CA2362450A1 - Electronic security technique for gaming software - Google Patents
Electronic security technique for gaming software Download PDFInfo
- Publication number
- CA2362450A1 CA2362450A1 CA002362450A CA2362450A CA2362450A1 CA 2362450 A1 CA2362450 A1 CA 2362450A1 CA 002362450 A CA002362450 A CA 002362450A CA 2362450 A CA2362450 A CA 2362450A CA 2362450 A1 CA2362450 A1 CA 2362450A1
- Authority
- CA
- Canada
- Prior art keywords
- code
- live
- gaming device
- computing
- verification code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3241—Security aspects of a gaming system, e.g. detecting cheating, device integrity, surveillance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2109—Game systems
Abstract
A method and apparatus for securing the game program software and related da ta files used by a gaming device and for authenticating such files during game startup and play. In one embodiment of the present invention, a verification code is generated by the manufacturer for each software file and data file used by the game. The verification codes are stored in a non-volatile, tampe r- proof, read-only memory device, which is (in some embodiments) securely attached to the gaming device. On some or every download of the game softwar e and/or related data files into the gaming device, commencement of a game, or on the occurrence of certain pre-defined events, the stored verification cod e is used to validate the game software and data files. In some embodiments, verification is performed automatically on a periodic basis without operator or player action. Verification consists of calculating a live verification code for some or all of the software and data files present in the alterable random access memory using the same method chosen to create the stored verification code. In some embodiments of the present invention, the verification code is the result of a hash function of trusted copies of each software and related data file. If the live code matches the stored code for every suspect file, then operation and play proceeds normally. If, however, one or more codes do not match, an error condition is declared, operation is halted, and notification of the error condition follows.
Claims (40)
1. A method of authenticating a suspect computer file in a gaming device comprising:
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
2. The method of Claim 1, wherein:
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
3. The method of Claim 2, wherein said hashing uses a Panama hash code.
4. The method of Claim 1, wherein said unalterable memory device comprises a read-only memory.
5. The method of Claim 1, further comprising prohibiting play if the live code is not equal to the verification code.
6. The method of Claim 5, further comprising alerting an operator.
7. The method of Claim 1, further comprising:
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
8. The method of Claim 1, further comprising:
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
9. An apparatus for authenticating a suspect computer file in a gaming device, comprising:
circuitry external to said gaming device for computing a verification code for a trusted computer file containing a game program code or a game related code;
an unalterable memory device in said gaming device adapted to being configured by said external circuitry to store said verification code and storing said verification code;
circuitry in said gaming device for computing a live code from said suspect computer file on loading of said suspect computer file into an alterable memory in said gaming device; and circuitry in said gaming device for comparing said live code to said verification code and permitting operation of said suspect computer file if said live code is equal to said verification code.
circuitry external to said gaming device for computing a verification code for a trusted computer file containing a game program code or a game related code;
an unalterable memory device in said gaming device adapted to being configured by said external circuitry to store said verification code and storing said verification code;
circuitry in said gaming device for computing a live code from said suspect computer file on loading of said suspect computer file into an alterable memory in said gaming device; and circuitry in said gaming device for comparing said live code to said verification code and permitting operation of said suspect computer file if said live code is equal to said verification code.
10. The apparatus of Claim 9, wherein:
said circuitry for computing the verification code hashes said trusted computer file; and said circuitry for computing the live code hashes said suspect computer file.
said circuitry for computing the verification code hashes said trusted computer file; and said circuitry for computing the live code hashes said suspect computer file.
11. The apparatus of Claim 10, wherein said circuitry for computing said verification code and said circuitry for computing said live code use a Panama hash code.
12. The apparatus of Claim 9, wherein said unalterable memory device comprises a read-only memory.
13. The apparatus of Claim 9 wherein said circuitry for comparing further comprises circuitry prohibiting play if the live code is not equal to the verification rode.
