Add-in card based cheat detection platform for online applications
First Claim
1. An add-in card comprisinginaccessible memory to store an identity key, wherein the identity key is to enable a secure communication link;
- an isolated execution environment; and
a machine-accessible medium comprising content, which, when executed by the isolated execution environment causes the isolated execution environment to;
route secure communications between an on-line application and a remote service provider through the isolated execution environment to provide a secure communication link therebetween;
detect on-line application code modifications;
detect on-line application process flow modifications; and
notify, via the secure communication link, the remote service provider when a modification is detected.
1 Assignment
0 Petitions
Accused Products
Abstract
In general, in one aspect, an add-in card includes inaccessible memory to store an identity key, wherein the identity key is to enable a secure communication link. The add-in card also includes an isolated execution environment and a machine-accessible medium comprising content. The content when executed by the isolated execution environment causes the isolated execution environment to route secure communications between an on-line application and a remote service provider through the isolated execution environment to provide a secure communication link therebetween, detect on-line application code modifications, detect on-line application process flow modifications, and notify, via the secure communication link, the remote service provider when a modification is detected.
33 Citations
24 Claims
-
1. An add-in card comprising
inaccessible memory to store an identity key, wherein the identity key is to enable a secure communication link; -
an isolated execution environment; and a machine-accessible medium comprising content, which, when executed by the isolated execution environment causes the isolated execution environment to; route secure communications between an on-line application and a remote service provider through the isolated execution environment to provide a secure communication link therebetween; detect on-line application code modifications; detect on-line application process flow modifications; and notify, via the secure communication link, the remote service provider when a modification is detected. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system comprising
memory to store an on-line application; -
a central processing unit (CPU) to run the on-line application; at least one input device to enable a user to enter commands; and an add-in card having an isolated execution environment processor to detect at least some subset of user command modifications, on-line application code modifications, and on-line application process flow modifications; at least one interface to receive the user commands from the input devices; and filters to monitor the received user commands and to copy the user commands associated with at least a subset of the input devices to the isolated execution environment. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
Specification