CN116993365A - Identification method, device, equipment and storage medium of cheating equipment - Google Patents

Identification method, device, equipment and storage medium of cheating equipment Download PDF

Info

Publication number
CN116993365A
CN116993365A CN202310839234.4A CN202310839234A CN116993365A CN 116993365 A CN116993365 A CN 116993365A CN 202310839234 A CN202310839234 A CN 202310839234A CN 116993365 A CN116993365 A CN 116993365A
Authority
CN
China
Prior art keywords
target
equipment
identified
cheating
feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310839234.4A
Other languages
Chinese (zh)
Inventor
宋泽阳
郭彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202310839234.4A priority Critical patent/CN116993365A/en
Publication of CN116993365A publication Critical patent/CN116993365A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Abstract

The disclosure provides a method, a device, equipment and a storage medium for identifying cheating equipment, relates to the technical field of computers, and particularly relates to the technical fields of mobile security, anti-cheating and the like. The identification method of the cheating equipment comprises the following steps: acquiring current characteristics in an operating environment of equipment to be identified; acquiring target characteristics in an operation environment of target equipment; the type of the target equipment is the same as the type of the equipment to be identified, and different types of equipment have different target characteristics; and determining whether the device to be identified is a cheating device based on the current characteristic and the target characteristic. The method and the device can improve the identification accuracy of the cheating device.

Description

Identification method, device, equipment and storage medium of cheating equipment
Technical Field
The disclosure relates to the technical field of computers, in particular to the technical fields of mobile security, anti-cheating and the like, and particularly relates to a method, a device, equipment and a storage medium for identifying cheating equipment.
Background
Along with the continuous upgrade of the black product technology, in order to control the cheating cost, the black product can utilize the same batch of equipment to falsify key information such as equipment parameters, hardware information and the like to cause different equipment groups by the same batch of equipment, so that the traditional business wind control is avoided, and illegal profit is obtained.
Disclosure of Invention
The present disclosure provides a method, an apparatus, a device, and a storage medium for identifying a cheating device.
According to an aspect of the present disclosure, there is provided a method for identifying a cheating device, including: acquiring current characteristics in an operating environment of equipment to be identified; acquiring target characteristics in an operation environment of target equipment; the type of the target equipment is the same as the type of the equipment to be identified, and different types of equipment have different target characteristics; and determining whether the device to be identified is a cheating device based on the current characteristic and the target characteristic.
According to another aspect of the present disclosure, there is provided an identification apparatus of a cheating device, including: the first acquisition module is used for acquiring current characteristics in the running environment of the equipment to be identified; the second acquisition module is used for acquiring target characteristics in the running environment of the target equipment; the type of the target equipment is the same as the type of the equipment to be identified, and different types of equipment have different target characteristics; and the determining module is used for determining whether the equipment to be identified is a cheating equipment or not based on the current characteristics and the target characteristics.
According to another aspect of the present disclosure, there is provided an electronic device including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of the above aspects.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method according to any one of the above aspects.
According to another aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements a method according to any of the above aspects.
According to the technical scheme, the identification accuracy of the cheating equipment can be improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic diagram according to a first embodiment of the present disclosure;
fig. 2 is a schematic diagram of an application scenario provided according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram according to a second embodiment of the present disclosure;
FIG. 4 is a schematic diagram of an acquisition process of target features provided in accordance with an embodiment of the present disclosure;
FIG. 5 is a schematic diagram according to a third embodiment of the present disclosure;
fig. 6 is a schematic diagram of an electronic device for implementing a method of identifying a cheating device according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
In the related art, the device fingerprint may be generated using information of hardware features, system attributes, system configuration, etc. of the device, and the cheating device is identified through the device fingerprint. However, accuracy is to be improved.
In order to improve the identification accuracy of the cheating device, the present disclosure provides the following embodiments.
Fig. 1 is a schematic diagram of a first embodiment of the present disclosure, where the present embodiment provides a method for identifying a cheating device, the method including:
101. and acquiring the current characteristics in the running environment of the equipment to be identified.
102. Acquiring target characteristics in an operation environment of target equipment; the type of the target device is the same as the type of the device to be identified, and different types of devices have different target characteristics.
103. And determining whether the device to be identified is a cheating device based on the current characteristic and the target characteristic.
The current characteristics refer to characteristics in the running environment of the equipment to be identified;
target characteristics refer to characteristics in the operating environment of the target device.
The feature in the running environment refers to a relevant parameter at the running time of the device, for example, java class at the running time of the device.
The type may specifically refer to a type number, i.e. the same model of device of the same manufacturer is the same type of device, and different models of device of the same manufacturer are different types of devices.
Taking the java class as an example, different types of devices have different java classes when running, for example, a first java class is in the running environment of a model A mobile phone, a second java class is in the running environment of a model B mobile phone, and the first java class is different from the second java class. Taking the first java class as an example, the first java class may include one or more java classes.
By comparing the current characteristics with the target characteristics, it can be determined whether the device to be identified is a cheating device. For example, if the device to be identified is a type a mobile phone, and the current feature of the device to be identified is a first java class, and if the target feature of the type a mobile phone is a second java class, it may be determined that the device to be identified is a cheating device, that is, the device to be identified is a fake model a mobile phone, when the first java class is different from the second java class.
Taking the device as a mobile phone as an example, the black product may cause the mobile phone of the model a to be a mobile phone of the model B. In the related art, black products are often forged with some static parameters, such as hardware characteristics, system attributes, system configuration, etc. However, parameters of the device when operating are difficult to forge. For example, the black product can make the hardware feature of the model a mobile phone pseudo to the hardware feature of the model B mobile phone, but the parameters (such as java class) when running in the model a mobile phone are still java class that the model a mobile phone should have, and are difficult to forge to form the java class that the model B mobile phone has.
In this embodiment, the cheating device is identified based on the current feature and the target feature, and since the current feature and the target feature are features in the device operating environment, the features of the device during operation are difficult to forge, and therefore the identification accuracy of the cheating device can be improved based on the features of the device during operation.
For better understanding of the present disclosure, application scenarios of embodiments of the present disclosure are described.
Fig. 2 is a schematic diagram of an application scenario provided according to an embodiment of the present disclosure. As shown in fig. 2, taking a device as an example of a mobile phone, a user may use the mobile phone to perform network activities. The handsets as in 2 are denoted by 201 a-201 n, respectively. These users may include users who are normally surfing the internet, and may also include blackout users. In order to reduce the cheating cost, the black-producing user can forge the mobile phone used by the black-producing user, for example, the mobile phone used by the black-producing user is a model A mobile phone, but the black-producing user can forge the mobile phone to form a model B mobile phone by forging hardware parameters and the like, and the black-producing user can externally express the model B mobile phone after the model A mobile phone is pseudo-manufactured into the model B mobile phone.
To identify a cheating device (e.g., a fake mobile phone), the cheating device identification system 202 may obtain current features in the operating environment of the device to be identified, and obtain target features in the operating environment of the target device, and identify the cheating device by comparing the current features with the target features. The cheating identification system 202 may be deployed on an electronic device, such as a user terminal and/or server, the user terminal including, for example: personal computers (PersonalComputer, PC), mobile devices, smart home devices, wearable devices, etc., the mobile devices including, for example, cell phones, laptops, tablet computers, etc., the smart home devices including, for example, smart speakers, smart televisions, etc., and the wearable devices including, for example, smart watches, smart glasses, etc. The server may be an identification-side local server or a cloud server, and the server may be a single server or a cluster server.
The device to be identified may be a device forged by a blackout user, and the target device is a normal device. For example, if the black-out user creates a model B phone as a model a phone artifact, the target device is a regular model B phone.
The normal model A mobile phone is assumed to be characterized by a first java class when running, and the normal model B mobile phone is assumed to be characterized by a second java class when running. Because the characteristics of the equipment in operation are difficult to forge, although a black-producing user causes a model A mobile phone to be a model B mobile phone, the characteristics of the forged mobile phone in operation are still characteristics of the model A mobile phone, namely a first java class; and by obtaining the second java class of the mobile phone with the model B, the mobile phone is identified as the cheating mobile phone because the first java class is different from the second java class.
The device to be identified can be provided with a preset Application (APP), and the APP can collect the current characteristics in the running environment of the device where the APP is located and send the current characteristics to the cheating device identification system. The APP may also send the type information (e.g., model number) of the device to be identified to the cheating device identification system.
The cheating device identification system may obtain, in advance, target features of each type of normal device during operation, for example, target features of a model a mobile phone, target features of a model B mobile phone, and the like.
After the cheating equipment identification system obtains the model and the current characteristics of the equipment to be identified, the target characteristics of the corresponding model can be obtained, the current characteristics and the target characteristics are compared, and when the two characteristics are different, the equipment to be identified is determined to be the cheating equipment.
In the technical scheme of the disclosure, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing and the like of the personal information of the user accord with the regulations of related laws and regulations, and the public order colloquial is not violated.
In combination with the application scenario, the present disclosure further provides a method for identifying a cheating device.
Fig. 3 is a schematic diagram of a second embodiment of the present disclosure, where the present embodiment provides a method for identifying a cheating device, the method including:
301. and receiving the current characteristics sent by the preset application installed on the equipment to be identified, wherein the current characteristics are the characteristics in the running environment of the equipment to be identified.
Taking java class as an example, the current feature is represented by the current java class.
The preset Application is used for acquiring the current characteristics of the equipment where the preset Application is located, and the preset Application can send the current characteristics to the server through an Application programming interface (Application ProgrammingInterface, API) of the server (cheating equipment identification system).
In addition, the preset application can also send the type information (such as model) of the equipment to be identified to the server. It can be understood that if the device to be identified is a counterfeit device, the type information sent by the preset application is the model of the counterfeit device. For example, if the device to be identified is that the black-office user creates the model a mobile phone as the model B mobile phone, the model sent by the preset application is the model B.
The preset application may be one or more, and the preset applications on different devices may be the same or different.
In this embodiment, since the application coverage is very wide, the current feature of the device to be identified is obtained through the preset application, so that the identification range can be improved.
302. Acquiring target characteristics in an operation environment of target equipment; the type of the target device is the same as the type of the device to be identified, and different types of devices have different target characteristics.
For example, if the preset application sends the model B, the server may obtain the target feature of the model B mobile phone.
Since different types of devices have different target characteristics, the target characteristics may also be referred to as unique characteristics of the device.
Specifically, the server may collect unique features of each type of device in advance, and after determining the type of the device to be identified, obtain the unique features of the target type as target features in a database of multiple types collected in advance, with the type of the device to be identified as the target type.
For each type of device's target features, its acquisition process may include:
acquiring candidate characteristics of the target equipment;
selecting candidate features meeting preset conditions as the target features; wherein, the preset conditions include: is available in the operating environment of the target device and is not available in the operating environment of other devices of a different type than the target device.
In this embodiment, the candidate features are screened through availability, so that the features of the target device during operation can be obtained, and the uniqueness of the target features in the target device can be ensured, the accuracy of the target features can be improved, and the identification accuracy of the cheating device can be further improved through availability in the operation environment of the target device and unavailability in the operation environment of other devices.
Wherein the target feature comprises: a target java class;
the obtaining the candidate feature of the target device includes:
decompiling the library file of the target equipment to obtain an initial java class;
and deleting the native java class of the operating system of the target equipment in the initial java class to obtain the candidate characteristics.
In this embodiment, the library file is subjected to back translation to obtain an initial java class, and the original java class is deleted from the initial java class to obtain candidate features, so that the influence of the original java class of the operating system can be removed, the processing capacity is reduced, and the processing efficiency is improved.
The selecting candidate features meeting preset conditions as the target features includes:
performing an availability test in the operating environment of the target device for the candidate feature to obtain a candidate feature available in the operating environment of the target device as a screening feature;
and carrying out usability test on the screening characteristics in the running environment of the other equipment to obtain screening characteristics which are not available in the running environment of the other equipment as the target characteristics.
In the embodiment, through testing in the running environments of the target equipment and other equipment, the unique characteristics of the target equipment in running can be obtained, the accuracy of the target characteristics is improved, and the identification accuracy of the cheating equipment is further improved.
Taking an example that the operating system of the device is an Android system, a process of obtaining the target feature of the target device when the target device runs may be as shown in fig. 4.
(1) Automatic extraction and decompilation of device library files
The script can be run on the tested target equipment, a system/frame directory in the target equipment is obtained through the script, a system version is obtained through an adb tool, decompilation is started, decompilation target files of different system versions and adopted tools are different, for example, oat and odex decompilation dex files are used for Android5-7 of the system version; aiming at the Android8-9 system version, a vdex decompiled dex file is used; aiming at the Android10 version of the system, extracting a dex file from the jar file; aiming at the newly added apex of the Android11 system version, after decompression, the img file is mounted and the jar package is taken out. And extracting the java class in the jar file and the dex file by using the jar tool and the dexdump tool. java classes may also be referred to as class paths, such as android.
(2) Data processing
The java class obtained through decompilation can be arranged into a list A according to a specific format. The script can also automatically comb out the original java class path in the Android source code library and arrange the path into a list B. The data is sorted and filtered by sorting, de-duplication and the like by utilizing the script, and java class which exists in the list A but does not exist in the list B is filtered out and sorted into a list C.
(3) True hangar detection
