|Publication number||USRE39370 E1|
|Application number||US 10/225,097|
|Publication date||Oct 31, 2006|
|Filing date||Jun 17, 1996|
|Priority date||Jun 29, 1995|
|Also published as||USRE39368, USRE39400, USRE39401|
|Publication number||10225097, 225097, PCT/1996/10463, PCT/US/1996/010463, PCT/US/1996/10463, PCT/US/96/010463, PCT/US/96/10463, PCT/US1996/010463, PCT/US1996/10463, PCT/US1996010463, PCT/US199610463, PCT/US96/010463, PCT/US96/10463, PCT/US96010463, PCT/US9610463, US RE39370 E1, US RE39370E1, US-E1-RE39370, USRE39370 E1, USRE39370E1|
|Inventors||Allan E. Alcorn, Michael Barnett, Louis D. Giacalone, Jr., Adam E. Levinthal|
|Export Citation||BiBTeX, EndNote, RefMan|
|Patent Citations (87), Non-Patent Citations (14), Referenced by (13), Classifications (3), Legal Events (4)|
|External Links: USPTO, USPTO Assignment, Espacenet|
This application is the national stage of International Application No. PCT/US96/10463, filed on Jun. 17, 1996, which is a continuation-in-part of U.S. application Ser. No. 08/497,662, now U.S. Pat. No. 5,643,086, filed on Jun. 29, 1995.
Notice: More than one reissue application has been filed for the reissue of U.S. Pat. No. 6,106,396. The reissue applications are Reissue application Ser. No. 10/225,096 filed Aug. 21, 2002, Reissue application Ser. No. 10/224,680 filed Aug. 21, 2002, Reissue application Ser. No. 10/225,116 filed Aug. 21, 2002, Reissue application Ser. No. 10/225,097 filed Aug. 21, 2002 (the present application) and Reissue application Ser. No. 10/224,699 filed Aug. 21, 2002, all of which are divisional reissues of U.S. Pat. No. 6,106,396, which issued from U.S. Ser. No. 08/981,882 which is the U.S. national phase of International Application No. PCT/US96/10463 filed Jun. 17, 1996, which is a continuation-in-part of U.S. Ser. No. 08/497,662 filed Jun. 29, 1995, now U.S. Pat. No. 5,643,086.
1. Field of the Invention
This invention relates to microprocessor based gaming Systems used in gambling casinos.
2. Brief Description of the Prior Art
Microprocessor based gaming systems are known which are used in gambling casinos to augment the traditional slot machine games (e.g. three reel single or multi-line games) and card games, such as poker and black jack. In a typical gaming system of this type, a microprocessor based system includes both hardware and software components to provide the game playing capabilities. The hardware components include a video display for displaying the game play, mechanical switches for enabling player selection of additional cards or game play choices, coin acceptors and detectors and the electronic components usually found in a microprocessor based system, such as random access memory (RAM), read only memory (ROM), a processor and one or more busses. The software components include the initialization software, credit and payout routines, the game image and rules data set, and a random number generator algorithm. In order to be acceptable for casino use, an electronic gaming system must provide both security and authentication for the software components. For this reason, gaming commissions have heretofore required that all software components of an electronic gaming system be stored in unalterable memory, which is typically an unalterable ROM. In addition, a copy of the contents of the ROM or a message digest of the contents (or both) are normally kept on file in a secure location designated by the gaming commission so that the contents of an individual ROM removed from a gaming machine can be verified against the custodial version.
In a typical arrangement, a message digest of the ROM contents is initially generated prior to the installation of the ROM in the machine by using a known algorithm usually referred to as a hash function. A hash function is a computation procedure that produces a fixed-size string of bits from a variable-size digital input. The fixed-sized string of bits is termed the hash value. If the hash function is difficult to invert—termed a one-way hash function—the hash function is also termed a message digest function, and the result is termed the message digest. The message digest is unique to any given variable size input data set, i.e., the game data set stored in the ROM. When it becomes necessary to later authenticate the ROM from any given machine, the ROM is physically removed from the game console and the message digest of the ROM contents is computed directly from the ROM using the original hash function. The computed message digest is compared with the message digest on file at the designated custodial location (typically in the casino itself). This procedure is typically carried out whenever a machine produces a payoff beyond a given threshold value. If the two message digests match, then the contents of the ROM are considered to be authenticated (verified) and the payout is made to the player.
While such electronic casino gaming systems have been found to be useful in promoting casino game play, the restriction requiring that the casino game program be stored in unalterable ROM memory, leads to a number of disadvantageous limitations. First, due to the limited capacity of the ROM storage media traditionally used to hold the program, the scope of game play available with such systems is severely limited. For sophisticated games using motion video and audio multi-media elements, much more memory capacity, on the order of hundreds of megabytes, is necessary. However, physical verification of such a large quantity of physical devices is not practical, and has thus far been an impediment to creating sophisticated games with more player appeal. Second, the authentication check is only conducted on a limited basis (usually after a jackpot) or other significant winning game outcome, and the authentication procedure requires that game play be halted until the ROM contents have been found to be authentic.
In one aspect, the invention is directed to a casino gaming apparatus, comprising: a casino game console; a video display unit; a memory disposed in said casino game console, said memory having gaming data stored therein; and a processor disposed in said casino game console and being operatively coupled to said video display unit and said memory, said processor causing said gaming data to be checked based on a comparison of data generated by said processor from said gaming data with data previously generated from known gaming data, said processor utilizing a hash function in checking said gaming data, and said processor utilizing decryption in checking said gaming data.
In another aspect, the invention is directed to a casino gaming apparatus, comprising: a casino game console; a video display unit; a sound-generating apparatus; a first memory disposed in said casino game console; a second memory having a gigabyte storage capacity, said second memory having gaming data relating to a casino game stored therein, said second memory being disposed in said casino game console; and a processor disposed in said casino game console and being operatively coupled to said video display unit, said sound-generating apparatus, said first memory and said second memory, said processor causing said gaming data stored in said second memory to be transferred to said first memory, said processor causing said gaming data that was transferred from said second memory to said first memory to be authenticated, said processor causing said gaming data to be authenticated by: 1 ) subjecting said gaming data to a one-way hash function to generate a first message digest, 2 ) decrypting an encrypted message digest previously generated by subjecting known gaming data to a one-way hash function to generate a decrypted message digest, and 3 ) comparing said first message digest with said decrypted message digest, and said processor causing a remedial action to be taken if said gaming data is not authentic as determined by said processor.
Other aspects of the invention are defined by the claims set forth at the end of this patent.
The invention comprises an electronic casino gaming system which greatly expands casino game play capability and enhances security and authentication capabilities. More particularly, the invention comprises an electronic casino gaming system and method having greatly expanded mass storage capability for storing a multiplicity of high resolution, high sound quality casino type games, and provides enhanced authentication of the stored game program information with a high security factor.
According to a first aspect of the invention, authentication of a casino game data set is carried out within the casino game console using an authentication program stored in an unalterable ROM physically located within the casino game console. The casino game data set and a unique signature are stored in a mass storage device, which may comprise a read only unit or a read/write unit and which may be physically located either within the casino game console or remotely located and linked to the casino game console over a suitable network. The authentication program stored in the unalterable ROM performs an authentication check on the casino game data set at appropriate times, such as prior to commencement of game play, at periodic intervals or upon demand. At appropriate occasions, the contents of the unalterable ROM can be verified by computing the message digest of the unalterable ROM contents and comparing this computed message digest with a securely stored copy of the message digest computed from the ROM contents prior to installation in the casino game console.
From a process standpoint, this aspect of the invention comprises a method of authenticating a data set of a casino style game which consists of two phases: a game data set preparation phase and a game data set checking phase. In the game data set preparation phase, the method proceeds by providing a data set for a casino game, computing a first abbreviated bit string unique to the casino game data set, encrypting the first abbreviated bit string to provide an encrypted signature of the casino game data set, and storing the casino game data set and the signature in a mass storage device. The first abbreviated bit string is preferably computed using a hash function to produce a message digest of the casino game data set. The signature is then encrypted from the message digest. After storage of the game data set and unique signature, this information is installed in a casino game console. The casino game data set checking phase proceeds by computing a second abbreviated bit string from the stored casino game data set using the same hash function, decrypting the stored encrypted signature to recover the first abbreviated bit string, and comparing the first and second abbreviated bit strings to determine whether the two strings match. If a match does occur the casino game data set is deemed authentic; if there is no match, authentication is denied and game play is prohibited.
The encryption/decryption process is preferably performed using a private key-public key technique in which the first abbreviated bit string is encrypted by the game manufacturer using a private encryption key maintained in the custody of the game manufacturer. The decryption of the signature is performed using a public key which is contained in an unalterable read only memory element located in the game console, along with the casino game data set. The casino game data set is preferably stored in a mass storage device, such as a magnetic or CD-ROM disk drive unit or a network file unit, the selected unit having a relatively large capacity. The actual size of the mass storage device will depend upon the casino game storage requirements and can be tailored to any specific application.
Each time a casino game data set is transferred from the mass storage device to the main memory of the system, the authentication routine is run. The authentication routine can also be means of an operator switch mounted in the game console or remotely via a network. Consequently, the authenticity of the data set can be automatically checked whenever the transfer occurs and at other appropriate times.
In order to detect attempts to tamper with the contents of the unalterable read only memory element located in the game console, a message digest computed for the authentication program stored therein is stored in a secure manner in a different location from the game console, such as the casino operator's security facilities or the facilities of a gaming commission (or both). The authenticity of the unalterable read only memory element is checked in the same way as that now performed in prior art devices: viz. computing the message digest directly from the unalterable read only memory device, and comparing the message digest thus computed with the custodial version.
From an apparatus standpoint, the first aspect of the invention comprises an electronic casino gaming system having means for providing authentication of a game data set of a casino type game prior to permitting game play, the system including first means for storing a casino game data set and a signature of the casino game data set, the signature comprising an encrypted version of a unique first abbreviated bit string computed from the casino game data set; second means for storing an authentication program capable of computing a second abbreviated bit string from the casino game data set stored in the first storing means and capable of decrypting the encrypted signature stored in the first storing means to recover the first abbreviated bit string; processing means for enabling the authentication program to compute an abbreviated bit string from the casino game data set stored in the first storing means and for enabling the authentication program to decrypt the encrypted signature; and means for comparing the computed second abbreviated bit string with the decrypted abbreviated bit string to determine whether a match is present. The first storing means preferably comprises a mass storage device, such as a disk drive unit, a CD-ROM unit or a network storage unit. The second storing means preferably comprises an unalterable read only memory in which the authentication program is stored.
According to a second aspect of the invention, the authentication program stored in the unalterable ROM located within the casino game console is used to test the authenticity of all other programs and fixed data stored in memory devices in the electronic casino gaming system, such as a system boot ROM, memory devices containing the operating system program, system drivers and executive/loader programs, and other memory devices incorporated into the electronic casino game system architecture. The contents of each such memory device, whether program information or fixed data, include signatures encrypted from message digests computed using a hash function from the original program information or fixed data set. Upon system initialization, the authentication program in the unalterable ROM is used to authenticate the individual memory device contents in essentially the same fashion as that used to authenticate the casino game data sets. More specifically, the message digest for the given program or fixed data set is computed using the same hash function originally used to produce the message digest for that program or fixed data set. The encrypted signature is decrypted using the proper decryption program and decryption key to recover the message digest. The two versions of the message digest are then compared and, if found to be matching, the concerned program or fixed data set is deemed authentic and is permitted to be used by the system. Once all of the concerned programs and fixed data sets have been so authenticated, the casino game data set authentication procedure is run, after which game play is permitted (provided a match occurs).
From a process standpoint, this second aspect of the invention comprises a method of authenticating a program or data set of a casino style game which consists of two phases: a program or fixed data set preparation phase, and a program or fixed data set checking phase. In the program or fixed data set preparation phase, the method proceeds by providing a program or fixed data set for a casino game, computing a first abbreviated bit string unique to the program or fixed data set, encrypting the first abbreviated bit string to provide an encrypted signature of the program or fixed data set, and storing the program or fixed data set and the signature in a memory device. The first abbreviated bit string is preferably computed using a hash function to produce a message digest of the program or fixed data set. The signature is then encrypted from the message digest. After storage of the program or fixed data set and unique signature in the memory device, the memory device is installed in a casino game console. The casino game program or fixed data set checking phase proceeds by computing a second abbreviated bit string from the stored casino game program or fixed data set stored in the memory device using the same hash function, decrypting the encrypted signature stored in the memory device to recover the first abbreviated bit string, and comparing the first and second abbreviated bit strings to determine whether the two strings match. If a match does occur, the casino game program or fixed data set is deemed authentic; if thee is no match, authentication is denied and use of that casino game program or fixed data set is prohibited.
The authentication routine is run each time a given casino game program or fixed data set needs to be called or used. The authentication routine can also be run automatically on a periodic basis, or on demand—either locally by means of an operator switch mounted in the casino game console or remotely via a network. Consequently, the authenticity of the casino game program or fixed data set can be automatically checked whenever use of that program or fixed data set is required and at other appropriate times, such as in the course of a gaming commission audit.
From an apparatus standpoint this second aspect of the invention comprises an electronic casino gaming system for providing authentication of a casino game program or fixed data set prior to permitting system use of that casino game program or fixed data set, the system including first means for storing a casino game program or fixed data set and a signature of the casino game program or fixed data set; the signature comprising an encrypted version of a unique first abbreviated bit string computed from the casino game program or fixed data set; second means for storing an authentication program capable of computing a second abbreviated bit string from the casino game program or fixed data set stored in the first storing means and capable of decrypting the encrypted signature stored in the first storing means to recover the first abbreviated bit string; processing means for enabling the authentication program to compute an abbreviated bit string from the casino game program or fixed data set stored in the first storing means and for enabling the authentication program to decrypt the encrypted signature; and means for comparing the computed second abbreviated bit string with the decrypted abbreviated bit string to determine whether a match is present. The first storing means preferably comprises a memory device, such as a read only memory or random access memory. The second storing means preferably comprises an unalterable read only memory in which the authentication program is stored.
Electronic casino game systems incorporating the invention provide a vastly expanded capacity for more sophisticated and attractive casino-style games, while at the same time improving the authentication of the games without compromising security. In addition, casino game systems incorporating the invention provide great flexibility in changing casino game play, since the casino game data sets representing the various games can be stored in alterable media rather than read only memory units as with present casino game systems.
By separating the authentication process from the casino game data set storage, the invention affords secure distribution and execution of program code and data, regardless of the particular distribution or storage technique employed. More specifically, the invention allows the casino game data set to reside in any form of secondary storage media, such as the traditional ROM storage, hard magnetic disk drives and CD-ROM drives, or networked file systems. So long as the authentication procedure conducted on the game data set is performed using the authentication program stored in an unalterable ROM, and so long as that ROM can be verified reliably, any casino game data set can be loaded from any source and can be verified by the system at any time: either prior to use, during run-time, periodically during run-time or upon demand. The large quantities of storage that can be made available in a secure fashion using the invention, facilitates the creation of casino gaming systems offering both an increased diversity of games, and individual games of superior quality. In addition, the authentication of all casino game program and fixed data software ensures the integrity of all system software both prior to game play and thereafter at periodic or random intervals.
For a fuller understanding of the nature and advantages of the invention, reference should be had to the ensuing detailed description taken in conjunction with the accompanying drawings.
Turning now to the drawings,
A mass storage unit implemented in the
A video subsystem 22 is coupled to the PCI bus and provides the capability of displaying full color still images and MPEG movies with a relatively high frame rate (e.g. 30 frames per second) on an appropriate monitor (not shown). Optional 3D texture mapping may be added to this system, if desired.
A sound subsystem 23 having a stereo sound playback capability with up to 16 bit CD quality sound is coupled to an ISA bus 24. A general purpose input/output unit 25 provides interfaces to the game mechanical devices (not illustrated) such as manually actuatable switches and display lights. A first bridge circuit 27 provides an interface between microprocessor 12, ROM 14, main memory 13 and PCI bus 20. Bridge circuit 27 is preferably a TRITON chip set available from INTEL Corporation. A second bridge circuit 28 provides an interface between the PCI bus 20 and the ISA bus 24. Bridge circuit 28 is preferably a type 82378 chip available from Intel Corporation.
The decryption key component 34 comprises the decryption key that is required to decrypt any of the encrypted signatures 37 in the manner described below during the authentication routine.
In order to ensure that the authentication routine cannot be bypassed by tampering with the loader program stored in ROM 30, an initial part of the loader program is incorporated into unalterable ROM 29. This initial portion of the loader program requires that the authentication program be called prior to the initiation of any casino game play. Since this initial portion of the loader program is located in the unalterable ROM 29, and since no casino game play can occur until the particular casino game application data set 36 is loaded into main memory 13, the authentication procedure cannot be bypassed by tampering with the software stored in ROM 30.
Since authentication of the game data set 36 and signature 37 is entrusted to the contents of ROM 29, a procedure must be provided to verify the ROM 29 contents. For this purpose, a message digest is computed for the authentication program stored in ROM 29, and this message digest is stored in a secure manner with the casino operator or the gaming commission (or both) along with the hash function used to produce the message digest. This hash function may be the same hash function used to compute the message digest 42 of the casino game data set or a different hash function. In this way, the authenticity of the ROM 29 can be easily checked in the same way as that now performed in prior art devices: viz. computing the message digest directly from the ROM 29 and comparing the message digest thus computed with the custodial version of the message digest. If required by a given gaming commission or deemed desirable by a casino operator, the system may also display the message digest 42 of each particular data set 36 or the encrypted signature version 37 for auditing purposes. In addition, the system may transmit this information via networking subsystem 21 to an on-site or off-site remote location (such as the office of the gaming commission). The message digest displayed or transmitted may comprise the decrypted version or the computed version (or both).
The authentication procedure carried out by means of the message digest program 32, decryption program 33 and decryption key 34 stored in unalterable ROM 29 in the manner described above is also used to authenticate the contents of all memory devices in the
An alternative approach to the secure loading of software into the system is depicted in FIG. 6. In this embodiment the basic input/output system (BIOS) software is stored in a ROM 50, the first of two ROMs making up the system boot ROM 14 (FIG. 1). The boot strap code, operating system code (OS), OS drivers and a secure loader are stored in a second ROM 52. An anchor application 54 including graphics and sound drivers, system drivers, money-handling software, a second secure loader, and a signature is stored in the mass storage 18 (FIG. 1).
When power is initially applied to the system on start-up, or when the system experiences a warm restart, the CPU 12 will begin executing code from the BIOS ROM 50. The BIOS is responsible for initializing the motherboard and peripheral cards of the system. After the BIOS has completed the initialization, it jumps to the boot strap code in ROM 252 causing the boot strap to copy the OS, OS drivers, and the secure loader into RAM.
Once in RAM, the OS is started and the secure loader stored in ROM 52 is used to load the anchor application 54 from disk 18. On disk, the anchor application has a signature that is used during the load to verify the validity of the anchor application.
After the anchor application 54 is started, it will be used to load all other applications. The secure loader of the anchor application will check the validity of an application to be loaded by computing the signature and comparing it against the one stored on disk with the application as described above.
An important advantage of the invention not found in 20 prior art systems is the manner in which the casino game data set can be authenticated. In prior art systems, authentication of the casino game data set is normally only done when a payout lying above a given threshold is required by the outcome of the game play, and this requires that the game be disabled while the ROM is physically removed and the ROM contents are verified. In systems incorporating the invention, the authenticity of a given casino game data set can be checked in a variety of ways. For example, the game data set 36 can be automatically subjected to the authentication procedure illustrated in
Another advantage of the invention lies in the fact that the game data set storage capacity of a system incorporating the invention is not limited by the size of a ROM, but is rather dictated by the size of the mass storage unit. As a consequence, games using high resolution, high motion video and high quality stereo sound can be designed and played on systems incorporating the invention. Also, since the mass storage unit need not be a read-only device, and need not be physically located in the game console, the invention affords great flexibility in game content, scheduling and changes. For example, to change the graphic images in a particular casino game or set of games, new casino game data sets can be generated along with new signatures and stored in the mass storage unit by either exchanging disk drives, replacing disks (for read only disk units), or writing new data to the media. In the networked mass storage application, these changes can be made to the files controlled by the network file server. Since the casino game data sets must pass the authentication procedure test, either periodically or on demand, corrupted data sets cannot go undetected. Thus the invention opens up the field of electronic casino gaming systems to readily modifiable games with flexible displays and rules, without sacrificing the essential security of such systems. In fact, security is greatly enhanced by the ability of the invention to authenticate all game data sets both regularly (for each handle pull) and at any time (on demand), without interfering with regular game play (unless no match occurs between the two forms of message digest).
While the above provides a full and complete disclosure of the preferred embodiments of the invention, various modifications, alternate constructions and equivalents may be employed without departing from the true spirit and scope of the invention. For example, while the RSA public/private key encryption technique is preferred (due to the known advantages of this technique), a single, private key encryption technique may be employed, if desired. In a system using this technique, the single key would be stored in ROM 29 in place of the public key 34. Also, the message digest 42 and signature 37 for a given application 36 need not be computed from the entire casino game data set. For example, for some casino games it may be desirable to provide a fixed set of rules while permitting future changes in the casino game graphics, sound or both. For such casino games, it may be sufficient to compute the message digest 42 and signature 37 from only the rules portion of the applications program 36. In other cases, it may be desirable or convenient to maintain the casino game video and audio portions constant, while allowing future changes to the rules of game play. For casino games of this category, the message digest 42 and signature 37 may be computed from the graphics and sound portions of the application program 36. It may also be desirable to compute a message digest 42 and signature 37 from a subset of the rules, graphics or sound portions of a given applications program 36, or from some other subset taken from a given applications program 36. Therefore, the above should not be construed as limiting the scope of the invention, which is defined by the appended claims.
|Cited Patent||Filing date||Publication date||Applicant||Title|
|US3825905||Sep 13, 1972||Jul 23, 1974||Action Communication Syst Inc||Binary synchronous communications processor system and method|
|US3838264||Feb 20, 1973||Sep 24, 1974||Maker P||Apparatus for, and method of, checking the contents of a computer store|
|US4193131||Dec 5, 1977||Mar 11, 1980||International Business Machines Corporation||Cryptographic verification of operational keys used in communication networks|
|US4200770||Sep 6, 1977||Apr 29, 1980||Stanford University||Cryptographic apparatus and method|
|US4218582||Oct 6, 1977||Aug 19, 1980||The Board Of Trustees Of The Leland Stanford Junior University||Public key cryptographic apparatus and method|
|US4354251||Mar 6, 1980||Oct 12, 1982||Siemens Aktiengesellschaft||Device for testing programs for numerical control of machine tools|
|US4355390||Sep 22, 1980||Oct 19, 1982||Siemens Aktiengesellschaft||Method for checking data written into buffered write-read memories in numerically controlled machine tools|
|US4405829||Dec 14, 1977||Sep 20, 1983||Massachusetts Institute Of Technology||Cryptographic communications system and method|
|US4458315||Feb 25, 1982||Jul 3, 1984||Penta, Inc.||Apparatus and method for preventing unauthorized use of computer programs|
|US4462076||Jun 4, 1982||Jul 24, 1984||Smith Engineering||Video game cartridge recognition and security system|
|US4467424||Jul 6, 1982||Aug 21, 1984||Hedges Richard A||Remote gaming system|
|US4494114||Dec 5, 1983||Jan 15, 1985||International Electronic Technology Corp.||Security arrangement for and method of rendering microprocessor-controlled electronic equipment inoperative after occurrence of disabling event|
|US4519077||Aug 30, 1982||May 21, 1985||Amin Pravin T||Digital processing system with self-test capability|
|US4525599||May 21, 1982||Jun 25, 1985||General Computer Corporation||Software protection methods and apparatus|
|US4582324||Jan 4, 1984||Apr 15, 1986||Bally Manufacturing Corporation||Illusion of skill game machine for a gaming system|
|US4607844||Dec 3, 1985||Aug 26, 1986||Ainsworth Nominees Pty. Ltd.||Poker machine with improved security after power failure|
|US4652998 *||Jan 4, 1984||Mar 24, 1987||Bally Manufacturing Corporation||Video gaming system with pool prize structures|
|US4658093||Jul 11, 1983||Apr 14, 1987||Hellman Martin E||Software distribution system|
|US4727544||Jun 5, 1986||Feb 23, 1988||Bally Manufacturing Corporation||Memory integrity checking system for a gaming device|
|US4752068||Nov 5, 1986||Jun 21, 1988||Namco Ltd.||Video game machine for business use|
|US4759064||Oct 7, 1985||Jul 19, 1988||Chaum David L||Blind unanticipated signature systems|
|US4817140||Nov 5, 1986||Mar 28, 1989||International Business Machines Corp.||Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor|
|US4837728||Jan 25, 1984||Jun 6, 1989||Igt||Multiple progressive gaming system that freezes payouts at start of game|
|US4845715||Jun 17, 1987||Jul 4, 1989||Francisco Michael H||Method for maintaining data processing system securing|
|US4848744||Jan 21, 1987||Jul 18, 1989||Eduard Steininger||Automated video system with alignment of the video tube|
|US4856787||May 3, 1988||Aug 15, 1989||Yuri Itkis||Concurrent game network|
|US4865321||Nov 27, 1987||Sep 12, 1989||Nintendo Company Limited||Memory cartridge and information processor unit using such cartridge|
|US4911449||Jan 2, 1985||Mar 27, 1990||I G T||Reel monitoring device for an amusement machine|
|US4930073||Jun 26, 1987||May 29, 1990||International Business Machines Corporation||Method to prevent use of incorrect program version in a computer system|
|US4944008||Feb 18, 1988||Jul 24, 1990||Motorola, Inc.||Electronic keying scheme for locking data|
|US4951149||Oct 27, 1988||Aug 21, 1990||Faroudja Y C||Television system with variable aspect picture ratio|
|US5004232||Oct 13, 1989||Apr 2, 1991||Macronix, Inc.||Computer game cartridge security circuit|
|US5021772||Oct 5, 1989||Jun 4, 1991||King Stephen J||Interactive real-time video processor with zoom pan and scroll capability|
|US5050212||Jun 20, 1990||Sep 17, 1991||Apple Computer, Inc.||Method and apparatus for verifying the integrity of a file stored separately from a computer|
|US5103081||May 23, 1990||Apr 7, 1992||Games Of Nevada||Apparatus and method for reading data encoded on circular objects, such as gaming chips|
|US5109152||Jul 13, 1989||Apr 28, 1992||Matsushita Electric Industrial Co., Ltd.||Communication apparatus|
|US5146575||Nov 5, 1986||Sep 8, 1992||International Business Machines Corp.||Implementing privilege on microprocessor systems for use in software asset protection|
|US5155680||Apr 27, 1989||Oct 13, 1992||Signal Security Technologies||Billing system for computing software|
|US5155768||Mar 11, 1991||Oct 13, 1992||Sega Enterprises, Ltd.||Security system for software|
|US5161193||Jun 29, 1990||Nov 3, 1992||Digital Equipment Corporation||Pipelined cryptography processor and method for its use in communication networks|
|US5179517||Sep 22, 1988||Jan 12, 1993||Bally Manufacturing Corporation||Game machine data transfer system utilizing portable data units|
|US5224160||Mar 20, 1992||Jun 29, 1993||Siemens Nixdorf Informationssysteme Ag||Process for securing and for checking the integrity of the secured programs|
|US5235642||Jul 21, 1992||Aug 10, 1993||Digital Equipment Corporation||Access control subsystem and method for distributed computer system using locally cached authentication credentials|
|US5259613||Apr 8, 1992||Nov 9, 1993||Rio Hotel Casino, Inc.||Casino entertainment system|
|US5283734||Sep 19, 1991||Feb 1, 1994||Kohorn H Von||System and method of communication with authenticated wagering participation|
|US5288978||Oct 2, 1991||Feb 22, 1994||Kabushiki Kaisha Toshiba||Mutual authentication system and method which checks the authenticity of a device before transmitting authentication data to the device|
|US5291585||Jul 29, 1991||Mar 1, 1994||Dell Usa, L.P.||Computer system having system feature extension software containing a self-describing feature table for accessing I/O devices according to machine-independent format|
|US5297205||Oct 18, 1990||Mar 22, 1994||Adventure||Portable electronic device to establish public loyalty to a medium or similar|
|US5326104||Feb 7, 1992||Jul 5, 1994||Igt||Secure automated electronic casino gaming system|
|US5342047||Apr 8, 1992||Aug 30, 1994||Bally Gaming International, Inc.||Touch screen video gaming machine|
|US5343527||Oct 27, 1993||Aug 30, 1994||International Business Machines Corporation||Hybrid encryption method and system for protecting reusable software components|
|US5398932||Dec 21, 1993||Mar 21, 1995||Video Lottery Technologies, Inc.||Video lottery system with improved site controller and validation unit|
|US5421006||Apr 20, 1994||May 30, 1995||Compaq Computer Corp.||Method and apparatus for assessing integrity of computer system software|
|US5465364||Mar 18, 1994||Nov 7, 1995||International Business Machines, Inc.||Method and system for providing device driver support which is independent of changeable characteristics of devices and operating systems|
|US5488702||Apr 26, 1994||Jan 30, 1996||Unisys Corporation||Data block check sequence generation and validation in a file cache system|
|US5489095||Jun 23, 1993||Feb 6, 1996||U.S. Philips Corporation||Device for protecting the validity of time sensitive information|
|US5507489||Sep 30, 1993||Apr 16, 1996||Info Telecom||Electronic game-of-chance device|
|US5586766||May 12, 1995||Dec 24, 1996||Casinovations, Inc.||Blackjack game system and methods|
|US5586937||May 19, 1994||Dec 24, 1996||Menashe; Julian||Interactive, computerised gaming system with remote terminals|
|US5604801||Feb 3, 1995||Feb 18, 1997||International Business Machines Corporation||Public key data communications system under control of a portable security device|
|US5611730||Apr 25, 1995||Mar 18, 1997||Casino Data Systems||Progressive gaming system tailored for use in multiple remote sites: apparatus and method|
|US5643086||Jun 29, 1995||Jul 1, 1997||Silicon Gaming, Inc.||Electronic casino gaming apparatus with improved play capacity, authentication and security|
|US5644704||Nov 30, 1994||Jul 1, 1997||International Game Technology||Method and apparatus for verifying the contents of a storage device|
|US5655965||Oct 22, 1992||Aug 12, 1997||Kabushiki Kaisha Ace Denken||Screen display type slot machine with seemingly flowing condition of moving symbols|
|US5668945||Feb 23, 1995||Sep 16, 1997||Sega Enterprises, Ltd.||Data security apparatus and method|
|US5704835||Dec 13, 1995||Jan 6, 1998||Infinity Group, Inc.||Electronic second spin slot machine|
|US5707286||Dec 19, 1994||Jan 13, 1998||Mikohn Gaming Corporation||Universal gaming engine|
|US5725428||Mar 9, 1995||Mar 10, 1998||Atronic Casino Technology Distribution Gmbh||Video slot machine|
|US5737418||May 30, 1995||Apr 7, 1998||International Game Technology||Encryption of bill validation data|
|US5742616||Jun 7, 1995||Apr 21, 1998||International Business Machines Corporation||System and method testing computer memories|
|US5759102||Feb 12, 1996||Jun 2, 1998||International Game Technology||Peripheral device download method and apparatus|
|US5768382||Nov 22, 1995||Jun 16, 1998||Walker Asset Management Limited Partnership||Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols|
|US5934672||Feb 20, 1996||Aug 10, 1999||Digideal Corporation||Slot machine and methods of operation|
|US5991399 *||Dec 18, 1997||Nov 23, 1999||Intel Corporation||Method for securely distributing a conditional use private key to a trusted entity on a remote system|
|US6071190||May 21, 1997||Jun 6, 2000||Casino Data Systems||Gaming device security system: apparatus and method|
|US6104815||Jan 9, 1998||Aug 15, 2000||Silicon Gaming, Inc.||Method and apparatus using geographical position and universal time determination means to provide authenticated, secure, on-line communication between remote gaming locations|
|US6149522||Jun 29, 1998||Nov 21, 2000||Silicon Gaming - Nevada||Method of authenticating game data sets in an electronic casino gaming system|
|US6195587||Apr 28, 1994||Feb 27, 2001||Sophos Plc||Validity checking|
|US6620047||Sep 29, 2000||Sep 16, 2003||Igt||Electronic gaming apparatus having authentication data sets|
|US6851607 *||Mar 21, 2003||Feb 8, 2005||Gemplus||Secured method for monitoring the transfer of value units in a chip card gambling system|
|US20040002381||Jun 23, 2003||Jan 1, 2004||Igt||Electronic gaming apparatus with authentication|
|EP0685246A1||May 31, 1995||Dec 6, 1995||Sony Corporation||Video game apparatus with external memory devices|
|GB2121569A||Title not available|
|JPH0731737A||Title not available|
|JPH06327831A||Title not available|
|WO1999065579A1 *||Jun 17, 1999||Dec 23, 1999||Aristocrat Technologies Australia Pty. Ltd.||Software verification and authentication|
|WO2000033196A1 *||Nov 26, 1999||Jun 8, 2000||Aristocrat Technologies Australia Pty Ltd||Electronic casino gaming with authentication and improved security|
|1||Answer and Counterclaims to Second Amended Complaint filed in connection with Civil Action No. CV-S-01-1498, pp. 1-26 and certificate of service page.|
|2||Bakhtiari, et al., "Cryptographic Hash Functions: A Survey," Centre for Computer Security Research, 1995, 3 introductory pages and pp. 1-26.|
|3||Bauspiess, et al., "Requirements For Cryptographic Hash Functions," Computers and Security, 5:427-437 (Sep. 11, 1992).|
|4||Complaint for patent infringement filed by Aristocrat Technologies, et al. dated Jan. 22, 2002, Civil Action No. CV-S-02-0091.|
|5||Court docket for Civil Action No. CV-S-02-0091 listing papers filed.|
|6||Davida, G. et al., "Defending Systems Against Viruses through Cryptographic Authentication," Proceedings of the Symposium on Security and Privacy, IEEE Comp. Soc. Press, pp. 312-318 (May 1, 1989).|
|7||Defendants' Supplemental Response to Plaintiffs' First Set of Interrogatories filed in connection with Civil Action No. CV-S-01-1498, pp. 1-3, 50-68 and 85-86.|
|8||Document entitled "Fact Sheet on Digital Signature Standard" dated May 1994, 6 pages.|
|9||Federal Information Processing Standards (FIPS) Publication 180 entitled "Secure Hash Standard" dated May 11, 1993, title page, abstract page and pp. 1-20.|
|10||Federal Information Processing Standards (FIPS) Publication 180-1 entitled "Secure Hash Standard" dated Apr. 17, 1995, 2 title pages, abstract page and pp. 1-21.|
|11||Federal Information Processing Standards (FIPS) Publication 186 entitled "Digital Signature Standard (DSS)" dated May 19, 1994, 17 pages.|
|12||Hellman, Martin E., "The Mathematics of Public-Key Cryptography," Scientific American, vol. 241, No. 8, Aug. 1979, pp. 146-152 and 154-157.|
|13||Rivest, et al., "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems," Communications of the ACM, vol. 21, No. 2, Feb. 1978, pp. 120-126.|
|14||Translation of communication from the Japanese Patent Office with respect to JP 504453/97 dated Dec. 7, 2004.|
|Citing Patent||Filing date||Publication date||Applicant||Title|
|US7491122||Jul 9, 2003||Feb 17, 2009||Wms Gaming Inc.||Gaming machine having targeted run-time software authentication|
|US8038530||Feb 17, 2006||Oct 18, 2011||Wms Gaming Inc.||Method and apparatus for filtering wagering game content|
|US8140796||Dec 27, 2007||Mar 20, 2012||Igt||Serial advanced technology attachment write protection: mass storage data protection device|
|US8423738||Feb 14, 2012||Apr 16, 2013||Igt||Serial advanced technology attachment write protection: mass storage data protection device|
|US8579705 *||Jun 17, 1999||Nov 12, 2013||Eugene Thomas Bond||Software verification and authentication|
|US8705739||Aug 15, 2006||Apr 22, 2014||Wms Gaming Inc.||On-the-fly encryption on a gaming machine|
|US8939834||Sep 11, 2013||Jan 27, 2015||Aristocrat Technologies Australia Pty Limited||Software verification and authentication|
|US9424712||Jun 25, 2009||Aug 23, 2016||Bally Gaming, Inc.||Authenticating components in wagering game systems|
|US20040054952 *||Sep 13, 2002||Mar 18, 2004||Morrow James W.||Device verification system and method|
|US20050009599 *||Jul 9, 2003||Jan 13, 2005||Ryan Chad A.||Gaming machine having targeted run-time software authentication|
|US20090172227 *||Dec 27, 2007||Jul 2, 2009||Igt||Serial advanced technology attachment write protection: mass storage data protection device|
|US20090220078 *||Aug 15, 2006||Sep 3, 2009||Campbell Steven M||On-the-fly encryption on a gaming machine|
|US20110212761 *||Feb 26, 2010||Sep 1, 2011||Igt||Gaming machine processor|
|Dec 25, 2007||RR||Request for reexamination filed|
Effective date: 20071017
|Apr 29, 2008||CC||Certificate of correction|
|Jul 8, 2008||B1||Reexamination certificate first reexamination|
Free format text: THE PATENTABILITY OF CLAIMS 16-112 IS CONFIRMED. CLAIMS 1-15 WERE PREVIOUSLY CANCELLED.
|Oct 14, 2008||CC||Certificate of correction|