CN103117989A - Controlling method, device and terminal of safety of online games - Google Patents

Controlling method, device and terminal of safety of online games Download PDF

Info

Publication number
CN103117989A
CN103117989A CN2011103658546A CN201110365854A CN103117989A CN 103117989 A CN103117989 A CN 103117989A CN 2011103658546 A CN2011103658546 A CN 2011103658546A CN 201110365854 A CN201110365854 A CN 201110365854A CN 103117989 A CN103117989 A CN 103117989A
Authority
CN
China
Prior art keywords
key
transaction identifier
module
user
network gaming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011103658546A
Other languages
Chinese (zh)
Inventor
罗绳礼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Huawei Software Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN2011103658546A priority Critical patent/CN103117989A/en
Publication of CN103117989A publication Critical patent/CN103117989A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a controlling method, a device and a terminal of safety of online games, and belongs to the technical field of communication. The method comprises the steps: distributing a secret key to a user of the online games by the controlling device of the safety of the online games according to a request sent by a game client, and sending the secret key to the game client; receiving a logging request sent by the game client, wherein the logging request comprises the secret key; and carrying out verification on the logging request sent by the game client according to the secret key. The device comprises a secret key distribution module, a receiving module and a logging verification module. The terminal comprises an application module, a first receiving module and a logging request module. A communication network interactive mode is utilized to distribute the secret key for the user of the online games, the logging verification is conducted on the user of the online games according to the secret key, the problem that when a hardware is lost or damaged, an account protection business of the user of the online games cannot be used is solved, and therefore safety of game account is ensured.