14. The apparatus of Claim 13, wherein said circuitry for comparing further comprises circuitry alerting an operator.
15. The apparatus of Claim 9, further comprising:
circuitry for computing a second live code in said gaming device from said alterable memory on a designated event; and circuitry for comparing said second live code to said verification code stored in said unalterable memory device and permitting operation of said computer file if said second live code is equal to said verification code.
circuitry for computing a second live code in said gaming device from said alterable memory on a designated event; and circuitry for comparing said second live code to said verification code stored in said unalterable memory device and permitting operation of said computer file if said second live code is equal to said verification code.
16. The apparatus of Claim 9, further comprising:
circuitry for computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval; and circuitry for comparing said second live code to said verification code stored in said unalterable memory device and permitting operation of said computer file if said second live code is equal to said verification code.
circuitry for computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval; and circuitry for comparing said second live code to said verification code stored in said unalterable memory device and permitting operation of said computer file if said second live code is equal to said verification code.
17. A computer system for authenticating a suspect computer file in a gaming device, comprising computer instructions for:
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
18. The computer system of Claim 17, wherein:
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
19. The computer system of Claim 18, wherein said hashing uses a Panama hash code.
20. The computer system of Claim 17, wherein said unalterable memory device comprises a read-only memory.
21. The computer system of Claim 17, further comprising prohibiting play if the live code is not equal to the verification code.
22. The computer system of Claim 21, further comprising alerting an operator.
23. The computer system of Claim 17, further comprising:
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
24. The computer system of Claim 17, further comprising:
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
25. A computer-readable storage medium, comprising computer instructions for:
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
26. The computer-readable storage medium of Claim 25, wherein:
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
27. The computer-readable storage medium of Claim 26, wherein said hashing uses a Panama hash code.
28. The computer-readable storage medium of Claim 25, wherein said unalterable memory device comprises a read-only memory.
29. The computer-readable storage medium of Claim 25, further comprising prohibiting play if the live code is not equal to the verification code.
30. The computer-readable storage medium of Claim 29, further comprising alerting an operator.
31. The computer-readable storage medium of Claim 25, further comprising:
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
32. The computer-readable storage medium of Claim 25, further comprising:
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
33. A computer data signal embodied in a Garner wave, comprising computer instructions for:
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
computing a verification code for a trusted computer file containing a game program code or a game-related code external to said gaming device;
storing said verification code in an unalterable memory device in said gaming device;
on loading of said suspect computer file into an alterable memory in said gaming device, computing a live code from said suspect computer file in said gaming device;
comparing said live code to said verification code in said gaming device; and permitting operation of said suspect computer file if said live code is equal to said verification code.
34. The computer data signal of Claim 33, wherein:
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
said computing the verification code comprises hashing said trusted computer file; and said computing the live code comprises hashing said suspect computer file.
35. The computer data signal of Claim 34, wherein said hashing uses a Panama hash code.
36. The computer data signal of Claim 33, wherein said unalterable memory device comprises a read-only memory.
37. The computer data signal of Claim 33, further comprising prohibiting play if the live code is not equal to the verification code.
