WO2009101962A1 - 通信システム、通信方法、情報記録媒体、ならびに、プログラム - Google Patents
通信システム、通信方法、情報記録媒体、ならびに、プログラム Download PDFInfo
- Publication number
- WO2009101962A1 WO2009101962A1 PCT/JP2009/052283 JP2009052283W WO2009101962A1 WO 2009101962 A1 WO2009101962 A1 WO 2009101962A1 JP 2009052283 W JP2009052283 W JP 2009052283W WO 2009101962 A1 WO2009101962 A1 WO 2009101962A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication
- terminal device
- router
- computer
- terminal
- Prior art date
Links
Images
Classifications
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/75—Enforcing rules, e.g. detecting foul play or generating lists of cheating players
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
-
- A63F13/12—
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
- A63F13/31—Communication aspects specific to video games, e.g. between several handheld game devices at close range
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/70—Game security or game management aspects
- A63F13/71—Game security or game management aspects using secure communication between game devices and game servers, e.g. by encrypting game data or authenticating players
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/131—Protocols for games, networked simulations or virtual reality
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F13/00—Video games, i.e. games using an electronically generated display having two or more dimensions
- A63F13/30—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers
- A63F13/33—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers using wide area network [WAN] connections
- A63F13/335—Interconnection arrangements between game servers and game devices; Interconnection arrangements between game devices; Interconnection arrangements between game servers using wide area network [WAN] connections using Internet
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/40—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterised by details of platform network
- A63F2300/402—Communication between platforms, i.e. physical link to protocol
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/40—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterised by details of platform network
- A63F2300/407—Data transfer via internet
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/53—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing
- A63F2300/532—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers details of basic data processing using secure communication, e.g. by encryption, authentication
-
- A—HUMAN NECESSITIES
- A63—SPORTS; GAMES; AMUSEMENTS
- A63F—CARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
- A63F2300/00—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
- A63F2300/50—Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game characterized by details of game servers
- A63F2300/55—Details of game data or player data management
- A63F2300/5586—Details of game data or player data management for enforcing rights or rules, e.g. to prevent foul play
Definitions
- the present invention relates to a communication system and a communication method suitable for detecting fraud such as a user using a router device trying to invalidate a result of a communication battle by changing the setting of the router device in a communication battle game.
- the present invention also relates to a computer-readable information recording medium that records a program that realizes these on a computer, and the program.
- a terminal device used by a user first connects to a server device called a lobby server and introduces an opponent. Then, after the opponent is determined, the terminal devices perform peer-to-peer communication to play a communication battle game, never win or lose, and report the battle result to the server device. Further, from the viewpoint of the spread of home LAN (Local Area Network) and network security, it is becoming common for a terminal apparatus to connect to the Internet via a router apparatus or a firewall.
- LAN Local Area Network
- patent document 1 respond corresponds to such an action by specifying in which terminal device in battle the cause of the failure of communication exists.
- each terminal device tries communication with another communication device such as a lobby server when communication fails while performing a battle with the opponent's terminal device, and if this succeeds, the terminal device of the opponent If there is a failure, it is determined that there is a failure between itself and the computer communication network. And according to the said technique, the presence or absence of the said fault can be made into the criterion of a cheat action of a user.
- the present invention solves the above-described problems, and a user who uses a router device attempts to invalidate the result of the communication battle by changing the setting of the router device in the communication battle game. It is an object of the present invention to provide a communication system suitable for detection, a communication method, a computer-readable information recording medium in which a program for realizing the above in a computer is recorded, and the program.
- a communication system includes a first terminal device connected to a computer communication network via a first router device, and a second terminal device connected to the computer communication network via a second router device.
- each of the first terminal device and the second terminal device includes a counterparty communication unit, a router identifier acquisition unit, a router communication unit, and a status transmission unit.
- the partner communication unit communicates with the communication partner via the router device to which the terminal device is connected.
- the opponent communication unit is responsible for communication processing for realizing a battle between players in a network communication battle game.
- the router identifier acquisition unit acquires the communication identifier of the router device to which the communication partner is connected.
- the communication identifier typically means an IP address and a port number.
- route information through which the packet passes is described in the packet. From this, it is possible to know the router device of the communication partner.
- the IP address related to the introduction corresponds to the IP address itself of the router device of the communication partner.
- the introduced IP address itself is the communication identifier of the router device, and the introduced IP address and port number pair is the communication partner's terminal device. It corresponds to a communication identifier.
- the router communication unit communicates with the router device having the acquired communication identifier.
- communication with a communication partner is typically performed in accordance with a predetermined communication battle protocol using an IP address and a port number.
- the router communication unit determines whether or not communication to the router device is possible.
- the communication identifier of the router device to which the communication partner is connected is an IP address, for example, by transmitting a packet based on the PING protocol to the router device and examining its response It is possible to check whether communication with the router device is possible.
- the status transmission unit determines whether communication from the counterpart communication unit to the communication partner is successful, and whether communication from the router communication unit to the router device to which the communication partner is connected is successful. Is transmitted to the server device at a predetermined timing.
- the connection status information specifies whether the communication by the router communication unit is successful or not It may be limited only when communication with the communication partner has failed.
- the predetermined timing when communication with the communication partner fails at regular intervals, when the battle with the communication partner is finished and the battle result is reported, or an appropriate combination thereof is considered. It is done.
- the server device has a situation receiving unit and a fraud determination unit.
- the status receiving unit receives the connection status information transmitted from the first terminal device and the connection status information transmitted from the second terminal device.
- the connection status information is transmitted at a predetermined timing as described above, and the status receiving unit stores the latest connection status information received from both terminal devices in a RAM (Random Access Memory) or the like. It is typical to do.
- the fraud determination unit based on the received connection status information from the first terminal device and the connection status information from the second terminal device, (1) Communication from the first terminal device to the second terminal device succeeds, communication from the second terminal device to the first terminal device fails, and communication from the second terminal device to the first router device succeeds. Is determined that the user of the first terminal device has cheated, (2) Communication from the second terminal device to the first terminal device succeeds, communication from the first terminal device to the second terminal device fails, and communication from the first terminal device to the second router device succeeds. If it is specified that the user is using the second terminal device, it is determined that there is an illegal act.
- connection status information from both terminal devices has reached the server device, it is between the first terminal device and the first router device and the Internet, and between the second terminal device and the second router device and the Internet. It is considered that there is no mechanical failure (cable disconnected, power off, etc.).
- a typical example assumed as an illegal act performed by the users of both terminal apparatuses is “a filtering rule that rejects inflow of packets from the terminal apparatus of the communication partner when the communication battle is considered disadvantageous. It is a cheat action such that the match is impossible and the match result is invalidated by temporarily adopting.
- the user who uses a router apparatus can detect as much as possible fraud, such as trying to invalidate the result of a communication battle by changing the setting of a router apparatus in a communication battle game. .
- the fraud determination unit can be configured as follows. (3) When the connection status information to be transmitted from the first terminal device is not received for a predetermined period and the connection status information to be transmitted from the second terminal device is received during the predetermined period, the first terminal device Determined that the user was cheating, (4) When the connection status information to be transmitted from the second terminal device is not received during the predetermined period, and the connection status information to be transmitted from the first terminal device is received during the predetermined period, the second terminal It is determined that the user of the device has cheated.
- the present invention relates to a preferred embodiment of the above invention, and a typical example assumed as a fraudulent act performed by a user in the above (3) and (4) is “When a communication battle is considered disadvantageous, its own terminal device This is a cheat action such as making the battle impossible and making the battle result invalid by disabling communication.
- the user who uses the router device changes the setting of the router device in the communication battle game, turns off the power, or disconnects the connection, thereby invalidating the result of the communication battle. It will be possible to detect as much as possible.
- the communication system of the present invention can be configured as follows.
- the partner communication unit designates the sending information that has failed to be transmitted to the communication partner as the connection status information and transmits it to the server device.
- connection status information The communication with the communication partner by the counterpart communication unit has failed, and the router communication unit has successfully communicated with the router to which the communication partner is connected.
- the server device further includes an information relay unit, and when the condition (1) is satisfied, the information relay unit transmits the sending information specified in the connection status information from the second terminal device to the first terminal device. If the condition (2) is satisfied, the sending information specified in the connection status information from the first terminal device is transmitted to the second terminal device, and the sending information is relayed.
- the contents of the packet that failed to be transmitted to the terminal device determined to be performing an illegal act are transmitted from the server device.
- each of the first terminal device and the second terminal device further includes an information receiving unit, the information receiving unit receives the sending information transmitted from the server device, and the counterpart communication unit is an information receiving unit. It is assumed that the sending information received by is communicated from the communication partner.
- the packet that was supposed to be sent from the other party does not arrive for some reason (typically by cheating), is relayed from the server device, and if this is received, the battle continues based on the sent information To do.
- the cheating action as described above occurs, the fraudulent act on the perpetrator side can be detected, but the communication battle is continued via the server device.
- the game can continue as if no action occurred.
- a communication method includes a first terminal device connected to a computer communication network via a first router device, and a second terminal connected to the computer communication network via a second router device. And a server device connected to the computer communication network, the first terminal device, the second terminal device, a first router device, a computer communication network, a second router device, The first terminal device and the second terminal device each include a counterpart communication unit, a router identifier acquisition unit, a router communication unit, and a status transmission unit, and a server device.
- the communication method includes a counterparty communication process, a router identifier acquisition process, a router communication process, a situation transmission process, a situation reception process, and a fraud determination process, and is configured as follows. .
- the partner communication unit communicates with the communication partner via the router device to which the terminal device is connected.
- the router identifier acquisition unit acquires the communication identifier of the router device to which the communication counterpart is connected. If the communication with the communication partner fails after successful communication, the router communication unit communicates with the router device having the acquired communication identifier.
- the status transmission step communication with the communication partner is performed in the partner communication step. Connection status information that specifies whether or not communication to the router device to which the communication partner is connected in the router communication step is successful. To the server apparatus at the timing.
- the status receiving unit receives the connection status information transmitted from the first terminal device and the connection status information transmitted from the second terminal device, and in the fraud determination step.
- the fraud determination unit receives the connection status information from the first terminal device and the connection status information from the second terminal device. (1) Communication from the first terminal device to the second terminal device succeeds, communication from the second terminal device to the first terminal device fails, and communication from the second terminal device to the first router device succeeds. Is determined that the user of the first terminal device has cheated, (2) Communication from the second terminal device to the first terminal device succeeds, communication from the first terminal device to the second terminal device fails, and communication from the first terminal device to the second router device succeeds. If it is specified that the user is using the second terminal device, it is determined that there is an illegal act.
- a program according to another aspect of the present invention causes a first terminal computer to function as a first terminal device of the communication system, and a second terminal computer to function as a second terminal device of the communication system, And a server program that causes the server computer to function as a server device of the communication system.
- program of the present invention can be recorded on a computer-readable information storage medium such as a compact disk, flexible disk, hard disk, magneto-optical disk, digital video disk, magnetic tape, and semiconductor memory.
- a computer-readable information storage medium such as a compact disk, flexible disk, hard disk, magneto-optical disk, digital video disk, magnetic tape, and semiconductor memory.
- the above program can be distributed and sold via a computer communication network independently of the computer on which the program is executed.
- the information storage medium can be distributed and sold independently from the computer.
- a communication system suitable for detecting fraud such as a user using a router device attempting to invalidate a result of a communication battle by changing the setting of the router device in a communication battle game, It is possible to provide a communication method, a computer-readable information recording medium in which a program for realizing these in a computer is recorded, and the program.
- Information processing apparatus 101
- CPU 102
- ROM 103
- RAM 104
- Controller 105
- Controller 106
- External Memory 107
- Image Processing Unit 108
- DVD-ROM Drive 109
- Voice processing part 111
- Microphone 201
- Communication system 211
- 1st terminal device 212
- 1st router apparatus 221 2nd terminal apparatus 222
- Server apparatus 241
- Terminal apparatus 502
- Counterpart communication part 503
- Router identifier acquisition part 504
- Router communication part 505 status transmission unit
- 506 information reception unit 701 status reception unit 702 fraud determination unit
- 703 information relay unit 703 information relay unit
- the communication system according to the present embodiment is set so that a predetermined program operates on a server computer connected to a computer communication network such as the Internet to function as a server device and can communicate with a terminal device such as a mobile phone or a mobile game device. It is realized by doing.
- the terminal device and the server device are different in processing capability, the fundamental operation principle and configuration are common. Therefore, in the following, the outline of the information processing apparatus will be described, and differences between the case where the information processing apparatus is applied to a terminal apparatus and a server apparatus will be described as appropriate accordingly.
- FIG. 1 is a schematic diagram illustrating a schematic configuration of a typical information processing apparatus that can function as a server apparatus or a terminal apparatus according to the present embodiment by executing a program.
- a description will be given with reference to FIG. 1
- the information processing apparatus 100 includes a CPU (Central Processing Unit) 101, a ROM 102, a RAM (Random Access Memory) 103, an interface 104, a controller 105, an external memory 106, an image processing unit 107, and a DVD-ROM.
- a (Digital Versatile Disc ROM) drive 108, a NIC (Network Interface Card) 109, an audio processing unit 110, and a microphone 111 can be provided.
- Various input / output devices can be omitted as appropriate.
- a DVD-ROM storing a game program and data is loaded into the DVD-ROM drive 108 and the information processing apparatus 100 is turned on to execute the program, thereby realizing the server apparatus of the present embodiment.
- the terminal device of this embodiment is implement
- the NIC 109 is a wireless LAN card in a situation where a home wireless LAN is set.
- a server device is typically connected to the Internet as a wired LAN card.
- An access point device accessed by a wireless LAN card included in a terminal device has a router function or is connected to the Internet via another router device, so that communication between the terminal device and the server device is possible.
- the CPU 101 controls the overall operation of the information processing apparatus 100 and is connected to each component to exchange control signals and data.
- the CPU 101 uses arithmetic operations such as addition / subtraction / multiplication / division, logical sum, logical product using ALU (Arithmetic Logic Unit) (not shown) for a storage area called a register (not shown) that can be accessed at high speed.
- Logic operations such as logical negation, bit operations such as bit sum, bit product, bit inversion, bit shift, and bit rotation can be performed.
- the CPU 101 itself is configured and can be implemented with a coprocessor so that saturation operations such as addition, subtraction, multiplication, division, etc. for multimedia processing, and trigonometric functions, etc., can be performed at high speed. There is.
- the ROM 102 records an IPL (Initial Program Loader) that is executed immediately after the power is turned on, and when this is executed, the program recorded on the DVD-ROM is read into the RAM 103 and the execution by the CPU 101 is started.
- the ROM 102 stores an operating system program and various data necessary for operation control of the entire information processing apparatus 100.
- the RAM 103 is for temporarily storing data and programs, and holds programs and data read from the DVD-ROM and other data necessary for game progress and chat communication.
- the CPU 101 provides a variable area in the RAM 103, performs an operation by directly operating the ALU on the value stored in the variable, or temporarily stores the value stored in the RAM 103 in a register. Perform operations such as performing operations on registers and writing back the operation results to memory.
- the controller 105 connected via the interface 104 receives an operation input performed when the user executes the game.
- the external memory 106 detachably connected via the interface 104 stores data indicating game play status (past results, etc.), data indicating game progress, and log of chat communication in the case of a network match ( Data) is stored in a rewritable manner. The user can record these data in the external memory 106 as appropriate by inputting an instruction via the controller 105.
- the DVD-ROM drive 108 On the DVD-ROM mounted on the DVD-ROM drive 108, a program for realizing the game and image data and sound data associated with the game are recorded. Under the control of the CPU 101, the DVD-ROM drive 108 performs a reading process on the DVD-ROM mounted thereon, reads necessary programs and data, and these are temporarily stored in the RAM 103 or the like.
- the image processing unit 107 processes the data read from the DVD-ROM by the CPU 101 or an image arithmetic processor (not shown) included in the image processing unit 107, and then processes the processed data in a frame memory ( (Not shown).
- the image information recorded in the frame memory is converted into a video signal at a predetermined synchronization timing and output to a monitor (not shown) connected to the image processing unit 107. Thereby, various image displays are possible.
- the image calculation processor can execute a two-dimensional image overlay calculation, a transparency calculation such as ⁇ blending, and various saturation calculations at high speed.
- polygon information arranged in the virtual three-dimensional space and added with various texture information is rendered by the Z buffer method, and the polygon arranged in the virtual three-dimensional space from the predetermined viewpoint position is determined in the direction of the predetermined line of sight It is also possible to perform high-speed execution of operations for obtaining rendered images.
- the CPU 101 and the image arithmetic processor work together to draw a character string as a two-dimensional image in the frame memory or on each polygon surface according to the font information that defines the character shape. is there.
- the NIC 109 is used to connect the information processing apparatus 100 to a computer communication network (not shown) such as the Internet, and conforms to the 10BASE-T / 100BASE-T standard used when configuring a LAN.
- Analog modem for connecting to the Internet using a telephone line, ISDN (Integrated Services Digital Network) modem, ADSL (Asymmetric Digital Subscriber Line) modem, cable modem for connecting to the Internet using a cable television line, etc. These are configured by an interface (not shown) that mediates between these and the CPU 101.
- the audio processing unit 110 converts audio data read from the DVD-ROM into an analog audio signal and outputs it from a speaker (not shown) connected thereto. Also, under the control of the CPU 101, sound effects and music data to be generated during the progress of the game are generated, and the corresponding sound is output from a speaker, headphones (not shown), and earphones (not shown). Output.
- the audio processing unit 110 converts the MIDI data into PCM data with reference to the sound source data included in the audio data. If the compressed audio data is in ADPCM format or Ogg Vorbis format, it is expanded and converted to PCM data.
- the PCM data can be output by performing D / A (Digital / Analog) conversion at a timing corresponding to the sampling frequency and outputting it to a speaker.
- a microphone 111 can be connected to the information processing apparatus 100 via the interface 104.
- the analog signal from the microphone 111 is subjected to A / D conversion at an appropriate sampling frequency so that processing such as mixing in the sound processing unit 110 can be performed as a PCM format digital signal.
- the information processing apparatus 100 uses a large-capacity external storage device such as a hard disk to perform the same function as the ROM 102, the RAM 103, the external memory 106, the DVD-ROM attached to the DVD-ROM drive 108, and the like. You may comprise.
- a large-capacity external storage device such as a hard disk to perform the same function as the ROM 102, the RAM 103, the external memory 106, the DVD-ROM attached to the DVD-ROM drive 108, and the like. You may comprise.
- a keyboard for receiving a character string editing input from a user a mouse for receiving various position designations and selection inputs, and the like are connected.
- a general-purpose personal computer can be used instead of the information processing apparatus 100 of the present embodiment.
- the server device and the terminal device are realized by executing the program by the information processing device 100, but may be realized on a general computer. This is because the information processing apparatus 100 and a general computer are not greatly different in configuration and function. As described above, in the present application, a general computer and the information processing apparatus 100 will be described in the same manner.
- a general computer includes a CPU, a RAM, a ROM, a DVD-ROM drive, and a NIC as in the information processing apparatus 100 corresponding to a so-called consumer game apparatus, and has a simpler function than the information processing apparatus 100.
- a hard disk as an external storage device
- a flexible disk a magneto-optical disk, a magnetic tape, and the like can be used.
- the controller 105 not the controller 105 but a keyboard or a mouse is used as an input device.
- the present invention can be realized by appropriately using these various devices as platforms for realizing terminal devices and server devices. Can be realized.
- FIG. 2 is an explanatory diagram showing a schematic configuration of the communication system according to the present embodiment.
- a description will be given with reference to FIG.
- the communication system 201 includes a first terminal device 211, a second terminal device 221, and a server device 231 that can communicate with each other via the Internet 241.
- the first terminal device 211 is connected to the Internet 241 via the first router device 212
- the second terminal device 221 is connected to the Internet 241 via the second router device 222.
- the first router device 212 is a boundary between the Internet 241 and the home LAN where the first terminal device 211 exists, and functions as a gateway / firewall / address / port number conversion device.
- the second router device 222 becomes a boundary between the Internet 241 and the home LAN where the second terminal device 221 exists, and functions as a gateway / firewall / address / port number conversion device.
- a predetermined terminal program operates in the first terminal device 211 and the second terminal device 221, a predetermined terminal program operates.
- This terminal program realizes a communication battle game.
- the online battle game proceeds in the following procedure.
- the first terminal device 211 applies for introduction of the opponent to the server device 231 which is a lobby server.
- the IP address of the server device 231 is represented as “S”
- the port number for introduction application is represented as “V”
- the communication destination is represented as “S / V”.
- the server device 231 acquires the IP address (hereinafter referred to as “R1”) of the first router device 212 as the identification information of the first terminal device 211 seeking the opponent.
- the server device 231 acquires the IP address (hereinafter referred to as “R2”) of the second router device 222.
- R1 and R2 are the IP addresses of the first router device 212 and the second router device 222
- the address is converted and the notification is relayed to the first terminal device 211 and the second terminal device 221. That is, a notification introducing R2 arrives at the port number P of the first terminal device 211, and a notification introducing R1 arrives at the port number P of the second terminal device 221.
- These address translation rules are stored as part of the filtering rules of the first router device 212 and the second router device 222.
- the terminal devices that perform the battle perform peer-to-peer communication using a predetermined battle port number (hereinafter referred to as “Q”) for use in battle communication.
- Q a predetermined battle port number
- the first terminal device 211 starts communication with the predetermined battle port number Q of the IP address R2, and the second terminal device 221 sets the predetermined battle port number Q of the IP address R1. On the other hand, communication is started.
- the communication for R1 / Q reaches the port Q of the first terminal device 211 by address conversion of the first router device 212, and the communication for R2 / Q is performed by the address conversion of the second router device 222.
- the port Q of the terminal device 221 is reached.
- the first router device 212 and the second router device 222 themselves are connected to the Internet 241 it is configured to respond to the ping / icmp protocol (the default value of the port number is 1). Typical. In this case, a value other than 1 is adopted as the value of Q.
- the destination of the packet addressed to the first terminal device 211 is R1 / Q
- the destination of the packet addressed to the first router device 212 is R1 / 1. If ACK is returned for sending these packets, communication to the first terminal device 211 and communication to the first router device 212 are successful.
- the destination of the packet addressed to the second terminal device 221 is R2 / Q
- the destination of the packet addressed to the second router device 222 is R2 / 1. If ACK is returned for sending these packets, communication to the second terminal device 221 and communication to the second router device 222 are successful.
- the port numbers P and Q are not necessarily constants. It is also possible to check the connection of the router device using a protocol or port number other than the ping / icmp protocol.
- the correspondence between the port numbers used by the first terminal device 211 and the second terminal device 221 in the home LAN and the port numbers used by the first router device 212 and the second router device 222 on the Internet 241 is If it is transmitted to the server device 231 by the technique, and is introduced at the time of introduction to the first terminal device 211 and the second terminal device 221 so that they can get to know each other, Communication can be configured. Therefore, these embodiments are also included in the scope of the present invention.
- FIG. 3 is a diagram illustrating a state in which normal communication is possible among the first terminal device 211, the first router device 212, the second terminal device 221, the second router device 222, and the server device 231.
- FIG. 3 a description will be given with reference to FIG.
- the first terminal device 211, the second terminal device 221, and the server device 231 communicate mainly, and the first router device 212 and the second router device 222 are the two. Since the processing is performed by communicating with others, the starting points of the arrows in this figure are the first terminal device 211, the second terminal device 221, and the server device 231.
- the first terminal device 211 is turned off.
- the first router device 212 is turned off.
- the gateway / firewall setting of the first router device 212 is temporarily changed to block all communication between the first router device 212 and the Internet 241.
- the gateway / firewall setting of the first router device 212 is temporarily changed to block communication from the second terminal device 221 to the first terminal device 211.
- FIG. 4 shows a part of the configuration by performing the unauthorized setting as described above between the first terminal device 211, the first router device 212, the second terminal device 221, the second router device 222, and the server device 231. It is explanatory drawing which shows a mode that communication is impossible. Hereinafter, a description will be given with reference to FIG.
- the arrow from the second terminal device 221 to the first terminal device 211 is marked with a cross (“ ⁇ ⁇ ⁇ ”), but the other arrows are marked with a circle. It remains in a state where communication is possible with the mark attached.
- positioning of the arrow which was symmetrical with the 1st terminal device 211 and the 2nd terminal device 221 is asymmetric in this figure. In this embodiment, this asymmetry is used to detect an illegal act of the user of the first terminal device 211.
- FIG. 5 is a schematic diagram showing a schematic configuration of a terminal device that functions as the first terminal device 211 and the second terminal device 221 of the present embodiment.
- FIG. 6 is a flowchart showing a flow of control of terminal processing executed by the terminal device.
- the terminal device 501 includes a counterparty communication unit 502, a router identifier acquisition unit 503, a router communication unit 504, a status transmission unit 505, and an information reception unit 506.
- the terminal device 501 accesses the server device 231 functioning as the lobby server, receives an introduction of an IP address and a port number that the communication partner discloses to the Internet, and receives the partner communication unit.
- initial setting of peer-to-peer communication is performed (step S601).
- the IP address and the port number obtained here are used directly by the counterpart terminal device 501 when the counterpart terminal device 501 is directly connected to the Internet 241.
- the partner terminal device 501 is connected to the Internet 241 via a router device. Therefore, when the packet arrives at the port number obtained in step S601, the IP address of the router device used by the partner terminal device 501. When the packet arrives at the port number known in step S601, the packet is sent to the partner terminal device 501. Relayed to
- the IP address and port number of the other party obtained here are temporarily stored in the RAM 103 or the like. Therefore, the CPU 101 functions as the router identifier acquisition unit 503 in cooperation with the NIC 109 and the RAM 103.
- step S602 if a packet has arrived from the other party's terminal device 501 or server device 231 (step S602; Yes), the terminal device 501 receives this (step S603), but does not arrive (step S602). No) The communication battle game calculation process is performed as it is (step S604). Various game techniques can be applied as they are for the calculation processing contents of the online battle game.
- the packet is exchanged with the other terminal device 501 while the communication battle continues, and when the communication battle is completed and the battle result is reported, the packet is exchanged with the server device 231. Is exchanged. Therefore, in this case, the CPU 101 functions as the counterpart communication unit 502 in cooperation with the NIC 109 and the RAM 103.
- a calculation process is also performed in which a packet arriving by relaying the server device 231 from the partner terminal device 501 is directly received from the partner terminal device 501 and the battle of the communication battle game is advanced.
- the CPU 101 functions as the information receiving unit 506 in cooperation with the NIC 109 and the RAM 103.
- step S605 when it becomes a situation where a packet should be transmitted to the opponent by the calculation process of the communication battle game (step S605; opponent), the opponent communication unit 502 sends the packet to the IP address and port number introduced in step S601. Transmission is attempted (step S606). Also in this case, the CPU 101 functions as the counterpart communication unit 502 in cooperation with the NIC 109 and the RAM 103.
- step S607 if the transmission is successful (step S607; Yes), it is determined whether or not the server device 231 is notified of the success (step S608).
- the notification to the server device 231 is typically performed at a fixed interval, or when a predetermined number of packets are transmitted, or when the communication battle is completed, etc.
- the state of the battle is broadcast to another terminal device 501 of the Internet 241, it is typically performed every time together with information indicating the state of the communication battle game.
- step S608 If notification is to be made (step S608; Yes), a connection status packet designating that communication with the other party has been successful is transmitted to the server device 231 (step S609), and the process returns to step S602; S608; No), it returns to step S602 as it is.
- step S607 if a time-out occurs in communication with the other party and transmission fails (step S607; No), packet transmission based on the protocol is sent to the ping / icmp protocol port of the IP address introduced in step S601. An attempt is made to check whether communication with the other router device is possible (step S610).
- the other router device When the other router device receives the ping / icmp inquiry, the other router device returns an ACK or a response packet without flowing the packet into the LAN. Therefore, even if the unauthorized setting as in (6) is performed, an ACK or response packet from the other router device should be obtained.
- step S611 A connection information packet that specifies the contents of the non-delivery packet that failed to be transmitted in steps S606 and S607 as transmission information is generated and transmitted to the server device 231 (step S611), and the process returns to step S602.
- step S610 whether or not the packet transmission in step S610 has succeeded represents whether or not the communication to the other router device has succeeded. If the connection status packet generated in step S611 includes a non-delivery packet, communication to the counterpart terminal device 501 has failed. Therefore, there is no need to explicitly specify in the connection information packet that communication with the counterpart terminal device 501 has failed.
- the reason why the contents of the packet that failed to be transmitted is transmitted to the server apparatus 231 is to notify the counterpart terminal apparatus 501 of the contents of the packet via the server apparatus 231. This makes it possible to deal with temporary network malfunctions and to make the other party's fraudulent acts virtually meaningless.
- the CPU 101 functions as the status transmission unit 505 in cooperation with the RAM 103 and the NIC 109.
- a connection status for designating whether communication from the counterpart communication unit 502 to the communication counterpart is successful and whether communication from the router communication unit 504 to the router to which the communication counterpart is connected is successful Information is transmitted to the server device at a predetermined timing.
- connection status information If communication with the communication partner is successful, naturally, communication with the router device of the communication partner is successful, and therefore whether or not the communication by the router communication unit 504 is successful in the connection status information.
- the designation may be made only when communication with the communication partner has failed. As typical examples of the predetermined timing, when communication with the communication partner fails at regular intervals, when the battle with the communication partner is finished and the battle result is reported, or an appropriate combination thereof is considered. It is done.
- the server device 231 looks at the contents of the connection status packet transmitted from the terminal device 501 (the first terminal device 211 and the second terminal device 221). Then, a process for determining whether or not an illegal act has occurred is performed.
- FIG. 7 is a schematic diagram illustrating a schematic configuration of the server apparatus 231.
- FIG. 8 is a flowchart illustrating a flow of control of service processing executed by the server apparatus 231.
- connection status packet processing Various known techniques can be applied to functions as a lobby server, such as introducing opponents and accumulating battle results to generate rankings.
- the server device 231 includes a status receiving unit 701, a fraud determination unit 702, and an information relay unit 703.
- the CPU 101 of the server device 231 monitors the NIC 109 to check whether or not a packet has arrived from various external devices such as the first terminal device 211 and the second terminal device 221. If it has not arrived (step S801) (step S801; No), it waits for a certain period of time or performs other processing as appropriate in a coroutine (step S802), and then returns to step S801.
- step S801 if the packet has arrived (step S801; Yes), the packet is received (step S803). Then, the type of the packet is checked (step S804). If this packet is a connection status packet transmitted from the first terminal device 211 (step S804; from the first terminal), the latest connection status from the first terminal device 211 is obtained. The packet is stored in the RAM 103 (step S805), and the process proceeds to step S811.
- Step S804 If this is a connection status packet transmitted from the second terminal device 221 (step S804; from the second terminal), it is stored in the RAM 103 as the latest connection status packet from the second terminal device 221 ( Step S806), the process proceeds to Step S811.
- step S804 If this is another type of packet (step S804; other), processing corresponding to the packet is executed (step S807), and the process returns to step S801.
- the processing performed here includes, for example, processing as a lobby server.
- Step S811 When the latest connection status packet from the first terminal device 211 and the latest connection status packet from the second terminal device 221 are prepared (step S811; Yes), these connection status packets are examined ( Step S812).
- connection status packets from the both may be correlated one-to-one and examined in the order of arrival, but each time a new connection status packet arrives, the past is discarded, In addition to referring to the latest ones, discard the connection status packet that was subject to judgment in the following judgment process, and make the next judgment after the connection status packets from both parties are prepared for the first time after the judgment is made. Typical.
- step S812 first terminal-> second terminal, first terminal --- second terminal, first router --- second terminal
- step S821 It is determined that the user of the one terminal device 211 has cheated (step S821), and that effect is recorded in the RAM 103 (step S822).
- the CPU 101 transmits the non-delivery packet specified in the connection status packet from the second terminal device 221 to the first terminal device 211 via the NIC 109 (step S823), and proceeds to step S871. .
- Step S812 first terminal ⁇ ⁇ —second terminal, first terminal— ⁇ ⁇ second terminal, first terminal— ⁇ ⁇ second router
- the CPU 101 transmits the non-delivery packet specified in the connection status packet from the first terminal device 211 to the second terminal device 221 via the NIC 109 (step S833), and proceeds to step S871. .
- the server apparatus 231 relays the non-delivery packet in steps S823 and S833, the CPU 101 functions as the information relay unit 703 in cooperation with the NIC 109.
- step S812 If any other connection status is found (step S812; other), for example, the judgment standard disclosed in Patent Document 1 is applied to determine the cause of fraud (step S834), and the result is stored in the RAM 103. (Step S835), and the process proceeds to step S871.
- step S811 if the latest connection status packet from the first terminal device 211 and the latest connection status packet from the second terminal device 221 are not aligned (step S811; No), which is the cause of the mismatch? Check out. That is, if the connection status packet has not arrived from the first terminal device 211 for a certain period (step S841; first terminal), it is determined that the user of the first terminal device 211 has been cheated (step S851). The fact is recorded in the RAM 103 (step S852), and the process proceeds to step S871.
- step S841 If the connection status packet has not arrived from the second terminal device 221 for a certain period (step S841; second terminal), it is determined that the user of the second terminal device 221 has been cheated (step S853). Is stored in the RAM 103 (step S854), and the process proceeds to step S871.
- step S841 if the fixed period has not yet elapsed for both the first terminal device 211 and the second terminal device 221 since the connection status packet was last received (step S841; grace period), the process returns to step S801.
- game score calculation processing is performed such as imposing a penalty on the cheating user's score recorded in the RAM 103 (step S871), and the process returns to step S801.
- the relay processing for undelivered packets may be omitted as appropriate.
- a user using a router device detects an illegal act such as trying to invalidate a result of a communication battle by changing the setting of the router device in a communication battle game. It is possible to provide a communication system, a communication method, a computer-readable information recording medium in which a program for realizing these in a computer is recorded, and the program.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
(1)第1端末装置から第2端末装置への通信が成功し、第2端末装置から第1端末装置への通信が失敗し、第2端末装置から第1ルータ装置への通信が成功している旨が指定されている場合、第1端末装置のユーザに不正行為があったと判定し、
(2)第2端末装置から第1端末装置への通信が成功し、第1端末装置から第2端末装置への通信が失敗し、第1端末装置から第2ルータ装置への通信が成功している旨が指定されている場合、第2端末装置のユーザに不正行為があったと判定する。
(3)第1端末装置から送信されるべき接続状況情報が所定の期間受信されず、第2端末装置から送信されるべき接続状況情報が当該所定の期間に受信された場合、第1端末装置のユーザに不正行為があったと判定し、
(4)第2端末装置から送信されるべき接続状況情報が当該所定の期間受信されず、第1端末装置から送信されるべき接続状況情報が当該所定の期間に受信された場合、第2端末装置のユーザに不正行為があったと判定する。
(1)相手方通信部による当該通信相手との通信が失敗しており、ルータ通信部による当該通信相手が接続されるルータ装置との通信が成功している旨。
(2)相手方通信部が当該通信相手への送信に失敗した送付情報。すなわち、通信相手に送信しようと試みて、送信に失敗したパケットの内容。
(1)第1端末装置から第2端末装置への通信が成功し、第2端末装置から第1端末装置への通信が失敗し、第2端末装置から第1ルータ装置への通信が成功している旨が指定されている場合、第1端末装置のユーザに不正行為があったと判定し、
(2)第2端末装置から第1端末装置への通信が成功し、第1端末装置から第2端末装置への通信が失敗し、第1端末装置から第2ルータ装置への通信が成功している旨が指定されている場合、第2端末装置のユーザに不正行為があったと判定する。
101 CPU
102 ROM
103 RAM
104 インターフェイス
105 コントローラ
106 外部メモリ
107 画像処理部
108 DVD-ROMドライブ
109 NIC
110 音声処理部
111 マイク
201 通信システム
211 第1端末装置
212 第1ルータ装置
221 第2端末装置
222 第2ルータ装置
231 サーバ装置
241 インターネット
501 端末装置
502 相手方通信部
503 ルータ識別子取得部
504 ルータ通信部
505 状況送信部
506 情報受信部
701 状況受信部
702 不正判定部
703 情報中継部
図2は、本実施形態に係る通信システムの概要構成を示す説明図である。以下、本図を参照して説明する。
(1)第1端末装置211の電源を切る。
(2)第1ルータ装置212の電源を切る。
(3)第1端末装置211と第1ルータ装置212の間の通信ケーブルを抜く。
(4)第1ルータ装置212とインターネット241の間の通信ケーブルを抜く。
(5)第1ルータ装置212のゲートウェイ/ファイアウォール設定を一時的に変更して、第1ルータ装置212とインターネット241との間の通信をすべて遮断する。
(6)第1ルータ装置212のゲートウェイ/ファイアウォール設定を一時的に変更して、第2端末装置221から第1端末装置211への通信を遮断する。
(1)当該パケット送信が成功したか否かの結果、および、
(2)ステップS606、S607で送信に失敗した不達パケットの内容を送付情報として
指定する接続情報パケットを生成してサーバ装置231に送信し(ステップS611)、ステップS602に戻る。
Claims (6)
- コンピュータ通信網(241)に第1ルータ装置(212)を介して接続される第1端末装置(211)と、当該コンピュータ通信網(241)に第2ルータ装置(222)を介して接続される第2端末装置(221)と、当該コンピュータ通信網(241)に接続されるサーバ装置(231)と、を有し、前記第1端末装置(211)と、前記第2端末装置(221)と、が、前記第1ルータ装置(212)と、前記コンピュータ通信網(241)と、前記第2ルータ装置(222)と、を介して、互いを通信相手として通信する通信システム(201)であって、
(a)前記第1端末装置(211)と、前記第2端末装置(221)と、は、いずれも、
当該端末装置が接続されるルータ装置を介して、当該通信相手との通信を行う相手方通信部(502)、
前記相手方通信部(502)から当該通信相手への通信が成功すると、当該通信相手が接続されるルータ装置の通信識別子を取得するルータ識別子取得部(503)、
前記相手方通信部(502)から当該通信相手への通信が成功した後に失敗すると、前記取得された通信識別子を有するルータ装置への通信を行うルータ通信部(504)、
前記相手方通信部(502)から当該通信相手への通信が成功しているか否か、および、前記ルータ通信部(504)から当該通信相手が接続されるルータ装置への通信が成功しているか否かを指定する接続状況情報を、所定のタイミングで前記サーバ装置(231)に送信する状況送信部(505)
を備え、
(b)前記サーバ装置(231)は、
前記第1端末装置(211)から送信される接続状況情報と、前記第2端末装置(221)から送信される接続状況情報と、を受信する状況受信部(701)、
前記受信された前記第1端末装置(211)からの接続状況情報と、前記第2端末装置(221)からの接続状況情報と、に、より、
(1)前記第1端末装置(211)から前記第2端末装置(221)への通信が成功し、前記第2端末装置(221)から前記第1端末装置(211)への通信が失敗し、前記第2端末装置(221)から前記第1ルータ装置(212)への通信が成功している旨が指定されている場合、前記第1端末装置(211)のユーザに不正行為があったと判定し、
(2)前記第2端末装置(221)から前記第1端末装置(211)への通信が成功し、前記第1端末装置(211)から前記第2端末装置(221)への通信が失敗し、前記第1端末装置(211)から前記第2ルータ装置(222)への通信が成功している旨が指定されている場合、前記第2端末装置(221)のユーザに不正行為があったと判定する
不正判定部(702)
を備えることを特徴とする通信システム(201)。 - 請求項1に記載の通信システム(201)であって、前記不正判定部(702)は、
(3)前記第1端末装置(211)から送信されるべき接続状況情報が所定の期間受信されず、前記第2端末装置(221)から送信されるべき接続状況情報が当該所定の期間に受信された場合、前記第1端末装置(211)のユーザに不正行為があったと判定し、
(4)前記第2端末装置(221)から送信されるべき接続状況情報が当該所定の期間受信されず、前記第1端末装置(211)から送信されるべき接続状況情報が当該所定の期間に受信された場合、前記第2端末装置(221)のユーザに不正行為があったと判定する
ことを特徴とする通信システム(201)。 - 請求項1または2に記載の通信システム(201)であって、
(c)前記第1端末装置(211)と、前記第2端末装置(221)と、において、前記相手方通信部(502)による当該通信相手との通信が失敗しており、前記ルータ通信部(504)による当該通信相手が接続されるルータ装置との通信が成功している場合、前記状況送信部(505)は、前記相手方通信部(502)による当該通信相手との通信が失敗しており、前記ルータ通信部(504)による当該通信相手が接続されるルータ装置との通信が成功している旨に加えて、前記相手方通信部(502)が当該通信相手への送信に失敗した送付情報を、当該接続状況情報に指定して前記サーバ装置(231)に送信し、
(d)前記サーバ装置(231)は、前記(1)の条件が成立する場合、前記第2端末装置(221)からの接続状況情報に指定される送付情報を前記第1端末装置(211)へ送信し、前記(2)の条件が成立する場合、前記第1端末装置(211)からの接続状況情報に指定される送付情報を前記第2端末装置(221)へ送信して、当該送付情報を中継する情報中継部(703)をさらに備え、
(e)前記第1端末装置(211)と、前記第2端末装置(221)と、は、それぞれ、
前記サーバ装置(231)から送信された送付情報を受信する情報受信部(506)をさらに備え、
前記相手方通信部(502)は、前記情報受信部(506)により受信された送付情報を当該通信相手から通信されたものとする
ことを特徴とする通信システム(201)。 - コンピュータ通信網(241)に第1ルータ装置(212)を介して接続される第1端末装置(211)と、当該コンピュータ通信網(241)に第2ルータ装置(222)を介して接続される第2端末装置(221)と、当該コンピュータ通信網(241)に接続されるサーバ装置(231)と、が実行する通信方法であって、前記第1端末装置(211)と、前記第2端末装置(221)と、は、前記第1ルータ装置(212)と、前記コンピュータ通信網(241)と、前記第2ルータ装置(222)と、を介して、互いを通信相手として通信し、
(a)前記第1端末装置(211)と、前記第2端末装置(221)と、は、いずれも、相手方通信部(502)、ルータ識別子取得部(503)、ルータ通信部(504)、状況送信部(505)を備え、前記通信方法は、
前記相手方通信部(502)が、当該端末装置が接続されるルータ装置を介して、当該通信相手との通信を行う相手方通信工程、
前記相手方通信工程にて当該通信相手への通信が成功すると、前記ルータ識別子取得部(503)が、当該通信相手が接続されるルータ装置の通信識別子を取得するルータ識別子取得工程、
前記相手方通信工程にて当該通信相手への通信が成功した後に失敗すると、前記ルータ通信部(504)が、前記取得された通信識別子を有するルータ装置への通信を行うルータ通信工程、
前記相手方通信工程にて当該通信相手への通信が成功しているか否か、および、前記ルータ通信工程にて当該通信相手が接続されるルータ装置への通信が成功しているか否かを指定する接続状況情報を、所定のタイミングで前記サーバ装置(231)に送信する状況送信工程
を備え、
(b)前記サーバ装置(231)は、状況受信部(701)、不正判定部(702)を備え、前記通信方法は、
前記状況受信部(701)が、前記第1端末装置(211)から送信される接続状況情報と、前記第2端末装置(221)から送信される接続状況情報と、を受信する状況受信工程、
前記不正判定部(702)が、前記受信された前記第1端末装置(211)からの接続状況情報と、前記第2端末装置(221)からの接続状況情報と、に、より、
(1)前記第1端末装置(211)から前記第2端末装置(221)への通信が成功し、前記第2端末装置(221)から前記第1端末装置(211)への通信が失敗し、前記第2端末装置(221)から前記第1ルータ装置(212)への通信が成功している旨が指定されている場合、前記第1端末装置(211)のユーザに不正行為があったと判定し、
(2)前記第2端末装置(221)から前記第1端末装置(211)への通信が成功し、前記第1端末装置(211)から前記第2端末装置(221)への通信が失敗し、前記第1端末装置(211)から前記第2ルータ装置(222)への通信が成功している旨が指定されている場合、前記第2端末装置(221)のユーザに不正行為があったと判定する
不正判定工程
を備えることを特徴とする通信方法。 - コンピュータ通信網(241)に第1ルータ装置(212)を介して接続される第1端末コンピュータを第1端末装置(211)として機能させ、当該コンピュータ通信網(241)に第2ルータ装置(222)を介して接続される第2端末コンピュータを第2端末装置(221)として機能させる端末プログラムと、当該コンピュータ通信網(241)に接続されるサーバコンピュータをサーバ装置(231)として機能させるサーバプログラムと、を有するプログラムを記録したコンピュータ読取可能な情報記録媒体であって、前記第1端末装置(211)と、前記第2端末装置(221)と、が、前記第1ルータ装置(212)と、前記コンピュータ通信網(241)と、前記第2ルータ装置(222)と、を介して、互いを通信相手として通信するように、機能させ、
(a)前記端末プログラムは、前記第1端末コンピュータと、前記第2端末コンピュータと、の、それぞれを、
当該端末装置が接続されるルータ装置を介して、当該通信相手との通信を行う相手方通信部(502)、
前記相手方通信部(502)から当該通信相手への通信が成功すると、当該通信相手が接続されるルータ装置の通信識別子を取得するルータ識別子取得部(503)、
前記相手方通信部(502)から当該通信相手への通信が成功した後に失敗すると、前記取得された通信識別子を有するルータ装置への通信を行うルータ通信部(504)、
前記相手方通信部(502)から当該通信相手への通信が成功しているか否か、および、前記ルータ通信部(504)から当該通信相手が接続されるルータ装置への通信が成功しているか否かを指定する接続状況情報を、所定のタイミングで前記サーバコンピュータに送信する状況送信部(505)
として機能させ、
(b)前記サーバプログラムは、前記サーバコンピュータを、
前記第1端末コンピュータから送信される接続状況情報と、前記第2端末コンピュータから送信される接続状況情報と、を受信する状況受信部(701)、
前記受信された前記第1端末コンピュータからの接続状況情報と、前記第2端末コンピュータからの接続状況情報と、に、より、
(1)前記第1端末コンピュータから前記第2端末コンピュータへの通信が成功し、前記第2端末コンピュータから前記第1端末コンピュータへの通信が失敗し、前記第2端末コンピュータから前記第1ルータ装置(212)への通信が成功している旨が指定されている場合、前記第1端末コンピュータのユーザに不正行為があったと判定し、
(2)前記第2端末コンピュータから前記第1端末コンピュータへの通信が成功し、前記第1端末コンピュータから前記第2端末コンピュータへの通信が失敗し、前記第1端末コンピュータから前記第2ルータ装置(222)への通信が成功している旨が指定されている場合、前記第2端末コンピュータのユーザに不正行為があったと判定する
不正判定部(702)
として機能させることを特徴とするプログラムを記録したコンピュータ読取可能な情報記録媒体。 - コンピュータ通信網(241)に第1ルータ装置(212)を介して接続される第1端末コンピュータを第1端末装置(211)として機能させ、当該コンピュータ通信網(241)に第2ルータ装置(222)を介して接続される第2端末コンピュータを第2端末装置(221)として機能させる端末プログラムと、当該コンピュータ通信網(241)に接続されるサーバコンピュータをサーバ装置(231)として機能させるサーバプログラムと、を有するプログラムであって、前記第1端末装置(211)と、前記第2端末装置(221)と、が、前記第1ルータ装置(212)と、前記コンピュータ通信網(241)と、前記第2ルータ装置(222)と、を介して、互いを通信相手として通信するように、機能させ、
(a)前記端末プログラムは、前記第1端末コンピュータと、前記第2端末コンピュータと、の、それぞれを、
当該端末装置が接続されるルータ装置を介して、当該通信相手との通信を行う相手方通信部(502)、
前記相手方通信部(502)から当該通信相手への通信が成功すると、当該通信相手が接続されるルータ装置の通信識別子を取得するルータ識別子取得部(503)、
前記相手方通信部(502)から当該通信相手への通信が成功した後に失敗すると、前記取得された通信識別子を有するルータ装置への通信を行うルータ通信部(504)、
前記相手方通信部(502)から当該通信相手への通信が成功しているか否か、および、前記ルータ通信部(504)から当該通信相手が接続されるルータ装置への通信が成功しているか否かを指定する接続状況情報を、所定のタイミングで前記サーバコンピュータに送信する状況送信部(505)
として機能させ、
(b)前記サーバプログラムは、前記サーバコンピュータを、
前記第1端末コンピュータから送信される接続状況情報と、前記第2端末コンピュータから送信される接続状況情報と、を受信する状況受信部(701)、
前記受信された前記第1端末コンピュータからの接続状況情報と、前記第2端末コンピュータからの接続状況情報と、に、より、
(1)前記第1端末コンピュータから前記第2端末コンピュータへの通信が成功し、前記第2端末コンピュータから前記第1端末コンピュータへの通信が失敗し、前記第2端末コンピュータから前記第1ルータ装置(212)への通信が成功している旨が指定されている場合、前記第1端末コンピュータのユーザに不正行為があったと判定し、
(2)前記第2端末コンピュータから前記第1端末コンピュータへの通信が成功し、前記第1端末コンピュータから前記第2端末コンピュータへの通信が失敗し、前記第1端末コンピュータから前記第2ルータ装置(222)への通信が成功している旨が指定されている場合、前記第2端末コンピュータのユーザに不正行為があったと判定する
不正判定部(702)
として機能させることを特徴とするプログラム。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2009801000557A CN101785248B (zh) | 2008-02-15 | 2009-02-12 | 通信系统、通信方法、信息记录介质及程序 |
US12/867,744 US8560676B2 (en) | 2008-02-15 | 2009-02-12 | Communication system, communication method, information recording medium, and program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2008034497A JP4690432B2 (ja) | 2008-02-15 | 2008-02-15 | 通信システム、通信方法、ならびに、プログラム |
JP2008-034497 | 2008-02-15 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2009101962A1 true WO2009101962A1 (ja) | 2009-08-20 |
Family
ID=40956992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2009/052283 WO2009101962A1 (ja) | 2008-02-15 | 2009-02-12 | 通信システム、通信方法、情報記録媒体、ならびに、プログラム |
Country Status (6)
Country | Link |
---|---|
US (1) | US8560676B2 (ja) |
JP (1) | JP4690432B2 (ja) |
KR (1) | KR101079609B1 (ja) |
CN (1) | CN101785248B (ja) |
TW (1) | TWI368423B (ja) |
WO (1) | WO2009101962A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110105221A1 (en) * | 2009-11-04 | 2011-05-05 | Nintendo Co., Ltd. | Game system, storage medium and game controlling method |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5675235B2 (ja) * | 2010-09-10 | 2015-02-25 | 任天堂株式会社 | 情報処理システム、情報処理プログラムおよび情報処理方法 |
JP5675234B2 (ja) * | 2010-09-10 | 2015-02-25 | 任天堂株式会社 | 情報処理システム、情報処理プログラムおよび情報処理方法 |
US11258679B2 (en) | 2015-07-28 | 2022-02-22 | Spirent Communications, Inc. | Systems and methods for automated testing of MoCA networks |
US10129102B2 (en) | 2016-05-11 | 2018-11-13 | Spirent Communications, Inc. | Service based testing |
US10448007B2 (en) * | 2015-07-28 | 2019-10-15 | Spirent Communications, Inc. | Discovery and identification of layer 2 coax problems in MoCA networks |
CN112370793B (zh) * | 2020-11-25 | 2024-08-16 | 上海幻电信息科技有限公司 | 用户账号的风险控制方法及装置 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10107795A (ja) * | 1996-09-30 | 1998-04-24 | Hitachi Software Eng Co Ltd | ネットワーク管理システム |
WO2000039688A1 (fr) * | 1998-12-28 | 2000-07-06 | Sega Enterprises, Ltd. | Dispositif et procede de gestion de memoire de sauvegarde, machine de jeu et support enregistre |
JP2001034553A (ja) * | 1999-07-26 | 2001-02-09 | Hitachi Ltd | ネットワークアクセス制御方法及びその装置 |
JP2004222805A (ja) * | 2003-01-20 | 2004-08-12 | Konami Co Ltd | スコアシステム |
JP2005130166A (ja) * | 2003-10-23 | 2005-05-19 | Konami Computer Entertainment Studios Inc | 端末装置、端末方法、ならびに、プログラム |
JP2006212288A (ja) * | 2005-02-04 | 2006-08-17 | Konami Digital Entertainment:Kk | 不正行為防止方法、ゲーム装置及び不正行為防止プログラム |
WO2007094215A1 (ja) * | 2006-02-16 | 2007-08-23 | Konami Digital Entertainment Co., Ltd. | ゲーム端末装置、ゲーム管理システム及びゲーム管理方法 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH07131478A (ja) * | 1993-11-05 | 1995-05-19 | Fujitsu Ltd | Lan間通信方法及びlan間接続装置 |
JP2002082880A (ja) * | 2000-06-28 | 2002-03-22 | Oregadare Inc | メッセージの送受信管理方法及びメッセージの送受信管理システム |
US7263610B2 (en) * | 2002-07-30 | 2007-08-28 | Imagictv, Inc. | Secure multicast flow |
CN101771613B (zh) * | 2004-06-30 | 2012-11-07 | 松下电器产业株式会社 | 通信装置以及通信方法 |
CN100586102C (zh) * | 2004-07-06 | 2010-01-27 | 松下电器产业株式会社 | 移动路由器、归属代理、路由器位置登录方法以及移动网络系统 |
JP2006280817A (ja) * | 2005-04-04 | 2006-10-19 | Aruze Corp | 不正行為監視システム |
JP5252676B2 (ja) * | 2006-12-05 | 2013-07-31 | 株式会社バンダイナムコゲームス | プログラム、情報記憶媒体、ゲーム機及びネットワークシステム |
CN101119206B (zh) * | 2007-09-13 | 2011-03-02 | 北京交通大学 | 基于标识的一体化网络终端统一接入控制方法 |
-
2008
- 2008-02-15 JP JP2008034497A patent/JP4690432B2/ja active Active
-
2009
- 2009-02-12 CN CN2009801000557A patent/CN101785248B/zh active Active
- 2009-02-12 US US12/867,744 patent/US8560676B2/en active Active
- 2009-02-12 KR KR1020107003038A patent/KR101079609B1/ko active IP Right Grant
- 2009-02-12 WO PCT/JP2009/052283 patent/WO2009101962A1/ja active Application Filing
- 2009-02-13 TW TW098104632A patent/TWI368423B/zh active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH10107795A (ja) * | 1996-09-30 | 1998-04-24 | Hitachi Software Eng Co Ltd | ネットワーク管理システム |
WO2000039688A1 (fr) * | 1998-12-28 | 2000-07-06 | Sega Enterprises, Ltd. | Dispositif et procede de gestion de memoire de sauvegarde, machine de jeu et support enregistre |
JP2001034553A (ja) * | 1999-07-26 | 2001-02-09 | Hitachi Ltd | ネットワークアクセス制御方法及びその装置 |
JP2004222805A (ja) * | 2003-01-20 | 2004-08-12 | Konami Co Ltd | スコアシステム |
JP2005130166A (ja) * | 2003-10-23 | 2005-05-19 | Konami Computer Entertainment Studios Inc | 端末装置、端末方法、ならびに、プログラム |
JP2006212288A (ja) * | 2005-02-04 | 2006-08-17 | Konami Digital Entertainment:Kk | 不正行為防止方法、ゲーム装置及び不正行為防止プログラム |
WO2007094215A1 (ja) * | 2006-02-16 | 2007-08-23 | Konami Digital Entertainment Co., Ltd. | ゲーム端末装置、ゲーム管理システム及びゲーム管理方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110105221A1 (en) * | 2009-11-04 | 2011-05-05 | Nintendo Co., Ltd. | Game system, storage medium and game controlling method |
US9174127B2 (en) * | 2009-11-04 | 2015-11-03 | Nintendo Co., Ltd. | Video game with matchmaking based upon denial of communications |
Also Published As
Publication number | Publication date |
---|---|
TWI368423B (en) | 2012-07-11 |
KR20100040922A (ko) | 2010-04-21 |
CN101785248B (zh) | 2012-07-18 |
CN101785248A (zh) | 2010-07-21 |
KR101079609B1 (ko) | 2011-11-03 |
US8560676B2 (en) | 2013-10-15 |
TW200943839A (en) | 2009-10-16 |
US20100312889A1 (en) | 2010-12-09 |
JP2009189622A (ja) | 2009-08-27 |
JP4690432B2 (ja) | 2011-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4690432B2 (ja) | 通信システム、通信方法、ならびに、プログラム | |
TWI253580B (en) | Game apparatus, game method, and game program | |
US20090042646A1 (en) | Method and apparatus for player replacement in an on-line game | |
CA2585765C (en) | Game system and method for controlling game system, game server device therefor, and game device therefor | |
JP4632439B2 (ja) | 通信制御プログラム及びコンピュータ端末 | |
CN104602774A (zh) | 游戏系统、该游戏系统的控制方法以及在计算机装置中能读取的存储介质 | |
WO2007074665A1 (ja) | チャットシステム、チャット装置及びチャットサーバの制御方法、情報記憶媒体 | |
TW200822655A (en) | Custom ASIC combining VOIP and security IP | |
WO2010029024A1 (en) | Electronic gaming system and method | |
EP1206955A2 (en) | Information terminal, information providing server, online game method and recording medium | |
JP4330976B2 (ja) | 端末装置、端末方法、プログラム、ならびに、通信システム | |
US9220987B2 (en) | Method of exchanging data between communication terminals | |
JP3563398B2 (ja) | スコアシステム | |
JP3916601B2 (ja) | 通信システム、サーバ装置、端末、サービス方法、端末方法、および、プログラム | |
JP2021052240A (ja) | プログラム、通信装置、および通信方法 | |
JP6030884B2 (ja) | マッチング装置、ゲームシステム、マッチング方法、マッチングプログラム | |
US20090132930A1 (en) | E-mail community system for a network game and program therefor | |
CN115253311A (zh) | 一种棋牌游戏跨服务器战斗方法、设备及介质 | |
JP2003181145A (ja) | ネットワークゲームシステム、サーバシステム、クライアントシステム、ネットワークゲーム処理方法、プログラム及び記録媒体 | |
JP5222899B2 (ja) | ゲームシステム、サーバ装置、ログイン方法、ならびに、プログラム | |
JP6194458B2 (ja) | マッチング装置、ゲームシステム、マッチング方法、マッチングプログラム | |
JP4681659B2 (ja) | 確認システム、通信システム、確認サーバ装置、確認方法、ならびに、プログラム | |
JP5073793B2 (ja) | ゲーム端末、ゲーム端末の制御方法、ならびに、プログラム | |
JP3842251B2 (ja) | ノード装置、通信システム、ノード方法、ならびに、プログラム | |
Hiedels et al. | UbiSettlers--a dynamically adapting mobile P2P multiplayer game for hybrid networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200980100055.7 Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09709490 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 20107003038 Country of ref document: KR Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: 12867744 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 09709490 Country of ref document: EP Kind code of ref document: A1 |