CN108234389A - A kind of client validation method and system - Google Patents
A kind of client validation method and system Download PDFInfo
- Publication number
- CN108234389A CN108234389A CN201611149967.1A CN201611149967A CN108234389A CN 108234389 A CN108234389 A CN 108234389A CN 201611149967 A CN201611149967 A CN 201611149967A CN 108234389 A CN108234389 A CN 108234389A
- Authority
- CN
- China
- Prior art keywords
- client
- server
- user
- identifying code
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/36—User authentication by graphic or iconic representation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0209—Incentive being awarded or redeemed in connection with the playing of a video game
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
Abstract
This application involves a kind of client validation method and systems.This method includes:User end to server sends the request for logging in game;The server receives the request, and the server issues identifying code to the client;The user of the client operates the identifying code, and the result of operation is committed to the server by the client;And the server verifies the result.This method further includes:If the verification passes, then the user is rewarded;If authentication failed, judge whether continuously to malfunction;If continuous error, takes counterattacking measure;And if not continuous error, returns.By client validation mode provided by the invention, hack can be prevented, effectively breaks through on-hook software, improves Information Security and reliability.
Description
Technical field
This application involves the Technology On Data Encryptions in online game more particularly to online game.
Background technology
Massively Multiplayer Online Role Playing Games MMORPG (massively multiplayer online role-
Playing games) it is usually directed to the participation of a large amount of players.MMORPG plays in the game that diversification true to nature is provided to player
Hold, there is high degree of freedom.Player enjoy play when, can interactive together with good friend, game and growth, but simultaneously
Also cause and in the presence of by various means crack inversely, in particular for the communication number between game client and server end
It is analyzed according to packet.Once and hack related communication data protocol, then can be each with simulant-client behavior and simulation
Kind legal request, so as to achieve the purpose that spoofing server, and then may finally produce it is various it is pernicious it is plug-in (such as:It hangs
Machine, acceleration etc.), interests are obtained automatically by on-hook software.If do not broken through, fair play is seriously affected, it but will threat data
Safety.
Therefore, this field needs a kind of improved verification mode to break through this game on-hook software.
Invention content
In consideration of it, the application is intended to provide a kind of client validation method and system.
According to one embodiment of the invention, a kind of client validation method of online game is provided, including:Client to
Server sends the request for logging in game;The server receives the request, and the server is under the client
Send out identifying code;The user of the client operates the identifying code, and the result of operation is committed to institute by the client
State server;And the server verifies the result.
According to one aspect, this method further includes:If the verification passes, then the user is rewarded;If authentication failed is sentenced
It is disconnected whether continuously to malfunction;If continuous error, takes counterattacking measure;And if not continuous error, returns, the service
Device issues identifying code to the client again.
The identifying code includes dynamic authentication picture code according to another aspect, and the user is to the dynamic authentication picture
Code carries out drag-and-drop operation.
According to another aspect, the dynamic verification code is to be handed down to the client at regular intervals.
According in another aspect, the dynamic authentication picture code is according to the user is current and/or expected gesture or appearance
State provides.
According to a further embodiment of the invention, a kind of client validation system of online game is provided, including:Client
End, the user end to server transmission log in the request of game;And server, the server receive the request, and
And the server issues identifying code to the client;Wherein, the user of the client operates the identifying code,
The result of operation is committed to the server by the client;The server verifies the result.
According to one aspect, if the verification passes, then the user is rewarded;If authentication failed, judge whether continuously to go out
It is wrong;If continuous error, takes counterattacking measure;And if not continuous error, returns, the server is again to described
Client issues identifying code.
The identifying code includes dynamic authentication picture code according to another aspect, and the user is to the dynamic authentication picture
Code carries out drag-and-drop operation.
According to another embodiment of the invention, a kind of system of the client validation for online game is provided, it is described
System includes:At least one logic processor;Computer readable storage medium, the computer-readable recording medium storage are used for
Perform the following computer executable instructions operated:User end to server sends the request for logging in game;The server connects
It receives the request and the server issues identifying code to the client;The user of the client to the identifying code into
The result of operation is committed to the server by row operation, the client;And the server tests the result
Card.
According to one aspect, the computer that the computer readable storage medium also stores for performing the following operations can perform
Instruction:If the verification passes, then the user is rewarded;If authentication failed, judge whether continuously to malfunction;If continuously go out
Mistake then takes counterattacking measure;And if not continuous error, returns, the server issues to the client test again
Demonstrate,prove code.
Client validation mode improves the reliability of verification code technology in the online game that the present invention provides, and very just
It is prompt.By client validation mode provided by the invention, hack can be prevented, effectively breaks through on-hook software, protects data
Safety.In addition, school has reward after examining successfully so that participant in game more gladly carries out dynamic authentication.
Description of the drawings
The exemplary embodiment that the application is shown in the attached drawing of this and composition this specification part is included in, and with more than
The invention content and specific embodiment given below provided is used for explaining together the feature of the application.
Fig. 1 is the flow chart according to the client validation method of one embodiment of the application.
Specific embodiment
It will be described in detail with reference to the accompanying drawings various embodiments.In place of possible, same reference numerals will pass through attached drawing for referring to
For same or like part.To particular example and realize that made reference is for explanatory purposes, and to be not intended to limit the application
Or the scope of the claims.
Wording " exemplary " is used herein to mean that " be used as example, example or show ".Here depicted as " example
Property " any realization be not necessarily to be construed as preferred or advantageous over other realize.
The present invention provides client validation technologies.
With reference to figure 1, Fig. 1 is according to the flow chart of the client validation method of one embodiment of the application, including as follows
Step.
User end to server sends the request for logging in game.
Server receives the request.By certain time, server issues identifying code.For example, server in this step
Dynamic authentication picture code is generated, is handed down to client.Client is presented to the user, and user is according to shown carry out drag-and-drop operation, so
Result is submitted into server afterwards.
Later, server verifies result.For example, server verifies the check code of client operation, close
Method is awarded, and illegal takes counterattacking measure.If verification result is just (Y), that is, is verified, then gives certain prize
It encourages.If verification result is no (N), i.e. authentication failed, then judge whether continuously to malfunction.If continuously error (Y), take anti-
Measure processed.If not continuously error (N), is back to the step of server issues identifying code, server is again under client
Send out identifying code.
Wherein, after players log game, according to the benefit ratio that player obtains, not timing wants player to enter dynamic authentication,
Certain reward is given after success, can be verified again to player to a chance again after failure, if continuous failure, explanation is on-hook
Then software takes counterattacking measure, break through on-hook software in this way.
Dynamic verification code is handed down to client at regular intervals, excessively can frequently interrupt the continuity of game.School inspection into
Reward can be provided after work(so that player more gladly carries out dynamic authentication.
The form of drag and drop dynamic picture mosaic may be used in verification mode, while increasing interesting, also increases operation just
Victory.
It is appreciated that other than dragging picture mosaic mode of operation, Http agreements can also be used to carry out dynamic verification code
It downloads, to mitigate the burden of server.Further, it is also possible to according to actual conditions, carried out using dragging picture mosaic combination Http agreements
Dynamic authentication.
Furthermore it is also possible to according to player is current and/or expected gesture or posture, dynamic authentication picture is adaptably provided
Code.For example, when detecting that the current operating area of player is client screen upper right side, then dynamic picture mosaic can be provided to object for appreciation
Operating area before family belongings is nearby (e.g., on the right side of screen, above screen etc.), and in order to verify when does not influence the behaviour of current player
Make.For another example, the operating area after player according to factors such as player history operating habit, game episodes, is predicted may be visitor
Dynamic picture mosaic can be then provided near expected operating area (e.g., on the left of screen, below screen by family end screen lower left
Deng), in order to verify when does not influence the operation of expected player.In addition, dynamic authentication picture code can be selected from player history/when
A part for image in preceding interface, effectively to break through game on-hook.
Server end can be according to the network condition of client, the suitable server of loading condition dynamic select of server end
Resource downloading service is provided.
Client validation mode improves the reliability and very just of verification code technology in the online game that the present invention provides
It is prompt.By client validation mode provided by the invention, hack can be prevented, effectively breaks through on-hook software, is created more
Fair game environment improves Information Security.
It should be appreciated that above-described embodiment only as an example, not a limit, those skilled in the art be further contemplated that it is more its
His similar approach realizes client validation.Such realization method should not be interpreted to cause departing from scope of the present application.
In one or more exemplary embodiments, described function and process can hardware, software, firmware,
Or any combination thereof in realize.If realized in software, each function can be used as the instruction of one or more items or code to deposit
Storage is transmitted on a computer-readable medium or by it.Computer-readable medium includes computer storage media and communication media
The two, including any medium that computer program is facilitated to shift from one place to another.Storage medium can be calculated
Any usable medium that machine accesses.It is non-limiting as example, such computer-readable medium may include RAM, ROM,
EEPROM, CD-ROM or other optical disc storage, disk storage or other magnetic storage apparatus can be used to carrying or store instruction
Or data structure form desirable program code and any other medium that can be accessed by a computer.For firmware and/or software
It realizes, these methods can be realized with the module (for example, program, function etc.) for performing functions described herein.It is tangible
Any machine readable media that ground embodies instruction can be used for realizing method system described herein.For example, software code can
It is stored in the memory of the memory of such as movement station etc, and by such as desktop computer, laptop computer, service
The processors such as device computer, the microprocessor for moving equipment perform.Memory can be realized inside processor or outside processor
Portion.As it is used herein, term " memory " refer to any kind of long-term, short-term, volatibility, it is non-volatile or other
Memory, and it is not limited to the Jie of any certain types of memory or certain number of memory or memory storage on it
The type of matter.
Foregoing description and diagram are only provided as illustrated examples.Any of claim element of singulative is drawn
It states, such as should not be construed as the element being defined to odd number using the citation of article " one ", " certain " or "the".Technical staff for
Each specific application can realize described structure with different modes, but such realization method should not be interpreted to cause
Departing from scope of the present application.
The previous description for providing the disclosed embodiments is in order to which any person skilled in the art is made all to make or use
The application.The various modifications of these embodiments will be apparent, and defined herein for a person skilled in the art
General Principle can be applied to other embodiments without departing from spirit herein or range.The application is not intended to as a result,
Embodiments shown herein is defined in, but should be awarded and appended claims and principle disclosed herein and novelty
The consistent broadest range of feature.
Claims (10)
1. a kind of client validation method of online game, including:
User end to server sends the request for logging in game;
The server receives the request, and the server issues identifying code to the client;
The user of the client operates the identifying code, and the result of operation is committed to the service by the client
Device;And
The server verifies the result.
2. the method as described in claim 1, which is characterized in that the method further includes:
If the verification passes, then the user is rewarded;
If authentication failed, judge whether continuously to malfunction;
If continuous error, takes counterattacking measure;And
If not continuous error, returns, the server issues identifying code to the client again.
3. the method as described in claim 1, it is characterised in that:
The identifying code includes dynamic authentication picture code, and the user carries out drag-and-drop operation to the dynamic authentication picture code.
4. method as claimed in claim 3, it is characterised in that:
The dynamic verification code is to be handed down to the client at regular intervals.
5. method as claimed in claim 3, it is characterised in that:
The dynamic authentication picture code is according to the user is current and/or expected gesture or posture provide.
6. a kind of client validation system of online game, including:
Client, the user end to server transmission log in the request of game;And
Server, the server receives the request, and the server issues identifying code to the client;
Wherein, the user of the client operates the identifying code, and the result of operation is committed to institute by the client
State server;The server verifies the result.
7. system as claimed in claim 6, it is characterised in that:
If the verification passes, then the user is rewarded;
If authentication failed, judge whether continuously to malfunction;
If continuous error, takes counterattacking measure;And
If not continuous error, returns, the server issues identifying code to the client again.
8. system as claimed in claim 6, it is characterised in that:
The identifying code includes dynamic authentication picture code, and the user carries out drag-and-drop operation to the dynamic authentication picture code.
9. a kind of system of client validation for online game, the system comprises:
At least one logic processor;
Computer readable storage medium, the computer of the computer-readable recording medium storage for performing the following operations can be held
Row instruction:
User end to server sends the request for logging in game;
The server receives the request and the server issues identifying code to the client;
The user of the client operates the identifying code, and the result of operation is committed to the service by the client
Device;And
The server verifies the result.
10. system as claimed in claim 9, which is characterized in that the computer readable storage medium also stores to perform
The computer executable instructions operated below:
If the verification passes, then the user is rewarded;
If authentication failed, judge whether continuously to malfunction;
If continuous error, takes counterattacking measure;And
If not continuous error, returns, the server issues identifying code to the client again.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611149967.1A CN108234389A (en) | 2016-12-14 | 2016-12-14 | A kind of client validation method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611149967.1A CN108234389A (en) | 2016-12-14 | 2016-12-14 | A kind of client validation method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108234389A true CN108234389A (en) | 2018-06-29 |
Family
ID=62637547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611149967.1A Pending CN108234389A (en) | 2016-12-14 | 2016-12-14 | A kind of client validation method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108234389A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110613936A (en) * | 2019-09-08 | 2019-12-27 | 北京智明星通科技股份有限公司 | Method, device and server for identifying on-hook in multiplayer battle game |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200742601A (en) * | 2006-05-01 | 2007-11-16 | Rong Wang | One method for detecting internet game cheating |
CN101114324A (en) * | 2006-07-25 | 2008-01-30 | 珠海市西山居软件有限公司 | Network gaming system capable of preventing externally hung and method thereof |
CN102567655A (en) * | 2010-12-08 | 2012-07-11 | 盛乐信息技术(上海)有限公司 | Robot cheating program detecting system and method |
CN102999258A (en) * | 2011-09-14 | 2013-03-27 | 富泰华工业(深圳)有限公司 | Electronic device and method for rapidly positioning menu option |
CN104702406A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Identity verification method and identity verification device |
CN105024967A (en) * | 2014-04-17 | 2015-11-04 | 北京畅游天下网络技术有限公司 | Method of identifying plug-in game by using verification picture |
-
2016
- 2016-12-14 CN CN201611149967.1A patent/CN108234389A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200742601A (en) * | 2006-05-01 | 2007-11-16 | Rong Wang | One method for detecting internet game cheating |
CN101114324A (en) * | 2006-07-25 | 2008-01-30 | 珠海市西山居软件有限公司 | Network gaming system capable of preventing externally hung and method thereof |
CN102567655A (en) * | 2010-12-08 | 2012-07-11 | 盛乐信息技术(上海)有限公司 | Robot cheating program detecting system and method |
CN102999258A (en) * | 2011-09-14 | 2013-03-27 | 富泰华工业(深圳)有限公司 | Electronic device and method for rapidly positioning menu option |
CN104702406A (en) * | 2013-12-04 | 2015-06-10 | 腾讯科技(深圳)有限公司 | Identity verification method and identity verification device |
CN105024967A (en) * | 2014-04-17 | 2015-11-04 | 北京畅游天下网络技术有限公司 | Method of identifying plug-in game by using verification picture |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110613936A (en) * | 2019-09-08 | 2019-12-27 | 北京智明星通科技股份有限公司 | Method, device and server for identifying on-hook in multiplayer battle game |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10789816B2 (en) | Promoting competitive balance in multiplayer gaming | |
Lewis et al. | What went wrong: a taxonomy of video game bugs | |
US8543930B2 (en) | System and method for human identification proof for use in virtual environments | |
US10046240B2 (en) | Social networking data augmented gaming kiosk | |
US9517402B1 (en) | System and method for uniquely identifying players in computer games based on behavior and other characteristics | |
US9873046B2 (en) | Asynchronous online game play and defend mode processing to enable social friends to assist and alter game play outcomes | |
CN106874245B (en) | Dynamic Flag processing method and device for CTF online competition platform | |
US11654365B2 (en) | Secure anti-cheat system | |
US9358468B2 (en) | Pattern detection of avatars in a virtual environment | |
US9452355B1 (en) | Game design based CAPTCHAs | |
US11468738B2 (en) | System and method for playing online game | |
US11265343B2 (en) | System and method for cyber training | |
US20120208642A1 (en) | Method and system for creating a virtual world where user-controlled characters interact with non-player characters | |
CN108234389A (en) | A kind of client validation method and system | |
KR20210106859A (en) | Progressive human user detection challenges with rewards | |
IL275933B2 (en) | System and method for playing online game | |
KR101190497B1 (en) | Method and server of preventing automatic play of on-line game service | |
US9262046B2 (en) | Adaptation of gaming applications to participants | |
KR102551254B1 (en) | Method and computer program for providing a service of sharing a game | |
Genovese et al. | Capture the Flag: An Owner’s Manual | |
KR20200116316A (en) | Method and apparatus for providing an integrated game reporting system | |
JP2016024745A (en) | Bi-directional data communication system, sport support system, training support system, sport support method, training support method, training method, program for the same method, and recording medium for recording the same program | |
KR20170060889A (en) | Device and method to control user object and non-user object |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180629 |
|
RJ01 | Rejection of invention patent application after publication |