WO2019136860A1 - Procédé, appareil, dispositif électronique et support permettant de déterminer la légitimité d'un suivi - Google Patents
Procédé, appareil, dispositif électronique et support permettant de déterminer la légitimité d'un suivi Download PDFInfo
- Publication number
- WO2019136860A1 WO2019136860A1 PCT/CN2018/082363 CN2018082363W WO2019136860A1 WO 2019136860 A1 WO2019136860 A1 WO 2019136860A1 CN 2018082363 W CN2018082363 W CN 2018082363W WO 2019136860 A1 WO2019136860 A1 WO 2019136860A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- request
- attention
- client
- server
- information
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25866—Management of end-user data
- H04N21/25891—Management of end-user data being end-user preferences
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/239—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
- H04N21/2393—Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/24—Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
- H04N21/2408—Monitoring of the upstream path of the transmission network, e.g. client requests
Definitions
- the present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, an electronic device, and a medium for determining a legality.
- each live broadcast platform also launched related activities to encourage the viewer to pay attention to the anchor, and the live broadcast platform can also check the number of fans of the anchor and the quality of the live broadcast by paying attention to the number.
- the embodiment of the present application solves the technical problem that the existing anchor attention method is easy to be used by the hacker to use the script batch, and the existing security is low, by providing a method, a device, an electronic device and a medium for determining the legality.
- a method for determining legality is provided, the method being applied to a server, including:
- the attention request characterizing the client request to add attention to a target anchor between target live broadcasts
- the client's attention to the target anchor is added and recorded, and the success information indicating success of the attention is sent to the client.
- the determining, according to the attention request, whether the request information sent by the client is received includes: determining, according to the attention request, whether the request information sent by the client is received, the request information
- the mouse movement track data and the mouse click data of the client are included;
- the determining whether the attention request is a legal request according to the request information comprises: determining, according to the mouse movement track data, whether the mouse is located at the client a focus button display area of the live broadcast page, and determining, according to the mouse click data, whether there is a mouse click event in the focus button display area; if the mouse is located in the attention button display area, and the focus is present The mouse click event in the button display area determines that the attention request is a legitimate request.
- the determining, according to the attention request, whether the request information sent by the client is received includes: determining, according to the attention request, that the status flag stored by the server is a value of 0, where The start value of the status flag is 0, and the server adds 1 to the status flag every time the server sends the request information sent by the client; if the request information of the client is received, the The determining, by the request information, whether the attention request is a legal request, includes: if the status flag is not 0, determining that the attention request is a legal request.
- a method for determining legality comprising: sending request information to a server, the request information characterizing a user behavior of the client; and sending a request for attention to the server,
- the attention request is used to request to add attention to the target anchor of the target live broadcast; receive the attention success information that the server returns based on the attention request, and the attention success information is the server according to the request information.
- the information sent after the attention request is determined to be legal attention is determined.
- the sending the request information to the server includes: monitoring a mouse operation of the client; and detecting that the mouse moves to a focus button display area of the live broadcast page and clicking the attention button, recording the mouse of the client Moving the trajectory data and the mouse click data; transmitting the request information to the server, the request information including the mouse movement trajectory data and the mouse click data; the receiving the server returns a representation based on the attention request, the attention is successful
- Receiving the success information including: receiving, after the server determines that the attention request is a legal request, the returned success information indicating that the attention is successful, wherein the server moves the trajectory data according to the mouse
- the mouse click data is determined, and the mouse is located in the attention button display area, and after the mouse click event in the attention button display area exists, the attention request is determined to be a legal request.
- the sending the request information to the server includes: sending the request information to the server, where the server adds one to the status flag every time the server sends the request information, and the status flag is The initial value is 0; the receiving the success information that the server returns based on the attention request and the success of the attention, including: receiving the success of the attention of the success of the attention returned by the server after determining that the request is a legitimate request Information, wherein the server determines that the status flag is not 0, and determines that the attention request is a legitimate request.
- a determining device for determining legality where the device is a live broadcast server, including:
- a first receiving module configured to receive a request for attention sent by the client, where the attention request indicates that the client requests to add a concern to a target anchor in a target live broadcast;
- a first determining module configured to determine, according to the attention request, whether the request information sent by the client is received, where the request information represents a user behavior of the client;
- a second determining module configured to determine, according to the request information, whether the attention request is a legal request, if the request information of the client is accepted;
- the attention module is configured to: if the request for attention is a legitimate request, add and record the attention of the client to the target anchor, and send the success information indicating success of the attention to the client.
- a device for determining legality where the device is a client, and includes:
- a first sending module configured to send request information to a server, where the request information represents a user behavior of the client;
- a second sending module configured to send a attention request to the server, where the attention request is used to request to add a concern to a target anchor of the target live broadcast;
- a second receiving module configured to receive, according to the request for the attention, the information about the successful success of the attention of the server, the success information of the attention is sent by the server according to the request information, determining that the request for interest is a legitimate concern Information.
- an electronic device comprising: a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein the processor implements the first aspect and the The method of any of the two aspects.
- a sixth aspect a computer readable storage medium having stored thereon a computer program, wherein the program is executed by a processor to implement the method of any of the first aspect and the second aspect.
- the method, the device, the electronic device, and the medium provided by the embodiment of the present application after the server receives the request for attention, according to whether the request information sent by the client is received, and whether the user behavior of the client represented by the request information is consistent It is required to judge whether the attention request is a legitimate request, and if it is a legitimate request, the attention is increased, so that the hacker can directly identify the number of attentions of the anchor by directly registering the user, and the script automatically increases the security.
- FIG. 1 is a flowchart of a method for determining legality in the first embodiment of the present application
- Embodiment 2 is a flowchart of a method for determining legality of interest in Embodiment 2 of the present application;
- FIG. 3 is a schematic structural diagram of a device in Embodiment 3 of the present application.
- Embodiment 4 is a schematic structural view of a device in Embodiment 4 of the present application.
- FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of a computer readable storage medium 600 according to an embodiment of the present application.
- the embodiment of the present application solves the technical problem that the existing anchor attention method is easy to be used by the hacker to use the script batch, and the existing security is low, by providing a method, a device, an electronic device and a medium for determining the legality. A technical effect of preventing brush attention and improving safety is achieved.
- the attention request characterizing the client request to add attention to a target anchor between target live broadcasts
- the client's attention to the target anchor is added and recorded, and the success information indicating success of the attention is sent to the client.
- the server determines whether the request is a legitimate request according to whether the request information sent by the client is received, and whether the user behavior of the client represented by the request information meets the requirement. If it is a legitimate request, it will increase the attention, so that it can identify that the hacker directly registers the user by batch, and writes a script to automatically brush the attention of the anchor, which increases the security.
- this embodiment provides a method for determining the legality of interest, and the method is applied to a server, including:
- Step S101 Receive a request for attention sent by the client, where the attention request indicates that the client requests to add a concern to a target anchor between target live broadcasts;
- Step S102 Determine, according to the attention request, whether the request information sent by the client is received, where the request information represents a user behavior of the client;
- Step S103 if the request information of the client is accepted, determining, according to the request information, whether the attention request is a legal request;
- Step S104 If the attention request is a legal request, add and record the client's attention to the target anchor, and send the success information indicating the success of the attention to the client.
- the server may be a computer device, a cloud or a computer device group, which is not limited herein.
- the client can be a smart phone, a notebook, a desktop computer, and a tablet, and is not limited herein.
- the existing attention request that is, the interest agreement is: Post https://www.xxx.com/room/follow/add/Roomid, that is, the POST method of the HTTP request, the room number of the interest is sent.
- the server thinks it is successful. Therefore, the hacker can manually register the user and write a script to automatically generate the protocol to brush the attention of the anchor, which has a large security problem.
- the setting server of the present application determines whether the request for attention is a legitimate request according to the request information sent by the client, increases the threshold for the hacker to pay attention, and improves the security.
- step S101 is executed to receive the attention request sent by the client, and the attention request indicates that the client requests to add attention to the target anchor between the target live broadcasts.
- the attention request may be a follow-up request sent by the user clicking the attention button on the live website page on the client, or the attention request sent by the user input attention command is not limited herein.
- the existing protocol for requesting attention is: Post https://www.xxx.com/room/follow/add/Roomid.
- step S102 and step S103 are performed, based on the attention request, determining whether the request information sent by the client is received, the request information characterizing the user behavior of the client; if the request information of the client is accepted, And determining, according to the request information, whether the attention request is a legal request.
- the request information may be sent to the server before performing step S101, or may be sent to the server together with the attention request when performing step S101, or may be After the step S101 is performed, it is sent to the server before the step S102, and is not limited herein.
- the first type is judged based on the mouse operation information.
- the determining, according to the request for attention, whether the request information sent by the client is received includes:
- Determining, according to the request information, whether the attention request is a legal request includes:
- the attention button If the mouse is located in the attention button display area and there is a mouse click event in the attention button display area, it is determined that the attention request is a legitimate request.
- the client monitors the mouse operation on the live broadcast page of the client, and when detecting that the mouse moves to the attention button display area of the live broadcast page and clicks the attention button, the client records the location.
- the mouse movement track data and the mouse click data of the client are sent, and the request information is sent to the server, and the request information includes the mouse movement track data and the mouse click data.
- the mouse movement track data includes whether the user mouse has a motion track, position information relative to the page when the mouse is last clicked, and track coordinates of the mouse motion, etc.; the mouse click data includes whether there is a click event of a left mouse button Wait.
- the mouse movement track data and the mouse click data may be encrypted, and then the encrypted data is sent to server.
- the server After receiving the attention request, the server first determines whether the request information including the mouse movement track data and the mouse click data is received, and if not, the server directly determines that the client's attention request is illegal; if yes, Further, the request information is decrypted to obtain the mouse movement trajectory data and the mouse click data. Then, the server determines whether there is a mouse click event according to the mouse movement trajectory data and the mouse click data, and clicks whether the mouse position is in the display area of the attention button of the live broadcast page, if there is a mouse click event, and the click position is The request is considered to be a legitimate request in the display area. If there is no mouse click event or the click location is not in the display area, the request for attention sent by the client is considered illegal.
- the hacker does not actually open the live page, nor does it actually perform the mouse movement and click the attention button. Therefore, the illegal attention request has no mouse click and location data.
- the method can effectively identify and filter illegal attention requests.
- the determining, according to the attention request, whether the request information sent by the client is received includes:
- determining whether the attention request is a legal request according to the request information includes:
- the status flag is not 0, it is determined that the attention request is a legitimate request.
- the user when the user opens the live broadcast page on the client to watch the live broadcast, the user will definitely send the request information to the server to request to obtain the play content of the live broadcast room.
- a status flag is pre-set in the server, and the initial value of the status flag is 0. If the server has not received the request information of the client, the status flag corresponding to the client is always 0, if the server receives the client. The status message is set to 1 by the request information of the terminal. If it is a hacker's forged request, the hacker does not actually open the live page, and the status flag is always 0.
- the server may first verify the status flag of the information request of the client recorded by the server, and if the flag is 0, the attention request is an illegal request.
- the status flag corresponding to the illegal attention request is 0, and the illegal attention request can be effectively identified and filtered by the above method.
- the illegal attention request can also be identified together with the above two types, that is, only when the status flag is not 0, and there is a mouse click event, and the click position is within the display area.
- the concern request is a legitimate request.
- step S104 is performed. If the attention request is a legitimate request, the client's attention to the target anchor is added and recorded, and the success information indicating success of the attention is sent to the client.
- the customer authentication value algorithm increases the threshold for analysis and increases security.
- the client key corresponding to the target live broadcast is generated according to a preset rule.
- the client key is regenerated to ensure that the keys of each live broadcast opened by each client are different, thereby improving the entire data transmission. safety.
- the key is generated in a variety of ways and types, and is not limited herein.
- the client key may include a pair of public key and private key.
- the generating, by the preset rule, a client key corresponding to the target live broadcast including:
- the calculation of the private key may use the relevant data of the client and the related data of the opened room as calculation parameters, so that the private key of each room number of each client is different.
- This embodiment uses the first random data and the MD5 value of the room number as the private key, thereby ensuring that the private keys of each room are different.
- the calculation of the public key is obtained by using a preset generation algorithm to calculate the client private key.
