Invalidating network devices with illicit peripherals
원문보기
IPC분류정보
국가/구분
United States(US) Patent
등록
국제특허분류(IPC7판)
A63F-009/24
A63F-013/73
A63F-013/77
A63F-013/71
A63F-013/31
출원번호
US-0313553
(2014-06-24)
등록번호
US-9717992
(2017-08-01)
발명자
/ 주소
Harris, Adam P.
Schneider, Steve C.
출원인 / 주소
SONY INTERACTIVE ENTERTAINMENT AMERICA LLC
대리인 / 주소
Polsinelli LLP
인용정보
피인용 횟수 :
2인용 특허 :
58
초록▼
A system and method for passively validating network game users is provided. Data indicative of game behavior and actions at one or more nodes interacting with a network game in a network game community are monitored. The data is evaluated to determine whether the one or more nodes are adhering to o
A system and method for passively validating network game users is provided. Data indicative of game behavior and actions at one or more nodes interacting with a network game in a network game community are monitored. The data is evaluated to determine whether the one or more nodes are adhering to one or more rules associated with the network game. Data indicative of illicit game behavior may trigger various responses including invalidation of the node engaged in the illicit behavior. Alternatively, a query may be generated to further identify the nature and/or actual existence of illicit behavior at the node. Monitoring of game data may occur at a server, a peer, as part of a peer group or combinations thereof, which may be based on routine schedule or part of constant game behavior monitoring.
대표청구항▼
1. A method for validating use of peripheral devices in a network, the method comprising: storing information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are
1. A method for validating use of peripheral devices in a network, the method comprising: storing information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicit;receiving data at a server, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network, and wherein each computing device includes one or more peripheral devices;monitoring the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices;comparing the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices;identifying that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device; andinvalidating the identified computing device from further network interactions based on the identified use of the illicit peripheral device. 2. The method of claim 1, wherein the monitoring is performed via passive validation, active validation or a combination of both passive and active validation processes. 3. The method of claim 1, wherein the network corresponds to a network game. 4. The method of claim 3, wherein the generated rules corresponds to rules associated with the network game environment. 5. The method of claim 1, wherein the generated rules further include rules provided by a third party associated with the network. 6. The method of claim 1, wherein the identifying of the particular computing device includes evaluating information obtained from a group of two or more distinct client computing devices pertaining to the particular computing device, and wherein the evaluated information indicates that the group of two or more distinct client computing devices invalidates the particular computing device. 7. A system for validating use of peripheral devices in a network, the system comprising: one or more computing devices, wherein each computing device includes one or more peripheral devices;a server that receives data, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network; anda monitoring module that executes instructions stored in memory to: store information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicitmonitor the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices;compare the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices,identify that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device, andinvalidate the identified computing device from further network interactions based on the identified use of the illicit peripheral device. 8. The system of claim 7, wherein the monitoring is performed via passive validation, active validation or a combination of both passive and active validation processes. 9. The system of claim 7, wherein the network corresponds to a network game. 10. The system of claim 9, wherein the generated rules corresponds to rules associated with the network game environment. 11. The system of claim 7, wherein the generated rules further include rules provided by a third party associated with the network. 12. The system of claim 7, wherein the identifying of the particular computing device includes evaluating information obtained from a group of two or more distinct client computing devices pertaining to the particular computing device, and wherein the evaluated information indicates that the group of two or more distinct client computing devices invalidates the particular computing device. 13. A non-transitory computer readable storage medium, having embodied thereon a program executable by a processor to perform a method for validating use of peripheral devices in a network, the method comprising: storing information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicit;receiving data at a server, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network, and wherein each computing device includes one or more peripheral devices;monitoring the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices;comparing the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices;identifying that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device; andinvalidating the identified computing device from further network interactions based on the identified use of the illicit peripheral device. 14. The non-transitory computer readable storage medium of claim 13, wherein the monitoring is performed via passive validation, active validation or a combination of both passive and active validation processes. 15. The non-transitory computer readable storage medium of claim 13, wherein the network corresponds to a network game. 16. The non-transitory computer readable storage medium of claim 15, wherein the generated rules corresponds to rules associated with the network game environment. 17. The non-transitory computer readable storage medium of claim 13, wherein the generated rules further include rules provided by a third party associated with the network. 18. The non-transitory computer readable storage medium of claim 13, wherein the identifying of the particular computing device includes evaluating information obtained from a group of two or more distinct client computing devices pertaining to the particular computing device, and wherein the evaluated information indicates that the group of two or more distinct client computing devices invalidates the particular computing device. 19. The method of claim 1 further comprising generating rules that characterize user activity and game parameters based on the monitored data, wherein the generated rules identify user activity that deviates from typical user activity for a game title associated with the user activity, and wherein the generated rules are stored in memory. 20. The method of claim 1, wherein the set of peripheral device signatures identified as acceptable or illicit is specific to a game title, and wherein a different game title is associated with a different set of peripheral device signatures identified as acceptable or ilicit.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (58)
Harris,Adam P.; Schneider,Steve C., Active validation of network devices.
Zintel, William Michael, Auto-configuring of peripheral on host/peripheral computing platform with peer networking-to-host/peripheral adapter for peer networking connectivity.
Gupta, Rohit; Gavrilescu, Alexandru; Miller, John L.; Wheeler, Graham A., Peer-to-peer name resolution protocol (PNRP) security infrastructure and method.
Sirer, Emin Gun; Bershad, Brian N., Process for rewriting executable content on a network server or desktop machine in order to enforce site specific properties.
Schneier Bruce ; Walker Jay ; Jorasch James, Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic an.
Schneier Bruce ; Walker Jay S. ; Jorasch James, Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Karl L. Ginter ; Victor H. Shear ; Francis J. Spahn ; David M. Van Wie, Systems and methods for secure transaction management and electronic rights protection.
Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., Systems and methods for the secure transaction management and electronic rights protection.
Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.