AU2007200645B2 - Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security - Google Patents

Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security Download PDF

Info

Publication number
AU2007200645B2
AU2007200645B2 AU2007200645A AU2007200645A AU2007200645B2 AU 2007200645 B2 AU2007200645 B2 AU 2007200645B2 AU 2007200645 A AU2007200645 A AU 2007200645A AU 2007200645 A AU2007200645 A AU 2007200645A AU 2007200645 B2 AU2007200645 B2 AU 2007200645B2
Authority
AU
Australia
Prior art keywords
data set
casino
game
storing
program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired
Application number
AU2007200645A
Other versions
AU2007200645A1 (en
Inventor
Allan E Alcorn
Michael Barnett
Louis D Giacalone
Adam E Levinthal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Game Technology
Original Assignee
International Game Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Game Technology filed Critical International Game Technology
Priority to AU2007200645A priority Critical patent/AU2007200645B2/en
Publication of AU2007200645A1 publication Critical patent/AU2007200645A1/en
Application granted granted Critical
Publication of AU2007200645B2 publication Critical patent/AU2007200645B2/en
Priority to AU2010201666A priority patent/AU2010201666B2/en
Anticipated expiration legal-status Critical
Expired legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/575Secure boot
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2109Game systems

Description

P/00/011 28/5/91 Regulation 3.2 AUSTRALIA Patents Act 1990 ORIGINAL COMPLETE SPECIFICATION STANDARD PATENT Name of Applicant: IGT Actual Inventors Allan E Alcorn Michael Barnett Louis D Giacalone Adam E Levinthal Address for service is: WRAY & ASSOCIATES Level 4, The Quadrant 1 William Street Perth, WA 6000 Attorney code: WR Invention Title: Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security The following statement is a full description of this invention, including the best method of performing it known to me: 1 -2 ELECTRONIC CASINO GAMING SYSTEM WITH IMPROVED PLAY CAPACITY, AUTHENTICATION AMD SECURITY 5 FIELD OF THE INVENTION This invention relates to microprocessor based gaming systems used in gambling casinos. BACKGROUND OF THE INVENTION Microprocessor based gaming systems are known which are used in gambling 10 casinos to augment the traditional slot machine games (e.g. three reel single or multi-line games) and card games, such as poker and black jack. In a typical gaming system of this type, a microprocessor based system includes both hardware and software components to provide the game playing capabilities. The hardware components include a video display for displaying the game play, 15 mechanical switches for enabling player selection of additional cards or game play choices, coin acceptors and detectors and the electronic components usually found in a microprocessor based system, such as random access memory (RAM), read only memory (ROM), a processor and one or more busses. The software components include the initialization software, credit and 20 payout routines, the game image and rules data set, and a random number generator algorithm. In order to be acceptable for casino use, an electronic gaming system must provide both security and authentication for the software components. For this reason, gaming commissions have heretofore required that all software components of an electronic gaming system be stored in 25 unalterable memory, which is typically an unalterable ROM. In addition, a copy of the contents of the ROM or a message digest of the contents (or both) are normally kept on file in a secure location designated by the gaming commission so that the contents of an individual ROM removed from a gaming machine can be verified against the custodial version. 30 In a typical arrangement, a message digest of the ROM contents is initially generated prior to the installation of the ROM in the machine by using a known -3 algorithm usually referred to as a hash function. A hash function is a computation procedure that produces a fixed-size string of bits from a variable-size digital input. The fixed-sized string of bits is termed the hash value. If the hash function is difficult to invert--termed a one-way hash function--the hash function is also termed a 5 message digest function, and the result is termed the message digest. The message digest is unique to any given variable size input data set, i.e., the game data set stored in the ROM. When it becomes necessary to later authenticate the ROM from any given machine, the ROM is physically removed from the game console and the message digest of the ROM contents is computed directly from the ROM using the 10 original hash function. The computed message digest is compared with the message digest on file at the designated custodial location (typically in the casino itself). This procedure is typically carried out whenever a machine produces a payoff beyond a given threshold value. If the two message digests match, then the contents of the ROM are considered to be authenticated (verified) and the payout is made to the 15 player. While such electronic casino gaming systems have been found to be useful in promoting casino game play, the restriction requiring that the casino game program be stored in unalterable ROM memory, leads to a number of disadvantageous 20 limitations. First, due to the limited capacity of the ROM storage media traditionally used to hold the program, the scope of game play available with such systems is severely limited. For sophisticated games using motion video and audio multi-media elements, much more memory capacity, on the order of hundreds of megabytes, is necessary. However, physical verification of such a large quantity of physical devices 25 is not practical, and has thus far been an impediment to creating sophisticated games with more player appeal. Second, the authentication check is only conducted on a limited basis (usually after a jackpot) or other significant winning game outcome, and the authentication procedure requires that game play be halted until the ROM contents have been found to be authentic. 30 A reference herein to a patent document or other matter which is given as prior art is not to be taken as an admission or a suggestion that that document or matter was known or that the information it contains was part of the common general knowledge as at the priority date of any of the claims.