- the preset generation algorithm may be an asymmetric algorithm, and there are many non-symmetric algorithms.
- an asymmetric RSA encryption algorithm is used to generate a pair of public and private keys, and the specific public key is an interface that invokes the RSA.
- the function generated by the function, the client private key and the client public key are uniquely paired relationships.
- the RSA generated pairing key interface RSA.CreatePair is used to generate the client public key.
- the client key is sent to the server, and the server key sent by the server is received, and the client shared key is generated based on the client key and the server key.
- the client exchanges keys with the server to ensure that the client and the server can generate a shared key, thereby generating a consistent authentication value.
- the received server key generated by the server is generated in the same manner as the client key. Specifically, the server also generates a pair of public keys and privates according to the client manner. key. The generation of the server key may also generate a private key according to the room number, the user's UID, and the second random data, thereby ensuring that the server generates different private keys for different live rooms of different clients as much as possible to ensure subsequent authentication.
- the manner of generating a specific server key will be described in the second embodiment.
- the sending the client key to a server, and receiving a server key sent by the server, generating a client shared key based on the client key and the server key include:
- the server and the client exchange their respective public keys to generate a shared secret key
- the shared secret key generated by the client and the server respectively is the same value for subsequent authentication.
- you can set the method for generating the shared key as follows:
- the server sends the server public key ServerPublickey to the client.
- the client sends the client public key ClientPublickey to the server.
- the ShareKey is a shared key, so that the value of the shared key generated by the server and the client is consistent.
- the shared key calculation method may also adopt other algorithms, and only needs to ensure that the values of the shared key generated by the server and the client are consistent, and are not limited herein.
- the room information sent by the server is received, and the room information carries an encryption algorithm sequence number and a hash algorithm sequence number.
- each algorithm may be different.
- the same open source encryption algorithm library and HASH algorithm library are pre-integrated on the server and the client, and each algorithm in the algorithm library is numbered, and the server and the algorithm library on the client are The number of the algorithm is also the same.
- the hacker does not know the algorithm corresponding to the sequence number even if the algorithm is acquired.
- the encryption algorithm sequence number and the hash algorithm sequence number may be randomly selected each time, or may be determined according to a preset rule, and are not limited herein.
- a normal client when a normal client opens a live broadcast room to watch a live broadcast, it will definitely send a request to the server to obtain room information of the live broadcast room.
- the server receives the request, the room information is sent to the client, and the room information carries the serial number of the encryption algorithm sent by the server and the serial number of the HASH algorithm, so that each client can enter the live broadcast room each time.
- the encryption algorithm is changed, and the HASH algorithm is also changing, which raises the threshold for cracking.
- the room information may carry two sequence number fields, one field is AlgNo, and the other field is HashNo, and may also carry the current timestamp information of the server for calculation of a subsequent encryption algorithm.
- the server can use a random strategy to randomly select an encryption algorithm sequence number from all encryption algorithm libraries, and can randomly select a HASH algorithm sequence number from all HASH algorithm libraries. It will eventually be carried to the client in the room information protocol.
- the client information of the client and the client shared key are encrypted and calculated to obtain encrypted data.
- the hash algorithm corresponding to the hash algorithm sequence number is used to perform hash calculation on the encrypted data to obtain a client authentication value.
- the encryption algorithm corresponding to the sequence number of the encryption algorithm is used to perform encryption calculation on the client information of the client and the shared key of the client, to obtain encrypted data, including:
- UID user identification
- the target The room number of the live room
- the token Token when the user logs in
- the present embodiment is based on the UID, the Token value when the user logs in, and the room number. Encrypt.
- the hash algorithm corresponding to the hash algorithm sequence number is used to perform hash calculation on the encrypted data to obtain a client authentication value, including:
- the hash algorithm is used to perform hash calculation on the encrypted data to obtain a client authentication value.
- the hash calculation is performed to obtain the client authentication value, which can further improve the security.
- the client obtains the encryption algorithm sequence number and the hash algorithm sequence number
- the corresponding algorithm needs to be determined from the pre-stored algorithm library.
- the interface of the cryptographic algorithm library is EncryptLib.GetFunc
- the interface of the hash algorithm library is HashLib.GetFunc
- HashFunc is the determined sequence number.
- the client performs encryption of the data by calling the encryption function pointer EncryptFunc determined above, where the input data includes the UID information of the user, the room number, the Token when the user logs in, and the timestamp sent by the server when the client requests the room information. Information and the client share the key.
- Token Token Timestamp is the timestamp information sent by the server when the client requests room information
- the ShareKey is the client shared key.
- the parameter EncryptDataLength is the data length of EncryptData
- EncryptKEY is the client authentication value that needs to be calculated.
- the server authentication value is an encryption algorithm and a solution corresponding to the server based on the encryption algorithm sequence number.
- the server authentication value calculated by the hash algorithm corresponding to the hash algorithm sequence number.
- the server determines that the received attention request is that the Buddha carries the client authentication value (key field). If not, the request is considered illegal. If yes, the server further compares Whether the server authentication value is consistent with the client authentication value, because the server authentication value calculation method of the server is consistent with the client end authentication value calculation method, and is also based on the encryption algorithm sequence number sent by the server to the client. And the algorithm determined by the hash algorithm sequence number is encrypted, and the server shared key is also input, so the obtained server authentication value and the client authentication value in the attention request should be equal, and if not equal, the said The request for comment is illegal, not recognized, and refuses to pay attention to it.
- the anti-brushing attention is jointly performed by combining the status flag, the mouse operation information and the authentication value as an example to illustrate the process of the server plus attention:
- the server After receiving the request from the client, the server first verifies the status flag of the client recorded by the server. If the status flag is 0, the request is illegal. If the status flag is not 0, the further server determines whether the client has a The request information including the mouse movement record is reported, and if not, the server directly determines that the attention request is illegal, and if so, the server further decrypts the reported request information, thereby obtaining decrypted mouse movement track data and mouse click data. Then, the server determines whether there is a mouse click event, and whether the mouse click position is within the display area of the attention button.
- the request is considered illegal, if any The mouse click event and the mouse click position are in the display area of the attention button, and the validity judgment of the client authentication value EncryptKEY value in the attention request is further determined.
- the same server will also calculate its own server authentication value ServerEncryptKEY according to the algorithm of the client. If the client authentication value is inconsistent with the server authentication value or the request request does not carry the client authentication value, it will refuse to increase the attention. It is unanimous that the request for concern is a legitimate request and agrees to increase the concern.
- the application determines whether the attention request is based on whether the request information sent by the client is received, and whether the user behavior of the client represented by the request information meets the requirement.
- a legitimate request if it is a legitimate request, will increase the concern, so that it can identify that the hacker directly registers the user by batch, and writes a script to automatically brush the attention of the anchor, thereby increasing security.
- the authentication value of the client is obtained by calculating the shared key by using the algorithm sequence number sent by the server each time, on the one hand, the authentication is performed.
- the value is not transmitted in the network, so that the authentication value and the calculation method can be avoided by the hacker, which increases the security.
- the encryption algorithm is changed every time the client enters the live broadcast room.
- the HASH algorithm is also changing, increasing the threshold for the authentication value to be cracked and increasing security.
- the unique client key of the client in the target live broadcast is generated, and the client is calculated by the client and the server is directly obtained by the client.
- the shared key ensures the consistency of the shared key between the client and the server.
- the key and the calculation method can be prevented from being stolen by the hacker, which increases the security. .
- the present application provides a method corresponding to the client side in the first embodiment.
- the second embodiment refers to the second embodiment.
- This embodiment provides a method for determining the legality of interest. As shown in FIG. 2, the method is applied to a client, including:
- Step S201 Send request information to a server, where the request information represents a user behavior of the client;
- Step S202 Send a attention request to the server, where the attention request is used to request to add attention to a target anchor between target live broadcasts;
- Step S203 Receive attention success information indicating that the attention is successful according to the attention request, and the attention success information is information that is sent by the server after determining that the attention request is legal attention according to the request information.
- the server may be a computer device, a cloud or a computer device group, which is not limited herein.
- the client can be a smart phone, a notebook, a desktop computer, and a tablet, and is not limited herein.
- the sending the request information to the server includes:
- the request information includes the mouse movement trajectory data and the mouse click data
- the attention success information that is returned by the server based on the attention request, and includes:
- the server determines that the attention request is a legal request, the returned success information indicating that the attention is successful, wherein the server determines, according to the mouse movement trajectory data and the mouse click data, The mouse is located in the attention button display area, and after the mouse click event in the attention button display area exists, it is determined that the attention request is a legal request.
- the sending the request information to the server includes:
- the server sends the request information to the server, wherein the server receives the request information sent by the client, and sets a status flag, and the start value of the status flag is 0;
- a success information indicating that the attention is successful including:
- the server And receiving, by the server, the attention success information that is returned after the attention request is a legal request, wherein the server determines that the status flag is not 0, and determines that the attention request is a legal request.
- the method for determining the legality of interest provided in this embodiment is the same as the method for determining the legality in the first embodiment. Therefore, those skilled in the art can understand the present invention based on the method described in the first embodiment of the present application. The specific embodiments of the method of the embodiment and various modifications thereof are not described in detail herein for the simplicity of the description.
- the present application provides an embodiment of the device corresponding to the first embodiment. For details, see Embodiment 3.
- the embodiment provides a device for determining the legality of interest.
- the device is a live broadcast server, and includes:
- the first receiving module 301 is configured to receive a request for attention sent by the client, where the attention request indicates that the client requests to add a concern to a target anchor between target live broadcasts;
- the first determining module 302 is configured to determine, according to the attention request, whether the request information sent by the client is received, where the request information represents a user behavior of the client;
- the second determining module 303 is configured to determine, according to the request information, whether the attention request is a legal request, if the request information of the client is accepted;
- the attention module 304 is configured to: if the request for the attention is a legitimate request, add and record the attention of the client to the target anchor, and send the success information indicating the success of the attention to the client.
- the device introduced in this embodiment is a device used in the method for determining the legality in the first embodiment of the present application. Therefore, those skilled in the art can understand the present invention based on the method described in the first embodiment of the present application.
- the specific embodiment of the device of the embodiment and various modifications thereof are not described in detail herein for how the device implements the method in the embodiment of the present application.
- the devices used by those skilled in the art to implement the methods in the embodiments of the present application are all within the scope of the present application.
- the present application provides an embodiment of the device corresponding to the second embodiment. For details, see Embodiment 4.
- the embodiment provides a device for determining the legality of interest.
- the device is a client, and includes:
- a first sending module 401 configured to send request information to a server, where the request information represents a user behavior of the client;
- a second sending module 402 configured to send a attention request to the server, where the attention request is used to request to add a concern to a target anchor between target live broadcasts;
- the second receiving module 403 is configured to receive the attention success information that is returned by the server based on the attention request, and the attention success information is that the server determines that the attention request is a legal concern according to the request information. The message sent.
- the device introduced in this embodiment is a device used in the method for determining the legality of the second embodiment of the present application. Therefore, those skilled in the art can understand the present invention based on the method described in the second embodiment of the present application.
- the specific embodiment of the device of the embodiment and various modifications thereof are not described in detail herein for how the device implements the method in the embodiment of the present application.
- the devices used by those skilled in the art to implement the methods in the embodiments of the present application are all within the scope of the present application.
- the present application provides an embodiment of the device corresponding to the first embodiment and the second embodiment.
- the present application provides an embodiment of the device corresponding to the first embodiment and the second embodiment.
- the fifth embodiment refer to the fifth embodiment.
- the embodiment provides an electronic device.
- the electronic device is a live broadcast server.
- the device includes a memory 510, a processor 520, and a computer program 511 stored on the memory 510 and executable on the processor 520.
- the processor 520 implements the following steps when executing the computer program 511:
- the attention request characterizing the client request to add attention to a target anchor between target live broadcasts
- the client's attention to the target anchor is added and recorded, and the success information indicating success of the attention is sent to the client.
- the embodiment further provides an electronic device, which is a client, as shown in FIG. 5, including a memory 510, a processor 520, and a computer program 511 stored on the memory 510 and operable on the processor 520.
- the processor 520 implements the following steps when executing the computer program 511:
- the attention success information is information that is sent by the server according to the request information to determine that the attention request is a legal concern.
- any one of the first embodiment or the second embodiment may be implemented.
- the electronic device introduced in this embodiment is a device that is used in the method for determining the legality in the first embodiment or the second embodiment of the present application. Therefore, the method is based on the method in the first embodiment or the second embodiment.
- a person skilled in the art can understand the specific implementation of the electronic device of the present embodiment and various changes thereof. Therefore, how to implement the method in the embodiment of the present application is not described in detail herein.
- the devices used by those skilled in the art to implement the methods in the embodiments of the present application are all within the scope of the present application.
- the present application provides a storage medium corresponding to the first embodiment and the second embodiment.
- a storage medium corresponding to the first embodiment and the second embodiment.
- the embodiment provides a computer readable storage medium 600. As shown in FIG. 6, a computer program 611 is stored thereon. When the computer program 611 is executed by a processor, the method described in Embodiment 1 or Embodiment 2 is implemented.
- any one of the first embodiment or the second embodiment may be implemented.
- embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Graphics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention concerne un procédé, un appareil, un dispositif électronique et un support pour déterminer la légitimité d'un suivi, ledit procédé consistant : à recevoir une demande de suivi envoyée par un client, ladite demande de suivi caractérisant ledit client demandant d'ajouter et de suivre un ancrage de diffusion cible d'une salle de diffusion en direct cible ; sur la base de ladite demande de suivi, à déterminer si des informations de demande du client ont été reçues, lesdites informations de demande caractérisant le comportement d'utilisateur du client ; si des informations de demande du client ont été reçues, alors à déterminer, selon les informations de demande, si la demande de suivi est une demande légitime; si la demande de suivi est une demande légitime, alors à ajouter le client en tant que suiveur de l'ancrage de diffusion cible et à enregistrer ladite diffusion cible, et à envoyer, au client, des informations de réussite de suivi caractérisant le fait que le suivi a réussi. La présente invention résout le problème technique de la facilité, dans des procédés de suivi d'ancrages de diffusion dans l'état de la technique, pour des pirates à utiliser un script afin d'effectuer un faux suivi d'ancrages en lots, ce qui se traduit par une faible sécurité. L'invention permet d'obtenir les effets techniques de prévention de faux suivi et d'amélioration de la sécurité.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810029007.4A CN108200450B (zh) | 2018-01-12 | 2018-01-12 | 一种关注合法性的确定方法、装置、电子设备及介质 |
CN201810029007.4 | 2018-01-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019136860A1 true WO2019136860A1 (fr) | 2019-07-18 |
Family
ID=62589368
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2018/082363 WO2019136860A1 (fr) | 2018-01-12 | 2018-04-09 | Procédé, appareil, dispositif électronique et support permettant de déterminer la légitimité d'un suivi |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108200450B (fr) |
WO (1) | WO2019136860A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109361957B (zh) * | 2018-10-18 | 2021-02-12 | 广州酷狗计算机科技有限公司 | 发送点赞请求的方法和装置 |
CN109451359B (zh) * | 2018-10-31 | 2020-10-16 | 武汉斗鱼网络科技有限公司 | 一种关注异常的检测方法、装置、设备和存储介质 |
CN113727126B (zh) * | 2021-08-31 | 2022-10-18 | 北京快来文化传播集团有限公司 | 基于直播平台的主播关注方法 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104778612A (zh) * | 2015-04-23 | 2015-07-15 | 上海未来宽带技术股份有限公司 | 一种实现实体店铺线下到线上营销管理方法及系统 |
