CN108234389A - A kind of client validation method and system - Google Patents

A kind of client validation method and system Download PDF

Info

Publication number
CN108234389A
CN108234389A CN201611149967.1A CN201611149967A CN108234389A CN 108234389 A CN108234389 A CN 108234389A CN 201611149967 A CN201611149967 A CN 201611149967A CN 108234389 A CN108234389 A CN 108234389A
Authority
CN
China
Prior art keywords
client
server
user
identifying code
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611149967.1A
Other languages
Chinese (zh)
Inventor
蔡建文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd
Original Assignee
SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd filed Critical SHENGQU INFORMATION TECHNOLOGY (SHANGHAI) Co Ltd
Priority to CN201611149967.1A priority Critical patent/CN108234389A/en
Publication of CN108234389A publication Critical patent/CN108234389A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0209Incentive being awarded or redeemed in connection with the playing of a video game
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

This application involves a kind of client validation method and systems.This method includes:User end to server sends the request for logging in game;The server receives the request, and the server issues identifying code to the client;The user of the client operates the identifying code, and the result of operation is committed to the server by the client;And the server verifies the result.This method further includes:If the verification passes, then the user is rewarded;If authentication failed, judge whether continuously to malfunction;If continuous error, takes counterattacking measure;And if not continuous error, returns.By client validation mode provided by the invention, hack can be prevented, effectively breaks through on-hook software, improves Information Security and reliability.

Description

A kind of client validation method and system
Technical field
This application involves the Technology On Data Encryptions in online game more particularly to online game.
Background technology
Massively Multiplayer Online Role Playing Games MMORPG (massively multiplayer online role- Playing games) it is usually directed to the participation of a large amount of players.MMORPG plays in the game that diversification true to nature is provided to player Hold, there is high degree of freedom.Player enjoy play when, can interactive together with good friend, game and growth, but simultaneously Also cause and in the presence of by various means crack inversely, in particular for the communication number between game client and server end It is analyzed according to packet.Once and hack related communication data protocol, then can be each with simulant-client behavior and simulation Kind legal request, so as to achieve the purpose that spoofing server, and then may finally produce it is various it is pernicious it is plug-in (such as:It hangs Machine, acceleration etc.), interests are obtained automatically by on-hook software.If do not broken through, fair play is seriously affected, it but will threat data Safety.
Therefore, this field needs a kind of improved verification mode to break through this game on-hook software.
Invention content
In consideration of it, the application is intended to provide a kind of client validation method and system.
According to one embodiment of the invention, a kind of client validation method of online game is provided, including:Client to Server sends the request for logging in game;The server receives the request, and the server is under the client Send out identifying code;The user of the client operates the identifying code, and the result of operation is committed to institute by the client State server;And the server verifies the result.
According to one aspect, this method further includes:If the verification passes, then the user is rewarded;If authentication failed is sentenced It is disconnected whether continuously to malfunction;If continuous error, takes counterattacking measure;And if not continuous error, returns, the service Device issues identifying code to the client again.
The identifying code includes dynamic authentication picture code according to another aspect, and the user is to the dynamic authentication picture Code carries out drag-and-drop operation.
According to another aspect, the dynamic verification code is to be handed down to the client at regular intervals.
According in another aspect, the dynamic authentication picture code is according to the user is current and/or expected gesture or appearance State provides.
According to a further embodiment of the invention, a kind of client validation system of online game is provided, including:Client End, the user end to server transmission log in the request of game;And server, the server receive the request, and And the server issues identifying code to the client;Wherein, the user of the client operates the identifying code, The result of operation is committed to the server by the client;The server verifies the result.
According to one aspect, if the verification passes, then the user is rewarded;If authentication failed, judge whether continuously to go out It is wrong;If continuous error, takes counterattacking measure;And if not continuous error, returns, the server is again to described Client issues identifying code.
The identifying code includes dynamic authentication picture code according to another aspect, and the user is to the dynamic authentication picture Code carries out drag-and-drop operation.
According to another embodiment of the invention, a kind of system of the client validation for online game is provided, it is described System includes:At least one logic processor;Computer readable storage medium, the computer-readable recording medium storage are used for Perform the following computer executable instructions operated:User end to server sends the request for logging in game;The server connects It receives the request and the server issues identifying code to the client;The user of the client to the identifying code into The result of operation is committed to the server by row operation, the client;And the server tests the result Card.
According to one aspect, the computer that the computer readable storage medium also stores for performing the following operations can perform Instruction:If the verification passes, then the user is rewarded;If authentication failed, judge whether continuously to malfunction;If continuously go out Mistake then takes counterattacking measure;And if not continuous error, returns, the server issues to the client test again Demonstrate,prove code.
Client validation mode improves the reliability of verification code technology in the online game that the present invention provides, and very just It is prompt.By client validation mode provided by the invention, hack can be prevented, effectively breaks through on-hook software, protects data Safety.In addition, school has reward after examining successfully so that participant in game more gladly carries out dynamic authentication.
Description of the drawings
The exemplary embodiment that the application is shown in the attached drawing of this and composition this specification part is included in, and with more than The invention content and specific embodiment given below provided is used for explaining together the feature of the application.
Fig. 1 is the flow chart according to the client validation method of one embodiment of the application.
Specific embodiment
It will be described in detail with reference to the accompanying drawings various embodiments.In place of possible, same reference numerals will pass through attached drawing for referring to For same or like part.To particular example and realize that made reference is for explanatory purposes, and to be not intended to limit the application Or the scope of the claims.
Wording " exemplary " is used herein to mean that " be used as example, example or show ".Here depicted as " example Property " any realization be not necessarily to be construed as preferred or advantageous over other realize.
The present invention provides client validation technologies.
With reference to figure 1, Fig. 1 is according to the flow chart of the client validation method of one embodiment of the application, including as follows Step.
User end to server sends the request for logging in game.
Server receives the request.By certain time, server issues identifying code.For example, server in this step Dynamic authentication picture code is generated, is handed down to client.Client is presented to the user, and user is according to shown carry out drag-and-drop operation, so Result is submitted into server afterwards.
Later, server verifies result.For example, server verifies the check code of client operation, close Method is awarded, and illegal takes counterattacking measure.If verification result is just (Y), that is, is verified, then gives certain prize It encourages.If verification result is no (N), i.e. authentication failed, then judge whether continuously to malfunction.If continuously error (Y), take anti- Measure processed.If not continuously error (N), is back to the step of server issues identifying code, server is again under client Send out identifying code.
Wherein, after players log game, according to the benefit ratio that player obtains, not timing wants player to enter dynamic authentication, Certain reward is given after success, can be verified again to player to a chance again after failure, if continuous failure, explanation is on-hook Then software takes counterattacking measure, break through on-hook software in this way.
Dynamic verification code is handed down to client at regular intervals, excessively can frequently interrupt the continuity of game.School inspection into Reward can be provided after work(so that player more gladly carries out dynamic authentication.
The form of drag and drop dynamic picture mosaic may be used in verification mode, while increasing interesting, also increases operation just Victory.
It is appreciated that other than dragging picture mosaic mode of operation, Http agreements can also be used to carry out dynamic verification code It downloads, to mitigate the burden of server.Further, it is also possible to according to actual conditions, carried out using dragging picture mosaic combination Http agreements Dynamic authentication.
Furthermore it is also possible to according to player is current and/or expected gesture or posture, dynamic authentication picture is adaptably provided Code.For example, when detecting that the current operating area of player is client screen upper right side, then dynamic picture mosaic can be provided to object for appreciation Operating area before family belongings is nearby (e.g., on the right side of screen, above screen etc.), and in order to verify when does not influence the behaviour of current player Make.For another example, the operating area after player according to factors such as player history operating habit, game episodes, is predicted may be visitor Dynamic picture mosaic can be then provided near expected operating area (e.g., on the left of screen, below screen by family end screen lower left Deng), in order to verify when does not influence the operation of expected player.In addition, dynamic authentication picture code can be selected from player history/when A part for image in preceding interface, effectively to break through game on-hook.
Server end can be according to the network condition of client, the suitable server of loading condition dynamic select of server end Resource downloading service is provided.
Client validation mode improves the reliability and very just of verification code technology in the online game that the present invention provides It is prompt.By client validation mode provided by the invention, hack can be prevented, effectively breaks through on-hook software, is created more Fair game environment improves Information Security.
It should be appreciated that above-described embodiment only as an example, not a limit, those skilled in the art be further contemplated that it is more its His similar approach realizes client validation.Such realization method should not be interpreted to cause departing from scope of the present application.
In one or more exemplary embodiments, described function and process can hardware, software, firmware, Or any combination thereof in realize.If realized in software, each function can be used as the instruction of one or more items or code to deposit Storage is transmitted on a computer-readable medium or by it.Computer-readable medium includes computer storage media and communication media The two, including any medium that computer program is facilitated to shift from one place to another.Storage medium can be calculated Any usable medium that machine accesses.It is non-limiting as example, such computer-readable medium may include RAM, ROM, EEPROM, CD-ROM or other optical disc storage, disk storage or other magnetic storage apparatus can be used to carrying or store instruction Or data structure form desirable program code and any other medium that can be accessed by a computer.For firmware and/or software It realizes, these methods can be realized with the module (for example, program, function etc.) for performing functions described herein.It is tangible Any machine readable media that ground embodies instruction can be used for realizing method system described herein.For example, software code can It is stored in the memory of the memory of such as movement station etc, and by such as desktop computer, laptop computer, service The processors such as device computer, the microprocessor for moving equipment perform.Memory can be realized inside processor or outside processor Portion.As it is used herein, term " memory " refer to any kind of long-term, short-term, volatibility, it is non-volatile or other Memory, and it is not limited to the Jie of any certain types of memory or certain number of memory or memory storage on it The type of matter.
Foregoing description and diagram are only provided as illustrated examples.Any of claim element of singulative is drawn It states, such as should not be construed as the element being defined to odd number using the citation of article " one ", " certain " or "the".Technical staff for Each specific application can realize described structure with different modes, but such realization method should not be interpreted to cause Departing from scope of the present application.
The previous description for providing the disclosed embodiments is in order to which any person skilled in the art is made all to make or use The application.The various modifications of these embodiments will be apparent, and defined herein for a person skilled in the art General Principle can be applied to other embodiments without departing from spirit herein or range.The application is not intended to as a result, Embodiments shown herein is defined in, but should be awarded and appended claims and principle disclosed herein and novelty The consistent broadest range of feature.

Claims (10)

1. a kind of client validation method of online game, including:
User end to server sends the request for logging in game;
The server receives the request, and the server issues identifying code to the client;
The user of the client operates the identifying code, and the result of operation is committed to the service by the client Device;And
The server verifies the result.
2. the method as described in claim 1, which is characterized in that the method further includes:
If the verification passes, then the user is rewarded;
If authentication failed, judge whether continuously to malfunction;
If continuous error, takes counterattacking measure;And
If not continuous error, returns, the server issues identifying code to the client again.
3. the method as described in claim 1, it is characterised in that:
The identifying code includes dynamic authentication picture code, and the user carries out drag-and-drop operation to the dynamic authentication picture code.
4. method as claimed in claim 3, it is characterised in that:
The dynamic verification code is to be handed down to the client at regular intervals.
5. method as claimed in claim 3, it is characterised in that:
The dynamic authentication picture code is according to the user is current and/or expected gesture or posture provide.
6. a kind of client validation system of online game, including:
Client, the user end to server transmission log in the request of game;And
Server, the server receives the request, and the server issues identifying code to the client;
Wherein, the user of the client operates the identifying code, and the result of operation is committed to institute by the client State server;The server verifies the result.
7. system as claimed in claim 6, it is characterised in that:
If the verification passes, then the user is rewarded;
If authentication failed, judge whether continuously to malfunction;
If continuous error, takes counterattacking measure;And
If not continuous error, returns, the server issues identifying code to the client again.
8. system as claimed in claim 6, it is characterised in that:
The identifying code includes dynamic authentication picture code, and the user carries out drag-and-drop operation to the dynamic authentication picture code.
9. a kind of system of client validation for online game, the system comprises:
At least one logic processor;
Computer readable storage medium, the computer of the computer-readable recording medium storage for performing the following operations can be held Row instruction:
User end to server sends the request for logging in game;
The server receives the request and the server issues identifying code to the client;
The user of the client operates the identifying code, and the result of operation is committed to the service by the client Device;And
The server verifies the result.
10. system as claimed in claim 9, which is characterized in that the computer readable storage medium also stores to perform The computer executable instructions operated below:
If the verification passes, then the user is rewarded;
If authentication failed, judge whether continuously to malfunction;
If continuous error, takes counterattacking measure;And
If not continuous error, returns, the server issues identifying code to the client again.
CN201611149967.1A 2016-12-14 2016-12-14 A kind of client validation method and system Pending CN108234389A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611149967.1A CN108234389A (en) 2016-12-14 2016-12-14 A kind of client validation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611149967.1A CN108234389A (en) 2016-12-14 2016-12-14 A kind of client validation method and system

Publications (1)

Publication Number Publication Date
CN108234389A true CN108234389A (en) 2018-06-29

Family

ID=62637547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611149967.1A Pending CN108234389A (en) 2016-12-14 2016-12-14 A kind of client validation method and system

Country Status (1)

Country Link
CN (1) CN108234389A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110613936A (en) * 2019-09-08 2019-12-27 北京智明星通科技股份有限公司 Method, device and server for identifying on-hook in multiplayer battle game

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200742601A (en) * 2006-05-01 2007-11-16 Rong Wang One method for detecting internet game cheating
CN101114324A (en) * 2006-07-25 2008-01-30 珠海市西山居软件有限公司 Network gaming system capable of preventing externally hung and method thereof
CN102567655A (en) * 2010-12-08 2012-07-11 盛乐信息技术(上海)有限公司 Robot cheating program detecting system and method
CN102999258A (en) * 2011-09-14 2013-03-27 富泰华工业(深圳)有限公司 Electronic device and method for rapidly positioning menu option
CN104702406A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Identity verification method and identity verification device
CN105024967A (en) * 2014-04-17 2015-11-04 北京畅游天下网络技术有限公司 Method of identifying plug-in game by using verification picture

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200742601A (en) * 2006-05-01 2007-11-16 Rong Wang One method for detecting internet game cheating
CN101114324A (en) * 2006-07-25 2008-01-30 珠海市西山居软件有限公司 Network gaming system capable of preventing externally hung and method thereof
CN102567655A (en) * 2010-12-08 2012-07-11 盛乐信息技术(上海)有限公司 Robot cheating program detecting system and method
CN102999258A (en) * 2011-09-14 2013-03-27 富泰华工业(深圳)有限公司 Electronic device and method for rapidly positioning menu option
CN104702406A (en) * 2013-12-04 2015-06-10 腾讯科技(深圳)有限公司 Identity verification method and identity verification device
CN105024967A (en) * 2014-04-17 2015-11-04 北京畅游天下网络技术有限公司 Method of identifying plug-in game by using verification picture

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110613936A (en) * 2019-09-08 2019-12-27 北京智明星通科技股份有限公司 Method, device and server for identifying on-hook in multiplayer battle game

Similar Documents

Publication Publication Date Title
US10789816B2 (en) Promoting competitive balance in multiplayer gaming
Lewis et al. What went wrong: a taxonomy of video game bugs
US8543930B2 (en) System and method for human identification proof for use in virtual environments
US10046240B2 (en) Social networking data augmented gaming kiosk
US9517402B1 (en) System and method for uniquely identifying players in computer games based on behavior and other characteristics
US9873046B2 (en) Asynchronous online game play and defend mode processing to enable social friends to assist and alter game play outcomes
CN106874245B (en) Dynamic Flag processing method and device for CTF online competition platform
US11654365B2 (en) Secure anti-cheat system
US9358468B2 (en) Pattern detection of avatars in a virtual environment
US9452355B1 (en) Game design based CAPTCHAs
US11468738B2 (en) System and method for playing online game
US11265343B2 (en) System and method for cyber training
US20120208642A1 (en) Method and system for creating a virtual world where user-controlled characters interact with non-player characters
CN108234389A (en) A kind of client validation method and system
KR20210106859A (en) Progressive human user detection challenges with rewards
IL275933B2 (en) System and method for playing online game
KR101190497B1 (en) Method and server of preventing automatic play of on-line game service
US9262046B2 (en) Adaptation of gaming applications to participants
KR102551254B1 (en) Method and computer program for providing a service of sharing a game
Genovese et al. Capture the Flag: An Owner’s Manual
KR20200116316A (en) Method and apparatus for providing an integrated game reporting system
JP2016024745A (en) Bi-directional data communication system, sport support system, training support system, sport support method, training support method, training method, program for the same method, and recording medium for recording the same program
KR20170060889A (en) Device and method to control user object and non-user object

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180629

RJ01 Rejection of invention patent application after publication