CN1558593A - Method for preventing network game external suspension by employing cryptography - Google Patents
Method for preventing network game external suspension by employing cryptography Download PDFInfo
- Publication number
- CN1558593A CN1558593A CNA200410001138XA CN200410001138A CN1558593A CN 1558593 A CN1558593 A CN 1558593A CN A200410001138X A CNA200410001138X A CN A200410001138XA CN 200410001138 A CN200410001138 A CN 200410001138A CN 1558593 A CN1558593 A CN 1558593A
- Authority
- CN
- China
- Prior art keywords
- network game
- packet
- client
- game server
- server end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 239000000725 suspension Substances 0.000 title abstract 2
- 230000005540 biological transmission Effects 0.000 claims description 4
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a method for externally suspension of network games by adopting cryptography, wherein the two ends of the client machine and the network game server are provided with a common cipher machines, the symmetrical cryptographic algorism is employed as the encryption algorithm for encryption for the data packet transmitted between the network game server end and client machine end, the network game server end and client machine end conduct encryption to the data packets with the same encryption algorithm to create encryption data packet.
Description
Technical field:
The present invention relates to filed of network information security, is to realize the data of network game bag is carried out encryption and decryption with cryptographic technique, prevents network game external store, and this technology is applicable to each online game operator.
Background technology:
At present, the safe practice of online game almost is blank at home, the method that wherein solves network game external store is in passive state all the time, basically be plug-in user in the player, to occur, after operator's affirmation is errorless, to its number of deleting punishment, though this method can play some punishment effects, but can not fundamentally solve the plug-in problem of online game, this has greatly influenced the sound development of online game.
Summary of the invention:
Adopt cryptographic technique to prevent the method for network game external store, be to adopt computer, password and network technology to come building network game data packet encryption system, at network game server end and client-side a pair of identical cipher machine is set respectively, its cryptographic algorithm is a symmetry algorithm, encrypt by packet, realize the safe transmission of packet, prevent that packet is modified or replaces online game, all processes realizes that with hardware or hardware, software combination concrete grammar is as follows:
1, each client-side has cover mutually different " sub-key " group N, every cover " sub-key " group N has a user number corresponding with it, N=600~1740 group, the length of every group " sub-key " is 8 bits~32 bits, itself and one group of user number are left in the digital key, this numeral key is realized with hardware, is a built-in CPU intelligent chip, has the USB hardware device of intelligent card function.
2, the cryptographic algorithm of client-side cipher machine realizes with software, leave in the client-side hard disk, and regularly from the network game server end down loading updating; The cryptographic algorithm of network game server end cipher machine realizes with hardware or software, if software then leaves in the hard disk of network game server.
3, network game server end has All Clients end " sub-key " group, it is encrypted with one group of fixed key F, close " sub-key " group user number corresponding with it after encrypting left on the hard disk of network game server end, and this fixed key F leaves in the digital key.
4, user number is made up of English alphabet or numeral, and length is 4~16, corresponding cover " sub-key " group of each user number; Timestamp is to produce according to the network game server end system for computer time, is made up of 8 bit digital; Random code is produced at random by network game server or client computer, and its length is K, K=10~16, and variable quantity is 10
10~10
16, by user number, timestamp and random code control " sub-key " group of user to be carried out at random, made up in real time and choose, the method that this key is chosen can reach one-time pad, does not reuse, and also toos many or too much for use in 10 years.
5; the key generative process of network game server end is; elder generation's generation time stabs and random code; and according to timestamp and random code from cover close " sub-key " group of user number correspondence; select K group close " sub-key " and synthetic one group of decryption key; use one group of fixed key F in the network game server end numeral key again; its deciphering is reduced into key; at last; this key is put in the cipher machine; encrypt generation ciphertext data bag M1 to being about to client-side data packets for transmission T; this ciphertext data bag M1 is the same with packet T size; but content difference; with user number; timestamp; random code and ciphertext data bag are issued client-side together as parameter from network game server end, are used for the protection to data of network game bag safety.
6, after client-side receives this parameter, from cover " sub-key " group of client-side, select K group " sub-key " according to the user number in the parameter, timestamp and random code, and a synthetic group key, again the ciphertext data bag is decrypted.
7, when the recreation of player's operational network, and will be when network game server end sends packet, in the process that this packet generates it is encrypted, promptly the every generation part of packet is just encrypted this part, is encrypted to the ciphertext data bag until whole packet; Or packet is encrypted to the ciphertext data bag as long as generating a bit just encrypts this bit up to whole packet, makes encryption system and data of network game bag reach seamless combination; Its encryption key is the random code that the timestamp that transmits according to network game server end and client-side produce, in cover " sub-key " group of client-side, select a K group " sub-key " and a synthetic group key, user number, timestamp, random code and ciphertext data bag are sent to network game server end in the lump, and network game server end is decrypted this ciphertext data bag again.
8, the random code of client-side and network game server end generation is thousand changes, ten thousand flowers, the random code that network game server end sent client-side the same day, all register at network game server end at every turn, under same user number, same timestamp, the situation that random code is identical is very little especially, when if network game server end receives the parameter appearance mistake of client-side transmission, that is: timestamp is not right, or the reusable words of random code, network game server end can be considered as it illegal parameter, and prompting client-side packet is wrong.
Description of drawings:
Fig. 1: the flow chart that is transferred to network game server end after client-side is encrypted packet
Fig. 2: the flow chart that is transferred to client-side after network game server end is encrypted packet
Embodiment:
Performing step below in conjunction with description of drawings packet encipher-decipher method:
Fig. 1: the random code that timestamp that transmits according to network game server end and client computer self produce, from cover " sub-key " group of client-side, select K group " sub-key " and synthetic key, with this key client-side being sent out the packet of giving network game server end encrypts, its encryption is to carry out in the process that packet forms, be that the data bound edge forms the limit encryption, reach packet and encryption system seamless combination, with user number, timestamp, parameters such as random code and ciphertext data bag transfer to network game server end in the lump, if the timestamp that network game server end detects in the parameter is not right, or random code is reused, then will be considered as illegal parameter to this parameter, and return data is surrounded by mistake, after if review time stamp and random code are errorless, then from cover " sub-key " group of this user number correspondence, select K group close " sub-key " and synthetic one group of decryption key, with fixed key F it is deciphered again, generate key, at last, with this key the ciphertext data bag is decrypted.
Fig. 2: the network game server end rise time stabs and random code, according to user number, timestamp and random code are from cover close " sub-key " group of this user number correspondence, select K group close " sub-key " and synthetic decryption key, with a fixing group key F this group decryption key is decrypted the generation key again, with this key packet is encrypted generation ciphertext data bag, with user number, timestamp, random code and ciphertext data bag transfer to client computer together, client computer is according to the timestamp and the random code that transmit, from cover " sub-key " group of client-side, select K group " sub-key ", an and synthetic group key, again the ciphertext data bag is decrypted, generates packet.
Claims (5)
1, adopt cryptographic technique to prevent the method for network game external store, be an identical cipher machine to be set respectively in network game server end and client, its cryptographic algorithm is a symmetry algorithm, data packets for transmission between network game server end and the client is encrypted, its key adopts the combination generating mode, reach one-time pad, network game server end is encrypted packet with identical key and cryptographic algorithm with client and is generated the ciphertext data bag, with this ciphertext data bag, user number, timestamp and random code are transmitted at network game server and client computer two ends mutually through network in the lump, receiving terminal is decrypted according to the various parameters that transmit, be reduced into bright packet, thereby solve the problem of network game external store.
2, require the described method that prevents network game external store according to right 1, it is characterized in that:
Utilize symmetric cryptographic algorithm that the data of network game bag is carried out encryption and decryption, promptly utilize block cipher, or the data of network game bag is carried out encryption and decryption with stream cipher algorithm.
3, require the described method that prevents network game external store according to right 1, it is characterized in that:
Carry out in the encryption and decryption at the packet to online game, each user uses a mutually different cover key, and reaches one-time pad.
4, require the described method that prevents network game external store according to right 1, it is characterized in that:
The packet that client passes to network game server end is to encrypt in the process that is generating, and promptly the every generation part of packet is just encrypted this part, is encrypted to the ciphertext data bag until whole packet; Or packet is encrypted to the ciphertext data bag as long as generating a bit just encrypts this bit up to whole packet, thereby, reach data of network game bag and encryption system seamless combination, replaced or revised to prevent the data of network game bag.
5, require the described method that prevents network game external store according to right 1, it is characterized in that:
Cryptographic algorithm to network game server end and client cipher machine is carried out regular update, and client is downloaded the cipher machine cryptographic algorithm of having upgraded from network game server end at every turn, decodes ability with the anti-group of improving encryption system.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNA200410001138XA CN1558593A (en) | 2004-01-30 | 2004-01-30 | Method for preventing network game external suspension by employing cryptography |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CNA200410001138XA CN1558593A (en) | 2004-01-30 | 2004-01-30 | Method for preventing network game external suspension by employing cryptography |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN1558593A true CN1558593A (en) | 2004-12-29 |
Family
ID=34350579
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CNA200410001138XA Pending CN1558593A (en) | 2004-01-30 | 2004-01-30 | Method for preventing network game external suspension by employing cryptography |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN1558593A (en) |
Cited By (7)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007028342A1 (en) * | 2005-09-10 | 2007-03-15 | Tencent Technology (Shenzhen) Company Limited | Method, system and device for game data transmission |
| CN100539599C (en) * | 2007-06-29 | 2009-09-09 | 腾讯科技(深圳)有限公司 | A kind of method and system that realize that game on line is invited |
| CN101005352B (en) * | 2007-01-23 | 2010-10-27 | 华为技术有限公司 | Method, system, server and terminal device for preventing network game external store |
| CN1819515B (en) * | 2006-03-20 | 2012-07-04 | 胡祥义 | Realizing method of security symmetric coding algorithm |
| CN104217156A (en) * | 2013-06-03 | 2014-12-17 | 腾讯科技(深圳)有限公司 | Method and device for preventing plug-in of games |
| CN105664489A (en) * | 2015-12-30 | 2016-06-15 | 广州华多网络科技有限公司 | Method and system for preventing plug-in of game |
| CN111262693A (en) * | 2020-01-10 | 2020-06-09 | 北京深思数盾科技股份有限公司 | Information processing method and system |
-
2004
- 2004-01-30 CN CNA200410001138XA patent/CN1558593A/en active Pending
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2007028342A1 (en) * | 2005-09-10 | 2007-03-15 | Tencent Technology (Shenzhen) Company Limited | Method, system and device for game data transmission |
| CN1929367B (en) * | 2005-09-10 | 2010-08-25 | 腾讯科技(深圳)有限公司 | Game data-transmission method and system |
| US8689339B2 (en) | 2005-09-10 | 2014-04-01 | Tencent Technology (Shenzhen) Company Limited | Method, system and apparatus for game data transmission |
| CN1819515B (en) * | 2006-03-20 | 2012-07-04 | 胡祥义 | Realizing method of security symmetric coding algorithm |
| CN101005352B (en) * | 2007-01-23 | 2010-10-27 | 华为技术有限公司 | Method, system, server and terminal device for preventing network game external store |
| CN100539599C (en) * | 2007-06-29 | 2009-09-09 | 腾讯科技(深圳)有限公司 | A kind of method and system that realize that game on line is invited |
| CN104217156A (en) * | 2013-06-03 | 2014-12-17 | 腾讯科技(深圳)有限公司 | Method and device for preventing plug-in of games |
| CN104217156B (en) * | 2013-06-03 | 2018-04-20 | 腾讯科技(深圳)有限公司 | Prevent plug-in method and device of playing |
| CN105664489A (en) * | 2015-12-30 | 2016-06-15 | 广州华多网络科技有限公司 | Method and system for preventing plug-in of game |
| CN105664489B (en) * | 2015-12-30 | 2019-04-23 | 广州华多网络科技有限公司 | A kind of method and system for preventing game plug-in |
| CN111262693A (en) * | 2020-01-10 | 2020-06-09 | 北京深思数盾科技股份有限公司 | Information processing method and system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN101753292B (en) | Methods and devices for a chained encryption mode | |
| EP1942430B1 (en) | Token Passing Technique for Media Playback Devices | |
| CN103003824B (en) | Storage device and method for providing partially encrypted content files to a host device | |
| CN103248650B (en) | A kind of document down loading method and system | |
| US8660964B2 (en) | Secure device licensing | |
| TWI420339B (en) | Software authorization system and method | |
| US20100202606A1 (en) | Two strings private key (symmetric) encryption and decryption method | |
| CN109245881A (en) | A kind of photograph video cloud encryption storage method | |
| US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
| WO2001039429A1 (en) | Integrity check values (icv) based on pseudorandom binary matrices | |
| CN100539500C (en) | A Safe and Efficient Network User Identity Authentication Method | |
| CN1319294A (en) | Adapter having secure function and computer secure system using it | |
| CN103152362B (en) | Based on the large data files encrypted transmission method of cloud computing | |
| CN101411114A (en) | Encryption method for highest security applications | |
| CN115174261A (en) | Mixed encryption and decryption system and method based on hierarchical layer and secret-medium secret distribution | |
| CN116881865A (en) | A license generation method and system | |
| CN107104795A (en) | Method for implanting, framework and the system of RSA key pair and certificate | |
| CN104579680A (en) | Method for safe distribution of seed | |
| CN110198320B (en) | Encrypted information transmission method and system | |
| CN103117850B (en) | A kind of method for building up of the cryptographic system based on random sequence database | |
| CN100401309C (en) | Encryption verification method for intelligent upgrade of software version of tax control equipment | |
| CN1558593A (en) | Method for preventing network game external suspension by employing cryptography | |
| CN107278357B (en) | Cryptographic system and method | |
| CN109150505A (en) | A kind of information transferring method and device for SAP system | |
| CN100579009C (en) | A method for upgrading the function of trusted computing module |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| C12 | Rejection of a patent application after its publication | ||
| RJ01 | Rejection of invention patent application after publication |