Method for logging in online game through mobile equipment

A mobile device and online game technology, applied in the field of online game login, can solve problems such as difficult to guarantee theft, and achieve the effect of solving the problem of account theft and high security

Active Publication Date: 2012-06-20
FUJIAN TQ DIGITAL
View PDF5 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when logging in, authentication information such as user name or password is still entered on the PC

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for logging in online game through mobile equipment
  • Method for logging in online game through mobile equipment
  • Method for logging in online game through mobile equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention is a method for logging in online games through mobile devices, such as figure 1 , the present invention includes a mobile device, an intermediate server, an account server, a user PC, and a game server.

[0023] combine figure 2 , which includes the following specific steps:

[0024] Step 10, install the user client on the mobile device, the mobile device can be a mobile phone, etc., install the PC-side daemon program on the user PC, and bind the user account with the corresponding user PC through the PC-side daemon program;

[0025] Such as image 3 , the PC-side daemon program is bound like this: the user inputs user information (such as user account number, password, and game item selection), and after the PC-side daemon program confirms that the user account number and password are correct, the PC-side daemon program generates The unique check value of the user information, the hardware information on the user PC generates the unique check...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for logging in an online game through mobile equipment. The method comprises the following steps of: 10, binding a user account and a corresponding user personal computer (PC) by using a PC end daemon on the user PC; 20, acquiring user information which is input by a user through a user client on the mobile equipment, and sending the user information to an intermediate server; 30, after the intermediate server receives the user information, submitting the user information to an account server, authenticating the user information, if authentication fails, finishing operation, and if authentication succeeds, taking back a login success certificate from the account server, and then issuing the login success certificate to the user PC which is bound with the user account; and 40, after the PC end daemon receives the login success certificate, starting a game client on the user PC, and transferring the login success certificate to the game client to log in a game server through the game client. By adoption of the method, the login process is separated from the game client, so that the problem of account stealing based on a PC end can be solved.

Description

【Technical field】 [0001] The invention relates to a method for logging into an online game, in particular to a method for logging into an online game through a mobile device. 【Background technique】 [0002] The traditional way to log in to online games is to enter the user account number and user password. This way of logging in has great security risks. Now many people use the method of binding the user account with the terminal, so that the user account cannot log in on the unbound terminal. This account login method also has shortcomings. If the hacker obtains the user's password, he can log in smoothly on the terminal that the user has bound, and the way the user cancels the binding of the terminal or increases the security of the binding is low, and the hacker will modify the account in this way Key information in the information base, such as canceling the binding or adding a bound terminal, hackers can log in on other terminals, but legitimate users cannot log in. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32H04W8/18
Inventor 刘德建方振华何巍巍李上杰
Owner FUJIAN TQ DIGITAL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products