CN112399352B - Cheating behavior identification method, device and storage medium - Google Patents
Cheating behavior identification method, device and storage medium Download PDFInfo
- Publication number
- CN112399352B CN112399352B CN202011219022.9A CN202011219022A CN112399352B CN 112399352 B CN112399352 B CN 112399352B CN 202011219022 A CN202011219022 A CN 202011219022A CN 112399352 B CN112399352 B CN 112399352B
- Authority
- CN
- China
- Prior art keywords
- position information
- operation position
- repeated
- evaluation parameter
- repeated operation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Marketing (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The embodiment of the disclosure provides a cheating behavior identification method, equipment and a storage medium, wherein the cheating behavior identification method comprises the following steps: acquiring a plurality of pieces of operation position information when a user repeatedly performs target operation on a terminal interface within a preset time period; screening out identical and/or partially identical repeated operation position information from the information, and obtaining the repeated number of each repeated operation position information; acquiring repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of a plurality of pieces of operation position information; and determining whether the user has the identification result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold value. The embodiment of the disclosure can improve the anti-interference capability and the recognition accuracy of the recognition cheating behavior, effectively avoid misjudgment and missed judgment, and ensure fairness of scenes such as robbing bill or robbing purchase.
Description
Technical Field
Embodiments of the present disclosure relate to the field of communications technologies, and in particular, to a method, an apparatus, and a storage medium for identifying cheating behaviors.
Background
In daily life, some scenes such as order taking or purchase taking generally exist, for example, in the trip industry, when a passenger needs to go out, the passenger can always push orders to multiple drivers at the same time after placing the orders, the driver willing to receive the orders can receive the orders in an order taking mode, for example, the driver needs to pay attention to push, clicks an order taking button on a terminal interface after receiving the pushed orders, and the passenger can be taken according to the orders after the order taking is successful.
In order to improve the success rate of order or purchase, some people can adopt cheating behaviors, such as adopting a cheater to assist in order or purchase, for example, in the trip industry, some drivers can conduct order taking through the cheater, the drivers can pay attention to the pushing of the order at any time through the cheater, and the success rate of order taking can be improved. The cheating behavior is adopted when the bill is robbed or purchased, so that unfairness is brought, and some users without cheating cannot rob the bill or successfully rob the bill.
In the prior art, the identification of the cheating behavior is generally identified based on the position coordinates of the clicking operation, and whether the number of clicking a certain position coordinate exceeds a threshold value is judged by counting the number of clicking the same position coordinate, and if the number of clicking the same position coordinate exceeds the threshold value, the cheating behavior is determined. The cheating behavior recognition method in the prior art is easy to misjudge or miss judge, has low accuracy, and cannot effectively ensure the fairness of robbing bill or purchasing.
Disclosure of Invention
The embodiment of the disclosure provides a cheating behavior identification method, equipment and a storage medium, so as to accurately identify whether a user has a cheating behavior when ordering or purchasing, and ensure fairness of scenes such as ordering or purchasing.
In a first aspect, embodiments of the present disclosure provide a method for identifying cheating behavior, including:
Acquiring a plurality of pieces of operation position information when a user repeatedly performs target operation on a terminal interface within a preset time period;
screening out identical and/or partially identical repeated operation position information from the plurality of operation position information, and acquiring the repeated number of each repeated operation position information;
acquiring repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of the plurality of pieces of operation position information;
and determining whether the user has a recognition result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold value.
In a second aspect, embodiments of the present disclosure provide a cheating behavior recognition apparatus, comprising:
the acquisition module is used for acquiring a plurality of pieces of operation position information when a user repeatedly performs target operation on a terminal interface within a preset duration;
the statistics module is used for screening out duplicate operation position information which is completely the same and/or partially the same from the plurality of operation position information, and acquiring the duplicate number of each duplicate operation position information;
the processing module is used for acquiring repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of the plurality of pieces of operation position information;
And the identification module is used for determining whether the user has an identification result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold value.
In a third aspect, embodiments of the present disclosure provide a computer device comprising: comprising the following steps: a memory and a processor;
the memory is used for storing program instructions;
the processor is configured to invoke program instructions in the memory to perform the method according to the first aspect.
In a fourth aspect, embodiments of the present disclosure provide a computer-readable storage medium having a computer program stored thereon; the computer program, when executed, implements the method as described in the first aspect.
The cheating behavior identification method, the cheating behavior identification device and the storage medium provided by the embodiment of the disclosure are characterized in that a plurality of operation position information when a user repeatedly performs target operation on a terminal interface within a preset duration is obtained; screening duplicate operation position information which is identical and/or partially identical from the plurality of operation position information, and acquiring the duplicate number of each duplicate operation position information; acquiring repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of a plurality of pieces of operation position information; and determining whether the user has a recognition result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold value. According to the embodiment of the disclosure, through counting the repeated number of the identical and/or partially identical repeated operation position information and obtaining the repeated operation evaluation parameters according to the repeated number of each repeated operation position information and the total number of a plurality of operation position information, the repeated operation evaluation parameters can accurately reflect the repeated level of the target operation, the evaluation basis of whether the cheating is judged in a more scientific and quantitative manner, the anti-interference capability and the recognition accuracy of recognizing the cheating behavior are improved, the misjudgment and omission are effectively avoided, and the fairness of scenes such as order or purchase is ensured.
Various possible embodiments of the present disclosure and their technical advantages are described in detail below.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is an application scenario schematic diagram of a cheating behavior recognition method according to an embodiment of the present disclosure;
FIG. 2 is a flow chart of a method for identifying cheating behavior according to an embodiment of the present disclosure;
FIG. 3 is a flow chart of a method for identifying cheating behavior according to another embodiment of the present disclosure;
FIG. 4 is a block diagram of a cheating behavior recognition device provided by an embodiment of the present disclosure;
fig. 5 is a block diagram of a computer device for performing the cheating behavior identification method according to an embodiment of the present disclosure.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
In the scene of order or purchase, as described in the background art, the use of a cheater or the like to assist in order or purchase can improve the success rate of order or purchase.
The cheater is generally a click cheater, is special software or equipment, can realize an automatic click function on a preset area of a terminal screen, and has application in various scenes such as game plug-in, false flow (brush list), marketing activities, wool, network bus orders and the like due to the properties such as convenience, quick click and the like. There are two types of common click cheaters, one is software for installing a mobile phone, and the other is a device connected to the mobile phone through USB or bluetooth.
In the prior art, the identification of the cheating behavior is generally identified based on the position coordinates of the clicking operation, and whether the number of clicking a certain position coordinate exceeds a threshold value is judged by counting the number of clicking the same position coordinate, and if the number of clicking the same position coordinate exceeds the threshold value, the cheating behavior is determined.
However, the situation that the user clicks the same position coordinate for a plurality of times may occur because the user does not use the cheater, and the cheating behavior recognition method in the prior art also can misjudge the cheating behavior; in addition, some click cheaters can randomize the click positions, for example, ensure that the abscissa of the click positions is kept unchanged, the ordinate of the click positions is subjected to slight random fluctuation, or ensure that the ordinate of the click positions is kept unchanged, and the abscissa of the click positions is subjected to slight random fluctuation, so that the recognition of the cheating behavior recognition method in the prior art can be effectively avoided. Therefore, the cheating behavior recognition method in the prior art is easy to have misjudgment or missed judgment, namely the cheating behavior can be recognized as cheating, the cheating behavior is recognized as not cheating, the accuracy is not high, and the fairness of the robbery bill or the robbery purchase cannot be effectively ensured.
In order to solve the technical problems, the present disclosure provides a method for identifying cheating behaviors, so as to automatically and accurately identify whether the user has the cheating behaviors when the user is on a robbed order or is on a robbed purchase, and ensure fairness of the robbed order or the robbed purchase. Specifically, in the disclosure, a plurality of operation position information when a user repeatedly performs a target operation on a terminal interface within a preset time period is obtained first; the repeated operation position information which is identical and/or partially identical is screened from a plurality of operation positions, and the repeated number of each repeated operation position information is obtained, wherein the repeated operation position information which is identical and/or partially identical can comprise the identical operation position coordinates and also can comprise the partial identical operation position coordinates, such as the identical abscissa or the identical ordinate, so that the attention target of the cheating identification process is enlarged, the situation that the operation position coordinates are identical is not only concerned, and the occurrence of the situation of missed judgment is avoided; further, the repeated operation evaluation parameters can be obtained according to the repeated number of each piece of repeated operation position information and the total number of a plurality of pieces of operation position information, the identification result of whether the user has the cheating action or not is obtained according to the repeated operation evaluation parameters and the preset threshold value, the evaluation basis of whether the cheating action is judged in a more scientific and quantitative mode or not can be obtained through obtaining the repeated operation evaluation parameters, the anti-interference capability and the identification accuracy of the identification of the cheating action are improved, and the fairness of scenes such as order robbing or purchasing is effectively guaranteed.
The cheating behavior recognition method disclosed by the disclosure can be applied to an application scene shown in fig. 1, wherein the application scene comprises a terminal 101 and a server 102, a user performs operations such as order taking or purchase taking on the terminal, target operations such as clicking a button, clicking an icon, clicking a website link and the like can be repeated on a terminal interface in the order taking or purchase taking process, points can be buried in advance on the terminal interface, and the method is used for acquiring operation position information of the user, such as relative position X coordinates and Y coordinates when clicking the terminal interface, wherein the buried point position can be buried only in a specific area, such as buried only in a single button area; further, after the terminal obtains a plurality of pieces of operation position information when the user repeatedly performs the target operation on the terminal interface within a preset time period, the plurality of pieces of operation position information can be sent to the server, the server screens out identical and/or partially identical repeated operation position information from the plurality of operation positions, obtains the repeated number of each piece of repeated operation position information, obtains repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of the plurality of pieces of operation position information, and determines whether the user has an identification result of the cheating behavior according to the repeated operation evaluation parameters and a preset threshold value. Further, if the identification result shows that the user has cheating behaviors, rejecting an operation request corresponding to the response target operation; and/or determining a penalty policy for the user and sending penalty information to the terminal according to the penalty policy. The terminal may include, but is not limited to, a mobile phone, a tablet computer, a personal computer, etc., and the server may be a server, or a server cluster formed by a plurality of servers, or a cloud computing service center.
The following describes in detail, with specific embodiments, a technical solution of an embodiment of the present disclosure and how the technical solution of the present application solves the foregoing technical problems. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present disclosure will be described below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a method for identifying cheating behaviors according to an embodiment of the present invention. As shown in fig. 2, the embodiment provides a method for identifying cheating behaviors, an execution subject of which may be a computer device such as a server, and the method specifically includes the following steps:
s201, acquiring a plurality of pieces of operation position information when a user repeatedly performs target operation on a terminal interface within a preset time period.
In this embodiment, the user performs operations such as order taking or order taking on the terminal, and may repeatedly perform multiple target operations on the terminal interface during the order taking or order taking process, for example, clicking a button, clicking an icon, clicking a website link, etc., where the terminal may obtain multiple operation position information when the user repeatedly performs the target operation on the terminal interface within a preset duration, and send the multiple operation position information to the server, that is, the server may obtain the multiple operation position information from the terminal; of course, the server may also acquire the above-mentioned multiple operation location information through other approaches, for example, multiple operation location information obtained in advance from the database and stored in a preset duration when the user repeatedly performs the target operation on the terminal interface, or other approaches are not described herein.
