Invalidating network devices with illicit peripherals
First Claim
1. A method for validating a user device in a network, the method comprising:
- transmitting a query over a communication network to a user device executing a network game on a network, wherein the query requests specified information concerning the execution of the network game on the network by the user device;
receiving a query response sent over the communication network from the user device, the received query response including the specified information as requested;
comparing the received query response to a database that stores information regarding a plurality of indications of cheating, wherein the indications include specified code associated with cheating behavior that are executable by the user device during execution of the network game on the network;
identifying, based on the comparison, that the received query response includes the specified code associated with the cheating behavior that was executed by the user device during the network game on the network; and
adding an identifier of the user device to a list of cheating user devices stored in memory based on the identification, wherein continued access to the network game for each user device on the network is controlled based on the list of cheating user devices.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for passively validating network game users is provided. Data indicative of game behavior and actions at one or more nodes interacting with a network game in a network game community are monitored. The data is evaluated to determine whether the one or more nodes are adhering to one or more rules associated with the network game. Data indicative of illicit game behavior may trigger various responses including invalidation of the node engaged in the illicit behavior. Alternatively, a query may be generated to further identify the nature and/or actual existence of illicit behavior at the node. Monitoring of game data may occur at a server, a peer, as part of a peer group or combinations thereof, which may be based on routine schedule or part of constant game behavior monitoring.
-
Citations
20 Claims
-
1. A method for validating a user device in a network, the method comprising:
-
transmitting a query over a communication network to a user device executing a network game on a network, wherein the query requests specified information concerning the execution of the network game on the network by the user device; receiving a query response sent over the communication network from the user device, the received query response including the specified information as requested; comparing the received query response to a database that stores information regarding a plurality of indications of cheating, wherein the indications include specified code associated with cheating behavior that are executable by the user device during execution of the network game on the network; identifying, based on the comparison, that the received query response includes the specified code associated with the cheating behavior that was executed by the user device during the network game on the network; and adding an identifier of the user device to a list of cheating user devices stored in memory based on the identification, wherein continued access to the network game for each user device on the network is controlled based on the list of cheating user devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system for validating a user device in a network, the system comprising:
-
one or more computing devices executing a network game on a network; a server that executes instructions stored in memory to; transmit a query over a communication network to one of the computing devices executing the network game on the network being validated, wherein the query requests specified information concerning the execution of the network game on the network by the computing device, receive a query response sent over the communication network from the computing device being validated, the received query response including the requested specified information; and a monitoring module that executes instructions stored in memory to; compare the received query response to a database that stores information regarding a plurality of indications of cheating, wherein the indications include specified code associated with cheating behavior that are executable by the user device during execution of the network game on the network, identify based on the comparison that the received query response includes the specified code associated with the cheating behavior that was executed by the user device during the network game on the network, and add an identifier of the computing device being validated to a list of cheating computing devices stored in memory based on the identification, wherein continued access to the network game for each user device on the network is controlled based on the list of cheating computing devices. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification