Patent classifications
A63F2300/532
Game console system, method and computer program product with anti-malware/spyware and parental control capabilities
A system, method and computer program product are provided for securing a game console capable of processing game-related data. In use, the game-related data is scanned for detecting malware. Additionally, the game-related data is scanned for detecting spyware. Further, parental controls are executed during use of the game console.
Safety scheme for gesture-based game
Technologies are generally described for providing a notification to a player playing a gesture-based game of a potentially dangerous condition. In some examples, a safety component of a gesture-based game system includes a gesture range determination unit configured to determine a gesture range associated with a gesture-based game; a detection unit configured to detect a movement of an object; and an alarm unit configured to generate an alarm in response to a determination based on the movement of the object which is within the gesture range.
Biometric access data encryption
The present application provides methods and corresponding systems for accessing services on a gaming device which, in certain embodiments, include the step or steps of obtaining at least one item of identity verification data from a user of a gaming device; encrypting the at least one item of identity verification data; comparing the at least one item of encrypted identity verification data received and at least one item of encrypted identity verification data obtained and stored previously on an authentication device; enabling at least one service on the gaming device based on a match between the encrypted identity verification data, the at least one service comprising a wager-type game; and displaying an interface screen comprising graphic objects associated with the wager-type game and at least one selectable element for the user to submit a gaming command and a wagering command during game play.
SYSTEMS AND METHODS FOR CONTROLLING AN AUTOMATED ELECTRONIC NETWORKED CENTRAL CLEARINGHOUSE FOR NON-FUNGIBLE DIGITAL ASSETS
Systems and methods for controlling an automated electronic networked central clearinghouse for clearing and reversing reversible exchanges of digital assets are disclosed. Exemplary implementations may: execute an instance of a game; receive an exchange request that indicates a first user offers a first digital asset for a reversible exchange on a fiat-currency-based online exchange platform; access a decentralized database to obtain asset-specific distribution rights for the first digital asset; generate publication information of the first digital asset for publication on the online exchange platform; receive exchange information regarding the reversible exchange; temporarily transferring the ownership of the first digital asset; determine whether to reverse the reversible exchange, and either (i) transfer the ownership of the first digital asset to the first user, or (ii) clear the reversible exchange by non-temporarily transferring the ownership to the exchanging user, and by distributing benefits in accordance with the asset-specific distribution rights.
Games console adaptor unit
An adaptor is provided for a games console which allows users to gain access to interactive television services through the games console. The adaptor includes a television tuner for receiving broadcast television channels, a communications controller which controls communications between the adaptor and the games console and an interface for interfacing the adaptor to the games console. In a preferred embodiment, the adaptor also includes a hard disc for storing video data and for storing game history data. The adaptor may also include a modem via which the user can gain access to remote servers connected to a data network.
Apparatus and method for managing parental control
A system that incorporates teachings of the present disclosure may include, for example, a device that can receive a parental control signal that designates undesired content, determine when a restricted user is interacting with a gaming software application, and modify a presentation of the gaming software application to remove the undesired content when the restricted user is interacting with the gaming software application. Additional embodiments are disclosed.
METHOD OF PROVIDING GAME BASED ON SECURITY LEVEL OF TERMINAL, AND APPARATUS FOR PERFORMING THE SAME
Disclosed herein are a method of providing a game based on the security level of a terminal and an apparatus for performing the same. The method of providing a game based on the security level of a terminal includes: when a user accesses a game using a terminal, checking the security level of the terminal for the account of the user; and determining whether to allow the disposal of in-game goods according to the found security level, but providing the game so that the game can be played regardless of the found security level.
VIDEO GAMES ON DEMAND WITH ANTI-PIRACY SECURITY
A method includes receiving, at a media device, a video game from a server via a network. The method includes installing, via the media device, the video game to a storage device associated with the media device. The method includes receiving, at the media device, a request to play the video game. The method includes sending an authorization request to the server from the media device via the network in response to the request. The method includes receiving authorization to execute the video game at the media device. The authorization is based on an identifier of the media device included in the authorization request being associated with rights allowing execution of the video game. The method also includes executing the video game via the media device in response to receiving the authorization.
Information processing device, information processing method, and computer program
There is provided an image processing apparatus including circuitry configured to acquire first authentication data from a first object and second authentication data from a second object, determine authenticity of the first object based on the first authentication data, determine authenticity of the second object based on the second authentication data, and change activation states of both the first object and the second object based on the determined authenticities of both the first object and the second object. When the determined authenticities of both the first object and the second object are determined to be authentic, the circuitry is further configured to change the activation states of both the first object and the second object.
Systems, methods and computer programs for delivering a multiplayer gaming experience in a distributed computer system
A multiplayer software “wrapper” is provided around a conventional single-player modality game. The wrapper allows multiple players, each with their own player device, to share a common multiplayer game session. The single player game is hosted on a game server and is coded to support only a single player device. The wrapper provides a multiplayer interface to the single-player game in a way that does not require any modification of the underlying game code or game server architecture. A centralized and automated gameplay system sits between, on the one hand, the multiple player devices and, on the other hand, the gameplay server hosting the single player. The gameplay system captures a sequence of image data representing a game result generated by performing a game action at the game server, and transmits the sequence of image data to multiple players in real-time video streams.