A63F13/75

Fraud detection in electronic subscription payments

Methods, systems, and non-transitory computer-readable media are provided for fraud detection within an interactive media system such as a computer-based game. In some implementations, fraud in online subscription payments can be detected. The fraud detection can be used to adjust virtual currency revenue sharing payouts to developers associated with the computer-based game.

Fraud detection in electronic subscription payments

Methods, systems, and non-transitory computer-readable media are provided for fraud detection within an interactive media system such as a computer-based game. In some implementations, fraud in online subscription payments can be detected. The fraud detection can be used to adjust virtual currency revenue sharing payouts to developers associated with the computer-based game.

Methods and apparatus for distributed gaming over a mobile device

A system and method are provided for updating game participants. In some embodiments, the participants receive game control information via a one-way broadcast. The method selects a set of sampling participants from the set of all participants of a game. In some embodiments, the selection occurs prior to the start of the game. The method of some embodiments establishes a two-way connection between a server and each of the sampling participants. For some embodiments, the two-way connection is realtime. The method continuously maintains the two-way connection throughout the game. During each discrete game period, the method receives from a sampling participant, data for the sampling participant's game period performance. Based on the received data, the method determines the performance for the game period and broadcasts this information to a non-sampling participant. A non-sampling participant is a participant who was not selected for the set of sampling participants. In some embodiments, the non-sampling participant determines a standing relative to the other participants in the game event. Some embodiments provide a method and system for detecting unusual performance in a game. The game has a participant. The method calculates for the participant an average performance level. Based on the average performance level, the method tracks for the participant a participant improvement factor and stores the participant improvement factor. The method compares the participant improvement factor to a threshold value.

Methods and apparatus for distributed gaming over a mobile device

A system and method are provided for updating game participants. In some embodiments, the participants receive game control information via a one-way broadcast. The method selects a set of sampling participants from the set of all participants of a game. In some embodiments, the selection occurs prior to the start of the game. The method of some embodiments establishes a two-way connection between a server and each of the sampling participants. For some embodiments, the two-way connection is realtime. The method continuously maintains the two-way connection throughout the game. During each discrete game period, the method receives from a sampling participant, data for the sampling participant's game period performance. Based on the received data, the method determines the performance for the game period and broadcasts this information to a non-sampling participant. A non-sampling participant is a participant who was not selected for the set of sampling participants. In some embodiments, the non-sampling participant determines a standing relative to the other participants in the game event. Some embodiments provide a method and system for detecting unusual performance in a game. The game has a participant. The method calculates for the participant an average performance level. Based on the average performance level, the method tracks for the participant a participant improvement factor and stores the participant improvement factor. The method compares the participant improvement factor to a threshold value.

METHOD TO DETECT AND COUNTERACT SUSPICIOUS ACTIVITY IN AN APPLICATION ENVIRONMENT

Aspects of the subject disclosure may include, for example, comparing an input received from a peripheral device associated with an execution of a gaming application with a threshold value, wherein the threshold value is based on a first identification of a first user, a second identification of the peripheral device, and a third identification of stimuli presented as part of the execution of the gaming application. Responsive to the comparing, a determination may be made that the input exceeds the threshold value. Responsive to the determination, a validation request may be transmitted to a user device of the first user. Other embodiments are disclosed.

METHOD TO DETECT AND COUNTERACT SUSPICIOUS ACTIVITY IN AN APPLICATION ENVIRONMENT

Aspects of the subject disclosure may include, for example, comparing an input received from a peripheral device associated with an execution of a gaming application with a threshold value, wherein the threshold value is based on a first identification of a first user, a second identification of the peripheral device, and a third identification of stimuli presented as part of the execution of the gaming application. Responsive to the comparing, a determination may be made that the input exceeds the threshold value. Responsive to the determination, a validation request may be transmitted to a user device of the first user. Other embodiments are disclosed.

Systems and methods for detecting and preventing fraudulent in-app activities
11465055 · 2022-10-11 · ·

A system for detecting and preventing fraudulent activities on a software application. The system includes a server arrangement that is communicably coupled with a user device. The server arrangement is configured to receive user-interaction data and sensor data from the user device on which the software application is being executed. The user-interaction data is indicative of an interaction of a user with the software application. The sensor data is collected by at least one sensor of the user device during execution of the software application. The server arrangement is further configured to analyse the user-interaction data and the sensor data to detect whether or not the user is a bot, and perform at least one action when the user is a bot.

Systems and methods for detecting and preventing fraudulent in-app activities
11465055 · 2022-10-11 · ·

A system for detecting and preventing fraudulent activities on a software application. The system includes a server arrangement that is communicably coupled with a user device. The server arrangement is configured to receive user-interaction data and sensor data from the user device on which the software application is being executed. The user-interaction data is indicative of an interaction of a user with the software application. The sensor data is collected by at least one sensor of the user device during execution of the software application. The server arrangement is further configured to analyse the user-interaction data and the sensor data to detect whether or not the user is a bot, and perform at least one action when the user is a bot.

Anti-peek system for video games
11623145 · 2023-04-11 · ·

Various aspects of the subject technology relate to systems, methods, and machine-readable media for preventing rendering of a character in a video game. The method includes receiving an action regarding a first character rendered in a first-person point of view (POV), the action causing the POV of the first character to change from the first-person POV to a third-person POV. The method includes detecting the POV of the first character is to be changed. The method includes determining characters are outside of a field of view (FOV) of the first character in the first-person POV and would be within the FOV of the first character in the third-person POV. The method includes changing the POV of the first character from the first-person POV to a third person POV. The method includes causing rendering of the video game in a third-person POV of the first character, the rendering preventing rendering of other characters.

Anti-peek system for video games
11623145 · 2023-04-11 · ·

Various aspects of the subject technology relate to systems, methods, and machine-readable media for preventing rendering of a character in a video game. The method includes receiving an action regarding a first character rendered in a first-person point of view (POV), the action causing the POV of the first character to change from the first-person POV to a third-person POV. The method includes detecting the POV of the first character is to be changed. The method includes determining characters are outside of a field of view (FOV) of the first character in the first-person POV and would be within the FOV of the first character in the third-person POV. The method includes changing the POV of the first character from the first-person POV to a third person POV. The method includes causing rendering of the video game in a third-person POV of the first character, the rendering preventing rendering of other characters.