In recent days, through access to large amounts of data, finally draws the conclusion, to the UPK resource file encryption / decryption is difficult to achieve, at least I have no way, because it involves the resources it is necessary to consider the decryption and encryption, UDK not open source is very difficult in the UPK calling module write decryption layer, in the beginning I imagine some the method to implement it, such as the use of Usrcipt, because I don't know much about it so at the outset to give up, so I thought of another way, since UDK can not realize the encrypted UPK decryption work that we can't help it to decrypt and then decrypted UPK directly through the file stream through a external program (FileStream) is introduced into the memory, calls for UDK, but in the end because of many reasons to give up.
A decryption think of this problem for a long time, no fruit, come back to think of me in the verification system based on UDK game do, this system is actually a input through a user information to confirm whether the network game player has to buy game validation program, if the game player input serial number and game player system information, and in the server query to, so it can make the game.
In addition, in order to prevent the game player skip verification directly run the UDK executable file to the game so it is encrypted, including the original UDK game executable file encryption (also uses FileStream, the decrypted executable file to execute memory after) think of this, I suddenly had a good methods to realize the decrypted UPK file:
Since cannot write the encryption layer in the UPK calling module, so we might as well put the encryption layer written in the verification system.
If the game player through user authentication for the UPK encryption, decryption after the completion of the game executable decrypted, finally run the program, because the UPK file is decrypted, this UPK will be exposed to the game player's sight, so it is not safe, we should take the initiative, so verification system will enter a cycle state detection, real-time detection of game player clipboards, programs running in the background, once the problem is found to stop the game, and remove the UPK, and send the information to the server, the other verification system will start another two background tray, detect verifying whether the system is attacked or strong kill, and trigger the corresponding response.
Through this system scheme can realize user authentication, encryption / decryption function of resources, and provides a feasible scheme for the domestic independent game some small cost to use UDK payment.
In addition, we can combine the actual supplement and spit on some problems in the solution.
A decryption think of this problem for a long time, no fruit, come back to think of me in the verification system based on UDK game do, this system is actually a input through a user information to confirm whether the network game player has to buy game validation program, if the game player input serial number and game player system information, and in the server query to, so it can make the game.
In addition, in order to prevent the game player skip verification directly run the UDK executable file to the game so it is encrypted, including the original UDK game executable file encryption (also uses FileStream, the decrypted executable file to execute memory after) think of this, I suddenly had a good methods to realize the decrypted UPK file:
Since cannot write the encryption layer in the UPK calling module, so we might as well put the encryption layer written in the verification system.
If the game player through user authentication for the UPK encryption, decryption after the completion of the game executable decrypted, finally run the program, because the UPK file is decrypted, this UPK will be exposed to the game player's sight, so it is not safe, we should take the initiative, so verification system will enter a cycle state detection, real-time detection of game player clipboards, programs running in the background, once the problem is found to stop the game, and remove the UPK, and send the information to the server, the other verification system will start another two background tray, detect verifying whether the system is attacked or strong kill, and trigger the corresponding response.
Through this system scheme can realize user authentication, encryption / decryption function of resources, and provides a feasible scheme for the domestic independent game some small cost to use UDK payment.
In addition, we can combine the actual supplement and spit on some problems in the solution.