CN114219439A - Batch social software registration method for preventing feature recognition - Google Patents

Batch social software registration method for preventing feature recognition Download PDF

Info

Publication number
CN114219439A
CN114219439A CN202111537135.8A CN202111537135A CN114219439A CN 114219439 A CN114219439 A CN 114219439A CN 202111537135 A CN202111537135 A CN 202111537135A CN 114219439 A CN114219439 A CN 114219439A
Authority
CN
China
Prior art keywords
camouflage
line
account
information
batch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111537135.8A
Other languages
Chinese (zh)
Inventor
李文飞
程俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Write Easy Network Technology Shanghai Co ltd
Original Assignee
Write Easy Network Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Write Easy Network Technology Shanghai Co ltd filed Critical Write Easy Network Technology Shanghai Co ltd
Priority to CN202111537135.8A priority Critical patent/CN114219439A/en
Publication of CN114219439A publication Critical patent/CN114219439A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Data Mining & Analysis (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A batch social software registration method for preventing feature recognition comprises the following steps: setting different personal settings and identity camouflage for each account; using a network line matched with the region where the personal information in the identity camouflage is located; in the account registration process, disguising the data of the operation terminal; and carrying out account registration by adopting a distributed terminal and a concurrent thread. The invention overcomes the defects of the prior art, can automatically and intelligently select the IP line according to the area where the virtual identity is located in the execution process, adopts multilayer skip to protect the data security and prevents the server from number sealing. And the batch software registration method adopts a distributed registration mechanism, can realize high-concurrency and multi-thread registration in a short time, and meets the use requirements of a large number of accounts.