The point may be buried in a specific area, for example, the point may be buried in a single button area only, and the operation position information of the user may be obtained through the point, for example, the X coordinate and the Y coordinate of the relative position when the terminal interface is clicked. Note that the operation position information in the present embodiment is not limited to the X-coordinate and the Y-coordinate described above, and may be recorded in other ways.
Optionally, because the plurality of pieces of operation position information are operation position information when the user repeatedly performs the target operation on the terminal interface within the preset duration, it can be determined whether the total quantity of the plurality of pieces of operation position information exceeds a preset total quantity threshold, if the total quantity of the plurality of pieces of operation position information does not exceed the preset total quantity threshold, it is indicated that the user performs the target operation only in a small quantity, the possibility of cheating behavior is low, and the subsequent flow of the cheating behavior identification method in this embodiment may not be executed; if the total number of the plurality of pieces of operation position information exceeds a preset total number threshold, continuing to execute the subsequent flow of the cheating behavior recognition method of the embodiment.
S202, duplicate operation position information which is identical and/or partially identical is screened out from the operation position information, and the duplicate number of each duplicate operation position information is obtained.
In this embodiment, after obtaining a plurality of pieces of operation position information when the user repeatedly performs the target operation on the terminal interface within the preset duration, statistical operation may be performed, and duplicate operation position information that is completely the same and/or partially the same is screened out, and at the same time, the duplicate number of each piece of duplicate operation position information is counted.
The repeated operation position information which is identical and/or partially identical can comprise the identical operation position coordinates, and can also comprise the identical part in the operation position coordinates, such as the identical abscissa or the identical ordinate, so that the attention target of the cheating identification process is enlarged, the situation of missed judgment can be avoided instead of only paying attention to the situation that the operation position coordinates are identical, and especially, the situation that some click cheaters can carry out randomization processing on the click positions can be aimed, wherein the randomization processing situation can ensure that the abscissa of the click positions is kept unchanged, the ordinate carries out slight random fluctuation, or the ordinate of the click positions is kept unchanged, and the abscissa carries out slight random fluctuation.
Alternatively, the operation position information may include two-dimensional coordinate information of the operation position of the target operation on the terminal interface, where the two-dimensional coordinate information includes first dimension coordinate information and second dimension coordinate information. Accordingly, the identical and/or partially identical repetitive operation position information includes at least one of: and the first type of repeated operation position information with identical two-dimensional coordinate information, the second type of repeated operation position information with identical first-dimensional coordinate information, and the third type of repeated operation position information with identical second-dimensional coordinate information.
For example, the two-dimensional coordinate information may be a rectangular coordinate system, wherein the first-dimensional coordinate information may be an X-coordinate and the second-dimensional coordinate information may be a Y-coordinate; correspondingly, the first type of repeated operation position information is operation position information with identical X coordinates and Y coordinates, the second type of repeated operation position information is operation position information with identical X coordinates, and the third type of repeated operation position information is operation position information with identical Y coordinates.
In addition, when screening duplicate operation position information which is identical and/or partially identical, the operation position information of the plurality of positions may be preprocessed, for example, the coordinate values are truncated, only a fraction of a preset number of bits is reserved, for example, the original X coordinate is 120.5334, and the reserved 1 is a fraction, then the truncated fraction is 120.5, and by truncation, the influence of fluctuation on the screening process may be reduced. Of course, the coordinate value may not be performed in the present embodiment, but only the fraction of the preset number of bits is compared in the screening process, that is, for example, the two operation position information X coordinates are 120.5334 and 120.5434, respectively, and the two operation position information X coordinates are considered to be the same when only the fraction of 1 bit is compared.
S203, acquiring repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of the pieces of operation position information.
In this embodiment, after the number of repetitions of each repetition of operation position information is obtained, the repetition operation evaluation parameter may be obtained according to the number of repetitions of each repetition of operation position information and the total number of the plurality of operation position information, and the evaluation basis of whether to cheat may be more scientifically and quantitatively determined by obtaining the repetition operation evaluation parameter.
Optionally, when the repeated operation evaluation parameter is obtained, the repeated number of each piece of repeated operation position information may be accumulated, and then a ratio of the sum to the total number of the plurality of pieces of operation position information may be obtained as the repeated operation evaluation parameter, so as to reflect the duty ratio of the repeated operation position information in the plurality of pieces of operation position information.
Of course, in another alternative embodiment, since the number of repetitions of some pieces of the repeated operation position information may be relatively low, for example, the user may click on the repeated position accidentally, in order to avoid such accidental influence, the repeated operation position information with the number of repetitions exceeding the preset number may be screened out, the repeated number of pieces of the repeated operation position information may be accumulated, and then the ratio of the sum and the total number of pieces of the operation position information may be obtained as the repeated operation evaluation parameter.
In another alternative embodiment, the repetitive operation evaluation parameter may be obtained based on only the number of repetitions of each identical repetitive operation position information and the total number of the plurality of operation position information, and/or the repetitive operation evaluation parameter may be obtained based on only the number of repetitions of a part of identical repetitive operation position information and the total number of the plurality of operation position information.
S204, determining whether the user has a recognition result of the cheating behavior or not according to the repeated operation evaluation parameter and a preset threshold value.
In this embodiment, a preset threshold of the repeated operation evaluation parameter may be set first, and when the repeated operation evaluation parameter exceeds the preset threshold, it is determined that the user has a cheating behavior; and when the repeated operation evaluation parameter does not exceed the preset threshold value, determining that the user does not have cheating behaviors. The preset threshold value can be set according to practical situations, and is not limited herein.
Further, optionally, if the identification result indicates that the user has a cheating behavior, rejecting to respond to the operation request corresponding to the target operation, for example rejecting the order or the purchase request of the user; and/or determining a penalty policy for the user, such as reducing credit score, deducting points, blocking account numbers, etc. of the user, and sending penalty information to the terminal according to the penalty policy.
According to the cheating behavior identification method provided by the embodiment, the plurality of operation position information when the user repeatedly performs target operation on the terminal interface within the preset duration is obtained; screening duplicate operation position information which is identical and/or partially identical from the plurality of operation position information, and acquiring the duplicate number of each duplicate operation position information; acquiring repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of a plurality of pieces of operation position information; and determining whether the user has a recognition result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold value. According to the method and the device, the repeated operation evaluation parameters are obtained through statistics of the repeated number of the identical and/or partially identical repeated operation position information and according to the repeated number of each repeated operation position information and the total number of a plurality of operation position information, however, the repeated operation evaluation parameters can accurately reflect the repeated level of target operation, whether cheating is evaluated or not is judged in a more scientific quantitative mode, the anti-interference capability and the identification accuracy of the identification cheating are improved, misjudgment and omission are effectively avoided, and fairness of scenes such as single robbing or purchase robbing is guaranteed.
As a further improvement of the above embodiment, the operation position information includes two-dimensional coordinate information of an operation position of the target operation on the terminal interface, the two-dimensional coordinate information including first-dimensional coordinate information and second-dimensional coordinate information; the identical and/or partially identical repetitive operation position information includes at least one of: and the first type of repeated operation position information with identical two-dimensional coordinate information, the second type of repeated operation position information with identical first-dimensional coordinate information, and the third type of repeated operation position information with identical second-dimensional coordinate information.
On the basis of the above embodiment, the acquiring the repeated operation evaluation parameter according to the number of repetitions of each repeated operation position information and the total number of the plurality of operation position information in S203 may specifically include:
acquiring a first repeated operation evaluation parameter according to the repeated number of each first repeated operation position information and the total number of the plurality of operation position information; and/or
Acquiring a second repeated operation evaluation parameter according to the repeated number of each second type of repeated operation position information and the total number of the plurality of operation position information; and/or
And acquiring a third repeated operation evaluation parameter according to the repeated number of each third repeated operation position information and the total number of the plurality of operation position information.
In this embodiment, corresponding repeated operation evaluation parameters may be obtained for each type of repeated operation position information, where the first repeated operation evaluation parameter may reflect a repeated condition of repeated operations in which two dimensional coordinates of the two dimensional coordinate information are identical, the second repeated operation evaluation parameter may reflect a repeated condition of repeated operations in which the first dimensional coordinate information is identical, and the third repeated operation evaluation parameter may reflect a repeated condition of repeated operations in which the second dimensional coordinate information is identical. Correspondingly, a corresponding preset threshold value can be configured for each repeated operation evaluation parameter, and in S204, the repeated operation evaluation parameters can be compared with the corresponding preset threshold values to determine whether the user has the identification result of the cheating behavior.
Specifically, as shown in fig. 3, the step S203 of obtaining the repeated operation evaluation parameter according to the number of repetitions of each repeated operation position information and the total number of the plurality of operation position information may include:
S301, screening target repeated operation position information with the repeated number exceeding the corresponding preset number from the repeated operation position information of the same type;
s302, obtaining the sum of the repetition number of each piece of target repeated operation position information;
s303, obtaining the ratio of the sum to the total number of the operation position information as a corresponding repeated operation evaluation parameter.
In this embodiment, for the first type of repetitive operation position information, the second type of repetitive operation position information, and the second type of repetitive operation position information, corresponding preset numbers may be set respectively, target repetitive operation position information exceeding the preset numbers is screened out based on the preset numbers, and further, the sum of the number of repetitions of each target repetitive operation position information is obtained by accumulating based on the number of repetitions of each target repetitive operation position information, and the ratio of the sum to the total number of the plurality of pieces of operational position information is used as the corresponding repetitive operation evaluation parameter.
For example, for the first type of repeated operation position information, the obtaining a first repeated operation evaluation parameter according to the number of repetitions of each of the first type of repeated operation position information and the total number of the plurality of operation position information may specifically include:
And screening target first-type repeated operation position information with a first preset number exceeding the repeated number from the first-type repeated operation position information, obtaining the sum of the repeated number of each target first-type repeated operation position information, and taking the ratio of the sum to the total number of the plurality of operation position information as the first repeated operation evaluation parameter.
In this embodiment, taking a two-dimensional rectangular coordinate system as an example, the first type of repeated operation position information is operation position information with the same X coordinate value and Y coordinate value, the number of repetitions of the first type of repeated operation position information in the plurality of operation position information within the preset time period can be counted, that is, each coordinate (X i ,Y i ) Number of repetitions n of (2) i The total number of the plurality of operation position information in the preset time period is N (namely the total number of target operations in the preset time period), and the N is satisfied i ≥θ 1 Coordinates (X) i ,Y i ) Wherein θ is 1 For a first preset number, a first repeated operation evaluation parameter α is obtained by the following formula:
similarly, for the second type of repeated operation position information, the obtaining a second repeated operation evaluation parameter according to the number of repetitions of each second type of repeated operation position information and the total number of the plurality of operation position information may specifically include:
And screening target second-class repeated operation position information with a second preset number exceeding the number of repetitions from the second-class repeated operation position information, obtaining the sum of the number of repetitions of each target second-class repeated operation position information, and taking the ratio of the sum to the total number of the plurality of operation position information as the second repeated operation evaluation parameter.
In the present embodiment, taking a two-dimensional rectangular coordinate system as an example, the first dimension coordinate information X of each operation position information can be first calculated i Cutting off coordinate values, reserving a plurality of decimal places and recording as X j For example, original X i Coordinate value is 120.5334, and 1 decimal place is reserved to obtain X j =120.5. Similar to the above embodiment, the truncated abscissa X among the plurality of operation position information within the preset time period can be counted j Second type of repetitive operation position information with the same coordinate value and corresponding X j Number of repetitions n of (2) j Taking the value satisfying n j ≥θ 2 X of (2) j Wherein θ is 2 For a second preset number, a second repetitive operation evaluation parameter β is obtained by the following formula:
it should be noted that the decimal place number to be truncated may be set according to the actual situation, or the first dimension coordinate information X of each operation position information may not be set i And cutting off the coordinate values.
Similarly, for the third type of repeated operation position information, the obtaining a third repeated operation evaluation parameter according to the repeated number of each third type of repeated operation position information and the total number of the plurality of operation position information may specifically include:
and screening target third-class repeated operation position information with a third preset number exceeding the repeated number from the third-class repeated operation position information, obtaining the sum of the repeated number of each target third-class repeated operation position information, and taking the ratio of the sum to the total number of the plurality of operation position information as the third repeated operation evaluation parameter.
In the present embodiment, taking a two-dimensional rectangular coordinate system as an example, the second dimension of each operation position information can be first calculatedCoordinate information Y i Cutting off coordinate values, reserving a plurality of decimal places and recording as Y k The method comprises the steps of carrying out a first treatment on the surface of the Such as original Y i Coordinate value is 120.5334, reserving 1 decimal place to obtain Y k =120.5. Similar to the above embodiment, the truncated ordinate Y of the plurality of operation position information within the preset time period can be counted k Third kind of repeated operation position information with the same coordinate value and corresponding Y k Number of repetitions n of (2) k Taking the value satisfying n k ≥θ 3 Y of (2) k Wherein θ is 3 For the third preset number, a third repeated operation evaluation parameter γ is obtained by the following formula:
on the basis of the foregoing embodiment, the determining, in S204, whether the user has a recognition result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold includes:
judging whether the target repeated operation evaluation parameter exceeds a corresponding preset threshold value or not; if yes, determining that the user has cheating behaviors;
wherein the target repetitive operation evaluation parameter is at least one of the first repetitive operation evaluation parameter, the second repetitive operation evaluation parameter, and the third repetitive operation evaluation parameter.
In this embodiment, it may not be necessary to calculate all of the first repeated operation evaluation parameter, the second repeated operation evaluation parameter, and the third repeated operation evaluation parameter, and at least one item may be selected as a target repeated operation evaluation parameter from the three repeated operation evaluation parameters, and further the target repeated operation evaluation parameter is compared with a preset threshold corresponding to the target repeated operation evaluation parameter, and if the target repeated operation evaluation parameter exceeds the preset threshold corresponding to the target repeated operation evaluation parameter, it is determined that the user has a cheating behavior.
For example, the preset threshold value δ may be set for the above three repeated operation evaluation parameters α, β, γ, respectively 1 、δ 2 、δ 3 。
If alpha is selected as the targetRepeating the operation evaluation parameters, if alpha is more than or equal to delta 1 Determining that the user has cheating behaviors; similarly, if beta is selected as the target repeated operation evaluation parameter, beta is more than or equal to delta 2 Determining that the user has cheating behaviors; similarly, if beta is selected as the target repeated operation evaluation parameter, gamma is larger than or equal to delta 3 And determining that the user has cheating behaviors. Similarly, if alpha and beta are selected as target repeated operation evaluation parameters, alpha is more than or equal to delta 1 And beta is greater than or equal to delta 2 When or alpha is greater than or equal to delta 1 Or beta is greater than or equal to delta 2 Determining the cheating behavior of the user, wherein the logic of the specific AND or OR can be determined according to the actual situation; and so on, other cases will not be described in detail herein.
Optionally, before determining whether the target repetitive operation evaluation parameter exceeds the corresponding preset threshold, the target repetitive operation evaluation parameter may be determined from the first repetitive operation evaluation parameter, the second repetitive operation evaluation parameter and the third repetitive operation evaluation parameter according to a preset policy.
The preset strategy can be to select different target repeated operation evaluation parameters according to the severity of the cheating behavior recognition, for example, when the severity is extremely strict, all three repeated operation evaluation parameters can be used as target repeated operation evaluation parameters; when the degree of strictness is moderately strict, any two repeated operation evaluation parameters can be used as target repeated operation evaluation parameters; in general, if the degree of stringency is strict, any one of the repetitive operation evaluation parameters may be used as the target repetitive operation evaluation parameter.
In addition, the decision logic is AND logic, which is more stringent than OR logic. Thus, alternatively, different target repetitive operation evaluation parameters and judgment logic may be selected according to different degrees of strictness. In addition, the coordinate cut-off length and theta can be adjusted 1 、θ 2 、θ 3 (θ is at least greater than 1). The method can adapt to the cheating behavior identification process with any strictness degree and meet the different accuracy demands of users.
Fig. 4 is a block diagram of the cheating behavior recognition device according to the embodiment of the present invention. The cheating behavior recognition device provided in this embodiment may execute the processing flow provided in the cheating behavior recognition method embodiment, as shown in fig. 4, where the cheating behavior recognition device 400 includes an obtaining module 401, a statistics module 402, a processing module 403, and a recognition module 404.
An obtaining module 401, configured to obtain a plurality of operation position information when a user repeatedly performs a target operation on a terminal interface within a preset duration;
a statistics module 402, configured to screen duplicate operation position information that is identical and/or partially identical from the plurality of operation position information, and obtain a duplicate number of each duplicate operation position information;
a processing module 403, configured to obtain a repeated operation evaluation parameter according to the number of repetitions of each repeated operation position information and the total number of the plurality of operation position information;
And the identification module 404 is configured to determine whether the user has an identification result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold.
On the basis of any one of the above embodiments, the operation position information includes two-dimensional coordinate information of an operation position of the target operation on the terminal interface, and the two-dimensional coordinate information includes first dimension coordinate information and second dimension coordinate information;
the identical and/or partially identical repetitive operation position information includes at least one of:
and the first type of repeated operation position information with identical two-dimensional coordinate information, the second type of repeated operation position information with identical first-dimensional coordinate information, and the third type of repeated operation position information with identical second-dimensional coordinate information.
On the basis of any one of the above embodiments, the processing module 403 is configured to, when acquiring the repeated operation evaluation parameter according to the number of repetitions of each of the repeated operation position information and the total number of the plurality of operation position information:
acquiring a first repeated operation evaluation parameter according to the repeated number of each first repeated operation position information and the total number of the plurality of operation position information; and/or
Acquiring a second repeated operation evaluation parameter according to the repeated number of each second type of repeated operation position information and the total number of the plurality of operation position information; and/or
And acquiring a third repeated operation evaluation parameter according to the repeated number of each third repeated operation position information and the total number of the plurality of operation position information.
On the basis of any one of the above embodiments, the processing module 403 is configured to, when acquiring the repeated operation evaluation parameter according to the number of repetitions of each of the repeated operation position information and the total number of the plurality of operation position information:
screening target repeated operation position information with the repeated number exceeding the corresponding preset number from the repeated operation position information of the same type;
acquiring the sum of the repetition number of each piece of target repeated operation position information;
and acquiring the ratio of the sum to the total number of the plurality of operation position information as a corresponding repeated operation evaluation parameter.
On the basis of any one of the foregoing embodiments, when determining, according to the repeated operation evaluation parameter and a preset threshold, whether the user has an identification result of the cheating behavior, the identification module 404 is configured to:
Judging whether the target repeated operation evaluation parameter exceeds a corresponding preset threshold value, if so, determining that the user has cheating behaviors;
wherein the target repetitive operation evaluation parameter is at least one of the first repetitive operation evaluation parameter, the second repetitive operation evaluation parameter, and the third repetitive operation evaluation parameter.
On the basis of any of the above embodiments, the processing module 403 is further configured to:
before judging whether the target repeated operation evaluation parameter exceeds a corresponding preset threshold value, determining the target repeated operation evaluation parameter from the first repeated operation evaluation parameter, the second repeated operation evaluation parameter and the third repeated operation evaluation parameter according to a preset strategy.
On the basis of any of the foregoing embodiments, when the statistics module 402 screens out duplicate operation position information that is identical and/or partially identical from the plurality of operation position information, the statistics module is configured to:
and if the total number of the plurality of operation position information exceeds a preset total number threshold value, screening out identical and/or partially identical repeated operation position information from the plurality of operation position information.
On the basis of any one of the above embodiments, the apparatus further includes a control module configured to:
If the identification result shows that the user has cheating behaviors, rejecting to respond to the operation request corresponding to the target operation; and/or
And determining a punishment strategy for the user, and sending punishment information to the terminal according to the punishment strategy.
The cheating behavior recognition device provided in the embodiment of the present invention may be specifically used to execute the method embodiments provided in fig. 2-3, and specific functions are not described herein.
The cheating behavior recognition device provided by the embodiment of the invention obtains a plurality of pieces of operation position information when a user repeatedly performs target operation on a terminal interface within a preset duration; screening duplicate operation position information which is identical and/or partially identical from the plurality of operation position information, and acquiring the duplicate number of each duplicate operation position information; acquiring repeated operation evaluation parameters according to the repeated number of each piece of repeated operation position information and the total number of a plurality of pieces of operation position information; and determining whether the user has a recognition result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold value. According to the method and the device, the repeated operation evaluation parameters are obtained through statistics of the repeated number of the identical and/or partially identical repeated operation position information and according to the repeated number of each repeated operation position information and the total number of a plurality of operation position information, however, the repeated operation evaluation parameters can accurately reflect the repeated level of target operation, whether cheating is evaluated or not is judged in a more scientific quantitative mode, the anti-interference capability and the identification accuracy of the identification cheating are improved, misjudgment and omission are effectively avoided, and fairness of scenes such as single robbing or purchase robbing is guaranteed.
Fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present invention. The computer device provided by the embodiment of the present invention may execute the processing flow provided by the embodiment of the cheating behavior identification method, as shown in fig. 5, where the computer device 50 includes a memory 51, a processor 52, and a computer program; wherein a computer program is stored in the memory 51 and configured to be executed by the processor 52 for the cheating behavior identification method as described in the above embodiments. The computer device 50 may also have a communication interface 53 for receiving control instructions.
The computer device of the embodiment shown in fig. 5 may be used to implement the technical solution of the above-mentioned method embodiment, and its implementation principle and technical effects are similar, and are not described here again.
In addition, the present embodiment also provides a computer readable storage medium, which may be a non-transitory computer readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the cheating behavior identification method described in the above embodiment.
In the several embodiments provided by the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in hardware plus software functional units.
The integrated units implemented in the form of software functional units described above may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium, and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor (processor) to perform part of the steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional modules is illustrated, and in practical application, the above-described functional allocation may be performed by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to perform all or part of the functions described above. The specific working process of the above-described device may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. The embodiments of the present disclosure are intended to cover any adaptations, uses, or adaptations of the disclosure following the general principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (14)
1. A method for identifying cheating behaviors, comprising:
acquiring a plurality of pieces of operation position information when a user repeatedly performs target operation on a terminal interface within a preset time period; the operation position information comprises two-dimensional coordinate information of an operation position of target operation on a terminal interface, and the two-dimensional coordinate information comprises first dimension coordinate information and second dimension coordinate information;
screening out duplicate operation position information which is identical and partially identical from the plurality of operation position information, and acquiring the duplicate number of each duplicate operation position information; the duplicate operation position information that is identical and partially identical includes: the first type of repeated operation position information with identical two-dimensional coordinate information, the second type of repeated operation position information with identical first-dimensional coordinate information and the third type of repeated operation position information with identical second-dimensional coordinate information;
acquiring repeated operation evaluation parameters corresponding to each type according to the repeated number of each piece of repeated operation position information in each type and the total number of the plurality of pieces of operation position information;
Taking at least two repeated operation evaluation parameters in repeated operation evaluation parameters corresponding to each type as target repeated operation evaluation parameters;
and determining whether the user has a recognition result of the cheating behavior according to the target repeated operation evaluation parameter and a preset threshold value.
2. The method according to claim 1, wherein the obtaining the repetitive operation evaluation parameter corresponding to each of the types according to the number of repetitions of each of the pieces of repetitive operation position information in each of the types and the total number of pieces of the pieces of operation position information includes:
acquiring a first repeated operation evaluation parameter according to the repeated number of each first repeated operation position information and the total number of the plurality of operation position information;
acquiring a second repeated operation evaluation parameter according to the repeated number of each second type of repeated operation position information and the total number of the plurality of operation position information;
and acquiring a third repeated operation evaluation parameter according to the repeated number of each third repeated operation position information and the total number of the plurality of operation position information.
3. The method according to claim 2, wherein the obtaining the repeated operation evaluation parameter corresponding to each of the types according to the number of repetitions of each of the repeated operation position information in each of the types and the total number of the plurality of operation position information includes:
Screening target repeated operation position information with the repeated number exceeding the corresponding preset number from the repeated operation position information of each type;
acquiring the sum of the repetition number of each piece of target repeated operation position information;
and acquiring the ratio of the sum to the total number of the plurality of operation position information as a corresponding repeated operation evaluation parameter.
4. The method according to claim 1 or 2, wherein the determining whether the user has a recognition result of the cheating behavior according to the repeated operation evaluation parameter and a preset threshold value includes:
judging whether the target repeated operation evaluation parameter exceeds a corresponding preset threshold value, if so, determining that the user has cheating behaviors;
wherein the target repetitive operation evaluation parameter is at least one of the first repetitive operation evaluation parameter, the second repetitive operation evaluation parameter, and the third repetitive operation evaluation parameter.
5. The method according to claim 1, wherein said screening out identical and/or partially identical duplicate operation position information from said plurality of operation position information comprises:
and if the total number of the plurality of operation position information exceeds a preset total number threshold value, screening out identical and/or partially identical repeated operation position information from the plurality of operation position information.
6. The method of claim 1, wherein after determining whether the user has the recognition result of the cheating act, further comprising:
if the identification result shows that the user has cheating behaviors, rejecting to respond to the operation request corresponding to the target operation; and/or
And determining a punishment strategy for the user, and sending punishment information to the terminal according to the punishment strategy.
7. A cheating behavior recognition apparatus, comprising:
the acquisition module is used for acquiring a plurality of pieces of operation position information when a user repeatedly performs target operation on a terminal interface within a preset duration; the operation position information comprises two-dimensional coordinate information of an operation position of target operation on a terminal interface, and the two-dimensional coordinate information comprises first dimension coordinate information and second dimension coordinate information;
the statistics module is used for screening out duplicate operation position information which is completely the same and partially the same from the plurality of operation position information, and acquiring the duplicate number of each duplicate operation position information; the duplicate operation position information that is identical and partially identical includes: the first type of repeated operation position information with identical two-dimensional coordinate information, the second type of repeated operation position information with identical first-dimensional coordinate information and the third type of repeated operation position information with identical second-dimensional coordinate information;
The processing module is used for acquiring repeated operation evaluation parameters corresponding to the types according to the repeated number of each piece of repeated operation position information in the types and the total number of the plurality of pieces of operation position information; taking at least two repeated operation evaluation parameters in repeated operation evaluation parameters corresponding to each type as target repeated operation evaluation parameters;
and the identification module is used for determining whether the user has an identification result of the cheating behavior according to the target repeated operation evaluation parameter and a preset threshold value.
8. The apparatus according to claim 7, wherein the processing module, when acquiring the repetitive operation evaluation parameter corresponding to each of the types based on the number of repetitions of each of the repetitive operation position information in each of the types and the total number of the plurality of operation position information, is configured to:
acquiring a first repeated operation evaluation parameter according to the repeated number of each first repeated operation position information and the total number of the plurality of operation position information;
acquiring a second repeated operation evaluation parameter according to the repeated number of each second type of repeated operation position information and the total number of the plurality of operation position information;
And acquiring a third repeated operation evaluation parameter according to the repeated number of each third repeated operation position information and the total number of the plurality of operation position information.
9. The apparatus according to claim 8, wherein the processing module, when acquiring the repetitive operation evaluation parameter corresponding to each of the types based on the number of repetitions of each of the repetitive operation position information in each of the types and the total number of the plurality of operation position information, is configured to:
screening target repeated operation position information with the repeated number exceeding the corresponding preset number from the repeated operation position information of each type;
acquiring the sum of the repetition number of each piece of target repeated operation position information;
and acquiring the ratio of the sum to the total number of the plurality of operation position information as a corresponding repeated operation evaluation parameter.
10. The apparatus according to claim 8 or 9, wherein the identification module, when determining whether the user has an identification result of a cheating act according to the repeated operation evaluation parameter and a preset threshold, is configured to:
judging whether the target repeated operation evaluation parameter exceeds a corresponding preset threshold value, if so, determining that the user has cheating behaviors;
Wherein the target repetitive operation evaluation parameter is at least one of the first repetitive operation evaluation parameter, the second repetitive operation evaluation parameter, and the third repetitive operation evaluation parameter.
11. The apparatus of claim 7, wherein the statistics module, when screening duplicate operational position information that is identical and/or partially identical from the plurality of operational position information, is configured to:
and if the total number of the plurality of operation position information exceeds a preset total number threshold value, screening out identical and/or partially identical repeated operation position information from the plurality of operation position information.
12. The apparatus of claim 7, further comprising a control module for:
if the identification result shows that the user has cheating behaviors, rejecting to respond to the operation request corresponding to the target operation; and/or
And determining a punishment strategy for the user, and sending punishment information to the terminal according to the punishment strategy.
13. A computer device, comprising: a memory and a processor;
the memory is used for storing program instructions;
the processor is configured to invoke program instructions in the memory to perform the method of any of claims 1-6.
14. A computer readable storage medium having a computer program stored thereon; the computer program, when executed, implements the method of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011219022.9A CN112399352B (en) | 2020-11-04 | 2020-11-04 | Cheating behavior identification method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011219022.9A CN112399352B (en) | 2020-11-04 | 2020-11-04 | Cheating behavior identification method, device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112399352A CN112399352A (en) | 2021-02-23 |
CN112399352B true CN112399352B (en) | 2023-07-18 |
Family
ID=74597484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011219022.9A Active CN112399352B (en) | 2020-11-04 | 2020-11-04 | Cheating behavior identification method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112399352B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113742719B (en) * | 2021-08-26 | 2022-04-15 | 深圳依时货拉拉科技有限公司 | Order grabbing and plug-in hanging detection method and computer equipment |
CN117290586A (en) * | 2022-06-17 | 2023-12-26 | 河北雄安三千科技有限责任公司 | Method, device and system for analyzing evaluation information |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105118013A (en) * | 2015-07-29 | 2015-12-02 | 北京嘀嘀无限科技发展有限公司 | Order distributing method and apparatus |
CN110909353A (en) * | 2019-11-28 | 2020-03-24 | 网易(杭州)网络有限公司 | Plug-in detection method and device |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170303150A1 (en) * | 2016-02-16 | 2017-10-19 | Saguna Networks Ltd. | Methods Circuits Devices Systems and Functionally Associated Computer Executable Code to Support Edge Computing on a Communication Network |
CN110381063A (en) * | 2019-07-22 | 2019-10-25 | 秒针信息技术有限公司 | A kind of method and device of determining cheating flow |
CN110580211A (en) * | 2019-08-23 | 2019-12-17 | 鹏城实验室 | Monitoring method, device, keyboard and storage medium |
CN111625819B (en) * | 2020-05-26 | 2023-04-28 | 北京思特奇信息技术股份有限公司 | Method and system for preventing client from using plug-in |
-
2020
- 2020-11-04 CN CN202011219022.9A patent/CN112399352B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105118013A (en) * | 2015-07-29 | 2015-12-02 | 北京嘀嘀无限科技发展有限公司 | Order distributing method and apparatus |
CN110909353A (en) * | 2019-11-28 | 2020-03-24 | 网易(杭州)网络有限公司 | Plug-in detection method and device |
Also Published As
Publication number | Publication date |
---|---|
CN112399352A (en) | 2021-02-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110517097B (en) | Method, device, equipment and storage medium for identifying abnormal users | |
CN112399352B (en) | Cheating behavior identification method, device and storage medium | |
CN110390584B (en) | Abnormal user identification method, identification device and readable storage medium | |
CN108111554B (en) | Control method and device for access queue | |
CN108112038B (en) | Method and device for controlling access flow | |
CN110930144B (en) | Virtual payment card selection method, device and computer readable storage medium | |
CN109472656B (en) | Virtual article display method and device and storage medium | |
CN111191925A (en) | Data processing method, device, equipment and storage medium | |
CN115082154A (en) | Order processing method, system and device and electronic equipment | |
CN117934075A (en) | Electronic rights issuing method, electronic rights issuing device, electronic equipment and storage medium | |
CN107608979B (en) | Method and device for identifying potential help-seeking knowledge points of user | |
CN110365682B (en) | Anti-cheating method and device | |
CN107872491B (en) | Data processing method and device | |
CN112650614A (en) | Call chain monitoring method and device, electronic equipment and storage medium | |
CN110544104B (en) | Account determination method and device, storage medium and electronic device | |
CN112642162A (en) | User login management method and device, computer equipment and storage medium | |
CN109582829B (en) | Processing method, device, equipment and readable storage medium | |
CN114221807B (en) | Access request processing method, device, monitoring equipment and storage medium | |
CN113055459B (en) | Log delivery method and device, electronic equipment and storage medium | |
CN112950314B (en) | Method, device, equipment and storage medium for determining ticket purchasing qualification | |
CN111967798B (en) | Method, device and equipment for distributing experimental samples and computer readable storage medium | |
CN111538652B (en) | Application control testing method and related equipment | |
CN110891097B (en) | Cross-device user identification method and device | |
CN108874325B (en) | Data printing method and system | |
CN105871937A (en) | Data processing method, data processing device and data processing system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |