Validation of Network Devices
4 Assignments
0 Petitions
Accused Products
Abstract
A system and method for actively validating a network device is provided. Nodes in a network game community are prompted to engage in interrogation and response to facilitate the identification of nodes operating with hacked, modified and non-typical game configurations. In one embodiment, a query is presented to a user'"'"'s machine which triggers a response, and where the response indicates whether certain data at the user is valid and wherein invalid data is suggestive of illegal community behavior. Functions are triggered and data is queried to determine whether the state of game environment is operating according to known metrics or constraints. Various queries to test user integrity include memory peeks, confirmation of location of functions in memory, memory hashing, profiling of threads operating on the user machine, and combinations thereof. Queries may be actively initiated by a server, peer, peer group or combinations thereof and may be scheduled on a routine basis, triggered in response to passive listening, and via collaborating users who suspect cheat activity.
17 Citations
25 Claims
-
1. (canceled)
-
2. A method for validating compliance of nodes in a peer-to-peer network with a rule, the method comprising:
-
receiving a plurality of queries at a node in the peer-to-peer network, wherein each query from the plurality of queries originates from a different sending node in the peer-to-peer network; processing each of the plurality of queries to generate a corresponding response, wherein processing of each of the plurality of queries takes place at the node receiving the plurality of queries; and transmitting the generated responses to the corresponding sending nodes for each of the plurality of queries, the generated responses transmitted over one or more communications channels in the peer-to-peer network, and wherein the generated responses are subsequently analyzed to determine whether the node receiving the plurality of queries is in compliance with the rule. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
Specification