A63F2300/5586

SYSTEM AND METHODS OF VIRTUAL WORLD INTERACTION

Systems and methods of virtual world interaction, operation, implementation, instantiation, creation, and other functions related to virtual worlds (note that where the term “virtual world” is used herein, it is to be understood as referring to virtual world systems, virtual environments reflecting real, simulated, fantasy, or other structures, and includes information systems that utilize interaction within a 3D environment). Various embodiments facilitate interoperation between and within virtual worlds, and may provide consistent structures for operating virtual worlds. The disclosed embodiments may further enable individuals to build new virtual worlds within a framework, and allow third party users to better interact with those worlds.

Selective Recommendation by Mapping Game Decisions and Behaviors to Predefined Attributes
20230102506 · 2023-03-30 · ·

A computer that selectively provides a recommendation is described. During operation, the computer may obtain game information associated with one or more video games played by an individual, where the game information specifies decisions and behaviors in the one or more video games while the individual played the one or more video games. Then, the computer may compute, for the individual, scores for a set of predefined attributes associated with occupations based at least in part on the decisions and/or the behaviors. Next, the computer may selectively provide the recommendation based at least in part on the computed scores, where the recommendation is associated with: an academic area of study for the individual, an employment opportunity for the individual, and/or an occupation for the individual.

DETECTING CHEATING AND CHANGES IN PLAYING ABILITY IN PARTIAL KNOWLEDGE AND TRICK-TAKING GAMES
20230084016 · 2023-03-16 ·

Examples herein include systems for detecting cheating and changes in mental performance in card games, including bridge. The system can acquire board data for multiple events, the events including bridge games. For each event, determining performance values for a player based on the board and play data, wherein the performance values may additionally be based in part on timing data. The system can detect a deviation of by comparing the performance values against a threshold, wherein the threshold is based on past performance of known cheating players or the individual player. Then the system can alert a user when the likelihood of cheating or other changes exceeds a threshold.

ELECTRONIC DEVICE AND METHOD FOR DETECTING ABNORMAL DEVICE OPERATION

An electronic device and a method for detecting abnormal device operation are provided. The method includes: obtaining multiple action events of a movable input device, and each action event including a relative coordinate and a time stamp of the movable input device; generating multiple absolute coordinates based on the relative coordinate of each action event; estimating multiple speed vectors based on the absolute coordinates and the time stamp of each action event; estimating multiple acceleration vectors based on the speed vectors and the time stamp of each action event; and estimating a probability of abnormal operation based on the speed vectors and the acceleration vectors.

Methods and apparatus for distributed gaming over a mobile device

A system and method are provided for updating game participants. In some embodiments, the participants receive game control information via a one-way broadcast. The method selects a set of sampling participants from the set of all participants of a game. In some embodiments, the selection occurs prior to the start of the game. The method of some embodiments establishes a two-way connection between a server and each of the sampling participants. For some embodiments, the two-way connection is realtime. The method continuously maintains the two-way connection throughout the game. During each discrete game period, the method receives from a sampling participant, data for the sampling participant's game period performance. Based on the received data, the method determines the performance for the game period and broadcasts this information to a non-sampling participant. A non-sampling participant is a participant who was not selected for the set of sampling participants. In some embodiments, the non-sampling participant determines a standing relative to the other participants in the game event. Some embodiments provide a method and system for detecting unusual performance in a game. The game has a participant. The method calculates for the participant an average performance level. Based on the average performance level, the method tracks for the participant a participant improvement factor and stores the participant improvement factor. The method compares the participant improvement factor to a threshold value.

METHOD TO DETECT AND COUNTERACT SUSPICIOUS ACTIVITY IN AN APPLICATION ENVIRONMENT

Aspects of the subject disclosure may include, for example, comparing an input received from a peripheral device associated with an execution of a gaming application with a threshold value, wherein the threshold value is based on a first identification of a first user, a second identification of the peripheral device, and a third identification of stimuli presented as part of the execution of the gaming application. Responsive to the comparing, a determination may be made that the input exceeds the threshold value. Responsive to the determination, a validation request may be transmitted to a user device of the first user. Other embodiments are disclosed.

INFORMATION PROCESSING SYSTEM, COMPUTER-READABLE NON-TRANSITORY STORAGE MEDIUM STORING THEREIN INFORMATION PROCESSING PROGRAM, INFORMATION PROCESSING APPARATUS, AND INFORMATION PROCESSING METHOD
20230149817 · 2023-05-18 · ·

An exemplary information processing system is configured to create a route formed by arranging, in a virtual space, a plurality of route parts each associated with a design; determine whether the route created by the user contains a forbidden symbol or a forbidden word. When the route created by the user contains a forbidden symbol or a forbidden word, uploading of the route created by the user to the server is prohibited.

Game console system, method and computer program product with anti-malware/spyware and parental control capabilities

A system, method and computer program product are provided for securing a game console capable of processing game-related data. In use, the game-related data is scanned for detecting malware. Additionally, the game-related data is scanned for detecting spyware. Further, parental controls are executed during use of the game console.

Methods and systems for filtering content in reconstructions of native data of assets
11484800 · 2022-11-01 · ·

Methods and systems for generating incident recommendations in processed data using machine learning models. Specifically, the methods and system extract telemetry data from native game data. By reducing game data to telemetry data only, the system may reduce the amount of data that must be stored and processed. The system reconstructs game data in order to generate an incident recommendation. This reconstructed data allows for manual user review and/or understanding the context of an incident.

Filtering and parental control methods for restricting visual activity on a head mounted display

A method for executing computer instructions for presenting an interactive environment in a head-mounted display (HMD) is described. The method includes identifying content associated with the interactive environment to be presented on the HMD for a user and determining whether an interactive object within the identified content satisfies a threshold for presentation to the user. The method includes augmenting the interactive object with augmentation data. The augmented data acts to change a characteristic of the interactive object. The operation of augmenting the interactive object is performed after determining that the interactive object does not satisfy the threshold for presentation to the user. The augmentation data modifies the interactive object to conform the interactive object to be within the threshold.