KR20130065833A - The methdo and server for cracking down on autorun program - Google Patents

The methdo and server for cracking down on autorun program Download PDF

Info

Publication number
KR20130065833A
KR20130065833A KR1020110128216A KR20110128216A KR20130065833A KR 20130065833 A KR20130065833 A KR 20130065833A KR 1020110128216 A KR1020110128216 A KR 1020110128216A KR 20110128216 A KR20110128216 A KR 20110128216A KR 20130065833 A KR20130065833 A KR 20130065833A
Authority
KR
South Korea
Prior art keywords
game
authentication
character
terminal
server
Prior art date
Application number
KR1020110128216A
Other languages
Korean (ko)
Inventor
이인수
Original Assignee
(주)네오위즈게임즈
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by (주)네오위즈게임즈 filed Critical (주)네오위즈게임즈
Priority to KR1020110128216A priority Critical patent/KR20130065833A/en
Publication of KR20130065833A publication Critical patent/KR20130065833A/en

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/71Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/75Enforcing rules, e.g. detecting foul play or generating lists of cheating players
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Multimedia (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Tourism & Hospitality (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a technique for controlling the use of illegally executed programs in a game.
The present invention provides a notification item that can report a game character estimated to use an illegal program to a user using a game service, and undergoes an authentication procedure for real user verification of the target character that the report item is used for. By determining whether the target character is automatically running in accordance with the operation of the illegal program, by imposing sanctions on the target character to prevent unfair game progress using the automatic running program in the online game, thereby illegally Character growth, item acquisition, and commercial use of this can be prevented.

Figure P1020110128216

Description

METHODS AND SERVER FOR CRACKING DOWN ON AUTORUN PROGRAM}

The present invention relates to a technique for controlling the use of illegally executed programs in a game.

As online games become more active and item trading becomes more active, more and more users are exploiting it.

The representative one is the 'workshop', which refers to a group that develops game characters, acquires items, and sells them by using an abnormal method for the purpose of profiting.

The workplace sells items and takes unfair profits using the psychology of game users who want good characters and good items, and runs illegal programs such as autorun programs to obtain more items faster than ordinary gamers. Let the game proceed without stopping.

The autorun program is a game autohunt program that allows to increase the speed of a character in a game without legitimate authority or to continue hunting or the like without consuming energy. In general, there is a limit to the number of monsters that appear simultaneously in the game, and monsters that offer good items as rewards tend to appear concentrated in certain areas of the game. Therefore, when a workplace force using an autorun program occupies the area, it is common that general game users cannot even enter the area.

As workplace power increases and the consequences of this increase, the importance of using the autorun program to crack down on characters running games is becoming increasingly important. However, since the game progress control signal received from the user terminal using the automatic execution program is similar to the game progress control signal of the user terminal normally using the game, it is not easy to detect and sanction each other. There is a problem.

Against this background, it is an object of the present invention to allow a game user who normally proceeds with a game to report another game character that operates using an illegal program, and the server can promptly process the report. It is to increase the reliability.

In addition, by providing an appropriate compensation to the user who reported the game character operated by the illegal program driving to induce active reporting of the game user and to crack down the workplace forces to increase the satisfaction of the game service that the user feels.

In order to achieve the above object, in one aspect, the present invention, the server providing a game service to the terminal to control the use of illegal programs in the game, comprising the steps of: transmitting an item acquisition authentication input window to the terminal; Receiving authentication information input through the item acquisition authentication input window from the terminal; And providing a notification item to a user account that has been authenticated based on the received authentication information, so that the notification item use command is received for a character estimated to play a game using an illegal program. Provide a way to crack down on use.

In another aspect, the present invention provides a method for a server providing a game service to the terminal to regulate the use of illegal programs, the method comprising the step of receiving a command to use the previously provided notification item from the terminal connected to the server with an authenticated user account ; Receiving authentication information for real user confirmation from a terminal of a user account which has a character to be reported that is the target of the received instruction; And performing an authentication process based on the received authentication information, and if the authentication process fails, determining that the game is in progress by using an illegal program in the terminal of the user account having the character to be reported and transmitting a sanction command. Provides a way to crack down on illegal program use.

In another aspect, the present invention, the authentication process for performing a user authentication for providing a notification item for the terminal proceeding the game; And a server controller for controlling a report item for illegal program use to be provided to a user account of a terminal that has been authenticated by the authentication processing unit.

In another aspect, the present invention, an authentication processing unit for performing a real user confirmation authentication for a user account having the character, when a command for using a report item received for a character estimated to use an illegal program on the game screen from the terminal; And a server control unit for generating and transferring a sanction command to a user account of the terminal on which the real user verification authentication is performed, when the authentication processing unit determines that the illegal program is used in the terminal on which the real user verification authentication is performed. It provides a server to control the use of illegal programs, including.

As described above, according to the present invention, it is possible to prevent an unfair game progress using an auto-launch program in an online game, thereby preventing illegal character growth, item acquisition, and commercial use thereof.

In addition, the present invention does not require the production of a complex game patch (PATCH) to prevent the use of the autorun program, and can be easily sanctioned even if the autorun program is updated, thereby improving the work efficiency of resources or administrators of the game server. It can be effected.

In addition, the automatic execution of the game can be effectively prevented without leaking any personal information from the user's computer, thereby preventing controversy of privacy infringement.

1 is a block diagram showing the configuration of a system for controlling illegal program use according to an embodiment of the present invention.
2 is a flowchart illustrating a method for controlling illegal program use according to an embodiment of the present invention.
3 is a block diagram showing the configuration of a server that regulates the use of illegal programs according to an embodiment of the present invention.
4 is a flowchart illustrating a method of operating a terminal in a system for controlling illegal program use according to an embodiment of the present invention.
5 is a flowchart illustrating a method for providing a report item in a server that regulates illegal program use according to an embodiment of the present invention.
6 is a flowchart illustrating a method of operating a report item in a server that regulates illegal program use according to an embodiment of the present invention.
7 is another flowchart illustrating a method of operating a report item in a server that regulates illegal program use according to an embodiment of the present invention.
8 is a diagram illustrating an example of implementing a notification item in a game screen in a method for controlling illegal program use according to an embodiment of the present invention.
9 is a diagram illustrating an example in which a notification item in a game screen is used in a method for controlling illegal program use according to an embodiment of the present invention.
FIG. 10 is an exemplary view illustrating an example in which a report confirmation authentication is implemented according to the use of a report item in a method for controlling illegal program use according to an embodiment of the present invention.

The method and system for controlling illegal use of in-game illegal programs provided by the present invention is characterized by providing a user using a game service a notification item capable of reporting a game character suspected of using an illegal program.

In addition, the method and system for cracking down on illegal program use provided by the present invention, by subjecting the target character used the notification item to go through the authentication process for real user confirmation by the target character is automatically run according to the operation of the illegal program It is determined whether it is running, and if it is running automatically, it is characterized in that the sanctions for the target character.

The game provided by the present invention is a multiplayer online game based on a mutual relationship with other users while connected to a wired or wireless network, and the user can proceed with or connected to a wired or wireless network. In games of various genres, such as a game, a simulation game, a shooting game, any game in which illegal programs such as autorun programs can be driven during game play can be easily modified and applied.

In addition, the illegal program in the present invention will be described as an example of an autorun program that allows the character to proceed with the game automatically without a separate operation for the character proceeding the game by the user's operation in the game as described above as an example The present invention is not limited thereto, and may be easily modified and applied to various kinds of illegal programs that are executed during game progress such as cracks or bug programs, so that characters can be raised or acquired items in an abnormal way.

Hereinafter, some embodiments of the present invention will be described in detail with reference to exemplary drawings. In adding reference numerals to the components of each drawing, it should be noted that the same reference numerals are assigned to the same components as much as possible even though they are shown in different drawings. In the following description of the present invention, a detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear.

In describing the components of the present invention, terms such as first, second, A, B, (a), and (b) may be used. These terms are intended to distinguish the constituent elements from other constituent elements, and the terms do not limit the nature, order or order of the constituent elements. When a component is described as being "connected", "coupled", or "connected" to another component, the component may be directly connected to or connected to the other component, It should be understood that an element may be "connected,""coupled," or "connected."

1 is a block diagram showing the configuration of a system for controlling illegal program use according to an embodiment of the present invention.

Referring to Figure 1, the system for controlling illegal programs according to an embodiment of the present invention, the game environment to the terminal 100 and the terminal 100 connected through the network (N) that the game is executed by the user It is configured to include a game server 200 to control the game to run in the terminal 100 by providing a.

The game server 200 provides a report item for illegal program use to a user of the terminal 100 provided with a game environment, and performs an authentication process for a character reported by the report item. This sanctions the game progress of the character to proceed.

The terminal 100 may include a general PC such as a general desktop or a notebook, and may include a mobile terminal such as a smartphone, a tablet PC, a personal digital assistant (PDA), a mobile communication terminal, and the like. Rather, it should be broadly interpreted as any electronic device that can communicate with the game server 200.

The game server 200 described above has the same configuration as a conventional web server, a web application server, or a WAP server. However, in software, as described in detail below with respect to FIG. 2, a program module implemented through various languages such as C, C ++, Java, PHP, .Net, Python, Ruby, and performing various functions. (Module) may be included.

In addition, the game server 200 may be connected to an unspecified number of clients (including the terminal 100) and / or other servers via the network N, whereby the game server 200 may be connected to a client or another server. It may refer to a computer system that receives a request for performing work and derives and provides a result of the work, or computer software (server program) installed for the computer system.

In addition to the server program described above, the game server 200 includes a series of application programs that operate on the game server 200 and, in some cases, a wide database including various databases built in or outside. It should be understood as a concept.

In addition, the game server 200 may store and manage content, various information, and data in a database. Here, the database may be implemented inside or outside the game server 200.

In addition, the game server 200 uses server programs that are variously provided according to operating systems such as DOS, Windows, Linux, UNIX, Macintosh, and the like for general server hardware. As a representative example, Apache, Nginx, Light HTTP, etc., which are used in a web site (Website), Internet Information Server (IIS), and Unix, which are used in a Windows environment, may be used.

In addition, the above-described game server 200 may be linked with the authentication system and payment system for payment of purchases, such as user authentication of online game users or items in the online game.

Meanwhile, the network N is a network connecting the game server 200 and the terminal 100, and may be a closed network such as a local area network (LAN), a wide area network (WAN), or the like. Or an open network such as the Internet. Here, the Internet includes various services existing in the TCP / IP protocol and its upper layers such as HTTP (HyperText Transfer Protocol), Telnet, File Transfer Protocol (FTP), Domain Name System (DNS), Simple Mail Transfer Protocol (SMTP), The global open computer network architecture that provides Simple Network Management Protocol (SNMP), Network File Service (NFS), and Network Information Service (NIS).

In addition, when the terminal 100 includes a mobile terminal such as a smart phone, a tablet PC, a personal digital assistant (PDA) and a mobile communication terminal, the network N may be a wireless access network such as a mobile communication network or a Wi-Fi network. It may further include.

2 is a flowchart illustrating a method for controlling illegal program use according to an embodiment of the present invention.

In FIG. 2, the first terminal 100a represents a terminal for reporting a character determined to play a game according to the driving of an illegal program, and the second terminal 100b indicates an operation of the character reported by the first terminal. Represents a controlling terminal. The first terminal 100a and the second terminal 100b are classified according to the operation in order to clearly distinguish the operation between the terminal and the game server. In some cases, the notifier terminal 100a reporting the illegal program operation may be provided. At the same time, it may be the respondent terminal (100b).

Referring to FIG. 2, in the method of controlling illegal programs according to an embodiment of the present invention, first, the game server 200 accesses the game server 200 and proceeds with the game. Requests authentication information to obtain an item.

In the first terminal 100a that receives a request from the game server 200, when authentication information as requested is input, the input authentication information is received by the game server 200, and the authentication received by the game server 200. The authentication process is performed based on the information (S10).

As a result of the authentication process, if the authentication passes, the game server 200 provides a report item to the user account that is playing the game in the first terminal (100a), the report item provided on the game screen of the first terminal (100a) By displaying this, the user of the first terminal 100a can check the notification item provided to the user (S20).

In this case, the reported item is included in a separate area (for example, inventory in the game terminology) that can identify items owned by the character in progress of the game, or various functions displayed for the progress of the game. It may be displayed together with a window (eg, a menu window, a chat window, a message window, etc.) and is not limited to the display position. In addition, when the notification item is included in the inventory, the notification item may occupy a separate display area so as not to affect the number of items that can be displayed in the inventory. A more detailed description related to the report item will be described later with reference to FIGS. 8 and 9.

If a user of the first terminal 100a is playing a game using a game character owned by the user, and inputs a command of using the report item for the character of the second terminal 100b determined to use an illegal program The input report item usage command is received by the game server 200. (S30)

The game server 200 transmits a real user confirmation authentication window to the second terminal 100b according to the received report item using command, and inputs the second terminal 100b through the provided real user confirmation authentication window. Received authentication information (S40, S50).

The game server 200 performs real user authentication based on the received authentication information. The received authentication information does not match the authentication information preset in the game server 200 or is input by the second terminal 100b within a predetermined time. If it is determined that the authenticated information does not exist, the game server 200 determines that the character playing the game through the second terminal 100b is automatically executed according to the driving of the illegal program. S60)

When it is determined that the character of the second terminal 100b is automatically executed, the game server 200 generates and transmits a sanction command related to the game progress to the second terminal 100b. )

In this case, when it is determined that the character of the second terminal (100b) is automatically executed, the game server 200 through the first terminal (100a) to compensate for reporting the illegal program use character. Provided to the user account to play the game. The reward may be provided with game assets, such as items, game money, activity points, etc. that can be utilized in the game, and may be preset in advance by differentially depending on the number of notifications or the number of sanction orders sent according to the notification. )

In the method for controlling illegal program use according to an embodiment of the present invention as described above, the configuration of the server is as follows.

3 is a block diagram showing the configuration of a server that regulates the use of illegal programs according to an embodiment of the present invention.

Referring to FIG. 3, a server that regulates illegal program use according to an embodiment of the present invention may include an authentication processor and a server controller, and may further include a compensation payment unit and an item manager.

The authentication processing unit processes game connection authentication for providing a game service to the connected terminal. In addition, the item providing authentication for providing the report item to the game room user according to an embodiment of the present invention. Also, real user confirmation authentication is performed to confirm whether the target character in which the report item is used is controlled by the real user.

The server controller provides a report item to a terminal that has passed the item provision authentication performed by the authentication processing unit. The report item may be provided to a user account connected to a server through a terminal that has passed the provision for providing the item. When the user account has a plurality of characters, the report item may be limited to a character currently playing a game. The report item may be controlled to be provided.

 When a command to use the report item is received from the terminal, the user account for controlling the character that is the target of the use command is identified, and a control command is generated to perform real user confirmation authentication on the terminal connected through the identified user account. Deliver to authentication processing unit.

In addition, when it is determined that the character to be reported as the object of the notification item is automatically operated by the driving of the illegal program, a user may have a sanction command related to the progress of the game for the user account having the character to be reported.

In addition, a message generation control signal may be provided so that various messages according to the authentication process, for example, a message indicating whether the authentication passes or fails, a message indicating whether the target character is confirmed by the target character according to the use of the report item, etc. are provided to the terminal in each case. Can be generated.

If it is determined that the character declared according to the use of the report item is automatically controlled by the driving of the illegal program, the reward payment unit provides an appropriate compensation to the user account having the character using the report item.

The rewards may be paid for game assets such as game money, activity points, items, etc. that can be used in the game, and may be paid in consideration of the number of notifications or the number of sanctions made according to the notification. To this end, the server may identify the user account or character identification information provided with the notification item, the number of notification items used through the character or the number of sanctions in accordance with the notification, character identification information of the character to be reported for the notification item usage command or the corresponding character. It may further include an item usage history DB that stores user account information and the like.

As the compensation for the report is appropriately made through the compensation payment unit, there is an effect of inducing active reporting of the game service user.

In the authentication processing unit, the game access authentication receives the user's unique identification information, such as ID and password generated at the time of joining the game service from the terminal, and if the match is matched with the identification information of the corresponding user account stored in the game server Authentication is made through the process of determining that the game is a party user. In this case, the server may further include a user DB in which various information related to a user account (for example, ID, password, personal information, payment information, etc.) is stored in order for the authentication processing unit to perform game access authentication processing.

The item provision authentication and real user verification authentication are for determining whether to provide an item to a party user who uses a game service or whether a character currently playing a game is operating under actual user control. It is aimed at the user who has passed the access authentication and is playing the game.

The authentication processing unit may apply a CHAPTCHA system to the item provision authentication and the real user confirmation authentication scheme.

The CHAPTCHA system is a type of test system used to determine whether a computer user is a human, and is generally a test system provided when registering an account to prevent automatic account registration of spam software. For example, the CHAPTCHA system outputs a complex pattern that visually transforms a word to a connected user to register an account on the screen, so that the connected user can directly enter the word to complete account creation.

Such a CHAPTCHA pattern is used by a person, but can not be recognized in an automatic execution program, the authentication processing unit according to an embodiment of the present invention, by providing the CHAPTCHA pattern as described above to the terminal actually Although the user confirmation authentication process may be performed, the present invention is not limited thereto, and the automatic execution program may not be recognized, but the terminal user may recognize the user. Can be performed.

Meanwhile, the server for controlling illegal programs as described above with reference to FIG. 3 is described as an example of a game server, but is not limited thereto. Each of the components of the server illustrated in FIG. 3 may be connected to the game server through a network. It may be implemented as a separate server.

When the server regulating the use of the illegal program is distinguished from the game server, the game server largely includes a game driving engine and a game DB.

The game driving engine reads the user information and various game environment data stored in the game DB and provides the user terminal with an environment implemented to operate and grow the corresponding character connected to the authenticated user account.

The game DB may be configured to include a user DB, a game environment DB, and a character related information DB. The user DB stores an ID and a password associated with a user account created by accessing a terminal to a game server. In addition, an identification code or payment information assigned to a character generated through the corresponding user account may be stored.

The game environment DB stores game environment information including game maps, background music, image and attribute information of monsters, image and attribute information of items required for game execution.

The character related information DB stores character related information such as character unique information, asset information, and social information for each user-generated character. When a character is generated, a character identification code is assigned through a game driving engine to display the character related information. Integrated management

In addition, by including the character identification code in each user account information in conjunction with the user DB, if the terminal connected to the server is authenticated as a party user, character-related information connected to the authenticated user account is applied to the game environment Use the character to play the game.

4 is a flowchart illustrating a method of operating a terminal in a system for controlling illegal program use according to an embodiment of the present invention.

First of all, the user accesses the game server and performs user authentication to proceed with the game.

If authentication is successful as a party user, the game proceeds according to game progress related data received from the game server (S100).

While the game is in progress, if an authentication input window for item acquisition authentication is received from the game server, input the authentication information requested in the received item acquisition authentication input window (S110, S120).

If authentication is successful according to the inputted authentication information, a report item for reporting illegal program use may be acquired from the game server, and the obtained report item may be displayed on the game screen (S130).

While playing the game again, the game character is inputted to the game character estimated to be operated by the illegal program and transmitted to the game server so as to report the game character.

If it is determined that the game character reported by the game server is actually operated by the driving of an illegal program, a reward for using the reported item is obtained from the game server (S150).

5 is a flowchart illustrating a method for providing a report item in a server that regulates illegal program use according to an embodiment of the present invention.

The item acquisition authentication input window is transmitted to the terminal that is playing the game.

Receives the authentication information input from the terminal through the item acquisition authentication input window (S210).

The authentication process is performed based on the received authentication information, and if the authentication is successful, the report item is provided to the user account that proceeds with the game through the terminal.

6 is a flowchart illustrating a method of operating a report item in a server that regulates illegal program use according to an embodiment of the present invention.

Receives a usage command for the notification item provided in advance from the terminal (S300).

The real user confirmation authentication window is transmitted to the user terminal to report corresponding to the use command for the report item.

Receives the authentication information input from the terminal through the transmitted real user confirmation authentication window (S320).

The real user verification authentication may be performed in a CHAPTCHA method as described above, and the real user verification authentication window and the authentication information received therefrom are implemented in a form of inputting a preset text or performing an indicated operation according to the CHAPTCHA method. Can be.

The authentication process is performed based on the received authentication information. That is, when the preset text is input through the real user confirmation authentication window and the input phrase is received accordingly, authentication is successful when the preset phrase matches the phrase input through the real user confirmation authentication window. You can judge. In addition, when the preset text does not match the text input through the real user confirmation authentication window, it may be determined that authentication has failed. When a time limit is set in inputting data through the real user confirmation authentication window, it may be determined that authentication has failed even when a phrase input through the real user confirmation authentication window does not exist within the set time limit.

If authentication is successful, it is determined that the character who is playing the game through the report target user terminal is controlled by the actual user. In addition, if it is determined that the control is actually controlled by the user, a message indicating that the character to be reported is controlled by the real user may be generated and transmitted to the terminal that has sent the command to use the notification item (S330).

In addition, a character determined to be in the game by a real user may be set so that a command for using a report item from another terminal does not correspond for a predetermined time. For example, if a user of terminal A, who is playing a game with character A, uses a report item for character B, the server transmits a real user confirmation authentication window to terminal B that sends a game control command to character B. do. The authentication information received from the terminal B is checked to perform the authentication process.If the actual user verification authentication is successful for the character B, a message indicating that the actual user of the character B is confirmed is generated in the terminal A which has reported the character B. Can transmit

In addition, when the character B succeeds in authenticating user authentication, even if a report item is repeatedly used from another character such as a character C or a character D for a certain time, the actual user authentication authentication window is not transmitted to the terminal B again. This is to prevent a request for authentication repeatedly within a short time for a character for which real user confirmation authentication has already been performed.

On the other hand, if the authentication fails as a result of the authentication process, the server determines that the game to run the illegal program in the user terminal to report. If it is determined that the character is moved by illegal program operation, a sanction command is generated and transmitted to the user account accessed through the report target user terminal. The sanction command may be generated differently according to the number of sanction commands issued or the number of times a real user is authenticated. For example, the 3 hour game stop, 5 hour game stop, 10 hour game stop, 1 day access block, etc. It may be (S340).

For example, if a sanction command corresponding to a 3 hour game stop is sent to the user account, the game server may stop the game from progressing according to the game progress control signal received from the terminal connected to the user account. Can be. At this time, by displaying an image indicating that the progress of the game has been stopped by the sanction command with the corresponding character can be recognized by other game users.

In addition, when authentication fails as a result of the authentication process, the server pays a compensation for the report to the user account of the terminal that sent the command to use the report item (S350).

7 is another flowchart illustrating an operation method according to the use of a report item in a server that regulates illegal program use according to an embodiment of the present invention.

Receive a command to use the previously provided notification item from the terminal (S400).

It is searched whether or not the historical data related to the real user verification authentication process exists for the user account which has the character to be reported corresponding to the use command of the report item.

As a result of the search, if the real user confirmation authentication processing history exists, it is determined whether the time point at which the recently performed real user confirmation authentication passes is within a preset time range based on the present time (S420).

As a result of the determination, when the time point that recently passed the real user confirmation authentication falls within the set time range, the character to be reported is considered to be controlled by the real user. Therefore, the actual user confirmation authentication according to the use command of the report item received in step S400 is not performed, and the reporter terminal using the report item generates a message indicating that the user holding the report target character is actually controlling the report target character. To transmit. (S430)

In step S410, if there is no search result actual user confirmation authentication processing history, or in step S420, the determination result, the time point that failed in the recently performed real user confirmation authentication or passed the authentication exceeds the preset time range In accordance with the instruction to use the received item received in step S400, and transmits a real user confirmation authentication window to the terminal of the user to report.

Receives the authentication information input from the terminal through the transmitted real user confirmation authentication window, and performs the authentication process based on the received authentication information. (S450) If the authentication fails as a result of the authentication process, the server in the report target user terminal It is determined that the game is played by driving an illegal program, and a sanction command is generated and transmitted to a user account accessed through the report target user terminal. As described above, the sanction command may be generated differently according to the number of sanction command issuance or the number of times the real user confirmation authentication is performed.

For example, if a sanction command corresponding to a 3 hour game stop is sent to the user account, the game server may stop the game from progressing according to the game progress control signal received from the terminal connected to the user account. Can be. In this case, an image indicating that the progress of the game is stopped by the sanction command may be displayed together with the corresponding character so that other game users can recognize it (S460).

In addition, when authentication fails as a result of the authentication process, the server pays a compensation for the report to the user account of the terminal that sent the command to use the report item.

In the above description, the method for controlling illegal programs according to the embodiment of the present invention has been described as being performed by the procedure of FIGS. 4 to 7, but this is only for convenience of description and the scope does not depart from the essential concept of the present invention. Within the implementation method, the execution procedure of each step may be changed, two or more steps may be integrated, or one step may be performed in two or more steps.

8 is a diagram illustrating an example of implementing a notification item in a game screen in a method for controlling illegal program use according to an embodiment of the present invention.

In the method for controlling illegal program use according to an embodiment of the present invention, if a notification item is provided to a user authenticated through item provision authentication or a character in which the authenticated user is currently playing a game, the notification item ( Ic) is an area of one of the plurality of areas D1 allocated for the item in the inventory W1, which is a separate window outputted so that the item held by the user in the game is displayed as shown in FIG. May be represented as occupying. However, in general, since inventory has a limit on the number of items that can be displayed, a separate area D2 is set in the inventory regardless of the number of items that can be displayed in the inventory for the active use of the declared item Ic. (Ic ') may be displayed as disposed.

9 is a diagram illustrating an example in which a notification item in a game screen is used in a method for controlling illegal program use according to an embodiment of the present invention.

In the method for controlling illegal program use according to an embodiment of the present invention, the report item Ic may be displayed in the inventory as shown in FIG. 8, but as shown in FIG. It may be displayed on the game screen for use.

If the user finds a character that is estimated to be operated by the illegal program among other characters displayed on the game screen while the game is in progress, the user inputs a usage command for the reported item Ic displayed on the inventory or game screen through the terminal. do.

In this case, the command for using the report item may be generated by moving the report item Ic to a report target character by operating an interface such as a mouse, for example, dragging the report item Ic displayed on the game screen. (drag) to overlap the character to be reported, a command to use the notification item Ic is generated and transmitted to the server.

In addition, when an execution command is input such as double-clicking on the report item Ic, a character input window for inputting a report target character name may be displayed. The character to be reported can be specified. When a character to be reported is specified, a command to use the report item Ic is generated and transmitted to the server.

The use case of the report item is not limited to the above description, and can be easily changed according to the setting of the service provider.

Since the report item Ic is to prevent the game character from automatically operating by driving illegal programs, the report target character according to the command for using the report item Ic received by the server does not operate for a predetermined time. If it is determined that the "submersible state", the server control unit of the server may not generate a control command transmitted to the authentication processing unit for the real user authentication confirmation, and the real user confirmation authentication process may not be performed.

Similarly, even when a command for using a report item (Ic) is received by the server for a character operating in a player versus player (PvP) mode or a combat mode requiring direct control of the user, the server control unit authenticates for real user authentication confirmation. The control command transmitted to the processing unit may not be generated, and the real user confirmation authentication process may not be performed.

FIG. 10 is an exemplary view illustrating an example in which a report confirmation authentication is implemented according to the use of a report item in a method for controlling illegal program use according to an embodiment of the present invention.

When the command to use the report item is received, the server provides the real user confirmation authentication window P as shown in FIG. 10 to the terminal controlling the character to be reported to be displayed on the game screen.

During the time from when the real user confirmation authentication window P is displayed until the authentication information is transmitted to the server, the character in which the real user confirmation authentication window P is displayed may pause the game. Therefore, the character may maintain the stopped state or repeat the previous operation, and may be set so as not to affect other characters or monsters to be hunted when the operation is repeated.

As shown in FIG. 10, when the user is prompted to input 'Ydjlkrei' as the real user confirmation authentication, the user may input the displayed character string of 'Ydjlkrei' as the authentication information, and select and input the 'OK' button. The transmitted authentication information to the server.

If the server determines that the same character string as that of the character string 'Ydjlkrei' instructed to the terminal by analyzing the received authentication information is determined to have passed the real user confirmation authentication.

At this time, if the character string different from the character string of the above-mentioned 'Ydjlkrei' is input as the authentication information or the character string is not input until the input time limit of the character string is exceeded, the server determines that the real user verification authentication has failed. It is determined that the character is automatically executed by illegal program driving, and the game progress of the character is stopped.

While the present invention has been described in connection with what is presently considered to be the most practical and preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments. In other words, within the scope of the present invention, all of the components may be selectively operated in combination with one or more. In addition, although all of the components may be implemented as one independent hardware, some or all of the components may be selectively combined to perform a part or all of the functions in one or a plurality of hardware. As shown in FIG. Codes and code segments constituting the computer program may be easily inferred by those skilled in the art. Such a computer program may be stored in a computer readable storage medium and read and executed by a computer, thereby implementing embodiments of the present invention. As a storage medium of the computer program, a magnetic recording medium, an optical recording medium, or the like can be included.

It is also to be understood that the terms such as " comprises, "" comprising," or "having ", as used herein, mean that a component can be implanted unless specifically stated to the contrary. But should be construed as including other elements. All terms, including technical and scientific terms, have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs, unless otherwise defined. Commonly used terms, such as predefined terms, should be interpreted to be consistent with the contextual meanings of the related art, and are not to be construed as ideal or overly formal, unless expressly defined to the contrary.

The foregoing description is merely illustrative of the technical idea of the present invention, and various changes and modifications may be made by those skilled in the art without departing from the essential characteristics of the present invention. Therefore, the embodiments disclosed in the present invention are intended to illustrate rather than limit the scope of the present invention, and the scope of the technical idea of the present invention is not limited by these embodiments. The protection scope of the present invention should be interpreted by the following claims, and all technical ideas within the equivalent scope should be interpreted as being included in the scope of the present invention.

Claims (11)

In the way the server controls the use of illegal programs in the game,
Transmitting an item acquisition authentication input window to the terminal;
Receiving authentication information input through the item acquisition authentication input window from the terminal;
Providing a report item to a user account for which authentication has been completed based on the received authentication information; And
Receiving an instruction to use the report item for a character suspected of playing a game using an illegal program
How to crack down on illegal program use in the game, including.
In the way the server controls the use of illegal programs in the game,
Receiving an instruction to use a previously provided notification item from a terminal connected to the server with an authenticated user account;
Receiving authentication information for authenticating a real user from a terminal of a user account having a report target character, which is a target of the received usage command, and performing authentication processing; And
If the authentication process fails, generating a sanction command for the character to be reported by determining that the user of the user account having the character to be reported is playing a game using an illegal program.
How to crack down on illegal program use in the game, including.
The method of claim 2,
Performing the authentication process,
Transmitting a real user confirmation authentication window to a terminal of a user account having the report target character;
Receiving the authentication information input through the transmitted real user confirmation authentication window
How to control the use of illegal programs in the game comprising a.
The method of claim 3,
Performing the authentication process,
And generating a control command to suspend game progress for the character to be reported while the real user confirmation authentication window is displayed on the terminal screen.
The method of claim 2,
The sanction command generated is a control command to stop the progress of the game for a predetermined time for the character to be reported to control the use of illegal programs in the game.
The method of claim 2,
Generating the sanctions command,
If the authentication process is unsuccessful, the method for controlling illegal programs in the game, characterized in that for providing a predetermined game asset to the user account using the report item.
An authentication processing unit for performing a user authentication for providing a notification item to a terminal proceeding with the game; And
The server control unit for controlling the authentication processing unit to provide a report item for illegal program use to the character proceeding the game through the terminal has passed the authentication or the user account holding the character
Server to control the use of illegal programs in the game, including.
An authentication processing unit for performing a real user verification on a user account having the character when a command for using a report item is received for a character estimated to use an illegal program on a game screen from a terminal; And
If authentication fails in the authentication processing unit, it is determined that an illegal program is used in the terminal on which the real user verification authentication is performed, and a server control unit generating and transferring a sanction command for the user account of the terminal on which the real user verification authentication is performed.
Server to control the use of illegal programs, including.
9. The method of claim 8,
The server,
Compensation payment unit that rewards the game assets set in advance to the user account using the report item for the character of the user account determined that the illegal program was used
Server to crack down on illegal program use in the game further including.
9. The method of claim 8,
The server control unit,
If it is determined that the target character corresponding to the report item use command is not moved for a predetermined time in the game, a control command is generated and transmitted to the authentication processing unit so that the real user confirmation authentication is not performed. Servers that regulate the use of illegal programs.
9. The method of claim 8,
The server control unit,
And controlling the user not to perform additional real user verification authentication for a predetermined time for the character determined to be controlled by the real user after the real user verification authentication is successful.
KR1020110128216A 2011-12-02 2011-12-02 The methdo and server for cracking down on autorun program KR20130065833A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020110128216A KR20130065833A (en) 2011-12-02 2011-12-02 The methdo and server for cracking down on autorun program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020110128216A KR20130065833A (en) 2011-12-02 2011-12-02 The methdo and server for cracking down on autorun program

Publications (1)

Publication Number Publication Date
KR20130065833A true KR20130065833A (en) 2013-06-20

Family

ID=48862246

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020110128216A KR20130065833A (en) 2011-12-02 2011-12-02 The methdo and server for cracking down on autorun program

Country Status (1)

Country Link
KR (1) KR20130065833A (en)

Similar Documents

Publication Publication Date Title
US10413819B2 (en) System for providing access to game progress data
US20080220869A1 (en) Method and apparatus for providing game guide data in a gaming environment
EP2125126A1 (en) Method and apparatus for collecting user game play data and crediting users in an online gaming environment
US9873046B2 (en) Asynchronous online game play and defend mode processing to enable social friends to assist and alter game play outcomes
JP2018011632A (en) Information processing device and game program
US20150058144A1 (en) Social Networking Data Augmented Gaming Kiosk
US8414390B1 (en) Systems and methods for the electronic distribution of games
US20080220872A1 (en) Method and apparatus for issuing a challenge prompt in a gaming environment
US11074626B2 (en) Method, server, and program for managing application
US20140359476A1 (en) System and method for forwarding external notifications of events in a virtual space from a presentation control device to a user device
US20200143403A1 (en) System and method for providing external notifications of events in a virtual space to users
US8662997B1 (en) Systems and methods for in-game provisioning of content
US20150371295A1 (en) System and method for cross-application virtual goods management
US20220150273A1 (en) System and method for cyber training
US11265343B2 (en) System and method for cyber training
US8974276B2 (en) Generating reminders for game conditions
CN105577641B (en) System and method for inviting users to participate in an activity based on interactive recording
US9830040B1 (en) System and method for conducting a spy game on a social network
KR101356584B1 (en) The method, server and system for monitoring unfair user in the game
KR20130138871A (en) Method of strengthening game item, server performing the same and storage media storing the same
KR20130065833A (en) The methdo and server for cracking down on autorun program
KR20130037778A (en) Method and device for providing character transferring service using that
KR20130089965A (en) Method, game server, terminal, and recording medium for providing a game information
KR20130057770A (en) Game server, method, terminal, and recording medium for providing function to create a party in game
KR102666382B1 (en) Method and system for authenticating account based on game content

Legal Events

Date Code Title Description
A201 Request for examination
E902 Notification of reason for refusal
E601 Decision to refuse application