Generating rules for maintaining community integrity
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
A63F-009/24
G06F-017/00
출원번호
US-0098470
(2011-05-01)
등록번호
US-8715072
(2014-05-06)
발명자
/ 주소
Harris, Adam P.
Schneider, Steve C.
출원인 / 주소
Sony Computer Entertainment America LLC
대리인 / 주소
Lewis Roca Rothgerber LLP
인용정보
피인용 횟수 :
9인용 특허 :
54
초록▼
Various metrics as may be deployed in an active, passive, or hybrid validation architecture are disclosed. A computing device configured to monitor network game activity may identify an inconsistency between user game data and a particular game metric governing a particular aspect of the network gam
Various metrics as may be deployed in an active, passive, or hybrid validation architecture are disclosed. A computing device configured to monitor network game activity may identify an inconsistency between user game data and a particular game metric governing a particular aspect of the network gaming environment. Upon identification of an inconsistency between game data and a game metric, which may indicative of illicit game play, a validation process (e.g., active, passive, and/or hybrid) may be implemented to further confirm the existence of illicit game. Alternatively, an action to maintain integrity of the gaming community may be executed without further confirmation whereby a purportedly illicit game device may be ejected from the network.
대표청구항▼
1. A method for maintaining community integrity in a gaming network, the method comprising: generating a plurality of rules for a game title, where each rule is defined as meeting a set of prerequisite parameters prior to achieving a game status, wherein failure to meet the set of prerequisite param
1. A method for maintaining community integrity in a gaming network, the method comprising: generating a plurality of rules for a game title, where each rule is defined as meeting a set of prerequisite parameters prior to achieving a game status, wherein failure to meet the set of prerequisite parameters prior to achieving the game status is associated with cheating;storing the plurality of rules in memory, each rule defining fair game play for the game title;receiving gameplay data sent over a communication network regarding a user of a monitored device interacting with the game title in the gaming network, the received gameplay data including an observed game status;executing instructions stored in the memory, wherein execution of the instructions by a processor: determines that the received gameplay data includes indicia that one or more of the rules stored in memory has been violated, wherein the set of prerequisite parameters associated with the observed game status is not met;automatically generates a query to the monitored device, wherein an invalid response to the query verifies that the indicia in the received gameplay data from the monitored device are associated with cheating under the stored rules;updates a cheating watch list stored in the memory regarding the verified cheating by the monitored device; andidentifying a percentage of a plurality of other players comprising a community of peers in the gaming network that validates the monitored device, wherein continued gameplay by the monitored device is permitted based on the percentage of validating peers meeting a predetermined percentage, and wherein failure to meet the predetermined percentage results in continued identification of the user as a cheater. 2. The method of claim 1, wherein prohibiting continued gameplay by the monitored device comprises prohibiting the monitored device from connecting to a community game server or to a peer in the community. 3. The method of claim 2, wherein a time of the prohibition is based on a number of previous instances of verified cheating. 4. The method of claim 1, wherein identifying the user as a cheater includes pausing real-time gameplay in the gaming network until a position of a character associated with the user in the gaming environment meets the set of prerequisite parameters associated with the observed game status in accordance with the rules stored in the memory. 5. The method of claim 1, wherein identifying the user as a cheater includes highlighting the user in a gaming lobby. 6. The method of claim 1, further comprising notifying the user associated with the monitored device that an activity of the user has been associated with cheating. 7. The method of claim 6, wherein notifying the user includes identifying the activity as a violation of a community code of conduct or end-user agreement associated with accessing the gaming network. 8. The method of claim 6, wherein notifying the user includes warning the user that the user will be banned from the gaming network if the user continues to engage in the activity deemed cheating. 9. The method of claim 1, further comprising prohibiting the monitored device associated with the user identified as a cheater from entering into gameplay with another user who is not associated with cheating. 10. The method of claim 1 further comprising instituting at least one retributive action in a gaming session against the user identified as a cheater. 11. The method of claim 1, wherein querying the monitored device includes detection of a processor thread. 12. The method of claim 1, wherein querying the monitored device includes requesting information regarding the monitored device, the information including an address and memory size of the monitored device. 13. A system for maintaining community integrity in a gaming network, the system comprising: a rules generator stored in memory and executable by a processor to generate a plurality of rules for a game title, where each rule is defined as meeting a set of prerequisite parameters prior to achieving a game status, wherein failure to meet the set of prerequisite parameters prior to achieving the game status is associated with cheatinga rules library in the memory for storing the plurality of rules, each rule defining fair game play for the game title;a communication interface for receiving gameplay data sent over a communication network regarding a user of a monitored device interacting with the game title, the received gameplay data including an observed game status;an analysis engine stored in the memory and executable by the processor to determine that the received gameplay data includes indicia that one or more of the rules stored in the memory has been violated, wherein the set of prerequisite parameters associated with the observed game status is not met;a query engine stored in the memory and executable by the processor to automatically generate a query to the monitored device, wherein an invalid response to the query verifies that the indicia in the received gameplay data from the monitored device are associated with cheating under the stored rules; anda community maintenance module stored in the memory and executable by the processor to update a cheating watch list regarding the verified cheating by the monitored device, and to identify a percentage of a community of peers in the gaming network that validates the monitored device, wherein continued gameplay by the monitored device is permitted based on the percentage of validating peers meeting a predetermined percentage, and wherein failure to meet the predetermined percentage results in continued identification of the user as a cheater. 14. The system of claim 13, wherein the rules generator generates each rule defining fair game play based on observations of interactions with the game title in the gaming network and associating the observed interactions with the set of prerequisite parameters. 15. The system of claim 13, wherein the community maintenance module is executable to eject the monitored device associated with the user identified as a cheater from connecting to a community of peers associated with the gaming network. 16. The system of claim 15, wherein the community maintenance module is executable to deliver a disconnect message to the monitored device associated with the user identified as a cheater. 17. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a computer processor to perform a method for maintaining community integrity in a gaming network, the method comprising: generating a plurality of rules for a game title, where each rule is defined as meeting a set of prerequisite parameters prior to achieving a game status, wherein failure to meet the set of prerequisite parameters prior to achieving the game status is associated with cheating;storing the plurality of rules, each rule defining fair game play for the game title;receiving gameplay data regarding a user of a monitored device interacting with the game title in the gaming network, the received gameplay data including an observed game status;determining that the received gameplay data includes indicia that one or more of the stored rules has been violated, wherein the set of prerequisite parameters associated with the observed game status is not met;automatically generating a query to the monitored device to verify, wherein an invalid response to the query verifies that the indicia in the received gameplay data from the monitored device are associated with cheating under the stored rules;updating a cheating watch list regarding the verified cheating; andidentifying a percentage of a community of peers in the gaming network that validates the monitored device, wherein continued gameplay by the monitored device is permitted based on the percentage of validating peers meeting a predetermined percentage, and wherein failure to meet the predetermined percentage results in continued identification of the user as a cheater. 18. A method for generating a rule for maintaining community integrity in a gaming network, the method comprising: receiving gameplay data sent over a communication network from a plurality of players interacting with a game title in the gaming network, the data for each player including an observed game status and one or more parameters associated with the observed game status;executing instructions stored in memory, wherein execution of the instructions by a processor: determines that the one or more parameters are prerequisite to the observed game status; andgenerates a rule that defines fair game play for the game title as meeting the one or more parameters prior to achieving the observed game status, wherein failure to meet the one or more parameters prior to achieving the observed game status is associated with cheating;storing the rule in the memory, wherein subsequent gameplay data for the game title is evaluated to identify indicia that the stored rule has been violated by one of the players; andidentifying a percentage of a plurality of other players comprising a community of peers in the gaming network that validates the monitored device, wherein continued gameplay by the monitored device is permitted based on the percentage of validating peers meeting a predetermined percentage, and wherein failure to meet the predetermined percentage results in continued identification of the user of the monitored device as a cheater. 19. A non-transitory computer-readable storage medium, having embodied thereon a program executable by a processor to perform a method for generating a rule for maintaining community integrity in a gaming network, the method comprising: receiving gameplay data of a plurality of players interacting with a game title in the gaming network, the data of each player including an observed game status and one or more parameters associated with the observed game status;determining that the one or more game parameters are prerequisite to the observed game status;generating a rule that defines fair game play for the game title as meeting the one or more parameters prior to achieving the observed game status, wherein failure to meet the one or more parameters prior to achieving the observed game status is associated with cheating; andstoring the rule in memory, wherein subsequent gameplay data for the game title is evaluated to identify indicia that the stored rule has been violated by one of the players; andidentifying a percentage of a plurality of other players comprising a community of peers in the gaming network that validates the monitored device, wherein continued gameplay by the monitored device is permitted based on the percentage of validating peers meeting a predetermined percentage, and wherein failure to meet the predetermined percentage results in continued identification of a user of the monitored device as a cheater.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (54)
Harris,Adam P.; Schneider,Steve C., Active validation of network devices.
Zintel, William Michael, Auto-configuring of peripheral on host/peripheral computing platform with peer networking-to-host/peripheral adapter for peer networking connectivity.
Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L.; Wheeler, Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
Sirer, Emin Gun; Bershad, Brian N., Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties.
Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.