An interactive broadcast system comprising a plurality of user interfaces each comprising a local clock signal generator. Each user interface delivers interactive applications to a respective user with reference to its respective local clock signal. A central control system broadcasts data to the user interfaces. The ccs detects adjustment of the local clock signals to identify fraudulent users.
|
1. An interactive broadcast system comprising:
a plurality of user interfaces each having a local clock signal generator, wherein each user interface delivers interactive applications to a respective user with reference to its respective local clock signal;
a central control system (ccs) for broadcasting data to the user interfaces and for receiving data from the user interfaces, the ccs being adapted to identify fraudulent adjustment of one of the local clock signals by comparing the time of receipt by the ccs of certain data sent by one of the user interfaces with the time of receipt of data from another different one of the user interfaces;
means for periodically broadcasting a central clock signal to the user interfaces; and
each user interface having means for calculating an offset signal with reference to the central clock signal and its respective local clock signal so as to enable obtaining the central clock signal from the local clock signal.
6. A method of detecting fraudulent users in an interactive broadcast system, the method comprising:
(1) broadcasting data to a plurality of user interfaces from a central control system (ccs);
(2) generating a local clock signal at each user interface;
(3) delivering an interactive application to a respective user from each user interface with reference to its respective clock signal;
(4) receiving data at the ccs from the local user interfaces;
(5) identifying fraudulent adjustment of one of the local clock signals by comparing the time of receipt by the ccs of certain data sent by one of the user interfaces with the time of receipt of data from another different one of the user interfaces;
(6) periodically broadcasting a central clock signal to the user interfaces; and
(7) calculating at the user interface an offset signal with reference to the central clock signal and a respective local clock signal so as to enable obtaining the central clock signal from the local clock signal.
2. A system according to
3. A system according to
4. A system according to
5. A system according to
7. A method according to
step (5) comprises monitoring the time of receipt of return path data generated by the user interfaces in response to the return path request to identify user interfaces which have sent return path data which is advanced or delayed by more than a predetermined threshold.
8. A method according to
9. A method according to
(8) broadcasting an application start signal to the user interfaces; and
(9) calculating an application time local clock signal with reference to the application start signal,
wherein each user interface delivers interactive applications to a respective user with reference to its respective application time local clock signal.
0. 10. A method of detecting fraudulent users in an interactive broadcast system, the method comprising:
(1) broadcasting data to a plurality of user interfaces from a central control system (ccs);
(2) generating a local clock signal at each user interface;
(3) delivering an interactive application to a respective user from each user interface with reference to its respective local clock signal;
(4) receiving data at the ccs for the local interface;
(5) identifying fraudulent adjustment of one of the local clock signals by comparing the time of receipt by the ccs of certain data sent by one of the user interfaces with the time of receipt of data from another different one of the user interfaces;
(6) periodically broadcasting a central clock signal to the user interfaces; and
(7) calculating an offset signal at the user interface with reference to the central clock signal and a respective local clock signal so as to enable obtaining the central clock signal from the local clock signal.
|
This enables the CPU 25 to calculate CCS CLOCK at any time as:
CCS CLOCK−STB CLOCK+OFFSET.
Before, at or even after the start of the quiz game, the CCS 2 transmits a game start clock signal CCS CLOCK (game start) to the user interfaces defining the time according to the CCS at which the game starts. The CPU 25 in each STB can then calculate the STB game start time as:
STB CLOCK (game start)·CCS CLOCK (game start)−OFFSET.
During the quiz game, the CCS 2 retrieves question and answer data from the store 3 and places the data on the transport stream 30 before it is to be displayed by the user interfaces. Each item of data contains question/answer data, and also a relative game time (i.e. a time from the start of the game) at which the data is to be displayed. For instance the following sequence of data may be broadcast during a quiz game:
Data
Relative Game Time
Question A
60 seconds-70 seconds
Answer A
70 seconds-75 seconds
Question B
75 seconds-85 seconds
Answer B
85 seconds-90 seconds
Thus Question A is placed on the transport stream prior to 60 seconds from game start, and is displayed from 60-70 seconds from game start. During that 10 second period the user inputs his answer. At 70 seconds the user interface is locked out and the answer to question A is displayed for the next 5 seconds.
The CPU 25 handles the relative game time messages in the following way. The data and relative game time is input to the CPU 25. The CPU 25 then calculates the STB CLOCK time corresponding with the relative game time as:
STB CLOCK (relative)−STB CLOCK (game start)+relative game time.
Thus the CPU displays Answer A between STB CLOCK (70 seconds) and STB CLOCK (75 seconds).
A fraudulent user can take advantage of this system as follows. This fraudulent user inserts an adjustment module 46 (shown in dotted lines in
This fraudulent clock adjustment is detected in one or more of a number of ways as discussed below.
1. Return Path Request
At some point after the game start (either during or after the game) the CCS 2 sends a return path request to the user interfaces, asking them to send an acknowledgment back to the CCS 2 at a certain relative game time. If the acknowledgment from one of the user interfaces is delayed or advanced (when compared to the return time of acknowledgements from the other user interfaces) by more than a predetermined threshold then it is likely that STB CLOCK on that user interface has been adjusted. Therefore that user interface is identified and no prize is issued to the fraudulent user registered with the identified user interface.
2. Return Path Scores
The user interfaces are requested to send their scores back to the CCS 2 at the end of the quiz game. If the return time of the score from one of the user interfaces is delayed or advanced (when compared to the return time of scores from the other user interfaces) by more than a predetermined threshold, then that user interface is identified as a fraudulent interface, and no prize is issued to the user registered with the fraudulent interface.
Optionally, the following method may also be employed.
3. STB CLOCK Monitor
A monitor 50 is provided to monitor STB CLOCK and OFFSET. This could be a separate module or part of the CPU 25. If either of these signals is adjusted then the monitor 50 sends a detection signal to the CPU 25 which informs the CCS 2 with an identification message. Thus if the user either adjusts STB CLOCK immediately after STB (game start) has been calculated; or resets STB CLOCK at the end of the game to attempt to disguise their fraud, then this adjustment will be detected by the monitor 50.
Kydd, Richard A., Malaure, Jason R.
Patent | Priority | Assignee | Title |
8484636, | May 09 2011 | GOOGLE LLC | Generating application recommendations based on user installed applications |
8566173, | May 09 2011 | GOOGLE LLC | Using application market log data to identify applications of interest |
8819025, | May 09 2011 | GOOGLE LLC | Recommending applications for mobile devices based on installation histories |
8825663, | May 09 2011 | GOOGLE LLC | Using application metadata to identify applications of interest |
8924955, | May 09 2011 | GOOGLE LLC | Generating application recommendations based on user installed applications |
Patent | Priority | Assignee | Title |
4337463, | Aug 22 1980 | SIEMENS POWER TRANSMISSION & DISTRIBUTION, L L C | Time synchronization master station and remote station system |
4807259, | May 20 1986 | Mitsubishi Denki Kabushiki Kaisha | Time synchronization method in data transmission system |
5247440, | May 03 1991 | MOTOROLA, INC A CORP OF DELAWARE | Location influenced vehicle control system |
5327468, | Jun 19 1992 | EMERSON PROCESS MANAGEMENT POWER & WATER SOLUTIONS, INC | Synchronization of time-of-day clocks in a distributed processing network system |
5345595, | Nov 12 1992 | AUTHORIZE NET LLC | Apparatus and method for detecting fraudulent telecommunication activity |
5408506, | Jul 09 1993 | Apple Inc | Distributed time synchronization system and method |
5416808, | Mar 31 1992 | QUARTERHILL INC ; WI-LAN INC | Apparatus for synchronizing a plurality of clocks in a simulcast network to a reference clock |
5519433, | Nov 20 1991 | OPENTV, INC | Interactive television security through transaction time stamping |
5537143, | Aug 14 1992 | Interactive communication system | |
5695400, | Jan 30 1996 | WELLS FARGO BANK, N A , AS COLLATERAL AGENT | Method of managing multi-player game playing over a network |
5748941, | Nov 09 1995 | Xerox Corporation | System and method for synchronizing control clocks for a modular printing system |
5764275, | Nov 20 1991 | OPENTV, INC | Interactive television security through transaction time stamping |
5850447, | Aug 05 1993 | Gemplus Card International | Secured system of remote participation in interactive games with verification of the chronology of events |
5936661, | Nov 22 1995 | U.S. Philips Corporation | Interactive television game system |
6320507, | Apr 07 2000 | SENSORMATIC ELECTRONICS, LLC | Method for synchronization between systems |
6415325, | Dec 16 1997 | MOBILE ENHANCEMENT SOLUTIONS LLC | Transmission system with improved synchronization |
6449291, | Nov 24 1998 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Method and apparatus for time synchronization in a communication system |
6452541, | Feb 20 2001 | Google Technology Holdings LLC | Time synchronization of a satellite positioning system enabled mobile receiver and base station |
6483825, | Jul 07 1998 | Fujitsu Limited | Time synchronization method in CDMA system |
6798790, | Jun 26 1999 | Alcatel | Method of generating a clock signal for the upstream channel of a bidirectional point-to-multipoint network |
7073190, | Apr 05 1999 | S AQUA SEMICONDUCTOR, LLC | Interactive applications |
WO9515653, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jul 07 2008 | ZH Interactive Systems LLC | (assignment on the face of the patent) | / | |||
Aug 12 2015 | ZH INTERACTIVE SYSTEMS L L C | S AQUA SEMICONDUCTOR, LLC | MERGER SEE DOCUMENT FOR DETAILS | 037040 | /0137 |
Date | Maintenance Fee Events |
Dec 30 2013 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Feb 12 2018 | REM: Maintenance Fee Reminder Mailed. |
Jul 30 2018 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
May 10 2014 | 4 years fee payment window open |
Nov 10 2014 | 6 months grace period start (w surcharge) |
May 10 2015 | patent expiry (for year 4) |
May 10 2017 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 10 2018 | 8 years fee payment window open |
Nov 10 2018 | 6 months grace period start (w surcharge) |
May 10 2019 | patent expiry (for year 8) |
May 10 2021 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 10 2022 | 12 years fee payment window open |
Nov 10 2022 | 6 months grace period start (w surcharge) |
May 10 2023 | patent expiry (for year 12) |
May 10 2025 | 2 years to revive unintentionally abandoned end. (for year 12) |