Defining new rules for validation of network devices
First Claim
Patent Images
1. A method for validating devices in a gaming network, the method comprising:
- maintaining in memory game play history for each of a plurality of game players in the gaming network, wherein each game player is assigned to a list of trustworthy game players or a list of cheating game players based on the stored game play history of the game player;
sending one or more queries to one of the game players over a communication network, wherein each query is directed at gathering data regarding a game device associated with the game player; and
executing instructions stored in memory, wherein execution of the instructions by a processor;
updates the list of trustworthy game players or the list of cheating game players based on whether a valid query response has been received from the game player within the predetermined period of time, andadjusts timing of monitoring by a monitoring module of subsequent game play data from the game player, the adjustment based on whether the game player appears on the list of trustworthy game players or the list of cheating game players.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for actively validating a network device is provided. Nodes in a network game community are prompted to engage in interrogation and response to facilitate the identification of nodes operating with hacked, modified and non-typical game configurations. In one embodiment, a query is presented to a user'"'"'s machine which triggers a response, and where the response indicates whether certain data at the user is valid and wherein invalid data is suggestive of illegal community behavior. Functions are triggered and data is queried to determine whether the state of game environment is operating according to known metrics or constraints.
-
Citations
15 Claims
-
1. A method for validating devices in a gaming network, the method comprising:
-
maintaining in memory game play history for each of a plurality of game players in the gaming network, wherein each game player is assigned to a list of trustworthy game players or a list of cheating game players based on the stored game play history of the game player; sending one or more queries to one of the game players over a communication network, wherein each query is directed at gathering data regarding a game device associated with the game player; and executing instructions stored in memory, wherein execution of the instructions by a processor; updates the list of trustworthy game players or the list of cheating game players based on whether a valid query response has been received from the game player within the predetermined period of time, and adjusts timing of monitoring by a monitoring module of subsequent game play data from the game player, the adjustment based on whether the game player appears on the list of trustworthy game players or the list of cheating game players. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
Specification