Abstract:
A cloud gaming system having a game console that is configured to execute video games is provided. The game console provides an interface for a remote client device to interface with the game console and request that games be played. The game console being located in a first data center. The system further includes a storage server connected to the game console over a network connection in the first data center. A save data server is also provided and is located in a second data center. Data selection logic of the game console is provided. The data selection logic is configured to retrieve save data from the save data server and cache the save data to a save data disk of the game console. The data selection logic is configured to automatically retrieve the save data upon detecting a session initiation for a user account.
Abstract:
The disclosure provides methods and systems for warning users of mobile terminals during active phone calls or active data transfer that they approach certain geographical areas known as areas where active phone calls or active data transfer may be interrupted. In one embodiment, a method includes obtaining, by a processor, location information associated with a mobile terminal, determining, by the processor, that the mobile terminal approaches a particular geographical area, the particular geographical area being associated with previous dropped calls based at least in part on historical data, and, based on the determination, sending, by the processor, a warning signal to the mobile terminal for informing a user of the mobile terminal that the mobile terminal is about to enter the particular geographical area.
Abstract:
A root key of a computing device that is typically “burned” into the device hardware at time of manufacture is used to establish a master key and if desired a Transport Layer Security pre-shaped key, a WiFi configuration key, and application verification keys. The keys established from the root key are stored in a region of flash memory, and this region of flash memory is then encrypted using a random encryption code.
Abstract:
Methods, systems, and computer programs are presented for automated detection and mitigation of Denial of Service (DoS) attacks. One method includes an operation for collecting traffic data from service network routers that provide users access to a service. The traffic data is applied to security rules to identify a blacklist of illegitimate users to be blocked. Further, the method receives from the one or more servers a whitelist with information regarding legitimate users and their geographical location. A safe blacklist is determined for each router based on the blacklist and the whitelist, and the respective safe blacklist is sent to each router. Legitimate users are not blocked from accessing the service, but an illegitimate user spoofing a legitimate user is blocked by the routers when trying to access the service from a geographic location that is not the geographic location of the legitimate user.
Abstract:
A cloud gaming manager selects a game server to stream a computer game to a requesting client game console based on which server in the cloud system has the requested game in server memory, or the requested game system in server memory, or the user files of the requesting console in server memory.
Abstract:
A root key of a computing device that is typically “burned” into the device hardware at time of manufacture is used to establish a master key and if desired a Transport Layer Security pre-shaped key, a WiFi configuration key, and application verification keys. The keys established from the root key are stored in a region of flash memory, and this region of flash memory is then encrypted using a random encryption code.
Abstract:
Instances of the one or more computer processing applications are allocated to a subset of terminal processing systems in a plurality of terminal processing systems that are coupled to a network. Each application may be accessed by one or more remote client devices via the network. Each client device has one or more associated users. Each application has an associated power consumption profile and the instances are allocated to the terminal processing systems in accordance with the power consumption profiles and an aggregate power consumption capacity for the plurality of terminal processing systems. The instances are allocated to the terminal processing systems in a way that optimizes a number of users per unit power allocated to the plurality of terminal processing systems.
Abstract:
Tradable physical collectible objects are described. In particular, systems and methods for using the tradable physical collectible objects facilitate generation of a digital copy that can be used within a network game. A user can use the digital copy and perform various modifications to the digital copy. A value can be determined for the digital copy based on the various modifications. At a later date, the user (e.g., owner) is free to give away, sell or trade the digital copy to another party in transaction with terms based on, for example, the determined value of the digital copy.
Abstract:
A controller for providing input to an application is provided, including: a main body; a first handle extending from the main body, the first handle defined for holding by a first hand of a user; a second handle extending from the main body, the second handle defined for holding by a second hand of a user; a touch panel disposed along a top surface of the main body; a translucent panel defined along a front side of the main body; and a light defined in the main body for illuminating the translucent panel.
Abstract:
Inertial sensors within a head mounted display are used to track movement of the head mounted display. The tracked movement of the head mounted display is correlated to an action within a virtual reality scene that is currently displayed to a user wearing the head mounted display. The action within the virtual reality scene is based on a context of the virtual reality scene that is currently displayed. The detected movement of the head mounted display can be combined with other sensor data, such as gaze detection data, to determine the action within the virtual reality scene. In this manner, movements of the user as detected using the inertial sensors within the head mounted display are used as inputs to cause actions within the current context of the virtual reality scene as displayed to the user within the head mounted display.