CN-121971862-A - Game module operation method and device based on illusion engine
Abstract
The application provides a game module running method and a game module running device based on a fantasy engine, wherein the game module running method based on the fantasy engine comprises the steps of responding to a game module reading request initiated by the fantasy engine, calling a decryption plug-in written in a target game, calling a decryption key in an external tool based on the decryption plug-in, dynamically intercepting a game module data stream read by the fantasy engine based on the decryption plug-in, decrypting the game module data stream based on the decryption key to obtain a plaintext resource, and returning the plaintext resource to the fantasy engine for running a game module. The encryption module is guaranteed to be deeply matched with the illusion engine on the premise that the core source code of the illusion engine is not required to be modified, copyright safety of the module is guaranteed, running stability and smoothness of the module are guaranteed, the encryption module is applicable to various games based on the illusion engine and derived modules thereof, and various scenes such as client games, server games and VR/AR interactive contents are covered.
Inventors
- Request for anonymity
- Request for anonymity
Assignees
- 成都明耀成科技有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20260109
Claims (10)
- 1. A game module operation method based on a illusion engine is characterized by comprising the following steps: Responding to a game module reading request initiated by the illusion engine, and calling a decryption plug-in written in the target game; invoking a decryption key in an external tool based on the decryption plug-in; Dynamically intercepting the game module data stream read by the illusion engine based on the decryption plug-in unit, and decrypting the game module data stream based on the decryption key to obtain a plaintext resource; and returning the plaintext resources to the illusion engine to run the game module.
- 2. The method of claim 1, wherein the step of invoking the decryption plug-in written in the target game in response to the game module read request initiated by the illusion engine comprises: the developer of the game module encrypts the game module and inputs the decryption key into the developer end of the external tool; When the user of the game module obtains the use right of the game module, the decryption key is disclosed at the user end of the external tool.
- 3. The method of claim 2, wherein the encrypting the game module by the developer of the game module comprises: extracting metadata of the game module; and carrying out layered encryption on the unencrypted game modules by using a symmetric encryption algorithm based on the multiple groups of keys dynamically generated by the metadata to generate the game modules in the form of encrypted packets.
- 4. A method according to claim 3, wherein the dynamically generated sets of keys based on the metadata comprises: constructing basic parameters based on version numbers, adaptive game versions and developer identifications in the metadata, and dynamically expanding the basic parameters into at least three groups of subkeys through a random number generation algorithm; and processing all the sub-keys by adopting an operator combination mode to generate the encryption key.
- 5. The method of claim 2, wherein the decryption key is disclosed at a user side of the external tool, comprising: The external tool reads the hardware characteristic information to be verified of the user side; and when the target hardware characteristic information provided by the user who acquires the use right is consistent with the hardware characteristic information to be verified, reading the decryption key from the developer side of the external tool to the user side.
- 6. The method of claim 5, wherein the target hardware feature information includes at least two of a CPU serial number, a hard disk serial number, and a network card MAC address, and the decryption key at the user side has an authorization deadline parameter, a binding device number parameter, and a function module authority parameter corresponding thereto.
- 7. The method of claim 6, wherein the invoking the decryption key in the external tool based on the decryption plug-in comprises: Inquiring the authorization period parameter, the binding equipment quantity parameter and the function module authority parameter associated with the decryption key in the user side of the external tool; and when all verification of the authorization deadline parameter, the number of bound devices parameter and the authority parameter association of the functional module is passed, the decryption key is called.
- 8. A fantasy engine-based game module running apparatus comprising: The response module is configured to respond to a game module reading request initiated by the illusion engine and call a decryption plug-in written in the target game; a calling module configured to call a decryption key in an external tool based on the decryption plug-in; the decryption module is configured to dynamically intercept the game module data stream read by the illusion engine based on the decryption plug-in, and decrypt the game module data stream based on the decryption key to obtain a plaintext resource; and the operation module is configured to return the plaintext resources to the illusion engine for operation of the game module.
- 9. A computing device, comprising: A memory and a processor; The memory is configured to store computer executable instructions and the processor is configured to execute the steps of the computer executable instructions to implement the fantasy engine based game module operating method of any one of claims 1 to 7.
- 10. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the fantasy engine based game module operating method of any one of claims 1 to 7.
Description
Game module operation method and device based on illusion engine Technical Field The application relates to the technical field of computer software, in particular to a game module running method based on a fantasy engine. The application also relates to a game module running device based on the illusion engine, a computing device and a computer readable storage medium. Background The illusion engine (Unreal Engine, abbreviated as UE) is used as a global leading real-time 3D authoring platform, and by virtue of its strong graphics rendering capability, flexible modular architecture, perfect development tool chain and cross-platform adaptation characteristics, has been widely applied to multiple fields such as host game, PC-side game, mobile-side game, virtual Reality (VR), augmented Reality (AR), digital twinning, etc. The game module (Mod, collectively referred to as Modification) is complementary game content generated by expanding and modifying a development tool or a custom script provided by the illusion engine based on the basic framework and functions of the original game by a third party developer or player. The method has wide functional coverage range, including but not limited to adding new game roles, expanding scenario checkpoints, optimizing game core mechanisms, adding new special effect resources, adjusting game parameter balance and the like, and becomes a core element for enriching game content ecology, prolonging game life cycle and improving player user viscosity. With the rapid development of the ecology of the illusion engine module, the copyright protection and legal orderly operation of the module become the focus of attention. On one hand, the open source characteristic of the illusion engine and the relative openness of the module file format lead to that most modules are extremely easy to be illegally cracked, copied, tampered or secondarily distributed by adopting a plaintext storage or simple encryption mode, so that the intellectual property and economic benefit of module developers are seriously damaged, on the other hand, the conventional module encryption and operation scheme is mostly a general software solution, the resource loading mechanism, the memory management architecture and the operation logic of the illusion engine are not subjected to deep adaptation, so that the encrypted module and the illusion engine are poor in compatibility, the problems of module loading failure, game operation clamping, breakdown and the like are easy to occur, the game experience of players is seriously influenced, and meanwhile, the conventional scheme lacks a perfect authorization management mechanism, cannot realize the precise control of the application range, the service life and the application equipment of the module, and further aggravates the difficulty of copyright protection. Disclosure of Invention In view of the above, the embodiments of the present application provide a game module running method based on a fantasy engine, so as to solve the technical defects existing in the prior art. The embodiment of the application also provides a game module running device based on the illusion engine, a computing device and a computer readable storage medium. According to a first aspect of an embodiment of the present application, there is provided a game module operation method based on a fantasy engine, including: Responding to a game module reading request initiated by the illusion engine, and calling a decryption plug-in written in the target game; invoking a decryption key in an external tool based on the decryption plug-in; Dynamically intercepting the game module data stream read by the illusion engine based on the decryption plug-in unit, and decrypting the game module data stream based on the decryption key to obtain a plaintext resource; and returning the plaintext resources to the illusion engine to run the game module. Optionally, before the response to the game module read request initiated by the illusion engine invokes the decryption plug-in written in the target game, the method includes: the developer of the game module encrypts the game module and inputs the decryption key into the developer end of the external tool; When the user of the game module obtains the use right of the game module, the decryption key is disclosed at the user end of the external tool. Optionally, the developer of the game module encrypts the game module, including: extracting metadata of the game module; and carrying out layered encryption on the unencrypted game modules by using a symmetric encryption algorithm based on the multiple groups of keys dynamically generated by the metadata to generate the game modules in the form of encrypted packets. Optionally, the dynamically generated multiple sets of keys based on the metadata includes: constructing basic parameters based on version numbers, adaptive game versions and developer identifications in the metadata, and dynamically expanding the ba