Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Embedded 'wood horse' dedicated network game system, and virus inquiring and killing method

A technology for online games and Trojan horses, which is applied in the field of online game systems, can solve the problems of not strong pertinence in checking and killing Trojan horses, ineffectiveness of Trojan horse viruses, and untargeted queries, so as to increase directness and convenience, and highly efficient antivirus time, the effect of improving safety

Inactive Publication Date: 2007-11-28
珠海市西山居软件有限公司 +1
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Moreover, it is not a special game killing software, and the query is relatively untargeted
What is especially important is that the traditional anti-virus method is to start the computer first, and then run the anti-virus program for anti-virus; and for the Trojan virus, only after the virus program is started and runs in the memory, it will be cleared; The Trojan horse virus program that starts later, such as infecting the Trojan horse after killing the virus, or starting some Trojan horse games after running, just creates a blind spot in time, resulting in the antivirus program not working on the Trojan horse virus that is started later
As shown in Figure 1, the anti-Trojan software and the game software are two independent programs, and often the Trojan virus software and the game software are often bound together, which will produce two disadvantages: first, the anti-Trojan software is targeted Not strong, always scan and kill the global system
Then, there will be a risk of omission here. In traditional online games, the hacking rate accounts for 30%.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedded 'wood horse' dedicated network game system, and virus inquiring and killing method
  • Embedded 'wood horse' dedicated network game system, and virus inquiring and killing method
  • Embedded 'wood horse' dedicated network game system, and virus inquiring and killing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] An online game system with built-in Trojan horse killing disclosed by the present invention includes a server and a plurality of clients, data interaction is performed between the server and each client through a communication network, and each client can be played by a player Control; each client includes an input device connected to each other, a display device, and a host computer; the server includes a single or multiple CPUs and memory devices, wherein:

[0033] The online game system includes a game starting module, a virus checking module and a login module, the game starting module and the virus checking module run as the same process of the online game, and the game starting module and the virus checking module share the same code area and the data area; when the player starts the game software, the antivirus module is turned on at the same time for virus inspection and protection processing; after the game system client end virus inspection and protection proce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network game system embed wooden horse special killing and a checking and killing virus method. The system simplifies the procedure and the mechanism of avoiding wooden horse virus, which achieves the perfect effect of safe game. The network game system comprises the following parts: a server, a plurality of clients, wherein the server interacts with a plurality of clients by the communication network, the clients are controlled by the player, a game starting modular, a checking and killing virus modular and a landing modular, wherein the game starting modular and the checking and killing virus modular are regarded as the same process, the game starting modular and the checking and killing virus modular use the same code section and data section, when the player starts the game software, the checking and killing virus modular is started and checks and kills the virus and deals with protection, the landing modular enters the landing process after the client of the game system checks and kills the virus and deals with protection.

Description

technical field [0001] The present invention relates to a network game system, in particular to a network game system embedded with a Trojan horse. Background technique [0002] The term "Trojan horse" first appeared in Greek mythology. According to legend, 3000 years ago, in a Greek war. Menelaus sent troops to crusade against the Kingdom of Troy, but was unable to attack for a long time. They came up with an idea: first they pretended to be defeated, and then left behind a Trojan horse. But the most powerful warrior is hidden inside the wooden horse! Finally, when the time came, all the warriors in the wooden horse rushed out and defeated the enemy! The meaning of the Trojan horse is to hide the premeditated function in the public function and cover up the real attempt. The Trojan horse virus got its name from this legend. In fact, it is some malicious programs created by hackers. The Trojan horse virus is a virus specially used to steal user information. When the Tr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/00G06F19/00G06F21/56
Inventor 赖立高廖志山邓振波蔡智儒
Owner 珠海市西山居软件有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products