A method, device and computer equipment for detecting user information
A user information and user technology, applied in the field of information processing, can solve problems such as the order of the live broadcast platform cannot be guaranteed, and abnormal users are banned
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] This embodiment provides a method for detecting user information, which is applied to the application platform of the client, such as the Android platform, such as figure 1 As shown, the method includes:
[0053]S101, establishing multiple monitoring interfaces for each user input control;
[0054] In this step, the user input controls include: a user name input control, a user password input control, a user password confirmation input control, a user mailbox input control and a user mobile phone number input control. If a normal user logs in to the live broadcast platform, the name, password and other information entered should be consistent with the information at the time of registration, then it is possible to detect whether the user is an abnormal user by monitoring each user input control.
[0055] Correspondingly, multiple monitoring interfaces need to be established for each user input control. In this step, each user input control includes three monitoring int...
Embodiment 2
[0123] This embodiment provides a device for detecting user information, such as figure 2 As shown, the device includes: an establishment unit 21, a registration unit 22, a monitoring unit 23, an encryption unit 24, and a sending unit 25; wherein,
[0124] The establishment unit 21 is used to respectively establish a plurality of monitoring interfaces for each user input control; wherein, the user input control includes: a user name input control, a user password input control, a user password confirmation input control, a user mailbox input control and a user mobile phone Number input control. If a normal user logs in to the live broadcast platform, the name, password and other information entered should be consistent with the information at the time of registration, then it is possible to detect whether the user is an abnormal user by monitoring each user input control.
[0125] The establishment unit 21 needs to establish multiple monitoring interfaces for each user input...
Embodiment 3
[0189] This embodiment also provides a computer device for detecting user information, such as image 3 As shown, the computer device includes: a radio frequency (Radio Frequency, RF) circuit 310, a memory 320, an input unit 330, a display unit 340, an audio circuit 350, a WiFi module 360, a processor 370, and a power supply 380 and other components. Those skilled in the art can understand that, image 3 The structure of the computer device shown in the computer device does not constitute a limitation to the computer device, and may include more or less components than those shown in the illustration, or combine some components, or arrange different components.
[0190] Combine below image 3 A detailed introduction to each component of computer equipment:
[0191] The RF circuit 310 can be used for receiving and sending signals, especially, after receiving the downlink information of the base station, the processor 370 processes it. Generally, the RF circuit 310 includes, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


