This application claims priority from Chinese Patent Application No. 201610649773.1 filed Jun. 29, 2016, which is incorporated by reference in its entirety.
1. TECHNICAL FIELD.
This application is directed to the field of reducing fraud in electronic games having virtual currencies, and more particularly to reducing the effect of hacking, collusion and other abuses in software games having one or more virtual currencies.
2. RELATED ART.
The “freemium” (free +premium) software model allows for software developers to generate revenue on their software while each end user is able to choose how much, if any, money she spends on the software. Usually, freemium software, typically games, operates by implementing some form of in-game virtual currency. Virtual currency is an in-game item that has value in the game, but not in the real world. The virtual currency may have value in the game, for example, because it may be used to enhance the player's abilities, modify actions in the game, purchase other virtual items in the game such as appearance items or the like. In the case of games that involve betting or gambling, virtual currency may be wagered.
End users, or players, may earn virtual currency in a different ways. For example, a game may provide virtual currency to a player if she completes certain tasks or activities in the game, such as playing the game a certain number of times, achieving a particular score, and the like. The game also may issue virtual currency as a bonus gift to the player based on various pre-determined parameters. If the virtual currency is used as a bet or wager, the end user may earn additional currency if she wins the bet or wager. Finally, some games allow end users to purchase virtual currency using actual currency.
As with all things of value, virtual currency and the games that use them are subject to manipulation by nefarious individuals attempting to obtain large amounts of virtual currencies. This is particularly true in games in which virtual currency may be both bought with actual money and obtained for “free” through in-game activities and the like (also called “giveaways”). In some cases, users may hack the game to get more giveaways than the system would otherwise distribute to the user. Hacking the game involves modifying the source code or otherwise manipulating the game software to achieve a particular outcome. As a simple example, players may change the clock setting on a computer to trick the game into performing a time-based action.
In other cases, users may collude with other players or even themselves by consolidating giveaways from multiple accounts. For example, in online poker games, chip dumping is a common occurrence. In a typical chip dumping scenario, one or more players may create multiple accounts and collect a number of “free chips” through giveaways across the multiple accounts. Once a desired number of “free chips” have been collected, the accounts may play on a single table where a designated account will “win” bets against the other accounts to consolidate the “free chips.”
Accordingly, a need has long existed for improved systems and methods that solve the technical problems associated with hacking and otherwise fraudulently manipulating electronic games.
Reducing fraud and collusion in an online multiplayer game having a virtual currency, such as poker chips, may include managing the distribution of virtual currency giveaways and limiting collusion among players likely to be using virtual currency obtained via the giveaways. In some embodiments, free chip distribution pools may be established to limit the amount of free chips distributed via (1) a particular distribution method, (2) to a particular player, (3) a combination of player and distribution method, and the like. In addition, players may be automatically assigned to a particular table and/or seat at the table based on a variety of factors that may indicate a likelihood that the player is using free chips, such as the player's level, the age of the player's account, the buy-in for a given table requested by the user, and the like. Other implementations also are described.
Other systems, methods, features, and technical advantages of the invention will be, or will become apparent to one with skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features, and technical advantages be included within this description, be within the scope of the invention, and be protected by the following claims.
The invention can be better understood with reference to the following drawings and description. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention.
The elements illustrated in the Figures interoperate as explained in more detail below. Before setting forth the detailed explanation, however, it is noted that all of the discussion below, regardless of the particular implementation being described, is exemplary in nature, rather than limiting. For example, although selected aspects, features, or components of the implementations are depicted as being stored in memories, all or part of systems and methods consistent with the contact management system architecture may be stored on, distributed across, or read from other machine-readable media, for example, secondary storage devices such as hard disks, floppy disks, and CD-ROMs; a signal received from a network; other forms of ROM or RAM either currently known or later developed; and the like.
Furthermore, although specific components of the communications architecture will be described, methods, systems, and articles of manufacture consistent with the contact management system architecture may include additional or different components. For example, a processor may be implemented as a microprocessor, microcontroller, application specific integrated circuit (ASIC), discrete logic, or a combination of other type of circuits or logic. Similarly, memories may be DRAM, SRAM, Flash or any other type of memory. Flags, data, databases, tables, and other data structures may be separately stored and managed, may be incorporated into a single memory or database, may be distributed, or may be logically and physically organized in many different ways, including unstructured data. Programs may be parts of a single program, separate programs, or distributed across several memories and processors. Systems may be implemented in hardware, software, or a combination of hardware and software in one processing system or distributed across multiple processing systems.
As shown in
Although references will now be made to specific components of the system performing specific features, it should be apparent to one of ordinary skill in the art that such references are exemplary and are not intended to limit the scope of the claims in any way; furthermore, the functionalities described herein may be implemented in a virtually unlimited number of configurations. For example, the game server may be implemented as a single server configured to provide all of the systems functionalities, or the functionalities may be implemented across multiple servers.
The client applications 20a and 20b may provide a user interface for the system and may communicate device specific information, user profile information, game data and other information with game server 40 via communications network 30. In one embodiment, client applications 20a and 20b may comprise stand-alone applications which may be either platform dependent or platform independent. For example, client applications 20a and 20b may be stand-alone applications for a mobile phone configured to run on a mobile operating system such as the iOS™ operating system from Apple Inc. located in Cupertino, Calif., the Android™ operating system from Google, Inc. located in Mountain View, Calif., or the like. Alternatively, or additionally, client systems may connect to the game server via the Internet using a standard browser application. Alternatively, or additionally, one or more of the client applications 20a and 20b may be an application configured to run on mobile computer such as a laptop computer, handheld computer, tablet, mobile messaging device, or the like which may all utilize different hardware and/or software packages. Other methods may be used to implement the client devices 20a and 20b.
The communications network 30 may be any type any private or public communication network, such as the Internet, and may include one or more communications networks. In some embodiments, the communications network 30 may be a cellular network such as, for example, a Code Division Multiple Access (CDMA) network, Global System for Mobiles (GSM) network, General Packet Radio Service (GPRS) network, cdmaOne network, CDMA2000 network, Evolution-Data Optimized (EV-DO) network, Enhanced Data Rates for GSM Evolution (EDGE) network, Universal Mobile Telecommunications System (UMTS) network, Digital Enhanced Cordless Telecommunications (DECT) network, Digital AMPS (IS-136/TDMA), Integrated Digital Enhanced Network (iDEN), Long-Term Evolution (LTE) and the like.
The game server 40 may store game data, user profile information and related information in a database 45, receive game data, device data, and user profile information from a client application 20a and 20b, implement game logic, provide a user interface for an administration inerface 50, and the like. As should be apparent to one of ordinary skill in the art from the disclosure herein, other related services may also be provided.
The database 45 may store a variety of information, including user profile information, user preference information, game data, tournament data, and the like. In some embodiments, all information stored in the database 45 is encrypted.
Exemplary Poker Game Using Virtual Currency
Although reference will now be made to certain embodiments described herein with reference to a poker game, the principles presented herein may be used for other games, such as black jack, roulette, slots and the like. In addition, the embodiments presented here may also be used in non-casino games that use virtual currencies. The embodiments illustrated herein should therefore not be interpreted to be exclusive or limiting, but rather exemplary or illustrative.
Referring to
In addition, the main lobby 200 may provide an interface control 208 that, upon selection by the user, presents the user with the opportunity to purchase various in-game items. Referring also to
In some embodiments, the user may be able to purchase additional in-game items using one or more of the virtual currencies. For example, a user may purchase avatars 310 (as shown in
Players also may be able to win virtual currency (such as gold chips 302) through one or more mini-games provided by the system 10. An exemplary virtual currency giveaway mini-game is shown in the screenshots 400a and 400b depicted in
Reward Management Rules
Game server 40 may authorize distribution of a reward by implementing reward management rules. In some embodiments, the reward management rules may include establishing one or more allotments of rewards that may be distributed by system 10 via a particular reward distribution method. For example, in embodiments that utilize poker chips, a reward allotment may be a pool of free chips that may be distributed via a reward distribution method, such as the lucky spin mini-game shown in
Limiting the distribution of free chips may provide several benefits. For example, one benefit that may be obtained by limiting the amount of chips in the game may be a better user experience by encouraging good plays. Another technical benefit that may be obtained by limiting chip distribution is to limit the impact of hackers creating fake accounts or finding a bug in a distribution method, such as the lucky spin mini-game.
Reward allotments (also referred to herein as free chip pools) may be established for each reward distribution method tied to the completion of in-game activities, also referred to as triggering events. For example, rewards may be distributed for completing a player registration process, completing an email validation process, completing a tutorial, playing a reward mini-game such as the lucky spin mini-game described above, collecting a timed reward package (such as a reward package that may be collected on a daily, hourly or other basis). In some embodiments, a set of in-game activities may be grouped, such as playing 100 hands or 500 hands, the completing of which may trigger a reward distribution. In some embodiments, free chips may be distributed to a registered player if their balance falls below a predetermined threshold, such as giving the player 300 chips if their balance falls below 200 chips. Other amounts also may be used.
The size of a reward allotment may be based on an expected number of chips that may be distributed via the pool's associated distribution method based on, for example, an expected or historical daily player count, expected or historical daily new player registrations and the like. Other parameters also may be factored into the size of a free chip allocation pool. Distributed rewards may be deducted from the allotment and reward allotments may be reset or reestablished at set intervals, such as once a day (e.g. 24 hour period), once an hour or the like. Other intervals also may be used.
In one embodiment, reward allotments may be established as follows: a first allotment of 11,500,000 may be established for the total amount of free chips that may be distributed in a 24 hour period; a second allotment of 1,500,000 may be established for rewards for email validation for a 24 hour period, and a third allotment of 10,000,000 may be established for reward via the lucky spin mini-game for a 24 hour period. The server 40 may compare a request for a reward distribution against one or more relevant reward allotments before authorizing the reward. If distribution of the reward would exceed an allotment, the request may be denied. If not, the reward amount may be subtracted from the reward allotment and the reward may be distributed to the player.
Other reward management rules also may be implemented. For example, a user may be limited to a predetermined number of uses of a distribution method over a given time. For example, a player may be limited to one spin of the lucky spin mini-game per day unless the player purchases additional spins as described above. As another example, a player may be limited to a single distribution for verifying an email account associated with the player's game account over the life of that game account. Other distribution methods limitations may be implemented.
Automatch
Another method by which the system 10 may prevent fraudulent behavior is by limiting the ability of players to choose a particular table or seat in certain conditions that indicate the player is likely to be using free chips. In some embodiments, conditions that indicate the player is likely to be using free chips may be table properties for the requested table, user properties for the requesting user, and the like. For example, players at low stakes tables and/or players with relatively new accounts may be likely to be using free chip. The age of an account may be based on chronological time, in-game activity (such as a number of hands played and the like). Other conditions also may be used to indicate a likelihood that a player is using free chips.
Referring to
Optionally, the server 40 may prevent the player from sitting at more than one table if it is likely that the player is using free chips. In such embodiments, the server 40 may determine if the user already is seated at a table at step 614 and, if so, the player may be returned to the lobby at step 612. If the player is not already seated at another table, the server 40 may determine if there are any open seats at an existing table that meets the requested table parameters at step 616 and, if so, may select that table at step 618. If no such table exists, the server 40 may create and select a new table that meets the requested table parameters at step 620. In either case, the system may determine whether any other players at the selected table have a common IP address with the requesting player at step 622 as a further step to reduce collusion among multiple accounts. If so, the player may be returned to the lobby at step 612. If no other players at the selected table share a common IP address with the requesting player, the server 40 may randomly select a seat and sit the player at the selected table and seat at step 624. As a result, the player may play at a table having their desired characteristics (as shown in
A system for reducing fraud, hacking and other exploitive behavior in an electronic game may comprise a first software module for use on a first device comprising one or more processors and one or more memories and a second software module for use on the server computer comprising one or more processors and one or more memories. The first software module may include instructions stored on a non-transitory computer readable medium that: provide a user interface to a user, the user interface including controls that allow a user to request a reward of an amount of a virtual currency via one or more reward distribution methods; transmit, to a server computer, a request for the reward via a first of the one or more reward distribution method. The second software module may include instructions stored on a non-transitory computer readable medium that: establish a reward allotments for each of said one or more reward distribution methods; receive the request from the first device; determine a reward amount to distribute to the user in response to the received request; and if the reward allotment for the first of the one or more reward distribution methods is greater than the reward amount, subtract the reward amount from the reward allotment for the first of the one or more reward distribution methods and distribute the reward amount to the user.
The reward allotment may be reestablished daily.
The reward amount may be randomly selected from a set of possible rewards.
The reward distribution methods may include at least one selected from the group comprising a player registration process, an email validation process, a tutorial, a reward mini-game and a timed reward package.
The reward allotment may be for the total amount of reward distributions that may be distributed on a given 24 hour period through all reward distribution methods.
The first software module may further include instructions stored on a non-transitory computer readable medium that: present a list of available tables to the user; receive a selection of one of the listed tables; and transmit, to the server computer, a request to play at the selected table. The second software module may further include instructions stored on a non-transitory computer readable medium that: receive, from the first device, the request to play at the selected table; determines if the selected table has restricted seating and if so, automatically sits the user at a table in accordance with restricted seating rules.
The determining if the selected table has restricted seating may include determining if a buy-in associated with the selected table falls below a predetermined threshold.
The automatic seating of the user at a table in accordance with restricted seating rules may include determining if a player's virtual currency total is equal to or greater than a buy-in associated with the selected table.
The automatic seating of the user at a table in accordance with restricted seating rules may include determining if the player is already seated at another table.
The player may have an associated IP address and the automatic seating of the user at a table in accordance with restricted seating rules may include determining if a second player having a common IP address with the player is already seated at the selected table.
While various embodiments of the invention have been described, it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible within the scope of the invention. Accordingly, the invention is not to be restricted except in light of the attached claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2016 1 0649773 | Jun 2016 | CN | national |
Number | Name | Date | Kind |
---|---|---|---|
5768382 | Schneier | Jun 1998 | A |
5779549 | Walker et al. | Jul 1998 | A |
6244958 | Acres | Jun 2001 | B1 |
8047909 | Walker et al. | Nov 2011 | B2 |
8500553 | Olomskiy | Aug 2013 | B2 |
8960676 | Costa | Feb 2015 | B2 |
8992319 | Pascal et al. | Mar 2015 | B1 |
9050530 | Sivak | Jun 2015 | B2 |
9101833 | Behmaram-Mosavat et al. | Aug 2015 | B2 |
9211474 | Wilkinson et al. | Dec 2015 | B2 |
9216358 | Hess et al. | Dec 2015 | B2 |
20020107072 | Giobbi | Aug 2002 | A1 |
20030070178 | Boyd | Apr 2003 | A1 |
20030216168 | Cannon et al. | Nov 2003 | A1 |
20030216968 | Barnhart | Nov 2003 | A1 |
20040005919 | Walker et al. | Jan 2004 | A1 |
20040077408 | D'Amico | Apr 2004 | A1 |
20040162132 | Jaffe et al. | Aug 2004 | A1 |
20040176167 | Michaelson et al. | Sep 2004 | A1 |
20060052168 | Shacham | Mar 2006 | A1 |
20060160612 | Parham | Jul 2006 | A1 |
20060175758 | Riolo | Aug 2006 | A1 |
20060287067 | White | Dec 2006 | A1 |
20060287103 | Crawford et al. | Dec 2006 | A1 |
20070129131 | Kaminkow | Jun 2007 | A1 |
20070155460 | Burnside | Jul 2007 | A1 |
20070232398 | Aikin et al. | Oct 2007 | A1 |
20070270211 | Moshal | Nov 2007 | A1 |
20080026816 | Sammon | Jan 2008 | A1 |
20080026826 | Groswirt | Jan 2008 | A1 |
20080070659 | Naicker | Mar 2008 | A1 |
20080146351 | Packes | Jun 2008 | A1 |
20080194334 | Kuok et al. | Aug 2008 | A1 |
20090121438 | Gustafsson | May 2009 | A1 |
20100035694 | Losica | Feb 2010 | A1 |
20100120490 | McLaughlin | May 2010 | A1 |
20100227675 | Luxton et al. | Sep 2010 | A1 |
20110045909 | Cole | Feb 2011 | A1 |
20110105208 | Bickley | May 2011 | A1 |
20110177863 | Davidson | Jul 2011 | A1 |
20110207526 | Kamano | Aug 2011 | A1 |
20110212766 | Bowers | Sep 2011 | A1 |
20130029739 | Ramsey et al. | Jan 2013 | A1 |
20130210512 | Meyer | Aug 2013 | A1 |
20130225282 | Williams | Aug 2013 | A1 |
20130244771 | Hafezi | Sep 2013 | A1 |
20130244786 | Hafezi | Sep 2013 | A1 |
20130244787 | Hafezi | Sep 2013 | A1 |
20130296036 | Scott | Nov 2013 | A1 |
20140194199 | DiGiovanni | Jul 2014 | A1 |
20150031431 | Burnside | Jan 2015 | A1 |
20150072747 | Burnside | Mar 2015 | A1 |
20150119137 | Alexander | Apr 2015 | A1 |
20150221183 | Colvin et al. | Aug 2015 | A1 |
20150248814 | Ottofy | Sep 2015 | A1 |
20150254936 | Stuppler | Sep 2015 | A1 |
20160071369 | Graves | Mar 2016 | A1 |
20160093169 | Orcutt | Mar 2016 | A1 |
20170124804 | Nelson | May 2017 | A1 |
Number | Date | Country |
---|---|---|
0067424 | Nov 2000 | WO |
2006036100 | Apr 2006 | WO |
2007085054 | Aug 2007 | WO |
2014128735 | Aug 2014 | WO |
Entry |
---|
Roman V. Yampolskiy, “Detecting and Controlling Cheating in Online Poker,” accessed on May 26, 2016, University at Buffalo, Buffalo, New York (6 pages.). |
Number | Date | Country | |
---|---|---|---|
20180001207 A1 | Jan 2018 | US |