[go: up one dir, main page]

CN1558593A - Method for preventing network game external suspension by employing cryptography - Google Patents

Method for preventing network game external suspension by employing cryptography Download PDF

Info

Publication number
CN1558593A
CN1558593A CNA200410001138XA CN200410001138A CN1558593A CN 1558593 A CN1558593 A CN 1558593A CN A200410001138X A CNA200410001138X A CN A200410001138XA CN 200410001138 A CN200410001138 A CN 200410001138A CN 1558593 A CN1558593 A CN 1558593A
Authority
CN
China
Prior art keywords
network game
packet
client
game server
server end
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA200410001138XA
Other languages
Chinese (zh)
Inventor
阳 胡
胡阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CNA200410001138XA priority Critical patent/CN1558593A/en
Publication of CN1558593A publication Critical patent/CN1558593A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method for externally suspension of network games by adopting cryptography, wherein the two ends of the client machine and the network game server are provided with a common cipher machines, the symmetrical cryptographic algorism is employed as the encryption algorithm for encryption for the data packet transmitted between the network game server end and client machine end, the network game server end and client machine end conduct encryption to the data packets with the same encryption algorithm to create encryption data packet.

Description

Adopt cryptographic technique to prevent the method for network game external store
Technical field:
The present invention relates to filed of network information security, is to realize the data of network game bag is carried out encryption and decryption with cryptographic technique, prevents network game external store, and this technology is applicable to each online game operator.
Background technology:
At present, the safe practice of online game almost is blank at home, the method that wherein solves network game external store is in passive state all the time, basically be plug-in user in the player, to occur, after operator's affirmation is errorless, to its number of deleting punishment, though this method can play some punishment effects, but can not fundamentally solve the plug-in problem of online game, this has greatly influenced the sound development of online game.
Summary of the invention:
Adopt cryptographic technique to prevent the method for network game external store, be to adopt computer, password and network technology to come building network game data packet encryption system, at network game server end and client-side a pair of identical cipher machine is set respectively, its cryptographic algorithm is a symmetry algorithm, encrypt by packet, realize the safe transmission of packet, prevent that packet is modified or replaces online game, all processes realizes that with hardware or hardware, software combination concrete grammar is as follows:
1, each client-side has cover mutually different " sub-key " group N, every cover " sub-key " group N has a user number corresponding with it, N=600~1740 group, the length of every group " sub-key " is 8 bits~32 bits, itself and one group of user number are left in the digital key, this numeral key is realized with hardware, is a built-in CPU intelligent chip, has the USB hardware device of intelligent card function.
2, the cryptographic algorithm of client-side cipher machine realizes with software, leave in the client-side hard disk, and regularly from the network game server end down loading updating; The cryptographic algorithm of network game server end cipher machine realizes with hardware or software, if software then leaves in the hard disk of network game server.
3, network game server end has All Clients end " sub-key " group, it is encrypted with one group of fixed key F, close " sub-key " group user number corresponding with it after encrypting left on the hard disk of network game server end, and this fixed key F leaves in the digital key.
4, user number is made up of English alphabet or numeral, and length is 4~16, corresponding cover " sub-key " group of each user number; Timestamp is to produce according to the network game server end system for computer time, is made up of 8 bit digital; Random code is produced at random by network game server or client computer, and its length is K, K=10~16, and variable quantity is 10 10~10 16, by user number, timestamp and random code control " sub-key " group of user to be carried out at random, made up in real time and choose, the method that this key is chosen can reach one-time pad, does not reuse, and also toos many or too much for use in 10 years.
5; the key generative process of network game server end is; elder generation's generation time stabs and random code; and according to timestamp and random code from cover close " sub-key " group of user number correspondence; select K group close " sub-key " and synthetic one group of decryption key; use one group of fixed key F in the network game server end numeral key again; its deciphering is reduced into key; at last; this key is put in the cipher machine; encrypt generation ciphertext data bag M1 to being about to client-side data packets for transmission T; this ciphertext data bag M1 is the same with packet T size; but content difference; with user number; timestamp; random code and ciphertext data bag are issued client-side together as parameter from network game server end, are used for the protection to data of network game bag safety.
6, after client-side receives this parameter, from cover " sub-key " group of client-side, select K group " sub-key " according to the user number in the parameter, timestamp and random code, and a synthetic group key, again the ciphertext data bag is decrypted.
7, when the recreation of player's operational network, and will be when network game server end sends packet, in the process that this packet generates it is encrypted, promptly the every generation part of packet is just encrypted this part, is encrypted to the ciphertext data bag until whole packet; Or packet is encrypted to the ciphertext data bag as long as generating a bit just encrypts this bit up to whole packet, makes encryption system and data of network game bag reach seamless combination; Its encryption key is the random code that the timestamp that transmits according to network game server end and client-side produce, in cover " sub-key " group of client-side, select a K group " sub-key " and a synthetic group key, user number, timestamp, random code and ciphertext data bag are sent to network game server end in the lump, and network game server end is decrypted this ciphertext data bag again.
8, the random code of client-side and network game server end generation is thousand changes, ten thousand flowers, the random code that network game server end sent client-side the same day, all register at network game server end at every turn, under same user number, same timestamp, the situation that random code is identical is very little especially, when if network game server end receives the parameter appearance mistake of client-side transmission, that is: timestamp is not right, or the reusable words of random code, network game server end can be considered as it illegal parameter, and prompting client-side packet is wrong.
Description of drawings:
Fig. 1: the flow chart that is transferred to network game server end after client-side is encrypted packet
Fig. 2: the flow chart that is transferred to client-side after network game server end is encrypted packet
Embodiment:
Performing step below in conjunction with description of drawings packet encipher-decipher method:
Fig. 1: the random code that timestamp that transmits according to network game server end and client computer self produce, from cover " sub-key " group of client-side, select K group " sub-key " and synthetic key, with this key client-side being sent out the packet of giving network game server end encrypts, its encryption is to carry out in the process that packet forms, be that the data bound edge forms the limit encryption, reach packet and encryption system seamless combination, with user number, timestamp, parameters such as random code and ciphertext data bag transfer to network game server end in the lump, if the timestamp that network game server end detects in the parameter is not right, or random code is reused, then will be considered as illegal parameter to this parameter, and return data is surrounded by mistake, after if review time stamp and random code are errorless, then from cover " sub-key " group of this user number correspondence, select K group close " sub-key " and synthetic one group of decryption key, with fixed key F it is deciphered again, generate key, at last, with this key the ciphertext data bag is decrypted.
Fig. 2: the network game server end rise time stabs and random code, according to user number, timestamp and random code are from cover close " sub-key " group of this user number correspondence, select K group close " sub-key " and synthetic decryption key, with a fixing group key F this group decryption key is decrypted the generation key again, with this key packet is encrypted generation ciphertext data bag, with user number, timestamp, random code and ciphertext data bag transfer to client computer together, client computer is according to the timestamp and the random code that transmit, from cover " sub-key " group of client-side, select K group " sub-key ", an and synthetic group key, again the ciphertext data bag is decrypted, generates packet.

Claims (5)

1, adopt cryptographic technique to prevent the method for network game external store, be an identical cipher machine to be set respectively in network game server end and client, its cryptographic algorithm is a symmetry algorithm, data packets for transmission between network game server end and the client is encrypted, its key adopts the combination generating mode, reach one-time pad, network game server end is encrypted packet with identical key and cryptographic algorithm with client and is generated the ciphertext data bag, with this ciphertext data bag, user number, timestamp and random code are transmitted at network game server and client computer two ends mutually through network in the lump, receiving terminal is decrypted according to the various parameters that transmit, be reduced into bright packet, thereby solve the problem of network game external store.
2, require the described method that prevents network game external store according to right 1, it is characterized in that:
Utilize symmetric cryptographic algorithm that the data of network game bag is carried out encryption and decryption, promptly utilize block cipher, or the data of network game bag is carried out encryption and decryption with stream cipher algorithm.
3, require the described method that prevents network game external store according to right 1, it is characterized in that:
Carry out in the encryption and decryption at the packet to online game, each user uses a mutually different cover key, and reaches one-time pad.
4, require the described method that prevents network game external store according to right 1, it is characterized in that:
The packet that client passes to network game server end is to encrypt in the process that is generating, and promptly the every generation part of packet is just encrypted this part, is encrypted to the ciphertext data bag until whole packet; Or packet is encrypted to the ciphertext data bag as long as generating a bit just encrypts this bit up to whole packet, thereby, reach data of network game bag and encryption system seamless combination, replaced or revised to prevent the data of network game bag.
5, require the described method that prevents network game external store according to right 1, it is characterized in that:
Cryptographic algorithm to network game server end and client cipher machine is carried out regular update, and client is downloaded the cipher machine cryptographic algorithm of having upgraded from network game server end at every turn, decodes ability with the anti-group of improving encryption system.
CNA200410001138XA 2004-01-30 2004-01-30 Method for preventing network game external suspension by employing cryptography Pending CN1558593A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA200410001138XA CN1558593A (en) 2004-01-30 2004-01-30 Method for preventing network game external suspension by employing cryptography

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA200410001138XA CN1558593A (en) 2004-01-30 2004-01-30 Method for preventing network game external suspension by employing cryptography

Publications (1)

Publication Number Publication Date
CN1558593A true CN1558593A (en) 2004-12-29

Family

ID=34350579

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA200410001138XA Pending CN1558593A (en) 2004-01-30 2004-01-30 Method for preventing network game external suspension by employing cryptography

Country Status (1)

Country Link
CN (1) CN1558593A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007028342A1 (en) * 2005-09-10 2007-03-15 Tencent Technology (Shenzhen) Company Limited Method, system and device for game data transmission
CN100539599C (en) * 2007-06-29 2009-09-09 腾讯科技(深圳)有限公司 A kind of method and system that realize that game on line is invited
CN101005352B (en) * 2007-01-23 2010-10-27 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN1819515B (en) * 2006-03-20 2012-07-04 胡祥义 Realizing method of security symmetric coding algorithm
CN104217156A (en) * 2013-06-03 2014-12-17 腾讯科技(深圳)有限公司 Method and device for preventing plug-in of games
CN105664489A (en) * 2015-12-30 2016-06-15 广州华多网络科技有限公司 Method and system for preventing plug-in of game
CN111262693A (en) * 2020-01-10 2020-06-09 北京深思数盾科技股份有限公司 Information processing method and system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007028342A1 (en) * 2005-09-10 2007-03-15 Tencent Technology (Shenzhen) Company Limited Method, system and device for game data transmission
CN1929367B (en) * 2005-09-10 2010-08-25 腾讯科技(深圳)有限公司 Game data-transmission method and system
US8689339B2 (en) 2005-09-10 2014-04-01 Tencent Technology (Shenzhen) Company Limited Method, system and apparatus for game data transmission
CN1819515B (en) * 2006-03-20 2012-07-04 胡祥义 Realizing method of security symmetric coding algorithm
CN101005352B (en) * 2007-01-23 2010-10-27 华为技术有限公司 Method, system, server and terminal device for preventing network game external store
CN100539599C (en) * 2007-06-29 2009-09-09 腾讯科技(深圳)有限公司 A kind of method and system that realize that game on line is invited
CN104217156A (en) * 2013-06-03 2014-12-17 腾讯科技(深圳)有限公司 Method and device for preventing plug-in of games
CN104217156B (en) * 2013-06-03 2018-04-20 腾讯科技(深圳)有限公司 Prevent plug-in method and device of playing
CN105664489A (en) * 2015-12-30 2016-06-15 广州华多网络科技有限公司 Method and system for preventing plug-in of game
CN105664489B (en) * 2015-12-30 2019-04-23 广州华多网络科技有限公司 A kind of method and system for preventing game plug-in
CN111262693A (en) * 2020-01-10 2020-06-09 北京深思数盾科技股份有限公司 Information processing method and system

Similar Documents

Publication Publication Date Title
CN101753292B (en) Methods and devices for a chained encryption mode
EP1942430B1 (en) Token Passing Technique for Media Playback Devices
CN103003824B (en) Storage device and method for providing partially encrypted content files to a host device
CN103248650B (en) A kind of document down loading method and system
US8660964B2 (en) Secure device licensing
TWI420339B (en) Software authorization system and method
US20100202606A1 (en) Two strings private key (symmetric) encryption and decryption method
CN109245881A (en) A kind of photograph video cloud encryption storage method
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
WO2001039429A1 (en) Integrity check values (icv) based on pseudorandom binary matrices
CN100539500C (en) A Safe and Efficient Network User Identity Authentication Method
CN1319294A (en) Adapter having secure function and computer secure system using it
CN103152362B (en) Based on the large data files encrypted transmission method of cloud computing
CN101411114A (en) Encryption method for highest security applications
CN115174261A (en) Mixed encryption and decryption system and method based on hierarchical layer and secret-medium secret distribution
CN116881865A (en) A license generation method and system
CN107104795A (en) Method for implanting, framework and the system of RSA key pair and certificate
CN104579680A (en) Method for safe distribution of seed
CN110198320B (en) Encrypted information transmission method and system
CN103117850B (en) A kind of method for building up of the cryptographic system based on random sequence database
CN100401309C (en) Encryption verification method for intelligent upgrade of software version of tax control equipment
CN1558593A (en) Method for preventing network game external suspension by employing cryptography
CN107278357B (en) Cryptographic system and method
CN109150505A (en) A kind of information transferring method and device for SAP system
CN100579009C (en) A method for upgrading the function of trusted computing module

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication