CN106411880A - Security encryption and decryption methods and devices for game data - Google Patents
Security encryption and decryption methods and devices for game data Download PDFInfo
- Publication number
- CN106411880A CN106411880A CN201610856558.9A CN201610856558A CN106411880A CN 106411880 A CN106411880 A CN 106411880A CN 201610856558 A CN201610856558 A CN 201610856558A CN 106411880 A CN106411880 A CN 106411880A
- Authority
- CN
- China
- Prior art keywords
- game
- data
- game data
- plug
- browser
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/71—Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
Abstract
The invention discloses a security encryption method for game data. The method comprises the following steps: acquiring game data; calculating a feature code value of the game data; performing asymmetrical operation on the acquired feature code value to generate encrypted data of the game data; and transmitting the encrypted data of the game data to a browser client. Through adoption of the security encryption method, the security of the game data can be ensured, in particular security verification can be performed on game data provided by a third party when a game is pushed through a browser platform, namely, when a universal browser plugin is used for loading game data to implement a webpage game, so that providing of invalid data due to hijack of game request data is avoided; a flow of requesting data once again can be triggered automatically under the condition of failure in checking the game data; and exceptional conditions of the game data can be repaired automatically.
Description
Technical field
The present invention relates to Internet technical field, the safe encryption and decryption method of more particularly, to a kind of game data and plus
Close, deciphering device.
Background technology
With scientific and technical continuous development, computer is widely available, and the work giving people and life bring all
Facilitate more.Increasingly fashionable with computer game, the species of game gets more and more, and quantity is increasing, and people need to unify
Provide game platform.Potentially act as such platform now with some clients or search engine, but be only limitted to carry
For computer game installation kit, user needs downloading computer game installation kit to computer and carries out installing and could use.By
Do not need to download, install in web game, logging in network address at any time can be carried out, and because the data of web game is stored in taking
Business device or high in the clouds, all can be carried out on any terminal unit using account, thus web game increasing prevalence in recent years.How
Provide a user with game data is the present big problem needing and solving safe efficiently.Web game needs browser to prop up
Hold, the provider of current web game needs oneself exploitation plug-in unit, so that browser can call web game and load.
Almost it is directed to every money game, a plug-in unit will be developed, thus causing great manpower to waste;And in terminal, plug-in component operation, open
Dynamic ES, when user's active accesses browser using high authority or is not having authority to limit under the system with authority restriction
System under when accessing browser, because plug-in unit is provided by various developers, plug-in unit is operable to all on hard disk in terminal
Data, the safety of user terminal is difficult to be guaranteed, and leads to browser to produce security breaches.Carry to user terminal in server
For the process of game data, if game request data or game data are held as a hostage, then terminal is likely to be received threat letter
Breath is it is also possible to lead to browser to produce security breaches.
Content of the invention
In view of the above problems it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on
That states problem does a kind of safe checking method of game data and device.
A kind of one aspect of the present invention, there is provided safe encryption method of game data, the method includes:
Obtain game data;
Calculate the feature code value of described game data;
Acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
The encryption data of described game data is sent to browser client.
Optionally, described document information is the MD5 value of game data.
Optionally, the method also includes:
Pre-set domain name list and white list;
When accessing a game, give its domain name and Gkey value, according to the domain name being given, Gkey value to domain name
List, white list are updated, and configure store path information according to the storage address of game data.
Optionally, game data is obtained according to the process asked.
Optionally, the method also includes:
Receive the game request from browser client;
Parse described game request, the unique mark of request game to determine, and it is determined based on described unique mark
Store path;
The encryption data of game data according to described store path direct access, or obtained according to described store path
Take described game data.
Optionally, described unique mark is and corresponding domain name or the G-key value of playing.
The present invention also provides a kind of secure decryption method of game data, and the method includes:
Game running request is sent by browsing device net page;
Receive encrypted lottery data from browser server;
Described encrypted lottery data is decrypted, and loads the game data after described deciphering with net using a plug-in unit
Page runs described game, and this plug-in unit has predetermined interface, corresponding with the interface of game data.
Optionally, the method is in step:Game running request is sent by browsing device net page, afterwards, also includes:
Receive the response data that browser server returns;
Searched based on described response data and open this plug-in unit.
Optionally, without finding this plug-in unit, then go to obtain plug-in unit installation kit based on described response data, and carry out
The installation of described plug-in unit, described this plug-in unit of opening specifically includes:Using described response data, this plug-in unit is initialized, and plus
Download the plugin.
If it is not required, then being loaded directly into the game data after described deciphering.
Optionally, this plug-in card configuration has Gkey parameter, and described Gkey parameter is used for being assigned the exclusive identification code of game.
The present invention also provides a kind of safe encryption device of game data, and this device includes:
Acquisition module, for obtaining game data;
Feature code value computing module, for calculating the feature code value of described game data;
Asymmetric computing module, for acquired feature code value is carried out with asymmetric computing, generates adding of game data
Ciphertext data;
First sending module, for sending the encryption data of described game data to browser client.
Optionally, described document information value computing module is MD5 value computing module.
Optionally, this device also includes:
Preset module, is used for pre-setting domain name list and white list;
Update configuration module, for when accessing a game, giving its domain name and Gkey value, according to the domain being given
Name, Gkey value are updated to domain name list, white list, and the storage address configuration store path letter according to game data
Breath.
Optionally, described acquisition module is according to the store path acquisition of information game data being configured.
Optionally, described acquisition module obtains game data according to the process asked.
Optionally, this device also includes:
First receiver module, for receiving the game request from browser client;
Game request parsing module, for parsing described game request, the unique mark of request game to determine, and base
Determine its store path in described unique mark;
The encryption data of described acquisition module game data according to described store path direct access, or according to institute
State store path and obtain described game data.
Optionally, described unique mark is and corresponding domain name or the G-key value of playing.
The present invention also provides a kind of secure decryption device of game data, and this device includes:
Second sending module, for sending game running request by browsing device net page;
Second receiver module, for receiving encrypted lottery data from browser server;
Deciphering module, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined connecing
Mouthful, corresponding with the interface of game data;
Processing module, for generating webpage to run described game according to the game data after described deciphering.
Optionally, described second receiver module, is additionally operable to receive the response data that browser server returns;
Described processing module, for initializing plug-in unit plus download the plugin based on described response data.
This plug-in unit is provided with Gkey parameter, and the exclusive identification code played is assigned by described processing module based on described response data
Give described Gkey parameter.
The technical scheme providing in the embodiment of the present application, at least has the following technical effect that or advantage:
In the embodiment of the present application, by the encryption to game data, ensure that the safety of game data.
When pushing game particularly by browser platform, game data is loaded by general browser plug-in unit and realize webpage
During game, the game data that third party can be provided carries out safety check, thus avoid game request data to be held as a hostage leading to
Invalid data offer, and inspection game data failure in the case of, can automatically trigger re-request data
Flow process, therefore, it is possible to automatically be repaired to the abnormal conditions of game data.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area
Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention
Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows a kind of flow process that game data is carried out with the method that safety is encrypted according to an embodiment of the invention
Figure;
The flow chart that Fig. 2 shows the operation web game according to one specific embodiment of the present invention;
Fig. 3 shows a kind of flow process of method that game data is carried out with secure decryption according to an embodiment of the invention
Figure;
Fig. 4 showsA kind of structure that game data is carried out with the device that safety is encrypted according to an embodiment of the invention
Figure;
Fig. 5 showsA kind of structure of device that game data is carried out with secure decryption according to an embodiment of the invention
Figure.
Specific embodiment
Embodiments of the invention are described below in detail, the example of described embodiment is shown in the drawings, wherein from start to finish
Same or similar label identifies same or similar element or the element with same or like function.Below with reference to attached
The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, "
Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that arranging used in the description of the present invention
Diction " inclusion " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existing or adding
Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit
Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist
Intermediary element.Additionally, " connection " used herein or " coupling " can include wirelessly connecting or wirelessly coupling.Used herein arrange
Diction "and/or" includes one or more associated list the whole of item or any cell and combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art
Language and scientific terminology), there is the general understanding identical meaning with the those of ordinary skill in art of the present invention.Also should
Be understood by, those terms defined in such as general dictionary it should be understood that have with the context of prior art in
The consistent meaning of meaning, and unless by specific definitions as here, otherwise will not use idealization or excessively formal implication
To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal unit " had both included wireless communication
The equipment of number receptor, it only possesses the equipment of the wireless signal receiver of non-emissive ability, includes receiving and transmitting hardware again
Equipment, its have can on bidirectional communication link, execute two-way communication reception and transmitting hardware equipment.This equipment
Can include:Honeycomb or other communication equipments, it has single line display or multi-line display or does not have multi-line to show
The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), it can
With combine voice, data processing, fax and/or its communication ability;PDA (Personal Digital Assistant, personal
Digital assistants), it can include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day
Go through and/or GPS (Global Positioning System, global positioning system) receptor;Conventional laptop and/or palm
Type computer or other equipment, its have and/or include the conventional laptop of radio frequency receiver and/or palmtop computer or its
His equipment." terminal " used herein above, " terminal unit " they can be portable, can transport, be arranged on the vehicles (aviation,
Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth
And/or any other position operation in space." terminal " used herein above, " terminal unit " can also be communication terminal, on
Network termination, music/video playback terminal, for example, can be PDA, MID (Mobile Internet Device, mobile Internet
Equipment) and/or there is mobile phone or the equipment such as intelligent television, Set Top Box of music/video playing function.
Those skilled in the art of the present technique are appreciated that server used herein above, high in the clouds, remote network devices etc. are general
Read, there is effects equivalent, it includes but is not limited to computer, network host, single network server, multiple webserver collection
Or the cloud that multiple server is constituted.Here, cloud is taken by a large amount of computers based on cloud computing (Cloud Computing) or network
Business device is constituted, and wherein, cloud computing is one kind of Distributed Calculation, and one be made up of a group loosely-coupled computer collection super
Virtual machine.In embodiments of the invention, can be by any logical between remote network devices, terminal unit and WNS server
Letter mode realizes communicating, including but not limited to, mobile communication based on 3GPP, LTE, WIMAX, based on TCP/IP, udp protocol
Computer network communication and the low coverage wireless transmission method based on bluetooth, infrared transmission standard.
It will be appreciated by those skilled in the art that " application ", " application program ", " application software " and the class alleged by the present invention
Like the concept of statement, it is the same concept well known to those skilled in the art, refers to be instructed and related data by series of computation machine
The computer software being suitable to electronics operation of the organic construction of resource.Unless specified, this name itself is not subject to programming language
Species, rank, operating system of operation of also not rely by it or platform institute are limited.In the nature of things, this genus is not subject to appoint yet
The terminal of what form is limited.
The method of the present invention and its device, can be software by programming realization, be installed to computer, mobile terminal etc. and set
Run in standby, these equipment, the concrete grammar realized according to it and the difference of device, and shown as client, service end
Etc. form.Specifically, the safe encryption method of game data proposed by the present invention and the suitable configuration of related device have clothes
In the computer equipment of business device ability, and construct a high in the clouds control system, provide game data or sensing to client
The target of game data is provided.The secure decryption method of game data proposed by the present invention and related device suitably configure in individual
In computer and the mobile terminal device such as mobile phone, panel computer, client is constructed with this.
A kind of one aspect of the present invention, there is provided safe checking method of game data, as shown in figure 1, the method bag
Include:
S11. obtain game data;
S12. calculate the feature code value of described game data;
S13. acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
S14. the encryption data of described game data is sent to browser client.
The method, by the encryption to game data, ensure that the safety of game data.
In step sl, the game data of acquisition is about the All Files needed for running game, including exe file, d11
The file of the various form such as file, these files are stored in the precalculated position of server.In response user to game process
Control data, provide respective page data when, server be based on IE kernel loads mechanism, obtain respective page related data.
