400 for verifying click behavior applied to the server can verify various types of cheating behaviors, and can complete the verification of the click behavior only by requesting data once in the verification process, thereby verifying whether the cheating behaviors belong to the cheating behaviors or not. For example, the server may respond to the request and return the web page content and a key, where the key may be a key of the advertisement content in the web page content, then receive an encrypted character string of the advertisement content and a sliding track generated when the mouse moves on the web page content, decrypt the encrypted character string of the advertisement content using the key, if decryption is successful, verify the encrypted character string, record the click behavior, verify the sliding track, and determine whether the click behavior belongs to the cheating behavior according to the verification result.
According to the embodiments of the present disclosure, the device 400 for verifying click behavior applied to a server may be used to implement the method for verifying click behavior described in the embodiment of fig. 1.
FIG. 5 schematically illustrates a block diagram of a device for verifying click behavior applied to a server according to another embodiment of the present disclosure.
As shown in fig. 5, the apparatus 500 for verifying click behavior applied to the server includes a discarding module 510 in addition to the response module 410, the receiving module 420, the decrypting module 430 and the verifying module 440 described in the embodiment of fig. 4.
And a discarding module 510, if the decryption is successful, the verification is passed, and the click behavior is recorded, wherein the click behavior does not belong to the cheating behavior.
In the verification click behavior device 500 applied to the server, if the result of decrypting the encrypted character string of the advertisement content by using the key is failure, that is, the verification is not passed, the click behavior is discarded, that is, the click behavior is a cheating behavior, so that the cheating click behavior can be prevented from being charged, and the advertisement cost of an enterprise or a merchant is reduced.
According to the embodiments of the present disclosure, the device 500 for verifying click behavior applied to a server may be used to implement the method for verifying click behavior described in the embodiment of fig. 2.
According to embodiments of the present invention, at least one of the response module 410, the receiving module 420, the decrypting module 430, the verifying module 440, and the discarding module 510 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a programmable logic array (P L A), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or any other reasonable manner of integrating or packaging a circuit, or may be implemented in hardware or firmware, or any other reasonable combination of software, hardware, and three firmware implementations, or at least one of the response module 410, the receiving module 420, the decrypting module 430, the verifying module 440, and the discarding module 510 may be implemented at least in part as a computer program that, when executed by a computer, performs the functions of the computer.
FIG. 6 schematically illustrates a block diagram of a device for verifying click behavior applied to a client according to an embodiment of the present disclosure.
As shown in fig. 6, the verification click behavior device 600 applied to the client includes: a receiving module 610, a generating module 620 and a detecting module 630.
A receiving module 610, configured to receive web page content and a key, where the key includes a key of advertisement content in the web page content.
The generating module 620 is configured to generate an encrypted character string of the advertisement content based on the website of the advertisement content and the key when the user clicks the advertisement content, and send the encrypted character string of the advertisement content to a server, so that the server decrypts the encrypted character string of the advertisement content by using the key.
The detecting module 630 is configured to detect a sliding track generated when the mouse moves on the web content, and send the detected sliding track to the server, so as to determine whether the clicking action is a cheating action.
The verification clicking behavior device 600 applied to the client can detect the clicking behavior of the user on the advertisement content, and when the user clicks the advertisement content, the encryption character string of the advertisement content is generated based on the website of the advertisement content and the key, so that the server decrypts the encryption character string of the advertisement content by using the key, and whether the clicking behavior belongs to the cheating behavior is judged conveniently.
According to the embodiments of the present disclosure, the apparatus 600 for verifying click behavior applied to the client may be used to implement the method for verifying click behavior described in the embodiment of fig. 3.
FIG. 7 is a block diagram schematically illustrating a device for verifying click behavior applied to a client according to an embodiment of the present disclosure.
As shown in fig. 7, in addition to the receiving module 610, the generating module 620 and the verifying module 630 described in the embodiment of fig. 6, the apparatus 700 for verifying click behavior applied to the client includes: a sending module 710 and a recording module 720.
A sending module 710, configured to send, to the server, coordinates of the mouse when entering the advertisement content in a process of generating the sliding track.
And the recording module 720 is used for recording the time for generating the sliding track and sending the time to the server.
The device 700 for verifying click behavior applied to the client may detect a sliding track generated when the mouse moves on the web content, and transmit the detected sliding track to the server, and transmit coordinates of the mouse entering the advertisement content during the sliding track generation process to the server, so that the server may determine whether the click behavior is a cheating behavior according to a result of the sliding track verification.
According to embodiments of the present invention, at least one of the receiving module 610, the generating module 620, the detecting module 630, the sending module 710, and the recording module 720 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a programmable logic array (P L a), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging circuits, or any other reasonable combination of software, hardware, and three firmware implementations, or at least one of the receiving module 610, the generating module 620, the detecting module 630, the sending module 710, and the recording module 720 may be implemented at least partially as a computer program that, when executed by a computer.
Fig. 8 schematically shows a block diagram of a computer system of a server according to an embodiment of the disclosure. The computer system illustrated in FIG. 8 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 8, a computer system 800 of a server according to an embodiment of the present disclosure includes a processor 801 which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. The processor 801 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 801 may also include onboard memory for caching purposes. The processor 801 may include a single processing unit or multiple processing units for performing the different actions of the method flows described with reference to fig. 1-2 in accordance with embodiments of the present disclosure.
In the RAM803, various programs and data necessary for the operation of the system 800 are stored. The processor 801, the ROM 802, and the RAM803 are connected to each other by a bus 804. The processor 801 performs the various steps of the method of verifying click behavior described above with reference to fig. 1-2 by executing programs in the ROM 802 and/or RAM 803. Note that the program may also be stored in one or more memories other than the ROM 802 and the RAM 803. The processor 801 may also perform the various steps of the method of verifying click behavior described above with reference to fig. 1-2 by executing programs stored in the one or more memories.
According to AN embodiment of the present disclosure, the system 800 may further include AN input/output (I/O) interface 807, the input/output (I/O) interface 807 also being connected to the bus 804. the system 800 may further include one or more of AN input section 806 including a keyboard, a mouse, and the like, AN output section 807 including a Cathode Ray Tube (CRT), a liquid crystal display (L CD), and the like, a speaker, and the like, a storage section 807 including a hard disk, and the like, and a communication section 809 including a network interface card such as a L AN card, a modem, and the like, the communication section 809 performs communication processing via a network such as the Internet, a drive 810 is also connected to the I/O interface 805 as necessary, a removable medium 811 such as a magnetic disk, AN optical disk, a magneto-optical disk, a semiconductor memory, and the like is mounted on the drive 810 as necessary, so that a computer program read therefrom is mounted into the storage section 808 as necessary.
According to an embodiment of the present disclosure, the method described above with reference to the flow chart may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811. The computer program, when executed by the processor 801, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing. According to embodiments of the present disclosure, a computer-readable medium may include one or more memories other than the ROM 802 and/or the RAM803 and/or the ROM 802 and the RAM803 described above.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As another aspect, the present disclosure also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to perform a method of verifying click behavior applied to a server according to an embodiment of the disclosure. The method comprises the following steps: in response to the request, returning the webpage content and the key, wherein the key comprises a key of the advertisement content in the webpage content; receiving an encrypted character string of advertisement content and a sliding track generated when a mouse moves on the webpage content; decrypting the encrypted character string of the advertisement content by using a secret key, if the decryption is successful, verifying the character string and recording the click behavior; and checking the sliding track, and determining whether the clicking behavior belongs to the cheating behavior according to the checking result.
Fig. 9 schematically shows a block diagram of a computer system of a client according to an embodiment of the present disclosure. The computer system illustrated in FIG. 9 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 9, a computer system 900 of a client according to an embodiment of the present disclosure includes a processor 901, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure described with reference to fig. 3.
In the RAM 903, various programs and data necessary for the operation of the system 900 are stored. The processor 901, the ROM 902, and the RAM 903 are connected to each other through a bus 904. The processor 901 performs various steps of the method of verifying click behavior described above with reference to fig. 3 by executing programs in the ROM 902 and/or the RAM 903. Note that the program may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform the various steps of the method of verifying click behavior described above with reference to fig. 3 by executing programs stored in the one or more memories.
According to AN embodiment of the present disclosure, the system 900 may further include AN input/output (I/O) interface 907, the input/output (I/O) interface 907 also being connected to the bus 904. the system 900 may further include one or more of AN input section 906 including a keyboard, a mouse, and the like, AN output section 907 including a Cathode Ray Tube (CRT), a liquid crystal display (L CD), and the like, and a speaker, and the like, a storage section 908 including a hard disk, and the like, and a communication section 909 including a network interface card such as a L AN card, a modem, and the like, the communication section 909 performs communication processing via a network such as the Internet, a drive 910 is also connected to the I/O interface 905 as necessary, a removable medium 911 such as a magnetic disk, AN optical disk, a magneto-optical disk, a semiconductor memory, and the like is mounted on the drive 910 as necessary, so that a computer program read therefrom is mounted into the storage section 908 as necessary.
According to an embodiment of the present disclosure, the method described above with reference to the flow chart may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing. According to embodiments of the present disclosure, a computer-readable medium may include the ROM 902 and/or the RAM 903 described above and/or one or more memories other than the ROM 902 and the RAM 903.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As another aspect, the present disclosure also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to perform a method of verifying click behavior applied to a client according to an embodiment of the disclosure. The method comprises the following steps: receiving webpage content and a key, wherein the key comprises a key of advertisement content in the webpage content; when a user clicks the advertisement content, generating an encrypted character string of the advertisement content based on a website of the advertisement content and a key, and sending the encrypted character string of the advertisement content to a server so that the server can decrypt the encrypted character string of the advertisement content by using the key; and detecting a sliding track generated when the mouse moves on the webpage content, and sending the detected sliding track to the server so as to judge whether the clicking behavior belongs to a cheating behavior.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (14)

1. A method for verifying click behavior is applied to a server, and the method comprises the following steps:
in response to a request, returning webpage content and a key, wherein the key comprises a key of advertisement content in the webpage content;
receiving an encrypted character string of advertisement content and a sliding track generated when a mouse moves on the webpage content;
decrypting the encrypted character string of the advertisement content by using the key, if the decryption is successful, verifying the character string and recording the click behavior; and
and checking the sliding track, and determining whether the clicking behavior belongs to the cheating behavior according to the checking result.
2. The method of claim 1, wherein the method further comprises:
if decryption fails, verification fails and the click behavior is discarded.
3. The method of claim 1, wherein verifying the sliding trajectory comprises:
and judging whether the coordinates of the mouse entering the advertisement content are correct or not in the process of generating the sliding track.
4. The method of claim 1, wherein verifying the sliding trajectory comprises: and judging whether the sliding track is in the range of the normal track.
5. The method of claim 1, wherein verifying the sliding trajectory comprises: and judging whether the time for generating the sliding track is within a preset time range.
6. A method for verifying click behavior is applied to a client, and the method comprises the following steps:
receiving webpage content and a key, wherein the key comprises a key of advertisement content in the webpage content;
when a user clicks the advertisement content, generating an encrypted character string of the advertisement content based on the website of the advertisement content and the key, and sending the encrypted character string of the advertisement content to a server so that the server can decrypt the encrypted character string of the advertisement content by using the key; and
and detecting a sliding track generated when the mouse moves on the webpage content, and sending the detected sliding track to the server so as to judge whether the clicking behavior belongs to a cheating behavior.
7. The method of claim 6, wherein the method further comprises:
sending coordinates of the mouse entering the advertisement content in the sliding track generation process to the server; and/or
And recording the time taken for generating the sliding track and sending the sliding track to the server.
8. The method of claim 6, wherein generating an encrypted string of advertising content based on the web site of the advertising content and the key comprises:
and splitting the website of the advertisement content into equal parts, and generating an encrypted character string of the advertisement content based on the first character of each equal part of character string and the MD5 value of the key.
9. An apparatus for verifying click behavior, applied to a server, the apparatus comprising:
the response module is used for responding to the request and returning webpage content and a key, wherein the key comprises a key of advertisement content in the webpage content;
the receiving module is used for receiving the encrypted character string of the advertisement content and the sliding track generated when the mouse moves on the webpage content;
the decryption module is used for decrypting the encrypted character string of the advertisement content by using the secret key, and if the decryption is successful, the verification is passed, and the click behavior is recorded;
and the checking module is used for checking the sliding track and determining whether the clicking behavior belongs to the cheating behavior according to the checking result.
10. An apparatus for verifying click behavior, applied to a client, the apparatus comprising:
the system comprises a receiving module, a sending module and a processing module, wherein the receiving module is used for receiving webpage content and keys, and the keys comprise keys of advertisement content in the webpage content;
the generation module is used for generating an encrypted character string of the advertisement content based on the website of the advertisement content and the secret key when the user clicks the advertisement content, and sending the encrypted character string of the advertisement content to a server so that the server can decrypt the encrypted character string of the advertisement content by using the secret key; and
and the detection module is used for detecting a sliding track generated when the mouse moves on the webpage content and sending the detected sliding track to the server so as to judge whether the clicking behavior belongs to the cheating behavior.
11. A server, comprising:
one or more processors; and
storage means for storing one or more programs;
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-5.
12. A computer readable medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 5.
13. A client, comprising:
one or more processors; and
storage means for storing one or more programs;
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of claims 6-8.
14. A computer readable medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of claims 6-8.
CN201910086795.5A 2019-01-29 2019-01-29 Method, device, server, client and medium for verifying click behavior Pending CN111489184A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910086795.5A CN111489184A (en) 2019-01-29 2019-01-29 Method, device, server, client and medium for verifying click behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910086795.5A CN111489184A (en) 2019-01-29 2019-01-29 Method, device, server, client and medium for verifying click behavior

Publications (1)

Publication Number Publication Date
CN111489184A true CN111489184A (en) 2020-08-04

Family

ID=71797141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910086795.5A Pending CN111489184A (en) 2019-01-29 2019-01-29 Method, device, server, client and medium for verifying click behavior

Country Status (1)

Country Link
CN (1) CN111489184A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI796909B (en) * 2021-12-29 2023-03-21 美商沃耶特拉海龜灘有限公司 Mouse device with a detection function of non-human mouse events and detection method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090125719A1 (en) * 2007-08-02 2009-05-14 William Cochran Methods of ensuring legitimate pay-per-click advertising
CN104994092A (en) * 2015-06-30 2015-10-21 百度在线网络技术(北京)有限公司 Service request processing method, terminal browser and anti-attack server
CN105760455A (en) * 2016-02-04 2016-07-13 腾讯科技(深圳)有限公司 Anti-cheating method and device for advertisement clicking
WO2016156513A1 (en) * 2015-03-31 2016-10-06 Irdeto B.V. Online advertisements
CN107871072A (en) * 2017-11-09 2018-04-03 王海鸥 A kind of verification method being applied in client end interface and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090125719A1 (en) * 2007-08-02 2009-05-14 William Cochran Methods of ensuring legitimate pay-per-click advertising
WO2016156513A1 (en) * 2015-03-31 2016-10-06 Irdeto B.V. Online advertisements
CN104994092A (en) * 2015-06-30 2015-10-21 百度在线网络技术(北京)有限公司 Service request processing method, terminal browser and anti-attack server
CN105760455A (en) * 2016-02-04 2016-07-13 腾讯科技(深圳)有限公司 Anti-cheating method and device for advertisement clicking
CN107871072A (en) * 2017-11-09 2018-04-03 王海鸥 A kind of verification method being applied in client end interface and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI796909B (en) * 2021-12-29 2023-03-21 美商沃耶特拉海龜灘有限公司 Mouse device with a detection function of non-human mouse events and detection method thereof

Similar Documents

Publication Publication Date Title
US9652610B1 (en) Hierarchical data security measures for a mobile device
US10032037B1 (en) Establishing application trust levels using taint propagation as a service
US8621613B1 (en) Detecting malware in content items
KR102429406B1 (en) Check user interactions on the content platform
US10733594B1 (en) Data security measures for mobile devices
CN110708335A (en) Access authentication method and device and terminal equipment
US10129278B2 (en) Detecting malware in content items
CN110324416A (en) Download path tracking, device, server, terminal and medium
US11949688B2 (en) Securing browser cookies
CN107454041B (en) Method and device for preventing server from being attacked
CN112506798A (en) Performance test method, device, terminal and storage medium of block chain platform
CN106953845B (en) Method and device for protecting sensitive information input to webpage
US9021596B2 (en) Correcting workflow security vulnerabilities via static analysis and virtual patching
CN113362173A (en) Anti-duplication mechanism verification method, anti-duplication mechanism verification system, electronic equipment and storage medium
CN110647736A (en) Plug-in agent system login method and device, computer equipment and storage medium
US20120198555A1 (en) Testing web services that are accessible via service oriented architecture (soa) interceptors
CN113162937A (en) Application safety automatic detection method, system, electronic equipment and storage medium
CN111489184A (en) Method, device, server, client and medium for verifying click behavior
US10015181B2 (en) Using natural language processing for detection of intended or unexpected application behavior
CN113132400B (en) Business processing method, device, computer system and storage medium
CN110427745B (en) Verification code obtaining method and device, electronic equipment and computer readable medium
CN110659897A (en) Method, system, computing device and medium for transaction verification
CN112101922A (en) Cloud payment method and device, cloud system, electronic device and storage medium
CN113783835B (en) Password sharing method, device, equipment and storage medium
US9485242B2 (en) Endpoint security screening

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination