Invalidating network devices with illicit peripherals
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
A63F-009/24
G06F-017/00
출원번호
US-0415881
(2006-05-01)
등록번호
US-8771061
(2014-07-08)
발명자
/ 주소
Harris, Adam P.
Schneider, Steve C.
출원인 / 주소
Sony Computer Entertainment America LLC
대리인 / 주소
Lewis Roca Rothgerber LLP
인용정보
피인용 횟수 :
3인용 특허 :
56
초록▼
A system and method for passively validating network game users is provided. Data indicative of game behavior and actions at one or more nodes interacting with a network game in a network game community are monitored. The data is evaluated to determine whether the one or more nodes are adhering to o
A system and method for passively validating network game users is provided. Data indicative of game behavior and actions at one or more nodes interacting with a network game in a network game community are monitored. The data is evaluated to determine whether the one or more nodes are adhering to one or more rules associated with the network game. Data indicative of illicit game behavior may trigger various responses including invalidation of the node engaged in the illicit behavior. Alternatively, a query may be generated to further identify the nature and/or actual existence of illicit behavior at the node. Monitoring of game data may occur at a server, a peer, as part of a peer group or combinations thereof, which may be based on routine schedule or part of constant game behavior monitoring.
대표청구항▼
1. A method for validating devices in a network, the method comprising: receiving at a server, data from one or more devices interacting with another device in a network, wherein the data is generated and sent to the server by the one or more devices as a part of network interaction;passively monito
1. A method for validating devices in a network, the method comprising: receiving at a server, data from one or more devices interacting with another device in a network, wherein the data is generated and sent to the server by the one or more devices as a part of network interaction;passively monitoring the data received from the one or more devices at the server, wherein passive monitoring does not require the one or more devices to execute instructions specifically for validation;determining that a device from the one or more devices does not adhere to one or more rules associated with the network interaction based on an evaluation of the received data by a software application hosted and executed at the server;querying the device for device status data, the device status data including information regarding any peripherals associated with the device; andinvalidating the device for further network interaction based on the use of an illicit peripheral as indicated by the device status data. 2. The method of claim 1, further comprising retrieving the one or more rules from a rules library. 3. The method of claim 2, further comprising generating the one or more rules based on previous observations of the network interaction prior to retrieving the one or more rules from the rules library. 4. The method of claim 1, wherein the received data comprises network interaction information transmitted from a first client device to a second client device, the first and second client device each belonging to the one or more devices interacting with another device in the network. 5. The method of claim 4, wherein the received data comprises network interaction information transmitted from the first client device to the server device prior to the information being transmitted to the second client device. 6. An apparatus for validating devices in a network, the apparatus comprising: a network interface configured to receive network data from one or more devices interacting with another device in a network, wherein the network data is generated and sent to the server by the one or more devices as part of network interaction;a monitoring module executable by a processor to passively monitor the data received from the one or more devices, wherein passive monitoring does not require the one or more devices to execute instructions specifically for validation; andan analysis engine in communication with the monitoring module, the analysis engine executable by a processor to: determine that a device from the one or more devices does not adhere to one or more rules associated with the network interaction based on an evaluation of the network data, andinvalidating the device for further network interaction based on use of an illicit peripheral as indicated by device status data. 7. The apparatus of claim 6, further comprising a query engine in communication with the analysis engine, the query engine executable by a processor to generate and send a query to the device for the device status data, the device status data including information regarding any peripherals associated with the device. 8. The apparatus of claim 6, wherein the network data comprises information transmitted from a first network device to the apparatus prior to being transmitted to a second network device, the first and second network devices each belonging to the one or more devices interacting with another device in the network. 9. A non-transitory computer-readable storage medium having embodied thereon a program, the program being executable by a computer to perform a method for validating devices in a network, the method comprising: receiving data from one or more devices interacting with another device in a network, wherein the data is generated and sent to a server by the one or more devices as part of network interaction;passively monitoring the data received from the one or more devices, wherein passive monitoring does not require the one or more devices to execute instructions specifically for validation;determining that a device from the one or more devices does not adhere to one or more rules associated with the network interaction based on an evaluation of the received data;querying the device for device status data, the device status data including information regarding any peripherals associated with the device; andinvalidating the device for further network interaction based on the use of an illicit peripheral as indicated by the device status data. 10. The non-transitory computer-readable storage medium of claim 9, wherein the data from the one or more devices is evaluated continuously. 11. The non-transitory computer-readable storage medium of claim 9, wherein the data from the one or more devices is evaluated periodically. 12. The non-transitory computer-readable storage medium of claim 9, wherein the received data comprises validation data generated by the one or more devices as part of the network interaction. 13. The method of claim 1, wherein the received data comprises validation data generated by the one or more devices as part of the network interaction. 14. The apparatus of claim 6, wherein the received network data comprises validation data generated by the one or more devices as part of the network interaction.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (56)
Harris,Adam P.; Schneider,Steve C., Active validation of network devices.
Zintel, William Michael, Auto-configuring of peripheral on host/peripheral computing platform with peer networking-to-host/peripheral adapter for peer networking connectivity.
Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L.; Wheeler, Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
Sirer, Emin Gun; Bershad, Brian N., Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties.
Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
Aleksey, Russell M., Method, device, and computer-readable medium for wagering on a skills-based digital gaming competition with an out-of-game peer wagering module.
Aleksey, Russell M., Method, device, and computer-readable medium for wagering on a skills-based digital gaming competition with an out-of-game peer wagering module.
Aleksey, Russell M., Method, device, and computer-readable medium for wagering on a skills-based digital gaming competition with an out-of-game peer wagering module.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.