In order to ensure that this related data can be safely supplied to client, using digital signature individual's key signature data it
Before, computing is encrypted to page related data, as a kind of cipher mode of innovation proposed by the present invention, first related to the page
Data carries out eigenvalue calculation, then carries out asymmetric encryption to the eigenvalue calculating.As preferably a kind of mode, can adopt
Use MD5 algorithm, carry out the calculating of eigenvalue, by using md5 encryption algorithm, 32 character strings of a fixation can be produced.
Rivest, shamir, adelman is recycled to produced 32 fixed character strings, generates a pair of key, public key is supplied to user side,
For being encrypted to the request data of its server to be sent to, and the request being sended over using the user that private key pair receives
Data is decrypted.As it is known by the man skilled in the art that although asymmetric arithmetic level of security is higher, because of its size of the secret key relatively
Greatly, and for encrypting, time of deciphering symmetry algorithm that compares longer, typically on the securely transmitting and verify of game data not
Used, and the application is directed to browser client using the trip transferring storage on server based on the Plugin Mechanism of IE kernel
Building the situation of info web, that is, on the one hand this plug-in unit needs the game-related identity information sending using server to play data
Initialized, the danger that the presence of one side game data is trapped, forges, a kind of special security mechanism proposing, due at this
In the case of kind, the data volume of transmission is little, and the impact in speed being brought using asymmetric arithmetic is negligible.Certainly, originally
Apply for not limiting to and be applied to situation recited above, in the case that the data volume transmitting is little and security requirement is high, this
The safe encryption method that application proposes is all applicable.
Game data in order to realize using being transferred storage on server based on the Plugin Mechanism of IE kernel is built
Info web, in server end, needs to pre-set domain name list and white list, and domain name list is used for being stored as access
The domain name that game gives, for accessing in browser client, described white list is used for the identity of the accessed game of storage
Mark, as one kind preferred embodiment, gives game one Gkey value and is used as its unique mark, described white list is used for depositing
Store up the Gkey value of accessed game.Thus can interpolate that whether a game is passed through based on domain name list and white list
The game of authentication, that is, judge whether the game of user's request is the game that can push by described plug-in unit.
Before browser accesses a game, need to carry out backstage configuration, the configuration of described backstage includes:Give game domain name and
Gkey value, and domain name list, white list are updated;The acquisition approach of configuration game data, game data at least includes should
With DLL (Dynamic Link Library) file or the EXE file of program, certainly also include some physical contents, such as scheme
Piece, word and signature file.By domain name mapping and after determining that the Gkey value parsing belongs to white list, load plug-in unit,
By the initialization to plug-in unit, give its Gkey parameter Gkey value, and according to the configuration information of game, it is configured.Initially
After change, plug-in unit is based on routing information by interface and progress information calls game data, such as DLL (Dynamic Link
These invoked game datas are encrypted based on call request by Library) file or EXE file in server end
Process, include carrying out eigenvalue calculation, and asymmetric encryption is carried out to described eigenvalue, then the data is activation after encrypting is given
Plug-in unit, described plug-in component operation security mechanism, the data after the described encryption receiving is decrypted, afterwards using the trip after deciphering
Play data builds, renders webpage.
Described plug-in unit is a kind of computer program, it then follows the application programming interfaces of certain specification are write out, by and webpage
The interaction of browser to increase specific function for described web browser, and that is, web browser is capable of the trip of invoking server storage
Play data and on webpage execute.Described plug-in unit is to be write based on Microsoft's Plugin Mechanism, with compatible all of browser, is writing
During described plug-in unit, for this plug-in card configuration Gkey parameter, for being assigned unique mark of the game executing on a web browser in the future
Know code.After installing this plug-in unit, web browser can directly invoke this according to the unique mark that generates when registering this plug-in unit and insert
Part.In prior art, usually one plug-in unit corresponds to an application program, and a plug-in unit corresponds to a game in other words, browses
When asking some application programs to be played in other words, server can be sent to user to be needed to install the instruction of predetermined plug-in unit device, and
The download address of plug-in unit is sent to user, user only installs the game that this plug-in unit could be asked in browser execution.One
These plug-in units of denier are installed, and when starting browser every time, automatically load all mounted plug-in units from local later, this
It is exactly one of the reason why a lot of browsers start slower now.The plug-in unit that the application is proposed, independent of browser, leads to
Cross using the analysis result to user input domain name, it is determined whether call this plug-in unit, need to call the situation of this plug-in unit determining
Under, recycle the unique mark that this plug-in unit produces when IE kernel is registered to carry out lookup and the loading of this plug-in unit, therefore this plug-in unit
The toggle speed of slow browser can't be dragged, also will not additionally consume process resource.Due to the purpose of design of this plug-in unit be in order to
Call in web browser and run all of game, this plug-in card configuration has Gkey parameter, call different answering using this plug-in unit
During with program sequence, it is this Gkey parameter and gives the called Gkey value of application program and corresponding configuration information, thus
As long as plug-in unit is consistent with the interface of game in programming, this plug-in unit just can load any game, thus avoiding operation one
The situation of a plug-in unit is just installed in game, not only greatly reduces the exploitation of supporting plug-in unit of playing it is only necessary to install a plug-in unit,
The i.e. compatible all of game with predetermined interface, and be when running browser, do not needing to run the situation of plug-in unit
Under, you can not start plug-in unit, greatly save the consumption of process resource.
The domain name list of correlation having the game that can run with browser and white is safeguarded in the backstage of browser or high in the clouds
List, domain name list is stored as the domain name of each application assigned;Described white list stores each application program promising
The Gkey value of distribution.Preferably, the configuration file played for each is also safeguarded in the backstage of browser or high in the clouds, this configuration
File can be dll file or exe file, to indicate game initial data, the acquisition approach of signed data and to add
Decryption information.As a kind of specific embodiment, configuration file is associated by Gkey value with domain name list, white list.By upper
State the maintenance in backstage or high in the clouds, reach the interaction of plug-in unit and browser server.
When user is in terminal inputs domain name, browser receives this domain name request, and parses domain name request, parsing domain name
Process can complete in terminal it is also possible to the server side in browser completes, if completed in terminal, needs to arrange domain name
Table and white list are stored in locally, when browser is upgraded, automatically update domain name list and white list, this situation
Under, the upgrading number of times of client browser may be some more, if the server side in browser completes, only need to server
Domain name list and white list are safeguarded in side or high in the clouds, and the browser of client will not need because of the renewal of domain name list and white list
Upgrade.Such as user input domain name:http:Wan.360.sgkey=ly/skey=1000, first determines whether described input
Whether domain name belongs to domain name list, if belonged to, parses domain name further, determines game unique mark Gkey value ly, Gkey
Value is the unique mark of application program, especially at present in computer game, including client game and web game aspect, each
Game all can be endowed unique mark Gkey value, usually game name acronym.White name is inquired about according to described Gkey value
Single, it is determined whether to belong to white list, thereby determine that this application program is the product that browser can push.Will this Gkey value send
To described plug-in unit, with its Gkey parameter described in assignment, the detailed process of assignment is:Given birth to when IE kernel is registered according to described plug-in unit
The unique mark becoming searches described plug-in unit in systems, and described Gkey value is given the described Gkey in the described plug-in unit finding
Parameter.After Gkey value is given the described Gkey parameter in the described plug-in unit finding, call this plug-in unit.Carried by browser
For API application programming interface access this plug-in unit.Plug-in unit to there being the plug-in unit property file being compressed together, including one
Manifest file, one or more HTML html files, optionally one or more javascript files,
Optionally any desired alternative document (such as picture).Wherein, Manifest file is generally json form, wherein contains
The essential information of plug-in unit, for example most important listed files, authority required for application (extension) etc..When developing plug-in unit,
These files are all put under same catalogue, when issuing plug-in unit, the file under this catalogue is all bundled to a .crx's
In compressed file, browser kernel, when rendering browser main frame, can extract in plug-in unit property file and set for plug-in unit
The loading position put, at the interface of this loading position display game.So that game can be loaded by plug-in unit just can transport
OK, technically, game needs using the DLL consistent with described plug-in unit.By interface, plug-in unit directly invokes game number
According to.When plug-in unit calls game data, browser server end is encrypted to the game data being called, specifically can be first
It is entered with row operation, has generated condition code, the ripe algorithm of existing generation condition code is MD5 algorithm, and the application preferably employs
MD5 algorithm.Then asymmetric computing is carried out to the condition code generating, generate encryption data, encryption data is sent to browser
Client, is decrypted process by described plug-in unit.Game data is storable in third-party server and (services at game developer
Device), browser server or game-specific server, high in the clouds, here, do not do any to the storage location of application data
Limit.The application, by using the mode of the encryption of feature code value and the double-encryption of asymmetric encryption, not only accesses trip to user
The response data of play request carries out above-mentioned encryption, also concrete game data is encrypted, therefore, it is possible to ensure client plug-in
Initialization and the loading of game data safely carry out, and the digital signature to Game Setting for the game provider can be preserved.
As a kind of specific embodiment, user needs to play web game, as shown in Fig. 2 process is as follows:
S31. first log into browser, after browser is opened, user needs run which game, that is, pass through to click on
Icon on browser or domain name link, such as user input domain name request http:
Wan.360.sgkey=ly1/skey=1000;
S32. browser client is based on user operation and generates domain name request;
S33. this domain name request is sent to server;
S41. this domain name is mated by server with the domain name list prestoring, and determines whether this domain name belongs to domain name
List (browser server that is stored with domain name list is by the domain name the allocated by the game of web page display in need);
S42.If it is, server may proceed to this domain name is parsed, otherwise server domain name is not carried out any
Process, be returned only to the invalid information of terminal domain name.Parse domain name according to domain name establishment rules, determine asked trip
Play as ly1 (Gkey value);
S43. according to the backstage configuration information that the inquiry of Gkey value ly1 is corresponding, and this configuration information is sent to terminal
Browser;
S34. terminal browser inquires about described plug-in unit;
S35. without installation, then send, to server, the request obtaining plug-in unit installation kit;
If S36. installing, this plug-in unit being initialized based on described configuration information and loads described plug-in unit;
S37. according to the game data on described configuration information invoking server to run ly1 game.
When once wanting to play ly2 game on user, user does not need download plug-in again, but the input (ratio according to user
As inputs domain name http:Wan.360.sgkey=ly2/skey=1000), browser client generates domain name request information, and
This domain name request is sent to server, this domain name is mated by server with the domain name list prestoring, and determines this domain
Whether name belongs to the domain name list prestoring, and (the browser operator that is stored with domain name list is in need by webpage exhibition
The the allocated domain name of the application program showing), if it is, server may proceed to this domain name is parsed, otherwise server
Any process is not carried out to domain name, be returned only to the invalid information of terminal domain name.Parse described domain according to domain name establishment rules
Name, determines that asked game is ly2 (Gkey value, the exclusive identification code of game), is inquired about according to Gkey value ly2 corresponding
Backstage configuration information, and this configuration information is sent to terminal browser, terminal browser is based on described configuration information initialization
Plug-in unit, then loads described plug-in unit, and plug-in unit can directly invoke game data to run ly2 game according to described configuration information.
Therefore, user only needs to install a plug-in unit, and all of web game of browser all can be carried out.Because this plug-in unit is based in IE
Core, its almost all compatible use of compatible domestic all of browser, such as IE browser IE6-IE11 and Webkit browser.
And, as long as the exploitation of games is consistent with the DLL of developing plug, browser only needs to install a plug-in unit, you can
Run all of web game.Compare relatively current, often run a web game, nearly all will download a plug-in unit and install
Web game can be run, the application, after installing a plug-in unit, simply enters domain name and can run various different web pages game, letter
The time changed user operation and greatly shortened web game start-up loading.
