Method of validating performance of a participant in an interactive computing environment
First Claim
1. A method of validating the performance of a participant in an interactive computing environment, comprising issuing a first challenge to a participant'"'"'s computing device to determine whether the participant'"'"'s computing device is trustworthy, and if it is then issuing a second challenge to test the integrity of an application run on the participant'"'"'s computing device, and then making a decision concerning the participant'"'"'s involvement in the computing environment.
1 Assignment
0 Petitions
Accused Products
Abstract
A cheat detection facility is provided in which integrity challenges are issued to a game participant seeking to ensure that the participant is not running any patches or other executable code to augment his performance in the game. The player cannot participate further in the game if an integrity check is failed.
-
Citations
35 Claims
- 1. A method of validating the performance of a participant in an interactive computing environment, comprising issuing a first challenge to a participant'"'"'s computing device to determine whether the participant'"'"'s computing device is trustworthy, and if it is then issuing a second challenge to test the integrity of an application run on the participant'"'"'s computing device, and then making a decision concerning the participant'"'"'s involvement in the computing environment.
-
14. A method of validating performance of a participant in an interactive computing environment, comprising issuing a challenge to a participant'"'"'s computing device and on the basis of the challenge making a decision about allowing the participant to participate in the interactive computing environment, wherein the challenge comprises a machine challenge using procedures set out in a TCPA standard to determine that the participant'"'"'s computing device is operating in a trustworthy manner, and an application challenge which tests the integrity of the application run on the participant'"'"'s computing device.
-
15. A method of validating the performance of an entity in a first computing environment, comprising issuing a challenge to determine if a computing environment of the entity is trustworthy and to determine the integrity of an application run in the entity'"'"'s computing environment, and making a decision concerning the entities rights in the first computing environment based on the results of the challenge.
- 17. A server for validating the performance of a participant in an interactive computing environment, wherein the server is arranged to issue a first challenge to a participant'"'"'s computing device to determine whether the participant'"'"'s computing device is trustworthy, and if it is to then issue a second challenge to test the integrity of an application run on the participant'"'"'s computing device, and then make a decision concerning the participant'"'"'s involvement in the computing environment.
-
22. A server as claimed in 17, in which a check is made to determine if the application is being run within a suitably protected compartment.
- 23. A system for validating the performance of a participant in an interactive computing environment, comprising a first computing device arranged to issue a first challenge to a participant'"'"'s computing device to determine whether the participant'"'"'s computing device is trustworthy, and if it is to issue a second challenge to test the integrity of an application run on the participant'"'"'s computing device, and to make a decision concerning the participant'"'"'s involvement in the computing environment.
-
35. A system for validating performance of a participant in an interactive computing environment, comprising a server for issuing a challenge to a participant'"'"'s computing device and on the basis of the challenge making a decision about allowing the participant to participate in the interactive computing environment, wherein the challenge comprises a machine challenge using procedures set out in a TCPA standard to determine that the participant'"'"'s computing device is operating in a trustworthy manner, and an application challenge which tests the integrity of the application run on the participant'"'"'s computing device.
Specification