Patent classifications
A63F13/71
Method to detect and counteract suspicious activity in an application environment
Aspects of the subject disclosure may include, for example, comparing an input received from a peripheral device associated with an execution of a gaming application with a threshold value, wherein the threshold value is based on a first identification of a first user, a second identification of the peripheral device, and a third identification of stimuli presented as part of the execution of the gaming application. Responsive to the comparing, a determination may be made that the input exceeds the threshold value. Responsive to the determination, a validation request may be transmitted to a user device of the first user. Other embodiments are disclosed.
Mobile casino jackpot payment reporting system with secure form reporting to customer
Relative to a gaming system, a jackpot or game win processing device and server are configured to receive acknowledgement from a player regarding a gaming win award, such as input to the game win processing device of a signature by the player to gaming win forms. In response, the server is configured to generate at least one gaming win reporting form, such as a W2G, to generate a security code from at least two elements of personal information regarding the player, such as obtained from a casino player tracking server, to then secure the at the least one reporting form and then email the secure form to the player.
Mobile casino jackpot payment reporting system with secure form reporting to customer
Relative to a gaming system, a jackpot or game win processing device and server are configured to receive acknowledgement from a player regarding a gaming win award, such as input to the game win processing device of a signature by the player to gaming win forms. In response, the server is configured to generate at least one gaming win reporting form, such as a W2G, to generate a security code from at least two elements of personal information regarding the player, such as obtained from a casino player tracking server, to then secure the at the least one reporting form and then email the secure form to the player.
Systems and methods for interactive physical environments
An interactive physical environment providing entertainment to a patron includes a room formed by modular walls coupled to one another, a radio frequency identification (RFID) tag associated with the patron, and a control system. The room presents a game to a patron. The game includes a plurality of game components positionable in a first game configuration and a second game configuration. The first game configuration presenting a first challenge and the second game configuration presenting a second challenge. The second game configuration representing a solution to the first challenge. The control system receives patron identification information from the RFID tag associated with the patron. The control system selectively modifying the game presented by the room responsive to the received patron identification information.
Interactive videogame verification using cryptographically protected transaction records
An example method of performing interactive videogame verification using cryptographically protected transaction records includes: receiving, by a videogame server, from a first videogame client device, a first transaction record reflecting a first set of events associated with an interactive videogame session, wherein the first transaction record is cryptographically signed by a first private cryptographic key associated with the first videogame client device; receiving, from a second videogame client device, a second transaction record reflecting a second set of events associated with the interactive videogame session, wherein the second transaction record is cryptographically signed by a second private cryptographic key associated with the second videogame client device; and validating the first transaction record based on the second transaction record.
Interactive videogame verification using cryptographically protected transaction records
An example method of performing interactive videogame verification using cryptographically protected transaction records includes: receiving, by a videogame server, from a first videogame client device, a first transaction record reflecting a first set of events associated with an interactive videogame session, wherein the first transaction record is cryptographically signed by a first private cryptographic key associated with the first videogame client device; receiving, from a second videogame client device, a second transaction record reflecting a second set of events associated with the interactive videogame session, wherein the second transaction record is cryptographically signed by a second private cryptographic key associated with the second videogame client device; and validating the first transaction record based on the second transaction record.
Non-transitory computer-readable storage medium, terminal device, and information processing system
A non-transitory computer-readable storage medium storing a program configured to cause a terminal device to execute a game in communication with a server device, the program includes: a first storing step of receiving from the server device at least one token generated and stored in the server device to store the token in a terminal storage unit; a transmitting step of transmitting to the server device information-to-be-transmitted including an updating instruction of game data of a user and encrypted information obtained by encrypting information-to-be-encrypted at least including the token; and a deleting step of deleting the token stored in the terminal storage unit, wherein the updating instruction includes a first instruction to update the game data stored in the server device when the token extracted by decrypting the encrypted information and the token stored in the server device are matched.
Non-transitory computer-readable storage medium, terminal device, and information processing system
A non-transitory computer-readable storage medium storing a program configured to cause a terminal device to execute a game in communication with a server device, the program includes: a first storing step of receiving from the server device at least one token generated and stored in the server device to store the token in a terminal storage unit; a transmitting step of transmitting to the server device information-to-be-transmitted including an updating instruction of game data of a user and encrypted information obtained by encrypting information-to-be-encrypted at least including the token; and a deleting step of deleting the token stored in the terminal storage unit, wherein the updating instruction includes a first instruction to update the game data stored in the server device when the token extracted by decrypting the encrypted information and the token stored in the server device are matched.
Systems and methods for facilitating transactions of virtual items between users of an online game
Systems and methods for facilitating transactions of virtual items between users of an online game are disclosed. Exemplary implementations may: receive a sales request that indicates a selling user will be offering for sale a particular virtual item from a seller's inventory through an online sales platform; assign the ownership of the particular virtual item temporarily to a holding account; publish a sales listing of the particular virtual item on the online sales platform; receive sales information from the online sales platform indicating whether the particular virtual item has been purchased; assign the ownership of the particular virtual item to the buyer's account; and transfer at least a portion of a sales amount received from the buying user to the seller's account.
METHOD AND SYSTEM FOR ESTABLISHING CLONED GAME ACCOUNTS
The present invention provides a method to establish cloned game accounts, when an auction information is posted on the game account trading platform, the game account trading platform will establish a testing game interface according to the game interface under the relevant game account, and generate a cloned game account based on the game objects, so that the buyer user primary account can enter this testing game interface to test the cloned game account.