Method for detecting network game cheat

An online game and game technology, applied in indoor games, video games, data exchange networks, etc., can solve the problem that plug-ins cannot be avoided, and achieve the effect of preventing cheating and reducing income loss.

Inactive Publication Date: 2007-01-10
王荣
View PDF0 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although manufacturers can detect these new cheating programs by updating the client, cheaters can also use updated programs to avoid detection, so this is not a fundamental solution, so online game manufacturers are eager to have a kind of cheating that cannot be avoided. anti-cheat program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting network game cheat
  • Method for detecting network game cheat
  • Method for detecting network game cheat

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] Take a typical client / server form of online game as an example below to illustrate the specific details of the present invention.

[0048] method of execution.

[0049] The computer in the game is composed of server, game client 1, client 2 and some other clients 3-n, such as figure 1 shown.

[0050] Such as figure 2As shown, after client 1 connects to the server, it transmits the data D1 it receives from the server together with the data D2 on client 1 that affects the game such as keyboard, mouse, and joystick operations to client 2. Carry time information in data D1 and D2, for example, D1 contains the time when the server sends D1, and the time when the authenticated client processes D1, D2 contains the time when the authenticated client processes D2, and the authenticated client The time when the client sends data to the server. Therefore, the client 2 can calculate the data D3 that the client 1 should send to the server according to D1 and D2. Since D3 and t...

Embodiment 2

[0056] In this embodiment, in order to prevent the verification client from modifying the data passed to it by the verified client, and then falsely report that the verified client is cheating, the data such as D1 and D2 can be sent to the verified client before the verified client sends the data to the verified client. Use data with RSA (RSA is an asymmetric encryption algorithm. It is widely used in public key encryption standards and electronic commerce. RSA was proposed by Ron Rivest, Adi Shamir and LenAdleman. RSA uses the initial letters of their three names. composed together.) Algorithm encryption. The server sends the decrypted public key to the authentication client. If the verification client reports to the server that the verified client is cheating, the server will require the verification client to transmit the data D1 and D2 sent by the verified client to the verification client to the server. The server calculates the data D3' that the authenticated client sho...

Embodiment 3

[0059] In addition, the present invention allows an authenticated client to connect to two or more authenticated clients at the same time. If the connection between the authenticated client and one or more authentication clients is interrupted, as long as the authenticated client is still connected to at least one authentication client normally, the authentication can continue. If the authenticated client interrupts all connections with the authenticated client for reasons such as evasion of authentication or network failure, the server needs to terminate the authenticated client because there will be no authenticated client to authenticate the authenticated client end connection. If the authenticating client never reports cheating by the authenticated client, it doesn't matter as long as the other authenticating client works fine. In addition, some clients can deliberately transmit wrong data to the verification client. If it does not report cheating, it can be judged that t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The method includes steps: client end to be validated and validating client end receive data 1 sent from server; the client end to be validated sends operation data 2 with influence on game happened on the client end to the validating client end, and then calculating out data 3, which should be sent to server from the client end to be validated; the validating client processes data 1 and data 2 so as to obtain data 3'; comparing data 3 with data 3', if they are not identical, then conclusion can be made that there is cheat action has done by at least one client end. Through validation each other between client ends on network game, the invention detects cheat action correctly. Moreover, external hanging mode to make cheat action also can be detected out. The invention ensures that game is carried out fairly as well as reduces loss of earnings of operational manager.

Description

technical field [0001] The invention provides a method for detecting network data, and in particular relates to a method for detecting cheating in network games. Background technique [0002] Online games are being liked by more and more people, but online games have been troubled by various cheating behaviors since their birth. They destroy the balance of the game's original design, and also destroy the normal development of the game. Since the current online games basically use the client / server model, the server-side network bandwidth, CPU and other resources are heavily loaded, so a lot of calculations have to be handed over to the game client, which brings cheating problems to the client. An opportunity to take advantage of. Cheaters use online game plug-ins and other programs to bring benefits that cheaters should not have under normal circumstances, destroy the design of online game reservations, and seriously interfere with the normal progress of the game. At pres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00
CPCA63F13/12H04L12/1822A63F2300/5586A63F13/30A63F13/75A63F13/71
Inventor 王荣
Owner 王荣
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products