US 11,654,365 B2
Secure anti-cheat system
Robert Bo Lundquist, Vallentuna (SE); and Niklas Per Sandén, Stockholm (SE)
Assigned to Electronic Arts Inc., Redwood City, CA (US)
Filed by Electronic Arts Inc., Redwood City, CA (US)
Filed on Jun. 14, 2021, as Appl. No. 17/347,346.
Application 17/347,346 is a continuation of application No. 16/575,165, filed on Sep. 18, 2019, granted, now 11,040,285.
Application 16/575,165 is a continuation of application No. 14/752,467, filed on Jun. 26, 2015, granted, now 10,427,048, issued on Oct. 1, 2019.
Claims priority of provisional application 62/139,210, filed on Mar. 27, 2015.
Prior Publication US 2022/0001283 A1, Jan. 6, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. A63F 13/71 (2014.01); A63F 13/35 (2014.01); A63F 13/5375 (2014.01)
CPC A63F 13/71 (2014.09) [A63F 13/35 (2014.09); A63F 13/5375 (2014.09)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
as implemented by an interactive computing system comprising one or more hardware processors configured to execute specific computer-executable instructions,
receiving an indication generated by a static loader of a first portion of a first application executing on a first computing system that the first application is executing, wherein the first portion of the first application is configured to communicate with a second portion of the first application executing at a host computing system separate from the first computing system;
transmitting executable code of a dynamic cheat detection module to the first computing system in response to the indication generated by the static loader;
receiving a request to obtain a set of cheat signatures from the dynamic cheat detection module executing at the first computing system;
transmitting the set of cheat signatures to the first computing system, wherein the set of cheat signatures are usable by the dynamic cheat detection module to determine whether portions of volatile memory of the first computing system indicate that a second application that is independent of the first application is executing on the first computing system, wherein the second application enables cheating in the first application;
receiving an indication from the dynamic cheat detection module that the second application is executing on the first computing system; and
responsive, at least in part, to receiving the indication that the second application is executing on the first computing system, performing a remediation action associated with the first application.