The invention relates generally to videogames, and more particularly to systems and methods that prevent against the use of certain videogame peripherals with unauthorized videogame software through the use of “protected” and “unprotected” inputs.
Videogames provide a source of entertainment for many people. Videogames provide an interactive experience for a user, an experience that can be both interesting and challenging. Videogames may provide users the opportunity to engage in activities otherwise unavailable to them or activities which may, except through the simplification provided by videogames, otherwise require extensive training or practice. Videogames may also provide for increasing levels of difficulty, allowing for growth of user capabilities.
Users typically interact with videogames using one or more videogame peripherals (also referred to herein as “peripherals”). Videogame peripherals may be used to obtain an input (e.g., direct input, measured input, etc.) from a user. Videogame peripherals may include, without limitation, a game controller, a gamepad, a keyboard, a mouse, an imaging device such as a camera, a motion sensing device, a light sensor, a biometric sensor, a virtual reality headset, and/or other devices that can obtain an input from a user. Certain videogames have peripherals specifically designed for the game. One example of such videogames is the music videogame, which sometimes employs musical instrument peripherals and/or peripherals resembling musical instruments. Music videogames include Activision Publishing, Inc.'s Guitar Hero and DJ Hero franchises, Harmonix Music Systems, Inc.'s Rock Band franchise, and Ubisoft Entertainment's Just Dance franchise. Other examples of videogames having peripherals specifically designed for the game include racing games with steering wheel peripherals, sports games with sports equipment peripherals, and hunting or combat games with firearm peripherals.
Videogame companies often invest significant resources in designing and manufacturing videogame peripherals to ensure they work optimally with a particular videogame and deliver a desirable user experience. Accordingly, videogame companies may have an interest in preventing use of their peripherals with unauthorized videogame software or systems that do not offer a satisfactory quality of gameplay or user experience. Likewise, videogame companies may design videogame software to work with a particular peripheral and may have an interest in preventing use of the videogame software with unauthorized peripherals not meeting expected quality or user experience levels.
The invention relates generally to videogames, and more particularly to systems and methods that prevent against the use of certain videogame peripherals with unauthorized videogame software through the use of “protected” and “unprotected” inputs.
One aspect of the invention relates to a videogame system comprising videogame software executing on a videogame console and a peripheral coupled to the videogame console. The peripheral comprises one or more protected inputs and one or more unprotected inputs. The protected and unprotected inputs may be comprised of any input(s) found on the peripheral, for example, gamepad buttons, joystick or analog stick inputs, action buttons, start/select buttons, trigger buttons, touchpads, keyboard keys, steering wheels, strum bars, whammy bars, drum pad inputs, etc. Note the term “input” as used herein encompasses any single input or any plurality of inputs actuated in combination or in sequence. For example, actuating a plurality of buttons simultaneously or in a particular sequence may be considered an “input.”
The protected inputs are, by default, disabled until the peripheral receives an unlocking message from the videogame console, while the unprotected inputs are enabled by default. In one embodiment, the protected inputs are inputs only used during gameplay of the videogame software, while the unprotected inputs can be used both within and outside gameplay, for example, to navigate videogame or console menus. In such an embodiment, the peripheral may be useful outside of gameplay but unsuitable for gameplay until an unlocking message is received.
In one implementation of the invention, the peripheral includes a countdown timer. After unlocking the protected inputs in response to receiving an unlocking message from the videogame software, the peripheral begins the countdown timer. The peripheral disables or re-locks the protected inputs upon expiration of the countdown timer. If and when the peripheral receives another unlocking message from the videogame software or console, however, the peripheral resets the countdown sequence and unlocks the protected inputs (if the countdown time has expired) or keeps the protected inputs in an unlocked state (if the countdown timer has not expired).
In one implementation of the invention, the unlocking message may determine the countdown timer's starting value. For example, the unlocking message may include a header and a payload. The unlocking message's payload may include the starting value to be used to set the starting value of the countdown timer (e.g., 1 millisecond, 1 second, 10 seconds, etc.). In this way, the countdown timer's starting value may be set and changed by the videogame software or console software.
In one implementation of the invention, the videogame software may periodically send unlocking messages to the peripheral. The interval at which the videogame software sends unlocking messages to the peripheral may, in some implementations, be shorter than the value of the countdown timer to help ensure the peripheral remains unlocked while the videogame software is executing.
In one implementation of the invention, the peripheral may be wirelessly coupled to the videogame console. In some embodiments, the wireless peripheral may communicate directly with wireless communications circuitry in the videogame console. Additionally or alternatively, the peripheral may wirelessly communicate with a wireless transceiver component physically coupled to the console. In some implementations, the aspects of the control circuitry relating to the protected and unprotected inputs may be found in the peripheral, the wireless transceiver component, and/or the videogame console itself.
In one implementation of the invention, the unlocking message may be cryptographically secured to prevent unauthorized access.
One implementation of the invention provides a guitar-shaped videogame peripheral, comprising: one or more protected inputs; one or more unprotected inputs; a plurality of fret buttons; a strum bar; a countdown timer; wherein enablement of the one or more protected inputs is based on receipt of an unlocking message by the guitar-shaped videogame peripheral; and wherein the one or more unprotected inputs are not disabled.
One implementation of the invention provides a system for providing a music videogame, the system comprising: a peripheral coupled to a videogame console, the peripheral comprising one or more protected inputs, one or more unprotected inputs, and a countdown timer; videogame software executing on the videogame console, the videogame console comprising one or more physical processors programmed with one or more computer program instructions which, when executed, programs the console to transmit an unlocking message to the peripheral; wherein the peripheral's one or more protected inputs are disabled until the peripheral receives the unlocking message sent by the console; wherein the one or more unprotected inputs not disabled; and wherein the unlocking message comprises a countdown value to be programmed into the countdown timer of the peripheral.
One implementation of the invention provides a method of processing videogame peripheral inputs, comprising: locking at least one protected input of the videogame peripheral, the videogame peripheral including the protected inputs and unprotected inputs which are not locked; receiving an unlocking message for the at least one protected input, the unlocking message including a value indicative of a countdown time; unlocking the at least one protected input based upon receipt of the unlocking message; starting a timer; and locking the at least one protected input upon the timer reaching a time reflective of the countdown time.
These and other objects, features, and characteristics of the system and/or method disclosed herein, as well as the methods of operation and functions of the related elements of structure and the combination of parts and economies of manufacture, will become more apparent upon consideration of the following description and the appended claims with reference to the accompanying drawings, all of which form a part of this specification, wherein like reference numerals designate corresponding parts in the various figures. It is to be expressly understood, however, that the drawings are for the purpose of illustration and description only and are not intended as a definition of the limits of the invention. As used in the specification and in the claims, the singular form of “a”, “an”, and “the” include plural referents unless the context clearly dictates otherwise.
The invention relates generally to videogames, and more particularly to a system and method that prevents against the use of certain videogame peripherals with unauthorized videogame software through the use of “protected” and “unprotected” inputs.
Although not explicitly shown, the videogame console in
The videogame peripheral 105 of
The inputs of the videogame peripheral are manipulated by a user of the videogame peripheral and generate input signals based on the user manipulations. The videogame console and videogame software receive the input signals generated by the videogame peripheral and processes the videogame based on the received input signals. In various combinations, the videogame console may simultaneously receive and process input signals from more than one connected videogame peripheral.
The display unit in
In the music videogame of
In operation, the processor executes videogame instructions to facilitate gameplay for a particular videogame. The processor may communicate with each individual component in the processing unit as needed to facilitate gameplay. In some embodiments, the processor retrieves specific instructions for a videogame from a removable memory source holding videogame software. The processor may process the videogame instructions based on general program instructions the processor retrieves from the memory.
Videogame execution is also based, in part, on input signals received from connected videogame peripheral(s), which communicate with the processor through either the user input/output port or through a wireless connection interface, as illustrated in
In some embodiments, communication between a videogame peripheral and the videogame console's processor may be bidirectional such that the videogame peripheral may both transmit and receive communications to or from the processor. As discussed in more detail herein, communications received by the videogame peripheral from the processor may be used to implement the security protocol of the present invention.
Referring again to the videogame system of
According to aspects of the invention, the videogame peripheral of
In some embodiments, the protected inputs are a subset of the peripheral's inputs (i.e., the protected inputs do not include all of the peripheral's inputs). In other embodiments, the protected inputs are specific sequences and/or combinations of inputs. In such cases, the peripheral may further comprise one or more unprotected inputs that are enabled by default and do not need to be unlocked for use.
According to aspects of the invention, inputs can be classified as being useful only within gameplay, being useful only outside of gameplay (e.g., to navigate videogame menus or console menus), or useful both within and outside of gameplay. In some embodiments, the protected inputs may comprise one or more inputs useful only within gameplay, while the unprotected inputs comprise one or more inputs only useful outside of gameplay or useful within and outside of gameplay. In the example of
According to aspects of the invention, the protected inputs are disabled until unlocked. In some embodiments, the protected inputs are unlocked when the peripheral receives from the videogame software or console an unlocking message. In some embodiments, all protected inputs may be unlocked by a single unlocking message, though in other embodiments, different unlocking messages may be required to unlock different protected inputs.
In some embodiments, the videogame peripheral includes one or more countdown timers. After unlocking one or more protected inputs, for example, in response to receiving an unlocking message, the videogame peripheral initiates the countdown timer. The videogame peripheral disables (or “re-locks”) the unlocked protected inputs upon expiration of the countdown timer. If, however, the videogame peripheral receives another unlocking message before the countdown timer's expiration, the videogame peripheral resets the countdown timer and the protected inputs remain unlocked. In some embodiments, aspects of the control circuitry relating to the protected and unprotected inputs may be found in the console, the wireless transceiver coupled to the console, and/or the peripheral itself. In some embodiments, the protected inputs may be unlocked by default, but locked after no unlocking message is received before the countdown timer's expiration.
In some embodiments, the unlocking message may contain data representing the countdown timer's starting value (or “countdown value”). For example, the unlocking message's payload may include the starting value to be programmed into the countdown timer (e.g., millisecond, 1 second, 10 seconds, etc.). The countdown timer's starting value may thus be set or changed by the software sending the unlocking messages (e.g., videogame software or console software). In some embodiments, the unlocking messages are sent periodically at specific intervals, and the countdown value may be a function of the interval for sending unlocking messages. For example, the countdown value may be ten (or any other factor) times the interval for sending unlocking messages. In that example, if unlocking messages are sent every one second, the countdown value would be ten seconds. As another example, the interval for sending unlocking messages may be a certain number of seconds greater than the countdown value (e.g., countdown value+X seconds). Utilizing a countdown value greater than the interval for sending unlocking messages, helps mitigate against unsuccessfully delivered unlocking messages (e.g., those that were dropped due to an unreliable connection between the console and peripheral).
In one implementation of the invention, the unlocking message may be cryptographically secured to prevent unauthorized access. For example, the unlocking message may be encrypted or scrambled amongst other messages. In some embodiments, a 2-way handshake may be required between the console and peripheral before unlocking messages are sent.
The various processing operations and/or data flows depicted in the exemplary flowcharts of
In an operation 413, the process receives a message. The message could, for example, be sent by software running on a videogame console (e.g., videogame software or console system software) and received by a videogame peripheral coupled to the videogame console.
In an operation 415, the process determines whether the received message is encrypted. If so, the process decrypts the message in an operation 417 and proceeds to an operation 419. If not the process proceeds directly to an operation 419. In some embodiments in which no encryption is utilized, the process skips operation 415 altogether and proceeds directly to an operation 419.
In an operation 419 the process determines if the message is an unlocking message. In some embodiments, the message type may be encoded in the message header, as described in connection with
In operations 513 and 515, the process receives an unlocking message and unlocks one or more protected inputs. The receiving of an unlocking message and unlocking operations may be similar to those described in connection with
In an operation 517, the process retrieves from the unlocking message's payload a countdown value.
In an operation 519, the videogame peripheral's countdown timer is set to the countdown value obtained from the unlocking message.
In an operation 521, the countdown timer begins.
In an operation 523, the process determines if an additional unlocking message has been received before the expiration of the countdown timer. If the countdown timer expired before an additional unlocking message is received, the process proceeds to an operation 525, in which the one or more protected inputs previously unlocked in operation 515 are again locked by the process. On the other hand, if an additional unlocking message is received before the countdown timer's expiration, the process proceeds to an operation 513 and repeats the process of receiving an unlocking message, unlocking one or more protected inputs, and programming the videogame peripheral's countdown timer with the unlocking message's countdown value.
As discussed above, the countdown value can be representative of any time value (e.g., 100 millisecond, 1 second, 1 minute, etc.), and in some embodiments, is a function of the interval for sending unlocking messages. For example, the countdown value may be the interval for sending unlocking messages multiplied by some factor (e.g., 10, 50, 100). In this manner, the console will send multiple unlocking messages before the countdown timer expires. Additionally or alternatively, the countdown timer may be dynamically adjusted. If, for example, it is determined that unlocking messages sent from the console to the peripheral are being dropped due to an unreliable coupling between the console and peripheral, the software sending the unlocking messages may increase the value of the countdown timer to allow more unlocking messages to be sent before the countdown timer expires.
Other implementations, uses and advantages of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. The specification should be considered exemplary only, and the scope of the invention is accordingly intended to be limited only by the following claims.
This application claims the benefit of the filing date of U.S. Provisional Patent Application No. 62/182,348, filed on Jun. 19, 2015, the disclosure of which is incorporated by reference herein.
Number | Name | Date | Kind |
---|---|---|---|
6225547 | Toyama | May 2001 | B1 |
6252153 | Toyama | Jun 2001 | B1 |
6353174 | Schmidt | Mar 2002 | B1 |
6429863 | LoPiccolo | Aug 2002 | B1 |
6482087 | Egozy | Nov 2002 | B1 |
6905413 | Terao | Jun 2005 | B1 |
7320643 | Brosius | Jan 2008 | B1 |
7459624 | Schmidt | Dec 2008 | B2 |
7625284 | Kay | Dec 2009 | B2 |
7758427 | Egozy | Jul 2010 | B2 |
8079901 | Brosius | Dec 2011 | B2 |
8079907 | Egozy | Dec 2011 | B2 |
8371940 | Robinson | Feb 2013 | B1 |
8439733 | Kay | May 2013 | B2 |
8444464 | Boch | May 2013 | B2 |
8444486 | Kay | May 2013 | B2 |
8449360 | Stoddard | May 2013 | B2 |
8465366 | Applewhite | Jun 2013 | B2 |
8550908 | Booth | Oct 2013 | B2 |
8562403 | Boch | Oct 2013 | B2 |
8568234 | Dubrofsky | Oct 2013 | B2 |
8636572 | Applewhite | Jan 2014 | B2 |
8663013 | Egozy | Mar 2014 | B2 |
8678895 | Teasdale | Mar 2014 | B2 |
8678896 | Pitsch | Mar 2014 | B2 |
8690670 | Kay | Apr 2014 | B2 |
8702485 | Flury | Apr 2014 | B2 |
8777744 | Basallo | Jul 2014 | B2 |
8874243 | Bennett | Oct 2014 | B2 |
9278286 | Bennett | Mar 2016 | B2 |
9358456 | Challinor | Jun 2016 | B1 |
9704350 | Rigopulos | Jul 2017 | B1 |
9842577 | Brosius | Dec 2017 | B2 |
9981193 | Adams | May 2018 | B2 |
9987557 | Garbowski | Jun 2018 | B2 |
10102836 | Mintz | Oct 2018 | B2 |
10220303 | Schmidt | Mar 2019 | B1 |
10357714 | Challinor | Jul 2019 | B2 |
10421013 | Challinor | Sep 2019 | B2 |
20050215319 | Rigopulos | Sep 2005 | A1 |
20060058101 | Rigopulos | Mar 2006 | A1 |
20080113698 | Egozy | May 2008 | A1 |
20080113797 | Egozy | May 2008 | A1 |
20090165632 | Rigopulos | Jul 2009 | A1 |
20100009750 | Egozy | Jan 2010 | A1 |
20100029386 | Pitsch | Feb 2010 | A1 |
20100041477 | Kay | Feb 2010 | A1 |
20100304810 | Stoddard | Dec 2010 | A1 |
20100304811 | Schmidt | Dec 2010 | A1 |
20100304812 | Stoddard | Dec 2010 | A1 |
20100304863 | Applewhite | Dec 2010 | A1 |
20100304865 | Picunko | Dec 2010 | A1 |
20110256929 | Dubrofsky | Oct 2011 | A1 |
20110257771 | Bennett | Oct 2011 | A1 |
20110312397 | Applewhite | Dec 2011 | A1 |
20110312415 | Booth | Dec 2011 | A1 |
20120094730 | Egozy | Apr 2012 | A1 |
Entry |
---|
“Guitar Hero” for iPhone review of Jun. 7, 2010; webpage downloaded from www.replacementdocs.com, Jan. 5, 2021. |
Number | Date | Country | |
---|---|---|---|
20160367902 A1 | Dec 2016 | US |
Number | Date | Country | |
---|---|---|---|
62182348 | Jun 2015 | US |