Defining new rules for validation of network devices
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
G06F-017/30
A63F-013/30
A63F-013/98
A63F-013/20
출원번호
US-0149545
(2014-01-07)
등록번호
US-8972364
(2015-03-03)
발명자
/ 주소
Harris, Adam P.
Schneider, Steve C.
출원인 / 주소
Sony Computer Entertainment America LLC
대리인 / 주소
Lewis Roca Rothgerber LLP
인용정보
피인용 횟수 :
5인용 특허 :
56
초록▼
A system and method for actively validating a network device is provided. Nodes in a network game community are prompted to engage in interrogation and response to facilitate the identification of nodes operating with hacked, modified and non-typical game configurations. In one embodiment, a query i
A system and method for actively validating a network device is provided. Nodes in a network game community are prompted to engage in interrogation and response to facilitate the identification of nodes operating with hacked, modified and non-typical game configurations. In one embodiment, a query is presented to a user's machine which triggers a response, and where the response indicates whether certain data at the user is valid and wherein invalid data is suggestive of illegal community behavior. Functions are triggered and data is queried to determine whether the state of game environment is operating according to known metrics or constraints.
대표청구항▼
1. A method for validating devices in a gaming network, the method comprising: maintaining in memory game play history for each of a plurality of game players in the gaming network, wherein each game player is assigned to a list of trustworthy game players or a list of cheating game players based on
1. A method for validating devices in a gaming network, the method comprising: maintaining in memory game play history for each of a plurality of game players in the gaming network, wherein each game player is assigned to a list of trustworthy game players or a list of cheating game players based on the stored game play history of the game player;sending one or more queries to one of the game players over a communication network, wherein each query is directed at gathering data regarding a game device associated with the game player; andexecuting instructions stored in memory, wherein execution of the instructions by a processor: updates the list of trustworthy game players or the list of cheating game players based on whether a valid query response has been received from the game player within the predetermined period of time, andadjusts timing of monitoring by a monitoring module of subsequent game play data from the game player, the adjustment based on whether the game player appears on the list of trustworthy game players or the list of cheating game players. 2. The method of claim 1, wherein the game device associated with the game player is one of a game console, a portable game device, laptop computing device, desktop computing device, or a cellular device. 3. The method of claim 1, wherein the list of trust-worthy game players corresponds to game players who have not been identified as having cheated or having performed unusual activity, wherein the list of cheating game players corresponds to game players who have been identified as having cheated or having performed unusual activity, and wherein definitions for cheating and unusual activity are provided for each network game and stored in memory. 4. The method of claim 1, wherein the one or more queries directed at gathering data corresponds to retrieving game play history of the game player stored at the game device for cheating or unusual activity performed by the game player as defined for the network game. 5. The method of claim 1, wherein a valid query response received from the game player within a predetermine period of time indicates that the game player is a trustworthy game player. 6. The method of claim 1, wherein no query response received from a game player within a predetermined period of time or a non-valid query response from a game player within a predetermined period of time indicates that the game player is a cheating game player. 7. The method of claim 6, further comprising retransmitting the same query request a pre-determined number of times to the same game player and determining that no response has been provided to any of the retransmissions before identifying the game player as a cheating game player. 8. The method of claim 6, further comprising retransmitting different query requests a pre-determined number of times to the same game player and determining that no response has been provided to any of the retransmissions before identifying the game player as a cheating game player. 9. The method of claim 1, wherein the predetermined period of time for a query response is based on at least one of an amount of traffic in the game network or the type of connection by the game console to the game network. 10. The method of claim 1, wherein the one or more queries directed at gathering data are triggered by one of a schedule, time table, when a new game player enters the network game or game network, or once a threshold number of game players have been reached. 11. The method of claim 1, further comprising sending a notification to a game player that they have been identified as having cheated or having performed an unusual activity. 12. The method of claim 11, further comprising sending a notification to the game player identified as having cheated or having performed an unusual activity that the game player is being ejected from the network game. 13. The method of claim 11, further comprising ejecting the game player from the network game. 14. The method of claim 1, further comprising denying the game player identified as having cheated or having performed an unusual activity access to the network game for a pre-determined amount of time. 15. The method of claim 1, further comprising denying the game player identified as having cheated or having performed an unusual activity access to the game network corresponding to the network game for a pre-determined amount of time.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (56)
Harris,Adam P.; Schneider,Steve C., Active validation of network devices.
Zintel, William Michael, Auto-configuring of peripheral on host/peripheral computing platform with peer networking-to-host/peripheral adapter for peer networking connectivity.
Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L.; Wheeler, Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
Sirer, Emin Gun; Bershad, Brian N., Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties.
Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.