Method, apparatus, and system of detecting unauthorized data modification
First Claim
1. A method of detecting unauthorized data modification implemented on a game client, the game client is installed on a computing device and executed by one or more processors of the computing device, comprising:
- monitoring, by the game client, data updating events for to-be-updated game data;
determining, by the game client, whether the to-be-updated game data need security detection;
updating, by a game logic module of the game client, the to-be-updated game data normally when a detecting module of the game client determines that the to-be-updated game data do not need the security detection;
when the to-be-updated game data needs the security detection, acquiring, by the game client, data for detection, wherein the data for detection is the to-be-updated game data that needs the security detection;
determining whether the data for detection are to be updated for a first time by searching for a historical update record corresponding to the data for detection or searching for an updated data corresponding to the data for detection, wherein when the historical update record or the updated data exists, the data for detection are determined not to be updated for the first time; and
when the historical update record or the updated data does not exist, the data for detection are determined to be updated for the first time; and
when the data for detection are to be updated for the first time,updating the data for detection,obtaining the updated data for detection,encrypting the updated data for detection to provide first encrypted data, andstoring the first encrypted data;
orwhen the data for detection are not to be updated for the first time,acquiring an original value of the data for detection,encrypting the original value to provide second encrypted data,acquiring the stored first encrypted data, anddetermining that the data for detection have been unauthorizedly modified, after determining that the second encrypted data do not equal to the first encrypted data.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, apparatus and system of detecting data security are provided herein. Data for detection are acquired. Whether the data for detection are to be updated for a first time is determined. When the data for detection are to be updated for the first time, the data for detection can be updated, encrypted, and stored as first encrypted data. When the data for detection are not to be updated for the first time, the data for detection can be acquired and encrypted to provide second encrypted data. The second encrypted data are compared with the stored first encrypted data to determine whether the second encrypted data having been unauthorizedly modified. The present disclosure is simple to be implemented without relying on specific logical of a certain application. Development costs, maintenance costs and occupancy of server resources can be reduced. System performance and user experience can be improved.
-
Citations
18 Claims
-
1. A method of detecting unauthorized data modification implemented on a game client, the game client is installed on a computing device and executed by one or more processors of the computing device, comprising:
-
monitoring, by the game client, data updating events for to-be-updated game data; determining, by the game client, whether the to-be-updated game data need security detection; updating, by a game logic module of the game client, the to-be-updated game data normally when a detecting module of the game client determines that the to-be-updated game data do not need the security detection; when the to-be-updated game data needs the security detection, acquiring, by the game client, data for detection, wherein the data for detection is the to-be-updated game data that needs the security detection; determining whether the data for detection are to be updated for a first time by searching for a historical update record corresponding to the data for detection or searching for an updated data corresponding to the data for detection, wherein when the historical update record or the updated data exists, the data for detection are determined not to be updated for the first time; and
when the historical update record or the updated data does not exist, the data for detection are determined to be updated for the first time; andwhen the data for detection are to be updated for the first time, updating the data for detection, obtaining the updated data for detection, encrypting the updated data for detection to provide first encrypted data, and storing the first encrypted data;
orwhen the data for detection are not to be updated for the first time, acquiring an original value of the data for detection, encrypting the original value to provide second encrypted data, acquiring the stored first encrypted data, and determining that the data for detection have been unauthorizedly modified, after determining that the second encrypted data do not equal to the first encrypted data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus of detecting unauthorized data modification, a game client is installed on the apparatus, comprising:
-
at least a hardware processor and a plurality of program units of the game client to be executed by the processor for detecting unauthorized data modification, the plurality of program units comprising; an acquiring unit configured to;
monitor data updating events for to-be-updated game data;
determine whether the to-be-updated game data need security detection; and
when the to-be-updated game data needs the security detection, acquire data for detection, wherein the data for detection is the to-be-updated game data that needs the security detection;a determining unit configured to determine whether the data for detection are to be updated for a first time by searching for a historical update record corresponding to the data for detection or searching for an updated data corresponding to the data for detection, wherein when the historical update record or the updated data exists, the determining unit determines that the data for detection are not to be updated for the first time; and
when the historical update record or the updated data does not exist, the determining unit determines that the data for detection is to be updated for the first time;a first processing unit configured, after determining that the data for detection are to be updated for the first time, to update the data for detection, to obtain the updated data for detection, to encrypt the updated data for detection to provide first encrypted data, and to save the first encrypted data; and a second processing unit configured, after determining that the data for detection are not to be updated for the first time, to acquire an original value of the data for detection, to encrypt the original value to provide second encrypted data, to acquire the stored first encrypted data, and to determine that the data for detection have been unauthorizedly modified, after determining that the second encrypted data do not equal to the first encrypted data; wherein the game client further includes a game logic module and a detecting module, the game logic module is configured to;
update the to-be-updated game data normally when the detecting module determines that the to-be-updated game data do not need the security detection. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
-
14. A non-transitory computer-readable medium having computer program of a game client for, when being executed by a processor, performing a method of detecting unauthorized data modification, the method comprising:
-
monitoring, by the game client, data updating events for to-be-updated game data; determining, by the game client, whether the to-be-updated game data need security detection; updating, by a game logic module of the game client, the to-be-updated game data normally when a detecting module of the game client determines that the to-be-updated game data do not need the security detection; when the to-be-updated game data needs the security detection, acquiring data for detection, wherein the data for detection is the to-be-updated game data that needs the security detection; determining whether the data for detection are to be updated for a first time by searching for a historical update record corresponding to the data for detection or searching for an updated data corresponding to the data for detection, wherein when the historical update record or the updated data exists, the data for detection are determined not to be updated for the first time; and
when the historical update record or the updated data does not exist, the data for detection are determined to be updated for the first time; andwhen the data for detection are to be updated for the first time, updating the data for detection, obtaining the updated data for detection, encrypting the updated data for detection to provide first encrypted data, and storing the first encrypted data;
orwhen the data for detection are not to be updated for the first time, acquiring an original value of the data for detection, encrypting the original value to provide second encrypted data, acquiring the stored first encrypted data, and determining that the data for detection have been unauthorizedly modified, after determining that the second encrypted data do not equal to the first encrypted data. - View Dependent Claims (15, 16, 17, 18)
-
Specification