Smart gamepad

ABSTRACT

A method for logging into a user gaming account may include connecting with a host game console and receiving a login code at a game controller from the host game console. The login code may be encrypted with a combination key and sent to the host game console. Consequently, user gaming account data may be provided to the host game console. Additionally, a method for receiving user gaming account data may include connecting to a game controller and connecting to a game server. A login code for a gaming account login may be received from the game server and the login code may be sent to the game controller. Next, an encrypted login code that has been encrypted with a combination key may be received from the game controller, and subsequently sent to the game server. Accordingly, user gaming account data may be received from the game controller.

CROSS-REFERENCE TO RELATED APPLICATIONS

The presentation application is a continuation of U.S. patentapplication Ser. No. 13/754,926, entitled “Smart Gamepad” and filed onJan. 31, 2013, the entirety of which is incorporated by referenceherein.

BACKGROUND

Traditional game controllers are merely accessories of various gamingconsoles and are not capable of storing gaming account information/dataand communicating stored gaming account information/data with otherdevices, such as game console units, gaming servers, or the like. As aresult, the conventional gaming experience typically is limited to theboundaries of a particular game console. Currently, it is impossible fora user to log in to multiple different gaming consoles with their uniquegame controller in order play a game individually or with other players.

BRIEF SUMMARY

According to an implementation of the disclosed subject matter, a methodfor logging into a user gaming account may include connecting with ahost game console and receiving a login code at a game controller fromthe host game console. The login code may be encrypted with acombination key and the encrypted login code may be sent to the hostgame console. Additionally, user gaming account data may be provided tothe host game console.

According to an implementation of the disclosed subject matter, a methodfor receiving user gaming account data may include connecting to a gamecontroller and connecting to a game server. A login code for a gamingaccount login may be received from the game server and the login codemay be sent to the game controller. Next, an encrypted login code thathas been encrypted with a combination key may be received from the gamecontroller. The encrypted login code may then be sent to the gameserver. As a result, user gaming account data may be received from thegame controller.

According to an implementation of the disclosed subject matter, a systemmay include a computer-readable medium storing user gaming account data.The system may also include a processor configured to connect with ahost game console and receive a login code at a game controller from thehost game console. The login code may be encrypted with a combinationkey and the encrypted login code may be sent to the host game console.Accordingly, user gaming account data may be provided to the host gameconsole.

According to an implementation of the disclosed subject matter, a systemmay include a processor configured to connect to a game controller and agame server. A login code for a gaming account login may be receivedfrom the game server. The login code may be sent to the game controller,and subsequently, the encrypted login code that has been encrypted witha combination key may be received from the game controller. Next, theencrypted login code may be sent to the game server, and as a result,user gaming account data may be received from the game controller.

According to an implementation of the disclosed subject matter, acomputer readable medium may store instructions causing a processor toconnect with a host game console and receive a login code at a gamecontroller from the host game console. The login code may be encryptedwith a combination key and sent to the host game console. Accordingly,user gaming account data may be sent to the host game console.

According to an implementation of the disclosed subject matter, acomputer readable medium may store instructions that cause a processorto connect to a game controller and a game server. A login code for agaming account login may be received from the game server and the logincode may be sent to the game controller. An encrypted login code thathas been encrypted with a combination key may be received from the gamecontroller. Next, the encrypted login code may be sent to the gameserver, and as a result, user gaming account data may be received fromthe game controller.

Additional features, advantages, and implementations of the disclosedsubject matter may be set forth or apparent from consideration of thefollowing detailed description, drawings, and claims. Moreover, it is tobe understood that both the foregoing summary and the following detaileddescription are examples and are intended to provide further explanationwithout limiting the scope of the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are included to provide a furtherunderstanding of the disclosed subject matter, are incorporated in andconstitute a part of this specification. The drawings also illustrateimplementations of the disclosed subject matter and together with thedetailed description serve to explain the principles of implementationsof the disclosed subject matter. No attempt is made to show structuraldetails in more detail than may be necessary for a fundamentalunderstanding of the disclosed subject matter and various ways in whichit may be practiced.

