Cloud game control method, system and device and computer readable storage medium

文档序号:1944492 发布日期:2021-12-10 浏览:18次 中文

阅读说明:本技术 一种云游戏控制方法、系统、装置及计算机可读存储介质 (Cloud game control method, system and device and computer readable storage medium ) 是由 王峰 游晶 于 2021-08-13 设计创作,主要内容包括:本申请公开了一种云游戏控制方法、系统、装置及计算机可读存储介质,该方法包括:获取到云游戏的操作指令;基于操作指令确定操作指令的触发方式;利用触发方式对应的控制器对操作指令进行处理。通过上述方式,能够对不同的操作指令施加不同程度的限制控制,从而实现对云游戏进程的精准控制。(The application discloses a cloud game control method, a system, a device and a computer readable storage medium, wherein the method comprises the following steps: acquiring an operation instruction of a cloud game; determining a triggering mode of the operation instruction based on the operation instruction; and processing the operation instruction by using the controller corresponding to the trigger mode. Through the mode, different degrees of limit control can be applied to different operation instructions, and therefore accurate control over the cloud game process is achieved.)

1. A cloud game control method is characterized by comprising the following steps:

acquiring an operation instruction of the cloud game;

determining a triggering mode of the operation instruction based on the operation instruction;

and processing the operation instruction by utilizing the controller corresponding to the trigger mode.

2. The cloud game control method according to claim 1, wherein the step of acquiring the operation instruction of the cloud game includes:

acquiring the operation instruction of the cloud game by using a sandbox module; wherein the sandbox module comprises a plurality of the controllers;

the step of processing the operation instruction by using the controller corresponding to the trigger mode includes:

and calling the corresponding controller in the sandbox module to process the operation instruction based on the triggering mode.

3. The cloud game control method according to any one of claims 1 or 2, wherein the step of processing the operation instruction by using the controller corresponding to the trigger mode further includes:

and utilizing the controller corresponding to the trigger mode to pass, modify or reject the operation instruction.

4. The cloud game control method according to claim 3, wherein the operation instruction includes any one of reading and writing a file, reading and writing a registry, starting and stopping a process, window control, and network access; the controller comprises a file/registry controller, and/or a subprocess controller, and/or a window controller, and/or a network access controller.

5. The cloud game control method according to claim 4, wherein when the operation instruction is the read-write file or the read-write registry, the step of processing the operation instruction by using the controller corresponding to the trigger mode further includes:

and calling the file/registry controller in the sandbox module based on the trigger mode to modify the source path of the operation instruction into the address of the sandbox space of the sandbox module, and preferentially reading the content in the sandbox space through the file/registry controller.

6. The cloud game control method according to claim 1, wherein the step of obtaining the operation instruction of the cloud game includes:

detecting whether the cloud game progresses;

in response to detecting the progress of the cloud game, implanting first code into the progress of the cloud game; wherein the first code comprises a path code of the sandbox module;

and running the first code to acquire the sandbox module through the path code.

7. The cloud game control method of claim 6, wherein the step of implanting a first code into the progress of the cloud game in response to detecting the progress of the cloud game comprises:

in response to detecting the progress of the cloud game, detecting whether there is progress of the cloud game needing to be controlled through a filter;

in response to the filter detecting the cloud game needing to be controlled, implanting the first code into the cloud game needing to be controlled.

8. A cloud gaming control system, comprising:

the acquisition module is used for acquiring an operation instruction of the cloud game;

the instruction determining module is used for determining a triggering mode of the operation instruction based on the operation instruction;

and the processing module is used for processing the operation instruction by utilizing the controller corresponding to the trigger mode.

9. A cloud game control apparatus, comprising:

a memory for storing program data which, when executed, implements the steps in the cloud game control method of any of claims 1 to 7;

a processor for executing the program instructions stored by the memory to implement the steps in the cloud game control method of any of claims 1 to 7.

10. A computer-readable storage medium, having a computer program stored thereon, which, when being executed by a processor, implements the steps of the cloud game control method according to any one of claims 1 to 7.

Technical Field

The present application relates to the field of network technologies, and in particular, to a cloud game control method, system, device, and computer-readable storage medium.

Background

The cloud game is that a game which is traditionally operated on a desktop client is operated on a cloud server, a user only sees a game picture returned by a cloud end, and control operation is transmitted to a cloud end service through a network.

Since the cloud game service is usually ported from the client to the cloud server, part of functions of programs in some games may access and modify the cloud server (for example, delete game files or download virus execution, etc.), thereby causing security holes in the cloud game service.

The prior art cloud game framework has two types, one is to run the game in the container, the other is to run the game in the virtual machine, however, since the container is mostly Linux container, and most of the game needs to run in Windows (microsoft) operating system, this results in that the container-based scheme is not feasible; the virtual machine also has many disadvantages, for example, performance is reduced due to hardware virtualization, and the virtual machine restoration also requires a minute unit of time to recover, and accurate control over the cloud game process cannot be achieved.

Disclosure of Invention

The technical problem mainly solved by the application is to provide a cloud game control method, a cloud game control system, a cloud game control device and a computer-readable storage medium, wherein the cloud game control method, the cloud game control system and the computer-readable storage medium are based on a triggering mode of an operation instruction of a cloud game, and the operation instruction is processed by using a controller corresponding to the triggering mode, so that the problem that accurate control over a cloud game process cannot be realized can be solved.

In order to solve the above technical problem, a first technical solution adopted by the present application is to provide a cloud game control method, including: acquiring an operation instruction of a cloud game; determining a triggering mode of the operation instruction based on the operation instruction; and processing the operation instruction by using the controller corresponding to the trigger mode.

The step of acquiring the operation instruction of the cloud game comprises the following steps: acquiring an operation instruction of the cloud game by using a sandbox module; wherein the sandbox module comprises a plurality of controllers; the method for processing the operation instruction by using the controller corresponding to the trigger mode comprises the following steps: and calling a corresponding controller in the sandbox module to process the operation instruction based on the triggering mode.

Wherein, the step of processing the operation instruction by using the controller corresponding to the triggering mode further comprises: and passing, modifying or rejecting the operation instruction by using the controller corresponding to the triggering mode.

The operation instruction comprises any one of reading and writing files, a reading and writing registry, a start-stop process, window control and network access; the controller includes a file/registry controller, and/or a sub-process controller, and/or a window controller, and/or a network access controller.

When the operation instruction is a read-write file or a read-write registry, the step of processing the operation instruction by using the controller corresponding to the trigger mode further comprises the following steps: and calling a file/registry controller in the sandbox module based on the trigger mode to modify the source path of the operation instruction into the address of the sandbox space of the sandbox module, and preferentially reading the content in the sandbox space through the file/registry controller.

Before the step of obtaining the operation instruction of the cloud game, the method comprises the following steps: detecting whether a cloud game process exists; in response to detecting the progress of the cloud game, implanting first code into the progress of the cloud game; wherein the first code comprises a path code of the sandbox module; and running the first code to acquire the sandbox module through the path code.

Wherein, in response to detecting the progress of the cloud game, the step of implanting the first code into the progress of the cloud game comprises: responding to the detected progress of the cloud game, and detecting whether the progress of the cloud game needing to be controlled exists or not through a filter; in response to the filter detecting the cloud game process requiring control, the first code is implanted into the cloud game process requiring control.

In order to solve the above technical problem, a second technical solution adopted by the present application is to provide a cloud game control system, including: the acquisition module is used for acquiring an operation instruction of the cloud game; the instruction determining module is used for determining a triggering mode of the operation instruction based on the operation instruction; and the processing module is used for processing the operation instruction by using the controller corresponding to the trigger mode.

In order to solve the above technical problem, a third technical solution adopted by the present application is to provide a cloud game control apparatus, including: a memory for storing program data, which when executed implements the steps in the cloud game control method as described in any one of the above; a processor for executing the program instructions stored by the memory to implement the steps in the cloud game control method as in any one of the above.

In order to solve the above technical problem, a fourth technical solution adopted by the present application is to provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps in the cloud game control method according to any one of the above descriptions are implemented.

The beneficial effect of this application is: different from the prior art, the application provides a cloud game control method, a cloud game control system, a cloud game control device and a computer-readable storage medium, based on a triggering mode of an operation instruction of a cloud game, the operation instruction is processed by using a controller corresponding to the triggering mode, and different operation instructions can be subjected to different degrees of limiting control, so that the accurate control of a cloud game process is realized; furthermore, by means of process level control, the damage to the operating system can be avoided from the source, the cost of damage and recovery is avoided, and the stability of the operating system is improved.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.

FIG. 1 is a schematic flow chart diagram illustrating an embodiment of a cloud game control method according to the present application;

FIG. 2 is a schematic flow chart diagram illustrating one embodiment of a cloud game control method of FIG. 1;

FIG. 3 is a schematic diagram of interaction between operating instructions and an operating system of a cloud game in the prior art;

FIG. 4 is a schematic diagram illustrating interaction between operating instructions and an operating system of a cloud game according to the present application;

FIG. 5 is a schematic flow chart of loading a sandbox module in the process of a cloud game according to the present application;

FIG. 6 is a flowchart illustrating one embodiment of step S52 of FIG. 5;

FIG. 7 is a flow chart illustrating the processing of operational instructions by the document/registry controller of the present application;

FIG. 8 is a schematic structural diagram of an embodiment of a cloud game control system according to the present application;

FIG. 9 is a schematic structural diagram of an embodiment of a cloud game control apparatus according to the present application;

FIG. 10 is a schematic structural diagram of an embodiment of a computer-readable storage medium according to the present application.

Detailed Description

The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

The terminology used in the embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the examples of this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise, the "plural" includes at least two in general, but does not exclude the presence of at least one.

It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.

It should be understood that the terms "comprises," "comprising," or any other variation thereof, as used herein, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

The cloud game framework in the prior art has two types, one is to run the game in a container, the other is to run the game in a virtual machine, however, as the container is mostly a Linux container, and most of the game needs to run in a Windows operating system, the container-based scheme is not feasible; the virtual machine also has many disadvantages, for example, performance is reduced due to hardware virtualization, and the virtual machine restoration also requires a minute unit of time to recover, and accurate control over the cloud game process cannot be achieved.

Based on the above situation, the present application provides a cloud game control method, system, device and computer-readable storage medium, which can solve the problem that accurate control of a cloud game process cannot be realized by processing an operation instruction with a controller corresponding to a trigger mode based on the trigger mode of the operation instruction of a cloud game.

Specifically, please refer to fig. 1, in which fig. 1 is a schematic flow chart of an embodiment of a cloud game control method according to the present application. As shown in fig. 1, in the present embodiment, the method includes:

s11: and acquiring an operation instruction of the cloud game.

In the embodiment, the cloud game is a game mode based on cloud computing, and in an operation mode of the cloud game, all games are operated at a cloud server side, and a rendered game picture is compressed and then transmitted to a user through a network. At the client, the user's gaming device does not require any high-end processor and graphics card, but only requires basic video decompression capability to run the game.

In this embodiment, the operation instruction includes any one of a read-write file, a read-write registry, a start-stop process, a window control, and a network access.

Reading and writing the file/registry comprises any one of adding, deleting, modifying and reading and writing the file/registry.

S12: and determining a triggering mode of the operation instruction based on the operation instruction.

In this embodiment, the triggering manner includes triggering through a window, triggering through a sub-process, triggering through a browser, and the like.

The window refers to a new operating environment in the microcomputer system, and the display screen of the microcomputer is divided into a plurality of frames, namely the windows. Each window is responsible for displaying and processing a certain type of information. The user can work on any window at will and exchange information between windows.

Wherein, triggering through the window refers to executing the operation instruction through the window.

Wherein a child process refers to a process created by another process (correspondingly referred to as a parent process). Specifically, when a program is started, a process is created by an Operating System (OS), and at the same time, a Thread, which is usually called a Main Thread (Main Thread) of the program and may also be called a parent process, runs immediately, because it is executed when the program starts, and if a Thread needs to be created again, the created Thread is a child Thread of the parent Thread. The process tree is a process relation representation method and comprises a parent process and a child process, and after some program processes are operated, other processes can be called, so that a process tree is formed.

The sub-process triggering means that a sub-process is directly drawn on a process tree by using a fork function (fork), that is, a sub-process to be operated can be directly generated by a code without a window, and an operation instruction is operated by the sub-process.

The browser refers to an application program for retrieving and presenting world wide web information resources, and the triggering by the browser refers to running an operation instruction through a webpage of the browser.

Specifically, if the operation instruction of the cloud game is to open a file from a game screen, that is, to open a screen presented by a window, the manner of triggering the operation instruction is to trigger through the window. If the operation instruction appears by knocking the code, namely drawing on the process tree directly, the triggering mode of the operation instruction is triggered by the subprocess. If the operation instruction is executed from a browser built in the game, for example, the operation instruction does not pass through a window through background operation, and a file is downloaded from the browser, the operation instruction is triggered through the browser.

S13: and processing the operation instruction by using the controller corresponding to the trigger mode.

In this embodiment, the controller includes a file/registry controller, and/or a sub-process controller, and/or a window controller, and/or a network access controller.

In this embodiment, processing the operation instruction includes passing, modifying, or rejecting the operation instruction.

Specifically, if an operation instruction is triggered through a window, the operation instruction is first passed, modified, or rejected through a window controller. If the operation instruction is triggered by the sub-process, the operation instruction is first passed, modified or rejected by the sub-process controller. If the operation instruction is triggered by the browser, the operation instruction is firstly passed, modified or rejected by the network access processor.

The controllers are independent of each other, but are crossed when some operation instructions are executed, so that accurate control over the operation instructions is realized.

In a specific implementation scenario, if an operation instruction for reading and writing a file is triggered through a window, a window controller is required to determine whether the operation instruction passes through the window, if the window controller passes through the operation instruction, the file/registry controller intercepts the operation instruction, and determines whether subsequent file reading and writing are performed according to the operation instruction through the file/registry controller; if the window controller rejects the operation instruction, the operation instruction is invalid and does not proceed to the step determined by the file/registry controller.

In another specific implementation scenario, if an operation instruction for reading and writing a file is triggered by a sub-process, the sub-process controller is required to determine whether to draw the process at the process level, and if the sub-process controller draws the sub-process through the operation instruction, the file/registry controller intercepts the operation instruction, and determines whether to perform subsequent file reading and writing according to the operation instruction through the file/registry controller; if the subprocess controller refuses the operation instruction, the subprocess corresponding to the operation instruction can not be created on the process tree and can not be judged by the file/registry controller.

In another specific implementation scenario, if an operation instruction for downloading a file is triggered by a browser, the network access controller first determines whether the operation instruction passes through the operation instruction, and if a policy for rejecting downloading the file is set in the network access controller, the network access controller directly rejects the operation instruction, so that the file is prevented from being downloaded to a disk of a cloud server, and then the possibility that an operating system is invaded by a virus is avoided.

Different from the prior art, the cloud game processing method is based on a triggering mode of the operation instruction of the cloud game, the operation instruction is processed by using the controller corresponding to the triggering mode, and different degrees of limit control can be applied to different operation instructions, so that the accurate control of the cloud game process is realized; furthermore, by means of process level control, the damage to the operating system can be avoided from the source, the cost of damage and recovery is avoided, and the stability of the operating system is improved.

Referring to fig. 2, fig. 2 is a flowchart illustrating an embodiment of a cloud game control method in fig. 1. As shown in fig. 2, in the present embodiment, the method for controlling an operation instruction of a cloud game by a sandbox module includes:

s21: acquiring an operation instruction of the cloud game by using a sandbox module; wherein the sandbox module includes a plurality of controllers.

In this embodiment, the operation instruction includes any one of a read-write file, a read-write registry, a start-stop process, a window control, and a network access.

Reading and writing the file/registry comprises any one of adding, deleting, modifying and reading and writing the file/registry.

In the prior art, when a game runs on a cloud server, an operation instruction in the game is directly interacted with an operating system of the cloud server, as shown in fig. 3, fig. 3 is an interaction diagram of the operation instruction and the operating system of the cloud game in the prior art. In this mode, part of the functions of some programs in the game can access and modify the cloud server, for example, delete game files or download virus execution, thereby causing security holes in the cloud game service.

Based on the above situation, the present embodiment utilizes the sandbox module to proxy the interaction between the operation command and the operating system in the game.

The sandbox module is a dll (dynamic link library) which is a program that runs in an isolated manner by creating a virtual disk, and processing various operation instructions in the sandbox module does not cause any damage to the operating system, for example, running and testing virus software in the sandbox module does not cause any damage to the main system, because all operations of the virus are restricted to a virtual area.

In this embodiment, the sandbox module includes a plurality of controllers. Wherein the controller comprises a file/registry controller, and/or a subprocess controller, and/or a window controller, and/or a network access controller.

The cloud game control method and the cloud game control system have the advantages that after the sandbox module is used for obtaining the operation instructions of the cloud game, the corresponding controller in the sandbox module is called, and various operation instructions in the cloud game can be processed.

Specifically, please refer to fig. 4, where fig. 4 is an interaction diagram of an operation instruction and an operation system of a cloud game in the present application. As shown in fig. 4, after the sandbox module is used to obtain the operation instruction of the cloud game, any operation instruction in the game must be proxied through the corresponding controller in the sandbox module before interacting with the operating system of the cloud server, so that the direct interaction between the operation instruction and the operating system is avoided, and the problem of security holes in the cloud game service is solved.

In this embodiment, the sandbox module is first loaded into the process of the cloud game. Specifically, please refer to fig. 5, where fig. 5 is a schematic flow diagram of loading a sandbox module in a cloud game process according to the present application. As shown in fig. 5, in the present embodiment, the method includes:

s51: whether the cloud game progresses is detected.

In this embodiment, whether a process ID (identification) of the cloud game exists in the global process is detected by a driver of the operating system global, and if the process ID of the cloud game exists, the process of the cloud game is detected.

The operating system global refers to the bottom layer level of the operating system, and is not limited.

Where process ID refers to a value that the kernel of the operating system uses to uniquely identify a process, this value can be used as a parameter for many function calls to make it possible to adjust process control behavior such as process priority, kill (command) process, etc.

S52: in response to detecting the progress of the cloud game, implanting first code into the progress of the cloud game; wherein the first code comprises a path code of the sandbox module.

The first code is a node code, the node code runs in a node.js environment, and the starting is carried out based on a node.js command.

Wherein, the path code of the first code including the sandbox module refers to the path code including the core code dll in the node code.

Specifically, referring to fig. 6, fig. 6 is a flowchart illustrating an embodiment of step S52 in fig. 5. As shown in fig. 6, in the present embodiment, in response to detecting the progress of the cloud game, the step of implanting the first code into the progress of the cloud game specifically includes:

s61: in response to detecting the progress of the cloud game, whether the progress of the cloud game needs to be controlled is detected through a filter.

In this embodiment, the sandbox module cannot be injected into all the processes of the cloud game in the global scope of the operating system, so that a filter needs to be arranged to detect the cloud game so as to screen out the processes of the cloud game which need to be controlled.

For example, a sandbox module is injected into the process of a cloud game through a core code dll, and the process of some cloud games is injected reversely, namely the process of the cloud game is the process of the cloud game which does not need to be controlled. For another example, if the user wants to control only a part of the cloud game, and the other part of the cloud game does not need to be controlled, the other part of the cloud game is the process of the cloud game that does not need to be controlled.

Specifically, the present embodiment sets the name of the process of the cloud game that needs to be controlled in the filter, so that the filter detects whether there is a process that satisfies the filtering condition among the processes of the running cloud game.

Where the name of a process refers to the name of the executable program that the process executes.

S62: in response to the filter detecting the cloud game process requiring control, the first code is implanted into the cloud game process requiring control.

In this embodiment, if the filter detects the name of the process of the cloud game that needs to be controlled, that is, the process of the cloud game that needs to be controlled is detected in response to the filter, and then the first code is implanted into the process of the cloud game that needs to be controlled.

S53: and running the first code to acquire the sandbox module through the path code.

In this embodiment, after the node code is run, the function of the sandbox module may be obtained by the path code of dll.

S22: and determining a triggering mode of the operation instruction based on the operation instruction.

In this embodiment, the triggering manner includes triggering through a window, triggering through a sub-process, triggering through a browser, and the like.

The window refers to a new operating environment in the microcomputer system, and the display screen of the microcomputer is divided into a plurality of frames, namely the windows. Each window is responsible for displaying and processing a certain type of information. The user can work on any window at will and exchange information between windows. Triggering through a window refers to executing an operation instruction through the window.

Wherein a child process refers to a process created by another process (correspondingly referred to as a parent process). Specifically, when a program is started, a process is created by an Operating System (OS), and at the same time, a Thread, which is usually called a Main Thread (Main Thread) of the program and may also be called a parent process, runs immediately, because it is executed when the program starts, and if a Thread needs to be created again, the created Thread is a child Thread of the parent Thread. The process tree is a process relation representation method and comprises a parent process and a child process, and after some program processes are operated, other processes can be called, so that a process tree is formed. The triggering through the subprocess means that a subprocess is directly drawn on a process tree by using a fork function (fork), namely, a subprocess needing to be operated can be directly generated through codes without a window, and an operation instruction is operated through the subprocess.

The browser refers to an application program for retrieving and presenting world wide web information resources, and the triggering by the browser refers to running an operation instruction through a webpage of the browser.

Specifically, if the operation instruction of the cloud game is to open a file from a game screen, that is, to open a screen presented by a window, the manner of triggering the operation instruction is to trigger through the window. If the operation instruction appears by knocking the code, namely drawing on the process tree directly, the triggering mode of the operation instruction is triggered by the subprocess. If the operation instruction is executed from a browser built in the game, for example, the operation instruction does not pass through a window through background operation, and a file is downloaded from the browser, the operation instruction is triggered through the browser.

In this embodiment, the sandbox module may coordinate transmission of the sample and the data, control execution of the sample and simulation of the host environment, capture an API (Application Programming Interface) call initiated by a specific process and parameters thereof as main targets, extract relevant kernel data maintained by the process and the operating system for the process and the operating system, and determine a trigger mode of an operation instruction based on the kernel data.

S23: and calling a corresponding controller in the sandbox module to process the operation instruction based on the triggering mode.

In this embodiment, processing the operation instruction includes passing, modifying, or rejecting the operation instruction.

Specifically, if an operation instruction is triggered through a window, the operation instruction is first passed, modified, or rejected through a window controller. If the operation instruction is triggered by the sub-process, the operation instruction is first passed, modified or rejected by the sub-process controller. If the operation instruction is triggered by the browser, the operation instruction is firstly passed, modified or rejected by the network access processor.

The controllers in the sandbox module are independent of each other, but cross connection exists when some operation instructions are executed, so that accurate control over the operation instructions is achieved.

In a specific implementation scenario, when the operation instruction is a read-write file or a read-write registry, if the operation instruction is triggered through a window, the window controller needs to determine whether the operation instruction passes through the window, and if the window controller passes through the operation instruction, the file/registry controller in the sandbox module is called to modify a source path of the operation instruction into an address of a sandbox space of the sandbox module, and the file/registry controller preferentially reads contents in the sandbox space. If the window controller rejects the operation instruction, the operation instruction is invalid and does not proceed to the step determined by the file/registry controller.

In another specific implementation scenario, when the operation instruction is a read-write file or a read-write registry, if the operation instruction is triggered by a sub-process, the sub-process controller first needs to determine whether to draw the process at a process level, and if the sub-process controller draws the sub-process through the operation instruction, the file/registry controller in the sandbox module is called to modify a source path of the operation instruction into an address of the sandbox space of the sandbox module, and the file/registry controller preferentially reads contents in the sandbox space. If the subprocess controller refuses the operation instruction, the subprocess corresponding to the operation instruction can not be created on the process tree and can not be judged by the file/registry controller.

Specifically, referring to fig. 7, fig. 7 is a schematic flow chart illustrating the processing of the operation command by the file/registry controller according to the present application. As shown in fig. 7, the File/Registry controller is a File/Registry controller, and adding/deleting/modifying refers to any one of adding, deleting, and modifying a File/Registry.

The method has the advantages that the source path of the operation instruction is modified into the address of the sandbox space of the sandbox module by calling the file/registry controller, so that when the file/registry controller intercepts the operation instruction for reading the file/registry, the content of the sandbox space can be read preferentially through the file/registry controller, and the content of the disk space can be read only if the sandbox space has no content, so that the read-write times of the disk in the physical machine where the cloud server is located can be reduced, and the service life of the real disk is protected.

Furthermore, when intercepting operation instructions such as addition, deletion and modification of the file/registry, the file/registry controller can forward execution objects of the operation instructions to the sandbox space, so that the content of the disk where the cloud server is located is not damaged.

Second, a rejection policy may also be set on the file/registry controller to reject certain path-wide file/registry modifications. For example, by configuring the strategy of rejection on the game platform, the user can be prevented from randomly downloading files such as trojans or modifying deleted files.

In this embodiment, the window controller, the subprocess controller, the net access controller, and the file/registry controller all have common characteristics, and can pass, modify, or reject the operation instruction according to the configured policy.

For example, when the configured policy is that the cloud game process cannot start the explorer.exe (file resource manager), no matter the trigger mode of the operation instruction is window trigger or sub-process trigger, the operation instruction is rejected at the corresponding window controller or sub-process controller, so as to prevent the user from destroying the disk file after entering the file resource manager. For another example, when the configured policy is that a browser cannot be started to enter a web page, no matter the trigger mode of the operation instruction is window trigger or sub-process trigger or browser trigger, the operation instruction is rejected at the corresponding window controller or sub-process controller or network access controller, so as to prevent the user from opening the browser to surf the internet. For another example, when the configured policy is that the user cannot access a specific website, any operation instruction for accessing the website may be denied through the corresponding controller.

In the prior art, sandbox software in a Windows environment is not common in the market. For example, Windows Sandbox, however, is incinerated after use, and cannot save data for the next use after being shut down, and the system must be reinstalled every time it is started, and no API is provided for service control. As another example, the sandbox software, its rationale is also to enforce security restrictions at the process level. However, the method focuses on security restriction on general software, is compatible with various generations of versions of Windows, and adopts a uniform security restriction policy, so that processes are restricted from running under users with the lowest authority (for example, any modification on files is prohibited or any file is prohibited from being downloaded), and a channel for communication among the processes is also restricted besides the modification restriction on a file registry.

Different from the prior art, the method and the device have the advantages that the sandbox module is used for obtaining the operation instruction of the cloud game, the corresponding controller in the sandbox module is called to process the operation instruction based on the triggering mode of the operation instruction of the cloud game, and different operation instructions can be subjected to different degrees of limiting control, so that the accurate control of the cloud game process is realized; furthermore, by means of process level control, the damage to the operating system can be avoided from the source, the cost of damage and recovery is avoided, and the stability of the operating system is improved. In addition, compared with performance reduction caused by hardware virtualization in the virtual machine, the sandbox module and the physical machine at the cloud server end share hardware resources, hardware performance loss is low, and the service life of the physical machine is protected.

Correspondingly, the application provides a cloud game control system.

Referring to fig. 8, fig. 8 is a schematic structural diagram of an embodiment of a cloud game control system according to the present application. As shown in fig. 8, in the present embodiment, the cloud game control system 80 includes an acquisition module 81, an instruction determination module 82, and a processing module 83.

The obtaining module 81 is configured to obtain an operation instruction of the cloud game.

And the instruction determining module 82 is used for determining a triggering mode of the operation instruction based on the operation instruction.

And the processing module 83 is configured to process the operation instruction by using the controller corresponding to the trigger mode.

Please refer to the relevant text descriptions in steps S11 to S13, steps S21 to S23, steps S51 to S53, and steps S61 to S62 for the process of acquiring the operation command, determining the trigger mode of the operation command, and processing the operation command by using the controller corresponding to the trigger mode, which is not described herein again.

Different from the prior art, in the embodiment, the operation instruction of the cloud game is acquired through the acquisition module 81, the trigger mode of the operation instruction is determined through the instruction determination module 82, and finally the processing module 83 is used for calling the controller corresponding to the trigger mode to process the operation instruction, so that different operation instructions can be subjected to different degrees of limiting control, and the accurate control on the process of the cloud game is realized; furthermore, by means of process level control, the damage to the operating system can be avoided from the source, the cost of damage and recovery is avoided, and the stability of the operating system is improved.

Correspondingly, the application provides a cloud game control device.

Referring to fig. 9, fig. 9 is a schematic structural diagram of an embodiment of a cloud game control apparatus according to the present application. As shown in fig. 9, in the present embodiment, the cloud game control device 90 includes a memory 91 and a processor 92.

In this embodiment, the memory 91 is used for storing program data, and the program data realizes the steps of the cloud game control method according to any one of the above-described embodiments when executed; the processor 92 is configured to execute the program instructions stored in the memory 91 to implement the steps of the cloud game control method according to any one of the above-mentioned descriptions.

Specifically, the processor 92 is configured to control itself and the memory 91 to implement the steps of any of the cloud game control methods described above. The processor 92 may also be referred to as a CPU (Central Processing Unit). The processor 92 may be an integrated circuit chip having signal processing capabilities. The Processor 92 may also be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. In addition, the processor 92 may be commonly implemented by a plurality of integrated circuit chips.

Different from the prior art, in the embodiment, the operation instruction of the cloud game is acquired through the processor 92, and based on the trigger mode of the operation instruction of the cloud game, the operation instruction is processed by using the controller corresponding to the trigger mode, so that different operation instructions can be subjected to different degrees of limit control, and the accurate control of the cloud game process is realized; furthermore, by means of process level control, the damage to the operating system can be avoided from the source, the cost of damage and recovery is avoided, and the stability of the operating system is improved.

Accordingly, the present application provides a computer-readable storage medium.

Referring to fig. 10, fig. 10 is a schematic structural diagram of an embodiment of a computer-readable storage medium according to the present application.

The computer-readable storage medium 100 includes a computer program 1001 stored on the computer-readable storage medium 100, and the computer program 1001, when executed by the processor, implements the steps in the cloud game control method according to any one of the above.

In particular, the integrated unit, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer readable storage medium 100. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a computer-readable storage medium 100 and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method of the embodiments of the present application. And the aforementioned computer-readable storage medium 100 includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a module or a unit is merely a logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some interfaces, and may be in an electrical, mechanical or other form.

Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the embodiment.

In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.

The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application or are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

17页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:游戏任务的分配方法及装置、存储介质、电子装置

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!

技术分类