CN111068335A - Anti-plug-in method and system for electronic competition - Google Patents

Anti-plug-in method and system for electronic competition Download PDF

Info

Publication number
CN111068335A
CN111068335A CN201911355401.8A CN201911355401A CN111068335A CN 111068335 A CN111068335 A CN 111068335A CN 201911355401 A CN201911355401 A CN 201911355401A CN 111068335 A CN111068335 A CN 111068335A
Authority
CN
China
Prior art keywords
plug
diskless
executable module
client
characteristic parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911355401.8A
Other languages
Chinese (zh)
Other versions
CN111068335B (en
Inventor
李扬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Jisheng Technology Co ltd
Original Assignee
Chengdu Jisheng Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Jisheng Technology Co ltd filed Critical Chengdu Jisheng Technology Co ltd
Priority to CN201911355401.8A priority Critical patent/CN111068335B/en
Publication of CN111068335A publication Critical patent/CN111068335A/en
Application granted granted Critical
Publication of CN111068335B publication Critical patent/CN111068335B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/75Enforcing rules, e.g. detecting foul play or generating lists of cheating players
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/50Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
    • A63F2300/55Details of game data or player data management
    • A63F2300/5586Details of game data or player data management for enforcing rights or rules, e.g. to prevent foul play

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses an anti-plug-in method and system for an electronic competition; the method comprises the following steps: collecting characteristic parameters of executable modules in a diskless system terminal to form a white list library; installing an anti-plug-in client in the diskless system terminal, and creating a self-starting item of the diskless system terminal by the anti-plug-in client during installation so that the anti-plug-in client is restarted along with the restart of the diskless system terminal; and when the executable module is detected to run, acquiring characteristic parameters of the executable module, and comparing and matching the characteristic parameters with a white list library to judge whether the module is released or forbidden to run. The technical scheme of the invention can be compatible with an anti-plug-in system of a game and can be used simultaneously, and an unknown plug-in module can be detected; the technical scheme of the invention can be started when the system starts to run, and plug-in detection can be comprehensively carried out in time, so that the problem of lag of anti-plug-in detection time is solved, and the running of the game can not be influenced during detection.

Description

Anti-plug-in method and system for electronic competition
Technical Field
The invention relates to the technical field of electric competition protective measures, in particular to an anti-plug-in method and an anti-plug-in system for electric competition.
Background
The game plug-in is a cheating program which enables a user to obtain asymmetric advantages in a game by modifying or reading game data. The game plug-in function can be realized through the executable module, and the operation of the executable module in the monitoring system is a common plug-in detection method.
The common anti-cheating detection is generally realized by an anti-cheating system carried by a game and started along with the game. The detection of the plug-in module is generally realized by a blacklist detection technology. By collecting the module characteristics of common plug-ins, the module characteristics are used as a blacklist, and when the fact that the system comprises the blacklist characteristic module is monitored to be operated, the system is judged to be the plug-in program.
But the plug-in module is generally started before the game, namely before the anti-plug-in system. The game plug-in program can load the plug-in module into the system memory firstly, then hide the relevant module information, and the anti-plug-in system started after the game is followed is difficult to detect the plug-in. The electronic contest generally provides rich rewards, plug-in programs used by electronic contestants are generally customized and developed, the application range is small, and the anti-plug-in system is difficult to collect the characteristics of unknown plug-in modules in advance. And the anti-plug-in system of the game has hysteresis for many times, belongs to the punishment after the fact, and is not very suitable for the electric competition.
In the prior art, a method for detecting an exception based on game data is proposed in patent application publication No. CN110090445A, a plug-in detection system is customized and developed for each game, specifically, a hook technology is used to embed an anti-plug-in function code in a game program to obtain first game data, a game server obtains second game data, and the presence of a plug-in module is determined by comparing the first game data and the second game data, so that the plug-in can be detected without relying on the detection of the plug-in module.
The prior method has the following defects:
because the anti-plug-in function needs to be embedded into the game and needs to be analyzed according to specific game data, each game needs to be developed and maintained in a customized manner, and the development and maintenance cost is high.
Meanwhile, because data of the game server needs to be combined and needs to be developed jointly with a game developer, a common third party hardly has the chance, and the flexibility is poor.
Meanwhile, anti-plug-in function codes are embedded in game logic functions, so that the smoothness and the stability of the running efficiency of the game are possibly influenced.
Meanwhile, the difference of game data can not be caused by partial game plug-ins, and if the character in the first-person shooting type game is seen through the plug-ins, the position of the character can be displayed by reading the coordinate data of a game player. The method proposed in the patent application publication of CN110090445A also cannot detect such plug-ins.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: in order to solve the hysteresis of the anti-cheating program on the detection time machine, an anti-cheating method and system for the electronic competition are provided.
The technical scheme adopted by the invention is as follows: an anti-cheating method for a competitive game comprising:
collecting characteristic parameters of executable modules in a diskless system terminal to form a white list library;
installing an anti-plug-in client in the diskless system terminal, and creating a self-starting item of the diskless system terminal by the anti-plug-in client during installation so that the anti-plug-in client is restarted along with the restart of the diskless system terminal;
and starting a detection mode by adopting an anti-plug-in server, when the executable module is detected to run, acquiring the characteristic parameters of the executable module by the anti-plug-in client, comparing and matching the acquired characteristic parameters of the executable module with a white list library, if the matching is successful, releasing the executable module, and if the matching is not successful, forbidding the executable module to run.
Further, the executable module characteristic parameters comprise file digital signature information and file hash value information, and a white list library is formed on the basis of the file digital signature information and the file hash value information characteristic parameters.
Further, the diskless system terminal is set to be in a super mode, and when the anti-plug-in client is installed in the diskless system terminal, the current system is stored in the diskless server to serve as a system mirror image.
Further, in the process of prohibiting the executable module from running, the prohibited running items include process creation, dynamic link library loading, and driver module loading.
Further, the white list is placed in an anti-plug-in server.
Furthermore, in the process of comparing and matching the collection executable module characteristic parameters with the white list library, if at least one of the file digital signature information and the file hash value information is the same, the matching is successful.
The invention also discloses an anti-plug-in system for the electronic competition, which comprises the following components: the system comprises a diskless system terminal, an anti-plug-in client and an anti-plug-in server, wherein the diskless system terminal is provided with an executable module, and characteristic parameters of the executable module are collected to form a white list library; the anti-plug-in client is installed in the diskless system terminal, and creates a self-starting item of the diskless system terminal when the anti-plug-in client is installed, so that the anti-plug-in client is restarted along with the restart of the diskless system terminal;
the anti-plug-in server is used for starting a detection function, when the executable module is detected to run, the anti-plug-in client acquires the characteristic parameters of the executable module, the acquired characteristic parameters of the executable module are compared and matched with the white list library, if the matching is successful, the executable module is released, and if the matching is not successful, the executable module is forbidden to run.
Further, the executable module characteristic parameters include file digital signature information and file hash value information.
Further, the anti-cheating system for the electronic competition further comprises a system mirror image: the diskless system terminal is set to be in a super mode, and when an anti-plug-in client is installed in the diskless system terminal, the current system is stored in the diskless server to serve as a system mirror image.
Further, in the process of prohibiting the executable module from running, the prohibited running items include process creation, dynamic link library loading, and driver module loading.
Compared with the prior art, the beneficial effects of adopting the technical scheme are as follows: according to the technical scheme, the plug-in feature library is not collected, the feature parameters of the executable modules of the diskless system terminal are collected into a white list library, and unknown plug-in modules can be detected; modules outside the white list are directly forbidden to run, have strong real-time performance and are suitable for being applied to the electronic competition; the operation environment in the technical scheme of the invention is a diskless system terminal, even if the system is restarted, the anti-plug-in client can be started at the beginning of the operation of the system, and plug-in detection is comprehensively carried out in time, so that the problem of lag of anti-plug-in detection time is solved, and the operation of a game is not influenced while detection is carried out. In addition, the calculation scheme of the invention realizes a simple and universal anti-plug-in system, can be compatible with a game self-contained anti-plug-in system and can be used simultaneously, and the detection effect of the anti-plug-in system is improved.
Drawings
FIG. 1 is a schematic view of an anti-cheating method for an electronic competition according to the present invention.
FIG. 2 is a schematic diagram of an anti-cheating system for an electric competition according to the present invention.
Detailed Description
The invention is further described below with reference to the accompanying drawings.
As shown in fig. 1, an anti-cheating method for an electronic competition, comprising:
and (3) white list establishment: collecting characteristic parameters of executable modules in the diskless system terminal to form a white list library, wherein the executable modules in the white list library are recorded based on the characteristic parameters of the executable modules, and the characteristic parameters are used for judging whether the corresponding executable modules can be released or not in the detection process; because the operation environment is limited by the diskless system terminal, the diskless system terminal is restored after being restarted every time, and the size of the white list library can be controlled; in addition, the unknown plug-in can be detected because a white list library is established based on the characteristic parameters collected by the existing executable module in the operating environment;
the process of installing the anti-plug-in client comprises the following steps: installing an anti-plug-in client in the diskless system terminal, and creating a self-starting item of the diskless system terminal by the anti-plug-in client during installation so that the anti-plug-in client is restarted along with the restart of the diskless system terminal, wherein the anti-plug-in client is started along with the restart of the diskless system terminal, so that the anti-plug-in client starts detection work when the operation of a system environment starts;
and (3) detection process: the anti-plug-in server is used for starting a detection mode, when the diskless system terminal is restarted, the anti-plug-in client inquires whether the anti-plug-in server is in the detection mode, when the executable module is detected to run, the anti-plug-in client collects characteristic parameters of the executable module, the collected characteristic parameters of the executable module are compared and matched with the white list library, if the matching is successful, the executable module is released, and if the matching is not successful, the executable module is forbidden to run.
The operation environment in the technical scheme of the invention is a diskless system terminal, and the diskless system has the characteristic of restoring the system after being restarted, and the system can enter a system which does not have a plug-in module to operate each time of restarting, so that the effect of an anti-plug-in client is prior to the plug-in module in the operation environment of the diskless system, and the anti-plug-in client can be started at the beginning of the operation of the system even if the system is restarted.
In one embodiment, the executable module characteristic parameters include file digital signature information and file hash value information, and a white list library is formed based on the file digital signature information and the file hash value information characteristic parameters. The file digital signature information and the file hash value information are characteristic parameters which are in one-to-one correspondence with the executable modules and are used as characteristic parameters for forming the white list, so that the accuracy of comparison and matching based on the white list library can be improved.
In one embodiment, in order to increase the query efficiency and make the operation flow clear, the white list library is uniformly placed in the anti-plug-in server.
In one embodiment, all changes of the diskless system terminal disappear after being restarted by default, and the started system after being restarted is the system mirror image configured on the diskless server; in the embodiment, the diskless system terminal is set to be in a super mode, and when an anti-plug-in client is installed in the diskless system terminal, the current system is stored in a diskless server to be used as a system mirror image; therefore, after the system is restarted, the currently configured mirror system can be obtained, namely, the system with the anti-plug-in client is installed, and the anti-plug-in client can be automatically started along with the system starting by the method of the embodiment.
In one embodiment, in the process of prohibiting the executable module from running, the prohibited running items include process creation, dynamic link library loading, and driver module loading, and once the executable module is not in the white list library, the running items of the running state of each link are effectively prohibited. The detection mode for realizing the operation items is as follows: the method comprises the steps of using a kernel interface PsSetCreateProcessNotifyRouteeEx provided by an operating system to realize the creation and calling of a sensing process, and using PsSetLoadImageNotifyRouteine to realize the loading of a sensing dynamic link library and a driving module. When the process is created or the module is loaded, the thread of the process creation or module loading is set to be in a suspended state. And then acquiring the white list characteristics of the executable module, and then inquiring whether the executable module is a module in a white list library from the anti-plug-in server. And if the module is a white list module, restoring the running of the thread of the process or the loading module, and otherwise, stopping the running of the process or the thread.
In one embodiment, in the process of comparing and matching the collection executable module characteristic parameters with the white list library, if at least one of the file digital signature information and the file hash value information is the same, the matching is successful. Therefore, the matching speed can be improved, and the influence on the system running time is reduced.
Another embodiment of the present invention, as shown in FIG. 2, is an anti-cheating system for an electronic competition, comprising: the system comprises a diskless system terminal, an anti-plug-in client and an anti-plug-in server, wherein the diskless system terminal is provided with an executable module, and characteristic parameters of the executable module are collected to form a white list library; the anti-plug-in client is installed in the diskless system terminal, and creates a self-starting item of the diskless system terminal when the anti-plug-in client is installed, so that the anti-plug-in client is restarted along with the restart of the diskless system terminal; the diskless system terminal is used as the running environment of the invention, the running game client is obviously run on the diskless system terminal, and the game client may have a plug-in module which is not invented and is desired to be detected; the diskless system terminal is a computer terminal for operating a diskless system, and is widely used in public internet surfing places such as internet bars, schools and the like at present; the diskless system does not use a local hard disk to start the system, but obtains a mirror image of the starting system from a diskless server through a network;
the anti-plug-in server is used for starting a detection function, when the executable module is detected to run, the anti-plug-in client acquires the characteristic parameters of the executable module, the acquired characteristic parameters of the executable module are compared and matched with the white list library, if the matching is successful, the executable module is released, and if the matching is not successful, the executable module is forbidden to run.
The anti-plug-in system for the electronic competition of the embodiment does not need to be embedded into a game module, does not need to rely on game data, does not need to be developed and adapted for each game, and realizes a general anti-plug-in system for the electronic competition; the anti-plug-in system can be compatible with the game self-contained anti-plug-in system and can be used simultaneously, and the anti-plug-in system takes effect in real time.
In one embodiment, the executable module characteristic parameters include file digital signature information and file hash value information. The file digital signature information and the file hash value information are characteristic parameters which are in one-to-one correspondence with the executable modules and are used as characteristic parameters for forming the white list, so that the accuracy of comparison and matching based on the white list library can be improved.
In one embodiment, the anti-cheating system for electronic competition further comprises a system mirror image: the diskless system terminal is set to be in a super mode, and when an anti-plug-in client is installed in the diskless system terminal, the current system is stored in the diskless server to serve as a system mirror image. In the mode of this embodiment, because each restart is a system image stored in the read diskless system, any change made to the system on the diskless system terminal, such as downloading a file, creating a system self-boot item, and the like, will be restored after the system is restarted; when the diskless system is in the super mode, the change made on the diskless terminal system is stored in the diskless server mirror image, and the changed system mirror image is read after the diskless terminal is restarted.
In one embodiment, in the process of prohibiting the executable module from running, the prohibited running items include process creation, dynamic link library loading, and driver module loading. Once the executable module is not in the white list library, the operation items of the operation state of each link are effectively forbidden.
The invention is not limited to the foregoing embodiments. The invention extends to any novel feature or any novel combination of features disclosed in this specification and any novel method or process steps or any novel combination of features disclosed. Those skilled in the art to which the invention pertains will appreciate that insubstantial changes or modifications can be made without departing from the spirit of the invention as defined by the appended claims.

Claims (10)

1. An anti-cheating method for a competitive game, comprising:
collecting characteristic parameters of executable modules in a diskless system terminal to form a white list library;
installing an anti-plug-in client in the diskless system terminal, and creating a self-starting item of the diskless system terminal by the anti-plug-in client during installation so that the anti-plug-in client is restarted along with the restart of the diskless system terminal;
and starting a detection mode by adopting an anti-plug-in server, when the executable module is detected to run, acquiring the characteristic parameters of the executable module by the anti-plug-in client, comparing and matching the acquired characteristic parameters of the executable module with a white list library, if the matching is successful, releasing the executable module, and if the matching is not successful, forbidding the executable module to run.
2. The anti-cheating method for electronic competitions as recited in claim 1, wherein the executable module characteristic parameters include file digital signature information, file hash value information, and a whitelist library is formed based on the file digital signature information, file hash value information characteristic parameters.
3. The anti-plug-in method for electronic competition of claim 1, wherein the diskless system terminal is set to a super mode, and when the anti-plug-in client is installed in the diskless system terminal, the current system is stored in the diskless server as a system mirror image.
4. The anti-cheating method for an electronic competition as recited in claim 1, wherein the prohibited run items comprise process creation, dynamic link library loading and driver module loading during the execution of the executable module is prohibited.
5. The anti-cheating method for a cyber race of claim 1, wherein the white list is placed on an anti-cheating server.
6. The anti-cheating method for electronic competitions as claimed in claim 1, wherein during the process of comparing and matching the collected executable module characteristic parameters with the white list library, at least one of the file digital signature information and the file hash value information is the same, and the matching is successful.
7. An anti-cheating system for a competitive game comprising: the system comprises a diskless system terminal, an anti-plug-in client and an anti-plug-in server, wherein the diskless system terminal is provided with an executable module, and characteristic parameters of the executable module are collected to form a white list library; the anti-plug-in client is installed in the diskless system terminal, and creates a self-starting item of the diskless system terminal when the anti-plug-in client is installed, so that the anti-plug-in client is restarted along with the restart of the diskless system terminal;
the anti-plug-in server is used for starting a detection function, when the executable module is detected to run, the anti-plug-in client acquires the characteristic parameters of the executable module, the acquired characteristic parameters of the executable module are compared and matched with the white list library, if the matching is successful, the executable module is released, and if the matching is not successful, the executable module is forbidden to run.
8. The anti-cheating system for a cyber-competition of claim 1, comprising: the executable module characteristic parameters comprise file digital signature information and file hash value information.
9. The anti-cheating system for a electronic competition of claim 1, further comprising a system mirror: the diskless system terminal is set to be in a super mode, and when an anti-plug-in client is installed in the diskless system terminal, the current system is stored in the diskless server to serve as a system mirror image.
10. The anti-cheating system of claim 1, wherein the execution items prohibited during the execution of the executable module are process creation, dynamic link library loading, and driver module loading.
CN201911355401.8A 2019-12-25 2019-12-25 Anti-plug-in method and system for electronic competition Active CN111068335B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911355401.8A CN111068335B (en) 2019-12-25 2019-12-25 Anti-plug-in method and system for electronic competition

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911355401.8A CN111068335B (en) 2019-12-25 2019-12-25 Anti-plug-in method and system for electronic competition

Publications (2)

Publication Number Publication Date
CN111068335A true CN111068335A (en) 2020-04-28
CN111068335B CN111068335B (en) 2023-12-15

Family

ID=70317549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911355401.8A Active CN111068335B (en) 2019-12-25 2019-12-25 Anti-plug-in method and system for electronic competition

Country Status (1)

Country Link
CN (1) CN111068335B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111821693A (en) * 2020-07-24 2020-10-27 网易(杭州)网络有限公司 Perspective plug-in detection method, device, equipment and storage medium for game

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802297A (en) * 1995-07-03 1998-09-01 Sun Microsystems, Inc. Client-server computer system and method utilizing a local client disk drive as a data cache
US6406371B1 (en) * 1999-08-04 2002-06-18 Kabushiki Kaisha Sega Enterprises Data communication method for game system
US20030195995A1 (en) * 2002-04-15 2003-10-16 Bassam Tabbara System and method for custom installation of an operating system on a remote client
CN102158367A (en) * 2010-12-17 2011-08-17 中国科学技术大学苏州研究院 Active anti-plug-in online game system and anti-plug-in method thereof
CN102833344A (en) * 2012-09-04 2012-12-19 中国人民解放军国防科学技术大学 Local boot mapping file-based diskless computer boot method
CN104079525A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Method and server of preventing plug-in
CN107096220A (en) * 2017-05-22 2017-08-29 珠海金山网络游戏科技有限公司 A kind of plug-in detection of client and the system and method sealed and stopped automatically
CN107665157A (en) * 2017-09-21 2018-02-06 成都领沃网络技术有限公司 It is a kind of to improve the method without the experience of disk speed
CN109783117A (en) * 2019-01-18 2019-05-21 中国人民解放军国防科技大学 Mirror image file making and starting method of diskless system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5802297A (en) * 1995-07-03 1998-09-01 Sun Microsystems, Inc. Client-server computer system and method utilizing a local client disk drive as a data cache
US6406371B1 (en) * 1999-08-04 2002-06-18 Kabushiki Kaisha Sega Enterprises Data communication method for game system
US20030195995A1 (en) * 2002-04-15 2003-10-16 Bassam Tabbara System and method for custom installation of an operating system on a remote client
CN102158367A (en) * 2010-12-17 2011-08-17 中国科学技术大学苏州研究院 Active anti-plug-in online game system and anti-plug-in method thereof
CN102833344A (en) * 2012-09-04 2012-12-19 中国人民解放军国防科学技术大学 Local boot mapping file-based diskless computer boot method
CN104079525A (en) * 2013-03-25 2014-10-01 腾讯科技(深圳)有限公司 Method and server of preventing plug-in
CN107096220A (en) * 2017-05-22 2017-08-29 珠海金山网络游戏科技有限公司 A kind of plug-in detection of client and the system and method sealed and stopped automatically
CN107665157A (en) * 2017-09-21 2018-02-06 成都领沃网络技术有限公司 It is a kind of to improve the method without the experience of disk speed
CN109783117A (en) * 2019-01-18 2019-05-21 中国人民解放军国防科技大学 Mirror image file making and starting method of diskless system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111821693A (en) * 2020-07-24 2020-10-27 网易(杭州)网络有限公司 Perspective plug-in detection method, device, equipment and storage medium for game

Also Published As

Publication number Publication date
CN111068335B (en) 2023-12-15

Similar Documents

Publication Publication Date Title
US11126717B2 (en) Techniques for identifying computer virus variant
CN105744289B (en) Live event reminding method and device
EP3068095A2 (en) Monitoring apparatus and method
CN111506283B (en) Image display method, device and system
CN102222199A (en) Method and system for identifying identification of application program
WO2018099253A1 (en) Self-starting method and device
JP2010512675A (en) Extracting auxiliary data from host signals
CN111068335A (en) Anti-plug-in method and system for electronic competition
US9723020B2 (en) Method, apparatus and computer device for scanning information to be scanned
CN111309622A (en) Application program testing method and device, terminal equipment and storage medium
CN114282212A (en) Rogue software identification method and device, electronic equipment and storage medium
CN107783825B (en) Multi-background process starting method and device for mobile terminal and mobile terminal
CN108874658A (en) A kind of sandbox analysis method, device, electronic equipment and storage medium
KR20120020609A (en) Method of detecting unknown bot of online game
CN106874759B (en) Identification method and system for Trojan horse randomized behavior
WO2016127037A1 (en) Method and device for identifying computer virus variants
CN115688092A (en) Terminal weak control method and device, electronic equipment and storage medium
CN111562925A (en) Cloud application updating method, server, storage medium and equipment
KR100457405B1 (en) Method of detecting whether speed hack is in use
CN113672918A (en) Malicious code detection method and device, storage medium and electronic equipment
CN110909352B (en) Malicious process detection method under Linux server
CN108245895B (en) Method and system for detecting running environment of game
CN109529321B (en) Information processing method, device and storage medium
CN113117339A (en) Data processing method, device, server and storage medium
CN106250759A (en) A kind of method of application managed in terminal, Apparatus and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: No. 602-606, 6th Floor, Building B, No. 539 Jincheng Avenue, Chengdu High tech Zone, China (Sichuan) Pilot Free Trade Zone, Chengdu City, Sichuan Province, 610000

Applicant after: CHENGDU JISHENG TECHNOLOGY Co.,Ltd.

Address before: 610000 No. 1, floor 9, unit 2, building 8, No. 1480, north section of Tianfu Avenue, high tech Zone, Chengdu, Sichuan

Applicant before: CHENGDU JISHENG TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant