Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network game security management system device and method

A security management and online game technology, applied in the field of online game security management system devices, can solve problems such as company reputation impact, game economic loss, player account theft, etc., to achieve the effect of protecting player accounts and private information

Inactive Publication Date: 2018-08-07
ZHUHAI KINGSOFT ONLINE GAME TECH CO LTD +1
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If there is a security problem in the game security management system, it will lead to a series of serious problems such as theft of player accounts, loss of props and currency in the game, etc., leading to a large loss of players, causing huge economic losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network game security management system device and method
  • Network game security management system device and method
  • Network game security management system device and method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0041] In the following, the concept, specific structure and technical effects of the present invention will be clearly and completely described in conjunction with the embodiments and the drawings, so as to fully understand the objectives, solutions and effects of the present invention. It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict.

[0042] It should be noted that, unless otherwise specified, when a feature is called "fixed" or "connected" to another feature, it can be directly fixed and connected to another feature, or indirectly fixed or connected to another feature. One feature. In addition, the top, bottom, left, right and other descriptions used in the present invention are only relative to the mutual positional relationship of the components of the present invention in the drawings. The singular forms of "a", "said" and "the" used in the present invention and the appe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method of a network game security management system. The method comprises the following steps of A. checking an IP address of a game player; B. checking mark identity of the game player; and C. checking password identity of the game player. The invention further provides a device of a network game security management system. The device comprises an IP address identity check module for checking the IP address identity of the game player through a server, a check mark identity check module for checking the check mark identity of the game player through the server, and apassword identity check module for checking the password identity of the game player through the server.

Description

Technical field [0001] The present invention generally relates to the field of games, and in particular to a device and method of a network game safety management system. Specific game fields include PC games, mobile games, page games, and the like. Background technique [0002] In online games, the client is untrustworthy, and an online game security management system is very important to ensure the normal operation of the game. Identifying a person is the process of identifying a person, and the result is a certain interactive process on a given set of hosts. For computer games, authentication has the following two situations: game session refers to determining that a network package is sent by the logged-in player it claims; logging in to the game refers to determining the credibility (a username and password) provided by the client and the legal player database Match the information in. If there is a security problem in the game security management system, it will lead to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06A63F13/71H04L9/32
CPCA63F13/71H04L63/083H04L63/0876H04L63/108H04L63/20H04L9/3236H04L63/0428H04L67/131
Inventor 李茂陈汉辉卢歆翮张锦熠江卓浩陈镇秋
Owner ZHUHAI KINGSOFT ONLINE GAME TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products