WO2023010715A1 - Procédé, appareil et dispositif de commande de compte de jeu - Google Patents
Procédé, appareil et dispositif de commande de compte de jeu Download PDFInfo
- Publication number
- WO2023010715A1 WO2023010715A1 PCT/CN2021/132567 CN2021132567W WO2023010715A1 WO 2023010715 A1 WO2023010715 A1 WO 2023010715A1 CN 2021132567 W CN2021132567 W CN 2021132567W WO 2023010715 A1 WO2023010715 A1 WO 2023010715A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- game
- user
- account
- game user
- control
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 111
- 230000008569 process Effects 0.000 claims abstract description 44
- 230000006399 behavior Effects 0.000 claims description 122
- 230000001186 cumulative effect Effects 0.000 claims description 67
- 238000004590 computer program Methods 0.000 claims description 25
- 238000012545 processing Methods 0.000 claims description 17
- 230000001960 triggered effect Effects 0.000 claims description 8
- 206010012335 Dependence Diseases 0.000 abstract description 39
- 230000002829 reductive effect Effects 0.000 abstract description 2
- 230000000366 juvenile effect Effects 0.000 abstract 1
- 230000001815 facial effect Effects 0.000 description 28
- 238000012795 verification Methods 0.000 description 15
- 238000004458 analytical method Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 11
- 230000009471 action Effects 0.000 description 10
- 238000006073 displacement reaction Methods 0.000 description 8
- 238000012552 review Methods 0.000 description 7
- 230000008859 change Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000009825 accumulation Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000003203 everyday effect Effects 0.000 description 4
- 230000009286 beneficial effect Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000002354 daily effect Effects 0.000 description 3
- 238000013480 data collection Methods 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- DRBIKPLEMCMYRS-UHFFFAOYSA-N [Au].[Kr] Chemical compound [Au].[Kr] DRBIKPLEMCMYRS-UHFFFAOYSA-N 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013527 convolutional neural network Methods 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 238000007654 immersion Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 230000000670 limiting effect Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 230000004630 mental health Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000007637 random forest analysis Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 230000000717 retained effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012706 support-vector machine Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000003442 weekly effect Effects 0.000 description 1
Images
Classifications
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/79—Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
Definitions
- the present invention claims the priority of the Chinese patent invention filed on August 6, 2021, with the invention number 202110903419.8, and the title of the invention is "Game Account Control Method, Device and Equipment", the entire content of which is incorporated in the present invention by reference.
- the present invention relates to the field of computer technology, in particular to a game account control method, device and equipment.
- the present invention provides a game account control method, device and equipment to improve the current game anti-addiction protection work to a certain extent and solve the technical problem that it is impossible to effectively prevent minors from being addicted to the game world.
- a method for controlling a game account comprising: when it is detected that the game account is logged in, acquiring user characteristic data of the game user corresponding to the game account, and determining according to the user characteristic data The identity information of the game user; if the identity information identifies the game user as the first identity user, the game user’s first operation behavior data and first control rules generated during the game process are used to execute the the control of the game account; and if the identity information identifies the game user as a second identity user, then execute the control of the game user according to the second operation behavior data and the second control rules of the game user generated during the game process.
- Game account control when it is detected that the game account is logged in, acquiring user characteristic data of the game user corresponding to the game account, and determining according to the user characteristic data The identity information of the game user; if the identity information identifies the game user as the first identity user, the game user’s first operation behavior data and first control rules generated during the game process are used to execute the the control of the game account; and
- a game account control device configured to obtain user characteristic data of a game user corresponding to the game account when a game account is detected to be logged in, And determine the identity information of the game user according to the user characteristic data; the first execution module is configured to, if the identity information identifies the game user as the first identity user, then according to the game generated during the game process The first operation behavior data of the user and the first control rule execute the control of the game account; and the second execution module is used to, if the identity information identifies the game user as the second identity user, then according to the game progress The second operation behavior data of the game user and the second control rules generated in the game control the game account.
- a computer device including a memory, a processor, and a computer program stored on the memory.
- the processor executes the computer program, the steps of the above method for controlling a game account are realized.
- a computer-readable medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of the above method for controlling a game account are realized.
- a computer program product including a computer program, and when the computer program is executed by a processor, the steps of the above method for controlling a game account are realized.
- the beneficial effects of the present invention are: by means of the above technical solution, according to a game account control method, device and equipment according to the embodiment of the present invention, when the game account login is detected, the user characteristics of the game user can be collected based on the account login type Data, verify the first identity information of the game user according to the user characteristic data, and when the first identity information identifies the user identity of the game user as an underage user logged in with a tourist account, the game user’s first identity information generated during the game process can be used to One operation behavior data and the first control rule execute the control of the game account; correspondingly, when the user identity of the game user identified by the first identity information is an underage user logged in with a real-name account, it can be based on the game account generated during the game process The user's second operation behavior data and the second control rules implement the control of the game account.
- underage users can participate in games more reasonably based on different play restriction rules under tourist accounts and real-name accounts, effectively reducing the risk of game addiction, maximally
- Fig. 1 schematically shows a schematic flowchart of a method for controlling a game account according to an embodiment of the present invention.
- Fig. 2 schematically shows a schematic flowchart of another method for controlling a game account according to an embodiment of the present invention.
- Fig. 3 schematically shows a flowchart of another method for controlling a game account according to an embodiment of the present invention.
- Fig. 4 schematically shows a structural diagram of a device for controlling a game account according to an embodiment of the present invention.
- Fig. 5 schematically shows a structural diagram of another device for controlling a game account according to an embodiment of the present invention.
- Fig. 6 schematically shows a block diagram of a computer device for implementing the method according to the invention.
- Fig. 7 schematically shows a block diagram of a computer program product implementing the method according to the invention.
- a method for controlling a game account is provided, as shown in Figure 1, the method can be The following steps 101, 102 and 103 are included.
- step 101 when a game account login is detected, the user characteristic data of the game user corresponding to the game account is obtained, and the identity information of the game user is determined according to the user characteristic data.
- Game accounts may include real-name accounts and tourist accounts.
- Real-name accounts are fixed game accounts after regular real-name authentication, and are usually bound to the real-name identities of game users.
- Tourist accounts are randomly generated experience accounts, which are usually physically related to the equipment used by players.
- user characteristic data is the characteristic data collected when the game account login is detected, which can reflect the account login type and the age of the game user, which may include real-name registration data or account login when the account login type is real-name account login
- the type is face image collection data when a tourist account is logged in, and the real-name registration data may include face image collection data, fingerprint data, ID card data, etc.
- identity information is used to identify the game account login type as a tourist account login or a real-name account login Next, whether the corresponding game user meets the age limit, for example, is a minor (under the age of 18) or a non-minor (that is, an adult whose age is greater than or equal to 18).
- the predicted age of the game user can be determined through the pre-trained facial feature analysis model, and the age distribution interval of the underage user can be determined according to the predicted age, so that according to different The game account is controlled by the control rules matched by the age distribution interval.
- the age distribution interval can be determined with reference to relevant game rules in specific application scenarios. For example, the age distribution interval can be divided into the first age distribution interval consisting of 0 to 8 years old, and the first age distribution interval consisting of 8 to 16 years old. The second age distribution interval, the third age distribution interval consisting of 16 to 18 years old, etc.
- the account login type when the game account login is detected, the account login type can be determined first, and the user feature data of the game user corresponding to the game account can be obtained according to different feature collection channels under different account login types, wherein the account login type can be Including visitor account login and real-name account login.
- the user feature data may include facial image collection data when the account login type is tourist account login and real-name registration data when the account login type is real-name account login, and further the game can be determined based on the real-name registration data or facial image collection data. User's identity information.
- the following steps may be included: determining the account login type corresponding to the game account, and according to The account login type collects user characteristic data of game users.
- the account login type includes real-name account login or tourist account login, and user characteristic data includes real-name registration data when the account login type is real-name account login or when the account login type is tourist account login. face image collection data; determine the identity information of game users based on real-name registration data or face image collection data.
- the account In view of the tourist account, when the tourist account is logged in, the account is randomly generated, and the account is bound to the physical address of the device used by the player.
- the tourist account enters the game for the first time, it is required to use a portrait for registration verification, and further extract the game user's ID. facial image. Therefore, under the login of the tourist account, when extracting the user characteristic data of the game user corresponding to the game account, the facial image collection data uploaded when the tourist account is logged in can be further determined as the user characteristic data of the game user.
- the predicted age of the game user can be determined by inputting the face image collection data into the pre-trained facial feature analysis model, and then the game user can be determined based on the predicted age.
- Adult users or non-underage users and when the game user is an underage user, determine the identity information of the age distribution interval to which the game user belongs.
- the account when the account logs in to the game for the first time, it will go through the regular real-name authentication, upload the ID card information, and conduct portrait information identification and fingerprint information collection for the real-name account authenticated user, and then the portrait information identification results, fingerprint information collection results and identity Certificate information, etc. are recorded in the database as retained data.
- the real-name account login when collecting the user characteristic data of the game user corresponding to the game account, the real-name registration data (identity certificate information, portrait information recognition results, fingerprint information collection results, etc.) ) as the user characteristic data of the game user.
- the identity information of the game user being an underage user or a non-underage user can be determined by analyzing fingerprint information or identity certificate information.
- the constructed facial feature analysis model can also be used to identify portrait information, determine the age information of the portrait, and further obtain whether the game user is an underage user or a non-underage user, and when the game user is determined to be an underage user, the corresponding The identity information of the age distribution interval to which it belongs.
- the facial feature analysis model can be any one of machine learning models such as support vector machine models, convolutional neural network models, and random forest models.
- the facial feature analysis model Before applying the facial feature analysis model, it is necessary to pre-train the facial feature analysis model based on a large number of facial image samples marked with the age of the user in the facial feature database. By learning the facial contour features of different ages, the age prediction corresponding to the facial image can be obtained. In some implementations, when the predicted age value of the facial feature analysis model and the actual age mark value are less than a preset threshold, that is, when the loss function corresponding to the facial feature analysis model reaches a convergence state, it can be determined that the training of the facial feature analysis model is completed.
- the subject of execution in this embodiment can be a device or device for realizing game anti-addiction control, which can be configured on the server side or client side, can improve the detection accuracy of game studio users, or can be a device that executes game functions or device.
- step 102 if the identity information identifies the game user as the first identity user, the game account is controlled according to the first operation behavior data and the first control rules of the game user generated during the game process.
- the first identity user is an underage user logged in with a tourist account
- the first operational behavior data includes the game user's login status for a first specific period of time, cumulative login time, single recharge amount and/or cumulative recharge amount
- the login status of the first specific time period can be the login status of the game account during the first curfew period.
- Underage users provide game services. Therefore, when it is determined that the first identity user is an underage user logged in with a tourist account, the login status of the game user for the first specific period can be monitored. If the login status of the first specific period is determined to be logged in, It is necessary to use the first control rule to control the game account.
- the game user can be prompted to perform real-name authentication, or the game account can be forced to go offline;
- the overall accumulative results within a time period may include accumulative duration and accumulative recharge amount for different games or the same game corresponding to different accounts.
- the first control rule is the anti-addiction control rule set for minors under the tourist account, such as the first specific time period for restricting login, the first preset duration threshold, the first single preset recharge amount, the first Cumulative preset recharge amount, etc.
- the game behavior of the same underage game user can be monitored from the aspects of game duration, game recharge, etc.
- a facial feature identifier corresponding to the underage user can be generated, and the same game user’s ID can be recorded in the database corresponding to the facial feature identifier.
- the login status of the first specific period, the cumulative login time, the single or cumulative recharge amount based on the login status of the first specific period, it is judged whether the game user logs in during the first specific period, if it is determined that the game user logs in during the first specific period, and/or When the cumulative login time is greater than the first preset time threshold corresponding to the first control rule, the game user is prompted to perform real-name authentication. If the game user passes the real-name authentication, the second control rule under the real-name account login is further used to continue the game account.
- a countdown time window can be generated on the game page in advance, and the game account can be forced to go offline when the countdown time window ends, so that the game user can Real-name authentication is performed during the countdown time, or when real-name authentication is not performed, the game data can be saved in time to create a good customer experience.
- the countdown duration displayed in the countdown window may be determined according to an actual application scenario, for example, it may be 120 seconds.
- first specific time periods, first preset duration thresholds, first single preset recharge amount, and first accumulated preset amount can be determined according to different age distribution intervals of minors.
- the recharge amount can be used as a statistical node on a daily, weekly or monthly basis. For example, you can set the first specific time period from 21:00 to 9:00 the next day, set the first preset duration threshold for each day on weekdays to 1.5 hours, and set the first preset time threshold for each day on legal holidays.
- the duration threshold is 2 hours; it can be used as a statistical node every month, and the first single preset recharge amount and the first accumulated preset recharge amount of each month under the age distribution range of 0 to 8 years old are set to 0.
- the first single preset recharge amount per month is 20 yuan and the first accumulated preset recharge amount is 100 yuan.
- the first single preset recharge amount of ’s is 50 yuan and the first cumulative preset recharge amount is 200 yuan.
- the longitude time (such as Beijing time) of the current moment can be extracted, and the longitude time can be matched with the legal holiday system to determine whether the current moment is a working day or a legal holiday.
- the game device system time can be directly determined as the longitude time at the current moment, and a time acquisition request can also be sent to a third-party website or server to further determine the longitude time at the current moment. It should be noted that, in order to ensure the accuracy of time extraction, the extraction and verification of longitude time may also include other optional methods, which are not specifically limited here.
- step 103 if the identity information identifies the game user as the second identity user, control the game account according to the second operation behavior data and the second control rules of the game user generated during the game process.
- the second identity user is an underage user logged in with a real-name account
- the second operation behavior data includes the trigger operation data generated by the game user on the login device when performing the game operation and the game user's second specific time period of login Status, cumulative login time, single recharge amount and/or cumulative recharge amount, trigger operation data may include operation data generated on the login device such as the range of operating the joystick of the gamepad, the frequency of clicking the screen, the click position of the corresponding function, and the game
- the recharge operation data (such as recharge device, recharge channel, recharge amount, etc.) generated when the user performs the game recharge operation, and the deflection displacement, angle, height and other parameter data of the login device when the game user performs continuous game operations
- the login status of the second specific time period corresponds to the login status of the game account during the second curfew period.
- the second curfew period can be set from 22:00 to 8:00 the next day; the second control rule is real-name accounts
- the anti-addiction control rules set for minors may include, for example, a second specific time period for restricting login, a second preset duration threshold, a second single preset recharge amount, a second cumulative preset recharge amount, etc.
- the cumulative login time, single or cumulative recharge amount of the game user can be recorded in the minor’s operation database; based on the second specific time period
- the login status judges whether the game user logs in during the second specific time period, and if so, the game account is forced to go offline; when the accumulated login time is longer than the second preset duration threshold corresponding to the second control rule, the game user is forced to log off Online processing; when the single recharge amount is greater than the second single preset recharge amount corresponding to the second control rule and/or the accumulated recharge amount is greater than the second accumulated preset recharge amount corresponding to the second control rule, limit the game user Recharge processing, and display recharge failed.
- a countdown time window can be generated on the game page in advance, and the game account can be forced to go offline when the countdown time window ends, so that the game user can Save game data in time to create a good customer experience.
- the countdown duration displayed in the countdown window may be determined according to an actual application scenario, for example, it may be 60 seconds.
- the recharge amount can be used as a statistical node on a daily or monthly basis. For example, you can set the second specific time period from 22:00 to 8:00 the next day, set the second preset duration threshold for every day on weekdays to 2 hours, and set the second preset time threshold for every day on legal holidays.
- the duration threshold is 3 hours; it can be used as a statistical node every month, and the second single preset recharge amount and the second cumulative preset recharge amount of each month under the age distribution range of 0 to 8 years old are set to 0.
- the second single preset recharge amount per month is 50 yuan and the second cumulative preset recharge amount is 200 yuan, and the age distribution range of 16 to 18 years old is set for the next month
- the second single preset recharge amount is 100 yuan and the second cumulative preset recharge amount is 400 yuan.
- the first control rules under tourist accounts should be stricter than the second control rules under real-name accounts. rule.
- the first specific period of time, the first preset duration threshold, the first single preset recharge amount, and the first cumulative preset recharge amount under the first control rule can be set to be less than the second control rule
- the first control rule can be set The first specific time period is from 21:00 to 9:00 the next day, the first preset duration threshold is 1.5 hours on weekdays, the first single preset recharge amount per month is 20 yuan and the first cumulative preset Let the recharge amount be 100 yuan.
- the second specific time period under the second control rule can be set from 22:00 to 10:00 the next day, the second preset duration threshold on weekdays is 2 hours, and the second single preset per month
- the recharge amount is 50 yuan and the second accumulated preset recharge amount is 200 yuan.
- a game account control method when a game account login is detected, the user characteristic data of the game user can be collected based on the account login type, the identity information of the game user can be verified according to the user characteristic data, and
- the game account can be controlled according to the first operation behavior data and the first control rules of the game user generated during the game process; correspondingly, in When the first identity information identifies the user identity of the game user as an underage user logged in with a real-name account, the game account can be controlled according to the second operation behavior data and the second control rules of the game user generated during the game process.
- minors can participate in the game more reasonably, effectively reduce the risk of game addiction, protect minor players to the maximum extent, and prevent minor players from indulging in games.
- this embodiment also provides another method for controlling a game account, as shown in Figure 2, the method may include the following steps 201, 202 and 203.
- step 201 when it is detected that the game account is logged in, the user characteristic data of the game user corresponding to the game account is obtained, and the identity information of the game user is determined according to the user characteristic data.
- step 101 of the embodiment The specific implementation manner of this embodiment is the same as step 101 of the embodiment, and will not be repeated here. If it is determined based on step 201 of the embodiment that the account login type is game account login and the identity information of the game user is an underage user, the processes shown in steps 202 to 203 of the embodiment can be further executed.
- the account login type is game account login and the identity information of the game user is an adult user
- the face image data of the game user can be collected according to the preset face image collection cycle or a specific collection time point, and the The face image data is compared with the face image data uploaded by the tourist account when logging in for the first time, so as to realize the review of the identity of the game user.
- the predicted age of the current game user can be identified according to the facial feature analysis model. Once the current game user is judged to be an underage user based on the predicted age, the processes shown in 202 to 203 can be further executed.
- the preset facial image collection period can be set according to the actual application scenario, for example, it can be 30 minutes, and the specific collection time point can be set to 24:00 or other time points when minors are prohibited from playing games.
- the face image data of the game user can be automatically collected in the game operation execution state under the condition of obtaining the user's authorization.
- the video image data can be collected without interfering with the current game user's operation, and the game user's identity can be rechecked based on the video image data; in addition, the data collection window can also pop up on the current game device, and the game operation
- the execution state is temporarily adjusted to the operation lock state, prompting the current game user to actively upload face image data by clicking the image collection window, and then realize the collection of video image data.
- a data collection window may pop up when the game enters an intermission period of operation.
- the intermission period may include a waiting period for the login interface, a waiting period for starting a game, and a skill recovery period. If after the above-mentioned identity information review, it is determined that the current game user is the adult account user corresponding to the second identity user, there is no need to further implement game behavior control on the game user. At this time, if the video image data is collected through pop-up data window, and lock the operating status, then the adult user can unlock the account operating status by re-entering the pre-stored fingerprint data, face data and/or other identity feature data, and then continue the game.
- step 202 if the first identity user is an underage user logged in with a tourist account, the first operation behavior data generated by the game user during the game process is recorded, and the first operation behavior data includes the game user’s first specific time period login Status, cumulative login time, single recharge amount and/or cumulative recharge amount.
- each underage user in order to prevent underage users from obtaining longer game time by switching between different games and different tourist accounts under the same game, for each underage user’s cumulative game duration, cumulative The recharge amount and the like can also be the overall accumulated results of the underage user in different games or different tourist accounts corresponding to the same game.
- the facial image collected by each underage user can be used to generate a corresponding facial feature identification, and then based on the facial feature identification, the underage user can be counted on different games or on different accounts corresponding to the same game. All the operating behavior data of the game, such as the accumulated game time, the accumulated recharge amount, etc., and then based on the above statistical operating behavior data, the anti-addiction control of underage users for specific games or all games is realized.
- step 203 based on the login status of the first specific time period, it is judged whether the game user logs in during the first specific time period, and/or whether the cumulative login time reaches the first preset time length threshold in the first control rule, and/or the judgment Whether the recharge amount reaches the first single preset recharge amount in the first control rule, and/or judges whether the accumulative recharge amount reaches the first accumulated preset recharge amount in the first control rule, and if so, prompts the game user to perform real-name certified.
- the tourist account has stricter control over the account of minors. specific period of time.
- the login time allowed for minors to log in is less than the allowed login time under the second control rule, and the single recharge amount and cumulative recharge amount allowed under the first control rule for minors to recharge are less than those under the second control rule.
- the single preset recharge amount and the accumulated preset recharge amount are less than those under the second control rule.
- the second control rule under the real-name account can be further used to continue to control the account of the game user until the guest account and The statistical results of the operation behavior data corresponding to the upgraded real-name account do not comply with the second control rule, and the game user is further forced to go offline.
- the game user's first operation behavior data stored in the tourist account it can be determined whether to include the historical operation behavior data corresponding to the real-name account in the operation database corresponding to the real-name account in response to the operation user's selection instruction.
- a countdown time window can be generated on the game page in advance, and the game account can be forced to go offline when the countdown time window ends, so that the game user can Perform real-name authentication or save game data within the countdown time.
- the second control rule can be used instead to continue to control the game account.
- the first specific time period is set from 21:00 every day to 9:00 the next day, then When it is determined that the first identity user is an underage user logged in with a tourist account, the login status of the game user from 21:00 to 9:00 the next day can be monitored;
- the rules implement the control of the game account, for example, the game user can be prompted to perform real-name authentication, or the game account can be forced to go offline.
- a countdown time window can be generated on the game page in advance, and the game account can be forced to go offline when the countdown time window ends, so that the game user can log out during the countdown time.
- Real-name authentication is carried out within.
- the second control rule can be used instead to continue to control the game account.
- it can be further determined whether the current login time of the game user is within the second specific time period (such as 22:00 every day to 8:00 the next day) set for the curfew time in the second control rule.