Description

Batch social software registration method for preventing feature recognition
Technical Field
The invention relates to the technical field of data processing, in particular to a batch social software registration method for preventing feature recognition.
Background
In the process of fighting against illegal criminal activities, virtual account information of some social platforms is often needed, and illegal activities are searched, collected and evidence is extracted through the virtual accounts. The demand of virtual accounts of the mainstream social platform is large, and a very large workload needs to be consumed in a manual operation mode, so that a batch registration method for the virtual accounts of the social platform is needed. However, for the overseas mainstream social platform, the background of the system already has rich account identification strategies and a signature mechanism based on feature identification, so that case detection activities face great difficulty.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a batch social software registration method for preventing feature recognition, which overcomes the defects of the prior art, has reasonable design, can automatically and intelligently select an IP line according to the region where a virtual identity is located in the execution process, adopts multilayer skip to protect the data security and prevents the server from number sealing. And the batch software registration method adopts a distributed registration mechanism, can realize high-concurrency and multi-thread registration in a short time, and meets the use requirements of a large number of accounts.
In order to achieve the purpose, the invention is realized by the following technical scheme:
a batch social software registration method for preventing feature recognition comprises the following steps:
step S1: identity camouflage, wherein different sets of personal identity and identity camouflage are set for each account;
step S2: line camouflage, wherein a network line matched with the area where the personal information in the identity camouflage is located is used;
step S3: terminal camouflage, which is used for disguising the data of the operation terminal in the account registration process;
step S4: and executing the task, and registering the account number by adopting a distributed terminal and a concurrent thread.
Preferably, the personage and identity masquerading in step S1 includes personal information masquerading, work information masquerading, contact information masquerading, and hobby masquerading.
Preferably, the personal information camouflage comprises camouflage of name, gender, birthday, area, street address, zip code, social security number, height, weight, network user name, random password and credit card number;
the work information camouflage comprises camouflage of professional skills, companies and job positions;
the contact information camouflage comprises mobile phone number and mailbox address camouflage;
the mobile phone number camouflage is randomly extracted from a mobile phone number pool according to the requirement of a camouflage target, and short messages can be received according to the requirement; the mailbox address pretends to adopt a temporary mailbox, and the mails sent by the server can be received according to the mailbox address.
Preferably, the step S2 specifically includes the following steps:
step S21: preparing an anonymous VPS server, and anonymously purchasing the VPS server matched with the region where the account number is registered according to the requirement of a registration task to form a node of a network line;
step S22: installing line software, namely installing a line software service end on a VPS server purchased anonymously;
step S23: line detection and identification, namely importing a server list with installed line software into a background for account registration to detect and identify a line;
step S24: and (3) automatically selecting the line, and randomly extracting multiple layers of nodes to plan the network line, so that the exit node of the line is matched with the position area set by the account.
Preferably, the detection and identification of the line in step S23 specifically includes the following steps:
step S231: firstly, identifying the area where the line is located, and matching the area where the disguised identity is located in a database;
step S232: and detecting the line connectivity and the access delay condition, and preferably selecting a line with smooth network for account registration.
Preferably, the step S3 specifically includes the following steps:
step S31: disguised hardware information comprising a network card MAC address of the computer, a computer name, an operating system and a system version;
step S32: disguising area information, and setting a time zone of the operation terminal as a time zone position set by an account;
step S33: disguising the browser version, and disguising the information such as the browser model, the browser version and the like by setting a User-Agent field;
step S34: disguising the Cookie information and removing the Cookie information.
Preferably, the step S4 specifically includes the following steps:
step S41: establishing TCP connection, automatically selecting nodes to form a network line by using line automatic planning of a line camouflage module, and establishing TCP connection with a target server;
step S42: the method comprises the steps of making a data forgery request, and constructing request parameters by using account information of an identity camouflage module and information of terminal camouflage hardware equipment and a terminal camouflage system, wherein all camouflage parameters are constructed into json format data packets and sent to a server to simulate a manual registration process of a normal user;
step S43: receiving a short message verification code, accessing a mobile phone card pool in a hardware short message modem mode, completing short message reception, writing the short message into a database, and performing batch short message content identification and short message verification by using an automatic program;
step S44: and using mailbox activation, logging in a mailbox address of the identity disguise module through an automation program, receiving an activation mail, extracting an activation link according to the content of the activation mail and accessing to complete the step of activating the mailbox.
The invention provides a batch social software registration method for preventing feature recognition. The method has the following beneficial effects: in the execution process, the IP line can be intelligently selected automatically according to the area where the virtual identity is located, and the data security is protected by adopting multilayer skipping, so that the server is prevented from being signed. And the batch software registration method adopts a distributed registration mechanism, can realize high-concurrency and multi-thread registration in a short time, and meets the use requirements of a large number of accounts. The batch software registration method supports the automatic activation of the mailbox after the account registration is completed. And automatically receiving the activation mails, identifying the mail content, clicking the activation link and completing account activation.
Drawings
In order to more clearly illustrate the present invention or the prior art solutions, the drawings that are needed in the description of the prior art will be briefly described below.
FIG. 1 is a schematic diagram of the steps of the present invention;
FIG. 2 is a schematic diagram of the step S1 in the present invention;
FIG. 3 is a schematic diagram of the step S2 in the present invention;
FIG. 4 is a schematic diagram of the step S3 in the present invention;
FIG. 5 is a schematic diagram of the step S4 in the present invention;
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings.
As shown in fig. 1 to 5, a batch social software registration method for preventing feature recognition includes the following steps:
step S1: identity camouflage, wherein a plurality of account numbers are prevented from using the same registration information in the batch software registration process, and different personal settings and identity camouflage are set for each account number in order to reduce the number sealing risk of a server;
the personal setting and identity disguising comprises personal information disguising, work information disguising, contact information disguising and interest disguising:
the personal information camouflage comprises camouflage of names, sexes, birthdays, areas, street addresses, postcodes, social security numbers, heights, weights, network user names, random passwords and credit card numbers;
the work information camouflage comprises camouflage of professional skills, companies and job positions;
the contact information camouflage comprises mobile phone number and mailbox address camouflage; the mobile phone number camouflage is randomly extracted from a mobile phone number pool according to the requirement of a camouflage target, and short messages can be received according to the requirement; the mailbox address pretends to adopt a temporary mailbox, and the mails sent by the server can be received according to the mailbox address, so that later activation and account number retrieval are facilitated;
interest and hobby camouflage can set the interest direction of the registered account, which is beneficial to identifying the friends and fans in the same way in the social platform in the later period and also provides information and evidence in each subdivision field for fighting against illegal criminal activities.
Step S2: line camouflage, wherein a network of a working environment cannot be directly used in the account registration process, so that a very large number sealing risk exists, and therefore, a network line matched with the area where personal information in the identity camouflage is located is used to increase the success rate; the method specifically comprises the following steps:
step S21: preparing an anonymous VPS server, and anonymously purchasing the VPS server matched with the region where the account number is registered according to the requirement of a registration task to form a node of a network line and provide a basis of the network node for later network line planning and multilayer skipping;
step S22: line software is installed, in order to solve the security problem in data transmission and prevent network monitoring and attack by a third party, data information in the account registration process is transmitted through encryption; installing a line software service end on the VPS server purchased anonymously, and providing security guarantee for line planning of account registration;
step S23: line detection and identification, namely importing a server list with installed line software into a background for account registration to detect and identify a line;
in the embodiment, the line detection and identification firstly identifies the area where the line is located, matches the area where the disguised identity is located in the database, secondly detects the line connectivity and the access delay condition, and preferentially selects the line with smooth network for account registration;
step S24: the line is automatically selected, in order to improve the data security and prevent the local network from being traced back in the account registration process, the line management module can randomly extract a plurality of layers of nodes to plan the network line, so that the outlet node of the line is matched with the position area set by the account.
Step S3: terminal camouflage, namely disguising the data of the operation terminal in the account registration process to prevent the browser from performing data collection and parameter collision; the method specifically comprises the following steps:
step S31: disguised hardware information comprising a network card MAC address of the computer, a computer name, an operating system and a system version;
step S32: disguising area information, and setting a time zone of the operation terminal as a time zone position set by an account;
step S33: disguising the browser version, wherein the version of the browser and HTTP request header information need to be strictly disguised in the process of sending HTTP protocol data requests; setting User-Agent field to disguise information such as browser model, browser version and the like;
step S34: disguising the Cookie information and clearing the Cookie information, wherein the server side may perform Set-Cookie operation and the like on the operation terminal in the account registration process, so that part of characteristic data in the account registration process is recorded. By disguising the Cookie information and removing the Cookie information, the information record of the server can be prevented, and the success rate of account registration is increased.
Step S4: and executing the task, and registering the account number by adopting a distributed terminal and a concurrent thread.
Wherein, the single registration task specifically comprises the following steps:
step S41: establishing TCP connection, automatically selecting nodes to form a network line by using line automatic planning of a line camouflage module, and establishing TCP connection with a target server;
step S42: the method comprises the steps of making a data forgery request, and constructing request parameters by using account information of an identity camouflage module and information of terminal camouflage hardware equipment and a terminal camouflage system, wherein all camouflage parameters are constructed into json format data packets and sent to a server to simulate a manual registration process of a normal user;
step S43: receiving a short message verification code, wherein the short message verification code needs to be frequently received according to the mobile phone number information of the disguised account in the batch software registration process, so that the short message receiving and verification code identification cannot be processed according to a mode of manually reading short messages; therefore, the method adopts a hardware short message modem mode to access the mobile phone card pool, the short message reception is completed and written into the database, and the automatic program is used for identifying the short message content in batches and verifying the short message;
step S44: the mailbox is used for activation, the account can not be used immediately after the registration is finished, and the mailbox activation process needs to be finished; and logging in the mailbox address of the identity disguise module through an automation program, receiving the activation mails, extracting activation links according to the content of the activation mails and accessing to complete the step of activating the mailbox.
According to the method, the required personal information including name, age, area, occupation, contact information and the like is set, and in the execution process of the batch software registration method, the IP circuit is intelligently selected automatically according to the area where the virtual identity is located, and the data security is protected by adopting multilayer skip, so that the server is prevented from being signed. And the batch software registration method adopts a distributed registration mechanism, can realize high-concurrency and multi-thread registration in a short time, and meets the use requirements of a large number of accounts. The batch software registration method supports the automatic activation of the mailbox after the account registration is completed. And automatically receiving the activation mails, identifying the mail content, clicking the activation link and completing account activation.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (7)

1. A batch social software registration method for preventing feature recognition is characterized in that: the method comprises the following steps:
step S1: identity camouflage, wherein different sets of personal identity and identity camouflage are set for each account;
step S2: line camouflage, wherein a network line matched with the area where the personal information in the identity camouflage is located is used;
step S3: terminal camouflage, which is used for disguising the data of the operation terminal in the account registration process;
step S4: and executing the task, and registering the account number by adopting a distributed terminal and a concurrent thread.
2. The batch social software registration method for preventing feature recognition according to claim 1, wherein: the personal setting and identity disguising in the step S1 includes personal information disguising, work information disguising, contact information disguising and interest disguising.
3. The batch social software registration method for preventing feature recognition according to claim 2, wherein: the personal information camouflage comprises camouflage of names, sexes, birthdays, areas, street addresses, postcodes, social security numbers, heights, weights, network user names, random passwords and credit card numbers;
the work information camouflage comprises camouflage of professional skills, companies and job positions;
the contact information camouflage comprises mobile phone number and mailbox address camouflage;
the mobile phone number camouflage is randomly extracted from a mobile phone number pool according to the requirement of a camouflage target, and short messages can be received according to the requirement; the mailbox address pretends to adopt a temporary mailbox, and the mails sent by the server can be received according to the mailbox address.
4. The batch social software registration method for preventing feature recognition according to claim 1, wherein: the step S2 specifically includes the following steps:
step S21: preparing an anonymous VPS server, and anonymously purchasing the VPS server matched with the region where the account number is registered according to the requirement of a registration task to form a node of a network line;
step S22: installing line software, namely installing a line software service end on a VPS server purchased anonymously;
step S23: line detection and identification, namely importing a server list with installed line software into a background for account registration to detect and identify a line;
step S24: and (3) automatically selecting the line, and randomly extracting multiple layers of nodes to plan the network line, so that the exit node of the line is matched with the position area set by the account.
5. The batch social software registration method for preventing feature recognition according to claim 4, wherein: the detection and identification of the line in step S23 specifically includes the following steps:
step S231: firstly, identifying the area where the line is located, and matching the area where the disguised identity is located in a database;
step S232: and detecting the line connectivity and the access delay condition, and preferably selecting a line with smooth network for account registration.
6. The batch social software registration method for preventing feature recognition according to claim 1, wherein: the step S3 specifically includes the following steps:
step S31: disguised hardware information comprising a network card MAC address of the computer, a computer name, an operating system and a system version;
step S32: disguising area information, and setting a time zone of the operation terminal as a time zone position set by an account;
step S33: disguising the browser version, and disguising the information such as the browser model, the browser version and the like by setting a User-Agent field;
step S34: disguising the Cookie information and removing the Cookie information.
7. The batch social software registration method for preventing feature recognition according to claim 1, wherein: the single registration task in step S4 specifically includes the following steps:
step S41: establishing TCP connection, automatically selecting nodes to form a network line by using line automatic planning of a line camouflage module, and establishing TCP connection with a target server;
step S42: the method comprises the steps of making a data forgery request, and constructing request parameters by using account information of an identity camouflage module and information of terminal camouflage hardware equipment and a terminal camouflage system, wherein all camouflage parameters are constructed into json format data packets and sent to a server to simulate a manual registration process of a normal user;
step S43: receiving a short message verification code, accessing a mobile phone card pool in a hardware short message modem mode, completing short message reception, writing the short message into a database, and performing batch short message content identification and short message verification by using an automatic program;
step S44: and using mailbox activation, logging in a mailbox address of the identity disguise module through an automation program, receiving an activation mail, extracting an activation link according to the content of the activation mail and accessing to complete the step of activating the mailbox.
CN202111537135.8A 2021-12-15 2021-12-15 Batch social software registration method for preventing feature recognition Pending CN114219439A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111537135.8A CN114219439A (en) 2021-12-15 2021-12-15 Batch social software registration method for preventing feature recognition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111537135.8A CN114219439A (en) 2021-12-15 2021-12-15 Batch social software registration method for preventing feature recognition

