CN103678841A - Monitoring alarm method and device for game - Google Patents

Monitoring alarm method and device for game Download PDF

Info

Publication number
CN103678841A
CN103678841A CN201210325847.8A CN201210325847A CN103678841A CN 103678841 A CN103678841 A CN 103678841A CN 201210325847 A CN201210325847 A CN 201210325847A CN 103678841 A CN103678841 A CN 103678841A
Authority
CN
China
Prior art keywords
virtual data
game
player
information
threshold value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210325847.8A
Other languages
Chinese (zh)
Inventor
陶惠良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
EVERYONE GAME NETWORK TECHNOLOGY DEVELOPMENT (SHANGHAI) Co Ltd
Original Assignee
EVERYONE GAME NETWORK TECHNOLOGY DEVELOPMENT (SHANGHAI) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by EVERYONE GAME NETWORK TECHNOLOGY DEVELOPMENT (SHANGHAI) Co Ltd filed Critical EVERYONE GAME NETWORK TECHNOLOGY DEVELOPMENT (SHANGHAI) Co Ltd
Priority to CN201210325847.8A priority Critical patent/CN103678841A/en
Publication of CN103678841A publication Critical patent/CN103678841A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention discloses a monitoring alarm method and device for a game according to the enforcement mode. The monitoring alarm method for the game includes the steps that virtual data to be monitored are selected; the selected virtual data of all game players are respectively monitored; information, obtained through monitoring, of the virtual data of all the game players is compared with a threshold value; based on comparison results, whether abnormities appear or not is judged. Abnormal conditions in the game can be rapidly and effectively identified through monitoring the selected virtual data of all the game players.

Description

Monitoring alarm method and the equipment of game
Technical field
Embodiments of the present invention relate to technical field of the computer network, relate more specifically to monitoring alarm method and the equipment of game.
Background technology
Along with the development of Internet technology and universal, the application program based on internet also becomes increasingly abundant and develops.Yet, usually have malice user in order to obtain the authority outside developer's allowed band, web application to be destroyed or distorted, so the safety issue of web application also more and more highlights.Particularly for online game program, it is more outstanding that this malice is distorted phenomenon.
For example, " plug-in " is exactly a kind of common cheating program, and it can realize cheating by changing the subprogram of web application.Online game plug-in normally by plug-in program grafting in the middle of games, by intercepting and revise data that game sends to game server, realize the enhancing of various functions.The malicious players of online game usually obtains his original unavailable function with the plug-in of online game, as replaces it to play, improve its attacking ability etc.
Existingly a kind ofly prevent that plug-in mode from being that the packet that client is mail to server is encrypted, and makes plug-in cannot giving out a contract for a project.Yet this mode has certain defect, be difficult to determine suitable cryptographic algorithm complexity.If data encryption algorithm is too complicated, cannot guarantee that game running is smooth; And if data encryption algorithm complexity is inadequate, often security is not high, is easily cracked.Also having a kind of plug-in mode that prevents, is that intercepting client mails to the packet of server and packet is analyzed, yet this mode is difficult to make effective strategy, with specified data bag, is cheating packet or normal data packet.
Summary of the invention
Therefore, the object of the invention is to, a kind of monitoring alarm method and equipment of game is provided.
According to an aspect of the present invention, provide a kind of monitoring alarm method of game, having comprised: the virtual data that selection will be monitored; For each player, monitor respectively selected virtual data; Information and the threshold value of the virtual data about each player obtaining by monitoring are compared; And result judges whether to occur abnormal based on the comparison.
According to a further aspect in the invention, provide a kind of monitoring alarm equipment of game, having comprised: selecting arrangement, has been configured to the virtual data that selection will be monitored; Supervising device, is configured to monitor respectively selected virtual data for each player; Comparison means, is configured to information and the threshold value of the virtual data about each player obtaining by monitoring to compare; And judgment means, be configured to result based on the comparison and judge whether to occur abnormal.
Embodiments of the present invention, by monitoring respectively selected virtual data for each player, can be identified the abnormal conditions in game quickly and efficiently.
Accompanying drawing explanation
By shown embodiment is by reference to the accompanying drawings elaborated, above-mentioned and other features of the present invention will be more obvious, and in accompanying drawing, identical label represents same or analogous element.In the accompanying drawings:
Fig. 1 shows according to the process flow diagram of the monitoring alarm method 100 of the game of one embodiment of the present invention; And
Fig. 2 shows according to the block diagram of the monitoring alarm equipment 200 of the game of an embodiment of the invention.
Embodiment
Below with reference to some illustrative embodiments, principle of the present invention and spirit are described.Should be appreciated that providing these embodiments is only used to make those skilled in the art can understand better and then realize the present invention, and not limit the scope of the invention by any way.
Process flow diagram in accompanying drawing and block diagram, illustrate architectural framework in the cards, function and operation according to the system of the various embodiments of the present invention, method and apparatus.In this, each square frame in process flow diagram or block diagram can represent a part for module, program segment or a code, and a part for this module, program segment or code comprises one or more for realizing the executable instruction of the logic function of regulation.Also it should be noted that some as alternative realization in, the function marking in square frame also can be according to being different from occurring in sequence of marking in accompanying drawing.For example, in fact the square frame that two adjoining lands represent can be carried out substantially concurrently, and they also can be carried out by contrary order sometimes, and this determines according to related function.Also be noted that, each square frame in block diagram and/or process flow diagram and the combination of the square frame in block diagram and/or process flow diagram, can utilize the function that puts rules into practice or the special-purpose hardware based system of operation to realize, or can realize with the combination of specialized hardware and computer instruction.
Below in conjunction with accompanying drawing, in the mode of example, describe various embodiment of the present invention in detail.
First with reference to figure 1, it shows according to the process flow diagram of the monitoring alarm method 100 of the game of one embodiment of the present invention.
Method 100 shown in Fig. 1 after starting, at step S101, the virtual data that selection will be monitored.
Can comprise can be along with the process accumulation of game and the virtual data changing for described " virtual data " herein, such as player's virtual objects, money value, empirical value etc.
According to the embodiment of the present invention, the virtual data that selection will be monitored in a plurality of virtual datas of player.In one embodiment, can select according to predetermined policy, for example, select the virtual data that increment in the given time should be in predetermined limits.
For example, in game, each player can obtain certain virtual objects A, virtual objects B and money value every day.According to game plan, a player can only obtain at most 5 article A every day, can obtain hundreds of part article B, and money value is just more random, may be a lot, and also may be seldom.Now, can select virtual objects A as monitored object.Because the rate of change of the quantity of article A is regular and quantitative value is limited, so can more easily monitor, change with abnormal.
Then, at step S102, for each player, monitor respectively selected virtual data.
