Secure geographic based gaming
First Claim
1. A method comprising:
- determining, by a device participating in a geogame based on a geographic location of the device, an amount of time that has passed since a previous network message was received by the device;
determining, by the device, if the amount of time is equal to or greater than a threshold value of time;
receiving, by the device, a geocast message;
determining, by the device, if the received geocast message is redundant with a previously received geocast message;
upon a determination that the received geocast message is not redundant with a previously received geocast message, comparing, by the device, embedded parameters in the received geocast message with a current state of the device; and
determining, by the device, thata network interdiction attack has occurred based on;
a determination that the amount of time is greater than a threshold value of time; and
a determination that a current state of geogame play is not possible based on a result of the comparing of the embedded parameters in the received geocast message;
ora network interdiction attack has not occurred based on a determination that the amount of time is not greater than a threshold value of time.
1 Assignment
0 Petitions
Accused Products
Abstract
Security in a geogame is maintained by implementing various security techniques. The various techniques provide specific advantages for different threat modes and attack styles against a geogame implemented via a mobile ad hoc network utilizing a geocast protocol. Jamming is detected by each player device listening for expected retransmissions of its own originated geocasts. If it fails to hear a retransmission, it concludes jamming. Network interdiction is detected by monitoring for received transmissions and/or periodically sending dummy transmissions to support other devices'"'"' detections. Location determination attacks are detected by recognizing “impossible” movements. Geogame interruption attacks are detected by detecting unauthorized requests to restart a geogame. Other security measures include utilizing cryptographic keys and/or pass phrases when geocasting. Various penalties within the context of a geogame are levied against a player if a security breach is detected.
-
Citations
19 Claims
-
1. A method comprising:
-
determining, by a device participating in a geogame based on a geographic location of the device, an amount of time that has passed since a previous network message was received by the device; determining, by the device, if the amount of time is equal to or greater than a threshold value of time; receiving, by the device, a geocast message; determining, by the device, if the received geocast message is redundant with a previously received geocast message; upon a determination that the received geocast message is not redundant with a previously received geocast message, comparing, by the device, embedded parameters in the received geocast message with a current state of the device; and determining, by the device, that a network interdiction attack has occurred based on; a determination that the amount of time is greater than a threshold value of time; and a determination that a current state of geogame play is not possible based on a result of the comparing of the embedded parameters in the received geocast message;
ora network interdiction attack has not occurred based on a determination that the amount of time is not greater than a threshold value of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A mobile device comprising:
-
a processor; and memory coupled to the processor, the memory comprising executable instructions that when executed by the processor cause the processor to effectuate operations comprising; determining an amount of time that has passed since a previous geocast packet was received by the device, wherein the device is participating in a geogame based on a geographic location of the device; determining if the amount of time is equal to or greater than a threshold value of time; receiving a geocast message; determining if the received geocast message is redundant with a previously received geocast message; upon a determination that the received geocast message is not redundant with a previously received geocast message, comparing embedded parameters in the received geocast message with a current state of the device; and determining that a network interdiction attack has occurred based on a determination that the amount of time is greater than a threshold value of time; and a determination that a current state of geogame play is not possible;
ora network interdiction attack has not occurred based on a determination that the amount of time is not greater than a threshold value of time. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
Specification