Patent classifications
A63F2300/5586
Server, terminal, network system, program and information storage medium
A server is connected to a terminal via a network, and manages registration of game information, the terminal performing a first game process that utilizes stored game information, and a second game process that utilizes registered game information. The server stores terminal identification information of the terminal and an allowable registration count of the terminal in a linked manner, updates the allowable registration count while being linked to the terminal identification information corresponding to a received update allowable registration count, transmits a registration permission notification to the terminal upon reception of a game information registration request from the terminal when the allowable registration count is equal to or larger than a given number, transmits a registration non-permission notification to the terminal when the allowable registration count is less than the given number, and decrements the allowable registration count when the server has transmitted the registration permission notification to the terminal.
AUTOMATICALLY IDENTIFYING POTENTIALLY FRAUDULENT GAMING ACCOUNTS
In example embodiments, a method of mitigating the effects of fraudulent usage of game accounts is disclosed. One or more values stored in one or more fields of a row of a database table maintained by the game networking system are received. The one or more fields correspond to features of a game account that are relevant to determining whether the game account is potentially being used fraudulently. Based on a combination of the one or more values transgressing a threshold value, it is determined that the game account is potentially being used fraudulently. At least some use of the potentially fraudulent game account is automatically locked to mitigate the effect of the potentially-fraudulent use.
SYSTEMS AND METHODS FOR ANTI-CHEAT DETECTION
Embodiments of the present disclosure provide systems, methods, and computer storage media directed to anti-cheat detection in online multiplayer video games. An anti-cheat kernel driver adapted to validate and secure a system state of a gaming device is loaded during a booting process of the gaming device. The loaded anti-cheat kernel driver ensures that the system state cannot be tampered with from the time of boot through the duration of gameplay. The loaded anti-cheat kernel driver can also receive anti-cheat modules communicated to the gaming device from an anti-cheat server, so that anti-cheat modules are received and executed on an ad hoc basis dictated by the anti-cheat server. The anti-cheat server can autonomously manage the anti-cheat operations performed on a kernel layer or application layer of the gaming device, and conduct anti-cheat mitigation operations if necessary.
Zone-based positioning for virtual worlds
Techniques are described for displaying avatars within a virtual environment in a way that avoids an appearance of offensive content. Embodiments of the invention receive a request specifying a first location within the virtual environment to move a first user-controlled virtual object to. A zone encompassing the specified location is then identified and a second location within the identified zone is determined. Embodiments then output the virtual environment for display in a manner that shows the first user-controlled virtual object positioned at the determined second location within the virtual environment.
MANAGING GAME METRICS AND AUTHORIZATIONS
Various metrics as may be deployed in an active, passive, or hybrid validation architecture are disclosed. A computing device configured to monitor network game activity may identify an inconsistency between user game data and a particular game metric governing a particular aspect of the network gaming environment. Upon identification of an inconsistency between game data and a game metric, which may indicative of illicit game play, a validation process (e.g., active, passive, and/or hybrid) may be implemented to further confirm the existence of illicit game. Alternatively, an action to maintain integrity of the gaming community may be executed without further confirmation whereby a purportedly illicit game device may be ejected from the network.
Determining whether object is genuine or fake in Metaverse
A server computer is connected to a plurality of client computers through a network, and controls objects in a Metaverse accessed by the client computers. The server computer includes a storage unit for storing an object ID specifying an object accessible in the Metaverse by the plurality of client computers and authenticity information associated with the object ID. The authenticity information indicates that the object is genuine. The server computer also includes a communication unit for communicating with each of the client computers. The server computer also includes an enquiry unit for causing the communication unit to transmit the authenticity information corresponding to the object ID to at least one of the plurality of client computers upon receipt of an enquiry request to enquire about the object ID of the object from one of the plurality of client computers.
Apparatus and method for managing parental control
A system that incorporates teachings of the present disclosure may include, for example, a device that can receive a parental control signal that designates undesired content, determine when a restricted user is interacting with a gaming software application, and modify a presentation of the gaming software application to remove the undesired content when the restricted user is interacting with the gaming software application. Additional embodiments are disclosed.
Auto harassment monitoring system
Methods, systems, and computer programs are provided for identifying an abusive player in a game. One method includes receiving gameplay data for a player during gameplay of the game. The method includes processing a plurality of game mechanics of the game as the player provides input for one or more of said plurality of game mechanics. The method includes processing abusive action scores for each of the plurality of game mechanics. The abusive action scores have a number of tagged actions that are inconsistent with predefined use of said plurality of game mechanics based a game context of the gameplay of the game. The method includes qualifying the player as abusive in regard to one or more of the plurality of game mechanics based on one or more of the abusive actions scores exceeding a threshold during a session of the gameplay of the game.
AUTOMATIC SEPARATION OF ABUSIVE PLAYERS FROM GAME INTERACTIONS
A method performed by at least one server computer is provided, including: during interactive gameplay of a multi-player video game, processing game state data to identify gameplay activity of a player as being abusive; responsive to the identifying the gameplay activity as being abusive, then applying a corrective action to the player during the interactive gameplay, the corrective action providing an indication to the player of the gameplay activity that was identified as being abusive; after applying the corrective action, further processing the game state data to identify additional gameplay activity of the player as being abusive; responsive to the identifying the additional gameplay activity as being abusive, then applying a penalty to the player.
METHODS AND SYSTEMS FOR GENERATING MULTIMEDIA CONTENT BASED ON PROCESSED DATA WITH VARIABLE PRIVACY CONCERNS
Methods and systems for filtering content in reconstructions of native data in assets. Specifically, the methods and systems extract telemetry data from native game data. The methods and systems then identify Personally Identifiable Information (“PII”) in the telemetry data and determine a masking operation to perform on the PII. The methods and systems then generate for presentation, in a user interface, reconstructed asset data based on the telemetry data, wherein the PII is modified in the reconstructed asset data based on the masking operation.