And (3) placing the list C into a target device (such as a model A device) for usability testing, and extracting and sorting java class available in the model A device from the list C into a list D by using a DemoApp through a class. List D is put into a pool of devices (different vendors, different models of real device libraries) for unique authentication by DemoApp, each device producing a subset of list D. For example, taking a model B device as an example, detecting the availability of each java class in the list D on the device B, taking the unavailable (undetected) java class in the list D as D1, similarly taking the undetected java class in the list D in the model C device as D2, and then taking the intersection of D1, D2, etc. to form a list E, where the java class of the list E is the unique java class of the model a device, that is, the target feature for the target device (model a device).
303. And judging whether the current characteristic is consistent with the target characteristic, if so, executing 304, otherwise executing 305.
304. And determining that the device to be identified is a normal device.
305. And determining that the device to be identified is a cheating device.
In the embodiment, by comparing the current characteristics with the target characteristics and determining that the equipment to be identified is the cheating equipment when the current characteristics and the target characteristics are inconsistent, the cheating equipment can be identified simply, conveniently and efficiently.
Fig. 5 is a schematic diagram of a fourth embodiment of the present disclosure, which provides an identification apparatus of a cheating device. The apparatus 500 includes: a first acquisition module 501, a second acquisition module 502 and a determination module 503.
The first obtaining module 501 is configured to obtain a current feature in an operating environment of a device to be identified; the second obtaining module 502 is configured to obtain a target feature in an operating environment of the target device; the type of the target equipment is the same as the type of the equipment to be identified, and different types of equipment have different target characteristics; the determining module 503 is configured to determine whether the device to be identified is a cheating device based on the current feature and the target feature.
In this embodiment, the cheating device is identified based on the current feature and the target feature, and since the current feature and the target feature are features in the device operating environment, the features of the device during operation are difficult to forge, and therefore the identification accuracy of the cheating device can be improved based on the features of the device during operation.
In some embodiments, the second obtaining module 502 is further configured to: acquiring candidate characteristics of the target equipment; selecting candidate features meeting preset conditions as the target features; wherein, the preset conditions include: is available in the operating environment of the target device and is not available in the operating environment of other devices of a different type than the target device.
In this embodiment, the candidate features are screened through availability, so that the features of the target device during operation can be obtained, and the uniqueness of the target features in the target device can be ensured, the accuracy of the target features can be improved, and the identification accuracy of the cheating device can be further improved through availability in the operation environment of the target device and unavailability in the operation environment of other devices.
In some embodiments, the second obtaining module 502 is further configured to: decompiling the library file of the target equipment to obtain an initial java class; and deleting the native java class of the operating system of the target equipment in the initial java class to obtain the candidate characteristics.
In this embodiment, the library file is subjected to back translation to obtain an initial java class, and the original java class is deleted from the initial java class to obtain candidate features, so that the influence of the original java class of the operating system can be removed, the processing capacity is reduced, and the processing efficiency is improved.
In some embodiments, the second obtaining module 502 is further configured to: performing an availability test in the operating environment of the target device for the candidate feature to obtain a candidate feature available in the operating environment of the target device as a screening feature; and carrying out usability test on the screening characteristics in the running environment of the other equipment to obtain screening characteristics which are not available in the running environment of the other equipment as the target characteristics.
In the embodiment, through testing in the running environments of the target equipment and other equipment, the unique characteristics of the target equipment in running can be obtained, the accuracy of the target characteristics is improved, and the identification accuracy of the cheating equipment is further improved.
In some embodiments, the first obtaining module 501 is further configured to: and receiving the current characteristics sent by the preset application installed on the equipment to be identified.
In this embodiment, since the application coverage is very wide, the current feature of the device to be identified is obtained through the preset application, so that the identification range can be improved.
In some embodiments, the determining module 503 is further configured to: and if the current characteristics are inconsistent with the target characteristics, determining that the equipment to be identified is cheating equipment.
In the embodiment, by comparing the current characteristics with the target characteristics and determining that the equipment to be identified is the cheating equipment when the current characteristics and the target characteristics are inconsistent, the cheating equipment can be identified simply, conveniently and efficiently.
It is to be understood that in the embodiments of the disclosure, the same or similar content in different embodiments may be referred to each other.
It can be understood that "first", "second", etc. in the embodiments of the present disclosure are only used for distinguishing, and do not indicate the importance level, the time sequence, etc.
In the technical scheme of the disclosure, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing and the like of the personal information of the user accord with the regulations of related laws and regulations, and the public order colloquial is not violated.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
Fig. 6 illustrates a schematic block diagram of an example electronic device 600 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, servers, blade servers, mainframes, and other appropriate computers. The electronic device 600 may also represent various forms of mobile apparatuses, such as personal digital assistants, cellular telephones, smartphones, wearable devices, and other similar computing apparatuses. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 6, the electronic device 600 includes a computing unit 601 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 602 or a computer program loaded from a storage unit 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data required for the operation of the electronic device 600 can also be stored. The computing unit 601, ROM602, and RAM603 are connected to each other by a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
A number of components in the electronic device 600 are connected to the I/O interface 605, including: an input unit 606 such as a keyboard, mouse, etc.; an output unit 607 such as various types of displays, speakers, and the like; a storage unit 608, such as a magnetic disk, optical disk, or the like; and a communication unit 609 such as a network card, modem, wireless communication transceiver, etc. The communication unit 609 allows the electronic device 600 to exchange information/data with other devices through a computer network, such as the internet, and/or various telecommunication networks.
The computing unit 601 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 601 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 601 performs the respective methods and processes described above, such as the identification method of the cheating device. For example, in some embodiments, the method of identifying a cheating device may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 606. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 600 via the ROM602 and/or the communication unit 609. When the computer program is loaded into the RAM603 and executed by the computing unit 601, one or more steps of the above-described identification method of the cheating device may be performed. Alternatively, in other embodiments, the computing unit 601 may be configured to perform the identification method of the cheating device by any other suitable means (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems-on-chips (SOCs), complex Programmable Logic Devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable load balancing apparatus, such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service ("VirtualPrivate Server" or simply "VPS") are overcome. The server may also be a server of a distributed system or a server that incorporates a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel or sequentially or in a different order, provided that the desired results of the technical solutions of the present disclosure are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (15)

