Method, device, terminal and storage medium for preventing plug-in

A technology for storing addresses and storage spaces, applied in the Internet field, can solve problems such as the inability to prevent plug-ins, and achieve the effect of ensuring security, security and reliability

Active Publication Date: 2021-06-08
GUANGZHOU HUADUO NETWORK TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a method, device, terminal and storage medium for preventing cheating, which can solve the problem in the related art that the plug-in cannot be prevented from being opened by writing the breakpoint characteristic value

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, terminal and storage medium for preventing plug-in
  • Method, device, terminal and storage medium for preventing plug-in
  • Method, device, terminal and storage medium for preventing plug-in

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0074] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0075] figure 1 It is a flowchart of a method for preventing cheating provided by an embodiment of the present invention. The execution subject of this embodiment of the invention is a terminal, see figure 1 , the method includes:

[0076] 101. When a verification instruction is received, acquire a target character string, and write the target character string into a first address.

[0077] Wherein, the target character string is a character st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, device, terminal and storage medium for preventing plug-in, and belongs to the technical field of the Internet. The method includes: when receiving a verification instruction, the terminal acquires a target character string, writes the target character string into the first address, the target character string is a character string converted by a verification function, and the verification function uses To verify whether there is a program breakpoint in the target application program; the terminal converts the target character string into the verification function; through the verification function, the target application program is verified to obtain the verification result; when based on the verification function When the test result determines that there is a program breakpoint in the target application program, the target application program will be interrupted to ensure that the target application program can run normally. The possibility that the target application program is hacked ensures the security of the target application program.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method, device, terminal and storage medium for preventing cheating. Background technique [0002] With the development of network technology, game applications are becoming more and more popular. In many game applications, users can add some privileges to their game objects in the game by opening the plug-in. For example, in the game, the game object without the plug-in The length of one step is only 1 meter. When the plug-in is enabled, the length of the game object’s step can reach 100 meters. Obviously, the method of using the plug-in seriously affects the fairness of the game. [0003] In this field, the method of preventing debugging is generally used to prevent people who want to open the plug-in from dynamically analyzing the application through the plug-in, that is, the terminal detects whether the debugger port is called, thereby preventing the application from b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56A63F13/75
CPCA63F2300/5586A63F13/75
Inventor 黄国友
Owner GUANGZHOU HUADUO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products