×

Invalidating network devices with illicit peripherals

  • US 9,717,992 B2
  • Filed: 06/24/2014
  • Issued: 08/01/2017
  • Est. Priority Date: 03/20/2006
  • Status: Active Grant
First Claim
Patent Images

1. A method for validating use of peripheral devices in a network, the method comprising:

  • storing information in memory regarding a plurality of peripheral device signatures, wherein a set of peripheral device signatures is identified as acceptable and another set of peripheral device signatures are identified as illicit;

    receiving data at a server, wherein the received data is generated by one or more computing devices as part of network interaction between the computing device and a network, and wherein each computing device includes one or more peripheral devices;

    monitoring the received data from the one or more computing devices at the server, wherein the received data includes peripheral device data associated with each computing device, and wherein the monitoring does not require the one or more computing devices to execute instructions specifically for validation of peripheral devices associated with the computing devices;

    comparing the monitored data with stored rules associated with the network, wherein the stored rules identify acceptable parameters regarding network gameplay, and wherein acceptable parameters specify acceptable peripheral devices;

    identifying that peripheral device data associated with one of the computing devices includes a device signature of an illicit peripheral device when the comparison of the monitored data indicates that the peripheral device data of the identified computing device is not recognized as a device signature of an acceptable peripheral device; and

    invalidating the identified computing device from further network interactions based on the identified use of the illicit peripheral device.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×