1. A method of identifying a cheating device, comprising:
acquiring current characteristics in an operating environment of equipment to be identified;
acquiring target characteristics in an operation environment of target equipment; the type of the target equipment is the same as the type of the equipment to be identified, and different types of equipment have different target characteristics;
and determining whether the device to be identified is a cheating device based on the current characteristic and the target characteristic.
2. The method of claim 1, wherein the obtaining the target feature in the operating environment of the target device comprises:
acquiring candidate characteristics of the target equipment;
selecting candidate features meeting preset conditions as the target features; wherein, the preset conditions include: is available in the operating environment of the target device and is not available in the operating environment of other devices of a different type than the target device.
3. The method of claim 2, wherein the obtaining candidate features of the target device comprises:
decompiling the library file of the target equipment to obtain an initial java class;
and deleting the native java class of the operating system of the target equipment in the initial java class to obtain the candidate characteristics.
4. The method according to claim 2, wherein the selecting, as the target feature, a candidate feature satisfying a preset condition includes:
performing an availability test in the operating environment of the target device for the candidate feature to obtain a candidate feature available in the operating environment of the target device as a screening feature;
and carrying out usability test on the screening characteristics in the running environment of the other equipment to obtain screening characteristics which are not available in the running environment of the other equipment as the target characteristics.
5. The method of claim 1, wherein the obtaining the current characteristics of the device to be identified comprises:
and receiving the current characteristics sent by the preset application installed on the equipment to be identified.
6. The method of any of claims 1-5, wherein the determining whether the device to be identified is a cheating device based on the current feature and the target feature comprises:
and if the current characteristics are inconsistent with the target characteristics, determining that the equipment to be identified is cheating equipment.
7. An identification device of a cheating device, comprising:
the first acquisition module is used for acquiring current characteristics in the running environment of the equipment to be identified;
the second acquisition module is used for acquiring target characteristics in the running environment of the target equipment; the type of the target equipment is the same as the type of the equipment to be identified, and different types of equipment have different target characteristics;
and the determining module is used for determining whether the equipment to be identified is a cheating equipment or not based on the current characteristics and the target characteristics.
8. The apparatus of claim 7, wherein the second acquisition module is further to:
acquiring candidate characteristics of the target equipment;
selecting candidate features meeting preset conditions as the target features; wherein, the preset conditions include: is available in the operating environment of the target device and is not available in the operating environment of other devices of a different type than the target device.
9. The apparatus of claim 8, wherein the second acquisition module is further to:
decompiling the library file of the target equipment to obtain an initial java class;
and deleting the native java class of the operating system of the target equipment in the initial java class to obtain the candidate characteristics.
10. The apparatus of claim 8, wherein the second acquisition module is further to:
performing an availability test in the operating environment of the target device for the candidate feature to obtain a candidate feature available in the operating environment of the target device as a screening feature;
and carrying out usability test on the screening characteristics in the running environment of the other equipment to obtain screening characteristics which are not available in the running environment of the other equipment as the target characteristics.
11. The apparatus of claim 7, wherein the first acquisition module is further to:
and receiving the current characteristics sent by the preset application installed on the equipment to be identified.
12. The apparatus of any of claims 7-11, wherein the determining module is further to:
and if the current characteristics are inconsistent with the target characteristics, determining that the equipment to be identified is cheating equipment.
13. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
14. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-6.
15. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any of claims 1-6.
CN202310839234.4A 2023-07-10 2023-07-10 Identification method, device, equipment and storage medium of cheating equipment Pending CN116993365A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310839234.4A CN116993365A (en) 2023-07-10 2023-07-10 Identification method, device, equipment and storage medium of cheating equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310839234.4A CN116993365A (en) 2023-07-10 2023-07-10 Identification method, device, equipment and storage medium of cheating equipment

