CN101431411A - Dynamic encryption method for network game data - Google Patents
Dynamic encryption method for network game data Download PDFInfo
- Publication number
- CN101431411A CN101431411A CN 200710124509 CN200710124509A CN101431411A CN 101431411 A CN101431411 A CN 101431411A CN 200710124509 CN200710124509 CN 200710124509 CN 200710124509 A CN200710124509 A CN 200710124509A CN 101431411 A CN101431411 A CN 101431411A
- Authority
- CN
- China
- Prior art keywords
- cryptographic key
- dynamic
- key
- asymmetric cryptographic
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 15
- 230000005540 biological transmission Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention discloses a dynamic encryption method of on-line game data which comprising the following procedures: encrypting user login information according to RSA algorithm and transmitting it to server by client; decrypting user login information by RSA algorithm and processing login by server; generating dynamic key according to the user's special information and saving it to the corresponding user information in server by server; transmitting login result and dynamic key that encrypted by RSA algorithm to client by server; encrypting and saving the key by client; encrypting and decrypting on-line game data by using dynamic data by client and server.
Description
Technical field
The present invention relates to field of network game technology, be specifically related to a kind of dynamic encrypting method of data of network game.
Background technology
Data of network game transmission at present is frequent, considers the transmission security of data of network game, generally can encrypt data of network game.Transmission is encrypted for the data of network game under the multi-user c/s pattern as shown in Figure 1, the general more complicated of safe cryptographic algorithm, the computer system consumption rate is bigger, computing power is required than higher, and simple algorithm is less demanding to computing power but fail safe after encrypting is not high yet.
Summary of the invention
The technical problem to be solved in the present invention provides a kind of dynamic encrypting method of data of network game, under general computing power, improves c/s (client/server) pattern lower network game data safety of transmission.
The present invention solves the problems of the technologies described above the technical scheme that is adopted to be:
A kind of dynamic encrypting method of data of network game comprises step:
A1, at the private key of the server deploy first asymmetric cryptographic key centering, PKI the client deployment first asymmetric cryptographic key centering, it is right that described client generates second asymmetric cryptographic key, and described client is used the PKI of the public key encryption user logon information of the first asymmetric cryptographic key centering and the second asymmetric cryptographic key centering and sent to described server;
A2, described server use the private key of the first asymmetric cryptographic key centering to decipher described user's logon information and generate dynamic symmetric cryptographic key according to described user's logon information, set up the corresponding relation of described dynamic symmetric cryptographic key and user name;
A3, described server use the public key encryption of the second asymmetric cryptographic key centering to land object information and described dynamic symmetric cryptographic key, form feedback information and send to described client;
A4, described client use the private key of the second asymmetric cryptographic key centering to decipher described feedback information, obtain described dynamic symmetry algorithm key;
A5, described server and described client are used described dynamic symmetry algorithm key that the data of network game that will transmit is carried out encryption and decryption subsequently and are handled.
The dynamic encrypting method of described data of network game, wherein first asymmetric cryptographic key is to being generated by RSA Algorithm.
The dynamic encrypting method of described data of network game, wherein second asymmetric cryptographic key is to being generated by RSA Algorithm.
The dynamic encrypting method of described data of network game, wherein said dynamic symmetry algorithm key is generated by the DES algorithm.
Beneficial effect of the present invention is: the present invention uses dynamic symmetric key that the data of network game that transmits between the server and client side is carried out encryption and decryption, improved the data of network game safety of transmission, and on the computer of general performance, can both implement, reduced requirement, saved the lower deployment cost of network game system computer system performance.
Description of drawings
Fig. 1 is a prior art customer end/server mode schematic diagram;
Fig. 2 carries out the schematic diagram of transfer of data for client and server of the present invention uses dynamic symmetric key;
Dynamic symmetric key carries out the schematic diagram that data of network game is encrypted to Fig. 3 for the present invention uses;
Fig. 4 schematic diagram that dynamic symmetric key carries out the data of network game deciphering for the present invention uses.
Embodiment
With embodiment the present invention is described in further detail with reference to the accompanying drawings below:
As shown in Figure 2, the dynamic encrypting method of data of network game described in the invention carries out concrete enforcement according to following steps:
1, at the private key of the server deploy first asymmetric cryptographic key centering, PKI the client deployment first asymmetric cryptographic key centering, it is right that client generates second asymmetric cryptographic key, and client is used the PKI of the public key encryption user logon information of the first asymmetric cryptographic key centering and the second asymmetric cryptographic key centering and sent to server;
2, server uses the private key decrypted user logon information of the first asymmetric cryptographic key centering and generates dynamic symmetric cryptographic key according to user's logon information, sets up the corresponding relation of dynamic symmetric cryptographic key and user name;
3, server uses the public key encryption of the second asymmetric cryptographic key centering to land object information and dynamic symmetric cryptographic key, forms feedback information and also sends to client;
4, client is used the private key deciphering feedback information of the second asymmetric cryptographic key centering, obtains dynamic symmetry algorithm key;
5, the server and client side uses dynamic symmetry algorithm key that the data of network game that will transmit is carried out the encryption and decryption processing subsequently.
Data encryption
As shown in Figure 3, after determining to want ciphered data,, calculate by cryptographic algorithm and to want ciphered data, be dealt into network then according to dynamic key.Cryptographic algorithm can be according to concrete needs designs (specifically can be the DES algorithm).Client and server adopts identical encrypting step.
Data decryption
As shown in Figure 4, collect network data from network terminal after, according to dynamic key, recover data before encrypting by decipherment algorithm.Decipherment algorithm can be according to concrete needs designs (specifically can be the DES algorithm).Client and server adopts identical decryption step.
Those skilled in the art do not break away from essence of the present invention and spirit, can there be the various deformation scheme to realize the present invention, the above only is the preferable feasible embodiment of the present invention, be not so limit to interest field of the present invention, the equivalent structure that all utilizations specification of the present invention and accompanying drawing content are done changes, and all is contained within the interest field of the present invention.
Claims (4)
1, a kind of dynamic encrypting method of data of network game is characterized in that, comprises step:
A1, at the private key of the server deploy first asymmetric cryptographic key centering, PKI the client deployment first asymmetric cryptographic key centering, it is right that described client generates second asymmetric cryptographic key, and described client is used the PKI of the public key encryption user logon information of the first asymmetric cryptographic key centering and the second asymmetric cryptographic key centering and sent to described server;
A2, described server use the private key of the first asymmetric cryptographic key centering to decipher described user's logon information and generate dynamic symmetric cryptographic key according to described user's logon information, set up the corresponding relation of described dynamic symmetric cryptographic key and user name;
A3, described server use the public key encryption of the second asymmetric cryptographic key centering to land object information and described dynamic symmetric cryptographic key, form feedback information and send to described client;
A4, described client use the private key of the second asymmetric cryptographic key centering to decipher described feedback information, obtain described dynamic symmetry algorithm key;
A5, described server and described client are used described dynamic symmetry algorithm key that the data of network game that will transmit is carried out encryption and decryption subsequently and are handled.
2, the dynamic encrypting method of data of network game according to claim 1 is characterized in that: first asymmetric cryptographic key is to being generated by RSA Algorithm.
3, the dynamic encrypting method of data of network game according to claim 2 is characterized in that: second asymmetric cryptographic key is to being generated by RSA Algorithm.
4, the dynamic encrypting method of data of network game according to claim 3 is characterized in that: described dynamic symmetry algorithm key is generated by the DES algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710124509 CN101431411A (en) | 2007-11-09 | 2007-11-09 | Dynamic encryption method for network game data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN 200710124509 CN101431411A (en) | 2007-11-09 | 2007-11-09 | Dynamic encryption method for network game data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101431411A true CN101431411A (en) | 2009-05-13 |
Family
ID=40646592
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN 200710124509 Pending CN101431411A (en) | 2007-11-09 | 2007-11-09 | Dynamic encryption method for network game data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101431411A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117989A (en) * | 2011-11-17 | 2013-05-22 | 华为软件技术有限公司 | Controlling method, device and terminal of safety of online games |
CN103973438A (en) * | 2014-03-25 | 2014-08-06 | 深圳天源迪科信息技术股份有限公司 | Communication channel dynamic encryption method |
CN106936574A (en) * | 2017-05-10 | 2017-07-07 | 北京奇艺世纪科技有限公司 | A kind of right discriminating system and method |
CN107968773A (en) * | 2016-10-20 | 2018-04-27 | 盛趣信息技术(上海)有限公司 | A kind of method and system for realizing Security and Integrality of Data |
CN108540486A (en) * | 2018-04-23 | 2018-09-14 | 湖南东方华龙信息科技有限公司 | The generation of cloud key and application method |
CN110636503A (en) * | 2019-09-24 | 2019-12-31 | 中国联合网络通信集团有限公司 | Data encryption method, device, equipment and computer readable storage medium |
CN112073185A (en) * | 2020-08-11 | 2020-12-11 | 广州点云科技有限公司 | Cloud game secure transmission method and device |
WO2022028391A1 (en) * | 2020-08-03 | 2022-02-10 | 华为技术有限公司 | Data cloud service method and communication apparatus |
-
2007
- 2007-11-09 CN CN 200710124509 patent/CN101431411A/en active Pending
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103117989A (en) * | 2011-11-17 | 2013-05-22 | 华为软件技术有限公司 | Controlling method, device and terminal of safety of online games |
CN103973438A (en) * | 2014-03-25 | 2014-08-06 | 深圳天源迪科信息技术股份有限公司 | Communication channel dynamic encryption method |
CN103973438B (en) * | 2014-03-25 | 2017-11-17 | 深圳天源迪科信息技术股份有限公司 | communication channel dynamic encrypting method |
CN107968773A (en) * | 2016-10-20 | 2018-04-27 | 盛趣信息技术(上海)有限公司 | A kind of method and system for realizing Security and Integrality of Data |
CN107968773B (en) * | 2016-10-20 | 2021-12-24 | 盛趣信息技术(上海)有限公司 | Method and system for realizing data security and integrity |
CN106936574A (en) * | 2017-05-10 | 2017-07-07 | 北京奇艺世纪科技有限公司 | A kind of right discriminating system and method |
CN108540486A (en) * | 2018-04-23 | 2018-09-14 | 湖南东方华龙信息科技有限公司 | The generation of cloud key and application method |
CN110636503A (en) * | 2019-09-24 | 2019-12-31 | 中国联合网络通信集团有限公司 | Data encryption method, device, equipment and computer readable storage medium |
WO2022028391A1 (en) * | 2020-08-03 | 2022-02-10 | 华为技术有限公司 | Data cloud service method and communication apparatus |
CN112073185A (en) * | 2020-08-11 | 2020-12-11 | 广州点云科技有限公司 | Cloud game secure transmission method and device |
CN112073185B (en) * | 2020-08-11 | 2023-06-30 | 广州点云科技有限公司 | Cloud game safety transmission method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10785019B2 (en) | Data transmission method and apparatus | |
CN111130803B (en) | Method, system and device for digital signature | |
CN107682141A (en) | Data ciphering method and system for data transfer | |
CN101051904B (en) | Method for landing by account number cipher for protecting network application sequence | |
CN100586060C (en) | Method and device for establishing safety peer-to-peer communications | |
CN101789865B (en) | Dedicated server used for encryption and encryption method | |
CN104821874B (en) | A kind of method that quantum key is applied to Internet of Things data encrypted transmission | |
CN103338437B (en) | The encryption method of a kind of mobile instant message and system | |
CN104917741B (en) | A kind of plain text document public network secure transmission system based on USBKEY | |
CN101431411A (en) | Dynamic encryption method for network game data | |
CN102857479B (en) | The encryption method of network communication and system | |
CN102333093A (en) | Data encryption transmission method and system | |
JP2009512069A5 (en) | ||
CN102664898A (en) | Fingerprint identification-based encrypted transmission method, fingerprint identification-based encrypted transmission device and fingerprint identification-based encrypted transmission system | |
CN104253694A (en) | Encrypting method for network data transmission | |
CN107465665A (en) | A kind of file encryption-decryption method based on fingerprint identification technology | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN103036880A (en) | Network information transmission method, transmission equipment and transmission system | |
EP2786524A1 (en) | Simplified management of group secrets by group members | |
CN104901803A (en) | Data interaction safety protection method based on CPK identity authentication technology | |
CN101706854A (en) | USB information security equipment and method for communication between USB information security equipment and mainframe | |
CN106453391A (en) | Long repeating data encryption and transmission method and system | |
CN104270242A (en) | Encryption and decryption device used for network data encryption transmission | |
CN101789863B (en) | Safe data information transmission method | |
CN113422832B (en) | File transmission method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Open date: 20090513 |