Actually conventionally, as the restriction to System Privileges for the browser itself, such as under winsa or 97
Because the setting of authority, it is generally basede on medium authority and accesses browser, even if some need to obtain the game of system high authority
In browser, plug-in unit is installed also cannot run at all.And the plug-in unit of the application is safe, general, its signature can obtain clear
Look at the accreditation of device, more therefore need the game obtaining system high authority also can be transported in browser by this plug-in unit
OK.On the other hand, due in the application plug-in unit simply call game, and the signature file of game is not modified, in trip
Its signature being obtained when play is by plug-in component operation, thus distinguishing the signature of game and the signature of plug-in unit, being convenient to accomplish net
The ownership person of network acts responsibility, consequently facilitating definite network safety responsibility.
Because plug-in unit does not need to change the digital signature of game, the application passes through this plug-in unit can be by the trip of reliable signature
Play is embedded in the precalculated position of browser, and ratio is such as embedded within title bar or floating window, and reliability is not known or other
Reason needs the game of retention figures signature only to load by plug-in unit by way of domain name request.Thus the invention allows for
There is provided by way of game by webpage by two kinds of differences, and no matter by the way of which kind of provides web game, the application is
It is provided that the game data encrypted using front described encryption method, described game data includes game configuration information and game is opened
Service data after beginning.
After loading plug-in unit, due to setting up corresponding relation with game, you can described game is carried out with upgrading detection;As
Fruit needs to upgrade, then call upgrading data according to backstage configuration information, to obtain the latest data of game, runs latest edition
Game.The application does not need user to carry out any operation about upgrading so that it may ensure that the application program that user runs is up-to-date
Version.
The present invention also provides a kind of secure decryption method of game data, as shown in figure 3, the method includes:
S21. game running request is sent by browsing device net page;
S22. receive encrypted lottery data from browser server;
S23. described encrypted lottery data is decrypted, and using one plug-in unit load described deciphering after game data with
Run described game in webpage, this plug-in unit has predetermined interface, corresponding with the interface of game data.
The application passes through above-mentioned secure decryption method, in the case of game data reception exception, data can be abandoned
Process, in the case of game data reception failure, automatically can carry out repetitive requests, thus game can be accessed in request and swim
Automatically repaired in play interaction.
By browsing device net page send game running request after, based on the number of responses returning from browser server it is investigated that
Look for and open this plug-in unit.Without finding this plug-in unit, then go to obtain plug-in unit installation kit based on described response data, and carry out
The installation of described plug-in unit, described this plug-in unit of opening specifically includes:Using described response data, this plug-in unit is initialized, and open
Move and join this plug-in unit.Not just search and open plug-in unit if based on the response data returning from browser server, then browse
Device can be loaded directly into game data or the encrypted lottery data fed back.
Described plug-in unit is not intended as the startup item of browser, and therefore this plug-in unit will not increase the burden of browser, both will not
The respond of impact browser.
This plug-in card configuration has Gkey parameter, and described Gkey parameter is used for being assigned the exclusive identification code of game, for loading
The situation of different game, carries out the initialization of different game configuration information to this plug-in unit.Give described Gkey ginseng including described
Gkey values of number game and for path parameter configuration path information etc., this plug-in unit is suitable to load all of game, as long as playing
With plug-in unit, there is corresponding interface, and the game in the white list belonging on browser server of playing.
As another aspect of the present invention, the present invention also provides a kind of safe encryption device of game data, and this device can
Think the main frame with server capability, as shown in figure 4, this device includes:
Acquisition module 50, for obtaining game data;
Feature code value computing module 51, for calculating the feature code value of described game data;
Asymmetric computing module 52, for acquired feature code value is carried out with asymmetric computing, generates game data
Encryption data;
First sending module 53, for sending the encryption data of described game data to browser client.
Respond the control data to game process for the user in server or high in the clouds, provide respective page data when, clothes
Business device is based on IE kernel loads mechanism, obtains respective page related data.In order to ensure that this related data can safely be carried
Supply client, before using digital signature individual's key signature data, first carries out eigenvalue calculation to page related data,
Again asymmetric encryption is carried out to the eigenvalue calculating.The application is directed to browser client using the plug-in unit based on IE kernel
Mechanism transfers the situation to build info web for the game data storing on server, and that is, one side client is based on IE kernel
Plug-in unit needs the game-related identity information sending using server to be initialized, and the presence of another aspect game data is cut
The danger obtain, forged, the security mechanism for server end that the application proposes, even if can ensure that third party is opened by server
The game sent out is supplied to client, also can ensure that game data is difficult to crack and is trapped forgery, can greatly protect
The safety of barrier browser.
As a kind of preferred implementation, described document information value computing module is MD5 value computing module.Because even two
Subtleties are had, 32 character string gaps that it calculates also can be very big, and therefore MD5 algorithm has on safety check between data
There are absolute advantagess, and no matter original data volume is much, be 32 character strings after calculating using MD5, in this character string base
Asymmetric computing is carried out on plinth, the safety of data can be further ensured that, and because operational data amount is few, can fully demonstrate
The high feature of asymmetric computing level of security, can not embody the inferior position that asymmetric computing requires time for length again.
This device also includes:
Preset module, is used for pre-setting domain name list and white list;
Update configuration module, for when accessing a game, giving its domain name and Gkey value, according to the domain being given
Name, Gkey value are updated to domain name list, white list, and the storage address configuration store path letter according to game data
Breath.
Optionally, described acquisition module is according to the store path acquisition of information game data being configured, or according to described
Acquisition module obtains game data according to the process asked.
Optionally, this device also includes:
First receiver module, for receiving the game request from browser client;
Game request parsing module, for parsing described game request, the unique mark of request game to determine, and base
Determine its store path in described unique mark;
The encryption data of described acquisition module game data according to described store path direct access, or according to institute
State store path and obtain described game data.
Optionally, described unique mark is and corresponding domain name or the G-key value of playing.
Safe encryption device proposed by the present invention, especially embodies on the server, can be as game promotion platform
Browser provides secure data, even if promote is third-party game data, or even is stored on third-party server
Game data, by using safe encryption device proposed by the present invention, can transfer game data for browser terminal in real time
Safety check is provided to generate it is ensured that data safety during webpage.