Publications (1)

Publication Number Publication Date
CN116993365A true CN116993365A (en) 2023-11-03

Family

ID=88522337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310839234.4A Pending CN116993365A (en) 2023-07-10 2023-07-10 Identification method, device, equipment and storage medium of cheating equipment

Country Status (1)

Country Link
CN (1) CN116993365A (en)

Similar Documents

Publication Publication Date Title
CN109684188B (en) Test method and device
CN112114892A (en) Deep learning model obtaining method, loading method and selecting method
CN112949767A (en) Sample image increment, image detection model training and image detection method
CN114722401A (en) Equipment safety testing method, device, equipment and storage medium
CN116301997A (en) Upgrading method, device, equipment and medium of controller
CN116993365A (en) Identification method, device, equipment and storage medium of cheating equipment
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN114693116A (en) Method and device for detecting code review validity and electronic equipment
CN114546799A (en) Point burying log checking method and device, electronic equipment, storage medium and product
CN113127357A (en) Unit testing method, device, equipment, storage medium and program product
CN113190451A (en) Test method, test device, electronic equipment and storage medium
CN114116688A (en) Data processing and data quality inspection method, device and readable storage medium
CN116401113B (en) Environment verification method, device and medium for heterogeneous many-core architecture acceleration card
CN115422555B (en) Back door program detection method and device, electronic equipment and storage medium
CN117520195A (en) Method, apparatus, device, storage medium and program product for testing interface
CN116991737A (en) Software testing method, system, electronic equipment and storage medium
CN116303071A (en) Interface testing method and device, electronic equipment and storage medium
CN116956306A (en) Method, device, equipment and storage medium for acquiring cheating application installation package
CN117370192A (en) Interface suitability test method and device, electronic equipment and storage medium
CN117407044A (en) Configuration method, device, equipment and medium of cross-terminal assembly
CN115374010A (en) Function testing method, device, equipment and storage medium
CN116436883A (en) Method, device, electronic equipment and readable storage medium for link transmission
CN115859349A (en) Data desensitization method and device, electronic equipment and storage medium
CN117742730A (en) Project deployment method and device, electronic equipment and storage medium
CN114090073A (en) Interface information extraction method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination