CN112529505A - Illegal bill-swiping detection method and device and readable storage medium - Google Patents

Illegal bill-swiping detection method and device and readable storage medium Download PDF

Info

Publication number
CN112529505A
CN112529505A CN202011517318.9A CN202011517318A CN112529505A CN 112529505 A CN112529505 A CN 112529505A CN 202011517318 A CN202011517318 A CN 202011517318A CN 112529505 A CN112529505 A CN 112529505A
Authority
CN
China
Prior art keywords
user terminal
information
plug
illegal
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011517318.9A
Other languages
Chinese (zh)
Other versions
CN112529505B (en
Inventor
刁浩然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shunda Technology Co ltd
Original Assignee
Beijing Shunda Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shunda Technology Co ltd filed Critical Beijing Shunda Technology Co ltd
Priority to CN202011517318.9A priority Critical patent/CN112529505B/en
Publication of CN112529505A publication Critical patent/CN112529505A/en
Application granted granted Critical
Publication of CN112529505B publication Critical patent/CN112529505B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/083Shipping
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method and a device for detecting violation of policy swiping and a readable storage medium, wherein the method comprises the following steps: acquiring running environment detection information sent by a user terminal, wherein the running environment detection information comprises plug-in detection information; judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information; if so, acquiring order grabbing information of the user within a preset time range, wherein the order grabbing information comprises order grabbing operation information when the user carries out order grabbing on a user terminal and order quality information corresponding to an order which is grabbed by the user; judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information; and if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal. According to the scheme, the illegal bill-brushing user corresponding to the illegal bill-brushing terminal is detected, the illegal bill-brushing user amount is reduced, and the distribution efficiency is improved.

Description

Illegal bill-swiping detection method and device and readable storage medium
Technical Field
The application relates to the technical field of logistics distribution, in particular to a method and a device for detecting illegal bill swiping and a readable storage medium.
Background
In the current business related to offline delivery, some deliverers may use the add-on software to refresh their orders to obtain good-quality orders (for example, orders with short delivery distance, low delivery difficulty, or high delivery unit price) in order to obtain higher profits. Such unfair competition can lead to an increase in the number of long orders to be processed (e.g., orders with long delivery routes, high delivery difficulty, or low delivery unit price), resulting in overstocked orders and a decrease in the efficiency of the delivery business.
Therefore, how to improve the distribution efficiency is an urgent problem to be solved in the current logistics distribution technical field.
Disclosure of Invention
The application provides a method and a device for detecting illegal bill swiping and a readable storage medium, aiming at solving the problem of how to improve the distribution efficiency, which is urgently needed to be solved in the technical field of current logistics distribution.
In one aspect, the application provides a method for detecting an illegal statement, which includes:
acquiring running environment detection information sent by a user terminal, wherein the running environment detection information comprises plug-in detection information;
judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information;
if so, acquiring order grabbing information of the user within a preset time range, wherein the order grabbing information comprises order grabbing operation information when the user carries out order grabbing on a user terminal and order quality information corresponding to an order which the user has grabbed;
judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information;
and if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal.
In a possible implementation manner of the present application, the determining whether the operating environment of the terminal is normal based on the operating environment detection information includes:
acquiring a preset plug-in blacklist, wherein the plug-in blacklist comprises at least one illegal plug-in identification information;
reading corresponding first plug-in identification information in the plug-in detection information;
judging whether illegal plug-in identification information which is the same as the first plug-in identification information exists in the plug-in blacklist or not;
if yes, determining that the operating environment is abnormal;
if not, determining that the operating environment is normal.
In a possible implementation manner of the present application, the determining, based on the order grabbing information, whether the user terminal is a suspicious user terminal includes:
determining a corresponding list brushing frequency when the user performs list grabbing within a preset time range based on the list grabbing operation information;
determining the percentage of orders which are good-quality orders in the orders which have been taken by the user based on the order quality information;
judging whether the order refreshing frequency exceeds a preset refreshing threshold value or not, and whether the percentage of the high-quality orders exceeds a preset percentage or not;
and if so, determining that the user terminal is a suspicious user terminal.
In a possible implementation manner of the present application, the ticket preemption operation information includes interface request information sent by the user terminal, and based on the ticket preemption operation information, the corresponding ticket refreshing frequency of the user during ticket preemption in a preset time range is determined, including:
monitoring interface request information sent by the user terminal within a preset time range to obtain the number of times of order grabbing requests completed by the user terminal within the preset time range;
and calculating the corresponding list brushing frequency of the user when the user performs the list grabbing within a preset time range based on the list grabbing request times.
In a possible implementation manner of the present application, the dynamically verifying the suspicious user terminal to determine that the suspicious user terminal is an illegal bill-swiping terminal includes:
sending preset sensitive data to the suspicious user terminal to replace the original first encryption parameter of the suspicious user terminal, wherein the sensitive data comprises a second encryption parameter;
acquiring request information fed back by the suspicious user terminal, wherein the request information comprises a third encryption key;
judging whether the second encryption parameter is matched with the third encryption key or not so as to verify whether the request information is legal or not;
if not, determining that the suspicious user terminal is the illegal bill swiping terminal.
In a possible implementation manner of the present application, after determining whether the user terminal is a suspicious user terminal based on the order grabbing operation information, the method further includes:
acquiring a preset plug-in white list, wherein the plug-in white list comprises at least one piece of regular plug-in identification information;
reading corresponding second plug-in identification information in the plug-in detection information;
judging whether the regular plug-in identification information which is the same as the second plug-in identification information exists in the plug-in white list or not;
and if not, adding the second plug-in identification information to a preset plug-in grey list.
In a possible implementation manner of the present application, after determining that the suspicious user terminal is an illegal policy-swiping terminal, the method further includes:
acquiring illegal terminal identification information and illegal user identification information corresponding to the illegal bill swiping terminal;
updating the illegal terminal identification information to a preset device blacklist;
updating the illegal user identification information to a preset user blacklist;
and transferring the plug-in identification information corresponding to the illegal bill swiping terminal in the plug-in grey list to a preset plug-in black list.
In another aspect, the present application provides a violation statement detection device, the device includes:
the system comprises a first acquisition unit, a second acquisition unit and a control unit, wherein the first acquisition unit is used for acquiring running environment detection information sent by a user terminal, and the running environment detection information comprises plug-in detection information;
a first judging unit, configured to judge whether an operating environment of the terminal is normal based on the operating environment detection information;
a second obtaining unit, configured to obtain order grabbing information of the user within a preset time range if the order grabbing information is positive, where the order grabbing information includes order grabbing operation information when the user performs order grabbing on a user terminal and order quality information corresponding to an order that the user has grabbed;
a second judging unit, configured to judge whether the user terminal is a suspicious user terminal based on the order grabbing information;
and the first determination unit is used for dynamically verifying the suspicious user terminal if the suspicious user terminal is the illegal bill-swiping terminal, so as to determine that the suspicious user terminal is the illegal bill-swiping terminal.
In a possible implementation manner of the present application, the first determining unit is specifically configured to:
acquiring a preset plug-in blacklist, wherein the plug-in blacklist comprises at least one illegal plug-in identification information;
reading corresponding first plug-in identification information in the plug-in detection information;
judging whether illegal plug-in identification information which is the same as the first plug-in identification information exists in the plug-in blacklist or not;
if yes, determining that the operating environment is abnormal;
if not, determining that the operating environment is normal.
In a possible implementation manner of the present application, the second determining unit specifically includes:
the second determining unit is used for determining the corresponding list swiping frequency of the user in the list grabbing process within the preset time range based on the list grabbing operation information;
a third determining unit, configured to determine, based on the order quality information, a percentage of orders that have been taken by the user and are premium orders;
the third judging unit is used for judging whether the order refreshing frequency exceeds a preset refreshing threshold value and whether the percentage of the high-quality orders exceeds a preset percentage;
and a fourth determining unit, configured to determine that the user terminal is a suspicious user terminal if the determination is positive.
In a possible implementation manner of the present application, the ticket preemption operation information includes interface request information sent by the user terminal, and the second determining unit is specifically configured to:
monitoring interface request information sent by the user terminal within a preset time range to obtain the number of times of order grabbing requests completed by the user terminal within the preset time range;
and calculating the corresponding list brushing frequency of the user when the user performs the list grabbing within a preset time range based on the list grabbing request times.
In a possible implementation manner of the present application, the first determining unit is specifically configured to:
sending preset sensitive data to the suspicious user terminal to replace the original first encryption parameter of the suspicious user terminal, wherein the sensitive data comprises a second encryption parameter;
acquiring request information fed back by the suspicious user terminal, wherein the request information comprises a third encryption key;
judging whether the second encryption parameter is matched with the third encryption key or not so as to verify whether the request information is legal or not;
if not, determining that the suspicious user terminal is the illegal bill swiping terminal.
In one possible implementation manner of the present application, the apparatus further includes:
the third acquisition unit is used for acquiring a preset plug-in white list, and the plug-in white list comprises at least one piece of regular plug-in identification information;
the first reading unit is used for reading corresponding second plug-in identification information in the plug-in detection information;
a fourth judging unit, configured to judge whether regular plugin identifier information that is the same as the second plugin identifier information exists in the plugin white list;
and the adding unit is used for adding the second plug-in identification information to a preset plug-in grey list if the second plug-in identification information is not in the preset plug-in grey list.
In one possible implementation manner of the present application, the apparatus further includes:
the fourth acquisition unit is used for acquiring violation terminal identification information and violation user identification information corresponding to the violation single-swiping terminal;
the first updating unit is used for updating the illegal terminal identification information to a preset device blacklist;
the second updating unit is used for updating the illegal user identification information to a preset user blacklist;
and the transfer unit is used for transferring the plug-in identification information corresponding to the illegal bill-swiping terminal in the plug-in grey list to a preset plug-in black list.
In another aspect, the present application further provides a computer device, including:
one or more processors;
a memory; and
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to implement the violation swipe detection method.
In another aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is loaded by a processor to execute the steps in the violation statement detection method.
According to the method and the device, the operating environment of the user terminal is detected firstly, the operating environment of the user terminal is preliminarily determined to be in a normal state, then the user terminal is subjected to order grabbing information, whether the user terminal is a suspicious user terminal is further determined, and finally dynamic verification is carried out on the suspicious user terminal determined to determine that the suspicious user terminal is an illegal order brushing terminal, so that illegal order brushing users corresponding to the illegal order brushing terminal are detected, the quantity of the illegal order brushing users is reduced, and the distribution efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a scene schematic diagram of an illegal statement brushing detection system provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram illustrating an embodiment of a method for detecting an illegal statement of credit in an embodiment of the present application;
FIG. 3 is a flowchart illustrating an embodiment of step 202 in the present application;
FIG. 4 is a flowchart illustrating an embodiment of step 204 in the present application;
FIG. 5 is a flowchart illustrating an embodiment of step 401 in the embodiment of the present application;
FIG. 6 is a flowchart illustrating an embodiment of step 205 in the present application;
FIG. 7 is a schematic flowchart of another embodiment of a method for detecting an illegal statement of credit in the embodiment of the present application;
FIG. 8 is a schematic flowchart of another embodiment of a method for detecting an illegal statement of credit in an embodiment of the present application;
fig. 9 is a schematic structural diagram of an embodiment of an illegal statement brushing detection device provided in an embodiment of the present application;
fig. 10 is a schematic structural diagram of an embodiment of a computer device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be considered as limiting the present application. Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
In this application, the word "exemplary" is used to mean "serving as an example, instance, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. The following description is presented to enable any person skilled in the art to make and use the application. In the following description, details are set forth for the purpose of explanation. It will be apparent to one of ordinary skill in the art that the present application may be practiced without these specific details. In other instances, well-known structures and processes are not set forth in detail in order to avoid obscuring the description of the present application with unnecessary detail. Thus, the present application is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
The embodiments of the present application provide a method and an apparatus for detecting an illegal statement of credit, and a readable storage medium, which are described in detail below.
As shown in fig. 1, fig. 1 is a scene schematic diagram of an illegal statement-of-brush detection system provided in an embodiment of the present application, where the illegal statement-of-brush detection system may include a plurality of terminals 100 and a server 200, the terminals 100 and the server 200 are connected through a network, and a illegal statement-of-brush detection device is integrated in the server 200, such as the server in fig. 1, and the terminals 100 may access the server 200.
In the embodiment of the application, the server 200 is mainly used for acquiring the running environment detection information sent by the user terminal, wherein the running environment detection information comprises plug-in detection information; judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information; if so, acquiring order grabbing information of the user within a preset time range, wherein the order grabbing information comprises order grabbing operation information when the user carries out order grabbing on a user terminal and order quality information corresponding to an order which is grabbed by the user; judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information; and if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal.
In this embodiment, the server 200 may be an independent server, or may be a server network or a server cluster composed of servers, for example, the server 200 described in this embodiment includes, but is not limited to, a computer, a network terminal, a single network server, a plurality of network server sets, or a cloud server composed of a plurality of servers. Among them, the Cloud server is constituted by a large number of computers or web servers based on Cloud Computing (Cloud Computing). In the embodiment of the present application, the server and the terminal may implement communication through any communication manner, including but not limited to mobile communication based on the third Generation Partnership Project (3 GPP), Long Term Evolution (LTE), Worldwide Interoperability for Microwave Access (WiMAX), or computer network communication based on the TCP/IP Protocol Suite (TCP/IP), User Datagram Protocol (UDP), and the like.
It is to be understood that the terminal 100 used in the embodiments of the present application may be a device that includes both receiving and transmitting hardware, as well as a device that has both receiving and transmitting hardware capable of performing two-way communication over a two-way communication link. Such a terminal may include: a cellular or other communication device having a single line display or a multi-line display or a cellular or other communication device without a multi-line display. The terminal 100 may specifically be a desktop terminal or a mobile terminal, and the terminal 100 may also specifically be one of a mobile phone, a tablet computer, a notebook computer, and the like.
Those skilled in the art will understand that the application environment shown in fig. 1 is only one application scenario of the present application, and does not constitute a limitation to the application scenario of the present application, and other application environments may also include more or fewer terminals than those shown in fig. 1, or a server network connection relationship, for example, only 1 server and 2 terminals are shown in fig. 1. It is to be understood that the violation statement detection system may further include one or more other servers, or/and one or more terminals connected to the server network, and is not limited herein.
In addition, as shown in fig. 1, the violation statement detection system may further include a memory 300 for storing data, such as user statement data and violation statement detection data, for example, violation statement detection data during operation of the violation statement detection system.
It should be noted that the scene schematic diagram of the illegal bill-reading detection system shown in fig. 1 is only an example, and the illegal bill-reading detection system and the scene described in the embodiment of the present application are for more clearly illustrating the technical solution of the embodiment of the present application, and do not form a limitation on the technical solution provided in the embodiment of the present application.
Next, a method for detecting an illegal statement of credit provided in the embodiment of the present application is described.
In the embodiment of the method for detecting the illegal statement of credit of the present application, the illegal statement of credit detection device is used as an execution subject, and for simplification and convenience of description, the execution subject will be omitted in the following method embodiments, and the illegal statement of credit detection device is applied to a computer device, and the method includes: acquiring running environment detection information sent by a user terminal, wherein the running environment detection information comprises plug-in detection information; judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information; if so, acquiring order grabbing information of the user within a preset time range, wherein the order grabbing information comprises order grabbing operation information when the user carries out order grabbing on a user terminal and order quality information corresponding to an order which is grabbed by the user; judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information; and if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal.
Referring to fig. 2 to 10, fig. 2 is a schematic flowchart illustrating an embodiment of a method for detecting an illegal statement of credit in the embodiment of the present application, where the method specifically includes step 201, step 202, step 203, step 204, and step 205.
201. And acquiring the running environment detection information sent by the user terminal. Wherein the operating environment detection information includes plug-in detection information.
The operating environment detection generally may include login environment security detection and payment environment security detection, and in the present application, the login environment security detection is mainly performed, specifically, the login environment security detection may include detection of an open state of an auxiliary function of the user terminal, and plug-in detection.
In general, the security detection of the login environment of the user terminal can be divided into detection at the time of login and detection after login. In this embodiment, the detection is performed during login, that is, when the user opens the corresponding ticket snatching software, the ticket snatching software of the user terminal detects whether the user terminal has started the auxiliary function and the plug-in. The auxiliary function generally refers to the use of the auxiliary function for some people with mobile phone operation deficiency, for example, the ultra-large font is used for people with poor eyesight, such as middle-aged and old people. The voice reading is also used for some friends or old people with few reading books, namely the mobile phone is pressed where the characters can be read out in a pronunciation mode, the magnifying glass function is also used for people with visual disorder, the functions of the characters, the pictures and the icons can be magnified, in addition, the auxiliary function of simulated clicking which needs to be detected in the application is also used, the auxiliary function can automatically rush orders, and the fairness principle defined in the application is violated. The user referred to in the present application is generally a user performing order grabbing operation, such as a distributor (rider), and the user terminal is generally a terminal device such as a mobile phone or a tablet used by the distributor having the authority to log in the order grabbing software.
If the auxiliary function is started by the current equipment, the popup window prompts that the auxiliary function needs to be closed, and the user is prohibited from using the order grabbing software to grab the order. The Plug-in detection information refers to detection information of other Plug-ins except for the order grabbing software, wherein the Plug-ins (Plug-ins, also called addin, add-in, addon or add-on, also called add-on) are programs written by application program interfaces following certain specifications. It can only run under the system platform (possibly supporting multiple platforms simultaneously) specified by the program, and cannot run independently from the specified platform. Since the plug-in needs to call the function library or data provided by the original clean system. Many software has plug-ins, and there are numerous types of plug-ins. For example, in the IE, after installing the relevant plug-in, the Web browser can directly call the plug-in for processing a specific type of file. Some plug-ins can influence the balance of operation, the plug-ins are equivalent to plug-ins in games, the plug-ins can replace manual operation to perform simulated clicking, and the speed and the accuracy of the plug-ins far exceed those of manual clicking.
Specifically, when the corresponding order grabbing software is opened by the user terminal, the order grabbing software requires to detect the operating environment of the user terminal, after the detection is finished, the corresponding operating environment detection information is sent to the server, and after the server obtains the operating environment detection information, the next step is executed.
202. And judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information.
After the operation environment detection information sent by the user terminal is obtained in step 201, the operation environment detection information may be judged, so as to determine whether the operation environment of the user terminal is normal, and a specific judgment manner thereof, a detailed description of the following embodiment, is provided, and is not repeated here.
When the operating environment of the user terminal is judged to be abnormal, abnormal feedback information can be generated and sent to the user terminal so as to require the user terminal to forcibly quit the order grabbing software, and therefore the order grabbing operation of the user with the abnormal operating environment is avoided.
203. And if so, acquiring the order grabbing information of the user within a preset time range. The order grabbing information comprises order grabbing operation information when a user carries out order grabbing on the user terminal and order quality information corresponding to an order which the user has grabbed.
And when the operating environment of the user terminal is judged to be normal, executing the step to acquire the order grabbing information of the user within the preset time range. The preset time range may be a time period from the beginning of the first order grabbing operation performed by the user terminal to the end of the next order grabbing operation. The order grabbing operation information may include network request information sent by the user terminal to the server when the user performs order grabbing.
The order quality information corresponding to the order that the user has taken may include related order quality information such as delivery route quality information and delivery fee quality information corresponding to the order.
And when the user operates the order grabbing software (app for short), and clicks an order grabbing button. And initiating a request to a server, wherein the request parameters comprise clear text information such as order id, longitude of the current position of the knight, latitude, order type and the like, and encrypted parameter information. The encrypted parameter is a character string obtained by splicing the plaintext information according to a specific sequence and a specific character string by using a private key appointed by the service end and the app end, performing RSA encryption, and performing MD5 on the encrypted content. The character string encrypted by MD5 is undecipherable and irreversible.
After receiving the information from the user terminal, the server first checks whether the request is a normal request from the app. After plaintext parameter information from the app is correspondingly encrypted by using a private key according to a specified rule, the MD5 is performed to obtain a character string, the character string is compared with the encryption parameter sent by the app, and the subsequent order operation is performed only if the comparison is successful.
204. And judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information.
In step 201, it is mentioned that, generally, the login environment security detection of the user terminal can be divided into detection during login and detection after login, and due to the operation rule of the order grabbing software, a preset detection mechanism is generally set, that is, detection is performed during terminal login, and detection is performed after a preset scene is triggered after login. Because in the actual operation process, the user may open the corresponding plug-in before using the order grabbing software or open the corresponding plug-in during using the app. Therefore, in the process of using the order grabbing software, preliminary judgment can be carried out by monitoring the order grabbing information generated by the user terminal so as to judge whether the user terminal is a valid user terminal. The specific determination method will be described in detail below, and will not be described herein.
205. And if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal.
After the user terminal is determined to be a suspicious user terminal in step 204, further, dynamic verification is performed on the suspicious user terminal, where the dynamic verification mainly performs dynamic delivery of sensitive data.
According to the method and the device, the operating environment of the user terminal is detected firstly, the operating environment of the user terminal is preliminarily determined to be in a normal state, then the user terminal is subjected to order grabbing information, whether the user terminal is a suspicious user terminal is further determined, and finally dynamic verification is carried out on the suspicious user terminal determined to determine that the suspicious user terminal is an illegal order brushing terminal, so that illegal order brushing users corresponding to the illegal order brushing terminal are detected, the quantity of the illegal order brushing users is reduced, and the distribution efficiency is improved. Is a schematic flow chart of an embodiment of step 203 in the embodiment of the present application
In some embodiments of the present application, as shown in fig. 3, fig. 3 is a flowchart illustrating an embodiment of step 202 in the embodiments of the present application, where the determining whether the operating environment of the terminal is normal based on the operating environment detection information specifically includes step 301, step 302, step 303, step 304, and step 305.
301. And acquiring a preset plug-in blacklist. Wherein the plugin blacklist includes at least one violation plugin identification information.
302. And reading corresponding first plug-in identification information in the plug-in detection information.
303. And judging whether illegal plug-in identification information identical to the first plug-in identification information exists in the plug-in blacklist or not.
304. And if so, determining that the operating environment is abnormal.
305. If not, determining that the operating environment is normal.
The illegal plug-in identification information comprises identification information corresponding to the illegal bill-swiping plug-in which is confirmed, and at the current moment, the previously confirmed illegal plug-in identification information is stored in the plug-in blacklist. In step 303, specifically, the first plug-in identification information may be compared with all illegal plug-in identification information in the plug-in blacklist to obtain a comparison result, and if the comparison result indicates that the illegal plug-in identification information identical to the first plug-in identification information exists in the plug-in blacklist, it is determined that the operating environment of the user terminal is abnormal. And then, when the operating environment of the user terminal is judged to be abnormal, abnormal feedback information can be generated to the user terminal so as to require the user terminal to forcibly quit the order grabbing software, so that the order grabbing operation of the user with the abnormal operating environment is avoided.
It should be noted that the plug-in blacklist may be updated separately or together with the system, for example, when a new violating plug-in is found in the detection process, the identification information corresponding to the new violating plug-in may be updated to the plug-in blacklist.
In some embodiments of the present application, as shown in fig. 4, fig. 4 is a flowchart illustrating an embodiment of step 204 in the embodiments of the present application, where the determining, based on the order grabbing information, whether the user terminal is a suspicious user terminal specifically includes step 401, step 402, step 403, and step 404.
401. And determining the corresponding list brushing frequency when the user performs the list grabbing within the preset time range based on the list grabbing operation information.
402. Based on the order quality information, a percentage of orders that the user has preempted that are premium orders is determined.
403. And judging whether the order refreshing frequency exceeds a preset refreshing threshold value or not, and whether the percentage of the high-quality orders exceeds a preset percentage or not.
404. And if so, determining that the user terminal is a suspicious user terminal.
The preset time range can be a time period from the beginning of the first order grabbing operation of the user terminal to the end of the next order grabbing operation. The order grabbing operation information may include network request information sent by the user terminal to the server when the user performs order grabbing.
Further, the quality needs to have a reference object, which can be set in advance, for example, the general delivery range is within 5km, and then the order belongs to a delivery distance premium order within 3km, and the delivery amount of each order is also slightly different, for example, in the case of the same delivery distance, the delivery amount of a catering class is 5 yuan/order, and the delivery amount of an express class is 1.5 yuan/order, and then the delivery amount of 5 yuan/order is a delivery amount premium order, and both the delivery distance premium order and the delivery amount premium order belong to a premium order.
The preset refresh threshold and the percentage of the high-quality order can be set in advance, and under normal conditions, due to the limitation of a human body, the preset refresh threshold and the percentage of the high-quality order cannot be compared with the simulated click in the electronic equipment, so that the artificial click frequency has a certain upper limit, for example, the upper limit is 10 times/second, and the simulated click speed can easily exceed 10 times/second, so that the refresh threshold can be set to be 10 times/second. Similarly, when an order is actually issued, the order has different delivery distances, if the orders of a user are all within 2km, the orders are not normal, and meanwhile, the percentage of the good-quality orders can be obtained through statistics according to historical order information. Therefore, in step 403, when the order refreshing frequency exceeds the preset refreshing threshold and the percentage of the premium orders exceeds the preset percentage, it indicates that there is a problem in the order grabbing operation of the user terminal, so the user terminal may be determined as a suspicious user terminal first, and then the subsequent inspection is performed.
In the embodiment of the application, whether the refreshing frequency exceeds the preset refreshing threshold and whether the percentage of the high-quality order exceeds the preset percentage can be independently judged, so that the judgment precision is higher, but the judgment frequency is higher, and how to judge the high-quality order is specifically set according to the actual requirement.
In some embodiments of the present application, as shown in fig. 5, fig. 5 is a flowchart illustrating an embodiment of step 401 in an embodiment of the present application, where the ticket preemption operation information includes interface request information sent by the user terminal, and the determining, based on the ticket preemption operation information, a corresponding ticket refreshing frequency when the user performs ticket preemption within a preset time range specifically includes step 501 and step 502.
501. Monitoring interface request information sent by a user terminal within a preset time range to obtain the number of times of order grabbing requests completed by the user terminal within the preset time range;
502. and calculating the corresponding list brushing frequency when the user performs the list grabbing within the preset time range based on the list grabbing request times.
When a user performs order grabbing operation on a user terminal, clicking operation is performed on a terminal display screen, and corresponding interface request information is generated once by clicking each time, so that the server can determine the number of order grabbing requests completed by the user terminal within a preset time range according to the number of times of the interface request information.
In step 502, the time is determined to be within a preset time range, for example, the preset time range is 3 seconds, and then the user's frequency of the order brushing can be calculated through the 3 seconds and the number of times of the order grabbing requests completed within the 3 seconds.
In some embodiments of the present application, as shown in fig. 6, fig. 6 is a flowchart illustrating an embodiment of step 205 in an embodiment of the present application, where the dynamically verifying the suspicious user terminal to determine that the suspicious user terminal is an illegal bill-swiping terminal specifically includes step 601, step 602, step 603, and step 604.
601. And sending preset sensitive data to the suspicious user terminal to replace the original first encryption parameter of the suspicious user terminal, wherein the sensitive data comprises a second encryption parameter.
602. And acquiring request information fed back by the suspicious user terminal, wherein the request information comprises a third encryption key.
603. And judging whether the second encryption parameter is matched with the third encryption key or not so as to verify whether the request information is legal or not.
604. If not, determining that the suspicious user terminal is the illegal bill swiping terminal.
Specifically, the second encryption parameter issued by the server is dynamically issued, and may include a new key value and an agreed encryption rule (where the encryption rule refers to a specific parameter sequence and a spliced specific character string), and after receiving the new key, the app replaces the key corresponding to the existing first encryption parameter on the server. And after the user triggers the order grabbing operation, the App uses a new key corresponding to the new replaced second encryption parameter through an encryption module of the App, encrypts the parameter according to the specific rule in the previous step, and performs MD5. For users using the plug-in software (such software mainly simulates a data request before the app, triggers the request in a form of auxiliary click, and generates a key corresponding to the corresponding third encryption parameter). At the moment, the server side uses the replaced new encryption rule and the new key corresponding to the second encryption parameter to verify and verify the request parameter, and the verification cannot be passed, so that the aim of intercepting the order grabbing of the plug-in software is fulfilled.
In some embodiments of the present application, as shown in fig. 7, fig. 7 is a schematic flowchart of another embodiment of a method for detecting an illegal statement of account in the embodiment of the present application, where after determining whether the user terminal is a suspicious user terminal based on the statement-of-account operation information, the method further includes:
701. and acquiring a preset plug-in white list. Wherein the plug-in white list includes at least one piece of regular plug-in identification information.
702. And reading corresponding second plug-in identification information in the plug-in detection information.
703. And judging whether the regular plug-in identification information which is the same as the second plug-in identification information exists in the plug-in white list.
704. And if not, adding the second plug-in identification information to a preset plug-in grey list.
The regular plugin identification information comprises identification information which is confirmed to be corresponding to the regular manifest plugin, and at the current moment, the regular plugin identification information confirmed before is stored in the plugin white list.
In some embodiments of the present application, as shown in fig. 8, fig. 8 is another embodiment, after determining that the suspicious user terminal is an illegal bill-reading terminal, the method further includes steps 801, 802, 803, and 804:
801. and acquiring illegal terminal identification information and illegal user identification information corresponding to the illegal bill swiping terminal.
802. And updating the illegal terminal identification information to a preset device blacklist.
803. And updating the illegal user identification information to a preset user blacklist.
804. And transferring the plug-in identification information corresponding to the illegal bill-swiping terminal in the plug-in grey list to a preset plug-in blacklist.
The preset plug-in blacklist is the plug-in blacklist used in the above embodiment, and the plug-in blacklist is updated by using the plug-in identification information corresponding to the illegal bill swiping terminal in the plug-in grey list.
After detecting the user using the plug-in software, blacklist entry and registration are carried out on the equipment, and for the purpose of perfecting the scheme, punishment on cheating users by means of offline verification is considered.
In order to better implement the illegal bill-reading detection method in the embodiment of the present application, on the basis of the illegal bill-reading detection method, an illegal bill-reading detection device is further provided in the embodiment of the present application, as shown in fig. 9, fig. 9 is a schematic structural diagram of an embodiment of the illegal bill-reading detection device provided in the embodiment of the present application, and the illegal bill-reading detection device 900 includes a first obtaining unit 901, a first determining unit 902, a second obtaining unit 903, a second determining unit 904, and a first determining unit 905.
A first obtaining unit 901, configured to obtain operation environment detection information sent by a user terminal, where the operation environment detection information includes plug-in detection information;
a first judging unit 902, configured to judge whether the operating environment of the terminal is normal based on the operating environment detection information;
a second obtaining unit 903, configured to, if yes, obtain order grabbing information of the user within a preset time range, where the order grabbing information includes order grabbing operation information when the user performs order grabbing on a user terminal and order quality information corresponding to an order that the user has grabbed;
a second determining unit 904, configured to determine whether the user terminal is a suspicious user terminal based on the order grabbing information;
a first determining unit 905, configured to perform dynamic verification on the suspicious user terminal if the suspicious user terminal is determined to be an illegal bill swiping terminal.
In some embodiments of the present application, the first determining unit 902 is specifically configured to:
acquiring a preset plug-in blacklist, wherein the plug-in blacklist comprises at least one illegal plug-in identification information;
reading corresponding first plug-in identification information in the plug-in detection information;
judging whether illegal plug-in identification information which is the same as the first plug-in identification information exists in the plug-in blacklist or not;
if yes, determining that the operating environment is abnormal;
if not, determining that the operating environment is normal.
In some embodiments of the present application, the second determining unit 904 specifically includes:
the second determining unit is used for determining the corresponding list swiping frequency of the user in the list grabbing process within the preset time range based on the list grabbing operation information;
a third determining unit, configured to determine, based on the order quality information, a percentage of orders that have been taken by the user and are premium orders;
the third judging unit is used for judging whether the order refreshing frequency exceeds a preset refreshing threshold value and whether the percentage of the high-quality orders exceeds a preset percentage;
and a fourth determining unit, configured to determine that the user terminal is a suspicious user terminal if the determination is positive.
In some embodiments of the present application, the order grabbing operation information includes interface request information sent by the user terminal, and the second determining unit is specifically configured to:
monitoring interface request information sent by the user terminal within a preset time range to obtain the number of times of order grabbing requests completed by the user terminal within the preset time range;
and calculating the corresponding list brushing frequency of the user when the user performs the list grabbing within a preset time range based on the list grabbing request times.
In some embodiments of the present application, the first determining unit 905 is specifically configured to:
sending preset sensitive data to the suspicious user terminal to replace the original first encryption parameter of the suspicious user terminal, wherein the sensitive data comprises a second encryption parameter;
acquiring request information fed back by the suspicious user terminal, wherein the request information comprises a third encryption key;
judging whether the second encryption parameter is matched with the third encryption key or not so as to verify whether the request information is legal or not;
if not, determining that the suspicious user terminal is the illegal bill swiping terminal.
In some embodiments of the present application, the apparatus further comprises:
the third acquisition unit is used for acquiring a preset plug-in white list, and the plug-in white list comprises at least one piece of regular plug-in identification information;
the first reading unit is used for reading corresponding second plug-in identification information in the plug-in detection information;
a fourth judging unit, configured to judge whether regular plugin identifier information that is the same as the second plugin identifier information exists in the plugin white list;
and the adding unit is used for adding the second plug-in identification information to a preset plug-in grey list if the second plug-in identification information is not in the preset plug-in grey list.
In some embodiments of the present application, the apparatus further comprises:
the fourth acquisition unit is used for acquiring violation terminal identification information and violation user identification information corresponding to the violation single-swiping terminal;
the first updating unit is used for updating the illegal terminal identification information to a preset device blacklist;
the second updating unit is used for updating the illegal user identification information to a preset user blacklist;
and the transfer unit is used for transferring the plug-in identification information corresponding to the illegal bill-swiping terminal in the plug-in grey list to a preset plug-in black list.
According to the method and the device, the operating environment of the user terminal is detected firstly, the operating environment of the user terminal is preliminarily determined to be in a normal state, then the user terminal is subjected to order grabbing information, whether the user terminal is a suspicious user terminal is further determined, and finally dynamic verification is carried out on the suspicious user terminal determined to determine that the suspicious user terminal is an illegal order brushing terminal, so that illegal order brushing users corresponding to the illegal order brushing terminal are detected, the quantity of the illegal order brushing users is reduced, and the distribution efficiency is improved.
In addition to the above-mentioned method and apparatus for detecting an illegal statement of credit, an embodiment of the present application further provides a computer device, which integrates any one of the apparatuses for detecting an illegal statement of credit provided by the embodiments of the present application, where the computer device includes:
one or more processors;
a memory; and
one or more application programs, wherein the one or more application programs are stored in the memory and configured to perform, by the processor, the operations of any of the methods described in any of the above-described violation swipe detection method embodiments.
The embodiment of the application further provides computer equipment, and any violation statement-brushing detection device provided by the embodiment of the application is integrated with the computer equipment. Referring to fig. 10, fig. 10 is a schematic structural diagram of an embodiment of a computer device according to an embodiment of the present application.
As shown in fig. 10, it shows a schematic structural diagram of the illegal bill brushing detection device designed in the embodiment of the present application, specifically:
the violation swipe detection apparatus may include components such as a processor 1001 of one or more processing cores, a memory 1002 of one or more computer-readable storage media, a power source 1003, and an output unit 1004. Those skilled in the art will appreciate that the illegal bill detection device configuration shown in fig. 10 does not constitute a limitation of the illegal bill detection device, and may include more or fewer components than those shown, or some components in combination, or a different arrangement of components. Wherein:
the processor is a control center of the illegal bill-brushing detection device, various interfaces and lines are used for connecting all parts of the whole illegal bill-brushing detection device, and various functions and processing data of the illegal bill-brushing detection device are executed by running or executing software programs and/or modules stored in the memory 1002 and calling data stored in the memory 1002, so that the illegal bill-brushing detection device is integrally monitored. Optionally, processor 1001 may include one or more processing cores; preferably, the processor 1001 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 1001.
The memory 1002 may be used to store software programs and modules, and the processor 1001 executes various functional applications and data processing by operating the software programs and modules stored in the memory 1002. The memory 1002 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created from use of the illegal swipe detection device, and the like. Further, the memory 1002 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 1002 may also include a memory controller to provide the processor 1001 access to the memory 1002.
The illegal bill swiping detection device further comprises a power source 1003 for supplying power to each component, and preferably, the power source 1003 can be logically connected with the processor 1001 through a power management system, so that functions of charging, discharging, power consumption management and the like can be managed through the power management system. The power source 1003 may also include any component including one or more of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
The violation swipe detection device may further include an input unit 1004, and the input unit 1004 may be configured to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the illegal statement brushing detection device may further include a display unit and the like, which are not described in detail herein. Specifically, in the embodiment of the present application, the processor 1001 in the violation statement detection apparatus loads the executable file corresponding to the process of one or more application programs into the memory 1002 according to the following instructions, and the processor 1002 runs the application programs stored in the memory 1002, so as to implement various functions as follows:
acquiring running environment detection information sent by a user terminal, wherein the running environment detection information comprises plug-in detection information; judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information; if so, acquiring order grabbing information of the user within a preset time range, wherein the order grabbing information comprises order grabbing operation information when the user carries out order grabbing on a user terminal and order quality information corresponding to an order which is grabbed by the user; judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information; and if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal.
According to the method and the device, the operating environment of the user terminal is detected firstly, the operating environment of the user terminal is preliminarily determined to be in a normal state, then the user terminal is subjected to order grabbing information, whether the user terminal is a suspicious user terminal is further determined, and finally dynamic verification is carried out on the suspicious user terminal determined to determine that the suspicious user terminal is an illegal order brushing terminal, so that illegal order brushing users corresponding to the illegal order brushing terminal are detected, the quantity of the illegal order brushing users is reduced, and the distribution efficiency is improved.
To this end, an embodiment of the present application provides a computer-readable storage medium, which may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like. The computer readable storage medium stores a plurality of instructions, and the instructions can be loaded by a processor to perform the steps of any one of the violation statement detection methods provided by the embodiments of the present application. For example, the instructions may perform the steps of:
acquiring running environment detection information sent by a user terminal, wherein the running environment detection information comprises plug-in detection information; judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information; if so, acquiring order grabbing information of the user within a preset time range, wherein the order grabbing information comprises order grabbing operation information when the user carries out order grabbing on a user terminal and order quality information corresponding to an order which is grabbed by the user; judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information; and if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The method, the device and the readable storage medium for detecting the illegal statement of credit provided by the embodiment of the application are described in detail, a specific example is applied in the description to explain the principle and the implementation of the application, and the description of the embodiment is only used for helping to understand the method and the core idea of the application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A violation statement detection method, characterized in that the method comprises:
acquiring running environment detection information sent by a user terminal, wherein the running environment detection information comprises plug-in detection information;
judging whether the operating environment of the user terminal is normal or not based on the operating environment detection information;
if so, acquiring order grabbing information of the user within a preset time range, wherein the order grabbing information comprises order grabbing operation information when the user carries out order grabbing on a user terminal and order quality information corresponding to an order which the user has grabbed;
judging whether the user terminal is a suspicious user terminal or not based on the order grabbing information;
and if so, dynamically verifying the suspicious user terminal to determine whether the suspicious user terminal is an illegal bill swiping terminal.
2. The method for detecting the illegal statement of credit according to claim 1, wherein the step of judging whether the operating environment of the terminal is normal or not based on the operating environment detection information comprises the steps of:
acquiring a preset plug-in blacklist, wherein the plug-in blacklist comprises at least one illegal plug-in identification information;
reading corresponding first plug-in identification information in the plug-in detection information;
judging whether illegal plug-in identification information which is the same as the first plug-in identification information exists in the plug-in blacklist or not;
if yes, determining that the operating environment is abnormal;
if not, determining that the operating environment is normal.
3. The method according to claim 1, wherein the determining whether the user terminal is a suspicious user terminal based on the ticket-robbing information comprises:
determining a corresponding list brushing frequency when the user performs list grabbing within a preset time range based on the list grabbing operation information;
determining the percentage of orders which are good-quality orders in the orders which have been taken by the user based on the order quality information;
judging whether the order refreshing frequency exceeds a preset refreshing threshold value or not, and whether the percentage of the high-quality orders exceeds a preset percentage or not;
and if so, determining that the user terminal is a suspicious user terminal.
4. The illegal bill-swiping detection method according to claim 3, wherein the bill-swiping operation information comprises interface request information sent by the user terminal, and wherein the determining, based on the bill-swiping operation information, a corresponding bill-swiping frequency when the user performs the bill-swiping within a preset time range comprises:
monitoring interface request information sent by the user terminal within a preset time range to obtain the number of times of order grabbing requests completed by the user terminal within the preset time range;
and calculating the corresponding list brushing frequency of the user when the user performs the list grabbing within a preset time range based on the list grabbing request times.
5. The violation statement detection method according to claim 1, wherein the dynamically verifying the suspicious user terminal to determine that the suspicious user terminal is a violation statement terminal comprises:
sending preset sensitive data to the suspicious user terminal to replace the original first encryption parameter of the suspicious user terminal, wherein the sensitive data comprises a second encryption parameter;
acquiring request information fed back by the suspicious user terminal, wherein the request information comprises a third encryption key;
judging whether the second encryption parameter is matched with the third encryption key or not so as to verify whether the request information is legal or not;
if not, determining that the suspicious user terminal is the illegal bill swiping terminal.
6. The violation statement-of-credit detection method according to claim 1, wherein after determining whether the user terminal is a suspicious user terminal based on the statement-of-credit operation information, the method further comprises:
acquiring a preset plug-in white list, wherein the plug-in white list comprises at least one piece of regular plug-in identification information;
reading corresponding second plug-in identification information in the plug-in detection information;
judging whether the regular plug-in identification information which is the same as the second plug-in identification information exists in the plug-in white list or not;
and if not, adding the second plug-in identification information to a preset plug-in grey list.
7. The violation statement detection method according to claim 6, wherein after determining that the suspicious user terminal is a violation statement terminal, the method further comprises:
acquiring illegal terminal identification information and illegal user identification information corresponding to the illegal bill swiping terminal;
updating the illegal terminal identification information to a preset device blacklist;
updating the illegal user identification information to a preset user blacklist;
and transferring the plug-in identification information corresponding to the illegal bill swiping terminal in the plug-in grey list to a preset plug-in black list.
8. An illegal statement-brushing detection device, characterized in that the device comprises:
the system comprises a first acquisition unit, a second acquisition unit and a control unit, wherein the first acquisition unit is used for acquiring running environment detection information sent by a user terminal, and the running environment detection information comprises plug-in detection information;
a first judging unit, configured to judge whether an operating environment of the terminal is normal based on the operating environment detection information;
a second obtaining unit, configured to obtain order grabbing information of the user within a preset time range if the order grabbing information is positive, where the order grabbing information includes order grabbing operation information when the user performs order grabbing on a user terminal and order quality information corresponding to an order that the user has grabbed;
a second judging unit, configured to judge whether the user terminal is a suspicious user terminal based on the order grabbing information;
and the first determination unit is used for dynamically verifying the suspicious user terminal if the suspicious user terminal is the illegal bill-swiping terminal, so as to determine that the suspicious user terminal is the illegal bill-swiping terminal.
9. A computer device, characterized in that the computer device comprises:
one or more processors;
a memory; and
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the processor to implement the violation swipe detection method of any of claims 1-7.
10. A computer-readable storage medium, having stored thereon a computer program which is loaded by a processor to perform the steps of the violation statement detection method according to any of claims 1 to 7.
CN202011517318.9A 2020-12-21 2020-12-21 Method and device for detecting illegal bill, and readable storage medium Active CN112529505B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011517318.9A CN112529505B (en) 2020-12-21 2020-12-21 Method and device for detecting illegal bill, and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011517318.9A CN112529505B (en) 2020-12-21 2020-12-21 Method and device for detecting illegal bill, and readable storage medium

Publications (2)

Publication Number Publication Date
CN112529505A true CN112529505A (en) 2021-03-19
CN112529505B CN112529505B (en) 2024-02-27

Family

ID=75001991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011517318.9A Active CN112529505B (en) 2020-12-21 2020-12-21 Method and device for detecting illegal bill, and readable storage medium

Country Status (1)

Country Link
CN (1) CN112529505B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020052858A1 (en) * 1999-10-31 2002-05-02 Insyst Ltd. Method and tool for data mining in automatic decision making systems
WO2014160296A1 (en) * 2013-03-13 2014-10-02 Guardian Analytics, Inc. Fraud detection and analysis
CN105447383A (en) * 2013-09-10 2016-03-30 北京奇虎科技有限公司 Browser operating environment detection method, client, server and browser operating environment detection system
CN108921581A (en) * 2018-07-18 2018-11-30 北京三快在线科技有限公司 A kind of brush single operation recognition methods, device and computer readable storage medium
CN109522475A (en) * 2018-10-26 2019-03-26 浙江工业大学之江学院 A kind of merchant recommendation method based on user's history consumption data
CN109657166A (en) * 2018-10-16 2019-04-19 深圳壹账通智能科技有限公司 The Internet activity participatory approaches, device, equipment and readable storage medium storing program for executing
CN109784934A (en) * 2019-03-14 2019-05-21 浙江鲸腾网络科技有限公司 A kind of transaction risk control method, apparatus and relevant device and medium
CN110335098A (en) * 2019-04-24 2019-10-15 上海恺英网络科技有限公司 Order recognition methods and equipment at production payment center service end
CN111127151A (en) * 2019-12-23 2020-05-08 山东爱城市网信息技术有限公司 Method, equipment and medium for managing online order based on block chain
CN111343173A (en) * 2020-02-21 2020-06-26 腾讯云计算(北京)有限责任公司 Data access abnormity monitoring method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020052858A1 (en) * 1999-10-31 2002-05-02 Insyst Ltd. Method and tool for data mining in automatic decision making systems
WO2014160296A1 (en) * 2013-03-13 2014-10-02 Guardian Analytics, Inc. Fraud detection and analysis
CN105447383A (en) * 2013-09-10 2016-03-30 北京奇虎科技有限公司 Browser operating environment detection method, client, server and browser operating environment detection system
CN108921581A (en) * 2018-07-18 2018-11-30 北京三快在线科技有限公司 A kind of brush single operation recognition methods, device and computer readable storage medium
CN109657166A (en) * 2018-10-16 2019-04-19 深圳壹账通智能科技有限公司 The Internet activity participatory approaches, device, equipment and readable storage medium storing program for executing
CN109522475A (en) * 2018-10-26 2019-03-26 浙江工业大学之江学院 A kind of merchant recommendation method based on user's history consumption data
CN109784934A (en) * 2019-03-14 2019-05-21 浙江鲸腾网络科技有限公司 A kind of transaction risk control method, apparatus and relevant device and medium
CN110335098A (en) * 2019-04-24 2019-10-15 上海恺英网络科技有限公司 Order recognition methods and equipment at production payment center service end
CN111127151A (en) * 2019-12-23 2020-05-08 山东爱城市网信息技术有限公司 Method, equipment and medium for managing online order based on block chain
CN111343173A (en) * 2020-02-21 2020-06-26 腾讯云计算(北京)有限责任公司 Data access abnormity monitoring method and device

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
JIE ZHOU: "OSR: Optimal and Secure Routing Protocol in Multi-hop Wireless Networks", 《2012 32ND INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS》, pages 187 - 193 *
刘向阳: "基于风险矩阵与模糊集理论的众包物流风险评估研究", 《中国优秀硕士学位论文全文数据库》, no. 12, pages 145 - 97 *
姚前: "数据隐私保护新思路:从依赖他方到自主可控", 《中国信息安全》, no. 01, pages 104 - 107 *
康海燕: "面向用户的电商平台刷单行为智能检测方法", 《计算机应用》, vol. 38, no. 02, pages 596 - 601 *
蒋春铭: "基于RFID技术的黑龙江省特色农产品质量安全可追溯系统设计", 《物流技术》, vol. 39, no. 01, pages 65 - 68 *

Also Published As

Publication number Publication date
CN112529505B (en) 2024-02-27

Similar Documents

Publication Publication Date Title
CN102624677B (en) Method and server for monitoring network user behavior
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
WO2019100854A1 (en) Credit-based claim settlement implementing method and device
CN110839087B (en) Interface calling method and device, electronic equipment and computer readable storage medium
CN110851872B (en) Risk assessment method and device for private data leakage
CN113079164B (en) Remote control method and device for bastion machine resources, storage medium and terminal equipment
CN105939362A (en) User account management method and device
CN109472656B (en) Virtual article display method and device and storage medium
CN111260478A (en) Credit data interaction method and system
TW201909072A (en) Method, device, and apparatus for loss reporting, removing loss report, and service management of electronic account
CN111523817B (en) Order business processing method, device, equipment and medium based on big data
CN107798536A (en) Credit line treating method and apparatus
CN104836777A (en) Identity verification method and system
CN114626719A (en) Network appointment platform risk assessment method, equipment and storage medium
CN105512208B (en) Information publishing method, device and system
CN112463266A (en) Execution policy generation method and device, electronic equipment and storage medium
CN107507086B (en) Invoice processing method and invoice processing system
CN112529505B (en) Method and device for detecting illegal bill, and readable storage medium
CN105577621B (en) Business operation verification method, device and system
CN114860402B (en) Scheduling strategy model training method, scheduling device, scheduling equipment and scheduling medium
CN115242433B (en) Data processing method, system, electronic device and computer readable storage medium
CN112351030B (en) Data processing method and computer equipment
CN111861611A (en) Resource processing method and device based on block chain, electronic equipment and storage medium
CN111294311B (en) Traffic charging method and system for preventing traffic fraud
CN113011962A (en) Resource allocation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant