Game safety management system
A security management and game technology, applied in the field of game management, can solve problems such as shortening the game running cycle, high scale and frequency, and affecting the use and experience of players, so as to avoid destroying game balance, avoid traffic cheating, and improve Use and experience the effect of the effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0019] As a preferred embodiment of the present invention, the output end of the DDOS protection service is electrically connected to the high-defense data center, the output end of the DDOS protection service is electrically connected to attack detection and attack cleaning, and the output end of the information cleaning module is connected to the identity verification The input end of the module is electrically connected.
[0020] This kind of game security management system uses the DDOS protection service to pull and clean the DDOS attacks less than 5Gb, and then import the DDOS attacks exceeding 5Gb into the high-defense data center, use the high-defense data center to clean them and return them to the source. In this way, the classification and cleaning of the attack degree of the traffic is realized, thereby reducing the degree of the game being attacked by DDOS, and avoiding the suspension and offline of many excellent game projects due to the attack, thereby improving ...
Embodiment 2
[0022] As a preferred embodiment of the present invention, the SLB load balancing module includes an application processing layer, a cluster forwarding layer, a cross-availability zone disaster recovery layer, and a cross-region disaster recovery layer, and the identity verification module includes an IP address identity verification module, a verification mark identity verification module and password authentication module.
[0023] This kind of game security management system sets the application processing layer, cluster forwarding layer, cross-availability zone disaster recovery layer, and cross-region disaster recovery layer. The application processing layer is the ECS layer that actually processes requests, and the cluster forwarding layer refers to load forwarding. For SLB clusters requested by users, including LVS clusters and Tengine clusters, whether it is a machine failure or a cluster upgrade, user requests must be guaranteed to be uninterrupted as much as possible....
Embodiment 3
[0025] As a preferred embodiment of the present invention, the output terminal of the identity verification module is electrically connected to the authority management module and the unified identity authentication system, and the authority management module includes a data layer, an authentication channel layer and an authentication interface layer.
[0026] This kind of game security management system uses the authority control module of the member site to the user, the authority control of the user to the member site, and the authority control of the member site to the member site through the set authority management module. Provide the member site with some of his information, which is the authority provided by the user to the member site, and the member site can query user information after passing the identity authentication of the unified identity authentication system, and assign permissions to the user, and the user who has obtained the authority After being authentic...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
