Service-based prevention of stream sniping

    公开(公告)号:US10694252B1

    公开(公告)日:2020-06-23

    申请号:US15907053

    申请日:2018-02-27

    Abstract: Techniques for stream sniping prevention are disclosed herein. A video game player may provide captured video of the video game for transmission to viewers. In some examples, an obfuscation component may detect, within the captured video, private game information regarding the player, for example using one or more non-visual detection techniques. The private game information may then be obfuscated in the video that is provided to the viewers, while still allowing the private game information to be displayed to the player. Also, in some examples, a user may issue a request associated with a video game, such as a request to join a video game, game server, and/or match. It may then be determined whether the user is currently receiving video of the video game from the player. If so, then the user may be blocked from joining the same video game, game server, and/or match as the player.

    Entity-component architecture with components having multiple configurations

    公开(公告)号:US10603583B1

    公开(公告)日:2020-03-31

    申请号:US15270037

    申请日:2016-09-20

    Abstract: Techniques for implementation of an entity-component architecture with components having multiple configurations are described herein. In some examples, at least one component within an entity-component architecture of a video game may have multiple different configurations. Each of the multiple configurations may, for example, relate to a different respective deployment context in which the configuration will be deployed. For example, in some cases, the different configurations may be defined for different device types, such as client, server, and others. Additionally, in some cases, the different configurations may be defined for different types of game consoles, and other different software, hardware, and/or contextual attributes. Furthermore, in some cases, configurations may be defined for use during video game development, such as within an editing interface that is used for video game development.

    Selective data replication
    3.
    发明授权

    公开(公告)号:US10545989B1

    公开(公告)日:2020-01-28

    申请号:US14954223

    申请日:2015-11-30

    Abstract: Computer implemented systems and methods for distributing replica chunks are disclosed. Computing nodes in the network are assigned to zones that correspond to functions performed by the nodes in the network. Replica chunks are likewise associated with the zones that are typically used in processing the replica chunks. When the owner of a replica chunk identifies a new node, it distributes to the new node those replica chunks that are associated with a zone that matches the zone associated with the new node. The owner of the replica chunk is further programmed to receive requests from nodes to subscribe to a data chunk. The node replicates the data chunk to those nodes in the network that have subscribed to the data chunk. When a node no longer requires access to a data chunk, the node unsubscribes from receiving the data chunk.

    Data conversion handler for a run-time execution environment

    公开(公告)号:US10915507B1

    公开(公告)日:2021-02-09

    申请号:US14465150

    申请日:2014-08-21

    Abstract: A method and apparatus for data conversion in a run-time execution environment are provided. In the method and apparatus, a data request specifying a second schema for requested data is received. A data portion is retrieved from a data store, whereby the retrieved data has a first schema. On a condition that the first schema and the second schema are determined to be different, the data portion is converted to the second schema to produce a converted data portion, whereby the conversion is performed based at least in part on data conversion information. The converted data portion is then provided to the run-time execution environment for use in a run-time execution of the computer program.

    Dynamic distribution of simulation load

    公开(公告)号:US10484249B1

    公开(公告)日:2019-11-19

    申请号:US14859186

    申请日:2015-09-18

    Abstract: Techniques for distributing processing loads in a multi-node computing environment are described. Ownership of objects of a simulation scenario is assigned to a plurality of computing nodes based on a processing load distribution associated with the simulation scenario. The simulation scenario is executed on the plurality of computing nodes, and processing loads on the computing nodes are monitored. When a processing load of one of the computing nodes has reached a threshold, objects allocated to the one node are reassigned based on properties of a subset of the objects of the simulation scenario. The properties are based on a measure of interaction between the objects in the subset.

    Object ownership migration
    6.
    发明授权

    公开(公告)号:US10298679B1

    公开(公告)日:2019-05-21

    申请号:US14859140

    申请日:2015-09-18

    Abstract: A computing system is disclosed for reassigning ownership of a data object between computing nodes. A first computing node having control of a data object transmits a hand-off message indicating control of the data object is being transferred to a second computing node. The first computing node queues requests received at the first computing node relating to the data item. A third computing node that interacts with the data object receives the hand-off message and, in response, delays transmitting requests relating to the data object. The third computing node transmits an acknowledgment to the first computing node. Upon receipt of the acknowledgment, the first computing node communicates to the second computing node to assume ownership and transmits any requests that had queued at the first node. When the second computing node receives the message, it transmits a message claiming control of the data object. In response to the message claiming control, the third computing node transmits its queued requests relating to the data item to the second computing node.

    Multi-node object simulation
    7.
    发明授权

    公开(公告)号:US10230583B1

    公开(公告)日:2019-03-12

    申请号:US14859189

    申请日:2015-09-18

    Abstract: Techniques for simulation of objects in a multi-node environment are described herein. Ownership of objects in a simulation scenario is assigned to a plurality of nodes based on a first set of criteria. Simulation authority of the first object is assumed by a second node based on a second set of criteria. Simulation of the first object is performed by the second node without previous acknowledgment, by the first node, of the assumption of simulation authority. Ownership of the first object is maintained by the first node during the time that the second node has simulation authority of the first object.

    Object subscription rule propagation

    公开(公告)号:US10917467B1

    公开(公告)日:2021-02-09

    申请号:US16160202

    申请日:2018-10-15

    Abstract: A computing system implemented method is disclosed for distributing data objects in a network of computing nodes. Each node has stored thereon subscription rules defining characteristics of data objects that the particular node may require during processing. The nodes exchange their subscription rules with other nodes in the network. Each node then compares the rules received from other nodes with the attributes of data objects stored on the particular node. Where a rule set matches the attributes of a data object stored thereon, the node marks the particular data object for copying to the node from which the particular rule set was received. The marked data object is then copied to the appropriate node.

    Object ownership migration
    9.
    发明授权

    公开(公告)号:US10911535B1

    公开(公告)日:2021-02-02

    申请号:US14859121

    申请日:2015-09-18

    Abstract: A computing system implemented method is disclosed for reassigning ownership of a data object between computing nodes. A first computing node having control of a data object transmits a hand-off message indicating control of the data object is being transferred to a second computing node. The first computing node queues requests received at the first computing node relating to the data item. A third computing node that interacts with the data object receives the hand-off message and, in response, delays transmitting requests relating to the data object. When the second computing node receives the hand-off message, it transmits a message claiming control of the data object. In response to the message claiming control, the first computing node and the third computing node transmit their queued requests relating to the data item to the second computing node.

    Stream sniping prevention
    10.
    发明授权

    公开(公告)号:US10904223B1

    公开(公告)日:2021-01-26

    申请号:US15906992

    申请日:2018-02-27

    Abstract: Techniques for stream sniping prevention are disclosed herein. A video game player may provide captured video of the video game for transmission to viewers. In some examples, an obfuscation component may detect, within the captured video, private game information regarding the player, for example using one or more non-visual detection techniques. The private game information may then be obfuscated in the video that is provided to the viewers, while still allowing the private game information to be displayed to the player. Also, in some examples, a user may issue a request associated with a video game, such as a request to join a video game, game server, and/or match. It may then be determined whether the user is currently receiving video of the video game from the player. If so, then the user may be blocked from joining the same video game, game server, and/or match as the player.

Patent Agency Ranking