Patent classifications
A63F2300/401
System and method for providing security to a game controller device for electronic trading
A system for managing electronic trading, comprises an interface application including a mapping module that defines a plurality of controller signal relationships. Each controller signal relationship associates one or more of a plurality of game controller signals with one of a plurality of trading system commands associated with the electronic trading of financial instruments. The interface application receives a plurality of game controller signals generated by a game controller, and determines, based on the controller signal relationships, that one or more of the plurality of received game controller signals are erroneous. The interface application causes the communication of a command to lock the game controller based on the determination of the one or more erroneous game controller signals.
3D AVATAR PLUGIN FOR THIRD-PARTY GAMES
Systems and methods are disclosed for receiving a request to display an avatar within a graphical user interface of a client device, authenticating the request based on user data, retrieving the avatar from a database, transmitting the avatar to the client device and presenting the avatar within the user interface of the client device.
SERVER AND METHOD FOR PLAYING LOCATION-BASED GAME
Provided is a game server for providing a location-based game, including: a location information receiving unit configured to receive location information of a first device from the first device; a game providing unit configured to provide a game based on the location information of the first device to the first device; and an identification information receiving unit configured to receive identification information of the first device from the first device. The location information of the first device is set based on location information of the connected second device, the first device is a device without a GPS (Global Positioning System) function and the second device is a device with the GPS function, the game providing unit allocates a first game environment to the identification information of the first device, and the identification information of the first device includes at least one of a UUID (Universal Unique Identifier), a GUID (Global Unique Identifier), and a Mac Address.
Gaming interface techniques for media centers
A media center may include an interface to receive video game information including first and second tags from a communication link. The media center may also include a module to separate the video game information based on the first and second tags. A first modulator may modulate first video game information corresponding to the first tag at a first frequency on a media communication link, and a second modulator may modulate second video game information corresponding to the second tag at a second frequency on the media communication link.
Method, server and device for playing location-based game
Provided is a method for providing a location-based game performed by a first device, including: performing authentication between the first device and a second device; connecting the first device with the second device; receiving location information of the second device from the connected second device; setting the received location information of the second device as location information of the first device; transmitting the set location information of the first device to a game server; and receiving a game based on the location information of the first device from the game server, and the first device is a device without a GPS (Global Positioning System) function and the second device is a device with the GPS function.
SECURE DATA CHANNEL IN A NETWORKED GAMING SYSTEM
A method includes: initiating a data channel over a networked gaming service, including generating a channel key, the channel key being used to encrypt content communicated over the data channel, and generating a first encrypted channel key by encrypting the channel key with a public key associated to an owner of the data channel; adding a participant to the data channel, including generating a second encrypted channel key by encrypting the channel key with a public key associated to the participant; wherein a message sent via the data channel includes encrypted content generated by using the channel key to encrypt content for the message, and further includes the first encrypted channel key and the second encrypted channel key.
Use of real time location information for user authentication and authorization in virtual environments
Provided is a method for authentication and verification of a user in a virtual world (VU) based upon such criteria as the physical location of a user in the real world and the logical location of the user's avatar in the VU. The disclosed technology combines physical and application aspects of security to enhance security options within virtual environments. In addition to traditional credential-based authentication, physical constraints corresponding to the real world and logical locations in a VU are employed, wherein an authentication server requires each component to be in the proper association state, location or proximity before authenticating a user. Further, the disclosed technology provides for the termination of a user's authentication if the user moves from an approved physical or VU location to an unapproved location. Techniques are provided to track a user's credentials and real-time physical and logical location of a user.
BLOCKCHAIN GAMING SYSTEM
A block chain system allows mining for new valid values in a system such as a computer game or computer-based trading card system. Instead of each new value being added to the block chain being equivalent, each new value is one of a plurality of possible choices.
System, method, program, and recording medium storing program for authentication
An authentication system includes first and second terminals, and an authentication subsystem. The authentication subsystem: generates a first token based on reception of a code image authentication start request, generates and stores a code image key in association with the first token, generates and stores a code image including the code image key at a URL of the storage unit, transmits the first token and the URL to the first terminal, registers the received first token as a key in an information transmitting and receiving unit, checks whether a received ID of the second terminal is a unique ID, when the received unique ID of the second terminal is the unique ID, checks whether the received code image key is stored in the storage unit, and transmits a first response code to the information transmitting and receiving unit using, as a key.
Restricted-use authentication codes
Embodiments related to a restricted-use authentication code are disclosed. One disclosed embodiment provides a method of generating a representation of a restricted-use authentication code for detection by another computing device to authenticate the other computing device to a remote service. The method includes receiving authentication information, the authentication information comprising a restricted-use authentication code and generating a representation of the authentication information. The method further includes presenting the representation of the authentication information to a sensor system of the other computing device for authentication.