Patent classifications
A63F13/75
Interactive gaming system
A system for customizing an end user gaming experience is disclosed herein. The system includes a processor. The processor is configured to create a campaign by receiving a campaign creation request from an end user device, the campaign creation request comprising one or more parameters of a campaign associated with the campaign request, creating the campaign based on the one or more parameters associated with the campaign request, and personalizing one or more offers for an end user, each of the one or more offers comprising a game having one or more hurdles, wherein completion of each of the one or more hurdles leads to a reward. The processor is further configured to map a subset of the one or more personalized offers to the end user. The processor is further configured to monitor progress of the campaign.
INFORMATION PROCESSING SYSTEM, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM STORING THEREIN INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
An exemplary information processing system is configured to create a route formed by arranging, in a virtual space, a plurality of route parts each associated with a design; determine whether the route created by the user contains a forbidden symbol or a forbidden word. When the route created by the user contains a forbidden symbol or a forbidden word, uploading of the route created by the user to the server is prohibited.
INFORMATION PROCESSING SYSTEM, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM STORING THEREIN INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
An exemplary information processing system is configured to create a route formed by arranging, in a virtual space, a plurality of route parts each associated with a design; determine whether the route created by the user contains a forbidden symbol or a forbidden word. When the route created by the user contains a forbidden symbol or a forbidden word, uploading of the route created by the user to the server is prohibited.
METHOD FOR PROVIDING BATTLE ROYALE GAME WHICH ALLOWS PLAYERS TO REPAIR PROTECTIVE ITEMS FOR SURVIVAL AND SERVER USING THE SAME
Method for allowing to repair the protective items and a server is provided. The method includes steps of: (a) on condition that information on each of a 1-st protective item to an n-th protective item, information on at least one 1-st material item to at least one n-th material item and 1-st hierarchy information to n-th hierarchy information have been managed, acquiring a repair request for a specific protective item from a specific user terminal corresponding to a specific player; and (b) determining whether a condition for repairing the specific protective item is satisfied by referring to at least part of information on at least one possessed repairing item and information on possessed material item of the specific player, and in response to determining that the condition for repairing the specific protective item is satisfied, repairing the specific protective item of the specific player.
Detection of malicious games
Some implementations relate detection of malicious games. In some implementations, a computer-implemented method includes obtaining a list of games that includes a plurality of games, analyzing the plurality of games to identify at least one likely malicious game, and creating a ticket.
Systems and method for identifying modified program data
The technology described implements attestation programs that employ “code reuse” techniques. In particular, the technology relates to auto-generating attestation programs for, among other aspects, detecting whether a program has been modified. In one non-limiting example, the technology uses a tool that scans a software program (e.g., a video game) code for usable code sequences. The tool can automatically combine code sequences to generate a large number of attestation programs of different variety (e.g., memory checks, hashing).
Systems and method for identifying modified program data
The technology described implements attestation programs that employ “code reuse” techniques. In particular, the technology relates to auto-generating attestation programs for, among other aspects, detecting whether a program has been modified. In one non-limiting example, the technology uses a tool that scans a software program (e.g., a video game) code for usable code sequences. The tool can automatically combine code sequences to generate a large number of attestation programs of different variety (e.g., memory checks, hashing).
Method and apparatus for remote game play with real-time commentary
This invention allows the players of multiplayer games like poker, chess, backgammon, go, board games, and video games to play the game online while commenting on the game and explaining their strategies to an online audience without sharing that information with their opponents.
Systems and methods for operating a bridge server to support multiple shards of a blockchain
Systems and methods for operating a bridge server to support multiple shards of blockchains are disclosed. The multiple shards may be used to record ownership rights of in-game digital assets. The in-game digital assets may be usable in an online gaming platform. Exemplary implementations may: execute an instance of a game; maintain user accounts for the users of a blockchain on a first and a second decentralized ledger server; record sets of rights pertaining to sets of digital assets; receive an exchange request for a first digital asset; receive transferal information for the first digital asset; transfer sets of instructions to the first and second decentralized ledger servers such that the first decentralized ledger server removes the first digital asset from the first set of digital assets and the second decentralized ledger server adds the first digital asset to the second set of digital assets.
AUTOMATIC CLASSIFICATION AND REPORTING OF INAPPROPRIATE LANGUAGE IN ONLINE APPLICATIONS
In various examples, game session audio data - e.g., representing speech of users participating in the game - may be monitored and/or analyzed to determine whether inappropriate language is being used. Where inappropriate language is identified, the portions of the audio corresponding to the inappropriate language may be edited or modified such that other users do not hear the inappropriate language. As a result, toxic behavior or language within instances of gameplay may be censored - thereby enhancing the user experience and making online gaming environments safer for more vulnerable populations. In some embodiments, the inappropriate language may be reported - e.g., automatically - to the game developer or game application host in order to suspend, ban, or otherwise manage users of the system that have a proclivity for toxic behavior.