- the second control rule is used to control the game account. For example, a countdown time window can be generated, And at the end of the countdown time window, the game account will be forced to go offline.
- the first specific time period can be set from 21:00 to 9:00 the next day, and the second specific time period is from 22:00 to 8:00 the next day. If it is detected that the game user logs in at 21:30 When playing games, and the user is an underage user logged in with a game account, the game user can be directly refused to log in according to the first control rule, and a prompt message that the current moment is a curfew period can be output.
- a countdown time window (such as 120 seconds) can also be generated so that the game user can perform real-name authentication within the countdown time. At the end of the countdown time window, the game account will be forced to go offline.
- the second control rule can be used to continue to control the game account.
- the second specific time period (22:00) has not yet been reached. 8 on the next day, there is no need to control the game user's game account, that is, if the accumulated login time of the game user does not reach the second preset duration threshold, the game user can continue the game until the second preset time threshold.
- a countdown time window (such as 60 seconds) is generated so that the game user can save the operation data during the countdown time, and in the countdown time At the end of the time window, the game account will be forced to go offline.
- the account performs game operations, based on the first control rule, the first preset duration threshold, the first single preset recharge amount, and the first cumulative preset recharge amount can be set for the tourist account corresponding to the underage user.
- the cumulative login time reaches the first preset time threshold, and/or the upper limit of a single recharge amount reaches the first single preset recharge amount and/or the cumulative recharge amount reaches the first cumulative preset recharge amount, the game user is further prompted Perform real-name authentication.
- the game user refuses real-name authentication or fails to perform real-name authentication within a preset period of time, you can further force logout; if the game user unlocks the account login function through real-name authentication, the account authority will be converted from a tourist account to a real-name account , and the corresponding first control rule is also replaced with the second control rule under the real-name account.
- the first preset duration threshold under the first control rule is set to 1.5 hours
- the second A single preset recharge amount is 20 yuan
- the first cumulative preset recharge amount is 100 yuan.
- the second preset duration threshold under the second control rule is set to 2 hours
- the second single The default recharge amount is 50 yuan and the second cumulative preset recharge amount is 200 yuan.
- a countdown time window can be further generated at this time, and the game user will be prompted to perform real-name authentication. If the game user refuses the real-name authentication or does not complete the real-name authentication before the end of the countdown time window, he can further force logout; on the contrary, if the game user completes the real-name authentication based on the real-name authentication prompt, he can further use the second control rule under the real-name account Continue to realize the account control of the game user, and default the operation behavior data of the game user under the tourist account as the operation behavior data of the current real-name account, that is, the cumulative login time has reached 1.5 hours, so it is still possible to follow the second control rule at this time.
- the cumulative login time reaches 2 hours, which is equal to the second preset duration threshold under the second control rule, a countdown time window is generated so that game users can save game data in time. After the window ends, the game user is forced to go offline.
- the single recharge amount and cumulative recharge amount under the tourist account are also transferred from the first control rule to the second control rule for account control until the single recharge amount reaches the second single preset value under the second control rule.
- the recharge amount, and/or the accumulative recharge amount reaches the second cumulative preset recharge amount under the second control rule, the game user is restricted to recharge.
- the guest account will be backed up. If the game user wants to retrieve the original account data, he needs to provide the game user's real name information and Real-name authentication for portrait data, etc.
- the first control rule can be used to realize the effective control of recharge control and login time length. In the case of retaining the visitor mode, Avoid the situation where minors play for a long time and recharge a large amount of money through the tourist mode, and better protect minors.
- another game account control method is provided, and the method may include the following steps 301 , 302 and 303 .
- step 301 when it is detected that the game account is logged in, the user characteristic data of the game user corresponding to the game account is obtained, and the identity information of the game user is determined according to the user characteristic data.
- step 101 of the embodiment The specific implementation manner of this embodiment is the same as step 101 of the embodiment, and will not be repeated here. If it is determined based on step 301 of the embodiment that the account login type is real-name account login and the identity information of the game user is an underage user, the processes shown in steps 302 to 303 of the embodiment can be further executed.
- step 301 of the embodiment determines whether the account login type is real-name account login and the identity information of the game user is an adult user, in order to prevent underage users from performing game operations by logging into real-name accounts registered by other adult users, as an optional implementation
- the account login type is real-name account login, and the identity information of the game user is an adult user, combined with the identity review and verification triggered by the conditions, it can be determined whether the trigger event has occurred, and the trigger event has been determined based on the operation behavior data.
- determine the current game user corresponding to the game account determine the current game user corresponding to the game account, and realize the identity review of the game user.
- the method of biometric verification can be used.
- the face image data of the current game user can be collected by the face image acquisition device by starting the portrait verification function, and the The collected face image data is input into the pre-trained facial feature analysis model to determine whether the facial contour features match the facial contour features of the real-name registered user corresponding to the real-name account. If they do not match, the current game user and the real-name account can be determined. If the corresponding real-name registered users are different, the predicted age of the current game user can be further determined using the facial feature analysis model, and the processes shown in 302 to 303 can be further executed when the current game user is judged to be an underage user based on the predicted age.
- the following four optional implementation modes may be included when performing the above judgment based on the operation behavior data to determine the occurrence of a trigger event:
- the first optional implementation mode collect the operation data generated by the game user on the login device when performing the game operation, such as the amplitude of operating the joystick of the game handle, the frequency of clicking the screen, the click position of the corresponding function, etc.
- the characteristics of the operation data can be compared with the historical operation behavior data generated for the login device recorded and stored in the operation database by the real-name game user corresponding to the real-name account to determine whether the operation data matches the operation habits of the game user, If the features match, it can be determined that no trigger event has occurred; if it is determined that there is a feature difference, it can be determined that a trigger event has occurred, or if it is determined that there is a feature difference and the cumulative recognition times of the feature difference is greater than a preset threshold, it can be determined that a trigger event has occurred.
- the preset threshold value can be set according to specific application scenarios; the operation database is to pre-extract the operation behavior data of the real-name game user when it is determined that the real-name game user corresponding to the real-name account is performing the game operation, and through the integrated operation Behavior data is created and generated.
- real-name registration data of real-name game users can be stored, as well as historical operation behavior data in various dimensions recorded by real-name game users when they log in to real-name accounts at historical moments.
- the data dimension corresponding to the historical operation behavior data can be the customary trigger operation data generated for the login device, such as the average amplitude of the joystick, the average screen click frequency, and the corresponding function click location area.
- the frequency of the screen frequency is also different from the screen click frequency when the same control operation is performed, or when the game operation is performed, there are obvious differences in the deflection displacement, angle, height, etc. of the login device.
- the feature difference when determining the feature difference, it can be determined that a trigger event occurs; as another optional implementation, the cumulative number of feature differences can also be recorded, and when the cumulative number of feature differences is greater than the preset threshold (for example, 5 times), it is determined that the current game user and the current real-name account trigger the operation data generated by the login device to be frequently and repeatedly significantly different, which can indicate that there is a risk that the current game user is not the real-name game user corresponding to the real-name account, so it can be determined that the real-name account has occurred. trigger event.
- the preset threshold for example, 5 times
- the second optional implementation mode collect the recharge operation data (such as recharge device, recharge channel, recharge amount, etc.) generated when the game user performs the game recharge operation; The cumulative game time on the current game software and other game software within a period (such as 24 hours).
- the recharge operation data can be compared with the historical operation behavior data stored in the operation database for the recharge operation records of the real-name game user corresponding to the real-name account.
- a trigger event occurs.
- the cumulative game duration of the current game user can also be compared with the historical average game duration recorded in the operation database by the real-name game user under the real-name account.
- the preset duration threshold can be set based on the historical average game duration If the preset duration threshold is set as the median of the historical average game duration, when it is determined that the cumulative game duration of the current game user reaches the median of the historical average game duration, a trigger event can be determined to occur.
- the third optional method In view of the fact that during the continuous operation of the game, there will be no instantaneous large displacement or angle change of the login device, and the large displacement or angle change may be caused by changing the game caused by the user. Therefore, as an optional implementation, it is possible to monitor the deflection displacement, angle, height and other parameter data of the login device when the game user performs continuous game operations, and record them in the operation database with the real-name game users under the real-name account. The average deflection displacement, average angle, and average height of the login device caused by the execution of the game operation are numerically compared. If the numerical comparison shows that the login device has a large displacement or angle change in an instant, it can be determined that a trigger event has occurred.
- the fourth optional mode Corresponding to the first optional implementation mode, the second optional implementation mode and the third optional mode, if the real-name account corresponds to the real-name game user, there is no history stored in the operation database Operational behavior data, in view of the fact that it is impossible to determine whether a trigger event occurs based on the comparison of historical operational behavior data. Therefore, as another optional implementation manner, by setting a preset face image collection cycle, the preset face image collection cycle corresponds to the face image data collection frequency. In some implementations, it may be determined that a trigger event occurs when it is determined that the accumulated game time of the game user reaches the face image collection period.
- a data pop-up window can be generated on the game page in a predetermined period or randomly, and the question items matching the identity information of the real-name game user are displayed in the data pop-up window, and the current game of the game is locked before the current game user answers the question item
- the operation is to check the identity of the current game user based on the answer result of the current game user to the question item, and when it is determined that the answer result of the current game user does not match the correct answer to the question item, it is determined that a trigger event occurs.
- the present invention can realize effective identity verification for game users in the process of game account login and game operation from multiple data dimensions , through the double verification method of login verification and review verification, the identity verification of game users can be strengthened, thereby preventing underage users from playing for a long time and recharging a large amount of money by changing other people's accounts or by changing the tourist mode, and by playing games flexibly
- the control of the duration and recharge data realizes the effective anti-addiction control of the game.
- step 302 if it is determined that a trigger event occurs according to the second operation behavior data during the second operation behavior collection process of the game user, the current game user corresponding to the game account is determined.
- the second operational behavior data generated by the game user during the game process can be further collected, and The game account is controlled according to the second control rule.
- the second operation behavior data may include the game user's login status for a second specific period, cumulative login time, single recharge amount and/or cumulative recharge amount.
- the second specific time period, the second preset duration threshold and the second predetermined duration threshold can be set based on the second control rule.
- a single preset recharge amount, and a second cumulative preset recharge amount can be judged based on the login status of the second specific period whether the game user logs in during the second specific period, and if so, the game account is forced to go offline; when the accumulated login time of the game user reaches the second control rule and/or the upper limit of the single recharge amount of the game user reaches the second single preset recharge amount under the second control rule, and/or the cumulative recharge amount of the game user reaches the second control When the second accumulative preset recharge amount under the rules, the game user will be forced to go offline.
- a countdown time window can be generated on the game page, and the game account can be forced to go offline when the countdown time window ends , so that game users can save game data in a timely manner, thereby creating a good customer experience.
- the steps of the embodiment 302 may include: comparing the first recharge operation data in the game user's second operation behavior data with the historical recharge operation data for recharge operations in the game user's corresponding operation database;
- the recharge source is different from the recharge source in the historical recharge operation data, and the first recharge source does not have the first relationship with the game user, the game account will be recharged according to the second operation behavior data and the second control rule excluding the first recharge operation data. control.
- the first relationship can be a preset binding relationship (for example, it can be a relative/close relative relationship, a friend relationship, etc.)
- the game user when the first recharge source (recharge user ) and the game user have the first relationship (such as being a family member of the game user), the game user’s recharge data can be accumulated and recorded in the accumulated recharge data under the first relationship, and further can be based on the second operation behavior data and the second
- the control rules implement the control of the game account; on the contrary, when the first recharge source (recharge user) does not have the first relationship with the game user (such as not being a family member of the game user), the corresponding recharge amount will not be recorded in the accumulated recharge Among the data, the control of the game account can be further performed according to the second operation behavior data and the second control rule excluding the first recharge operation data.
- the second operation behavior data can also include the trigger operation data generated by the game user on the login device when performing the game operation, and the trigger operation data can include, for example, the magnitude of the joystick
- the operation data generated by the login device such as the frequency of clicking on the screen, the click position of the corresponding function, and the recharge operation data generated when the game user performs the game recharge operation (such as recharge device, recharge channel, recharge amount, etc.), and the game user performs continuous
- the deflection displacement, angle, height and other parameter data of the landing device are triggered.
- the trigger operation data after the trigger operation data is detected, it may be further determined based on the trigger operation data whether a trigger event occurs, and when it is determined that the trigger event occurs, the current game user corresponding to the game account is further determined.
- the following steps may be included: comparing the characteristics of the second operation behavior data of the game user with the historical operation behavior data triggered by the login device in the corresponding operation database of the game user; If there is a characteristic difference, it is determined that a trigger event occurs.
- the following steps may be included: performing identity verification on the game account; determining the current game user according to the corresponding identity verification information, in some examples , the identity verification information may include face image information, fingerprint information, and question answer information.
- the specific determination method of the trigger event, and the specific determination method of the current game user corresponding to the game account when the trigger event occurs are similar to the processing in step 301 of the embodiment, and details can be found in step 301. The process will not be repeated here.
- step 303 if the current game user is different from the game user, the second operation behavior data of the current game user is obtained, and the game account is controlled according to the second operation behavior data of the current game user and the second control rules.
- the accumulation of the original game user's operation behavior data can be stopped, and further based on the current game user
- the second operation behavior data and the second control rule start the game control process for the current game user. If the current game user has existing operation behavior data, then continue to accumulate the second operation behavior data into the existing operation behavior data; if the current game user does not have existing operation behavior data, it is necessary to create new operation behavior data for the current game user , and perform data accumulation on the basis of newly created operation behavior data.
- the accumulated online time and accumulated recharge amount for each underage user are the overall accumulated online duration and recharge amount of the underage user in a certain preset time period (such as 24 hours) when logging in to the game.
- a certain preset time period such as 24 hours
- the single preset recharge amount and the cumulative preset recharge amount are 50 and 200 respectively.
- the original game user is an underage user A
- the operation behavior data a generated within the preset time period will be accumulated in the operation database corresponding to the underage user A, and the accumulated login time in the operation behavior data a reaches 2 hours , the underage user A will be further forced to go offline; when the single recharge amount in the operation behavior data a reaches 50 yuan, and/or the accumulated recharge amount in the operation behavior data a reaches 200 yuan, the underage user A will be forced to go offline.
- Adult user A performs limited recharge processing.
- the operation behavior data a has not triggered the second control rule (the cumulative login time in the operation behavior data a has not reached 2 hours, and the single recharge amount in the operation behavior data a has not reached 50 yuan, and the accumulated login time in the operation behavior data a When the recharge amount does not reach 200 yuan), the game user changes to underage user B, then the operation behavior data a stops accumulating at this time, and the statistical operation behavior data a is stored in the operation database corresponding to underage user A , so that when the underage user A logs into the game again within the preset time period, the operation behavior data is accumulated on the basis of the operation behavior data a stored in the operation database until the second control rule is triggered.
- the control of game login is realized, so as to truly operate the user's game time instead of the same account
- the login time is used to judge the duration rules, and the game duration and recharge data can be flexibly controlled, which can more reasonably restrict minors from playing games and reduce the risk of game addiction.
- the method for controlling the game account may further include: receiving a game user's creation instruction on the first game task, and determining the first estimated completion time of the first game task; Operating behavior data and the first control rule, or calculate the remaining login time of the game user based on the second operating behavior data and the second control rule of the game user; based on the first estimated completion time and the remaining login time, the The first game task is adjusted to the second game task, so that the second estimated completion time of the second game task is less than or equal to the remaining login time.
- the second game task is completed by deleting It is obtained by subtracting the task node in the first game task. In other words, if the first estimated completion time exceeds the remaining login time, the first game task is adjusted to the second game task; otherwise, the first game task is generated in response to the creation instruction.
- the cumulative login duration of the game user when performing anti-addiction processing for underage game users based on the first control rule or the second control rule, in view of the set online duration, when the cumulative login duration of the game user reaches the preset duration threshold , it will be forced to go offline. At this time, when the game user has an unfinished game process, if the game user is forced to go offline, the user experience will be poor. In this regard, when the cumulative login time of the game user has not reached the preset time threshold, the new game task selected by the user can be estimated to be executed.
- the user can be reminded of the time for anti-addiction processing according to the time length, or dynamically adjust the plot direction, such as not jumping to the copy entry corresponding to the new game task, etc.
- the preset duration threshold is 2 hours
- the user's selection instruction for a new game task with an estimated duration of 1 hour is received at this time, as an optional
- the system can directly reject the task request of the game user to perform the new game task, and output the reason for rejecting the task request, such as the imminent arrival of the anti-addiction processing time, etc.
- the plot of the first game task can be dynamically adjusted to obtain the second game task by deleting task nodes, and the plot of the second game task can be limited within 0.5 hours, so that game users Complete the processing of the second game task within the remaining login time.
- the method for controlling the game account may further include: after the forced offline control of the game account is performed based on the first control rule or the second control rule, generating a list of associated task recommendations for the game user, The game user can select the target related task to be executed through the related task recommendation list, and obtain the game attribute bonus based on the task completion status of the target related task.
- the associated recommendation task may include a physical motion action associated with the current game action.
- a list of physical motion actions associated with the current game action is generated for the game user, so that the game user can select the target physical motion action to be executed through the physical motion action list, and obtain the action completion status based on the target physical motion action Game incentives.
- a game user has a smart hardware bracelet associated with a virtual character in a game, and can wear the bracelet or a watch to perform designated sports (designated actions of the virtual character).
- the game anti-addiction process When the game anti-addiction process is started, it will prompt and guide the game user to carry out sports-related hardware activities, and technically, synchronize the increase of the statistical value of the smart hardware associated with the virtual character, synchronize in the game server, and further convert Incentives for the game.
- it can also guide users and players to continue to perform healthier physical exercises in IP immersion, which is more beneficial to underage users and can increase game users' interest in the game. The current game of interest.
- the association recommendation task may include the loading task of an association application program, and the association application program is an application program associated with the current game.
- the following steps may be included: After the rule or the second control rule executes the forced offline control of the game account, the recommended loading window of the associated application is output, so that the game user can load the associated application matching the current game through the recommended loading window, and when the associated application is loaded Get game incentives from time to time.
- the game application can load other IP related to the game such as learning, entertainment,
- IP related to the game such as learning, entertainment,
- the entrance of variety shows and social related applications (for example: dating community applications under the same IP role, learning virtual escort applications related to IP roles, etc.), can further directly jump or guide the installation.
- virtual rewards such as character attribute values, virtual props, etc.
- the associated recommended task may include an associated program task, which is a program task associated with the current game set in the game anti-addiction system.
- the following steps may be included: After the forced offline control of the game account is executed based on the first control rule or the second control rule, an associated program task list matching the current game is generated for the game user; so that the game user can select the target associated program to be executed through the associated program task list tasks, and obtain game incentives (such as character attribute values, virtual props, etc.) based on the task completion of the associated program tasks.
- game incentives such as character attribute values, virtual props, etc.
- task items can be set in the game anti-addiction system (for example: guide the use of healthy exercise applications), and when the viewing time of the associated application reaches the preset duration or the level task set corresponding to the associated application is completed, a user can be given The corresponding virtual rewards in the game (such as character attribute values, virtual props, etc.).
- the game user may further adjust the first control rule or the second control rule within a preset adjustment range according to the game incentive.
- the preset duration threshold of the game user can be appropriately extended according to the game incentives (such as for virtual rewards greater than the preset reward value) Users can extend the preset duration threshold from 2 hours to 2.5 hours), and for 0.5 hours beyond the healthy game duration, correspondingly, the game incentives obtained in the aforementioned healthy game duration will be deducted or reduced.
- the method for controlling the game account may further include: if it is determined that the current game user is an underage user and the real-name authentication information is abnormal, then according to The first control rule executes the control of the game account of the current game user, or registers the current game user as a blacklist user prohibited from logging in the game account.
- voice recording recognition and camera face recognition can be used for comprehensive judgment. , confirm that you are not an adult player, and start the anti-addiction operation process for minors.
- the game company will directly include this type of player users into the blacklist to prevent such users from impersonating again or borrowing ID cards for real-name authentication.
- users who borrow other people's identities and/or users whose identities are borrowed can be included in the strict verification list, and their accounts are subject to stricter identity review (minor users can implement this policy until they become adults. ), or destroy their accounts.
- the type of account login can be determined based on the identification result of the real name information.
- the age of the game user can be further detected according to the corresponding age requirements of the game.
- a prompt message can be further output and the user is prohibited from logging into the game. To prevent children of inappropriate age from accessing the game.
- the game user when it is determined that the game user is a minor of the appropriate age, it is necessary to activate the anti-addiction control mode, and to prevent the minor from excessively indulging in the game through time control and recharge control.
- a game account login when a game account login is detected, it can first be determined whether the current game supports guest mode login, and if not, the game user can be informed that there is currently no guest mode and prompted to perform real-name authentication; if it is determined that the current game supports guest mode login, Then, based on the tourist account, the corresponding tourist mode scene can be output, and the duration control and recharge control can be further performed under the tourist account login, so as to prevent minors from excessively indulging in the game.
- the online status of game users will be checked through continuous automatic testing or regularly.
- the continuous online time reaches the upper limit of the login time, you can further prompt that the time limit has been reached, record the physical address of the login device and the corresponding tourist account, and terminate the login permission of the tourist account, requiring the player to perform real-name authentication.
- the player can pass the real-name
- the authentication unlocks the account login function, and the account authority is converted from a tourist account to an ordinary account.
- the tourist account can be set to prohibit recharge or allow recharge according to the game rules. When the tourist account prohibits recharge, if a recharge request is received, the recharge result of recharge failure can be further output, and the tourist can be notified.
- the minors when implementing anti-addiction control based on the length of the game, can be divided into age distribution intervals according to relevant regulations (for example, divided into 0-8 years old, 8-16 years old, 16-18 years old). Minors in each age distribution range can set the same or different game limit time, and then by calculating the single continuous online time or cumulative login time of underage users, the corresponding age distribution can be reached in the continuous online time or cumulative login time When the game limit time set by the interval is long, the game users will be forced to go offline, so as to realize the anti-addiction control of underage users.
- relevant regulations for example, divided into 0-8 years old, 8-16 years old, 16-18 years old.
- the age distribution intervals of minors can also be divided (for example, divided into 0-8 years old, 8-16 years old, 16-18 years old), for each age distribution Minors in the interval can set the same or different game limit recharge amount, for example, game users under the age of 8 can be set to be unable to make krypton gold, minors over the age of 8 but under the age of 16, the single recharge amount cannot exceed 50 yuan, the cumulative monthly recharge amount cannot exceed 200 yuan, and for minors over 16 years old, the single recharge amount cannot exceed 100 yuan, and the cumulative monthly recharge amount cannot exceed 400 yuan.
- the game user is forced to Go offline or restrict top-up processing to achieve anti-addiction control for underage users.
- the technical solution in the present invention can not only be applied to the game anti-addiction control scene for minors, but also can be further applied to illegal and unreasonable game operations such as charging and playing by others during the game process.
- the detection scene can further reduce the economic loss caused by proxy charging and other people's proxy play, and then create a good gaming experience for game users.
- a game account control device is also provided, as shown in Figure 4, the device may include:
- the first determination module 41 is used to obtain the user characteristic data of the game user corresponding to the game account when it is detected that the game account is logged in, and determine the identity information of the game user according to the user characteristic data;
- the first execution module 42 is used to control the game account according to the first operation behavior data and the first control rules of the game user generated during the game process if the identity information identifies the game user as the first identity user;
- the second execution module 43 is configured to control the game account according to the second operation behavior data and the second control rules of the game user generated during the game process if the identity information identifies the game user as the second identity user.
- the first execution module 42 can be used to record the first operation behavior data generated by the game user during the game process, the first operation behavior data It may include the game user's first specific time period login status, cumulative login time, single recharge amount and/or cumulative recharge amount; based on the first specific time period login status, it is judged whether the game user logs in during the first specific time period, and/or the cumulative Whether the login time reaches the first preset duration threshold in the first control rule, and/or judge whether the single recharge amount reaches the first single preset recharge amount in the first control rule, and/or judge whether the accumulated recharge amount is The first accumulative preset recharge amount in the first control rule is reached; if so, the game user is prompted to perform real-name authentication.
- the second operation behavior data may include the trigger operation data generated by the game user on the login device when performing game operations and the game user's second
- the login status of a specific time period, the cumulative login time, the single recharge amount and/or the cumulative recharge amount, as shown in Figure 5, the control device of the game account may also include:
- the second determination module 44 is used to determine the current game user corresponding to the game account if it is judged that a trigger event occurs according to the second operation behavior data during the second operation behavior collection process of the game user;
- the third execution module 45 is used to obtain the second operation behavior data of the current game user if the current game user is different from the game user, and execute the game account according to the second operation behavior data and the second control rules of the current game user control.
- control device of the game account may also include:
- the comparison module 46 is used to compare the characteristics of the second operation behavior data of the game user with the historical operation behavior data triggered by the login device in the corresponding operation database of the game user;
- the judging module 47 is configured to judge that a trigger event occurs if there is a characteristic difference.
- the second operation behavior data may include the game user’s recharge operation data
- the second execution module 43 may be used to convert the game user’s second Compare the first recharge operation data in the operation behavior data with the historical recharge operation data in the game user’s corresponding operation database for recharge operations; different, and the first recharge source does not have the first relationship with the game user, the game account is controlled according to the second operation behavior data and the second control rule excluding the first recharge operation data.
- control device of the game account may also include:
- the first generation module 48 is used to generate a countdown time window before performing the forced offline control of the game account based on the first control rule or the second control rule, and execute the forced offline of the game account when the countdown time window ends. deal with.
- control device of the game account may also include:
- the third determination module 49 is used to receive the creation instruction of the game user about the first game task, and determine the first estimated completion time of the first game task;
- Calculation module 410 for calculating the remaining login time of the game user based on the first operation behavior data and the first control rule of the game user, or based on the second operation behavior data and the second control rule of the game user;
- a judging module 411 configured to judge whether the first estimated completion duration is greater than the remaining login duration
- An adjustment module 412 configured to adjust the first game task to a second game task based on the first estimated completion time and the remaining login time, so that the second estimated completion time of the second game task is less than or equal to the remaining login time, wherein , the second game task is obtained by deleting the task nodes in the first game task;
- the second generation module 413 is configured to generate the first game task in response to the creation instruction if the first estimated completion time is less than or equal to the remaining login time.
- control device of the game account may also include:
- the third generating module 414 is configured to generate an associated task recommendation list for the game user after the forced offline control of the game account is performed based on the first control rule or the second control rule, so that the game user can select the associated task recommendation list through the associated task recommendation list.
- the executed goals are associated with tasks, and game incentives are obtained based on the task completion status of the goal-associated tasks.
- the various component embodiments of the present invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof.
- a microprocessor or a digital signal processor (DSP) can be used in practice to realize some or all functions of some or all components in the game account control device according to the embodiment of the present invention.
- the present invention can also be implemented as programs/instructions (eg, computer programs/instructions and computer program products) of devices or means for performing part or all of the methods described herein.
- Such programs/instructions for implementing the present invention may be stored on a computer-readable medium, or may exist in the form of one or more signals, such signals may be downloaded from an Internet website, or provided on a carrier signal, or in any form Available in other formats.
- a computer-readable medium is also provided, on which a computer program is stored, and when the computer program is executed by a processor, the above-mentioned processes as shown in Figures 1 to 3 are implemented.
- Computer-readable media including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information.
- Information may be computer readable instructions, data structures, modules of a program, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Flash memory or other memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic cassettes, disk storage, quantum memory, graphene-based storage media or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices.
- PRAM phase change memory
- SRAM static random access memory
- DRAM dynamic random access memory
- RAM random access memory
- ROM read only memory
- EEPROM Electrically Er
- FIG. 6 schematically shows a computer device that can implement the game account control method according to the present invention
- the computer device includes a processor 610 and a computer-readable medium in the form of a memory 620 .
- the memory 620 is one example of a computer readable medium having a storage space 630 for storing a computer program 631 .
- the computer program 631 is executed by the processor 610, various steps in the game account control method described above can be realized.
- Fig. 7 schematically shows a block diagram of a computer program product implementing the method according to the invention.
- the computer program product includes a computer program 710.
- the computer program 710 is executed by a processor such as the processor 610 shown in FIG. 6, the various steps in the game account control method described above can be realized .
- the present invention can be realized by means of software plus a necessary general-purpose hardware platform, or by hardware.
- the first user characteristic data of the game user can be collected based on the account login type, the first identity information of the game user can be verified according to the first user characteristic data, and
- the game account can be controlled according to the first operation behavior data and the first control rules of the game user generated during the game process; correspondingly,
- the game account can be controlled according to the second operation behavior data and the second control rules of the game user generated during the game process.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
La présente invention se rapporte au domaine technique des ordinateurs. L'invention divulgue un procédé, un appareil et un dispositif de commande de compte de jeu. Le procédé consiste à : lorsqu'une ouverture de session de compte de jeu est détectée, obtenir des données de caractéristiques d'utilisateur d'un utilisateur de jeu correspondant au compte de jeu et déterminer des informations d'identité de l'utilisateur de jeu en fonction des données de caractéristiques d'utilisateur ; si les informations d'identité identifient que l'utilisateur de jeu est un utilisateur à première identité, commander le compte de jeu en fonction de premières données de comportement de fonctionnement de l'utilisateur de jeu générées dans un processus de jeu et d'une première règle de commande ; et si les informations d'identité identifient que l'utilisateur de jeu est un utilisateur à seconde identité, commander le compte de jeu en fonction de secondes données de comportement de fonctionnement de l'utilisateur de jeu générées dans le processus de jeu et d'une seconde règle de commande. Sur la base de la solution technique de la présente invention, un enfant utilisateur peut participer à un jeu plus raisonnablement sur la base de différentes règles de restriction de jeu sous un compte touriste et un compte de nom réel, de telle sorte que le risque de dépendance au jeu est efficacement réduit.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110903419.8A CN113694537B (zh) | 2021-08-06 | 2021-08-06 | 游戏账号的控制方法、装置及设备 |
CN202110903419.8 | 2021-08-06 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023010715A1 true WO2023010715A1 (fr) | 2023-02-09 |
Family
ID=78651899
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/132567 WO2023010715A1 (fr) | 2021-08-06 | 2021-11-23 | Procédé, appareil et dispositif de commande de compte de jeu |
Country Status (2)
Country | Link |
---|---|
CN (2) | CN116474376A (fr) |
WO (1) | WO2023010715A1 (fr) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113946810B (zh) * | 2021-12-07 | 2022-09-20 | 荣耀终端有限公司 | 一种应用程序的运行方法及电子设备 |
CN114797089A (zh) * | 2022-04-29 | 2022-07-29 | 歌尔股份有限公司 | 防沉迷控制方法、游戏手柄、游戏主机及游戏机组件 |
CN115054909A (zh) * | 2022-06-16 | 2022-09-16 | 歌尔股份有限公司 | 一种可穿戴产品的身份识别方法及手柄 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1975748A (zh) * | 2006-12-15 | 2007-06-06 | 浙江大学 | 虚拟网络马拉松的健身游戏方法 |
US9619965B1 (en) * | 2016-05-20 | 2017-04-11 | Otho Dale Hill | Biometric gameplay verification |
CN109522069A (zh) * | 2018-10-26 | 2019-03-26 | 深圳壹账通智能科技有限公司 | 防沉迷游戏的方法、装置及电子设备 |
CN110109746A (zh) * | 2019-05-17 | 2019-08-09 | 腾讯科技(深圳)有限公司 | 一种任务处理方法、装置、设备及介质 |
US20200122031A1 (en) * | 2018-10-22 | 2020-04-23 | Sony Interactive Entertainment LLC | Remote Networked Services for Providing Contextual Information |
CN111773734A (zh) * | 2020-07-09 | 2020-10-16 | 网易(杭州)网络有限公司 | 基于游戏的时长控制方法、装置及设备 |
CN112329811A (zh) * | 2020-09-18 | 2021-02-05 | 广州三七网络科技有限公司 | 异常账号识别方法、装置、计算机设备和存储介质 |
CN112434667A (zh) * | 2020-12-11 | 2021-03-02 | 杭州电魂网络科技股份有限公司 | 基于人脸识别的未成年人游戏防沉迷方法、系统、设备及介质 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070067654A (ko) * | 2007-05-16 | 2007-06-28 | 윤윤해 | 음원을 이용한 게임중독예방 시스템 |
CN106101379B (zh) * | 2016-05-26 | 2019-08-06 | Oppo广东移动通信有限公司 | 一种移动终端的防沉迷方法、装置及移动终端 |
CN111135582A (zh) * | 2019-12-27 | 2020-05-12 | 山东爱城市网信息技术有限公司 | 一种基于区块链的游戏防沉迷方法及设备、介质 |
CN113159782B (zh) * | 2021-03-26 | 2022-04-15 | 支付宝(杭州)信息技术有限公司 | 基于联邦学习的未成年人防沉迷处理方法、装置及设备 |
-
2021
- 2021-08-06 CN CN202310477826.6A patent/CN116474376A/zh active Pending
- 2021-08-06 CN CN202110903419.8A patent/CN113694537B/zh active Active
- 2021-11-23 WO PCT/CN2021/132567 patent/WO2023010715A1/fr active Application Filing
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1975748A (zh) * | 2006-12-15 | 2007-06-06 | 浙江大学 | 虚拟网络马拉松的健身游戏方法 |
US9619965B1 (en) * | 2016-05-20 | 2017-04-11 | Otho Dale Hill | Biometric gameplay verification |
US20200122031A1 (en) * | 2018-10-22 | 2020-04-23 | Sony Interactive Entertainment LLC | Remote Networked Services for Providing Contextual Information |
CN109522069A (zh) * | 2018-10-26 | 2019-03-26 | 深圳壹账通智能科技有限公司 | 防沉迷游戏的方法、装置及电子设备 |
CN110109746A (zh) * | 2019-05-17 | 2019-08-09 | 腾讯科技(深圳)有限公司 | 一种任务处理方法、装置、设备及介质 |
CN111773734A (zh) * | 2020-07-09 | 2020-10-16 | 网易(杭州)网络有限公司 | 基于游戏的时长控制方法、装置及设备 |
CN112329811A (zh) * | 2020-09-18 | 2021-02-05 | 广州三七网络科技有限公司 | 异常账号识别方法、装置、计算机设备和存储介质 |
CN112434667A (zh) * | 2020-12-11 | 2021-03-02 | 杭州电魂网络科技股份有限公司 | 基于人脸识别的未成年人游戏防沉迷方法、系统、设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
CN116474376A (zh) | 2023-07-25 |
CN113694537B (zh) | 2023-05-16 |
CN113694537A (zh) | 2021-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2023010715A1 (fr) | Procédé, appareil et dispositif de commande de compte de jeu | |
US8627454B2 (en) | Dynamic quota-based entertainment manager | |
WO2020019963A1 (fr) | Procédé et dispositif de vérification d'identité et procédé et dispositif de modification d'informations de compte | |
WO2008130506A1 (fr) | Procédé automatisé et système pour une opportunité de jeu | |
CN108780475A (zh) | 用于虚拟辅助的个性化推论认证 | |
US20140295956A1 (en) | Central account management system for user profiling | |
CN109063977B (zh) | 一种无感式交易风险监测方法及装置 | |
Drachen et al. | Rapid prediction of player retention in free-to-play mobile games | |
TWI751422B (zh) | 核身產品推送及核身方法和系統 | |
JP6069611B2 (ja) | ゲームシステム、並びにゲーム制御方法及びコンピュータプログラム | |
CN108066987B (zh) | 应用场景关卡组合的分配方法、装置及服务器 | |
CN107485858A (zh) | 一种网络游戏防沉迷验证方法 | |
US20240108990A1 (en) | Fraud detection system | |
CN109685639A (zh) | 贷款审核方法、装置、设备及计算机可读存储介质 | |
JP5409027B2 (ja) | 遊技媒体貯蓄システム及び遊技媒体貯蓄方法 | |
CN113262494A (zh) | 游戏中的任务处理方法、装置及电子设备 | |
CN118632732A (zh) | 用于授予nft支持的数字资产的所赢得游戏内动作的自动追踪 | |
CN113485843A (zh) | 一种阅读器的虚拟资源分配方法、装置及计算机设备 | |
KR20130058216A (ko) | 캐릭터의 게임 플레이 영상을 녹화하는 방법 및 서버 | |
Norris | And the Eye in the Sky Is Watching Us All-The Privacy Concerns of Emerging Technological Advances in Casino Player Tracking | |
JP5813971B2 (ja) | 遊技場用システム | |
US20200242513A1 (en) | Technologies for implementing system for aggregating data and providing an application | |
CN110460561A (zh) | 一种应用于交友平台的中央控制系统 | |
CN113709311B (zh) | 一种虚拟运营商增值服务的用户合法化运营业务平台 | |
JP6782422B2 (ja) | ゲームシステム、それに用いられるコンピュータプログラム、及びサーバ装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21952578 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21952578 Country of ref document: EP Kind code of ref document: A1 |