The present invention also provides a kind of secure decryption device of game data, this secure decryption device body on the subscriber terminal
Existing, as shown in figure 5, this device specifically includes:
Second sending module 61, for sending game running request by browsing device net page;
Second receiver module 62, for receiving encrypted lottery data from browser server;
Deciphering module 63, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined
Interface, corresponding with the interface of game data;
Processing module 64, for generating webpage to run described game according to the game data after described deciphering.
Described game data includes play backstage configuration information and concrete game running data, using Plugin Mechanism to institute
State encrypted lottery data to be decrypted, browser client can be to verifying out abnormal data, by abandoning by decrypting process
Abnormal data, re-start the request of game data, game data friendship can be carried out in the interaction with server for the terminal
The mutually automatic reparation of process exception, it can be avoided that user intercepts and captures game data provides a user with abnormal data,
Optionally, this device includes:
Second receiver module, for receiving the response data of browser server return;
Processing module, for judging whether to need to run a plug-in unit based on described response data,
If it is required, then judging whether terminal has installed this plug-in unit, without installation, then it is based on described response data
Go to obtain plug-in unit installation kit, and carry out the installation of described plug-in unit, if having installed this plug-in unit, using described response data to this
Plug-in unit is initialized, and plus download the plugin.
If it is not required, then being loaded directly into the game data after described deciphering.
Optionally, this plug-in card configuration has Gkey parameter, and described Gkey parameter is used for being assigned the exclusive identification code of game.
The technical scheme providing in the embodiment of the present application, at least has the following technical effect that or advantage:
In the embodiment of the present application, by the encryption to game data, ensure that the safety of game data.
When pushing game particularly by browser platform, game data is loaded by general browser plug-in unit and realize webpage
During game, the game data that third party can be provided carries out safety check, thus avoid game request data to be held as a hostage leading to
Invalid data offer, and inspection game data failure in the case of, can automatically trigger re-request data
Flow process, therefore, it is possible to automatically be repaired to the abnormal conditions of game data.
Herein described method can compatible almost all of browser (as long as the browser based on IE kernel development,
Such as IE6-IE11, Webkit etc.), any game write with predetermined interface can be loaded, compatibility is very strong.
The application by way of distinguishing using user input domain name loading application programs, and can utilize embedded, net
Page downloads the mode of application program, can have application program and other bad third parties determining safety of reliable signature
The application program isolation load of signature is run, and can on the one hand ensure the safety of browser, enabling to browser can load again
The extensively application program of digital signature.
Actually present invention also offers to distinguish provide method and the browser of application program using various ways, the
A kind of mode be by for application assigned domain name thus with respond user's domain name request by way of loading application programs, this
Mode is applied to the very not reliable application program of digital signature, the trip of the application program that such as third party provides, especially webpage
Play, client game;The second way is in the way of the precalculated position that application program is directly embedded into browser, by user's point
Hit browsing device net page precalculated position and be loaded directly into application program, the second way is adapted to the digital signature with browser trust
Application program, thus the application also proposed by browser by different way to provide different safety class application journey
Sequence.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention,
And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can
Become apparent, below especially exemplified by the specific embodiment of the present invention.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein.
Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system
Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various
Programming language realizes the content of invention described herein, and the description above language-specific done is to disclose this
Bright preferred forms.
In description mentioned herein, illustrate a large amount of details.It is to be appreciated, however, that the enforcement of the present invention
Example can be put into practice in the case of not having these details.In some instances, known method, structure are not been shown in detail
And technology, so as not to obscure the understanding of this description.
Similarly it will be appreciated that in order to simplify the application and help understand one or more of each inventive aspect,
Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes
In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor
The application claims of shield more features than the feature being expressly recited in each claim.More precisely, it is such as following
Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore,
The claims following specific embodiment are thus expressly incorporated in this specific embodiment, wherein each claim itself
All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that and the module in the equipment in embodiment can be carried out adaptively
Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list
Unit or assembly be combined into a module or unit or assembly, and can be divided in addition multiple submodule or subelement or
Sub-component.In addition to such feature and/or at least some of process or unit exclude each other, can adopt any
Combination is to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed
Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power
Profit requires, summary and accompanying drawing) disclosed in each feature can carry out generation by the alternative features providing identical, equivalent or similar purpose
Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments
Including some features rather than further feature, but the combination of the feature of different embodiment means to be in the scope of the present invention
Within and form different embodiments.For example, in the following claims, embodiment required for protection any it
One can in any combination mode using.
The all parts embodiment of the present invention can be realized with hardware, or to run on one or more processor
Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice
Microprocessor or digital signal processor (DSP) come to realize gateway according to embodiments of the present invention, proxy server, in system
Some or all parts some or all functions.The present invention is also implemented as executing side as described herein
Some or all equipment of method or program of device (for example, computer program and computer program).Such
The program realizing the present invention can store on a computer-readable medium, or can have the shape of one or more signal
Formula.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other shape
Formula provides.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability
Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims,
Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not
Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such
Element.The present invention can come real by means of the hardware including some different elements and by means of properly programmed computer
Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch
To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame
Claim.
The invention provides following technical proposal:
A1, a kind of safe encryption method of game data are it is characterised in that the method includes:
Obtain game data;
Calculate the feature code value of described game data;
Acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
The encryption data of described game data is sent to browser client.
A2, the method according to A1, are further characterized in that, described document information is the MD5 value of game data.
A3, the method according to A1 or A2, are further characterized in that, the method also includes:
Pre-set domain name list and white list;
When accessing a game, give its domain name and Gkey value, according to the domain name being given, Gkey value to domain name
List, white list are updated, and configure store path information according to the storage address of game data.
A4, the method according to A3, are further characterized in that, according to the store path acquisition of information game number being configured
According to.
A5, the method according to any one of A1-A4, are further characterized in that, obtain game number according to the process asked
According to.
A6, the method according to any one of A1-A5, are further characterized in that, the method also includes:
Receive the game request from browser client;
Parse described game request, the unique mark of request game to determine, and it is determined based on described unique mark
Store path;
The encryption data of game data according to described store path direct access, or obtained according to described store path
Take described game data.
A7, the method according to A6, described unique mark is and play corresponding domain name or G-key value.
B8, a kind of secure decryption method of game data are it is characterised in that the method includes:
Game running request is sent by browsing device net page;
Receive encrypted lottery data from browser server;
Using Plugin Mechanism, described encrypted lottery data is decrypted, this plug-in unit has predetermined interface, with game data
Interface corresponding;
Webpage is generated to run described game according to the game data after described deciphering.
B9, the method according to B8, the method is in step:Game running request is sent by browsing device net page, afterwards,
Also include:
Receive the response data that browser server returns;
Searched based on described response data and open this plug-in unit.
B10, the method according to B9, without finding this plug-in unit, then go to obtain based on described response data and insert
Part installation kit, and carry out the installation of described plug-in unit, described this plug-in unit of opening specifically includes:Using described response data to this plug-in unit
Initialized, and plus download the plugin.
If it is not required, then being loaded directly into the game data after described deciphering.
B10, the method according to B8 or B9, are further characterized in that, this plug-in card configuration has Gkey parameter, described Gkey ginseng
Number is for being assigned the exclusive identification code of game.
C11, a kind of safe encryption device of game data are it is characterised in that this device includes:
Acquisition module, for obtaining game data;
Feature code value computing module, for calculating the feature code value of described game data;
Asymmetric computing module, for acquired feature code value is carried out with asymmetric computing, generates game data
Encryption data;
First sending module, for sending the encryption data of described game data to browser client.
C12, the device according to C11, are further characterized in that, described document information value computing module calculates mould for MD5 value
Block.
C13, the device according to C11 or C12, are further characterized in that, this device also includes:
Preset module, is used for pre-setting domain name list and white list;
Update configuration module, for when accessing a game, giving its domain name and Gkey value, according to the domain being given
Name, Gkey value are updated to domain name list, white list, and the storage address configuration store path letter according to game data
Breath.
C14, the device according to C13, are further characterized in that, described acquisition module is according to the store path letter being configured
Breath obtains game data.
C15, the device according to any one of C11-C14, are further characterized in that, described acquisition module is according to being asked
Process obtain game data.
C16, the device according to any one of C11-C15, are further characterized in that, this device also includes:
First receiver module, for receiving the game request from browser client;
Game request parsing module, for parsing described game request, the unique mark of request game to determine,
And its store path is determined based on described unique mark;
The encryption data of described acquisition module game data according to described store path direct access, or root
Obtain described game data according to described store path.
C17, the device according to C16, described unique mark is and play corresponding domain name or G-key value.
D18, a kind of secure decryption device of game data are it is characterised in that this device includes:
Second sending module, for sending game running request by browsing device net page;
Second receiver module, for receiving encrypted lottery data from browser server;
Deciphering module, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined connecing
Mouthful, corresponding with the interface of game data;
Processing module, for generating webpage to run described game according to the game data after described deciphering.
D19, the device according to D18, are further characterized in that,
Described second receiver module, is additionally operable to receive the response data that browser server returns;
Described processing module, for plug-in unit being initialized based on described response data and adding download the plugin,
D20, the device according to D18 or D19, are further characterized in that, this plug-in unit is provided with Gkey parameter, described process
The exclusive identification code played is given described Gkey parameter based on described response data by module.
Claims (10)
1. a kind of safe encryption method of game data is it is characterised in that the method includes:
Obtain game data;
Calculate the feature code value of described game data;
Acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
The encryption data of described game data is sent to browser client.
2. method according to claim 1, is further characterized in that, described document information is the MD5 value of game data.
3. method according to claim 1 and 2, is further characterized in that, the method also includes:
Pre-set domain name list and white list;
When accessing a game, give its domain name and Gkey value, according to the domain name being given, Gkey value, domain name is arranged
Table, white list are updated, and configure store path information according to the storage address of game data.
4. method according to claim 3, is further characterized in that, according to the store path acquisition of information game number being configured
According to.
5. the method according to any one of claim 1-4, is further characterized in that, obtains game according to the process asked
Data.
6. the method according to any one of claim 1-5, is further characterized in that, the method also includes:
Receive the game request from browser client;
Parse described game request, the unique mark of request game to determine, and its storage is determined based on described unique mark
Path;
The encryption data of game data according to described store path direct access, or institute is obtained according to described store path
State game data.
7. method according to claim 6, described unique mark is and play corresponding domain name or G-key value.
8. a kind of secure decryption method of game data is it is characterised in that the method includes:
Game running request is sent by browsing device net page;
Receive encrypted lottery data from browser server;
Using Plugin Mechanism, described encrypted lottery data is decrypted, this plug-in unit has predetermined interface, with connecing of game data
Mouth is corresponding;
Webpage is generated to run described game according to the game data after described deciphering.
9. a kind of safe encryption device of game data is it is characterised in that this device includes:
Acquisition module, for obtaining game data;
Feature code value computing module, for calculating the feature code value of described game data;
Asymmetric computing module, for acquired feature code value is carried out with asymmetric computing, generates the encryption number of game data
According to;
First sending module, for sending the encryption data of described game data to browser client.
10. a kind of secure decryption device of game data is it is characterised in that this device includes:
Second sending module, for sending game running request by browsing device net page;
Second receiver module, for receiving encrypted lottery data from browser server;
Deciphering module, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined interface, with
The interface of game data is corresponding;
Processing module, for generating webpage to run described game according to the game data after described deciphering.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610856558.9A CN106411880B (en) | 2016-09-27 | 2016-09-27 | A kind of safe encryption and decryption method of game data and encryption, decryption device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610856558.9A CN106411880B (en) | 2016-09-27 | 2016-09-27 | A kind of safe encryption and decryption method of game data and encryption, decryption device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106411880A true CN106411880A (en) | 2017-02-15 |
CN106411880B CN106411880B (en) | 2019-11-19 |
Family
ID=57997615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610856558.9A Active CN106411880B (en) | 2016-09-27 | 2016-09-27 | A kind of safe encryption and decryption method of game data and encryption, decryption device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106411880B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107320959A (en) * | 2017-06-28 | 2017-11-07 | 网易(杭州)网络有限公司 | Game role identification information generation method, device, medium and electronic equipment |
CN107590397A (en) * | 2017-09-19 | 2018-01-16 | 广州酷狗计算机科技有限公司 | A kind of method and apparatus for showing embedded webpage |
CN108434727A (en) * | 2018-03-27 | 2018-08-24 | 北京知道创宇信息技术有限公司 | electronic card processing method and system |
CN109589608A (en) * | 2018-12-19 | 2019-04-09 | 网易(杭州)网络有限公司 | The method and apparatus for protecting game data |
CN115250194A (en) * | 2022-01-10 | 2022-10-28 | 重庆科创职业学院 | Computer network security communication method based on big data terminal equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101370013A (en) * | 2008-07-10 | 2009-02-18 | 诸松涛 | Anti-cheater method for network game |
CN101171611B (en) * | 2005-03-10 | 2011-03-23 | Igt公司 | Secured virtual network in a gaming environment |
CN102647398A (en) * | 2011-02-16 | 2012-08-22 | 腾讯科技(深圳)有限公司 | Method and device for realizing game on basis of mobile terminal |
CN102685109A (en) * | 2012-04-11 | 2012-09-19 | 佳都新太科技股份有限公司 | Game CP (content provider) access method under three network integration |
CN103607402A (en) * | 2013-11-26 | 2014-02-26 | 广州博冠信息科技有限公司 | Online game data encryption and decryption method and equipment |
US9141952B2 (en) * | 2009-01-15 | 2015-09-22 | Igt | EGM authentication mechanism using multiple key pairs at the bios with PKI |
CN105450620A (en) * | 2014-09-30 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Information processing method and device |
-
2016
- 2016-09-27 CN CN201610856558.9A patent/CN106411880B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101171611B (en) * | 2005-03-10 | 2011-03-23 | Igt公司 | Secured virtual network in a gaming environment |
CN101370013A (en) * | 2008-07-10 | 2009-02-18 | 诸松涛 | Anti-cheater method for network game |
US9141952B2 (en) * | 2009-01-15 | 2015-09-22 | Igt | EGM authentication mechanism using multiple key pairs at the bios with PKI |
CN102647398A (en) * | 2011-02-16 | 2012-08-22 | 腾讯科技(深圳)有限公司 | Method and device for realizing game on basis of mobile terminal |
CN102685109A (en) * | 2012-04-11 | 2012-09-19 | 佳都新太科技股份有限公司 | Game CP (content provider) access method under three network integration |
CN103607402A (en) * | 2013-11-26 | 2014-02-26 | 广州博冠信息科技有限公司 | Online game data encryption and decryption method and equipment |
CN105450620A (en) * | 2014-09-30 | 2016-03-30 | 阿里巴巴集团控股有限公司 | Information processing method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107320959A (en) * | 2017-06-28 | 2017-11-07 | 网易(杭州)网络有限公司 | Game role identification information generation method, device, medium and electronic equipment |
CN107320959B (en) * | 2017-06-28 | 2020-10-23 | 网易(杭州)网络有限公司 | Game role identification information generation method, device, medium and electronic equipment |
CN107590397A (en) * | 2017-09-19 | 2018-01-16 | 广州酷狗计算机科技有限公司 | A kind of method and apparatus for showing embedded webpage |
CN108434727A (en) * | 2018-03-27 | 2018-08-24 | 北京知道创宇信息技术有限公司 | electronic card processing method and system |
CN109589608A (en) * | 2018-12-19 | 2019-04-09 | 网易(杭州)网络有限公司 | The method and apparatus for protecting game data |
CN115250194A (en) * | 2022-01-10 | 2022-10-28 | 重庆科创职业学院 | Computer network security communication method based on big data terminal equipment |
Also Published As
Publication number | Publication date |
---|---|
CN106411880B (en) | 2019-11-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106411880B (en) | A kind of safe encryption and decryption method of game data and encryption, decryption device | |
CN103944890B (en) | Virtual interaction system based on customer end/server mode and method | |
US6438600B1 (en) | Securely sharing log-in credentials among trusted browser-based applications | |
CN103843004B (en) | Device customizes white list | |
US20130167104A1 (en) | Runtime Library Including A Virtual File System | |
CN106406961A (en) | Method and device for loading and providing application based on browser | |
US8387140B2 (en) | Method and apparatus for controlling access to encrypted network communication channels | |
CN105940654A (en) | Privileged static hosted WEB applications | |
CN104063788B (en) | Mobile platform credibility payment system and method | |
CN107533608A (en) | Credible renewal | |
EP2976709A1 (en) | Systems and methods for intercepting, processing, and protecting user data through web application pattern detection | |
CN105427096A (en) | Payment security sandbox realization method and system and application program monitoring method and system | |
CN104391729B (en) | Programme upgrade method and device based on Root authority | |
Falsina et al. | Grab'n run: Secure and practical dynamic code loading for android applications | |
CN104239786A (en) | ROOT-free active defense configuration method and device | |
CN111917837A (en) | Web micro application program publishing system and implementation method thereof | |
US9756149B2 (en) | Machine-specific instruction set translation | |
CN111406257B (en) | System and method for authentication | |
CN107066888B (en) | Extensible trusted user interface, method and electronic device | |
US9354849B2 (en) | Modification of compiled applications and application management using retrievable policies | |
KR102032958B1 (en) | Apparatus, method and system for checking vulnerable point | |
US8474013B2 (en) | Securely managing password access to a computer system | |
Kotipalli et al. | Hacking Android | |
CN104158812A (en) | Method and system of safety control of terminal application | |
CN104539585A (en) | Browser anti-injection method, browser client side and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20220715 Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015 Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park) Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd. Patentee before: Qizhi software (Beijing) Co.,Ltd. |