Invalidating network devices with illicit peripherals
First Claim
1. A method for validating use of peripheral devices in a network, the method comprising:
- storing information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicit;
receiving data at a server, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network, and wherein each computing device includes one or more peripheral devices;
monitoring the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices;
comparing the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices;
identifying that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device; and
invalidating the identified computing device from further network interactions based on the identified use of the illicit peripheral device.
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for passively validating network game users is provided. Data indicative of game behavior and actions at one or more nodes interacting with a network game in a network game community are monitored. The data is evaluated to determine whether the one or more nodes are adhering to one or more rules associated with the network game. Data indicative of illicit game behavior may trigger various responses including invalidation of the node engaged in the illicit behavior. Alternatively, a query may be generated to further identify the nature and/or actual existence of illicit behavior at the node. Monitoring of game data may occur at a server, a peer, as part of a peer group or combinations thereof, which may be based on routine schedule or part of constant game behavior monitoring.
113 Citations
20 Claims
-
1. A method for validating use of peripheral devices in a network, the method comprising:
-
storing information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicit; receiving data at a server, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network, and wherein each computing device includes one or more peripheral devices; monitoring the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices; comparing the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices; identifying that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device; and invalidating the identified computing device from further network interactions based on the identified use of the illicit peripheral device. - View Dependent Claims (2, 3, 4, 5, 6, 19, 20)
-
-
7. A system for validating use of peripheral devices in a network, the system comprising:
-
one or more computing devices, wherein each computing device includes one or more peripheral devices; a server that receives data, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network; and a monitoring module that executes instructions stored in memory to; store information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicit monitor the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices; compare the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices, identify that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device, and invalidate the identified computing device from further network interactions based on the identified use of the illicit peripheral device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer readable storage medium, having embodied thereon a program executable by a processor to perform a method for validating use of peripheral devices in a network, the method comprising:
-
storing information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicit; receiving data at a server, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network, and wherein each computing device includes one or more peripheral devices; monitoring the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices; comparing the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices; identifying that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device; and invalidating the identified computing device from further network interactions based on the identified use of the illicit peripheral device. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification