US 11,957,984 B2
Methods and systems for determining the authenticity of modified objects in a virtual environment
Kiyokuni Kawachiya, Kanagawa-ken (JP); and Michiaki Tatsubori, Kanagawa-ken (JP)
Assigned to Activision Publishing, Inc., Santa Monica, CA (US)
Filed by Activision Publishing, Inc., Santa Monica, CA (US)
Filed on Mar. 16, 2021, as Appl. No. 17/202,677.
Application 17/202,677 is a continuation of application No. 15/725,607, filed on Oct. 5, 2017, granted, now 10,981,069.
Application 15/725,607 is a continuation of application No. 13/533,359, filed on Jun. 26, 2012, granted, now 9,808,722, issued on Nov. 7, 2017.
Application 13/533,359 is a continuation of application No. 12/399,349, filed on Mar. 6, 2009, granted, now 8,230,045, issued on Jul. 24, 2012.
Claims priority of application No. 2008-058489 (JP), filed on Mar. 7, 2008.
Prior Publication US 2021/0268389 A1, Sep. 2, 2021
This patent is subject to a terminal disclaimer.
Int. Cl. A63F 13/75 (2014.01); A63F 13/71 (2014.01); A63F 13/79 (2014.01); G06F 21/64 (2013.01); G06N 3/006 (2023.01)
CPC A63F 13/75 (2014.09) [A63F 13/71 (2014.09); A63F 13/79 (2014.09); G06F 21/64 (2013.01); G06N 3/006 (2013.01); A63F 2300/5586 (2013.01); A63F 2300/575 (2013.01)] 22 Claims
OG exemplary drawing
 
1. A system for identifying whether an object has been modified in a virtual environment, the system comprising:
a server computer in communication with one or more client computers, the server computer configured to:
store information about the object in the virtual environment, wherein the information comprises at least a unique ID and authenticity data;
process a modification request from the one or more client computers, wherein the modification request corresponds to the object, wherein processing the modification request modifies the object to form the modified object, and wherein the modification request is processed by storing information corresponding to the modified object together with information corresponding to the object;
process a request for the modified object from the one or more client computers; and
generate authenticity information corresponding to the modified object, wherein the authenticity information indicates the modification of the object.