Publications (1)

Publication Number Publication Date
CN114219439A true CN114219439A (en) 2022-03-22

Family

ID=80702475

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111537135.8A Pending CN114219439A (en) 2021-12-15 2021-12-15 Batch social software registration method for preventing feature recognition

Country Status (1)

Country Link
CN (1) CN114219439A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115334032A (en) * 2022-07-19 2022-11-11 写逸网络科技(上海)有限公司 Mail receiving method based on multiple protocols
CN116390027A (en) * 2023-05-29 2023-07-04 深圳欧米智能科技有限公司 Vehicle management method and system based on Internet of things

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115334032A (en) * 2022-07-19 2022-11-11 写逸网络科技(上海)有限公司 Mail receiving method based on multiple protocols
CN115334032B (en) * 2022-07-19 2023-12-01 写逸网络科技(上海)有限公司 Mail receiving method based on multiple protocols
CN116390027A (en) * 2023-05-29 2023-07-04 深圳欧米智能科技有限公司 Vehicle management method and system based on Internet of things
CN116390027B (en) * 2023-05-29 2023-08-22 深圳欧米智能科技有限公司 Vehicle management method and system based on internet of things

Similar Documents

Publication Publication Date Title
US10187369B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph
US10250583B2 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using a graph score
CN107301551B (en) Method, device and system for searching, inquiring and verifying before network payment
US10771471B2 (en) Method and system for user authentication
US8220030B2 (en) System and method for security in global computer transactions that enable reverse-authentication of a server by a client
US20170331828A1 (en) Systems and methods to authenticate users and/or control access made by users on a computer network using identity services
CN106575327B (en) Analyzing facial recognition data and social network data for user authentication
EP2764496B1 (en) System and method for validating users using social network or other information from a web site
US9654480B2 (en) Systems and methods for profiling client devices
WO2019100854A1 (en) Credit-based claim settlement implementing method and device
US11855994B2 (en) System and method for aggregating client data and cyber data for authentication determinations
CN114219439A (en) Batch social software registration method for preventing feature recognition
CN109784031B (en) Account identity verification processing method and device
CN110225002B (en) Business handling method and related product
CN108510233A (en) Long-range face label match attend a banquet method, electronic device and computer readable storage medium
CN108597080A (en) Door-access control method and device based on instant messaging and system
CN108600154A (en) A kind of government affairs remote authentication system and method
CN103905194B (en) Identity traceability authentication method and system
CN108230479A (en) A kind of efficient intelligence is registered system and method
CN109214177A (en) A kind of anti-fake system of internet finance
CN107454064A (en) A kind of visitor's authentication method and system based on public number
CN106127463B (en) Transfer control method and terminal equipment
CN114867025A (en) Method and device for preventing short message bombing
CN111047341B (en) Information processing method, device, server and terminal equipment
TW201112720A (en) Method of communication device recognition code and dynamic code for network identification and telephone fraud certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination