G06F2221/2109

Trusted communications between untrusting parties
11582209 · 2023-02-14 · ·

A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.

SYSTEM AND METHOD TO PREVENT SURVEILLANCE AND PRESERVE PRIVACY IN VIRTUAL REALITY
20230004676 · 2023-01-05 ·

Preserving user privacy and preventing surveillance on behalf of users of a virtual reality world. One or more plans are available when a privacy or surveillance risk to a user is detected. In one plan, configurable scripts execute on behalf of the user to create a confusing array of clone avatars that obfuscate the real user avatar behavior. A malevolent avatar, attempting to surveil the user, may have difficulty distinguishing the clones from the user and may miss out on private insights he might otherwise have learned from the user's behavior. In another exemplary privacy plan, a copy of part of the virtual world is spawned, occupied exclusively by the user's avatar, and then merged into the main world. Privacy plans may be selected manually or automatically in response to perceived privacy threats to strike a balance between privacy and enjoyment within the virtual world.

Systems and methods for providing access to wireless gaming devices

Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.

Center device

Methods and apparatus provide for: facilitating communication between one or more controller devices operated by one or more users, respectively, and a data processing apparatus running an application program, wherein each controller device includes a plurality of actuation elements that are operable to be manipulated by a respective one of the one or more users to input desired operations to the data processing apparatus for use by the application program; obtaining a respective controller identifier from each of the one or more controller devices; and storing in a memory the controller identifiers in response to the control section in a sequential table, such that each entry in the sequential table includes at least a sequential table entry number and a respective one of the controller identifiers.

3D DATA SYSTEM, SERVER, AND METHODS OF HANDLING 3D DATA
20220335144 · 2022-10-20 ·

A 3D data system includes: a storage means that stores a correspondence, for each of a plurality of 3D data sets, each including a data body representing 3D model, share restriction information describing restrictions on a scope for sharing the data body, the process restriction information describing restrictions on the processing of the 3D model, the correspondence being among the data identifier of the 3D data set, the user identifier of a user who is a subject in the data body included in the 3D data set, and a user identifier of another user who shares the 3D data set from the user; a request receiving means that receives a processing request including a user identifier from the service application; an authenticating means that authenticates the user who has made the request performs the processing; and a response transmitting means that transmits at least a part of the data body and at least a part of the processing limit information to the service application.

Game engine-based computer security

A game engine sensor of a computing device executing an operating system receives first data from the operating system that represents occurrence of a monitored event. The game engine sensor sends second data corresponding to the monitored event to a game engine logic controller. A first logic block of the game engine logic controller determines, based on the second data and third data representing a system state of the computing device, that a first predicate condition is satisfied. A second logic block of the game engine logic controller determines, based on the second data and the third data, that a second predicate condition is satisfied. A computer security threat is detected based on the first and second predicate conditions being satisfied, and at least one game engine actuator is instructed to perform at least one action responsive to the computer security threat.

Online game mobile controller

Embodiments of the present invention are directed to an online gaming mobile controller. A computer-implemented method is provided that generates, using a processor, a QR code containing a web address for a gaming session and provides, using the processor, the QR code to a monitor. The method receives, using the processor, a request for serving a web page for the web address from a user device and provides, using the processor, an authentication page for entering a PIN code to the user device. The method provides, using the processor, a PIN code to the monitor and receives, using the processor, an entered code from the user device. When the entered code matches the PIN code, the method associates the user device with the gaming session.

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO WIRELESS GAMING DEVICES

Systems and methods for controlling access to wireless gaming devices and networks are provided. example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.

Secure bootloader for electronic gaming machines and other computing devices

Systems and techniques for providing one or more authenticable operating system volumes on an electronic gaming machine are provided. The systems and techniques may, for example, involve storing one or more datasets, each representing one or more operating system volumes for an operating system, on a shadow partition and then selecting one of those datasets as part of the boot process, authenticating it, and creating one or more operating system volumes on one or more operating system partitions of the electronic gaming machine. The systems and techniques may further involve causing a kernel of the operating system to execute from the newly created one or more operating system volumes only after authentication is successfully performed.

System, method and computer-accessible medium for supporting at least one cyber-physical signaling game
11652803 · 2023-05-16 · ·

Exemplary system, method, and computer-accessible medium for transmitting or generating an encrypted message(s) to or for a receiver(s) from a sender(s), can be provided, which can include, for example, generating an electronic public key(s) and an electronic private key(s) for the sender(s), generating first information based on (i) data of the sender(s), (ii) a state(s) of the sender(s), and/or (iii) a type of the sender(s), electronically selecting an electronic message signal(s) and a time stamp(s) based on the first information, generating a message(s) based on the electronic message signal(s) and the time stamp(s), generating the encrypted message(s) by encrypting the message(s) using the electronic private key(s), and transmitting the encrypted message(s) to the receiver(s).