×

Method, apparatus, and system of detecting unauthorized data modification

  • US 9,633,227 B2
  • Filed: 08/04/2014
  • Issued: 04/25/2017
  • Est. Priority Date: 07/29/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method of detecting unauthorized data modification implemented on a game client, the game client is installed on a computing device and executed by one or more processors of the computing device, comprising:

  • monitoring, by the game client, data updating events for to-be-updated game data;

    determining, by the game client, whether the to-be-updated game data need security detection;

    updating, by a game logic module of the game client, the to-be-updated game data normally when a detecting module of the game client determines that the to-be-updated game data do not need the security detection;

    when the to-be-updated game data needs the security detection, acquiring, by the game client, data for detection, wherein the data for detection is the to-be-updated game data that needs the security detection;

    determining whether the data for detection are to be updated for a first time by searching for a historical update record corresponding to the data for detection or searching for an updated data corresponding to the data for detection, wherein when the historical update record or the updated data exists, the data for detection are determined not to be updated for the first time; and

    when the historical update record or the updated data does not exist, the data for detection are determined to be updated for the first time; and

    when the data for detection are to be updated for the first time,updating the data for detection,obtaining the updated data for detection,encrypting the updated data for detection to provide first encrypted data, andstoring the first encrypted data;

    orwhen the data for detection are not to be updated for the first time,acquiring an original value of the data for detection,encrypting the original value to provide second encrypted data,acquiring the stored first encrypted data, anddetermining that the data for detection have been unauthorizedly modified, after determining that the second encrypted data do not equal to the first encrypted data.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×