CN105872773A (zh) * | 2016-06-01 | 2016-08-17 | 北京奇虎科技有限公司 | 视频直播的监控方法及监控装置 |
US9602892B1 (en) * | 2009-04-09 | 2017-03-21 | Tp Lab, Inc. | Method and system to automatically select data network videos as television shows based on a persona |
CN107517394A (zh) * | 2017-09-01 | 2017-12-26 | 北京小米移动软件有限公司 | 识别非法用户的方法、装置及计算机可读存储介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104809377B (zh) * | 2015-04-29 | 2018-01-05 | 西安交通大学 | 基于网页输入行为特征的网络用户身份监控方法 |
CN105046124A (zh) * | 2015-07-31 | 2015-11-11 | 小米科技有限责任公司 | 安全防护方法及装置 |
CN107301337A (zh) * | 2016-04-14 | 2017-10-27 | 腾讯科技(深圳)有限公司 | 信息验证方法和装置 |
CN107507027A (zh) * | 2017-08-15 | 2017-12-22 | 上海精数信息科技有限公司 | 基于人机识别的广告投放控制方法及投放系统 |
-
2018
- 2018-01-12 CN CN201810029007.4A patent/CN108200450B/zh active Active
- 2018-04-09 WO PCT/CN2018/082363 patent/WO2019136860A1/fr active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9602892B1 (en) * | 2009-04-09 | 2017-03-21 | Tp Lab, Inc. | Method and system to automatically select data network videos as television shows based on a persona |
CN104778612A (zh) * | 2015-04-23 | 2015-07-15 | 上海未来宽带技术股份有限公司 | 一种实现实体店铺线下到线上营销管理方法及系统 |
CN105872773A (zh) * | 2016-06-01 | 2016-08-17 | 北京奇虎科技有限公司 | 视频直播的监控方法及监控装置 |
CN107517394A (zh) * | 2017-09-01 | 2017-12-26 | 北京小米移动软件有限公司 | 识别非法用户的方法、装置及计算机可读存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN108200450B (zh) | 2019-11-15 |
CN108200450A (zh) | 2018-06-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6517359B2 (ja) | アカウント復元プロトコル | |
CN108259438B (zh) | 一种基于区块链技术的认证的方法和装置 | |
TWI734854B (zh) | 資訊安全的驗證方法、裝置和系統 | |
JP7202688B2 (ja) | 認証システム、認証方法、アプリケーション提供装置、認証装置、及び認証用プログラム | |
TWI635412B (zh) | Method, device and system for verifying user identity by using social relationship data | |
US8458776B2 (en) | Low-latency peer session establishment | |
CN108259183B (zh) | 一种关注方法、装置、电子设备及介质 | |
CN109510802B (zh) | 鉴权方法、装置及系统 | |
TW200818838A (en) | Mutual authentication and secure channel establishment between two parties using consecutive one-time passwords | |
CN110276000B (zh) | 媒体资源的获取方法和装置、存储介质及电子装置 | |
WO2020062667A1 (fr) | Procédé de gestion d'actifs de données, dispositif de gestion d'actifs de données et support lisible par ordinateur | |
WO2019136860A1 (fr) | Procédé, appareil, dispositif électronique et support permettant de déterminer la légitimité d'un suivi | |
WO2019047375A1 (fr) | Procédé d'authentification, dispositif, serveur et support d'informations pour empêcher le développement de cadeaux automatisé | |
TW201516901A (zh) | 帳戶資訊的管理方法、帳戶管理伺服器和銷售終端及系統 | |
WO2017000479A1 (fr) | Procédé d'authentification d'informations d'identité, terminal utilisateur, terminal de service, serveur d'authentification et système de service | |
CN110025955B (zh) | 信息处理方法、终端、计算机可读存储介质和计算机设备 | |
EP4092984A1 (fr) | Procédé et appareil de traitement de données, dispositif et support | |
WO2021137769A1 (fr) | Procédé et appareil d'affichage pour envoyer et vérifier une demande et dispositif associé | |
WO2019047511A1 (fr) | Procédé, dispositif et système de diffusion en direct pour empêcher le développement de cadeaux automatisé | |
WO2019071859A1 (fr) | Procédé et appareil pour empêcher un vol de cadeau sur une plate-forme de diffusion en direct | |
WO2019061597A1 (fr) | Procédé de traitement de données et serveur | |
CN108235067B (zh) | 一种视频流地址的鉴权方法及装置 | |
WO2018176531A1 (fr) | Procédé et appareil de demande de vidéo et de lecture de vidéo | |
CN110380843B (zh) | 一种信息处理方法及相关设备 | |
CN110034923B (zh) | 一种信息处理方法以及相关设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18899066 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 18899066 Country of ref document: EP Kind code of ref document: A1 |