Description

Online game security control method, device and terminal
Technical field
The present invention relates to communication technical field, particularly a kind of online game security control method, device and terminal.
Background technology
Flourish along with mobile Internet, the mobile entertainment business is faced with rare opportunity to develop, uses the user of network by mobile terminal game to be seen everywhere.Game manufacturer can issue the U shield supporting with online game usually, guarantees user's handling safety with this.Because the usually corresponding U shield of online game, when using the network by mobile terminal game, the user just need to carry and safeguard a plurality of U shields, very trouble.
In order to make things convenient for the user, having in the prior art provides a kind of the U shield has been integrated into scheme in subscriber identification module (Subscriber Identity Module, the SIM) card.When user's logging in online game, U shield off-line generates a key string at random, server is according to this key string and user account, password at random, login identity to the user is carried out verification, after verification is passed through, the user just can carry out the relevant operation of online game, as fills and count, consume, buy stage property etc.
In realizing process of the present invention, the inventor finds that there is following problem at least in prior art:
Prior art is integrated into the U shield in the SIM card, and when hardware was lost or damage, it is professional that the user can not reuse corresponding account protection, and still there is security risk in user's account.In addition, the U shield is integrated in the SIM card, needs the user to change SIM card, higher, the Difficulty of cost.
Summary of the invention
Can not guarantee the problem of account safety and the Difficulty of network gaming user when hardware is lost or damage in order to solve prior art, the embodiment of the invention provides a kind of mobile terminal network game security control method, device and terminal.Described technical scheme is as follows:
On the one hand, the embodiment of the invention provides a kind of mobile terminal network game security control method, and the method comprises:
The request that the online game security control device sends according to game client is the network gaming user distributing key and described key is sent to described game client;
Receive the logging request that described game client sends, described logging request comprises described key; And
According to described key, the logging request that described game client sends is verified.
On the other hand, the embodiment of the invention also provides a kind of online game security control device, and this device comprises:
The encryption key distribution module is used for being the network gaming user distributing key and described key is sent to described game client sending according to the request that game client sends;
Receiver module is used for receiving the logging request that described game client sends, and described logging request comprises that described encryption key distribution module assignment is to the key of described network gaming user;
The login authentication module is used for the key according to described encryption key distribution module assignment, and the logging request that described receiver module receives is verified.
Another aspect, the embodiment of the invention also provide a kind of terminal, and described terminal comprises:
The application module is used for sending to the online game security control device key application of network gaming user;
The first receiver module is used for receiving the key that described online game security control device is distributed to described network gaming user;
The logging request module, the key that is used for receiving according to described the first receiver module generates logging request, and sends described logging request to described online game security control device.
The beneficial effect that the technical scheme that the embodiment of the invention provides is brought is: be the network gaming user distributing key by utilizing the mutual mode of communication network; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication; can effectively guarantee the safety of game account, and the method and apparatus that the embodiment of the invention provides is easy to realize and promote.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the invention, the accompanying drawing of required use was done to introduce simply during the below will describe embodiment, apparently, accompanying drawing in the following describes only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 a is the system architecture schematic diagram of the applied environment that provides of an invention execution mode;
Fig. 1 b is the flow chart of the online game security control method that provides in the embodiment of the invention 1;
Fig. 2 a is the configuration diagram of the online game security control system that provides of an invention execution mode;
Fig. 2 b is the flow chart of the online game security control method that provides in the embodiment of the invention 2;
Fig. 3 is the structured flowchart of the online game security control device that provides in the embodiment of the invention 3;
Fig. 4 is the structured flowchart of the online game security control device that provides in the embodiment of the invention 4;
Fig. 5 is the structured flowchart of the online game security control device that provides in the embodiment of the invention 5;
The structured flowchart of the online game security control device that provides in the embodiment of the invention 6 is provided Fig. 6;
The structural representation of the embodiment of the online game security control device that provides in the embodiment of the invention 3,4,5,6 is provided Fig. 7;
The structured flowchart of the terminal that provides in the embodiment of the invention 7 is provided Fig. 8;
The structured flowchart of the terminal that provides in the embodiment of the invention 8 is provided Fig. 9;
The structural representation of the embodiment of the terminal that provides in the embodiment of the invention 7,8 is provided Figure 10.
Embodiment
For making the purpose, technical solutions and advantages of the present invention clearer, embodiment of the present invention is described further in detail below in conjunction with accompanying drawing.
The embodiment of the invention for convenience of description, below introduce first the system architecture of the applied environment of the embodiment of the invention in conjunction with Fig. 1.As shown in Figure 1a, this system comprises a plurality of communication equipments, intercoms mutually by wired or cordless communication network.These communication networks include, but are not limited to mobile communications network (mobile telephone network), wireless local LAN (wireless Local Area Network, LAN), blueteeth network (Bluetooth personal area network), Ethernet (Ethernet LAN), token ring local area network (a token ring LAN), wide area network (a wide area network), the Internet (the Internet) etc.
In the system shown in Figure 1, terminal 10 can include, but are not limited to, mobile device (mobile device), the PDA device of mobile communication (a combination PDA and mobile telephone), PDA, integrated information device (integrated messaging device, IMD), personal computer (personal computer), notebook computer (notebook computer).These terminals can move, and also can be positioned at certain movably on the equipment, such as but not limited to automobile, truck, taxi, bus, steamer, aircraft, bicycle, motorcycle, etc. above.Above-mentioned terminal 10 can be linked on one or more game server 20 by this wireless network and/or this cable network, so that obtain the game that this one or more game server 20 provides.Above-mentioned network can comprise other various different types of communication equipment, and for example the online game security control device 30.
Above-mentioned communication equipment can be realized based on various transmission technology the process of communication, include but not limited to code division multiple access (Code Division Multiple Access, CDMA), global system for mobile communications (Global System for Mobile Communications, GSM), universal mobile telecommunications system (Universal Mobile Telecommunications System, UMTS), time division multiple access (Time Division Multiple Access, TDMA), frequency division multiple access (Frequency Division Multiple Access, FDMA), transmission control protocol/Internet Interconnection agreement (Transmission Control Protocol/Internet Protocol, TCP/IP), Short Message Service (Short Messaging Service, SMS), MMS (Multimedia Message Service) (Multimedia Messaging Service, MMS), e-mail, instant message service (Instant Messaging Service, IMS), bluetooth (Bluetooth), IEEE 802.11, etc. can use different media resources between the above-mentioned communication equipment, include, but are not limited to, radio (radio), infrared ray (infrared), laser (laser), cable (cable connection), etc.
Embodiment 1
Shown in Fig. 1 b, the embodiment of the invention provides a kind of online game security control method, and the method comprises:
Step 101: the request that online game security control device 30 sends according to game client is the network gaming user distributing key and this key is sent to this game client.
Particularly, in conjunction with Fig. 1 a, this game client is installed on the user terminal 10.Network gaming user can as required, send request by game client to online game security control device 30.Concrete; this request can be that the professional request message of account protection is opened in application, if the success of i.e. account protection service fulfillment is passed through in this request; then online game security control device 30 is this network gaming user distributing key, and this key is sent to corresponding game client.The protection of the account here is professional to can be used as a service display on the game client to network gaming user, is convenient to the user and opens this business by the game client application.More excellent, when online game security control device 30 receives that the request of this account protection business is opened in the application of game client transmission, can also be this service billing.
Need to prove that the request that game client sends can directly send to online game security control device 30, also can send to online game security control device 30 by game server 20; Online game security control device 30 also can send to game client by game server 20 for the key that network gaming user distributes can directly send to game client.
After game client is received this key, can in the local memory cell of user terminal 10, preserve.
Preferably, in order to ensure the transmission security of key file, can be encrypted processing to it.
Step 102: the online game security control device receives the logging request that game client sends, and this logging request comprises the key of distributing to the aforementioned network game user.
Particularly, this logging request comprises random code, and this random code is generated according to the key that network gaming user is assigned to by this game client.More excellent, when game client generates logging request according to user's instruction, automatically trigger and generate above-mentioned random code, and automatically above-mentioned random code is carried and carry in the above-mentioned logging request, do not need user's participation.
Further, this logging request can also comprise user account and/or password, and the password here is different from aforementioned key, is that another kind may be allocated in advance to the user, the information that is used for authentication of input when being logined by the user.
Step 103: the online game security control device is verified the logging request of this game client according to this key.
Further, this step specifically comprises:
The random code of receiving is carried out verification.Particularly, the online game security control device generates random code according to the aforementioned key of distributing to network gaming user, whether the random code of relatively receiving is identical with the random code that the online game security control device generates: if identical, then by checking, the user logins successfully; If different, then can not be by checking, the user logins unsuccessful.
Need to prove that the function of online game security control device 30 can adopt a server to finish in the present embodiment, also can adopt a plurality of servers jointly to finish.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication; can effectively guarantee the safety of game account, and the method and apparatus that the embodiment of the invention provides is easy to realize and promote.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.
Embodiment 2
Present embodiment for convenience of explanation, below a first simple system architecture schematic diagram introducing the online game security control method that realizes present embodiment.Shown in Fig. 2 a, this system comprises user terminal 10, game server 20 and online game security control device 30.In the present embodiment, each function of online game security control device among the embodiment 1 has been distributed to three entities finished, these three entities are respectively: IAD (also can be called the game services end) 31, security server 32 and operation platform 33.Their function is distributed when will be described below embodiment 2 and is described in detail, and the specific functional modules that relates in the present embodiment is corresponding with the module of hereinafter installing among the embodiment.
Present embodiment is on the basis of embodiment 1, combine the step of distributing Transaction Identifier and by this Transaction Identifier the operation requests of network gaming user being verified for listed online game, thereby the handling safety of user in the online game process combined with user's login, can further guarantee the account number safety of network gaming user.Particularly, shown in Fig. 2 b, present embodiment provides a kind of online game security control method, and the method comprises:
Step 201: the request that security server 32 (for example wherein encryption key distribution module 301 is seen Fig. 3-6) sends according to game client is the network gaming user distributing key and this key is sent to this game client.
Concrete, in conjunction with Fig. 2 a, this game client is installed on the user terminal 10.The user can be as required; send application by game client to IAD 31 (for example wherein receiver module 303) and open the professional request of account protection; if this request is passed through; it is the success of account protection service fulfillment; then security server 32 is this user assignment key, and this key is sent to corresponding game client.The protection of the account here is professional to can be used as a service display on the game client to network gaming user, is convenient to the user and opens this business by the game client application.More excellent, when this account protection business is opened in user's application, can be this service billing, billing function is finished by operation platform 33.
Need to prove that the request that game client sends can directly send to online game security control device 30, also can send to online game security control device 30 by game server 20; Online game security control device 30 also can send to game client by game server 20 for the key that network gaming user distributes can directly send to game client.
After game client is received this key, can in the local memory cell of user terminal 10, preserve.
In order to ensure the transmission security of key file, before key is sent to game client, can be encrypted processing to it.
Preferably, after key is issued game client, user's request that online game security control device 30 (for example wherein key updating module 403) can send according to game client, upgrade key corresponding to this network gaming user, and the key after will upgrading sends to this game client, this network gaming user is when follow-up login, and game client can adopt the key after upgrading in logging request.Potential safety hazard that can effectively avoid so the local Key Exposure of user terminal, algorithm cracks to be brought with lost terminal.
Step 202: IAD 31 receives the logging request that game client sends, and this logging request comprises the key of distributing to network gaming user.
Particularly, this logging request comprises random code, and this random code is generated according to the key that this network gaming user is assigned to by this game client.This logging request can directly send to IAD 31 by game client, also can send to IAD 31 by game server 20.More excellent, when game client generates logging request according to user's instruction, automatically trigger and generate above-mentioned random code, and automatically above-mentioned random code is carried and carry in the above-mentioned logging request, do not need user's participation.
Further, this logging request can also comprise user account and/or password, and the password here is different from aforementioned key, is that another kind may be allocated in advance to the user, the information that is used for authentication of input when being logined by the user.
Step 203: security server 32 (for example wherein login authentication module 302) is verified the logging request of this game client according to this key.
Concrete, after IAD 31 is received logging request, call 32 pairs of these logging request of security server and verify.
Further, this step specifically comprises:
32 pairs of random codes of receiving of security server are carried out verification.Particularly, security server 32 generates random code according to the aforementioned key of distributing to network gaming user, and whether the random code of relatively receiving is identical with the random code that security server 32 generates: if identical, then by checking, the user logins successfully; If different, then can not be by checking, the user logins unsuccessful.
Preferably, after the user logins successfully, the method of present embodiment also comprises: online game security control device 30 (for example wherein key detection module 404) detects the key updating cycle by the network gaming user of checking, if should the update cycle greater than predetermined value, then online game security control device 30 (for example wherein pressure update module 405) forces to upgrade the key of this network gaming user.This predetermined value is key and forces the update cycle, can set in advance, and by this pressure update cycle is set, can further guarantee the safety of key.
Further, force the process of new key as follows:
Online game security control device 30 sends to this game client and forces to upgrade key notification, after this game client is received this pressure update notification, initiate the key updating request to online game security control device 30, security server 32 upgrades key corresponding to this network gaming user, and the key after will upgrading sends to this game client.
Step 204: security server 32 (for example wherein Transaction Identifier distribution module 506) distributes Transaction Identifier for the network gaming user by checking, and this Transaction Identifier is used for this login of this network gaming user of sign.
Particularly, this Transaction Identifier random code that can generate according to key by online game identification information and the server to user totem information, user login is carried out digest algorithm and is generated.Further, this Transaction Identifier can also comprise the additional informations such as login time.
If game client directly sends logging request to IAD 31, then this Transaction Identifier is sent to game client corresponding to network gaming user, and can return simultaneously login success message.Then, game client can carry this Transaction Identifier and user profile signs in to game server 20.
Alternatively, if game client is initiated logging request to game server 20, game server 20 is initiated the user to IAD 31 again and is logined verification operation, and then IAD 31 returns login success message for game server 20, carries simultaneously the Transaction Identifier of this login of user.
Behind user's logging in game server 20, namely can carry out online game by game client and game server 20.
Step 205: online game security control device 30 (module 609 for example is set wherein effective time) arranges effective time for Transaction Identifier.
Need to prove that can be to arrange all Transaction Identifiers are unified this effective time, also can arrange respectively for the Transaction Identifier of different user.Can arrange when distributing Transaction Identifier this effective time, also can set in advance.
Step 206: game server 20 receives the operation requests of the network gaming user that passes through checking of game client transmission, and initiates corresponding operation requests to IAD 31, and this operation requests comprises user ID, Transaction Identifier and operation requests information.
Particularly, this operation requests typically refers to and buys stage property, fills service request such as counting, consume request.
Preferably, this operation requests also comprises eap-message digest.This eap-message digest can be passed through MD5 (Message Digest Algorithm 5, Message Digest 5 the 5th edition) or SHA (Secure Hash Algorithm, SHA) etc. digest algorithm generates, and is not tampered at transmittance process to avoid this operation requests.
Step 207: IAD 31 (for example wherein request correction verification module 508) carries out verification to eap-message digest.
IAD 31 is initiated user's Transaction Identifier verification operation, execution in step 208 to security server 32 after finishing the message verification.
Particularly, this step adopts the digest algorithm identical with generating the aforementioned messages summary, and the eap-message digest of receiving is carried out verification, and this is this area common technology means.If by verification, then enter step 208; If not by verification, then can not carry out the operation relevant with this operation requests.
Step 208: security server 32 (for example wherein judge module 610 effective time) judges that this Transaction Identifier whether within aforementioned effective time, if not, then destroys this Transaction Identifier; If then enter step 209.After destroying Transaction Identifier, the user need to by game client again logging in online game, apply for the new Transaction Identifier corresponding with new login.
Alternatively, if this Transaction Identifier is within aforementioned effective time, the method of present embodiment can also comprise: according to user's request that game client sends, security server 32 (for example wherein Transaction Identifier update module 611) upgrades Transaction Identifier, again logins avoiding.
The setting of this effective time can be controlled the stolen loss range of Transaction Identifier, further reduces the risk of game account.Need to prove that this step is optional step, also can omit this step, directly execution in step 209.
Step 209: security server 32 (for example wherein Transaction Identifier authentication module 507) is verified Transaction Identifier.If by checking, then allow to carry out the operation relevant with this operation requests; If by checking, then do not allow to carry out the operation relevant with this operation requests.
Particularly, Transaction Identifier is verified whether the Transaction Identifier that relatively receives is identical with the Transaction Identifier of distributing to this user by the following steps realization, if then expression is by checking, if not, then checking is not passed through in expression.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication; can effectively guarantee the safety of game account, and the method and apparatus that the embodiment of the invention provides is easy to realize and promote.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.In addition, present embodiment is by distributing Transaction Identifier to the network gaming user by checking, the handling safety of user in the online game process combined with user's login, thereby can recall user's login, avoided the user not login or user offline after, simulated again the operation requests of initiation, and then guaranteed the handling safety of user in whole online game process.
Embodiment 3
As shown in Figure 3, the embodiment of the invention provides a kind of online game security control device, and this device comprises:
Encryption key distribution module 301 is used for being the network gaming user distributing key and this key being sent to this game client according to the request that game client sends;
Receiver module 303 be used for to receive the logging request that game client sends, and this logging request comprises that encryption key distribution module 301 distributes to the key of this network gaming user;
Login authentication module 302 is used for the key according to 301 distribution of encryption key distribution module, and the logging request that receiver module 303 receives is verified.
Further, this logging request comprises random code, and this random code is generated according to the key that is assigned to by this network gaming user.Further, this logging request can also comprise user account and/or password.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication; can effectively guarantee the safety of game account, and the method and apparatus that the embodiment of the invention provides is easy to realize and promote.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.
Embodiment 4
As shown in Figure 4, the embodiment of the invention provides a kind of online game security control device, and different from the device of embodiment 3 is that this device also comprises:
Key updating module 403 is used for more new key, and the key after will upgrading sends to the game client of corresponding network gaming user;
The network gaming user that key after then login authentication module 302 is upgraded according to encryption key distribution module 403 is treated login carries out login authentication.
Further, this device also comprises:
Key detection module 404 is for detection of the key updating cycle of the network gaming user that passes through checking; With
Force update module 405, be used for forcing the key of this network gaming user of renewal when update cycle that key detection module 404 detects during greater than predetermined value.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication; can effectively guarantee the safety of game account, and the method and apparatus that the embodiment of the invention provides is easy to realize and promote.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.
Embodiment 5
As shown in Figure 5, the embodiment of the invention provides a kind of online game security control device, and different from the device of embodiment 4 is that this device also comprises:
Transaction Identifier distribution module 506 is used to the network gaming user by checking to distribute Transaction Identifier, and this Transaction Identifier is used for this login of this network gaming user of sign;
Transaction Identifier authentication module 507, be used for when receiving the operation requests of the network gaming user that passes through checking that game client sends, the Transaction Identifier that Transaction Identifier distribution module 506 is distributed is verified that this operation requests comprises user ID, Transaction Identifier and operation requests information.
Further, this operation requests also comprises eap-message digest, and then this device also comprises:
Request correction verification module 508 is used for this eap-message digest is carried out verification.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication; can effectively guarantee the safety of game account, and the method and apparatus that the embodiment of the invention provides is easy to realize and promote.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.In addition, present embodiment is by distributing Transaction Identifier to the network gaming user by checking, the handling safety of user in the online game process combined with user's login, thereby can recall user's login, avoided the user not login or user offline after, simulated again the operation requests of initiation, and then guaranteed the handling safety of user in whole online game process.
Embodiment 6
As shown in Figure 6, the embodiment of the invention provides a kind of online game security control device, and different from the device of embodiment 5 is that this device also comprises:
Module 609 is set effective time, and the Transaction Identifier that is used to Transaction Identifier distribution module 506 to distribute arranges effective time;
Effective time, judge module 610, were used for judging whether Transaction Identifier arranges in the effective time of module 609 settings in effective time, if not, then destroys this Transaction Identifier.
Further, this device also comprises:
Transaction Identifier update module 611, be used for when effective time judge module 610 judge Transaction Identifier within effective time the time, the user who sends according to game client asks, and upgrades this Transaction Identifier.
In concrete execution mode, earlier figures 3,4,5 and 6, online game security control device 30 can be a kind of computer or server, such as Fig. 7.Generally comprise at least one processor 72 (for example CPU), at least one network interface 75 or other communication interfaces, memory 76, and at least one communication bus 73 are used for the connection communication between these devices of realization.Processor 72 is used for the executable module that execute store is stored, for example computer program.Online game security control device 30 optionally comprises user interface 74, includes but not limited to display, keyboard and pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch sensitive display screen.Memory 306 may comprise high speed Ram memory, also may also comprise non-unsettled memory (non-volatile memory), for example at least one magnetic disc store.Realize communication connection between this online game security control device 30 and at least one other computer by at least one network interface 75 (can be wired or wireless), can use the Internet, wide area network, local network, metropolitan area network etc.
Memory 76 optionally can comprise at least one and be positioned at storage device (for example external connection storage apparatus) away from the place of aforementioned CPU.In some embodiments, memory 76 has been stored following element, executable module or data structure, perhaps their subset, perhaps their superset:
Operating system 77 is used for comprising various programs, is used for realizing various basic businesses and processing hardware based task; And, one of following module or arbitrary combination:
Encryption key distribution module 301, receiver module 303, login authentication module 302, key updating module 403, key detection module 404, force update module 405, Transaction Identifier distribution module 506, Transaction Identifier authentication module 507, request correction verification module 508, module 609 is set effective time, and effective time, judge module 610, Transaction Identifier update module 611.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication; can effectively guarantee the safety of game account, and the method and apparatus that the embodiment of the invention provides is easy to realize and promote.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.In addition, present embodiment is by distributing Transaction Identifier to the network gaming user by checking, the handling safety of user in the online game process combined with user's login, thereby can recall user's login, avoided the user not login or user offline after, simulated again the operation requests of initiation, and then guaranteed the handling safety of user in whole online game process.
Embodiment 7
As shown in Figure 8, the embodiment of the invention provides a kind of terminal, and this terminal comprises:
Application module 701 is used for sending to the online game security control device key application of network gaming user;
The first receiver module 702 is used for receiving the key that the online game security control device is distributed to network gaming user;
Logging request module 703, the key that is used for receiving according to the first receiver module generates logging request, and sends this logging request to the online game security control device.
Preferably, the first receiver module 702 also be used for to receive the key after the renewal that the online game security control device sends, and then the key after the renewal that receives according to the first receiver module 702 of logging request module 703 generates logging request.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication, can effectively guarantee the safety of game account.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.
Embodiment 8
As shown in Figure 9, the embodiment of the invention has offered a kind of terminal, and different from the terminal of embodiment 7 is that this terminal also comprises:
The second receiver module 804 is used for receiving the Transaction Identifier that the online game security control device distributes for the network gaming user by checking, and this Transaction Identifier is used for this login of this network gaming user of sign;
Operation requests module 805 is used for to online game security control device transmit operation request, and this operation requests comprises Transaction Identifier and the operation requests information that user ID, the second receiver module 804 receive.
Preferably, this terminal also comprises:
Transaction Identifier update request module 806 is used for sending the Transaction Identifier update request to the online game security control device,
Then the second receiver module 804 is also for the Transaction Identifier after the renewal that receives the transmission of online game security control device;
Correspondingly, operation requests module 805 comprises the Transaction Identifier after this renewal in the total new operation requests that sends of safety.
In concrete execution mode, with reference to Figure 10, terminal 10 may comprise at least one processor 12 (for example CPU), at least one network interface 15 or other communication interfaces, memory 16, and at least one communication bus 13 are used for the connection communication between these devices of realization.Processor 12 is used for the executable module that execute store is stored, for example computer program; Terminal 10 optionally comprises user interface 14, includes but not limited to display, keyboard and pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch sensitive display screen.Memory 16 may comprise high speed Ram memory, also may also comprise non-unsettled memory (non-volatile memory), for example at least one magnetic disc store.Realize communication connection between this terminal 10 and at least one other computer by at least one network interface 15 (can be wired or wireless), can use the Internet, wide area network, local network, metropolitan area network etc.
Memory 16 optionally can comprise at least one and be positioned at storage device (for example external connection storage apparatus) away from the place of aforementioned CPU.In some embodiments, memory 16 has been stored following element, executable module or data structure, perhaps their subset, perhaps their superset:
Operating system 17 is used for comprising various programs, is used for realizing various basic businesses and processing hardware based task; And above-mentioned application module 701, the first receiver modules 702, logging request module 703, the second receiver modules 804, operation requests module 805, Transaction Identifier update request module 806.
The embodiment of the invention is by utilizing the mutual mode of communication network to be the network gaming user distributing key; avoided when hardware is lost or damage; the account of network gaming user is protected professional out of use problem; according to the key that is assigned to network gaming user is carried out login authentication, can effectively guarantee the safety of game account.In addition, the user no longer needs the U shield is carried out hardware maintenance, has reduced cost.In addition, present embodiment is by distributing Transaction Identifier to the network gaming user by checking, the handling safety of user in the online game process combined with user's login, thereby can recall user's login, avoided the user not login or user offline after, simulated again the operation requests of initiation, and then guaranteed the handling safety of user in whole online game process.
Need to prove: the online game security control device that above-described embodiment provides is when protecting the game account of network gaming user; only the division with above-mentioned each functional module is illustrated; in the practical application; can as required the above-mentioned functions distribution be finished by different functional modules; the internal structure that is about to device is divided into different functional modules, to finish all or part of function described above.In addition, the online game security control device that above-described embodiment provides, terminal and online game security control method embodiment belong to same design, and its specific implementation process sees embodiment of the method for details, repeats no more here.
The all or part of step that one of ordinary skill in the art will appreciate that realization above-described embodiment can be finished by hardware, also can come the relevant hardware of instruction to finish by program, described program can be stored in a kind of computer-readable recording medium, the above-mentioned storage medium of mentioning can be read-only memory, disk or CD etc.
The above only is preferred embodiment of the present invention, and is in order to limit the present invention, within the spirit and principles in the present invention not all, any modification of doing, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (18)

1. an online game security control method is characterized in that, described method comprises:
The request that the online game security control device sends according to game client is the network gaming user distributing key and described key is sent to described game client;
Receive the logging request that described game client sends, described logging request comprises described key; And
According to described key, the logging request that described game client sends is verified.
2. method according to claim 1, it is characterized in that, the request that described online game security control device sends according to game client be the network gaming user distributing key and described key sent to described game client after, described method also comprises:
Upgrade described key, and the key after will upgrading sends to the game client of corresponding described network gaming user.
3. method according to claim 2 is characterized in that, the described key of described renewal specifically comprises:
Detect the key updating cycle by the network gaming user of checking, if the described update cycle greater than predetermined value, then forces to upgrade the key of described network gaming user.
4. each described method is characterized in that according to claim 1-3, and according to described key, after the logging request that described game client is sent was verified, described method also comprised described:
For the network gaming user by checking distributes Transaction Identifier, described Transaction Identifier is used for identifying this login of described network gaming user;
When receiving the operation requests of the network gaming user that passes through checking that described game client sends, described Transaction Identifier is verified described operation requests comprises user ID, Transaction Identifier and operation requests information.
5. method according to claim 4 is characterized in that, described operation requests also comprises eap-message digest,
Then described described Transaction Identifier is verified before, also comprise:
Described eap-message digest is carried out verification.
6. method according to claim 4 is characterized in that, described method also comprises:
For described Transaction Identifier arranges effective time,
Then described described Transaction Identifier is verified before, also comprise:
Judge that described Transaction Identifier whether within described effective time, if not, then destroys described Transaction Identifier.
7. method according to claim 6 is characterized in that, if described Transaction Identifier within described effective time, described method also comprises: according to user's request that game client sends, upgrade described Transaction Identifier.
8. an online game security control device is characterized in that, described device comprises:
The encryption key distribution module is used for being the network gaming user distributing key and described key being sent to described game client according to the request that game client sends;
Receiver module is used for receiving the logging request that described game client sends, and described logging request comprises that described encryption key distribution module assignment is to the key of described network gaming user;
The login authentication module is used for the key according to described encryption key distribution module assignment, and the logging request that described receiver module receives is verified.
9. device according to claim 8 is characterized in that, described device also comprises:
Key updating module be used for upgrading described key, and the key after will upgrading sends to the game client of corresponding described network gaming user.
10. device according to claim 9 is characterized in that, described device also comprises:
The key detection module is for detection of the key updating cycle of the network gaming user that passes through checking;
Force update module, be used for forcing the key of the described network gaming user of renewal when described update cycle that described key detection module detects during greater than predetermined value.
11. each described device is characterized in that according to claim 8-10, described device also comprises:
The Transaction Identifier distribution module is used to the network gaming user by checking to distribute Transaction Identifier, and described Transaction Identifier is used for identifying this login of described network gaming user;
The Transaction Identifier authentication module, be used for when receiving the operation requests of the network gaming user that passes through checking that described game client sends, Transaction Identifier to described Transaction Identifier module assigns verifies that described operation requests comprises user ID, described Transaction Identifier and operation requests information.
12. device according to claim 11 is characterized in that, described operation requests also comprises eap-message digest, and then described device also comprises:
The request correction verification module is used for described eap-message digest is carried out verification.
13. device according to claim 12 is characterized in that, described device also comprises:
Module is set effective time, is used to the Transaction Identifier of described Transaction Identifier module assigns that is set effective time;
Effective time, judge module was used for judging whether described Transaction Identifier arranges in the effective time of module setting in described effective time, if not, then destroys described Transaction Identifier.
14. device according to claim 13 is characterized in that, described device also comprises:
The Transaction Identifier update module, be used for when described effective time judge module judge described Transaction Identifier within described effective time the time, the user who sends according to game client asks, and upgrades described Transaction Identifier.
15. a terminal is characterized in that, described terminal comprises:
The application module is used for sending to the online game security control device key application of network gaming user;
The first receiver module is used for receiving the key that described online game security control device is distributed to described network gaming user;
The logging request module, the key that is used for receiving according to described the first receiver module generates logging request, and sends described logging request to described online game security control device.
16. terminal according to claim 15, it is characterized in that, described the first receiver module also is used for receiving the key after the renewal that described online game security control device sends, and then the key after the renewal that receives according to described the first receiver module of described logging request module generates logging request.
17. terminal according to claim 16 is characterized in that, described terminal also comprises:
The second receiver module is used for receiving the Transaction Identifier that the online game security control device distributes for the network gaming user by checking, and described Transaction Identifier is used for identifying this login of described network gaming user;
The operation requests module is used for to described online game security control device transmit operation request, and described operation requests comprises Transaction Identifier and the operation requests information that user ID, described the second receiver module receive.
18. terminal according to claim 17 is characterized in that, described terminal also comprises:
Transaction Identifier update request module is used for sending the Transaction Identifier update request to described online game security control device,
Then described the second receiver module is also for the Transaction Identifier after the renewal that receives described online game security control device transmission.
CN2011103658546A 2011-11-17 2011-11-17 Controlling method, device and terminal of safety of online games Pending CN103117989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011103658546A CN103117989A (en) 2011-11-17 2011-11-17 Controlling method, device and terminal of safety of online games

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011103658546A CN103117989A (en) 2011-11-17 2011-11-17 Controlling method, device and terminal of safety of online games

Publications (1)

Publication Number Publication Date
CN103117989A true CN103117989A (en) 2013-05-22

Family

ID=48416264

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011103658546A Pending CN103117989A (en) 2011-11-17 2011-11-17 Controlling method, device and terminal of safety of online games

Country Status (1)

Country Link
CN (1) CN103117989A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104801045A (en) * 2015-03-25 2015-07-29 广州多益网络科技有限公司 Method and device for handling disconnection of mobile phone game
CN112642153A (en) * 2020-12-31 2021-04-13 星瀛科技(北京)有限公司 Method, system and equipment for transferring game control right in cloud game live broadcast process
CN116392805A (en) * 2023-06-09 2023-07-07 合肥中鸿嘉睿信息科技有限公司 Data storage method and system for online game in offline state

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110742A (en) * 2007-09-12 2008-01-23 中兴通讯股份有限公司 Wireless network game service system and using method thereof
CN101404655A (en) * 2008-11-05 2009-04-08 深圳市新飞扬数码技术有限公司 Client terminal and its method for launching communication and communication system of network game
CN101431411A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Dynamic encryption method for network game data

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101110742A (en) * 2007-09-12 2008-01-23 中兴通讯股份有限公司 Wireless network game service system and using method thereof
CN101431411A (en) * 2007-11-09 2009-05-13 康佳集团股份有限公司 Dynamic encryption method for network game data
CN101404655A (en) * 2008-11-05 2009-04-08 深圳市新飞扬数码技术有限公司 Client terminal and its method for launching communication and communication system of network game

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104801045A (en) * 2015-03-25 2015-07-29 广州多益网络科技有限公司 Method and device for handling disconnection of mobile phone game
CN104801045B (en) * 2015-03-25 2018-12-28 广州多益网络股份有限公司 A kind of processing method and processing device of hand trip broken string
CN112642153A (en) * 2020-12-31 2021-04-13 星瀛科技(北京)有限公司 Method, system and equipment for transferring game control right in cloud game live broadcast process
CN116392805A (en) * 2023-06-09 2023-07-07 合肥中鸿嘉睿信息科技有限公司 Data storage method and system for online game in offline state

Similar Documents

Publication Publication Date Title
CN108012268B (en) SIM card for ensuring safe use of application software on mobile phone terminal
US20200065795A1 (en) Resource transfer method and apparatus and storage medium
CN102724647B (en) Method and system for access capability authorization
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
CN101945366B (en) Experiential accounting method, proxy module, terminal and system
US9344896B2 (en) Method and system for delivering a command to a mobile device
JP6979966B2 (en) Account linking and service processing Providing methods and devices
CN103095457A (en) Login and verification method for application program
CN104199654A (en) Open platform calling method and device
CN105227321A (en) Information processing method, server and client
CN104320389A (en) Fusion identify protection system and fusion identify protection method based on cloud computing
CN102469419B (en) Method for charging on line, charging gateway and system of online application content
CN103974248A (en) Terminal security protection method, device and system in ability open system
CN103179176B (en) The call method that web applies under cloud/cluster environment, device and system
CN105100028A (en) Account number management method and account number management device
CN105338000A (en) Verification method and verification system
CN102971739A (en) Protecting account security settings using strong proofs
CN1786864A (en) Method for safety identification of computer
CN104301288A (en) Method and system for online identity authentication, online transaction certification, and online certification protection
CN103117989A (en) Controlling method, device and terminal of safety of online games
CN103124252A (en) Client application access authentication processing method and device
CN110611650B (en) Smooth upgrading method for operation state PKI/CA authentication system
CN109842600B (en) Method for realizing mobile office, terminal equipment and MDM equipment
CN103546295A (en) Dynamic mobile signature system and method
CN108259414B (en) Virtual resource management and control method and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20130522