CN106411880A - Security encryption and decryption methods and devices for game data - Google Patents

Security encryption and decryption methods and devices for game data Download PDF

Info

Publication number
CN106411880A
CN106411880A CN201610856558.9A CN201610856558A CN106411880A CN 106411880 A CN106411880 A CN 106411880A CN 201610856558 A CN201610856558 A CN 201610856558A CN 106411880 A CN106411880 A CN 106411880A
Authority
CN
China
Prior art keywords
game
data
game data
plug
browser
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610856558.9A
Other languages
Chinese (zh)
Other versions
CN106411880B (en
Inventor
葛山
何孟东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610856558.9A priority Critical patent/CN106411880B/en
Publication of CN106411880A publication Critical patent/CN106411880A/en
Application granted granted Critical
Publication of CN106411880B publication Critical patent/CN106411880B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Abstract

The invention discloses a security encryption method for game data. The method comprises the following steps: acquiring game data; calculating a feature code value of the game data; performing asymmetrical operation on the acquired feature code value to generate encrypted data of the game data; and transmitting the encrypted data of the game data to a browser client. Through adoption of the security encryption method, the security of the game data can be ensured, in particular security verification can be performed on game data provided by a third party when a game is pushed through a browser platform, namely, when a universal browser plugin is used for loading game data to implement a webpage game, so that providing of invalid data due to hijack of game request data is avoided; a flow of requesting data once again can be triggered automatically under the condition of failure in checking the game data; and exceptional conditions of the game data can be repaired automatically.

Description

A kind of safe encryption and decryption method of game data and encryption, deciphering device
Technical field
The present invention relates to Internet technical field, the safe encryption and decryption method of more particularly, to a kind of game data and plus Close, deciphering device.
Background technology
With scientific and technical continuous development, computer is widely available, and the work giving people and life bring all Facilitate more.Increasingly fashionable with computer game, the species of game gets more and more, and quantity is increasing, and people need to unify Provide game platform.Potentially act as such platform now with some clients or search engine, but be only limitted to carry For computer game installation kit, user needs downloading computer game installation kit to computer and carries out installing and could use.By Do not need to download, install in web game, logging in network address at any time can be carried out, and because the data of web game is stored in taking Business device or high in the clouds, all can be carried out on any terminal unit using account, thus web game increasing prevalence in recent years.How Provide a user with game data is the present big problem needing and solving safe efficiently.Web game needs browser to prop up Hold, the provider of current web game needs oneself exploitation plug-in unit, so that browser can call web game and load. Almost it is directed to every money game, a plug-in unit will be developed, thus causing great manpower to waste;And in terminal, plug-in component operation, open Dynamic ES, when user's active accesses browser using high authority or is not having authority to limit under the system with authority restriction System under when accessing browser, because plug-in unit is provided by various developers, plug-in unit is operable to all on hard disk in terminal Data, the safety of user terminal is difficult to be guaranteed, and leads to browser to produce security breaches.Carry to user terminal in server For the process of game data, if game request data or game data are held as a hostage, then terminal is likely to be received threat letter Breath is it is also possible to lead to browser to produce security breaches.
Content of the invention
In view of the above problems it is proposed that the present invention so as to provide one kind overcome the problems referred to above or at least in part solve on That states problem does a kind of safe checking method of game data and device.
A kind of one aspect of the present invention, there is provided safe encryption method of game data, the method includes:
Obtain game data;
Calculate the feature code value of described game data;
Acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
The encryption data of described game data is sent to browser client.
Optionally, described document information is the MD5 value of game data.
Optionally, the method also includes:
Pre-set domain name list and white list;
When accessing a game, give its domain name and Gkey value, according to the domain name being given, Gkey value to domain name List, white list are updated, and configure store path information according to the storage address of game data.
Optionally, game data is obtained according to the process asked.
Optionally, the method also includes:
Receive the game request from browser client;
Parse described game request, the unique mark of request game to determine, and it is determined based on described unique mark Store path;
The encryption data of game data according to described store path direct access, or obtained according to described store path Take described game data.
Optionally, described unique mark is and corresponding domain name or the G-key value of playing.
The present invention also provides a kind of secure decryption method of game data, and the method includes:
Game running request is sent by browsing device net page;
Receive encrypted lottery data from browser server;
Described encrypted lottery data is decrypted, and loads the game data after described deciphering with net using a plug-in unit Page runs described game, and this plug-in unit has predetermined interface, corresponding with the interface of game data.
Optionally, the method is in step:Game running request is sent by browsing device net page, afterwards, also includes:
Receive the response data that browser server returns;
Searched based on described response data and open this plug-in unit.
Optionally, without finding this plug-in unit, then go to obtain plug-in unit installation kit based on described response data, and carry out The installation of described plug-in unit, described this plug-in unit of opening specifically includes:Using described response data, this plug-in unit is initialized, and plus Download the plugin.
If it is not required, then being loaded directly into the game data after described deciphering.
Optionally, this plug-in card configuration has Gkey parameter, and described Gkey parameter is used for being assigned the exclusive identification code of game.
The present invention also provides a kind of safe encryption device of game data, and this device includes:
Acquisition module, for obtaining game data;
Feature code value computing module, for calculating the feature code value of described game data;
Asymmetric computing module, for acquired feature code value is carried out with asymmetric computing, generates adding of game data Ciphertext data;
First sending module, for sending the encryption data of described game data to browser client.
Optionally, described document information value computing module is MD5 value computing module.
Optionally, this device also includes:
Preset module, is used for pre-setting domain name list and white list;
Update configuration module, for when accessing a game, giving its domain name and Gkey value, according to the domain being given Name, Gkey value are updated to domain name list, white list, and the storage address configuration store path letter according to game data Breath.
Optionally, described acquisition module is according to the store path acquisition of information game data being configured.
Optionally, described acquisition module obtains game data according to the process asked.
Optionally, this device also includes:
First receiver module, for receiving the game request from browser client;
Game request parsing module, for parsing described game request, the unique mark of request game to determine, and base Determine its store path in described unique mark;
The encryption data of described acquisition module game data according to described store path direct access, or according to institute State store path and obtain described game data.
Optionally, described unique mark is and corresponding domain name or the G-key value of playing.
The present invention also provides a kind of secure decryption device of game data, and this device includes:
Second sending module, for sending game running request by browsing device net page;
Second receiver module, for receiving encrypted lottery data from browser server;
Deciphering module, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined connecing Mouthful, corresponding with the interface of game data;
Processing module, for generating webpage to run described game according to the game data after described deciphering.
Optionally, described second receiver module, is additionally operable to receive the response data that browser server returns;
Described processing module, for initializing plug-in unit plus download the plugin based on described response data.
This plug-in unit is provided with Gkey parameter, and the exclusive identification code played is assigned by described processing module based on described response data Give described Gkey parameter.
The technical scheme providing in the embodiment of the present application, at least has the following technical effect that or advantage:
In the embodiment of the present application, by the encryption to game data, ensure that the safety of game data.
When pushing game particularly by browser platform, game data is loaded by general browser plug-in unit and realize webpage During game, the game data that third party can be provided carries out safety check, thus avoid game request data to be held as a hostage leading to Invalid data offer, and inspection game data failure in the case of, can automatically trigger re-request data Flow process, therefore, it is possible to automatically be repaired to the abnormal conditions of game data.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Brief description
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 shows a kind of flow process that game data is carried out with the method that safety is encrypted according to an embodiment of the invention Figure;
The flow chart that Fig. 2 shows the operation web game according to one specific embodiment of the present invention;
Fig. 3 shows a kind of flow process of method that game data is carried out with secure decryption according to an embodiment of the invention Figure;
Fig. 4 showsA kind of structure that game data is carried out with the device that safety is encrypted according to an embodiment of the invention Figure;
Fig. 5 showsA kind of structure of device that game data is carried out with secure decryption according to an embodiment of the invention Figure.
Specific embodiment
Embodiments of the invention are described below in detail, the example of described embodiment is shown in the drawings, wherein from start to finish Same or similar label identifies same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative " " used herein, " Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that arranging used in the description of the present invention Diction " inclusion " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existing or adding Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist Intermediary element.Additionally, " connection " used herein or " coupling " can include wirelessly connecting or wirelessly coupling.Used herein arrange Diction "and/or" includes one or more associated list the whole of item or any cell and combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art Language and scientific terminology), there is the general understanding identical meaning with the those of ordinary skill in art of the present invention.Also should Be understood by, those terms defined in such as general dictionary it should be understood that have with the context of prior art in The consistent meaning of meaning, and unless by specific definitions as here, otherwise will not use idealization or excessively formal implication To explain.
Those skilled in the art of the present technique are appreciated that " terminal " used herein above, " terminal unit " had both included wireless communication The equipment of number receptor, it only possesses the equipment of the wireless signal receiver of non-emissive ability, includes receiving and transmitting hardware again Equipment, its have can on bidirectional communication link, execute two-way communication reception and transmitting hardware equipment.This equipment Can include:Honeycomb or other communication equipments, it has single line display or multi-line display or does not have multi-line to show The honeycomb of device or other communication equipments;PCS (Personal Communications Service, PCS Personal Communications System), it can With combine voice, data processing, fax and/or its communication ability;PDA (Personal Digital Assistant, personal Digital assistants), it can include radio frequency receiver, pager, the Internet/intranet access, web browser, notepad, day Go through and/or GPS (Global Positioning System, global positioning system) receptor;Conventional laptop and/or palm Type computer or other equipment, its have and/or include the conventional laptop of radio frequency receiver and/or palmtop computer or its His equipment." terminal " used herein above, " terminal unit " they can be portable, can transport, be arranged on the vehicles (aviation, Sea-freight and/or land) in, or be suitable for and/or be configured in local runtime, and/or with distribution form, operate in the earth And/or any other position operation in space." terminal " used herein above, " terminal unit " can also be communication terminal, on Network termination, music/video playback terminal, for example, can be PDA, MID (Mobile Internet Device, mobile Internet Equipment) and/or there is mobile phone or the equipment such as intelligent television, Set Top Box of music/video playing function.
Those skilled in the art of the present technique are appreciated that server used herein above, high in the clouds, remote network devices etc. are general Read, there is effects equivalent, it includes but is not limited to computer, network host, single network server, multiple webserver collection Or the cloud that multiple server is constituted.Here, cloud is taken by a large amount of computers based on cloud computing (Cloud Computing) or network Business device is constituted, and wherein, cloud computing is one kind of Distributed Calculation, and one be made up of a group loosely-coupled computer collection super Virtual machine.In embodiments of the invention, can be by any logical between remote network devices, terminal unit and WNS server Letter mode realizes communicating, including but not limited to, mobile communication based on 3GPP, LTE, WIMAX, based on TCP/IP, udp protocol Computer network communication and the low coverage wireless transmission method based on bluetooth, infrared transmission standard.
It will be appreciated by those skilled in the art that " application ", " application program ", " application software " and the class alleged by the present invention Like the concept of statement, it is the same concept well known to those skilled in the art, refers to be instructed and related data by series of computation machine The computer software being suitable to electronics operation of the organic construction of resource.Unless specified, this name itself is not subject to programming language Species, rank, operating system of operation of also not rely by it or platform institute are limited.In the nature of things, this genus is not subject to appoint yet The terminal of what form is limited.
The method of the present invention and its device, can be software by programming realization, be installed to computer, mobile terminal etc. and set Run in standby, these equipment, the concrete grammar realized according to it and the difference of device, and shown as client, service end Etc. form.Specifically, the safe encryption method of game data proposed by the present invention and the suitable configuration of related device have clothes In the computer equipment of business device ability, and construct a high in the clouds control system, provide game data or sensing to client The target of game data is provided.The secure decryption method of game data proposed by the present invention and related device suitably configure in individual In computer and the mobile terminal device such as mobile phone, panel computer, client is constructed with this.
A kind of one aspect of the present invention, there is provided safe checking method of game data, as shown in figure 1, the method bag Include:
S11. obtain game data;
S12. calculate the feature code value of described game data;
S13. acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
S14. the encryption data of described game data is sent to browser client.
The method, by the encryption to game data, ensure that the safety of game data.
In step sl, the game data of acquisition is about the All Files needed for running game, including exe file, d11 The file of the various form such as file, these files are stored in the precalculated position of server.In response user to game process Control data, provide respective page data when, server be based on IE kernel loads mechanism, obtain respective page related data. In order to ensure that this related data can be safely supplied to client, using digital signature individual's key signature data it Before, computing is encrypted to page related data, as a kind of cipher mode of innovation proposed by the present invention, first related to the page Data carries out eigenvalue calculation, then carries out asymmetric encryption to the eigenvalue calculating.As preferably a kind of mode, can adopt Use MD5 algorithm, carry out the calculating of eigenvalue, by using md5 encryption algorithm, 32 character strings of a fixation can be produced. Rivest, shamir, adelman is recycled to produced 32 fixed character strings, generates a pair of key, public key is supplied to user side, For being encrypted to the request data of its server to be sent to, and the request being sended over using the user that private key pair receives Data is decrypted.As it is known by the man skilled in the art that although asymmetric arithmetic level of security is higher, because of its size of the secret key relatively Greatly, and for encrypting, time of deciphering symmetry algorithm that compares longer, typically on the securely transmitting and verify of game data not Used, and the application is directed to browser client using the trip transferring storage on server based on the Plugin Mechanism of IE kernel Building the situation of info web, that is, on the one hand this plug-in unit needs the game-related identity information sending using server to play data Initialized, the danger that the presence of one side game data is trapped, forges, a kind of special security mechanism proposing, due at this In the case of kind, the data volume of transmission is little, and the impact in speed being brought using asymmetric arithmetic is negligible.Certainly, originally Apply for not limiting to and be applied to situation recited above, in the case that the data volume transmitting is little and security requirement is high, this The safe encryption method that application proposes is all applicable.
Game data in order to realize using being transferred storage on server based on the Plugin Mechanism of IE kernel is built Info web, in server end, needs to pre-set domain name list and white list, and domain name list is used for being stored as access The domain name that game gives, for accessing in browser client, described white list is used for the identity of the accessed game of storage Mark, as one kind preferred embodiment, gives game one Gkey value and is used as its unique mark, described white list is used for depositing Store up the Gkey value of accessed game.Thus can interpolate that whether a game is passed through based on domain name list and white list The game of authentication, that is, judge whether the game of user's request is the game that can push by described plug-in unit.
Before browser accesses a game, need to carry out backstage configuration, the configuration of described backstage includes:Give game domain name and Gkey value, and domain name list, white list are updated;The acquisition approach of configuration game data, game data at least includes should With DLL (Dynamic Link Library) file or the EXE file of program, certainly also include some physical contents, such as scheme Piece, word and signature file.By domain name mapping and after determining that the Gkey value parsing belongs to white list, load plug-in unit, By the initialization to plug-in unit, give its Gkey parameter Gkey value, and according to the configuration information of game, it is configured.Initially After change, plug-in unit is based on routing information by interface and progress information calls game data, such as DLL (Dynamic Link These invoked game datas are encrypted based on call request by Library) file or EXE file in server end Process, include carrying out eigenvalue calculation, and asymmetric encryption is carried out to described eigenvalue, then the data is activation after encrypting is given Plug-in unit, described plug-in component operation security mechanism, the data after the described encryption receiving is decrypted, afterwards using the trip after deciphering Play data builds, renders webpage.
Described plug-in unit is a kind of computer program, it then follows the application programming interfaces of certain specification are write out, by and webpage The interaction of browser to increase specific function for described web browser, and that is, web browser is capable of the trip of invoking server storage Play data and on webpage execute.Described plug-in unit is to be write based on Microsoft's Plugin Mechanism, with compatible all of browser, is writing During described plug-in unit, for this plug-in card configuration Gkey parameter, for being assigned unique mark of the game executing on a web browser in the future Know code.After installing this plug-in unit, web browser can directly invoke this according to the unique mark that generates when registering this plug-in unit and insert Part.In prior art, usually one plug-in unit corresponds to an application program, and a plug-in unit corresponds to a game in other words, browses When asking some application programs to be played in other words, server can be sent to user to be needed to install the instruction of predetermined plug-in unit device, and The download address of plug-in unit is sent to user, user only installs the game that this plug-in unit could be asked in browser execution.One These plug-in units of denier are installed, and when starting browser every time, automatically load all mounted plug-in units from local later, this It is exactly one of the reason why a lot of browsers start slower now.The plug-in unit that the application is proposed, independent of browser, leads to Cross using the analysis result to user input domain name, it is determined whether call this plug-in unit, need to call the situation of this plug-in unit determining Under, recycle the unique mark that this plug-in unit produces when IE kernel is registered to carry out lookup and the loading of this plug-in unit, therefore this plug-in unit The toggle speed of slow browser can't be dragged, also will not additionally consume process resource.Due to the purpose of design of this plug-in unit be in order to Call in web browser and run all of game, this plug-in card configuration has Gkey parameter, call different answering using this plug-in unit During with program sequence, it is this Gkey parameter and gives the called Gkey value of application program and corresponding configuration information, thus As long as plug-in unit is consistent with the interface of game in programming, this plug-in unit just can load any game, thus avoiding operation one The situation of a plug-in unit is just installed in game, not only greatly reduces the exploitation of supporting plug-in unit of playing it is only necessary to install a plug-in unit, The i.e. compatible all of game with predetermined interface, and be when running browser, do not needing to run the situation of plug-in unit Under, you can not start plug-in unit, greatly save the consumption of process resource.
The domain name list of correlation having the game that can run with browser and white is safeguarded in the backstage of browser or high in the clouds List, domain name list is stored as the domain name of each application assigned;Described white list stores each application program promising The Gkey value of distribution.Preferably, the configuration file played for each is also safeguarded in the backstage of browser or high in the clouds, this configuration File can be dll file or exe file, to indicate game initial data, the acquisition approach of signed data and to add Decryption information.As a kind of specific embodiment, configuration file is associated by Gkey value with domain name list, white list.By upper State the maintenance in backstage or high in the clouds, reach the interaction of plug-in unit and browser server.
When user is in terminal inputs domain name, browser receives this domain name request, and parses domain name request, parsing domain name Process can complete in terminal it is also possible to the server side in browser completes, if completed in terminal, needs to arrange domain name Table and white list are stored in locally, when browser is upgraded, automatically update domain name list and white list, this situation Under, the upgrading number of times of client browser may be some more, if the server side in browser completes, only need to server Domain name list and white list are safeguarded in side or high in the clouds, and the browser of client will not need because of the renewal of domain name list and white list Upgrade.Such as user input domain name:http:Wan.360.sgkey=ly/skey=1000, first determines whether described input Whether domain name belongs to domain name list, if belonged to, parses domain name further, determines game unique mark Gkey value ly, Gkey Value is the unique mark of application program, especially at present in computer game, including client game and web game aspect, each Game all can be endowed unique mark Gkey value, usually game name acronym.White name is inquired about according to described Gkey value Single, it is determined whether to belong to white list, thereby determine that this application program is the product that browser can push.Will this Gkey value send To described plug-in unit, with its Gkey parameter described in assignment, the detailed process of assignment is:Given birth to when IE kernel is registered according to described plug-in unit The unique mark becoming searches described plug-in unit in systems, and described Gkey value is given the described Gkey in the described plug-in unit finding Parameter.After Gkey value is given the described Gkey parameter in the described plug-in unit finding, call this plug-in unit.Carried by browser For API application programming interface access this plug-in unit.Plug-in unit to there being the plug-in unit property file being compressed together, including one Manifest file, one or more HTML html files, optionally one or more javascript files, Optionally any desired alternative document (such as picture).Wherein, Manifest file is generally json form, wherein contains The essential information of plug-in unit, for example most important listed files, authority required for application (extension) etc..When developing plug-in unit, These files are all put under same catalogue, when issuing plug-in unit, the file under this catalogue is all bundled to a .crx's In compressed file, browser kernel, when rendering browser main frame, can extract in plug-in unit property file and set for plug-in unit The loading position put, at the interface of this loading position display game.So that game can be loaded by plug-in unit just can transport OK, technically, game needs using the DLL consistent with described plug-in unit.By interface, plug-in unit directly invokes game number According to.When plug-in unit calls game data, browser server end is encrypted to the game data being called, specifically can be first It is entered with row operation, has generated condition code, the ripe algorithm of existing generation condition code is MD5 algorithm, and the application preferably employs MD5 algorithm.Then asymmetric computing is carried out to the condition code generating, generate encryption data, encryption data is sent to browser Client, is decrypted process by described plug-in unit.Game data is storable in third-party server and (services at game developer Device), browser server or game-specific server, high in the clouds, here, do not do any to the storage location of application data Limit.The application, by using the mode of the encryption of feature code value and the double-encryption of asymmetric encryption, not only accesses trip to user The response data of play request carries out above-mentioned encryption, also concrete game data is encrypted, therefore, it is possible to ensure client plug-in Initialization and the loading of game data safely carry out, and the digital signature to Game Setting for the game provider can be preserved.
As a kind of specific embodiment, user needs to play web game, as shown in Fig. 2 process is as follows:
S31. first log into browser, after browser is opened, user needs run which game, that is, pass through to click on
Icon on browser or domain name link, such as user input domain name request http:
Wan.360.sgkey=ly1/skey=1000;
S32. browser client is based on user operation and generates domain name request;
S33. this domain name request is sent to server;
S41. this domain name is mated by server with the domain name list prestoring, and determines whether this domain name belongs to domain name List (browser server that is stored with domain name list is by the domain name the allocated by the game of web page display in need);
S42.If it is, server may proceed to this domain name is parsed, otherwise server domain name is not carried out any Process, be returned only to the invalid information of terminal domain name.Parse domain name according to domain name establishment rules, determine asked trip Play as ly1 (Gkey value);
S43. according to the backstage configuration information that the inquiry of Gkey value ly1 is corresponding, and this configuration information is sent to terminal Browser;
S34. terminal browser inquires about described plug-in unit;
S35. without installation, then send, to server, the request obtaining plug-in unit installation kit;
If S36. installing, this plug-in unit being initialized based on described configuration information and loads described plug-in unit;
S37. according to the game data on described configuration information invoking server to run ly1 game.
When once wanting to play ly2 game on user, user does not need download plug-in again, but the input (ratio according to user As inputs domain name http:Wan.360.sgkey=ly2/skey=1000), browser client generates domain name request information, and This domain name request is sent to server, this domain name is mated by server with the domain name list prestoring, and determines this domain Whether name belongs to the domain name list prestoring, and (the browser operator that is stored with domain name list is in need by webpage exhibition The the allocated domain name of the application program showing), if it is, server may proceed to this domain name is parsed, otherwise server Any process is not carried out to domain name, be returned only to the invalid information of terminal domain name.Parse described domain according to domain name establishment rules Name, determines that asked game is ly2 (Gkey value, the exclusive identification code of game), is inquired about according to Gkey value ly2 corresponding Backstage configuration information, and this configuration information is sent to terminal browser, terminal browser is based on described configuration information initialization Plug-in unit, then loads described plug-in unit, and plug-in unit can directly invoke game data to run ly2 game according to described configuration information. Therefore, user only needs to install a plug-in unit, and all of web game of browser all can be carried out.Because this plug-in unit is based in IE Core, its almost all compatible use of compatible domestic all of browser, such as IE browser IE6-IE11 and Webkit browser. And, as long as the exploitation of games is consistent with the DLL of developing plug, browser only needs to install a plug-in unit, you can Run all of web game.Compare relatively current, often run a web game, nearly all will download a plug-in unit and install Web game can be run, the application, after installing a plug-in unit, simply enters domain name and can run various different web pages game, letter The time changed user operation and greatly shortened web game start-up loading.
Actually conventionally, as the restriction to System Privileges for the browser itself, such as under winsa or 97 Because the setting of authority, it is generally basede on medium authority and accesses browser, even if some need to obtain the game of system high authority In browser, plug-in unit is installed also cannot run at all.And the plug-in unit of the application is safe, general, its signature can obtain clear Look at the accreditation of device, more therefore need the game obtaining system high authority also can be transported in browser by this plug-in unit OK.On the other hand, due in the application plug-in unit simply call game, and the signature file of game is not modified, in trip Its signature being obtained when play is by plug-in component operation, thus distinguishing the signature of game and the signature of plug-in unit, being convenient to accomplish net The ownership person of network acts responsibility, consequently facilitating definite network safety responsibility.
Because plug-in unit does not need to change the digital signature of game, the application passes through this plug-in unit can be by the trip of reliable signature Play is embedded in the precalculated position of browser, and ratio is such as embedded within title bar or floating window, and reliability is not known or other Reason needs the game of retention figures signature only to load by plug-in unit by way of domain name request.Thus the invention allows for There is provided by way of game by webpage by two kinds of differences, and no matter by the way of which kind of provides web game, the application is It is provided that the game data encrypted using front described encryption method, described game data includes game configuration information and game is opened Service data after beginning.
After loading plug-in unit, due to setting up corresponding relation with game, you can described game is carried out with upgrading detection;As Fruit needs to upgrade, then call upgrading data according to backstage configuration information, to obtain the latest data of game, runs latest edition Game.The application does not need user to carry out any operation about upgrading so that it may ensure that the application program that user runs is up-to-date Version.
The present invention also provides a kind of secure decryption method of game data, as shown in figure 3, the method includes:
S21. game running request is sent by browsing device net page;
S22. receive encrypted lottery data from browser server;
S23. described encrypted lottery data is decrypted, and using one plug-in unit load described deciphering after game data with Run described game in webpage, this plug-in unit has predetermined interface, corresponding with the interface of game data.
The application passes through above-mentioned secure decryption method, in the case of game data reception exception, data can be abandoned Process, in the case of game data reception failure, automatically can carry out repetitive requests, thus game can be accessed in request and swim Automatically repaired in play interaction.
By browsing device net page send game running request after, based on the number of responses returning from browser server it is investigated that Look for and open this plug-in unit.Without finding this plug-in unit, then go to obtain plug-in unit installation kit based on described response data, and carry out The installation of described plug-in unit, described this plug-in unit of opening specifically includes:Using described response data, this plug-in unit is initialized, and open Move and join this plug-in unit.Not just search and open plug-in unit if based on the response data returning from browser server, then browse Device can be loaded directly into game data or the encrypted lottery data fed back.
Described plug-in unit is not intended as the startup item of browser, and therefore this plug-in unit will not increase the burden of browser, both will not The respond of impact browser.
This plug-in card configuration has Gkey parameter, and described Gkey parameter is used for being assigned the exclusive identification code of game, for loading The situation of different game, carries out the initialization of different game configuration information to this plug-in unit.Give described Gkey ginseng including described Gkey values of number game and for path parameter configuration path information etc., this plug-in unit is suitable to load all of game, as long as playing With plug-in unit, there is corresponding interface, and the game in the white list belonging on browser server of playing.
As another aspect of the present invention, the present invention also provides a kind of safe encryption device of game data, and this device can Think the main frame with server capability, as shown in figure 4, this device includes:
Acquisition module 50, for obtaining game data;
Feature code value computing module 51, for calculating the feature code value of described game data;
Asymmetric computing module 52, for acquired feature code value is carried out with asymmetric computing, generates game data Encryption data;
First sending module 53, for sending the encryption data of described game data to browser client.
Respond the control data to game process for the user in server or high in the clouds, provide respective page data when, clothes Business device is based on IE kernel loads mechanism, obtains respective page related data.In order to ensure that this related data can safely be carried Supply client, before using digital signature individual's key signature data, first carries out eigenvalue calculation to page related data, Again asymmetric encryption is carried out to the eigenvalue calculating.The application is directed to browser client using the plug-in unit based on IE kernel Mechanism transfers the situation to build info web for the game data storing on server, and that is, one side client is based on IE kernel Plug-in unit needs the game-related identity information sending using server to be initialized, and the presence of another aspect game data is cut The danger obtain, forged, the security mechanism for server end that the application proposes, even if can ensure that third party is opened by server The game sent out is supplied to client, also can ensure that game data is difficult to crack and is trapped forgery, can greatly protect The safety of barrier browser.
As a kind of preferred implementation, described document information value computing module is MD5 value computing module.Because even two Subtleties are had, 32 character string gaps that it calculates also can be very big, and therefore MD5 algorithm has on safety check between data There are absolute advantagess, and no matter original data volume is much, be 32 character strings after calculating using MD5, in this character string base Asymmetric computing is carried out on plinth, the safety of data can be further ensured that, and because operational data amount is few, can fully demonstrate The high feature of asymmetric computing level of security, can not embody the inferior position that asymmetric computing requires time for length again.
This device also includes:
Preset module, is used for pre-setting domain name list and white list;
Update configuration module, for when accessing a game, giving its domain name and Gkey value, according to the domain being given Name, Gkey value are updated to domain name list, white list, and the storage address configuration store path letter according to game data Breath.
Optionally, described acquisition module is according to the store path acquisition of information game data being configured, or according to described Acquisition module obtains game data according to the process asked.
Optionally, this device also includes:
First receiver module, for receiving the game request from browser client;
Game request parsing module, for parsing described game request, the unique mark of request game to determine, and base Determine its store path in described unique mark;
The encryption data of described acquisition module game data according to described store path direct access, or according to institute State store path and obtain described game data.
Optionally, described unique mark is and corresponding domain name or the G-key value of playing.
Safe encryption device proposed by the present invention, especially embodies on the server, can be as game promotion platform Browser provides secure data, even if promote is third-party game data, or even is stored on third-party server Game data, by using safe encryption device proposed by the present invention, can transfer game data for browser terminal in real time Safety check is provided to generate it is ensured that data safety during webpage.
The present invention also provides a kind of secure decryption device of game data, this secure decryption device body on the subscriber terminal Existing, as shown in figure 5, this device specifically includes:
Second sending module 61, for sending game running request by browsing device net page;
Second receiver module 62, for receiving encrypted lottery data from browser server;
Deciphering module 63, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined Interface, corresponding with the interface of game data;
Processing module 64, for generating webpage to run described game according to the game data after described deciphering.
Described game data includes play backstage configuration information and concrete game running data, using Plugin Mechanism to institute State encrypted lottery data to be decrypted, browser client can be to verifying out abnormal data, by abandoning by decrypting process Abnormal data, re-start the request of game data, game data friendship can be carried out in the interaction with server for the terminal The mutually automatic reparation of process exception, it can be avoided that user intercepts and captures game data provides a user with abnormal data,
Optionally, this device includes:
Second receiver module, for receiving the response data of browser server return;
Processing module, for judging whether to need to run a plug-in unit based on described response data,
If it is required, then judging whether terminal has installed this plug-in unit, without installation, then it is based on described response data Go to obtain plug-in unit installation kit, and carry out the installation of described plug-in unit, if having installed this plug-in unit, using described response data to this Plug-in unit is initialized, and plus download the plugin.
If it is not required, then being loaded directly into the game data after described deciphering.
Optionally, this plug-in card configuration has Gkey parameter, and described Gkey parameter is used for being assigned the exclusive identification code of game.
The technical scheme providing in the embodiment of the present application, at least has the following technical effect that or advantage:
In the embodiment of the present application, by the encryption to game data, ensure that the safety of game data.
When pushing game particularly by browser platform, game data is loaded by general browser plug-in unit and realize webpage During game, the game data that third party can be provided carries out safety check, thus avoid game request data to be held as a hostage leading to Invalid data offer, and inspection game data failure in the case of, can automatically trigger re-request data Flow process, therefore, it is possible to automatically be repaired to the abnormal conditions of game data.
Herein described method can compatible almost all of browser (as long as the browser based on IE kernel development, Such as IE6-IE11, Webkit etc.), any game write with predetermined interface can be loaded, compatibility is very strong.
The application by way of distinguishing using user input domain name loading application programs, and can utilize embedded, net Page downloads the mode of application program, can have application program and other bad third parties determining safety of reliable signature The application program isolation load of signature is run, and can on the one hand ensure the safety of browser, enabling to browser can load again The extensively application program of digital signature.
Actually present invention also offers to distinguish provide method and the browser of application program using various ways, the A kind of mode be by for application assigned domain name thus with respond user's domain name request by way of loading application programs, this Mode is applied to the very not reliable application program of digital signature, the trip of the application program that such as third party provides, especially webpage Play, client game;The second way is in the way of the precalculated position that application program is directly embedded into browser, by user's point Hit browsing device net page precalculated position and be loaded directly into application program, the second way is adapted to the digital signature with browser trust Application program, thus the application also proposed by browser by different way to provide different safety class application journey Sequence.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of description, and in order to allow the above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the specific embodiment of the present invention.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various Programming language realizes the content of invention described herein, and the description above language-specific done is to disclose this Bright preferred forms.
In description mentioned herein, illustrate a large amount of details.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of not having these details.In some instances, known method, structure are not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly it will be appreciated that in order to simplify the application and help understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield more features than the feature being expressly recited in each claim.More precisely, it is such as following Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore, The claims following specific embodiment are thus expressly incorporated in this specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that and the module in the equipment in embodiment can be carried out adaptively Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list Unit or assembly be combined into a module or unit or assembly, and can be divided in addition multiple submodule or subelement or Sub-component.In addition to such feature and/or at least some of process or unit exclude each other, can adopt any Combination is to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can carry out generation by the alternative features providing identical, equivalent or similar purpose Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments Including some features rather than further feature, but the combination of the feature of different embodiment means to be in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment required for protection any it One can in any combination mode using.
The all parts embodiment of the present invention can be realized with hardware, or to run on one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) come to realize gateway according to embodiments of the present invention, proxy server, in system Some or all parts some or all functions.The present invention is also implemented as executing side as described herein Some or all equipment of method or program of device (for example, computer program and computer program).Such The program realizing the present invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other shape Formula provides.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware including some different elements and by means of properly programmed computer Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The invention provides following technical proposal:
A1, a kind of safe encryption method of game data are it is characterised in that the method includes:
Obtain game data;
Calculate the feature code value of described game data;
Acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
The encryption data of described game data is sent to browser client.
A2, the method according to A1, are further characterized in that, described document information is the MD5 value of game data.
A3, the method according to A1 or A2, are further characterized in that, the method also includes:
Pre-set domain name list and white list;
When accessing a game, give its domain name and Gkey value, according to the domain name being given, Gkey value to domain name List, white list are updated, and configure store path information according to the storage address of game data.
A4, the method according to A3, are further characterized in that, according to the store path acquisition of information game number being configured According to.
A5, the method according to any one of A1-A4, are further characterized in that, obtain game number according to the process asked According to.
A6, the method according to any one of A1-A5, are further characterized in that, the method also includes:
Receive the game request from browser client;
Parse described game request, the unique mark of request game to determine, and it is determined based on described unique mark Store path;
The encryption data of game data according to described store path direct access, or obtained according to described store path Take described game data.
A7, the method according to A6, described unique mark is and play corresponding domain name or G-key value.
B8, a kind of secure decryption method of game data are it is characterised in that the method includes:
Game running request is sent by browsing device net page;
Receive encrypted lottery data from browser server;
Using Plugin Mechanism, described encrypted lottery data is decrypted, this plug-in unit has predetermined interface, with game data Interface corresponding;
Webpage is generated to run described game according to the game data after described deciphering.
B9, the method according to B8, the method is in step:Game running request is sent by browsing device net page, afterwards, Also include:
Receive the response data that browser server returns;
Searched based on described response data and open this plug-in unit.
B10, the method according to B9, without finding this plug-in unit, then go to obtain based on described response data and insert Part installation kit, and carry out the installation of described plug-in unit, described this plug-in unit of opening specifically includes:Using described response data to this plug-in unit Initialized, and plus download the plugin.
If it is not required, then being loaded directly into the game data after described deciphering.
B10, the method according to B8 or B9, are further characterized in that, this plug-in card configuration has Gkey parameter, described Gkey ginseng Number is for being assigned the exclusive identification code of game.
C11, a kind of safe encryption device of game data are it is characterised in that this device includes:
Acquisition module, for obtaining game data;
Feature code value computing module, for calculating the feature code value of described game data;
Asymmetric computing module, for acquired feature code value is carried out with asymmetric computing, generates game data
Encryption data;
First sending module, for sending the encryption data of described game data to browser client.
C12, the device according to C11, are further characterized in that, described document information value computing module calculates mould for MD5 value Block.
C13, the device according to C11 or C12, are further characterized in that, this device also includes:
Preset module, is used for pre-setting domain name list and white list;
Update configuration module, for when accessing a game, giving its domain name and Gkey value, according to the domain being given Name, Gkey value are updated to domain name list, white list, and the storage address configuration store path letter according to game data Breath.
C14, the device according to C13, are further characterized in that, described acquisition module is according to the store path letter being configured Breath obtains game data.
C15, the device according to any one of C11-C14, are further characterized in that, described acquisition module is according to being asked Process obtain game data.
C16, the device according to any one of C11-C15, are further characterized in that, this device also includes:
First receiver module, for receiving the game request from browser client;
Game request parsing module, for parsing described game request, the unique mark of request game to determine,
And its store path is determined based on described unique mark;
The encryption data of described acquisition module game data according to described store path direct access, or root
Obtain described game data according to described store path.
C17, the device according to C16, described unique mark is and play corresponding domain name or G-key value.
D18, a kind of secure decryption device of game data are it is characterised in that this device includes:
Second sending module, for sending game running request by browsing device net page;
Second receiver module, for receiving encrypted lottery data from browser server;
Deciphering module, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined connecing Mouthful, corresponding with the interface of game data;
Processing module, for generating webpage to run described game according to the game data after described deciphering.
D19, the device according to D18, are further characterized in that,
Described second receiver module, is additionally operable to receive the response data that browser server returns;
Described processing module, for plug-in unit being initialized based on described response data and adding download the plugin,
D20, the device according to D18 or D19, are further characterized in that, this plug-in unit is provided with Gkey parameter, described process The exclusive identification code played is given described Gkey parameter based on described response data by module.

Claims (10)

1. a kind of safe encryption method of game data is it is characterised in that the method includes:
Obtain game data;
Calculate the feature code value of described game data;
Acquired feature code value is carried out with asymmetric computing, generates the encryption data of game data;
The encryption data of described game data is sent to browser client.
2. method according to claim 1, is further characterized in that, described document information is the MD5 value of game data.
3. method according to claim 1 and 2, is further characterized in that, the method also includes:
Pre-set domain name list and white list;
When accessing a game, give its domain name and Gkey value, according to the domain name being given, Gkey value, domain name is arranged Table, white list are updated, and configure store path information according to the storage address of game data.
4. method according to claim 3, is further characterized in that, according to the store path acquisition of information game number being configured According to.
5. the method according to any one of claim 1-4, is further characterized in that, obtains game according to the process asked Data.
6. the method according to any one of claim 1-5, is further characterized in that, the method also includes:
Receive the game request from browser client;
Parse described game request, the unique mark of request game to determine, and its storage is determined based on described unique mark Path;
The encryption data of game data according to described store path direct access, or institute is obtained according to described store path State game data.
7. method according to claim 6, described unique mark is and play corresponding domain name or G-key value.
8. a kind of secure decryption method of game data is it is characterised in that the method includes:
Game running request is sent by browsing device net page;
Receive encrypted lottery data from browser server;
Using Plugin Mechanism, described encrypted lottery data is decrypted, this plug-in unit has predetermined interface, with connecing of game data Mouth is corresponding;
Webpage is generated to run described game according to the game data after described deciphering.
9. a kind of safe encryption device of game data is it is characterised in that this device includes:
Acquisition module, for obtaining game data;
Feature code value computing module, for calculating the feature code value of described game data;
Asymmetric computing module, for acquired feature code value is carried out with asymmetric computing, generates the encryption number of game data According to;
First sending module, for sending the encryption data of described game data to browser client.
10. a kind of secure decryption device of game data is it is characterised in that this device includes:
Second sending module, for sending game running request by browsing device net page;
Second receiver module, for receiving encrypted lottery data from browser server;
Deciphering module, for being decrypted to described encrypted lottery data using Plugin Mechanism, this plug-in unit has predetermined interface, with The interface of game data is corresponding;
Processing module, for generating webpage to run described game according to the game data after described deciphering.
CN201610856558.9A 2016-09-27 2016-09-27 A kind of safe encryption and decryption method of game data and encryption, decryption device Active CN106411880B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610856558.9A CN106411880B (en) 2016-09-27 2016-09-27 A kind of safe encryption and decryption method of game data and encryption, decryption device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610856558.9A CN106411880B (en) 2016-09-27 2016-09-27 A kind of safe encryption and decryption method of game data and encryption, decryption device

Publications (2)

Publication Number Publication Date
CN106411880A true CN106411880A (en) 2017-02-15
CN106411880B CN106411880B (en) 2019-11-19

Family

ID=57997615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610856558.9A Active CN106411880B (en) 2016-09-27 2016-09-27 A kind of safe encryption and decryption method of game data and encryption, decryption device

Country Status (1)

Country Link
CN (1) CN106411880B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107320959A (en) * 2017-06-28 2017-11-07 网易(杭州)网络有限公司 Game role identification information generation method, device, medium and electronic equipment
CN107590397A (en) * 2017-09-19 2018-01-16 广州酷狗计算机科技有限公司 A kind of method and apparatus for showing embedded webpage
CN108434727A (en) * 2018-03-27 2018-08-24 北京知道创宇信息技术有限公司 electronic card processing method and system
CN109589608A (en) * 2018-12-19 2019-04-09 网易(杭州)网络有限公司 The method and apparatus for protecting game data
CN115250194A (en) * 2022-01-10 2022-10-28 重庆科创职业学院 Computer network security communication method based on big data terminal equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101370013A (en) * 2008-07-10 2009-02-18 诸松涛 Anti-cheater method for network game
CN101171611B (en) * 2005-03-10 2011-03-23 Igt公司 Secured virtual network in a gaming environment
CN102647398A (en) * 2011-02-16 2012-08-22 腾讯科技(深圳)有限公司 Method and device for realizing game on basis of mobile terminal
CN102685109A (en) * 2012-04-11 2012-09-19 佳都新太科技股份有限公司 Game CP (content provider) access method under three network integration
CN103607402A (en) * 2013-11-26 2014-02-26 广州博冠信息科技有限公司 Online game data encryption and decryption method and equipment
US9141952B2 (en) * 2009-01-15 2015-09-22 Igt EGM authentication mechanism using multiple key pairs at the bios with PKI
CN105450620A (en) * 2014-09-30 2016-03-30 阿里巴巴集团控股有限公司 Information processing method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101171611B (en) * 2005-03-10 2011-03-23 Igt公司 Secured virtual network in a gaming environment
CN101370013A (en) * 2008-07-10 2009-02-18 诸松涛 Anti-cheater method for network game
US9141952B2 (en) * 2009-01-15 2015-09-22 Igt EGM authentication mechanism using multiple key pairs at the bios with PKI
CN102647398A (en) * 2011-02-16 2012-08-22 腾讯科技(深圳)有限公司 Method and device for realizing game on basis of mobile terminal
CN102685109A (en) * 2012-04-11 2012-09-19 佳都新太科技股份有限公司 Game CP (content provider) access method under three network integration
CN103607402A (en) * 2013-11-26 2014-02-26 广州博冠信息科技有限公司 Online game data encryption and decryption method and equipment
CN105450620A (en) * 2014-09-30 2016-03-30 阿里巴巴集团控股有限公司 Information processing method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107320959A (en) * 2017-06-28 2017-11-07 网易(杭州)网络有限公司 Game role identification information generation method, device, medium and electronic equipment
CN107320959B (en) * 2017-06-28 2020-10-23 网易(杭州)网络有限公司 Game role identification information generation method, device, medium and electronic equipment
CN107590397A (en) * 2017-09-19 2018-01-16 广州酷狗计算机科技有限公司 A kind of method and apparatus for showing embedded webpage
CN108434727A (en) * 2018-03-27 2018-08-24 北京知道创宇信息技术有限公司 electronic card processing method and system
CN109589608A (en) * 2018-12-19 2019-04-09 网易(杭州)网络有限公司 The method and apparatus for protecting game data
CN115250194A (en) * 2022-01-10 2022-10-28 重庆科创职业学院 Computer network security communication method based on big data terminal equipment

Also Published As

Publication number Publication date
CN106411880B (en) 2019-11-19

Similar Documents

Publication Publication Date Title
CN106411880B (en) A kind of safe encryption and decryption method of game data and encryption, decryption device
CN103944890B (en) Virtual interaction system based on customer end/server mode and method
US6438600B1 (en) Securely sharing log-in credentials among trusted browser-based applications
CN103843004B (en) Device customizes white list
US20130167104A1 (en) Runtime Library Including A Virtual File System
CN106406961A (en) Method and device for loading and providing application based on browser
US8387140B2 (en) Method and apparatus for controlling access to encrypted network communication channels
CN105940654A (en) Privileged static hosted WEB applications
CN104063788B (en) Mobile platform credibility payment system and method
CN107533608A (en) Credible renewal
EP2976709A1 (en) Systems and methods for intercepting, processing, and protecting user data through web application pattern detection
CN105427096A (en) Payment security sandbox realization method and system and application program monitoring method and system
CN104391729B (en) Programme upgrade method and device based on Root authority
Falsina et al. Grab'n run: Secure and practical dynamic code loading for android applications
CN104239786A (en) ROOT-free active defense configuration method and device
CN111917837A (en) Web micro application program publishing system and implementation method thereof
US9756149B2 (en) Machine-specific instruction set translation
CN111406257B (en) System and method for authentication
CN107066888B (en) Extensible trusted user interface, method and electronic device
US9354849B2 (en) Modification of compiled applications and application management using retrievable policies
KR102032958B1 (en) Apparatus, method and system for checking vulnerable point
US8474013B2 (en) Securely managing password access to a computer system
Kotipalli et al. Hacking Android
CN104158812A (en) Method and system of safety control of terminal application
CN104539585A (en) Browser anti-injection method, browser client side and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220715

Address after: Room 801, 8th floor, No. 104, floors 1-19, building 2, yard 6, Jiuxianqiao Road, Chaoyang District, Beijing 100015

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.