CN105641930A - Game data calibrating method and device - Google Patents

Game data calibrating method and device Download PDF

Info

Publication number
CN105641930A
CN105641930A CN201511004169.5A CN201511004169A CN105641930A CN 105641930 A CN105641930 A CN 105641930A CN 201511004169 A CN201511004169 A CN 201511004169A CN 105641930 A CN105641930 A CN 105641930A
Authority
CN
China
Prior art keywords
proof test
test value
current value
value set
game data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201511004169.5A
Other languages
Chinese (zh)
Other versions
CN105641930B (en
Inventor
凌聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201511004169.5A priority Critical patent/CN105641930B/en
Publication of CN105641930A publication Critical patent/CN105641930A/en
Application granted granted Critical
Publication of CN105641930B publication Critical patent/CN105641930B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/77Game security or game management aspects involving data related to game devices or game servers, e.g. configuration data, software version or amount of memory
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/73Authorising game programs or game devices, e.g. checking authenticity
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/79Game security or game management aspects involving player-related data, e.g. identities, accounts, preferences or play histories

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)
  • Pinball Game Machines (AREA)

Abstract

The invention discloses a game data calibrating method and device. The method comprises the steps that a current value of game data is obtained from a first memory address, and a calibration value set matched with the current value is obtained from one or more second memory addresses; the current value and the calibration value set serve as input parameters of a calibration function, or the current value, the calibration value set and a preset constant serve as input parameters of the calibration function, and the current value is calibrated. According to the game data calibrating method and device, the technical problem that in related technologies, in a single-player mode, due to the fact that strong calibration of a server to the game data lacks, the game data is illegally tampered is solved.

Description

The verification method of game data and device
Technical field
The present invention relates to computer realm, specifically, it relates to a kind of verification method of game data and device.
Background technology
In the last few years, along with the develop rapidly of mobile communication technology and Internet technology, mobile Internet arises at the historic moment and presents the developing state of blowout formula. People can pass through various portable terminal (such as: smart mobile phone, wearable device) accessing internet whenever and wherever possible. A large amount of mobile phone games continue to bring out in the tide of mobile Internet, become part with the fastest developing speed in field of play.
Mobile phone games are compared to traditional Personal Computer (Personalcomputer, referred to as PC, it is for be made up of hardware system and software system, its for one can independent operating, complete the equipment of specific function) game, having the advantages that not limit by region, people can be played games whenever and wherever possible by the smart mobile phone of palm, and then obtains the effect of amusement and recreation. Along with the construction and development of mobile network communication technology (such as: G mobile communication (3G), forth generation mobile communication technology (4G)), market also occurs networking class mobile phone games of all kinds.
This kind of mobile phone games are due to the restriction (such as: signal instability, network speed, flow rate) of mobile network; in the process of development of games; usually single cpu mode can be added in gaming; to improve the playability of game when network environment is poor, or reach the object saving player's network flow spent when playing games. And single cpu mode is owing to lacking server to the strong verification of data during game running, so the problem of client executing cheating operation can be there is, namely game data is illegally distorted.
At present, the multiple method that game client is carried out practise fraud and detect is provided in the related. For online game, it is possible to sent in geodata and services end the data stored by client terminal and verify, can judge whether client terminal exists the cheating distorting game data according to check results. And for single-play game or single cpu mode, owing to lacking server to the strong verification of client data, so for game client cheating detection bring greatly difficulty.
Internal memory (Memory) is one of parts important in computer, and it is the bridge carrying out with central processing unit (CPU) linking up. In computer, the operation of all programs all carries out in internal memory, and therefore, the performance of internal memory is extremely important on the impact of computer. The operation number that the effect of internal memory is temporarily to deposit in CPU is according to this and the data exchanged with the exterior storage device such as hard disk. As long as in computer run process, the data needing computing just can be called in internal memory and be carried out computing by CPU. After computing completes, operation result is sent out by CPU again, and therefore, the operation of internal memory can determine the steady running of computer.
Under normal conditions, first data in amendment game client need to use some internal memory scanning tools (such as: Kingsoft chivalrous person, eight door god's devices) that the Scan orientation of game numerical value is gone out the internal memory address at game data place by several times, then by the value on this internal memory address of amendment, thus the object distorting game data is reached.
Existing solution by the difficulty of amendment game data in the internal memory address at binary storage form (such as: change the binary of game data put in order) the game data place, raising internal memory scanning tools location of bottom, thus can reach the object preventing game client from practising fraud to a certain extent.
But, can there is following problem by amendment game data in the anti-cheating solution of the binary storage form of bottom:
Owing to needing to revise the binary storage form of game data at bottom, in the process that program realizes, it usually needs above-mentioned flow process is realized in the bottom (such as: engine layers) of game. Therefore, once after game data is cracked, revise this flow process and there is bigger difficulty.
Moreover, because game data there occurs change at the scale-of-two form of bottom, in process game debugged, inconvenience to a certain degree can be brought for developer.
For above-mentioned problem, effective solution is not yet proposed at present.
Summary of the invention
Embodiments provide verification method and the device of a kind of game data, with at least solve in correlation technique game single cpu mode under, owing to lacking server to the strong verification of game data, there is the technical problem that game data is illegally distorted.
An aspect according to embodiments of the present invention, provide a kind of verification method of game data, comprise: the current value obtaining game data from the first internal memory address, and from one or more 2nd internal memory address, obtain the proof test value set mated with current value; Using input parameter as verification function of current value and proof test value set, or, by current value, current value, as the input parameter of verification function, is verified by proof test value set and predetermined constant.
Further, using input parameter as verification function of current value and proof test value set, or, by current value, current value, as the input parameter of verification function, is carried out verification and comprises by proof test value set and predetermined constant: using input parameter as verification function of current value and proof test value set, or, by current value, proof test value set and predetermined constant, as the input parameter of verification function, obtain the checking result of verification function; If the checking result got is identical with the check results preset, it is determined that game data is not tampered; If the checking result got is different from the check results preset, it is determined that game data is tampered.
Further, after determining that game data has been tampered, also comprise: receive the steering order coming from server; Again verification function is chosen according in multiple verification functions that steering order pre-sets from game client.
Further, the generating mode of each proof test value in proof test value set comprises one of following: after mobile terminal installs game client, each proof test value in stochastic generation proof test value set; To server initial request messages, and obtained each proof test value in the proof test value set of server stochastic generation by request message.
Further, after current value is verified, also comprise: judge whether the first internal memory address place writes renewal numerical value; If it does, then while current value being replaced for renewal numerical value, verification value set is updated to and the proof test value set upgrading values match.