In one embodiment, can monitor by the database of access storing virtual data.In network game service, conventionally with special database, carry out storing virtual data, can provide accessible interface at the database for storing virtual data, by this accessible interface, obtain player's virtual data, different players' virtual data can be distinguished by player's identification information, such as the account information by player is distinguished.
At step S103, information and the threshold value of the virtual data about each player obtaining by monitoring are compared.
In one embodiment, the information about virtual data comprises the metric of virtual data or the rate of change of virtual data.For example, the absolute quantity of virtual objects A, the rate of change within a day etc.Correspondingly, threshold value can be all players' mean value, or certain player's historical average growth rate etc.
Next, at step S104, result judges whether to occur abnormal based on the comparison.
In one embodiment, when the information about virtual data exceeds threshold value, be judged as and occur extremely; Otherwise, be not judged as and occur extremely.Alternatively, a tolerance limit can also be set, if about the information of virtual data and the difference of threshold value within tolerance limit, be judged as do not occur abnormal, otherwise, be judged as occur abnormal.
In one embodiment, can also first for all players, monitor selected virtual data, the total information of the virtual data about all players and total threshold value are compared; If total information surpasses total threshold value, for each player, monitor respectively selected virtual data again.
For example, have 50 players in a game, according to game plan, these 50 players can only obtain altogether 100 virtual objects A every day, and each player can only obtain at most 2 article A every day.If monitor the sum of the virtual objects A of 50 players' acquisitions, surpass 100, monitor respectively again the quantity of the article A of each player's acquisition.If the quantity of certain player's article A has surpassed 2, judgement has occurred abnormal.
Equally, this total information and total threshold value and concrete judgment mode can arrange as the information about virtual data as above and threshold value.
With reference now to Fig. 2 explanation, the equipment that can carry out said method 100, wherein Fig. 2 shows according to the block diagram of the monitoring alarm equipment 200 of the game of an embodiment of the invention.
Equipment 200 as shown in Figure 2 comprises selecting arrangement 201, supervising device 202, comparison means 203 and judgment means 204, and wherein selecting arrangement 201 is configured to the virtual data that selection will be monitored; Supervising device 202 is configured to monitor respectively selected virtual data for each player; Comparison means 203 is configured to information and the threshold value of the virtual data about each player obtaining by monitoring to compare; And judgment means 204 is configured to based on the comparison result and judges whether to occur abnormal.
In one embodiment, supervising device 202 is also configured to monitor selected virtual data for all players, if and about the total information of all players' virtual data, surpass total threshold value, for each player, monitor respectively selected virtual data.Comparison means 203 is also configured to the total information of the virtual data about all players and total threshold value to compare.
In one embodiment, supervising device 202 is also configured to monitor by the database of access storing virtual data.
In one embodiment, the metric that comprises virtual data about information or the total information of virtual data or the rate of change of virtual data.
Should be appreciated that each device of recording in equipment 200 is corresponding with each step in the method 100 of describing with reference to figure 1.Thus, the device that the operation of above describing for Fig. 1 and feature are equally applicable to equipment 200 and wherein comprise, detail repeats no more.
Equipment 200 can utilize variety of way to realize.For example, in some embodiments, can utilize software and/or firmware module to realize.In addition, also can utilize hardware module to realize.Other modes known or exploitation in the future are also feasible now, and scope of the present invention is unrestricted in this regard.
It should be noted that, the disclosed method of embodiments of the present invention can realize in the combination of software, hardware or software and hardware.Hardware components can utilize special logic to realize; Software section can be stored in storer, and by suitable instruction execution system, for example microprocessor, personal computer (PC) or large scale computer are carried out.In some embodiments, the present invention is embodied as software, and it includes but not limited to firmware, resident software, microcode etc.
And, embodiments of the present invention can also take can from computing machine can with or the form of the computer program of computer-readable medium access, these media provide program code use or be combined with it for computing machine or any instruction execution system.For the purpose of description, computing machine can with or computer-readable mechanism can be any tangible device, it can comprise, storage, communication, propagation or transmission procedure to be to be used or to be combined with it by instruction execution system, device or equipment.
Medium can be electric, magnetic, light, electromagnetism, ultrared or semi-conductive system (or device or device) or propagation medium.The example of computer-readable medium comprises semiconductor or solid-state memory, tape, removable computer diskette, random access storage device (RAM), ROM (read-only memory) (ROM), hard disc and CD.The example of CD comprises compact disk-ROM (read-only memory) (CD-ROM), compact disk-read/write (CD-R/W) and DVD at present.
It should be noted that for embodiments of the present invention are easier to understand, description has above been omitted to be known for a person skilled in the art and may to be essential some ins and outs more specifically for the realization of embodiments of the present invention.It is in order to illustrate and to describe that instructions of the present invention is provided, rather than is used for exhaustive or limits the invention to disclosed form.For those of ordinary skill in the art, many modifications and changes are all fine.
Therefore; selecting and describing embodiment is in order to explain better principle of the present invention and practical application thereof; and those of ordinary skills are understood, do not departing under the prerequisite of essence of the present invention, within all modifications and modification all fall into protection scope of the present invention defined by the claims.

Claims (8)

1. a monitoring alarm method for game, comprising:
The virtual data that selection will be monitored;
For each player, monitor respectively selected virtual data;
Information and the threshold value of the virtual data about each player obtaining by monitoring are compared; And
Result judges whether to occur abnormal based on the comparison.
2. method according to claim 1, also comprises:
For all players, monitor selected virtual data;
The total information of the virtual data about all players and total threshold value are compared;
If described total information surpasses described total threshold value, for each player, monitor respectively selected virtual data.
3. method according to claim 1 and 2, also comprises:
Database by access storing virtual data carries out described monitoring.
4. method according to claim 1 and 2, wherein, described information or total information comprise the metric of virtual data or the rate of change of virtual data.
5. a monitoring alarm equipment for game, comprising:
Selecting arrangement, is configured to the virtual data that selection will be monitored;
Supervising device, is configured to monitor respectively selected virtual data for each player;
Comparison means, is configured to information and the threshold value of the virtual data about each player obtaining by monitoring to compare; And
Judgment means, is configured to result based on the comparison and judges whether to occur abnormal.
6. equipment according to claim 5, wherein,
Described supervising device, is also configured to monitor selected virtual data for all players, and if about the total information of all players' virtual data, surpass total threshold value, for each player, monitor respectively selected virtual data;
Described comparison means, is also configured to the total information of the virtual data about all players and total threshold value to compare.
7. according to the equipment described in claim 5 or 6, wherein,
Described supervising device, is also configured to carry out described monitoring by the database of access storing virtual data.
8. according to the equipment described in claim 5 or 6, wherein, described information or total information comprise the metric of virtual data or the rate of change of virtual data.
CN201210325847.8A 2012-09-03 2012-09-03 Monitoring alarm method and device for game Pending CN103678841A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210325847.8A CN103678841A (en) 2012-09-03 2012-09-03 Monitoring alarm method and device for game

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210325847.8A CN103678841A (en) 2012-09-03 2012-09-03 Monitoring alarm method and device for game

Publications (1)

Publication Number Publication Date
CN103678841A true CN103678841A (en) 2014-03-26

Family

ID=50316376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210325847.8A Pending CN103678841A (en) 2012-09-03 2012-09-03 Monitoring alarm method and device for game

Country Status (1)

Country Link
CN (1) CN103678841A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295345A (en) * 2015-05-20 2017-01-04 腾讯科技(深圳)有限公司 A kind of method and device of Hole Detection
CN106651968A (en) * 2016-12-23 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Game exception detection method and apparatus
CN107185243A (en) * 2017-04-26 2017-09-22 厦门吉比特网络技术股份有限公司 A kind of recognition methods of network game external store
CN108014500A (en) * 2017-12-07 2018-05-11 北京像素软件科技股份有限公司 Attribute abnormal finds method and device
CN112426723A (en) * 2020-05-20 2021-03-02 上海哔哩哔哩科技有限公司 Game monitoring method and device
CN112870725A (en) * 2021-02-05 2021-06-01 北京玩在一起科技有限公司 Method for detecting electronic competitive false competition or cheating behavior and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101187959A (en) * 2006-11-17 2008-05-28 中兴通讯股份有限公司 Game cheat detection method based on decision tree
CN102163251A (en) * 2010-02-22 2011-08-24 深圳市腾讯计算机系统有限公司 Method and device for recognizing game cheating
CN102377802A (en) * 2010-08-16 2012-03-14 腾讯科技(深圳)有限公司 System and method for reducing power consumption of server
WO2012060900A1 (en) * 2010-11-02 2012-05-10 Sony Computer Entertainment America Llc Detecting lag switch cheating in game

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101187959A (en) * 2006-11-17 2008-05-28 中兴通讯股份有限公司 Game cheat detection method based on decision tree
CN102163251A (en) * 2010-02-22 2011-08-24 深圳市腾讯计算机系统有限公司 Method and device for recognizing game cheating
CN102377802A (en) * 2010-08-16 2012-03-14 腾讯科技(深圳)有限公司 System and method for reducing power consumption of server
WO2012060900A1 (en) * 2010-11-02 2012-05-10 Sony Computer Entertainment America Llc Detecting lag switch cheating in game

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106295345A (en) * 2015-05-20 2017-01-04 腾讯科技(深圳)有限公司 A kind of method and device of Hole Detection
CN106295345B (en) * 2015-05-20 2021-04-02 腾讯科技(深圳)有限公司 Vulnerability detection method and device
CN106651968A (en) * 2016-12-23 2017-05-10 宇龙计算机通信科技(深圳)有限公司 Game exception detection method and apparatus
CN106651968B (en) * 2016-12-23 2020-01-10 宇龙计算机通信科技(深圳)有限公司 Game abnormity detection method and device
CN107185243A (en) * 2017-04-26 2017-09-22 厦门吉比特网络技术股份有限公司 A kind of recognition methods of network game external store
CN108014500A (en) * 2017-12-07 2018-05-11 北京像素软件科技股份有限公司 Attribute abnormal finds method and device
CN108014500B (en) * 2017-12-07 2020-07-28 北京像素软件科技股份有限公司 Attribute exception discovery method and device
CN112426723A (en) * 2020-05-20 2021-03-02 上海哔哩哔哩科技有限公司 Game monitoring method and device
CN112426723B (en) * 2020-05-20 2023-04-21 上海哔哩哔哩科技有限公司 Game monitoring method and equipment
CN112870725A (en) * 2021-02-05 2021-06-01 北京玩在一起科技有限公司 Method for detecting electronic competitive false competition or cheating behavior and storage medium

Similar Documents

Publication Publication Date Title
CN103678841A (en) Monitoring alarm method and device for game
US8438402B2 (en) Electronic terminal, control method, computer program and integrated circuit
CN106462438B (en) The proof of host comprising trusted execution environment
CN104303148B (en) Update component software
US20180309770A1 (en) An anomaly detection method for the virtual machines in a cloud system
CN104836781B (en) Distinguish the method and device for accessing user identity
CN1969500B (en) Securing software
US20130198840A1 (en) Systems, methods and computer programs providing impact mitigation of cyber-security failures
JP2018535490A (en) Service processing method and apparatus
Rush et al. Coevolutionary agent-based network defense lightweight event system (CANDLES)
Baca et al. Prioritizing countermeasures through the countermeasure method for software security (CM-Sec)
CN105550875A (en) System and method for protecting electronic money transactions
CN108351938B (en) Apparatus, system, and method for verifying a security value computed for a portion of program code
CN112995236B (en) Internet of things equipment safety management and control method, device and system
CN109447651A (en) Business air control detection method, system, server and storage medium
Elahi et al. Security risk management by qualitative vulnerability analysis
Shavit What does it take to catch a Chinchilla? Verifying rules on large-scale neural network training via compute monitoring
Xie et al. You can promote, but you can't hide: large-scale abused app detection in mobile app stores
Ceccato et al. Codebender: Remote software protection using orthogonal replacement
JP2010541086A (en) Tamper resistant technology
CN108256351B (en) File processing method and device, storage medium and terminal
Baca Developing secure software: In an agile process
CN116910816B (en) Multiparty asset collaborative management method and device for improving privacy protection
CN103443762A (en) Method and apparatus for moving a software object
KR101210258B1 (en) method for displaying information about hack tool usage in online game

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140326

WD01 Invention patent application deemed withdrawn after publication