Method for Authentication of Game Executing Authority Recording Medium for Storing Authentication Program of Game Executing Authority, and Server for Storing Authentication Program of Game Executing Authority

ABSTRACT

Disclosed is a method for authentication of a game executing authority. The invention is implemented by steps of requesting a transmission of a decoding key for decoding a coded execution file for executing a game to an authentication server; decoding the coded execution file by the decoding key received from the authentication server to generate the execution file; hashing an obtained present time and a random data together to generate hashed data; encrypting the present time, the random data, and the hashed data by any fixing key to generate the coded data; transmitting the generated coded data as a parameter to the execution file; and confirming whether a hashed value obtained by hashing the present time and the random data, which are obtained by decoding the coded data by the fixing key, matches the hashed data.

BACKGROUND OF THE INVENTION

This application claims priority to Korean Patent Application No. 10-2009-0036185, filed on Apr. 24, 2009, in the Korean Intellectual Property Office, the entire contents of which are hereby incorporated by reference.

1. Field of the Invention

The present invention relates to a method for authentication of a game executing authority, a recording medium for storing an authentication program of a game executing authority, and a server for storing an authentication program of a game executing authority. More specifically, the present invention relates to a method for authentication of a game executing authority that fundamentally interrupts the execution of a game by a user other than an authorized user, a recording medium for storing an authentication program of game executing authority, and a server for storing an authentication program of a game executing authority.

2. Description of the Related Art

As the use of online games using Internet increases, problems of an illegal use of others' IDs for an online game, a theft of cyber property on the game due to the illegal use, and the like are being raised.

The user authentication of the known Internet online game has been made by an input of a user ID and a password. However, this method has a problem in that the user ID and the password can be easily stolen on the network. Further, this method has a problem in that the user ID and the password can be illegally used by observing an input process of other people.

Moreover, in order to improve these problems, a method of receiving a separate execution file for executing a game from an authentication server by performing a separate use authentication process also has a problem in that the corresponding file may be illegally duplicated such that other users can execute the game using it.

SUMMARY OF THE INVENTION

Therefore, it is an object of the present invention to provide a method for authentication of a game executing authority that fundamentally interrupts the execution of a game by a user other than an authorized user, a recording medium for storing an authentication program of a game executing authority, and a server for storing an authentication program of a game executing authority.

In order to achieve the object, there is provided a method for authentication of a game executing authority according to the present invention comprising: (a) requesting a transmission of a decoding key for decoding a coded execution file for executing a game to an authentication server; (b) decoding the coded execution file by the decoding key received from the authentication server to generate the execution file; (c) hashing an obtained present time and a random data together to generate hashed data; (d) encrypting the present time, the random data, and the hashed data by any fixing key to generate the coded data; (e) transmitting the generated coded data as a parameter to the execution file; and (f) confirming whether a hashed value obtained by hashing the present time and the random data, which are obtained by decoding the coded data by the fixing key, matches the hashed data.

Preferably, the method for authentication of a game executing authority further comprises cancelling the execution of the game when the hashed value does not match the hashed data.

In addition, the method for authentication of a game executing authority may further comprise calculating a time difference between the obtained present time and the present time obtained again when the hashed value matches the hashed data.

Moreover, the method for authentication of a game executing authority may further comprise executing the game by the execution file when the calculated time difference is below 1 second.

In addition, the method for authentication of a game executing authority may further comprise cancelling the execution of the game when the calculated time difference is 1 second or more.

Also, the method for authentication of a game executing authority may further comprise deleting the execution file when the game is executed by the execution file.

Meanwhile, a recording medium according to the present invention may be stored with a game executing authority authorization program that executes the respective steps.

Also, a server according to the present invention may be stored with the authentication program of game executing authority that executes the respective steps.

BRIEF DESCRIPTION OF THE DRAWINGS

These and other objects, features, aspects, and advantages of the present invention will be more fully described in the following detailed description of preferred embodiments and examples, taken in conjunction with the accompanying drawings. In the drawings:

FIG. 1 is a diagram showing a configuration of a system for authentication of a game executing authority according to the present invention; and

FIG. 2 is a process flowchart for describing a method for authentication of a game executing authority according to the present invention.

DETAILED DESCRIPTION OF THE INVENTION

Hereinafter, preferred embodiments of the present invention will be described in detail with reference to the accompanying drawings. It should be noted that like reference numerals refer to like components throughout the drawings. In addition, the detailed description of a related known function or configuration that may make the purpose of the present invention unnecessarily ambiguous in describing the present invention will be omitted.

FIG. 1 is a diagram showing a configuration of a system for authentication of a game executing authority according to the present invention. Referring to FIG. 1, the system for authentication of a game executing authority according to the present invention includes a game executing apparatus 100 and an authentication server 200.

The game executing apparatus 100 is an apparatus for executing the user desired game and is generally a personal PC including a network communication function. The game executing apparatus 100 performs a function of authenticating the executing authority through communication with the authentication server 200.

In detail, the game executing apparatus 100 is installed with an authentication program of a game executing authority that executes a method for authentication of a game executing authority according to the present invention. In performing the present invention, the corresponding program may be installed using a separate CD or may be installed by being transmitted from the authentication server 200.

The authentication server 200 transmits a decoding key for a coded execution file necessary for executing a game to the game executing apparatus 100 by a request from the game executing apparatus 100. In performing the present invention, the authentication server 200 stores the authentication program of a game executing authority according to the present invention and may transmit the corresponding program to the game executing apparatus 100 according to the transmission request of the game executing apparatus 100.

FIG. 2 is a process flowchart for describing the method for authentication of a game executing authority according to the present invention. The method for authentication of a game executing authority according to the present invention will be described with reference to FIGS. 1 and 2. The game executing apparatus 100 is connected to the authentication server 200 and requests the transmission of the decoding key necessary for executing a game (S300).

Herein, the decoding key is a key necessary for decoding the coded execution file stored in the game executing apparatus 100 and the coded execution file is an execution file necessary for executing the user desired game that is installed in the game executing apparatus 100 and means the coded execution file by the corresponding decoding key.

The coded execution file may be installed in the game execution apparatus 100 when the corresponding game is installed in the game execution apparatus 100. Further, the coded execution file is transmitted from the authentication server 200 separately from the installation of the corresponding game and may be installed in the game executing apparatus 100.

Meanwhile, when the authentication server 200 receives the transmission request of the decoding key from the game executing apparatus 100, it performs the authentication process of the corresponding user through the user ID connected to the authentication server 200 and then transmits the decoding key to the game executing apparatus 100.

Thereby, the game executing apparatus 100 receives the decoding key from the authentication server 200 (S305) and decodes the foregoing coded execution file by using the corresponding received decoding key to generate the execution file (S310).

Then, the game executing apparatus 100 obtains a present time (PT) measured in the game execution apparatus 100 and generates random data (RT) through a random number generating module (S315) and hashes the obtained present time and the generated random data by using a one-way hashed function to generate predetermined hashed data (S320).

Thereafter, the game executing apparatus 100 encrypts the current time and the random data at the foregoing step S315 and the hashed data generated at the foregoing step S320 by any fixing key to generate the coded data (S325).

As such, the generated coded data is transmitted as a parameter to the execution file generated at the foregoing step S310 (S330).

The game executing apparatus 100 according to the present invention performs the authentication processes of two steps as follows, prior to executing the game by using the execution file.

First Authentication Process

First, the game executing apparatus 100 decodes the coded data, which is coded and generated by any fixing key at the foregoing step S325, by using the corresponding fixing key and obtains the present time and the random data at the foregoing step S315 and the hashed data generated at the foregoing step S320 (S335).

Next, the game executing apparatus 100 hashes the present time and the random data obtained at the foregoing step 5335 again by using the one-way hashed function to generate a hashed value (HV) (S340) and confirms whether the generated hashed value matches the hashed data obtained at the foregoing step S335 (S345).

Meanwhile, in performing the present invention, when the authentication program of a game executing authority according to the present invention is transmitted from the authentication server 200 to the game executing apparatus 100, it is preferable that the foregoing fixing key and one-way hashed function are transmitted together and it is preferable that the authentication server 200 transmits different fixing keys for each user and the one-way hashed function to the game executing apparatus 100.

When the execution file generated at the foregoing step S310 and the coded data generated at the foregoing step S325 are illegally duplicated by the game executing apparatuses 100 of other users, the game executing apparatuses 100 of other users in which the illegally duplicated execution file and the coded data are stored does not include the foregoing fixing key and the one-way hashed function, such that it is determined that the confirmation result of matching or not at the foregoing step S345 is not matched. In this case, the execution of the corresponding game is cancelled (S350).

However, when the foregoing steps S300 to S345 are performed in one game executing apparatus 100, it will be confirmed that the corresponding hashed value and the hashed data are matched to each other at the foregoing step S345. In this case, a second authentication process will be performed below.

Second Authentication Process

When it is confirmed that the corresponding hashed value and the hashed data are matched to each other at the foregoing step S345, the game executing apparatus 100 calculates a time difference between the present time obtained at the foregoing step S335 and the present time obtained again and determines whether the calculated time difference is below 1 second (S355).

When the calculated time difference is below 1 second, the corresponding game is executed by the execution file at the foregoing step S330 (S360) and after the game is executed, it is preferable that the execution file at the foregoing step S330 is deleted (S365).

If the execution file generated at the foregoing step S310 and the coded data generated at the foregoing step S325 are illegally duplicated by the game executing apparatuses 100 of other users, when considering a time necessary for the illegal duplication, it is apparent that the difference between the present time recognized by the game executing apparatuses 100 of other users and the present time obtained at the foregoing step S335 is at least 1 second or more. When the calculated time difference as described above is 1 second or more, the execution of the corresponding game is cancelled (S350).

With the present invention, the execution of the game by a user other than an authorized user can be fundamentally interrupted.

While the present invention has been described with reference to the preferred embodiments, it will be understood by those skilled in the related art that various modifications and variations may be made therein without departing from the scope of the present invention as defined by the appended claims. 

1. A method for authentication of a game executing authority comprising: (a) requesting a transmission of a decoding key for decoding a coded execution file for executing a game to an authentication server; (b) decoding the coded execution file by the decoding key received from the authentication server to generate the coded execution file; (c) hashing an obtained present time and a random data together to generate hashed data; (d) encrypting the obtained present time, the random data, and the hashed data by any fixing key to generate a coded data; (e) transmitting the coded data as a parameter to the coded execution file; and (f) confirming whether a hashed value obtained by hashing the obtained present time and the random data, which are obtained by decoding the coded data by the fixing key, matches the hashed data.
 2. The method for authentication of a game executing authority according to claim 1, further comprising cancelling an execution of the game when the hashed value does not match the hashed data.
 3. The method for authentication of a game executing authority according to claim 1, further comprising calculating a time difference between the obtained present time and the obtained present time obtained again when the hashed value matches the hashed data.
 4. The method for authentication of a game executing authority according to claim 3, further comprising executing the game by the coded execution file when a calculated time difference is below 1 second.
 5. The method for authentication of a game executing authority according to claim 3, further comprising cancelling an execution of the game when a calculated time difference is 1 second or more.
 6. The method for authentication of a game executing authority according to claim 4, further comprising deleting the coded execution file when the game is executed by the coded execution file.
 7. A recording medium stored with a game executing authority authorization program that executes the respective steps in claim
 1. 8. A server stored with an authentication program of game executing authority that executes the respective steps in claim
 1. 