Authentication method for network game client and server cluster

A server cluster and online game technology, applied in the authentication field of online game client and server cluster, can solve the problems of impostor and damage to players' interests, and achieve the effect of improving efficiency, simplifying the authentication process, and avoiding leakage.

Active Publication Date: 2009-05-13
KONKA GROUP
View PDF0 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If this cannot be done strictly, impostors may occur, resulting in damage to the interests of players

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for network game client and server cluster
  • Authentication method for network game client and server cluster
  • Authentication method for network game client and server cluster

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] Below according to accompanying drawing and embodiment the present invention will be described in further detail:

[0035] Such as figure 2 As shown, the servers in the server cluster have two different roles, one is an authentication server, and the other is an online game server. Only one authentication server is deployed, while multiple online game servers are deployed. The authentication method described in the present invention carries out concrete implementation according to the following steps:

[0036] 1. As attached image 3 As shown, the client generates its own key pair of asymmetric encryption algorithm, and encrypts the user name and password and the public key KClientPub in the key pair of its own asymmetric encryption algorithm with the asymmetric encryption public key KServerPub of the authentication server. sent to the authentication server. The asymmetric encrypted public key KServerPub of the authentication server is obtained after the client soft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a verification method to on-line game client side and server cluster and comprises the following steps: verifying ID to authentication server with username and password by client; assigning a random number and a symmetric encryption key to client; encrypting the random number with the symmetric encryption key by client and taking the encrypted random number as verification evidence for ID verification with other server in server cluster. The random number and symmetric encryption key assigned by authentication server are taken as the basis of ID verification and authentication between client and on-line game server in server cluster through the invention; hence, there is no need to save username and password for long time in client side and possibility of leaking username and password is prevented, verification process of server cluster is simplified, efficiency of on-line game server is improved.

Description

technical field [0001] The invention relates to the technical field of online games, in particular to an authentication method for an online game client and server cluster. Background technique [0002] With the development of computer network games, the number of players carried by a single game world is constantly increasing, and the processing requirements for servers are also constantly increasing. Several servers (server clusters) cooperate to accomplish this task. Each server only bears a part of the entire game world, and the specific division method is determined by the specific game implementation strategy, so that the pressure on the servers is effectively evenly distributed, making a smooth and grand game world possible. [0003] This raises a question, how to authenticate the player's identity when the player moves between various parts of the game world, correspondingly switching between servers in the server cluster? Such as figure 1 As shown, when the clien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/30H04L9/32H04L29/06H04L12/16
Inventor 魏略李清晖袁锋峰
Owner KONKA GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products