Request verification method

A technology for verifying requests and verifying results, which is applied in the Internet field and can solve problems such as infringing on the interests of ordinary users and platforms

Inactive Publication Date: 2017-12-15
WUHAN DOUYU NETWORK TECH CO LTD
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of the mobile phone terminal, many interfaces in the mobile app are very important interfaces, such as the interface for grabbing fish balls. In order to grab more fish balls, some illegal users will write their own scripts or use other means to continuously imitate and call the grabbing interface. The interface of fish balls, that is, the behavior of swiping orders, if the swiping is successful, the fish balls delivered by the live broadcast platform will be snatched by very few users. These swiping users have violated the interests of ordinary users and the platform and are prohibited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Request verification method
  • Request verification method
  • Request verification method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0035] It should be noted that like numerals and let...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of internet, and particularly to a request verification method. The request verification method comprises the steps that a client terminal sends a resource obtaining request to a first service terminal; the first service terminal obtains a verification parameter from a second service terminal based on the type of the resource obtaining request and sends the verification parameter to the client terminal; the client terminal feeds back the received verification parameter to the second service terminal; the second service terminal verifies whether the received verification parameter is an effective parameter; and if the verification parameter is the effective parameter, the second service terminal generates a verification result and sends the verification result to the client terminal. When the client terminal receives the verification result, the verification parameter passes the verification, and the client terminal can obtain resources from the first service terminal. A client in the scheme provided by the invention obtains the verification parameter and performs validity verification on the obtained verification parameter, so that the client terminal is further prevented from scalping and the user benefits are maintained.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method for verifying a request. Background technique [0002] With the rapid development of the mobile phone terminal, many interfaces in the mobile app are very important interfaces, such as the interface for grabbing fish balls. In order to grab more fish balls, some illegal users will write their own scripts or use other means to continuously imitate and call the grabbing interface. The interface of fish balls, that is, the behavior of swiping orders, if the swiping is successful, the fish balls delivered by the live broadcast platform will be snatched by a very small number of users. These swiping users have violated the interests of ordinary users and the platform and are prohibited. [0003] Therefore, it is very necessary to provide a verification method for obtaining resource requests, so that only relevant requests that pass verification can obtain resources. Co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q20/40G06Q30/06
CPCG06Q20/4014G06Q30/0601H04L63/08
Inventor 汪刚张文明陈少杰
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products