Another aspect according to embodiments of the present invention, additionally provide the checking aparatus of a kind of game data, comprise: acquisition module, for obtaining the current value of game data from the first internal memory address, and from one or more 2nd internal memory address, obtain the proof test value set mated with current value; Verification module, for using input parameter as verification function of current value and proof test value set, or, by current value, current value, as the input parameter of verification function, is verified by proof test value set and predetermined constant.
Further, verification module comprises: acquiring unit, for using input parameter as verification function of current value and proof test value set, or, by current value, proof test value set and predetermined constant, as the input parameter of verification function, obtain the checking result of verification function; First determining unit, for when the checking result got is identical with the check results preset, it is determined that game data is not tampered; 2nd determining unit, for when the checking result got is different from the check results preset, it is determined that game data is tampered.
Further, said apparatus also comprises: receiver module, for receiving the steering order coming from server; Choose module, again choose verification function in multiple verification functions of pre-setting from game client according to steering order.
Further, the generating mode of each proof test value in proof test value set comprises one of following: after mobile terminal installs game client, each proof test value in stochastic generation proof test value set; To server initial request messages, and obtained each proof test value in the proof test value set of server stochastic generation by request message.
Further, said apparatus also comprises: judge module, for judging whether the first internal memory address place writes renewal numerical value; More new module, for when judging that module exports as being, while current value being replaced as renewal numerical value, being updated to verification value set and the proof test value set upgrading values match.
In embodiments of the present invention, adopt the mode that game data is protected by odd memory address, by will from first internal memory address obtain current value and from one or more 2nd internal memory address obtain proof test value set as verification function input parameter, or, by current value, proof test value set and predetermined constant are as the input parameter verifying function, current value is verified, reach the object improving game client cheating difficulty, thus achieve can be simple, detect whether game client exists cheating efficiently, improve the technique effect of the difficulty that on the client game data is performed cheating operation, and then solve in correlation technique game single cpu mode under, owing to lacking server to the strong verification of game data, there is the technical problem that game data is illegally distorted.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, forms the part of the application, and the schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention. In the accompanying drawings:
Fig. 1 is the verification method of game data according to embodiments of the present invention;
Fig. 2 is the structure block diagram of the checking aparatus of game data according to embodiments of the present invention;
Fig. 3 is the structure block diagram of the checking aparatus of game data according to the preferred embodiment of the invention.
Embodiment
In order to make those skilled in the art understand the present invention program better, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments. Based on the embodiment in the present invention, those of ordinary skill in the art, not making other embodiments all obtained under creative work prerequisite, should belong to the scope of protection of the invention.
It should be noted that, term " first " in the specification sheets of the present invention and claim book and above-mentioned accompanying drawing, " the 2nd " etc. are for distinguishing similar object, and need not be used for describing specific order or precedence. Should be appreciated that the data of like this use can be exchanged in the appropriate case, so as embodiments of the invention described herein can with except diagram here or describe those except order implement. In addition, term " comprises " and " having " and their any distortion, intention is to cover does not arrange his comprising, such as, contain those steps or unit that the process of series of steps or unit, method, system, product or equipment are not necessarily limited to clearly list, but can comprise that clearly do not list or for intrinsic other step of these processes, method, product or equipment or unit.
According to embodiments of the present invention, provide the embodiment of the method for a kind of verification method of game data, it should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the schema of accompanying drawing, and, although show logical order in flow charts, but in some cases, it is possible to be different from the step shown or described by the execution of order herein.
Fig. 1 is the verification method of game data according to embodiments of the present invention. As shown in Figure 1, the method comprises the steps:
Step S102, obtains the current value of game data from the first internal memory address, and obtains the proof test value set mated with current value from one or more 2nd internal memory address;
Step S104, using input parameter as verification function of current value and proof test value set, or, by current value, current value, as the input parameter of verification function, is verified by proof test value set and predetermined constant.
Pass through above-mentioned steps, can detect whether game client exists cheating simply, efficiently, improve the technique effect of the difficulty that on the client game data is performed cheating operation, and then solve in correlation technique game single cpu mode under, owing to lacking server to the strong verification of game data, there is the technical problem that game data is illegally distorted.
The maximum benefit adopting odd memory address to be protected by game data is: if it is intended to the game data adopting internal memory scanning tools can be stored in client terminal internal memory performs cheating operation, then need to navigate to the relevant multiple internal memory addresses of game data simultaneously, and it is carried out correct amendment simultaneously and just can successfully distort game data, but, it is very difficult that existing internal memory scanning tools is wanted accurately to navigate to the internal memory address storing proof test value; Even if the internal memory address storing proof test value can be navigated to, yet need to crack out further in above-mentioned two internal memory addresses the funtcional relationship between the variable-value stored and just can successfully distort.
In a preferred embodiment, odd memory address both can have been adopted to be protected by game data, it is also possible to add the input parameter of some constants as verification function, thus obtain verifying the Output rusults of function.
Owing to there is specific funtcional relationship between current value, proof test value and check results three, function expression is adopted to be: y=f (x0,x1,x2,...,xN), wherein, x0For current value, x1��xNFor proof test value and/or constant, y is check results. Such as: can choose verification function is x0+x1+ 10=100, wherein, 10 are the constant of verification function input.
In preferred implementation process, the generating mode of each proof test value in proof test value set comprises one of following:
Mode one, install after game client at mobile terminal, each proof test value in stochastic generation proof test value set;
Mode two, to server initial request messages, and by request message obtain server stochastic generation proof test value set in each proof test value.
In provided by the present invention preferred embodiment, the selection of validation value can be random after mobile phone games client terminal is installed generation, then, obtains the proof test value of acquiescence after initialization; Access services device can certainly be passed through, by server stochastic generation proof test value. The object of operation is like this: the proof test value making each mobile phone games client terminal adopt as much as possible is different mutually, thus, improves further and cracks the difficulty that the regular information arranging proof test value found out by instrument by multiple cell-phone customer terminal. In addition, what adopt that stochastic generation or this mode obtaining at random proof test value can also guarantee to obtain on a cell-phone customer terminal cracks achievement and cannot be applied to immediately on remaining cell-phone customer terminal, so significantly reduce game be cracked after the velocity of propagation of crack method.
In a preferred embodiment, utilize the principle of the internal memory address of internal memory scanning tools location game data as follows:
The first step, scanning need the variable numerical value (such as, it is necessary to modified by the current variable-value storing vital values) of amendment, obtain storing in internal memory the internal memory address candidates list of identical value.
The current vital values assuming a game role (such as: Master) is 100, and magic value is 100. So, it is possible to by internal memory scanning tools search in the internal memory address of game running numerical value be 100 variable corresponding to internal memory address, so just can search the internal memory address corresponding to vital values hp and this Two Variables of magic value mp. If also there is the vital values of multiple game role (such as: pastor, wizard) and when magic value is also all 100, so internal memory address corresponding to these variablees all can be scanned.
2nd step, in game carries out, vital values is carried out in real time adjustment (such as, game role hits in copy and kills monster acquisition empirical value and equipment or carry out with other game roles in arena in the real-time process fought, and game role is caused blood amount to decline by attack; Again such as, after game role upgrading, blood amount rises), screen one by one in the internal memory address candidates list that obtains in the above-mentioned the first step of numerical value after change, to upgrade after the inconsistent internal memory address of the value of vital values filter. Repeat the 2nd step, until finally orienting the internal memory address corresponding to game data.
Such as: the empirical value of game role accumulation in game carries out reaches upgrading standard, and its vital values rises to 200 by original 100, and magic value rises to 150 by original 100. If adopting the internal memory address of internal memory scanning tools search numerical value 200 correspondence, so the internal memory address candidates list that just can obtain in the above-mentioned the first step is searched for numerical value be 100 internal memory address in search checking one by one, the numerical value determined in which internal memory address rises to 200 by original 100, such that it is able to filter out the internal memory address that variable-value is not changed to 200. Perform above-mentioned search verification operation after, if only the value of a surplus variable is 100, so just can be directly targeted to the internal memory address corresponding to variable hp, now revise the numerical value of this internal memory address, so that it may to change the vital values of game role. If the value that internal memory address candidates list exists multiple variable is 100, such as, assume that the original gold coin quantity of game role is 100, owing to game role is after completing a particular task, the gold coin quantity that task is rewarded is 100, and so, now the gold coin quantity of this game role also can rise to 200 by original 100, therefore, represent that internal memory address corresponding to this variable of gold coin quantity also can in internal memory address candidates list at this moment.
Can selection of land, in step S104, using input parameter as verification function of current value and proof test value set, or, by current value, proof test value set and predetermined constant are as the input parameter verifying function, and current value is carried out verification can comprise the following steps:
Step S1: using input parameter as verification function of current value and proof test value set, or, by current value, proof test value set and predetermined constant, as the input parameter of verification function, obtain the checking result of verification function;
Step S2: if the checking result got is identical with the check results preset, it is determined that game data is not tampered;
Step S3: if the checking result got is different from the check results preset, it is determined that game data is tampered.
In a preferred embodiment; for the game data needing protection; odd memory address can be used to be protected by game data; namely one needs corresponding two the relevant variablees of the game data of protection; a variable is the variable storing this game data; another variable then can be used for verifying the variable of this game data; specific function relation is there is (namely between this Two Variables; this Two Variables is the input parameter of particular verified function, and the Output rusults of this verification function is certain validation value).
Can there are many data in gaming, such as: the vital values of game role and magic value etc. In the process of game running, these game datas all can adopt a program variable to perform read-write operation, such as: the life of variable hp game representation role, and the magic value of variable mp game representation role. In fact these variablees correspond to the numerical value in internal memory address. Above-mentioned double address refers to when adopting variable hp to while representing game role vital values, in addition it is also necessary to adopt a variable validate_hp to preserve and the proof test value that game role vital values is mated again. With reason, in time adopting variable mp to represent game role magic value, it is also desirable to adopt the proof test value that a variable validate_mp preserves with game role magic value is mated again, analogize with this. It should be noted that, only need the data of protection just to need to adopt the protected mode of above-mentioned pair of internal memory address.
Such as: the numerical value assuming the vital values hp of game role is 100, the numerical value of the proof test value validate_hp that can be arranged at this vital values coupling is 11, when the verification function of initial setting is hpxorvalidate_hp=111, so 111 it is the validation value finally chosen, wherein, xor is different or computing. Certainly, when choosing different funtcional relationships as verification function, the proof test value of its correspondence is also had nothing in common with each other.
If needing game data is performed read operation, then two relevant variablees can be read, as the input of verification function (such as: carry out different or computing), and then the Output rusults of this verification function is verified (whether different the or result such as, the different or computing performed by the value of these two correlated variabless obtained equals the numerical value set in advance). If verification succeeds, then can assert that this game data is legal, it does not have illegally distorted; Otherwise, then can judge that game client exists the behavior of cheating, game data is illegally distorted.
Can selection of land, in step S3, it is determined that after game data has been tampered, it is also possible to comprise following operation:
Step S4: receive the steering order coming from server;
Step S5: again choose verification function according in multiple verification functions that steering order pre-sets from game client.
In another preferred embodiment provided by the present invention, it is possible to pre-set multiple verification function in the program code in game client, then, one of them verification function of random selection after mobile phone games client terminal is installed. Once after verification mechanism is cracked, it is possible to trigger client terminal by the mode of server sending controling instruction and reselect new verification function, so that the achievement that cracks previously obtained lost efficacy as early as possible.
The technical scheme that the embodiment of the present invention provides can detect whether game client exists cheating simply, efficiently, it is to increase game data performs the difficulty of cheating operation on the client. In addition, the proof test value of stochastic generation and the verification function chosen at random can strengthen the cheating difficulty of game client further. In addition, when allowing networking, can also by changing verification function under the steering order that issues at server so that the achievement that cracks previously obtained lost efficacy as early as possible, it is highly suitable in mobile phone games client terminal and applies, simultaneously under the applied environment of weak networking, it is also possible to as the remedial measures after game data is cracked.
Can selection of land, in step S104, after current value is verified, it is also possible to comprise the following steps:
Step S6: judge whether the first internal memory address place writes renewal numerical value;
Step S7: if it does, then while current value being replaced for renewal numerical value, verification value set is updated to and the proof test value set upgrading values match.
When game data is performed write operation by needs time, above-mentioned two relevant variablees can be upgraded simultaneously, namely the variable simultaneously upgrading the variable storing current value and the corresponding proof test value of storage is (such as, seeking the different or value of the numerical value after renewal and validation value, its result is the value after verification variable update). The crucial part of multiaddress protection is: be difficult to based on the internal memory scanning tools provided in correlation technique navigate to the variable storing proof test value; if after only using cheating instrument to have modified current game data; the proof test value mated with current game data also together can not be upgraded simultaneously; so, just can detect that client terminal has carried out cheating operation very soon.
Fig. 2 is the structure block diagram of the checking aparatus of game data according to embodiments of the present invention. As shown in Figure 2, the checking aparatus of this game data can comprise: acquisition module 10, for obtaining the current value of game data from the first internal memory address, and obtains the proof test value set mated with current value from one or more 2nd internal memory address; Verification module 20, for using input parameter as verification function of current value and proof test value set, or, by current value, current value, as the input parameter of verification function, is verified by proof test value set and predetermined constant.
In preferred implementation process, the generating mode of each proof test value in proof test value set comprises one of following:
Mode one, install after game client at mobile terminal, each proof test value in stochastic generation proof test value set;
Mode two, to server initial request messages, and by request message obtain server stochastic generation proof test value set in each proof test value.
Can selection of land, Fig. 3 is the structure block diagram of the checking aparatus of game data according to the preferred embodiment of the invention. As shown in Figure 3, verification module 20 can comprise: acquiring unit 200, for using input parameter as verification function of current value and proof test value set, or, by current value, proof test value set and predetermined constant, as the input parameter of verification function, obtain the checking result of verification function; First determining unit 202, for when the checking result got is identical with the check results preset, it is determined that game data is not tampered; 2nd determining unit 204, for when the checking result got is different from the check results preset, it is determined that game data is tampered.
Can selection of land, as shown in Figure 3, said apparatus can also comprise: receiver module 30, for receiving the steering order coming from server; Choose module 40, again choose verification function in multiple verification functions of pre-setting from game client according to steering order.
Can selection of land, as shown in Figure 3, said apparatus can also comprise: judges module 50, for judging whether the first internal memory address place writes renewal numerical value; More new module 60, for when judging that module exports as being, while current value being replaced as renewal numerical value, being updated to verification value set and the proof test value set upgrading values match.
Above-mentioned embodiment of the present invention sequence number, just to describing, does not represent the quality of embodiment.
In the above embodiment of the present invention, the description of each embodiment is all emphasized particularly on different fields, certain embodiment there is no the part described in detail, it is possible to see the associated description of other embodiments.
In several embodiments that the application provides, it should be appreciated that, disclosed technology contents, realizes by other mode. Wherein, device embodiment described above is only schematic, the such as division of described unit, can be that a kind of logic function divides, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or does not perform. Another point, shown or discussed coupling each other or directly coupling or communication connection can be the indirect coupling by some interfaces, unit or module or communication connection, it is possible to be electrical or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or can also be distributed on multiple unit. Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to is that the independent physics of each unit exists, it is also possible to two or more unit are in a unit integrated. Above-mentioned integrated unit both can adopt the form of hardware to realize, it is also possible to adopts the form of software functional unit to realize.
If described integrated unit realize using the form of software functional unit and as independent production marketing or when using, it is possible to be stored in a computer read/write memory medium. Based on such understanding, the technical scheme of the present invention in essence or says that part prior art contributed or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage media, comprises some instructions with so that computer equipment (can be Personal Computer, server or the network equipment etc.) performs all or part of step of method described in each embodiment of the present invention. And aforesaid storage media comprises: USB flash disk, read-only storage (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), portable hard drive, magnetic disc or CD etc. various can be program code stored medium.
The above is only the preferred embodiment of the present invention; it is noted that for those skilled in the art, under the premise without departing from the principles of the invention; can also making some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. the verification method of a game data, it is characterised in that, comprising:
Obtain the current value of game data from the first internal memory address, and from one or more 2nd internal memory address, obtain the proof test value set mated with described current value;
Using input parameter as verification function of described current value and described proof test value set, or, by described current value, described current value, as the input parameter verifying function, be verified by described proof test value set and predetermined constant.
2. method according to claim 1, it is characterized in that, using input parameter as verification function of described current value and described proof test value set, or, by described current value, described current value, as the input parameter of verification function, is carried out verification and comprises by described proof test value set and predetermined constant:
Using described input parameter as verification function of described current value and described proof test value set, or, by described current value, described proof test value set and predetermined constant, as the described input parameter verifying function, obtain the checking result of described verification function;
If the checking result got is identical with the check results preset, it is determined that described game data is not tampered;
If described in the checking result that gets different from described default check results, it is determined that described game data is tampered.
3. method according to claim 2, it is characterised in that, after determining that described game data has been tampered, also comprise:
Receive the steering order coming from server;
Again verification function is chosen according in multiple verification functions that described steering order pre-sets from game client.
4. method according to claim 1, it is characterised in that, the generating mode of each proof test value in described proof test value set comprises one of following:
After mobile terminal installs game client, each proof test value in proof test value set described in stochastic generation;
To server initial request messages, and obtained each proof test value in the described proof test value set of described server stochastic generation by described request message.
5. method according to claim 1, it is characterised in that, after described current value is verified, also comprise:
Judge whether described first internal memory address place writes renewal numerical value;
If it does, then while described current value is replaced as described renewal numerical value, described proof test value set is updated to and the proof test value set of described renewal values match.
6. the checking aparatus of a game data, it is characterised in that, comprising:
Acquisition module, for obtaining the current value of game data from the first internal memory address, and obtains the proof test value set mated with described current value from one or more 2nd internal memory address;
Verification module, for using input parameter as verification function of described current value and described proof test value set, or, by described current value, described current value, as the input parameter verifying function, be verified by described proof test value set and predetermined constant.
7. device according to claim 6, it is characterised in that, described verification module comprises:
Acquiring unit, for using described input parameter as verification function of described current value and described proof test value set, or, by described current value, described proof test value set and predetermined constant, as the described input parameter of verification function, obtain the checking result of described verification function;
First determining unit, for when the checking result got is identical with the check results preset, it is determined that described game data is not tampered;
2nd determining unit, for when the described checking result got is different from described default check results, it is determined that described game data is tampered.
8. device according to claim 7, it is characterised in that, described device also comprises:
Receiver module, for receiving the steering order coming from server;
Choose module, again choose verification function in multiple verification functions of pre-setting from game client according to described steering order.
9. device according to claim 6, it is characterised in that, the generating mode of each proof test value in described proof test value set comprises one of following:
After mobile terminal installs game client, each proof test value in proof test value set described in stochastic generation;
To server initial request messages, and obtained each proof test value in the described proof test value set of described server stochastic generation by described request message.
10. device according to claim 6, it is characterised in that, described device also comprises:
Judge module, for judging whether described first internal memory address place writes renewal numerical value;
More new module, for described judge that module exports as being time, described current value is being replaced as while described renewal numerical value, described proof test value set being updated to and the proof test value set of described renewal values match.
CN201511004169.5A 2015-12-28 2015-12-28 The method of calibration and device of game data Active CN105641930B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511004169.5A CN105641930B (en) 2015-12-28 2015-12-28 The method of calibration and device of game data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511004169.5A CN105641930B (en) 2015-12-28 2015-12-28 The method of calibration and device of game data

Publications (2)

Publication Number Publication Date
CN105641930A true CN105641930A (en) 2016-06-08
CN105641930B CN105641930B (en) 2019-05-14

Family

ID=56477027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511004169.5A Active CN105641930B (en) 2015-12-28 2015-12-28 The method of calibration and device of game data

Country Status (1)

Country Link
CN (1) CN105641930B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108479061A (en) * 2018-03-29 2018-09-04 腾讯科技(深圳)有限公司 Operation data method of calibration, device, storage medium and the server of application
CN110237535A (en) * 2019-06-03 2019-09-17 北京金山安全软件有限公司 Game data verification method and device, electronic equipment and storage medium
CN110520860A (en) * 2017-01-26 2019-11-29 泰雷兹数字安全法国股份有限公司 Method for securing software code
CN110574028A (en) * 2017-01-26 2019-12-13 泰雷兹数字安全法国股份有限公司 method for securing software code
CN111068315A (en) * 2019-12-12 2020-04-28 珠海豹趣科技有限公司 Method and device for positioning frame synchronization problem and electronic equipment
CN111569434A (en) * 2020-05-14 2020-08-25 宁波元素人网络科技有限公司 Game code checking method and system
CN111786746A (en) * 2020-07-03 2020-10-16 珠海金山网络游戏科技有限公司 Data packet checking method and device
WO2024093419A1 (en) * 2022-11-04 2024-05-10 腾讯科技(深圳)有限公司 Game data verification method and apparatus, device, computer-readable storage medium, and computer program product

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1282438A (en) * 1997-09-02 2001-01-31 奎克索提克解决方案公司 Apparatus and process for verifying honest gaming transactions over communications network
US20050065943A1 (en) * 2003-07-10 2005-03-24 Sony Corporation Data management apparatus, data management method and computer program
CN101067831A (en) * 2007-05-30 2007-11-07 珠海市西山居软件有限公司 Apparatus and method for preventing player from transaction swindling in network games
US20130263255A1 (en) * 2012-03-27 2013-10-03 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1282438A (en) * 1997-09-02 2001-01-31 奎克索提克解决方案公司 Apparatus and process for verifying honest gaming transactions over communications network
US20050065943A1 (en) * 2003-07-10 2005-03-24 Sony Corporation Data management apparatus, data management method and computer program
CN101067831A (en) * 2007-05-30 2007-11-07 珠海市西山居软件有限公司 Apparatus and method for preventing player from transaction swindling in network games
US20130263255A1 (en) * 2012-03-27 2013-10-03 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110520860A (en) * 2017-01-26 2019-11-29 泰雷兹数字安全法国股份有限公司 Method for securing software code
CN110574028A (en) * 2017-01-26 2019-12-13 泰雷兹数字安全法国股份有限公司 method for securing software code
CN110574028B (en) * 2017-01-26 2023-05-23 泰雷兹数字安全法国股份有限公司 Method for protecting software code
CN110520860B (en) * 2017-01-26 2023-08-08 泰雷兹数字安全法国股份有限公司 Method for protecting software code
CN108479061A (en) * 2018-03-29 2018-09-04 腾讯科技(深圳)有限公司 Operation data method of calibration, device, storage medium and the server of application
CN108479061B (en) * 2018-03-29 2021-06-01 腾讯科技(深圳)有限公司 Application running data verification method and device, storage medium and server
CN110237535A (en) * 2019-06-03 2019-09-17 北京金山安全软件有限公司 Game data verification method and device, electronic equipment and storage medium
CN111068315A (en) * 2019-12-12 2020-04-28 珠海豹趣科技有限公司 Method and device for positioning frame synchronization problem and electronic equipment
CN111569434A (en) * 2020-05-14 2020-08-25 宁波元素人网络科技有限公司 Game code checking method and system
CN111569434B (en) * 2020-05-14 2023-12-15 宁波元素人网络科技有限公司 Game code verification method and system
CN111786746A (en) * 2020-07-03 2020-10-16 珠海金山网络游戏科技有限公司 Data packet checking method and device
WO2024093419A1 (en) * 2022-11-04 2024-05-10 腾讯科技(深圳)有限公司 Game data verification method and apparatus, device, computer-readable storage medium, and computer program product

Also Published As

Publication number Publication date
CN105641930B (en) 2019-05-14

Similar Documents

Publication Publication Date Title
CN105641930A (en) Game data calibrating method and device
US20190236250A1 (en) Method for generating a human likeness score
CN109918892B (en) Verification code generation method and device, storage medium and computer equipment
US7971243B2 (en) Security module
AU2019219791A1 (en) Systems and methods for gamification of a problem
EP2270737A1 (en) Methods and systems for dynamic servicing of advertisements in a game or virtual reality environment
CN105339947B (en) Protect anti-malware process
JP2009059303A (en) Access control device, access control method, and access control program
US11819764B2 (en) In-game resource surfacing platform
CN105233499B (en) A kind of method and game client, system of game identification code verification
CN104065666B (en) A kind of method and device for generating picture validation code
CN105100242B (en) A kind of data processing method and system
CN106921969A (en) Terminal authenticity verification method, apparatus and system
CN107451819A (en) A kind of auth method and device based on user's operation behavior feature
CN110135850A (en) A kind of information processing method and relevant apparatus
CN109343912A (en) Online contest method, device and server
US20240108990A1 (en) Fraud detection system
CN110535874A (en) A kind of network attack detecting method and system of antagonism network
US20240181343A1 (en) System and method for individual player and team simulation
US10881965B2 (en) Detecting and identifying unauthorized accounts in online environments
Shao et al. An empirical evaluation of llms for solving offensive security challenges
CN110795706B (en) Hash-based verification method, equipment, storage medium and device
US11458406B2 (en) Progressive human user detection challenges with rewards
CN108319444A (en) Based on music drumbeat control terminal vibrating method, storage device and computer equipment
CN108256891A (en) The method and apparatus that a kind of advertising display template to web advertisement is tested

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant