A63F13/352

Addressing data skew using map-reduce

A system and method includes using a queue with reduce operations. A method can include, responsive to generation of one or more markers by a first node or a second node, causing a submission of one or more markers to a queue associated with a computing cluster. Additionally, responsive to a determination that the first node has completed a first reduce operation, directing the first node to perform a first copy operation to copy first data identified by a first marker of the one or more markers in the queue, where the first copy operation is performed concurrently with the second reduce operation.

PROJECTIVE HASH MAPS

This application discloses techniques for generating and querying projective hash maps. More specifically, projective hash maps can be used for spatial hashing of data related to N-dimensional points. Each point is projected onto a projection surface to convert the three-dimensional (3D) coordinates for the point to two-dimensional (2D) coordinates associated with the projection surface. Hash values based on the 2D coordinates are then used as an index to store data in the projective hash map. Utilizing the 2D coordinates rather than the 3D coordinates allows for more efficient searches to be performed to locate points in the 3D space. In particular, projective hash maps can be utilized by graphics applications for generating images, and the improved efficiency can, for example, enable a game streaming application on a server to render images transmitted to a user device via a network at faster frame rates.

PROJECTIVE HASH MAPS

This application discloses techniques for generating and querying projective hash maps. More specifically, projective hash maps can be used for spatial hashing of data related to N-dimensional points. Each point is projected onto a projection surface to convert the three-dimensional (3D) coordinates for the point to two-dimensional (2D) coordinates associated with the projection surface. Hash values based on the 2D coordinates are then used as an index to store data in the projective hash map. Utilizing the 2D coordinates rather than the 3D coordinates allows for more efficient searches to be performed to locate points in the 3D space. In particular, projective hash maps can be utilized by graphics applications for generating images, and the improved efficiency can, for example, enable a game streaming application on a server to render images transmitted to a user device via a network at faster frame rates.

Systems and methods for distributing the generation of nonplayer characters across networked end user devices for use in simulated NPC gameplay sessions

A system and method is provided that simulates gameplay of non-player characters (NPCs) distributed across networked end user devices. The system may identify end user devices that are connected to the system through a network and are available to participate in a simulation in which each participating end user device is provided with one or more NPCs to be executed. An end user device may be available to participate when it has sufficient computing capacity, such as when in an idle or standby state. As such, the system may leverage spare computing capacity of networked end user devices to execute NPCs at networked end user devices during a simulation. In this manner, the behavior of an NPC may be tested using real-world conditions that may affect gameplay, such as a network connection quality, user-to-user game engine coordination and data exchanges, and/or other real-world conditions associated with networked end user devices.

Systems and methods for distributing the generation of nonplayer characters across networked end user devices for use in simulated NPC gameplay sessions

A system and method is provided that simulates gameplay of non-player characters (NPCs) distributed across networked end user devices. The system may identify end user devices that are connected to the system through a network and are available to participate in a simulation in which each participating end user device is provided with one or more NPCs to be executed. An end user device may be available to participate when it has sufficient computing capacity, such as when in an idle or standby state. As such, the system may leverage spare computing capacity of networked end user devices to execute NPCs at networked end user devices during a simulation. In this manner, the behavior of an NPC may be tested using real-world conditions that may affect gameplay, such as a network connection quality, user-to-user game engine coordination and data exchanges, and/or other real-world conditions associated with networked end user devices.

Passing control of cloud gameplay

A method includes: executing a video game by a cloud gaming machine; streaming, by a video server over a network, video generated from the executing video game to a plurality of client devices; enabling gameplay of the video game that includes control of a virtual object of the video game by one of the client devices, and passing the control of the virtual object to each of the client devices in turn, wherein passing the control is responsive to detecting a predefined condition during the gameplay of the video game.

Interactive videogame verification using cryptographically protected transaction records
11528148 · 2022-12-13 · ·

An example method of performing interactive videogame verification using cryptographically protected transaction records includes: receiving, by a videogame server, from a first videogame client device, a first transaction record reflecting a first set of events associated with an interactive videogame session, wherein the first transaction record is cryptographically signed by a first private cryptographic key associated with the first videogame client device; receiving, from a second videogame client device, a second transaction record reflecting a second set of events associated with the interactive videogame session, wherein the second transaction record is cryptographically signed by a second private cryptographic key associated with the second videogame client device; and validating the first transaction record based on the second transaction record.

Method and System for Managing Virtual Personal Space
20220387895 · 2022-12-08 ·

A method and system for managing personal virtual space, comprising: establishing at least one threshold distance needed to generate a personal virtual space breach alert; creating a first unique identifying signal; transducing the signal into a transmissible medium; transmitting the signal by a first electronic device; receiving the signal by at least one other electronic device; processing the signal with at least one processor; calculating distance to first electronic device using the processed signal; communicate the distance to at least one management processor; calculating at least one other distance from the first electronic device to the other electronic device; communicate the at least one other distance to the management processor; calculating a personal virtual space breach from the distances; creating a personal virtual space breach alert; transmitting the personal virtual space breach alert; receiving the personal virtual space breach alert at a plurality of physical notification devices; changing the state of at least one of the physical notification devices.

Systems and methods for facilitating transactions of virtual items between users of an online game

Systems and methods for facilitating transactions of virtual items between users of an online game are disclosed. Exemplary implementations may: receive a sales request that indicates a selling user will be offering for sale a particular virtual item from a seller's inventory through an online sales platform; assign the ownership of the particular virtual item temporarily to a holding account; publish a sales listing of the particular virtual item on the online sales platform; receive sales information from the online sales platform indicating whether the particular virtual item has been purchased; assign the ownership of the particular virtual item to the buyer's account; and transfer at least a portion of a sales amount received from the buying user to the seller's account.

METHOD AND SYSTEM FOR ESTABLISHING CLONED GAME ACCOUNTS
20220379225 · 2022-12-01 ·

The present invention provides a method to establish cloned game accounts, when an auction information is posted on the game account trading platform, the game account trading platform will establish a testing game interface according to the game interface under the relevant game account, and generate a cloned game account based on the game objects, so that the buyer user primary account can enter this testing game interface to test the cloned game account.