38. The computer data signal of Claim 37, further comprising alerting an operator.
39. The computer data signal of Claim 33, further comprising:
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on a designated event;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
40. The computer data signal of Claim 33, further comprising:
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
computing a second live code in said gaming device from said alterable memory on elapse of a defined time interval;
comparing said second live code to said verification code; and permitting operation of said computer file if said second live code is equal to said verification code.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/476,915 US6595856B1 (en) | 2000-01-04 | 2000-01-04 | Electronic security technique for gaming software |
US09/476,915 | 2000-01-04 | ||
PCT/US2000/035688 WO2001050230A2 (en) | 2000-01-04 | 2000-12-29 | Electronic security technique for gaming software |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2362450A1 true CA2362450A1 (en) | 2001-07-12 |
CA2362450C CA2362450C (en) | 2011-03-08 |
Family
ID=23893770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2362450A Expired - Lifetime CA2362450C (en) | 2000-01-04 | 2000-12-29 | Electronic security technique for gaming software |
Country Status (4)
Country | Link |
---|---|
US (1) | US6595856B1 (en) |
AU (1) | AU782891B2 (en) |
CA (1) | CA2362450C (en) |
WO (1) | WO2001050230A2 (en) |
Families Citing this family (115)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AUPP734298A0 (en) * | 1998-11-26 | 1998-12-24 | Aristocrat Leisure Industries Pty Ltd | Electronic casino gaming with authentication and improved security |
US7988559B2 (en) | 2001-03-08 | 2011-08-02 | Igt | Computerized gaming system, method and apparatus |
US7043641B1 (en) * | 2000-03-08 | 2006-05-09 | Igt | Encryption in a secure computerized gaming system |
BR0110400A (en) * | 2000-04-28 | 2004-10-19 | Moldflow Corp | Network Enabled Application Software Method and System |
US7695363B2 (en) | 2000-06-23 | 2010-04-13 | Igt | Gaming device having multiple display interfaces |
US7699699B2 (en) | 2000-06-23 | 2010-04-20 | Igt | Gaming device having multiple selectable display interfaces based on player's wagers |
US9626824B2 (en) * | 2000-10-11 | 2017-04-18 | Igt | Game result graphical verification on remote clients |
US7384339B2 (en) * | 2000-10-11 | 2008-06-10 | Igt | Frame capture of actual game play |
US8678902B2 (en) | 2005-09-07 | 2014-03-25 | Bally Gaming, Inc. | System gaming |
US8479189B2 (en) | 2000-11-17 | 2013-07-02 | Hewlett-Packard Development Company, L.P. | Pattern detection preprocessor in an electronic device update generation system |
US7409685B2 (en) | 2002-04-12 | 2008-08-05 | Hewlett-Packard Development Company, L.P. | Initialization and update of software and/or firmware in electronic devices |
US6949022B1 (en) * | 2000-11-22 | 2005-09-27 | Trilogy Development Group, Inc. | Distributed secrets for validation of gaming transactions |
AUPR188200A0 (en) * | 2000-12-04 | 2001-01-04 | Aristocrat Technologies Australia Pty Limited | Gaming video overlay |
US6918831B2 (en) * | 2002-09-13 | 2005-07-19 | Igt | Method and apparatus for independently verifying game outcome |
DE10110049A1 (en) * | 2001-03-02 | 2002-09-05 | Bosch Gmbh Robert | Encryption of program data for use in control devices or controllers, involves using decryption key within the control device, to reduce the amount of data to transfer |
DE10210173B4 (en) * | 2001-07-05 | 2012-12-06 | Adp Gauselmann Gmbh | A method of encrypting data sent from a peripheral module to a coin operated machine control unit |
US7162036B2 (en) * | 2001-08-06 | 2007-01-09 | Igt | Digital identification of unique game characteristics |
US6685567B2 (en) | 2001-08-08 | 2004-02-03 | Igt | Process verification |
US20060036874A1 (en) * | 2001-08-08 | 2006-02-16 | Igt | Data pattern verification in a gaming machine environment |
GB2379297B (en) * | 2001-09-03 | 2005-02-23 | Intercede Ltd | Server with file verification |
US6890259B2 (en) * | 2001-09-10 | 2005-05-10 | Igt | Modular tilt handling system |
US6902481B2 (en) | 2001-09-28 | 2005-06-07 | Igt | Decoupling of the graphical presentation of a game from the presentation logic |
US20050227769A1 (en) * | 2001-09-28 | 2005-10-13 | Morrow James W | Gaming device network managing system and method |
US7749076B2 (en) * | 2002-09-13 | 2010-07-06 | Bally Gaming, Inc. | System and method for an alterable storage media in a gaming machine |
US20040054952A1 (en) * | 2002-09-13 | 2004-03-18 | Morrow James W. | Device verification system and method |
US8708828B2 (en) | 2001-09-28 | 2014-04-29 | Igt | Pluggable modular gaming modifiers and configuration templates for gaming environments |
US7931533B2 (en) | 2001-09-28 | 2011-04-26 | Igt | Game development architecture that decouples the game logic from the graphics logics |
EP1463569A4 (en) * | 2001-11-26 | 2010-06-02 | Igt Reno Nev | Pass-through live validation device and method |
US7980937B2 (en) * | 2001-12-13 | 2011-07-19 | Scientific Games International, Inc. | Lottery audit system |
US7316616B2 (en) * | 2002-01-16 | 2008-01-08 | Igt | Gaming system license management |
US8226473B2 (en) * | 2002-04-10 | 2012-07-24 | Wms Gaming Inc. | Gaming software authentication |
GB2390703A (en) | 2002-07-02 | 2004-01-14 | Ascent Group Ltd | Storage and authentication of data transactions |
US7320642B2 (en) * | 2002-09-06 | 2008-01-22 | Wms Gaming Inc. | Security of gaming software |
US8529349B2 (en) | 2004-09-16 | 2013-09-10 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US7730325B2 (en) * | 2002-09-13 | 2010-06-01 | Bally Gaming, Inc. | Verification system and method |
US7907729B2 (en) * | 2002-09-13 | 2011-03-15 | Bally Gaming, Inc. | Rollback attack prevention system and method |
US9117342B2 (en) | 2004-09-16 | 2015-08-25 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US8992326B2 (en) | 2006-09-06 | 2015-03-31 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US9082260B2 (en) | 2004-09-16 | 2015-07-14 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US8535158B2 (en) * | 2004-09-16 | 2013-09-17 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US9053610B2 (en) | 2002-09-13 | 2015-06-09 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US8568237B2 (en) | 2004-09-16 | 2013-10-29 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US6926605B2 (en) * | 2002-09-13 | 2005-08-09 | Igt | Method and apparatus for independently verifying game outcome |
US20040087367A1 (en) * | 2002-10-31 | 2004-05-06 | Hendrickson Robert J. | Real-time rules-based service management system for gaming activities |
US7892087B1 (en) * | 2002-12-02 | 2011-02-22 | Sca Promotions, Inc. | Authentication of game results |
US7263720B2 (en) * | 2002-12-16 | 2007-08-28 | Intel Corporation | Method and mechanism for validating legitimate software calls into secure software |
US7281244B2 (en) | 2003-01-16 | 2007-10-09 | Sun Microsystems, Inc. | Using a digital fingerprint to commit loaded data in a device |
US7272830B2 (en) | 2003-01-16 | 2007-09-18 | Sun Microsystems, Inc. | Ordering program data for loading on a device |
US7222331B2 (en) | 2003-01-16 | 2007-05-22 | Sun Microsystems, Inc. | Linking of virtual methods |
US20040143739A1 (en) * | 2003-01-16 | 2004-07-22 | Sun Mircosystems, Inc., A Delaware Corporation | Run time code integrity checks |
US7165246B2 (en) | 2003-01-16 | 2007-01-16 | Sun Microsystems, Inc. | Optimized representation of data type information in program verification |
US8121955B2 (en) * | 2003-01-16 | 2012-02-21 | Oracle America, Inc. | Signing program data payload sequence in program loading |
US7484095B2 (en) | 2003-01-16 | 2009-01-27 | Sun Microsystems, Inc. | System for communicating program data between a first device and a second device |
US8784195B1 (en) | 2003-03-05 | 2014-07-22 | Bally Gaming, Inc. | Authentication system for gaming machines |
GB0311670D0 (en) * | 2003-05-21 | 2003-06-25 | Waterleaf Ltd | Betting terminal with watchdog facility |
US7367889B2 (en) * | 2003-06-09 | 2008-05-06 | Wms Gaming Inc. | Gaming machine having hardware-accelerated software authentication |
US7600108B2 (en) * | 2003-06-17 | 2009-10-06 | Wms Gaming Inc. | Gaming machine having reduced-read software authentication |
US7491122B2 (en) * | 2003-07-09 | 2009-02-17 | Wms Gaming Inc. | Gaming machine having targeted run-time software authentication |
US7878902B2 (en) * | 2003-07-16 | 2011-02-01 | Igt | Secured verification of configuration data for field programmable gate array devices |
US7536725B2 (en) * | 2003-07-28 | 2009-05-19 | Limelight Networks, Inc. | Authentication of content download |
US8122100B2 (en) * | 2003-07-28 | 2012-02-21 | Limelight Networks, Inc. | Multiple object download |
US8805966B2 (en) | 2003-07-28 | 2014-08-12 | Limelight Networks, Inc. | Rich content download |
US8555273B1 (en) | 2003-09-17 | 2013-10-08 | Palm. Inc. | Network for updating electronic devices |
SG146663A1 (en) | 2003-10-03 | 2008-10-30 | Limelight Networks Inc | Rich content download |
US20050143171A1 (en) * | 2003-12-30 | 2005-06-30 | Loose Timothy C. | Gaming machine having sampled software verification |
GB0403705D0 (en) * | 2004-02-19 | 2004-03-24 | Waterleaf Ltd | Gaming facility and method of operation thereof |
US7904895B1 (en) | 2004-04-21 | 2011-03-08 | Hewlett-Packard Develpment Company, L.P. | Firmware update in electronic devices employing update agent in a flash memory card |
WO2005106674A1 (en) * | 2004-04-30 | 2005-11-10 | Konami Australia Pty Ltd | Storage system for a gaming machine |
US8526940B1 (en) | 2004-08-17 | 2013-09-03 | Palm, Inc. | Centralized rules repository for smart phone customer care |
US8251791B2 (en) | 2004-08-19 | 2012-08-28 | Igt | Gaming system having multiple gaming machines which provide bonus awards |
US8021230B2 (en) | 2004-08-19 | 2011-09-20 | Igt | Gaming system having multiple gaming machines which provide bonus awards |
US7963847B2 (en) | 2004-08-19 | 2011-06-21 | Igt | Gaming system having multiple gaming machines which provide bonus awards |
US10803694B2 (en) | 2004-09-16 | 2020-10-13 | Sg Gaming, Inc. | Player gaming console, gaming machine, networked gaming system |
US20060161968A1 (en) * | 2004-12-21 | 2006-07-20 | Nintendo Co., Ltd. | Method and apparatus for secure delivery and evaluation of prototype software over a network |
US7502946B2 (en) * | 2005-01-20 | 2009-03-10 | Panasonic Corporation | Using hardware to secure areas of long term storage in CE devices |
US8038530B2 (en) | 2005-02-28 | 2011-10-18 | Wms Gaming Inc. | Method and apparatus for filtering wagering game content |
US20090124372A1 (en) * | 2005-04-29 | 2009-05-14 | Gagner Mark B | Asset management of downloadable gaming components in a gaming system |
JP4849829B2 (en) | 2005-05-15 | 2012-01-11 | 株式会社ソニー・コンピュータエンタテインメント | Center device |
US20070021195A1 (en) * | 2005-06-24 | 2007-01-25 | Campbell Steven M | Gaming system file authentication |
US20070021196A1 (en) * | 2005-07-19 | 2007-01-25 | Campbell Steven M | Watermarking downloadable game content in a gaming system |
WO2007027427A2 (en) * | 2005-08-29 | 2007-03-08 | Wms Gaming Inc. | On-the-fly encryption on a gaming machine |
US8678901B1 (en) | 2005-09-07 | 2014-03-25 | Bally Gaming | System gaming |
US8840462B2 (en) * | 2005-09-07 | 2014-09-23 | Bally Gaming, Inc. | Tournament bonus awards and related methods |
US20080254883A1 (en) * | 2005-09-07 | 2008-10-16 | Bally Gaming, Inc. | Tournament bonus awards |
US7841939B2 (en) | 2005-09-09 | 2010-11-30 | Igt | Server based gaming system having multiple progressive awards |
US8128491B2 (en) | 2005-09-09 | 2012-03-06 | Igt | Server based gaming system having multiple progressive awards |
US8137188B2 (en) | 2005-09-09 | 2012-03-20 | Igt | Server based gaming system having multiple progressive awards |
US8291226B2 (en) | 2006-02-10 | 2012-10-16 | Qualcomm Incorporated | Method and apparatus for securely booting from an external storage device |
US7447892B2 (en) * | 2006-03-10 | 2008-11-04 | Inventec Corporation | Operating system activation key embedding handling method and system |
US8968084B2 (en) | 2006-06-07 | 2015-03-03 | Wms Gaming Inc. | Processing metadata in wagering game systems |
WO2007146710A2 (en) | 2006-06-08 | 2007-12-21 | Hewlett-Packard Development Company, L.P. | Device management in a network |
EP1881467A3 (en) * | 2006-07-19 | 2008-03-05 | Aristocrat Technologies Australia Pty. Ltd. | A gaming machine |
US8752044B2 (en) | 2006-07-27 | 2014-06-10 | Qualcomm Incorporated | User experience and dependency management in a mobile device |
US8512130B2 (en) | 2006-07-27 | 2013-08-20 | Igt | Gaming system with linked gaming machines that are configurable to have a same probability of winning a designated award |
US8206215B2 (en) * | 2006-08-31 | 2012-06-26 | Igt | Gaming machine systems and methods with memory efficient historical video re-creation |
US7674180B2 (en) | 2006-09-27 | 2010-03-09 | Igt | Server based gaming system having system triggered loyalty award sequences |
US7862430B2 (en) | 2006-09-27 | 2011-01-04 | Igt | Server based gaming system having system triggered loyalty award sequences |
US8616959B2 (en) | 2006-09-27 | 2013-12-31 | Igt | Server based gaming system having system triggered loyalty award sequences |
JP5372345B2 (en) * | 2007-06-26 | 2013-12-18 | 株式会社ユニバーサルエンターテインメント | Game processing apparatus for performing regional authentication of game information |
US7985133B2 (en) | 2007-07-30 | 2011-07-26 | Igt | Gaming system and method for providing an additional gaming currency |
US8900053B2 (en) | 2007-08-10 | 2014-12-02 | Igt | Gaming system and method for providing different bonus awards based on different types of triggered events |
US9142097B2 (en) | 2007-10-26 | 2015-09-22 | Igt | Gaming system and method for providing play of local first game and remote second game |
US8683213B2 (en) | 2007-10-26 | 2014-03-25 | Qualcomm Incorporated | Progressive boot for a wireless device |
US8140796B2 (en) * | 2007-12-27 | 2012-03-20 | Igt | Serial advanced technology attachment write protection: mass storage data protection device |
US9424712B2 (en) | 2008-06-27 | 2016-08-23 | Bally Gaming, Inc. | Authenticating components in wagering game systems |
US8196213B2 (en) * | 2008-07-11 | 2012-06-05 | Microsoft Corporation | Verification of un-trusted code for consumption on an insecure device |
US9508219B2 (en) * | 2009-04-03 | 2016-11-29 | Bally Gaming, Inc. | Dynamic management of wagering game availability |
US9039516B2 (en) | 2009-07-30 | 2015-05-26 | Igt | Concurrent play on multiple gaming machines |
US20130138969A1 (en) * | 2011-11-28 | 2013-05-30 | Mocana Corporation | Preventing glitching of a firmware image using one or more layers of randomness |
US8627097B2 (en) | 2012-03-27 | 2014-01-07 | Igt | System and method enabling parallel processing of hash functions using authentication checkpoint hashes |
US9070251B2 (en) * | 2013-03-08 | 2015-06-30 | Igt | Multi-tiered static chain of trust |
US9875618B2 (en) | 2014-07-24 | 2018-01-23 | Igt | Gaming system and method employing multi-directional interaction between multiple concurrently played games |
US9560030B2 (en) | 2014-11-07 | 2017-01-31 | Kaiser Foundation Hospitals | Nodal random authentication |
US9560046B2 (en) | 2014-11-07 | 2017-01-31 | Kaiser Foundation Hospitals | Device notarization |
US9972171B2 (en) | 2015-09-24 | 2018-05-15 | Igt | Gaming system and method for providing a triggering event based on a collection of units from different games |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3653709B2 (en) * | 1994-02-28 | 2005-06-02 | 株式会社セガ | Data security device |
US5643086A (en) * | 1995-06-29 | 1997-07-01 | Silicon Gaming, Inc. | Electronic casino gaming apparatus with improved play capacity, authentication and security |
US5768382A (en) * | 1995-11-22 | 1998-06-16 | Walker Asset Management Limited Partnership | Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols |
US6099408A (en) * | 1996-12-31 | 2000-08-08 | Walker Digital, Llc | Method and apparatus for securing electronic games |
US6071190A (en) | 1997-05-21 | 2000-06-06 | Casino Data Systems | Gaming device security system: apparatus and method |
US8579705B1 (en) * | 1998-06-17 | 2013-11-12 | Eugene Thomas Bond | Software verification and authentication |
-
2000
- 2000-01-04 US US09/476,915 patent/US6595856B1/en not_active Expired - Lifetime
- 2000-12-29 WO PCT/US2000/035688 patent/WO2001050230A2/en active Application Filing
- 2000-12-29 CA CA2362450A patent/CA2362450C/en not_active Expired - Lifetime
- 2000-12-29 AU AU29151/01A patent/AU782891B2/en not_active Expired
Also Published As
Publication number | Publication date |
---|---|
US6595856B1 (en) | 2003-07-22 |
AU2915101A (en) | 2001-07-16 |
WO2001050230A2 (en) | 2001-07-12 |
CA2362450C (en) | 2011-03-08 |
WO2001050230A3 (en) | 2002-03-07 |
AU782891B2 (en) | 2005-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2362450A1 (en) | Electronic security technique for gaming software | |
US6880149B2 (en) | Method for runtime code integrity validation using code block checksums | |
CA2456635A1 (en) | Process verification | |
US7831838B2 (en) | Portion-level in-memory module authentication | |
EP1942431B1 (en) | Software or other information integrity verification using variable block length and selection | |
US8397082B2 (en) | System and method for thwarting buffer overflow attacks using encrypted process pointers | |
US7644287B2 (en) | Portion-level in-memory module authentication | |
US9092598B2 (en) | Version-based software product activation | |
US20030023856A1 (en) | Software self-checking systems and methods | |
US9390264B2 (en) | Hardware-based stack control information protection | |
US20190114401A1 (en) | On device structure layout randomization for binary code to enhance security through increased entropy | |
EP1334419B1 (en) | System and method for verifying the integrity of stored information within an electronic device | |
EP2895935A1 (en) | Methods and apparatus to protect memory regions during low-power states | |
EP2446388A1 (en) | Data verification method | |
TW201303636A (en) | System and method for processing requests to alter system security databases and firmware stores in a unified extensible firmware interface-compliant computing device | |
MX2007011377A (en) | Secure boot. | |
JP2004013905A (en) | Use of hashing in secure bootloader | |
US20060288342A1 (en) | Post build process to record stack and call tree information | |
US20090327711A1 (en) | Authentication of binaries in memory with proxy code execution | |
US9262631B2 (en) | Embedded device and control method thereof | |
WO2014044623A1 (en) | Storing data in a memory of an electronic device | |
RU2348968C2 (en) | System for interlinking of secrets with computer system having some tolerance on hardware changes | |
US7624442B2 (en) | Memory security device for flexible software environment | |
US20090307536A1 (en) | Method for protecting software programs | |
JP2000322254A (en) | Electronic device and security check method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20201229 |