FIG. 1 shows an example process according to an implementation of thedisclosed subject matter.

FIG. 2 shows an example process according to an implementation of thedisclosed subject matter.

FIG. 3 shows an example information flow according to an implementationof the disclosed subject matter.

FIG. 4 shows an example information flow according to an implementationof the disclosed subject matter.

FIG. 5 shows an example information flow according to an implementationof the disclosed subject matter.

FIG. 6 shows a computer according to an implementation of the disclosedsubject matter.

FIG. 7 shows a network configuration according to an implementation ofthe disclosed subject matter.

DETAILED DESCRIPTION

The gaming experience may be improved if a user can log in to a hostgaming console using their unique personal game controller. By logginginto a host gaming console from a user's personal game controller, thehost game console may then automatically receive the user's gamingaccount information/data, thereby enhancing a user's gaming experience.

An implementation of the disclosed subject matter proposes systems andmethods for logging into a user gaming account on a host game console. Auser having their own personal game controller may wish to play games ondifferent host game consoles. For example, a user may wish to use a gameconsole at their home, a friend's house, or a public location, such as amall, an arcade, or a gaming convention. With a personal gamecontroller, a user can login to their gaming account at any host gameconsole. The pairing protocol allows the game controller to communicatewith and authenticate to a host game console in the background, withoutuser input. Since the user is not prompted or required to input anysecurity information, the game controller may log in or otherwise pairto a host game console without users seeing each other's logininformation and thereby prevent the exposure of personal information ona public host game console. Additionally, this may allow for personalinformation security and fast login.

The game controller also may connect with a variety of types of gamingconsoles, such as consoles from different manufacturers, and allowaccess to a user's gaming account info at each host console with whichthe controller is paired. Once logged in, the host game console isprovided with the user's gaming account information which may be storedon the user's game controller. Gaming account information may include auser's name, photo, gaming credits, game progress, avatar, and otherpersonal preferences. For example, a social gaming session may allow formultiple users, each having their own unique personal game controller,to connect with and login to a host game console and play a gametogether. In this regard, each user's gaming account information isprovided to the host game console thereby enhancing the gamingexperience.

In particular, an implementation of the disclosed subject matterprovides a method for logging into a user gaming account which includesconnecting a game controller to a host game console. This process may beperformed over a wired or wireless connection. For example, pairing orother connection of the game controller to the host game console may betriggered by various events, such as a wire connection event, near fieldcommunications (NFC) pairing event, Bluetooth pairing event, andscanning of a QR code. Next, a login code may be sent by the host gameconsole and received by the game controller. At the game controller, thelogin code may be encrypted with a combination key, typically withoutany further user input, and the encrypted login code may then be sent tothe host game console. As a result, the game controller may beauthenticated to the game console and the user's gaming account data maybe provided to the host game console.

Additionally, the game controller may be authenticated to multiple hostgame consoles, regardless of the type of game console. For example, auser's game controller may connect with the user's game console made byone manufacturer at the user's home as well as another game console madeby a different manufacturer at a gaming convention, allowing access tothe user's gaming account info at each host console with which thecontroller is paired.

Implementations of the disclosed subject matter may include techniquesfor an initial setup between the game controller and either or both ofthe host game console and the game server. This initial set up processmay occur prior to logging into a user gaming account from a gamecontroller and/or receiving user gaming account data at a host gameconsole, as described below. FIG. 5 shows an example data exchangeaccording to an implementation of the disclosed subject matter regardingthe initial set up process. As shown, a game controller may connect witha host game console at 501 by wired or wireless communication protocol.Next, the host game console may connect with the game server at 502. Thegame server may determine this to be the first login request for theuser gaming account at 503. As a result, the game server may send acombination key request to the host game console at 504 and the hostgame console may provide a login screen or similar interface at 505.Next, the host game console may send the combination key request to thegame controller at 506. In response, the game controller may send thecombination key to the host game console at 507, and the host gameconsole may send the combination key to the game server at 508. The gameserver may then send a verification request to the host game console at509. For example, this verification request may include additionalrequests for the combination key, and as a result, the host game consolemay send another combination key request to the game controller at 510.The game controller may then resend the combination key to the host gameconsole at 511, and the host game console may resend the combination keyto the game server at 512. Next, the game server may verify thecombination key at 513 by determining that the first receivedcombination key matches the second received combination key.Accordingly, the game server may store the combination key setting forthe user gaming account at 514 for future login events. If thecombination key cannot be verified, the initial set up may fail, and thegaming server may start the set up process again by sending acombination key request to the host game console at 504.

As an example, a user may wish to start the initial set up process forhis new game controller. Once the game controller is within a wirelessprotocol range from a host game console, the game controller may connectwith the host game console, such as by a Bluetooth connection. Next, thehost game console may connect with a game server and the game server maydetermine this to be the first game controller login request for theuser's gaming account. As a result, the game server may send acombination key request to the host game console. The host game consolemay provide the user with a login screen. The login screen may indicateto the user that the initial set up process is in progress. Next, thehost game console may send the combination key request to the gamecontroller. The combination key may be stored in the game controllerand, thus, the game controller may send the combination key to the hostgame console. Next, the host game console may send the combination keyto the game server. The game server may then send a verificationrequest. For example, the verification request may include additionalrequests for the combination key. The game controller may then resendthe combination key to the game server. Next, the game server may verifythe combination key by determining that the first received combinationkey matches the second received combination key. Accordingly, the gameserver may store the combination key setting for the user's gamingaccount for authenticating future login events. If the combination keycannot be verified, the user may be notified that initial set up failedand the game server may start the set up process again by sending acombination key request.

Implementations of the disclosed subject matter may include techniquesfor logging into a user gaming account from a game controller. The login process may occur subsequent to a successful initial set up processdescribed above and shown in FIG. 5. FIG. 1 shows an example of such alog in process. As shown, upon connecting the game controller with afirst host game console by a wired or wireless protocol connection at101, a login code may be received at the game controller from the firsthost game console at 102. The game controller may encrypt the firstlogin code with a combination key at 103. The combination key may be thecombination key previously verified during the initial set up processdescribed above. Next, the game controller may send the encrypted firstlogin code to the first host game console at 104. The encrypted firstlogin code may be verified. For example, the encrypted first login codemay be verified by encrypting the known login code with the previouslystored combination key from the initial setup process, and verifyingthat the login code encrypted with the combination key matches theencrypted, previously stored combination key from the initial set upprocess. If the encrypted login code is verified, the game controllermay provide user gaming account data to the first host game console at105.

Additionally, the present disclosure provides a method for receivinguser gaming account data which includes a host game console thatconnects to a game controller and a game server. First, the host gameconsole may receive a login code for gaming account login from the gameserver and may send the login code to the game controller. Next, thehost game console receives, from the game controller, an encrypted logincode that has been encrypted with a combination key. The host gameconsole then sends the encrypted login code to the game server, andsubsequently receives user gaming account data from the game controller.Further, the host game console may connect with multiple gamecontrollers, allowing the host game console to receive user gamingaccount information for multiple users from each users' game controller,separately or simultaneously.

Implementations of the disclosed subject matter may include techniquesfor receiving user gaming account data at a host game console. FIG. 2shows an example of such a process for receiving user gaming accountdata. As shown, a host game console may connect with a game controllerat 201 and connect with a game server at 202. The host game console mayreceive a login code for gaming account login from the game server at203. The host game console may send the login code to the gamecontroller at 204. The game controller encrypts the login code using thecombination key previously stored at the game controller, and sends theencrypted login code to the host game console. The host game console mayreceive the encrypted login code that has been encrypted with thecombination key from the game controller at 205, and the encrypted logincode may be sent to the game server at 206. The game server may verifythe encrypted login code. For example, the game server may verify theencrypted login code by verifying that the login code encrypted with thecombination key matches the previously stored combination key from theinitial set up process. If the encrypted login code is successfullyverified, the host game console may receive user gaming account datafrom the game controller at 207.

A login code may be a hexadecimal number, binary code, proprietary code,encrypted value, hash value, or any other similar identification codethat is capable of being encrypted using the combination key describedabove.

FIG. 3 shows an example data exchange according to an implementation ofthe disclosed subject matter. As previously described, logging into auser gaming account from a game controller may include connecting with ahost game console, at 301. Upon connecting with a host game console, thehost game console may display a login screen at 302 and subsequentlysend a login code to the game controller, at 303. The game controllermay then encrypt the login code with the combination key previouslyverified during the initial set up process, such as at 304. The gamecontroller may then send the encrypted login code to the host gameconsole, at 305. The encrypted login code may be verified. For example,the encrypted login code may be verified by verifying that the logincode encrypted with the combination key matches the combination keypreviously stored during the initial set up process. As a result ofsuccessful verification, the game controller may provide user gamingaccount data to the host game console, at 306.

FIG. 4 shows an example data exchange according to an implementation ofthe disclosed subject matter. As described above, receiving user gamingaccount data at a host game console may include a game controllerconnecting with a host game console at 401, and the host game consolesubsequently connecting with a game server at 402. The game server maythen send a login code for gaming account login to the host gameconsole, at 403. The host game console may then provide a login screenat 404 and send the login code to the game controller at 405. The gamecontroller may encrypt the login code with a combination key at 406. Forexample, the combination key may be the combination key that waspreviously verified during the initial set up process. The gamecontroller may send the encrypted login code to the host game console at407. The host game console may then send the encrypted login code to thegame server at 408. The game server may verify the encrypted login codeat 409. For example, the game server may verify the encrypted login codeby determining that the combination key matches the combination keypreviously stored during the initial set up process. If the encryptedlogin code is correctly verified, the game server may then log in to theuser gaming account at 410. Next, the game server may send to the hostgame console, a notification of successful login to the user gamingaccount at 411. Subsequently, the host game console may send to the gamecontroller, a notification of successful login to the user gamingaccount at 412. As a result, the game controller may provide user gamingaccount data to the host game console at 413. If however, the encryptedlogin code is not correctly verified, the game server may not log intothe user gaming account. In this case, the game server may re-start thelog in process and send a new login code for gaming account login, at403.

As an example, the user may take their previously set up game controllerto a friend's house. Once the user's game controller is within awireless protocol range from his friend's game console, the user's gamecontroller may connect with his friend's game console, such as byBluetooth connection. The game console may connect with the game server,and the game server may then send a login code for gaming account login.The host game console may then provide a login screen indicating thatthe login process is in progress. The game controller may encrypt thelogin code with the combination key. For example, the combination keymay be stored at the game controller that was previously verified by thegame server during the initial set up process. The game controller maysend the encrypted login code to the game server, directly or by way ofthe game console. The game server may verify the encrypted login code.For example, the game server may verify the encrypted login code byverifying that the combination key matches the combination keypreviously stored during the initial set up process. If the encryptedlogin code is correctly verified, the game server may then log in to theuser's gaming account and send a notification of successful login. As aresult, the game controller may provide the user's gaming account datato his friend's game console. If however, the encrypted login code isnot correctly verified, the game server may not log into the user gamingaccount and may re-start the log in process and send a new login codefor gaming account login.

A host game console may be any interactive entertainment system orcomputer such as a set-top box, mobile device, PC, laptop, tablet,television, game machine, or the like.

As used herein, a game controller may be a device type including a gamepad, mobile device, tablet, keyboard, mouse, joystick, virtual realitydevice, or a game-specific device. A game-specific device may be adevice that is related to the subject matter of a particular game suchas a racing wheel, gear shift, trackball, musical instrument, balanceboard, workout/fitness equipment, physical game-related item such as asimulated pistol, sport equipment, flight control, control pedals,handlebars, and the like.

Additionally, the game controller may have storage capability forstoring various data and credentials such as user gaming accountdata/information and user gaming account login information. The gamecontroller may have communication capability based on various wired andwireless communication protocols such as a physical wire, USB, Wi-Fi,Bluetooth, internet, and the like.

As used herein, user gaming account information/data may include username, image, game data, photo, avatar, billing information, controlpreferences, and other user preferences and settings. Game data mayinclude game credits, game progress, score, game-related items,characters, avatar, character-attributes, statistics, character status,and the like.

Implementations of the presently disclosed subject matter may beimplemented in and used with a variety of component and networkarchitectures. FIG. 6 is an example computer 20 suitable forimplementing implementations of the presently disclosed subject matter.The computer 20 includes a bus 21 which interconnects major componentsof the computer 20, such as a central processor 24, a memory 27(typically RAM, but which may also include ROM, flash RAM, or the like),an input/output controller 28, a user display 22, such as a displayscreen via a display adapter, a user input interface 26, which mayinclude one or more controllers and associated user input devices suchas a keyboard, mouse, and the like, and may be closely coupled to theI/O controller 28, fixed storage 23, such as a hard drive, flashstorage, Fibre Channel network, SAN device, SCSI device, and the like,and a removable media component 25 operative to control and receive anoptical disk, flash drive, and the like.

The bus 21 allows data communication between the central processor 24and the memory 27, which may include read-only memory (ROM) or flashmemory (neither shown), and random access memory (RAM) (not shown), aspreviously noted. The RAM is generally the main memory into which theoperating system and application programs are loaded. The ROM or flashmemory can contain, among other code, the Basic Input-Output system(BIOS) which controls basic hardware operation such as the interactionwith peripheral components. Applications resident with the computer 20are generally stored on and accessed via a computer readable medium,such as a hard disk drive (e.g., fixed storage 23), an optical drive,floppy disk, or other storage medium 25.

The fixed storage 23 may be integral with the computer 20 or may beseparate and accessed through other interfaces. A network interface 29may provide a direct connection to a remote server via a telephone link,to the Internet via an internet service provider (ISP), or a directconnection to a remote server via a direct network link to the Internetvia a POP (point of presence) or other technique. The network interface29 may provide such connection using wireless techniques, includingdigital cellular telephone connection, Cellular Digital Packet Data(CDPD) connection, digital satellite data connection or the like. Forexample, the network interface 29 may allow the computer to communicatewith other computers via one or more local, wide-area, or othernetworks, as shown in FIG. 7.

Many other devices or components (not shown) may be connected in asimilar manner (e.g., document scanners, digital cameras and so on).Conversely, all of the components shown in FIG. 6 need not be present topractice the present disclosure. The components can be interconnected indifferent ways from that shown. The operation of a computer such as thatshown in FIG. 6 is readily known in the art and is not discussed indetail in this application. Code to implement the present disclosure canbe stored in computer-readable storage media such as one or more of thememory 27, fixed storage 23, removable media 25, or on a remote storagelocation.

FIG. 7 shows an example network arrangement according to animplementation of the disclosed subject matter. One or more clients 10,11, such as local computers, smart phones, tablet computing devices, andthe like may connect to other devices via one or more networks 7. Thenetwork may be a local network, wide-area network, the Internet, or anyother suitable communication network or networks, and may be implementedon any suitable platform including wired and/or wireless networks. Theclients may communicate with one or more servers 13 and/or databases 15.The devices may be directly accessible by the clients 10, 11, or one ormore other devices may provide intermediary access such as where aserver 13 provides access to resources stored in a database 15. Theclients 10, 11 also may access remote platforms 17 or services providedby remote platforms 17 such as cloud computing arrangements andservices. The remote platform 17 may include one or more servers 13and/or databases 15.

More generally, various implementations of the presently disclosedsubject matter may include or be embodied in the form ofcomputer-implemented processes and apparatuses for practicing thoseprocesses. Implementations also may be embodied in the form of acomputer program product having computer program code containinginstructions embodied in non-transitory and/or tangible media, such asfloppy diskettes, CD-ROMs, hard drives, USB (universal serial bus)drives, or any other machine readable storage medium, wherein, when thecomputer program code is loaded into and executed by a computer, thecomputer becomes an apparatus for practicing implementations of thedisclosed subject matter. Implementations also may be embodied in theform of computer program code, for example, whether stored in a storagemedium, loaded into and/or executed by a computer, or transmitted oversome transmission medium, such as over electrical wiring or cabling,through fiber optics, or via electromagnetic radiation, wherein when thecomputer program code is loaded into and executed by a computer, thecomputer becomes an apparatus for practicing implementations of thedisclosed subject matter. When implemented on a general-purposemicroprocessor, the computer program code segments configure themicroprocessor to create specific logic circuits. In someconfigurations, a set of computer-readable instructions stored on acomputer-readable storage medium may be implemented by a general-purposeprocessor, which may transform the general-purpose processor or a devicecontaining the general-purpose processor into a special-purpose deviceconfigured to implement or carry out the instructions. Implementationsmay be implemented using hardware that may include a processor, such asa general purpose microprocessor and/or an Application SpecificIntegrated Circuit (ASIC) that embodies all or part of the techniquesaccording to implementations of the disclosed subject matter in hardwareand/or firmware. The processor may be coupled to memory, such as RAM,ROM, flash memory, a hard disk or any other device capable of storingelectronic information. The memory may store instructions adapted to beexecuted by the processor to perform the techniques according toimplementations of the disclosed subject matter.

In situations in which the systems discussed here collect personalinformation about users, or may make use of personal information, theusers may be provided with an opportunity to control whether programs orfeatures collect user information (e.g., information about a user'ssocial or gaming networks, social/gaming actions or activities,profession, a user's preferences, or a user's current location), or tocontrol whether and/or how to receive content from the content serverthat may be more relevant to the user. In addition, certain data may betreated in one or more ways before it is stored or used, so thatpersonally identifiable information is removed. For example, a user'sidentity may be treated so that no personally identifiable informationcan be determined for the user, or a user's geographic location may begeneralized where location information is obtained (such as to a city,ZIP code, or state level), so that a particular location of a usercannot be determined. Thus, the user may have control over howinformation is collected about the user and used by a content server.

The foregoing description, for purpose of explanation, has beendescribed with reference to specific implementations. However, theillustrative discussions above are not intended to be exhaustive or tolimit implementations of the disclosed subject matter to the preciseforms disclosed. Many modifications and variations are possible in viewof the above teachings. The implementations were chosen and described inorder to explain the principles of implementations of the disclosedsubject matter and their practical applications, to thereby enableothers skilled in the art to utilize those implementations as well asvarious implementations with various modifications as may be suited tothe particular use contemplated.

The invention claimed is:
 1. A system comprising: a gamepad comprising:a wireless network interface configured to couple to any of a pluralityof host game consoles; a memory configured to store an encryption key;and a hardware processor coupled to the wireless network interface andthe memory, wherein the hardware processor is configured to: detect afirst host game console and establish a first wireless connection withthe first host game console via the wireless network interface; receivevia the first wireless connection a first login code from the first hostgame console as part of a first authentication process to authenticatethe gamepad with a game server executing a game; encrypt, using theencryption key accessed from the memory, the first login code togenerate an encrypted first login code; and transmit the encrypted firstlogin code for receipt by the first host game console via the firstwireless connection for further transmission to the game server as partof the first authentication process.
 2. The system of claim 1, wherein:the hardware processor further is configured to: receive a firstnotification of a successful login to a user game account at the gameserver from the first host game console via the first wirelessconnection; and provide user gaming account data for transmission to thefirst host game console via the first wireless connection responsive toreceiving the first notification, the user gaming account data includingat least one of: a user name, a photo associated with a user, an avatarassociated with a user, billing information, gamepad controlpreferences, game credits, game progress, game score, characterattributes, and character status.
 3. The system of claim 2, furthercomprising: the game server, wherein the game server is to configureexecution of the game for a user associated with the encryption keybased on the user gaming account data.
 4. The system of claim 1, whereinthe hardware processor further is configured to: detect a second hostgame console and establish a second wireless connection with the secondhost game console via the wireless network interface; receive via thesecond wireless connection a second login code from the second host gameconsole as part of a second authentication process to authenticate thegamepad with the game server; encrypt, using the encryption key accessedfrom the memory, the second login code to generate an encrypted secondlogin code; and transmit the encrypted second login code for receipt bythe second host game console via the second wireless connection forfurther transmission to the game server as part of the secondauthentication process.
 5. The system of claim 4, wherein: the hardwareprocessor further is configured to: receive a first notification of asuccessful login to a user game account at the game server from thefirst host game console via the first wireless connection; provide usergaming account data for transmission to the first host game console viathe first wireless connection responsive to receiving the firstnotification; receive a second notification of a successful login to theuser game account at the game server from the second host game consolevia the second wireless connection; provide the user gaming account datafor transmission to the second host game console via the second wirelessconnection responsive to receiving the second notification; and whereinthe user gaming account data including at least one of: a user name, aphoto associated with a user, an avatar associated with a user, billinginformation, gamepad control preferences, game credits, game progress,game score, character attributes, and character status.
 6. The system ofclaim 1, further comprising: the first host game console.
 7. The systemof claim 6, wherein the first host game console is configured to:receive the first login code from the game server via a networkconnection; display a login screen including the first login code at adisplay; and transmit the first login code to the gamepad via the firstwireless connection.
 8. The system of claim 1, further comprising: thegame server.
 9. The system of claim 8, wherein the game server isconfigured to: transmit the first login code to the first host gameconsole via a network connection; and authenticate the gamepad for auser game account using the encrypted first login code.
 10. A method forauthenticating a gamepad with a game server executing a game via any ofa plurality of host game controllers coupleable to the game server, themethod comprising: detecting, at a hardware processor of the gamepad, afirst host game console in proximity to the gamepad and establishing afirst wireless connection with the first host game console via awireless network interface of the gamepad; receiving, at the hardwareprocessor via the first wireless connection, a first login code from thefirst host game console as part of a first authentication process toauthenticate the gamepad with the game server; encrypting, at thehardware processor, the first login code using an encryption keyaccessed from a memory of the gamepad to generate an encrypted firstlogin code; and transmitting the encrypted first login code for receiptby the first host game console via the first wireless connection forfurther transmission to the game server as part of the firstauthentication process.
 11. The method of claim 10, further comprising:receiving, at the hardware processor, a first notification of asuccessful login to a user game account at the game server from thefirst host game console via the first wireless connection; and providinguser gaming account data from the memory for transmission to the firsthost game console via the first wireless connection responsive toreceiving the first notification, the user gaming account data includingat least one of: a user name, a photo associated with a user, an avatarassociated with a user, billing information, gamepad controlpreferences, game credits, game progress, game score, characterattributes, and character status.
 12. The method of claim 11, furthercomprising: configuring, at the game server, execution of the game for auser associated with the encryption key based on the user gaming accountdata.
 13. The method of claim 10, further comprising: detecting, at thehardware processor, a second host game console and establishing a secondwireless connection with the second host game console via the wirelessnetwork interface; receiving, at the hardware processor via the secondwireless connection, a second login code from the second host gameconsole as part of a second authentication process to authenticate thegamepad with the game server; encrypting, at the hardware processor, thesecond login code using the encryption key accessed from the memory togenerate an encrypted second login code; and transmitting the encryptedsecond login code for receipt by the second host game console via thesecond wireless connection for further transmission to the game serveras part of the second authentication process.
 14. The method of claim13, further comprising receiving, at the hardware processor, a firstnotification of a successful login to a user game account at the gameserver from the first host game console via the first wirelessconnection; providing user gaming account data from the memory fortransmission to the first host game console via the first wirelessconnection responsive to receiving the first notification; receiving, atthe hardware processor, a second notification of a successful login tothe user game account at the game server from the second host gameconsole via the second wireless connection; providing the user gamingaccount data from the memory for transmission to the second host gameconsole via the second wireless connection responsive to receiving thesecond notification; and wherein the user gaming account data includingat least one of: a user name, a photo associated with a user, an avatarassociated with a user, billing information, gamepad controlpreferences, game credits, game progress, game score, characterattributes, and character status.
 15. The method of claim 10, furthercomprising: receiving, at the first host game console, the first logincode from the game server via a network connection; displaying, by thefirst host game console, a login screen including the first login codeat a display; and transmitting the first login code from the first hostgame console to the gamepad via the first wireless connection.
 16. Themethod of claim 15, further comprising: transmitting the first logincode from the game server to the first host game console via the networkconnection; and authenticating, at the game server, the gamepad for auser game account using the encrypted first login code.
 17. Anon-transitory computer-readable medium storing executable instructionsthat, when executed by a hardware processor of a gamepad, manipulate thegamepad to: detect a first host game console in proximity to the gamepadand establish a first wireless connection with the first host gameconsole via a wireless network interface of the gamepad; receive, at thehardware processor via the first wireless connection, a first login codefrom the first host game console as part of a first authenticationprocess to authenticate the gamepad with a game server executing a game;encrypt, at the hardware processor, the first login code using anencryption key accessed from a memory of the gamepad to generate anencrypted first login code; and transmit the encrypted first login codefor receipt by the first host game console via the first wirelessconnection for further transmission to the game server as part of thefirst authentication process.
 18. The non-transitory computer-readablemedium of claim 17, wherein the executable instructions are further tomanipulate the gamepad to: receive, at the hardware processor, a firstnotification of a successful login to a user game account at the gameserver from the first host game console via the first wirelessconnection; and provide user gaming account data from the memory fortransmission to the first host game console via the first wirelessconnection responsive to receiving the first notification, the usergaming account data including at least one of: a user name, a photoassociated with a user, an avatar associated with a user, billinginformation, gamepad control preferences, game credits, game progress,game score, character attributes, and character status.
 19. Thenon-transitory computer-readable medium of claim 17, wherein theexecutable instructions are further to manipulate the gamepad to:detect, at the hardware processor, a second host game console andestablish a second wireless connection with the second host game consolevia the wireless network interface; receive, at the hardware processorvia the second wireless connection, a second login code from the secondhost game console as part of a second authentication process toauthenticate the gamepad with the game server; encrypt, at the hardwareprocessor, the second login code using the encryption key accessed fromthe memory to generate an encrypted second login code; and transmit theencrypted second login code for receipt by the second host game consolevia the second wireless connection for further transmission to the gameserver as part of the second authentication process.
 20. Thenon-transitory computer-readable medium of claim 19, wherein theexecutable instructions are further to manipulate the gamepad to:receive, at the hardware processor, a first notification of a successfullogin to a user game account at the game server from the first host gameconsole via the first wireless connection; provide user gaming accountdata from the memory for transmission to the first host game console viathe first wireless connection responsive to receiving the firstnotification; receive, at the hardware processor, a second notificationof a successful login to the user game account at the game server fromthe second host game console via the second wireless connection; providethe user gaming account data from the memory for transmission to thesecond host game console via the second wireless connection responsiveto receiving the second notification; and wherein the user gamingaccount data including at least one of: a user name, a photo associatedwith a user, an avatar associated with a user, billing information,gamepad control preferences, game credits, game progress, game score,character attributes, and character status.