Font Size: a A A

The Research And Application Of Online Game Virtual Items’ Security Protecitng System

Posted on:2013-04-25Degree:MasterType:Thesis
Country:ChinaCandidate:W Q CaiFull Text:PDF
GTID:2248330374976534Subject:E-commerce project
Abstract/Summary:PDF Full Text Request
The paper focuses on Massively Multiplayer Role-Playing Games. Through analyzingthe existing online games and some related researches, we find that there are mainly twosecurity problems: the first one is some malicious players win advantages over others in thegame by cheating; the second one is the hackers or malicious users attack and theft theaccount and make the virtual items in the account their own. The latter brings direct loss tothe users and online game operators.Based on the online game virtual items’ theft and cheat, the paper proposes an onlinegame virtual items protecting system from two aspects: account authentication and itemauthentication. In order to solve the problem of social engineering, phishing and cheatingacross platforms, the paper proposes a user-centric identity authentication model. With thebasis of OpenID protocol, OAuth protocol and PKI system, the new identity authenticationmodel realizes authoritative authentication and mutual authentication which can preventphishing and malicious platforms. Besides, the proposed identity authentication modelguarantees the separation of user identity data and game application data and realizes theauthorization and use of user resources across different platforms. In order to solve theproblem of modifying and using virtual items in the game, the paper analyzes different virtualitems’ security attributes and needs, proposes a new virtual currency security solution basedon Blind Signature and a new virtual equipment security solution based on Directed Signatureand Proxy Signature respectively. The virtual currency and virtual equipment solutions realizeauthoritative issuing, legal transaction and payment. What’s more, it guarantees theverification of virtual currency and virtual equipment’s legitimacy and validity.Finally, the paper researches the application process of the proposed online game virtualitem protecting system based on account authentication and item authentication. And from thecomparative analysis of the proposed model, existing application security methods and otherresearches’ protecting methods, it comes to the conclusion: the proposed security model hasimproved the online game’s account authentication and proposed a security virtual item’sauthentication and verification method. Though there are still some deficiencies in theproposed security method, the research of the paper can give some ideas and suggestions for constructing reliable environment of online game, protecting users’ interests inside the gameand solving the security problems in online game.
Keywords/Search Tags:Online Games, Virtual Items, Identity Authentication, Item Authentication
PDF Full Text Request
Related items