-4 SUMMARY OF THE INVENTION The invention comprises an electronic casino gaming system which greatly expands casino game play capability and enhances security and authentication capabilities. 5 More particularly, the invention comprises an electronic casino gaming system and method having greatly expanded mass storage capability for storing a multiplicity of high resolution, high sound quality casino type games, and provides enhanced authentication of the stored game program information with a high security factor. 10 According to a first aspect, the present invention provides a method of authenticating a data set or a software information of a casino-type viewable game, said method comprising the steps of (a) providing a data set or a software information for a casino game; (b) computing a first hash value unique to the data set or software information using a hash function; (c) encrypting the first hash value string to provide 15 a signature; (d) storing the data set or the software information and the signature; (e) providing an unalterable memory storing an authentication program and an initial portion of a loader program wherein said initial portion of the loader program requires that the authentication program is called prior to an initiation of any casino game play; (f) providing an alterable memory storing the remaining portion of the leader loader ?0 program; (g) computing a second hash value, using the authentication program, from the stored data set or the software information using said hash function; (h) decrypting the stored signature to recover the first hash value; and (i) comparing the first and second hash value to determine whether the first and second hash value match. 25 According to a second aspect, the present invention provides an electronic gaming system for providing authentication of a data set of a casino type game or software information relating to a casino type game, said system comprising: first means for a storing a casino game data set or software information and a signature of 30 said casino game data set or software information, said signature comprising an encrypted version of a unique first hash value computed from the casino game data set or software information using a hash function; second means for storing a) an authentication program capable of computing a second hash value from the casino game data set or software information stored in said first storing means using said -5 hash function and capable of decrypting an encrypted signature stored in said first storing means to recover the first hash value and b) an initial portion of a loader program wherein said initial portion of the loader program requires that the authentication program is called prior to an initiation of any casino game; third means 5 for storing a remaining portion of the loader program wherein the third means is an alterable memory; processing means for enabling the authentication program to compute a hash value from the casino game data set or software information stored in said first storing means using a hash function and for enabling the authentication program to decrypt the encrypted signature stored in said first storing means to 10 provide a decrypted hash value; and means for comparing the computed second hash value with the decrypted abbreviated hash value to determine whether a match is present. According to an embodiment, authentication of a casino game data set may be 15 carried out within the casino game console using an authentication program stored in an unalterable ROM physically located within the casino game console. The casino game data set and a unique signature are stored in a mass storage device, which may comprise a read only unit or a read/write unit and which may be physically located either within the casino game console or remotely located and linked to the ?0 casino game console over a suitable network. The authentication program stored in the unalterable ROM performs an authentication check on the casino game data set at appropriate times, such as prior to commencement of game play, at periodic intervals or upon demand. At appropriate occasions, the contents of the unalterable ROM can be verified by computing the message digest of the unalterable ROM 25 contents and comparing this computed message digest with a securely stored copy of the message digest computed from the ROM contents prior to installation in the casino game console. From a process standpoint, one embodiment may include a method of 30 authenticating a data set of a casino style game which consists of two phases: a game data set preparation phase and a game data set checking phase. In the game data set preparation phase, the method proceeds by providing a data set for a casino game, computing a first abbreviated bit string unique to the casino game data set, encrypting the first abbreviated bit string to provide an encrypted signature of the -6 casino game data set, and storing the casino game data set and the signature in a mass storage device. The first abbreviated bit string is preferably computed using a hash function to produce a message digest of the casino game data set. The signature is then encrypted from the message digest. After storage of the game data 5 set and unique signature, this information is installed in a casino game console. The casino game data set checking phase proceeds by computing a second abbreviated bit string from the stored casino game data set using the same hash function, decrypting the stored encrypted signature to recover the first abbreviated bit string, and comparing the first and second abbreviated bit strings to determine whether the 10 two strings match. If a match does occur, the casino game data set is deemed authentic; if there is no match, authentication is denied and game play is prohibited. The encryption/decryption process is preferably performed using a private key/public key technique in which the first abbreviated bit string is encrypted by the 15 game manufacturer using a private encryption key maintained in the custody of the game manufacturer. The decryption of the signature is performed using a public key which is contained in an unalterable read only memory element located in the game console, along with the casino game data set. The casino game data set is preferably stored in a mass storage device, such as a magnetic or CD-ROM disk drive unit or a 20 network file unit, the selected unit having a relatively large capacity. The actual size of the mass storage device will depend upon the casino game storage requirements and can be tailored to any specific application. Each time a casino game data set is transferred from the mass storage device 25 to the main memory of the system, the authentication routine is run. The authentication routine can also be run automatically on a periodic basis, or on demand--either locally by means of an operator switch mounted in the game console or remotely via a network. Consequently, the authenticity of the data set can be automatically checked whenever the transfer occurs and at other appropriate times. 30 In order to detect attempts to tamper with the contents of the unalterable read only memory element located in the game console, a message digest computed for the authentication program stored therein is stored in a secure manner in a different location from the game console, such as the casino operator's security facilities or the -7 facilities of a gaming commission (or both). The authenticity of the unalterable read only memory element is checked in the same way as that now performed in prior art devices: viz, computing the message digest directly from the unalterable read only memory device, and comparing the message digest thus computed with the custodial 5 version. From an apparatus standpoint, an embodiment may include an electronic casino gaming system having means for providing authentication of a game data set of a casino type game prior to permitting game play, the system including first means 10 for storing a casino game data set and a signature of the casino game data set, the signature comprising an encrypted version of a unique first abbreviated bit string computed from the casino game data set; second means for storing an authentication program capable of computing a second abbreviated bit string from the casino game data set stored in the first storing means and capable of decrypting the encrypted 15 signature stored in the first storing means to recover the first abbreviated bit string; processing means for enabling the authentication program to compute an abbreviated bit string from the casino game data set stored in the first storing means and for enabling the authentication program to decrypt the encrypted signature; and means for comparing the computed second abbreviated bit string with the decrypted 20 abbreviated bit string to determine whether a match is present. The first storing means preferably comprises a mass storage device, such as a disk drive unit, a CD ROM unit or a network storage unit. The second storing means preferably comprises an unalterable read only memory in which the authentication program is stored. 25 The authentication program stored in the unalterable ROM located within the casino game console may be used to test the authenticity of all other programs and fixed data stored in memory devices in the electronic casino gaming system, such as a system boot ROM, memory devices containing the operating system program, system drivers and executive/loader programs, and other memory devices 30 incorporated into the electronic casino game system architecture. The contents of each such memory device, whether program information or fixed data, include signatures encrypted from message digests computed using a hash function from the original program information or fixed data set. Upon system initialization, the authentication program in the unalterable ROM is used to authenticate the individual - 7a memory device contents in essentially the same fashion as that used to authenticate the casino game data sets. More specifically, the message digest for the given program or fixed data set is computed using the same hash function originally used to produce the message digest for that program or fixed data set. The encrypted 5 signature is decrypted using the proper decryption program and decryption key to recover the message digest. The two versions of the message digest are then compared and, if found to be matching, the concerned program or fixed data set is deemed authentic and is permitted to be used by the system. Once all of the concerned programs and fixed data sets have been so authenticated, the casino 10 game data set authentication procedure is run, after which game play is permitted (provided a match occurs). From a process standpoint, an embodiment may include a method of authenticating a program or data set of a casino style game which consists of two 15 phases: a program or fixed data set preparation phase, and a program or fixed data set checking phase. In the program or fixed data set preparation phase, the method proceeds by providing a program or fixed data set for a casino game, computing a first abbreviated bit string unique to the program or fixed data set, encrypting the first abbreviated bit string to provide an encrypted signature of the program or fixed data ?0 set, and storing the program or fixed data set and the signature in a memory device. The first abbreviated bit string is preferably computed using a hash function to produce a message digest of the program or fixed data set. The signature is then encrypted from the message digest. After storage of the program or fixed data set and unique signature in the memory device, the memory device is installed in a casino 25 game console. The casino game program or fixed data set checking phase proceeds by computing a second abbreviated bit string from the stored casino game program or fixed data set stored in the memory device using the same hash function, decrypting the encrypted signature stored in the memory device to recover the first abbreviated bit string, and comparing the first and second abbreviated bit strings to determine 30 whether the two strings match. If a match does occur, the casino game program or fixed data set is deemed authentic; if there is no match, authentication is denied and use of that casino game program or fixed data set is prohibited. The authentication routine is run each time a given casino game program or - 7b fixed data set needs to be called or used. The authentication routine can also be run automatically on a periodic basis, or on demand--either locally by means of an operator switch mounted in the casino game console or remotely via a network. Consequently, the authenticity of the casino game program or fixed data set can be 5 automatically checked whenever use of that program or fixed data set is required and at other appropriate times, such as in the course of a gaming commission audit. From an apparatus standpoint, an embodiment may include an electronic casino gaming system for providing authentication of a casino game program or fixed 10 data set prior to permitting system use of that casino game program or fixed data set, the system including first means for storing a casino game program or fixed data set and a signature of the casino game program or fixed data set, the -8 signature comprising an encrypted version of a unique first abbreviated bit string computed from the casino game program or fixed data set; second means for storing an authentication program capable of computing a second abbreviated bit string from the casino game program or fixed data set stored in the first storing means and 5 capable of decrypting the encrypted signature stored in the first storing means to recover the first abbreviated bit string; processing means for enabling the authentication program to compute an abbreviated bit string from the casino game program or fixed data set stored in the first storing means and for enabling the authentication program to decrypt the encrypted signature; and means for comparing 10 the computed second abbreviated bit string with the decrypted abbreviated bit string to determine whether a match is present. The first storing means preferably comprises a memory device, such as a read only memory or random access memory. The second storing means preferably comprises an unalterable read only memory in which the authentication program is stored. 15 Electronic casino game systems incorporating the invention provide a vastly expanded capacity for more sophisticated and attractive casino-style games, while at the same time improving the authentication of the games without compromising security. In addition, casino game systems incorporating the invention provide great flexibility in changing casino game play, since the casino game data sets representing the various 20 games can be stored in alterable media rather than read only memory units as with present casino game systems. By separating the authentication process from the casino game data set storage, the invention affords secure distribution and execution of program code and data, regardless of the particular distribution or storage technique employed. More 25 specifically, the invention allows the casino game data set to reside in any form of secondary storage media, such as the traditional ROM storage, hard magnetic disk drives and CD-ROM drives, or networked file systems. So long as the authentication procedure conducted on the game data set is performed using the authentication program stored in an unalterable ROM, and so long as that ROM can be verified 30 reliably, any casino game data set can be loaded from any source and can be verified by the system at any time: either prior to use, during runtime, periodically during runtime or upon demand. The large quantities of storage that can be made available in a secure fashion using the invention, facilitates the creation of casino gaming -9 systems offering both an increased diversity of games, and individual games of superior quality. In addition, the authentication of all casino game program and fixed data software ensures the integrity of all system software both prior to game play and thereafter at periodic or random intervals. 5 For a fuller understanding of the nature and advantages of the invention, reference should be had to the ensuing detailed description taken in conjunction with the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a block diagram of a system incorporating the invention; 10 FIG. 2 is a schematic diagram illustrating the contents of the read only memory and the mass storage device; FIG. 3 is a more detailed schematic view of the authentication program stored in the ROM and the game data stored in the mass storage unit; FIG. 4 is a diagram illustrating the preparation of the game data set; 15 FIG. 5 is a diagram illustrating the authentication procedure for the game data set; and FIG. 6 is a diagram illustrating an alternative approach to the secure loading of the software into the system. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS 20 Turning now to the drawings, FIG. 1 is a block diagram of an electronic casino gaming system incorporating the invention. As seen in this figure, the system consists of several system components under software control. These system components include a microprocessor 12, which may comprise any general purpose microprocessor, such as a a Pentium-based microprocessor from Intel Corporation. A 25 main memory unit 13 is provided, which is typically a random access memory having a capacity of between 32 and 64 megabytes for storing the majority of programs and graphics elements during game play. A system boot ROM 14 provides the initialization software required when power is first applied to the system. ROM 14 contains additional programs in read only form, including the operating system, 30 related drivers and the authentication software described in detail below. A non volatile RAM 17 is a battery backed static RAM capable of maintaining its contents -10 through power cycling. NV RAM 17 stores significant information relating to game play, such as the number of player credits, the last game outcome and certain diagnostic and error information not critical to an understanding of the invention. A mass storage unit implemented in the FIG. 1 system as a magnetic hard 5 disk drive unit 18 is coupled to and controlled by a disk subsystem 19 of conventional design and operation. Disk drive unit 18 provides storage for the game specific data set, which includes both program data and image data specifying the rules of the various different casino games or single casino game variations, and the types of images and image sequences to be displayed to the game players. The size 10 of the disk drive unit 18 is a function of the number of games and game variations provided for a given system, as well as the amount of data required for each specific game. In general, the more motion video designed into a particular casino game, the more storage required for that casino game software. A disk drive unit 18 with a 4 gigabyte capacity will usually provide sufficient storage capacity. Disk subsystem 19 15 comprises a disk controller connected to a PCI bus 20 for controlling the disk drive unit 18. Controller 19 preferably supports SCSI-2, with options of fast and wide. It should be noted that a number of different types of locally-based disk drive units may be used in the FIG. 1 system, including a CD-ROM storage unit. Also, the mass storage unit need not be physically located within the game console along with the 20 other elements depicted in FIG. 1: the mass storage unit may be located remotely from the game console and coupled thereto by means of an appropriate network, such as an ethernet, an RS232 link, or some other hard wired or other network link. This latter alternate arrangement is indicated by the inclusion of a network subsystem 21 of appropriate configuration and functional characteristics, which may 25 have ethernet, RS232 serial, or other network compatibility. A video subsystem 22 is coupled to the PCI bus and provides the capability of displaying full colour still images and MPEG movies with a relatively high frame rate (e.g. 30 frames per second) on an appropriate monitor (not shown). Optional 3D texture mapping may be added to this system, if desired. 30 A sound subsystem 23 having a stereo sound playback capability with up to 16 bit CD quality sound is coupled to an ISA bus 24. A general purpose input/output unit 25 provides interfaces to the game mechanical devices (not illustrated) such as manually actuatable switches and display lights. A first bridge -11 circuit 27 provides an interface between microprocessor 12, ROM 14, main memory 13 and PCI bus 20. Bridge circuit 27 is preferably a TRITON chip set available from INTEL Corporation. A second bridge circuit 28 provides an interface between the PCI bus 20 and the ISA bus 24. Bridge circuit 28 is preferably a type 82378 chip available 5 from Intel Corporation. FIG. 2 illustrates the types of information stored in the system ROM 14 and the mass storage unit. As seen in FIG. 2, the ROM unit 14 used in the FIG. 1 system comprises two separate ROM elements: ROM 29 and ROM 30. ROM 29 must be an unalterable device, such as a Toshiba type C53400 512Kx8 bit mask programmed 10 ROM. ROM 30 is preferably an unalterable device like ROM 29, but may comprise a different type of ROM, such as a type 29FO40 field programmable flash ROM available from Intel Corp. ROM 29 contains the system initialization or boot code, an authentication program, a random number generator program and an initial portion of the executive/loader programs. ROM 30 contains the operating system program, the 15 system drivers and the remainder of the executive/loader programs as noted below. The mass storage unit contains the applications, which include the game image and sound data, rules of game play and the like, and the signature associated to each particular casino game. FIG. 3 illustrates the authentication and application program information in 20 more detail. As seen in this figure, the authentication program stored in unalterable ROM 29 comprises a message digest algorithm component 32, a decryption algorithm component 33, and a decryption key component 34. The message digest algorithm component 32 stored in ROM 29 comprises an exact copy of a hash function program routine used to originally compute a message digest from the loadable game data set 25 36 in the manner described below. The decryption algorithm component 33 stored in ROM 29 comprises the algorithm required to decrypt any encrypted casino game data set signature using the decryption key component 34. The decryption key component 34 comprises the decryption key that is required to decrypt any of the encrypted signatures 37 in the manner described below 30 during the authentication routine. FIG. 4 illustrates the manner in which an encrypted data set signature 37 is generated. A loadable casino game data set 36 is processed using a hash function 41 to generate a message digest 42 which is unique to the loadable game data set 36.
-12 The hash function employed may be one of a number of known hash functions, such as the MD2, MD4, and MD5 hash functions and the SHS hash function; or any other suitable hash function capable of producing a unique abbreviated bit string from a variable size input data set. For further information about these hash functions, 5 reference should be had to the publication entitled "Answers To Frequently Asked Questions About Today's Cryptography", Revision 2.0, October 5, 1993, published by RSA Laboratories, Redwood City, California, and the publications listed in the references section thereof, the disclosures of which are hereby incorporated by reference. After generation, the message digest 42 is then encrypted with an 10 encryption algorithm 43 using a private encryption key 44 to generate a signature 37 of the message digest. In the preferred embodiment, the two-key (private/public key) encryption technique developed by RSA Data Security, Inc., of Redwood City, California, is used. This technique is disclosed and described in U.S. Pat. Nos. 4,200,770, 4,218,582 and 4,405,829, the disclosures of which are hereby 15 incorporated by reference. The signature 37 of the message digest 42 is then stored in the mass storage unit along with the loadable data set 36. FIG. 5 illustrates the authentication routine carried out in accordance with the invention. When the authentication routine is called (see below), the loadable casino game data set 36 is transferred from the mass storage unit to main memory 13 20 (unless already there), and the message digest of casino game data set 36 is computed using the message digest algorithm 32, stored in ROM 29. Message digest algorithm 32 uses the same hash function 41 as that used by the manufacturer to prepare the original message digest 42. The result is an unencrypted version 46 of the message digest computed from the casino game data set 36 currently present in 25 the mass storage unit. The encrypted data set signature 37 is decrypted using the public decryption key 34 matching the private key 44 used to originally encrypt the message digest 42 of the casino game data set 36. The message digest 47 decrypted with decryption key 34 is then compared with the message digest 46 computed from the casino game data set 36. If the two message digests match, then the casino game 30 data set 36 is deemed authentic and game play may proceed. If there is no match, either the casino game data set 36 or the signature 37 is deemed corrupted and not authentic. Game play is prohibited and appropriate actions can be taken: e.g. alerting a security employee - 13 using a suitable messaging system (an audible alarm, flashing lights, or a network message from the game console to a central security area). In order to ensure that the authentication routine cannot be bypassed by tampering with the loader program stored in ROM 30, an initial part of the loader 5 program is incorporated into unalterable ROM 29. This initial portion of the loader program requires that the authentication program be called prior to the initiation of any casino game play. Since this initial portion of the loader program is located in the unalterable ROM 29, and since no casino game play can occur until the particular casino game application data set 36 is loaded into main memory 13, the 10 authentication procedure cannot be bypassed by tampering with the software stored in ROM 30. Since authentication of the game data set 36 and signature 37 is entrusted to the contents of ROM 29, a procedure must be provided to verify the ROM 29 contents. For this purpose, a message digest is computed for the authentication 15 program stored in ROM 29, and this message digest is stored in a secure manner with the casino operator or the gaming commission (or both) along with the hash function used to produce the message digest. This hash function may be the same hash function used to compute the message digest 42 of the casino game data set or a different hash function. In this way, the authenticity of the ROM 29 can be easily 20 checked in the same way as that now performed in prior art devices: viz. computing the message digest directly from the ROM 29 and comparing the message digest thus computed with the custodial version of the message digest. If required by a given gaming commission or deemed desirable by a casino operator, the system may also display the message digest 42 of each particular data set 36 or the encrypted 25 signature version 37 for auditing purposes. In addition, the system may transmit this information via networking subsystem 21 to an on-site or off-site remote location (such as the office of the gaming commission). The message digest displayed or transmitted may comprise the decrypted version or the computed version (or both). The authentication procedure carried out by means of the message digest 30 program 32, decryption program 33 and decryption key 34 stored in unalterable ROM 29 in the manner described above is also used to authenticate the contents of all memory devices in the FIG. 1 system, such as the contents of ROM 30 (see Fig. 2), the fixed data portions and program components stored in NV RAM 17 and the -14 program and fixed data contents of any memory devices stored in the networking subsystem 21, video subsystem 22, sound subsystem 23, PCI-ISA interface 24, and GPIO unit 25. Each program or fixed data set stored in any memory device in any of these units has an associated signature, which is encrypted from a message digest 5 of the original program or fixed data set using a hash function, which is preferably the same hash function used to prepare the message digest of the casino game data set. Prior to permitting any such program or fixed data set to participate in the system operation, that program or fixed data set is subjected to the authorization procedure to ensure that the message digest computed from the current version of the program 10 or fixed data set matches the message digest decrypted from the encrypted signature associated to the program or fixed data set. In addition, the authentication procedure can be run on each such program or fixed data set at periodic or random intervals (on demand) in a manner essentially identical to that described above with respect to the casino game data set authentication procedure. As a consequence, the 15 integrity of all software in the system is checked prior to the use of that particular software in order to reveal any unauthorized changes to the software portion of the casino gaming system. An alternative approach to the secure loading of software into the system is depicted in FIG. 6. In this embodiment, the basic input/output system (BIOS) 20 software is stored in a ROM 50, the first of two ROMs making up the system boot ROM 14 (FIG. 1). The boot strap code, operating system code (OS), OS drivers and a secure loader are stored in a second ROM 52. An anchor application 54 including graphics and sound drivers, system drivers, money handling software, a second secure loader, and a signature is stored in the mass storage 18 (FIG. 1). 25 When power is initially applied to the system on start-up, or when the system experiences a warm restart, the CPU 12 will begin executing code from the BIOS ROM 50. The BIOS is responsible for initializing the motherboard and peripheral cards of the system. After the BIOS has completed the initialization, tit jumps to the boot strap code in ROM 52 causing the boot strap to copy the OS, OS drivers, and 30 the secure loader into RAM. Once in RAM, the OS is started and the secure loader stored in ROM 52 is used to load the anchor application 54 from disk 18. On disk, the anchor application -15 has a signature that is used during the load to verify the validity of the anchor application. After the anchor application 54 is started, it will be used to load all other applications. The secure loader of the anchor application will check the validity of 5 an application to be loaded by computing the signature and comparing it against the one stored on disk with the application as described above. An important advantage of the invention not found in prior art systems is the manner in which the casino game data set can be authenticated. In prior art systems, authentication of the casino game data set is normally only done when a 10 payout lying above a given threshold is required by the outcome of the game play, and this requires that the game be disabled while the ROM is physically removed and the ROM contents are verified. In systems incorporating the invention, the authenticity of a given casino game data set can be checked in a variety of ways. For example, the game data set 36 can be automatically subjected to the authentication 15 procedure illustrated in FIG. 5 each time the game is loaded from the mass storage unit into the main memory 13. Thus, as a player selects a casino game for game play in the system, the authenticity of that game actually stored in the mass storage unit is automatically checked using the authentication procedure described above without removing the ROM 29. Further, if desired, the authentication procedure may be 20 initiated in response to the pull of a slot game handle, the detection of a coin insert, the payout of coins or issuing of credit, or any other detectable event related to game play. The authenticity of a given casino game data set 36 can also be checked on demand, either locally at the game console or remotely via a network, by providing a demand procedure. Such a procedure may be initiated, e.g. by providing a 25 manually operable switch in the game console, accessible only to authorized persons, for initiating the authentication routine. Alternatively, the FIG. 1 system may be configured to respond to a demand command generated remotely (e.g. in a security area in the casino or off-site) and transmitted to the game console over a network to the networking subsystem 21. 30 Another advantage of the invention lies in the fact that the game data set storage capacity of a system incorporating the invention is not limited by the size of a ROM, but is rather dictated by the size of the mass storage unit. As a consequence, games using high resolution, high motion video and high quality stereo sound can - 16 be designed and played on systems incorporating the invention. Also, since the mass storage unit need not be a read-only device, and need not be physically located in the game console, the invention affords great flexibility in game content, scheduling and changes. For example, to change the graphic images in a particular casino game or 5 set of games, new casino game data sets can be generated along with new signatures and stored in the mass storage unit by either exchanging disk drives, replacing disks (for read only disk units), or writing new data to the media. In the networked mass storage application, these changes can be made to the files controlled by the network file server. Since the casino game data sets must pass the 10 authentication procedure test, either periodically or on demand, corrupted data sets cannot go undetected. Thus the invention opens up the field of electronic casino gaming systems to readily modifiable games with flexible displays and rules, without sacrificing the essential security of such systems. In fact, security is greatly enhanced by the ability of the invention to authenticate all game data sets both regularly (for 15 each handle pull) and at any time (on demand), without interfering with regular game play (unless no match occurs between the two forms of message digest). While the above provides a full and complete disclosure of the preferred embodiments of the invention, various modifications, alternate constructions and equivalents may be employed without departing from the true spirit and scope of the 20 invention. For example, while the RSA public/private key encryption technique is preferred (due to the known advantages of this technique), a single, private key encryption technique may be employed, if desired. In a system using this technique, the single key would be stored in ROM 29 in place of the public key 34. Also, the message digest 42 and signature 37 for a given application 36 need not be computed 25 from the entire casino game data set. For example, for some casino games it may be desirable to provide a fixed set of rules while permitting future changes in the casino game graphics, sound or both. For such casino games, it may be sufficient to compute the message digest 42 and signature 37 from only the rules portion of the applications program 36. In other cases, it may be desirable or convenient to 30 maintain the casino game video and audio portions constant, while allowing future changes to the rules of game play. For casino games of this category, the message digest 42 and signature 37 may be computed from the graphics and sound portions of the application program 36. It may also be desirable to compute a message digest - 17 42 and signature 37 from a subset of the rules, graphics or sound portions of a given applications program 36, or from some other subset taken from a given applications program 36. Therefore, the above should not be construed as limiting the scope of the 5 invention, which is defined by the appended claims. Where the terms "comprise", "comprises", "comprised" or "comprising" are used in this specification (including the claims) they are to be interpreted as specifying the presence of the stated features, integers, steps or components, but not precluding 10 the presence of one or more other feature, integer, step, component or group thereof.

Claims (23)

1. A method of authenticating a data set or a software information of a casino type viewable game, said method comprising the steps of: 5 (a) providing a data set or a software information for a casino game; (b) computing a first hash value unique to the data set or software information using a hash function; (c) encrypting the first hash value string to provide a signature; (d) storing the data set or the software information and the signature; 10 (e) providing an unalterable memory storing an authentication program and an initial portion of a loader program wherein said initial portion of the loader program requires that the authentication program is called prior to an initiation of any casino game play; (f) providing an alterable memory storing the remaining portion of the 15 loader program; (g) computing a second hash value, using the authentication program, from the stored data set or the software information using said hash function; (h) decrypting the stored signature to recover the first hash value; and (i) comparing the first and second hash value to determine whether the first ?0 and second hash value match.
2. The method of claim 1, wherein the first and second hash value respectively comprise the message digest of the data set or software information. 25
3. The method of claim 1 or 2, wherein said step (c) of encrypting is performed using a private encryption key,
4. The method of claim 3, wherein said step (h) of decrypting is performed using a public decryption key. 30
5. The method of any of the preceding claims, wherein said steps (a) - (d) are performed at a first site, and said steps (e) - (h) are performed at a second site. -19
6. The method of claim 5, wherein the first site comprises a manufacturing facility, and said second site is a gaming facility.
7. The method of any of the preceding claims, wherein said step (d) of storing 5 includes the step of storing the data set or software information and the signature in amass storage device or memory device.
8. The method of claim 7, wherein the mass storage device comprises a disk drive unit. 10
9. The method of claim 7, wherein the mass storage device comprises a CD ROM unit.
10. The method of claim 7, wherein the mass storage device comprises a network 15 storage system.
11. An electronic gaming system for providing authentication of a data set of a casino type game or software information relating to a casino type game, said system comprising: 20 first means for a storing a casino game data set or software information and a signature of said casino game data set or software information, said signature comprising an encrypted version of a unique first hash value computed from the casino game data set or software information using a hash function; second means for storing a) an authentication program capable of computing a 25 second hash value from the casino game data set or software information stored in said first storing means using said hash function and capable of decrypting an encrypted signature stored in said first storing means to recover the first hash value and b) an initial portion of a loader program wherein said initial portion of the loader program requires that the authentication program is called prior to an initiation of any 30 casino game; third means for storing a remaining portion of the loader program wherein the third means is an alterable memory; - 20 processing means for enabling the authentication program to compute a hash value from the casino game data set or software information stored in said first storing means using a hash function and for enabling the authentication program to decrypt the encrypted signature stored in said first storing means to provide a decrypted hash 5 value; and means for comparing the computed second hash value with the decrypted abbreviated hash value to determine whether a match is present.
12. The system of claim 11, wherein said first storing means comprises a mass 10 storage device or a memory device.
13. The system of claim 12, wherein said memory device comprises a read only memory. 15
14. The system of claim 12, wherein said memory device comprises a RAM,
15. The system of claim 12, wherein said mass storage device comprises a disk drive unit. 20
16. The system of claim 12, wherein said mass storage device comprises a CD ROM unit.
17. The system of claim 12, wherein said mass storage device comprises a network storage unit. 25
18. The system of one of the claims 11 to 17, wherein said second storing mass means comprises a read only memory device.
19. The system of claim 18, wherein said read only memory device comprises an 30 unalterable memory device.
20. The system of claim 18 or 19 wherein said read only memory device includes a first portion for storing that portion of said authentication program capable of computing the hash value from the data set or software information, and a second - 21 portion for storing that part of the authentication program capable of decrypting the encrypted signature.
21. The system of claim 20, wherein said second ROM portion is used to store a 5 decryption key.
22. A method of authenticating a data set or a software information of a casino type viewable game substantially as hereinbefore described with reference to the accompanying drawings. 10
23. An electronic gaming system for providing authentication of a data set of a casino-type game or software information relating to a casino-type game substantially as hereinbefore described with reference to the accompanying drawings.
AU2007200645A 1995-06-29 2007-02-14 Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security Expired AU2007200645B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2007200645A AU2007200645B2 (en) 1995-06-29 2007-02-14 Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security
AU2010201666A AU2010201666B2 (en) 1995-06-29 2010-04-27 Electronic casino gaming system with improved play capacity, authentication and security

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US497662 1995-06-29
AU47184/00A AU4718400A (en) 1995-06-29 2000-07-12 Electronic casino gaming system with improved play capacity, authentication and security
AU2007200645A AU2007200645B2 (en) 1995-06-29 2007-02-14 Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
AU2002301905A Division AU2002301905A1 (en) 1995-06-29 2002-11-08 Electronic casino gaming system with improved play capacity, authentication and security

Related Child Applications (1)

Application Number Title Priority Date Filing Date
AU2010201666A Division AU2010201666B2 (en) 1995-06-29 2010-04-27 Electronic casino gaming system with improved play capacity, authentication and security

Publications (2)

Publication Number Publication Date
AU2007200645A1 AU2007200645A1 (en) 2007-03-08
AU2007200645B2 true AU2007200645B2 (en) 2010-01-28

Family

ID=3734076

Family Applications (8)

Application Number Title Priority Date Filing Date
AU47184/00A Abandoned AU4718400A (en) 1995-06-29 2000-07-12 Electronic casino gaming system with improved play capacity, authentication and security
AU27592/02A Expired AU758507B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check utilising decryption
AU27594/02A Expired AU758203B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check and remote memory
AU27593/02A Expired AU758204B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus, utilising hashing and decryption
AU27595/02A Expired AU758257B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check and dual memories
AU27591/02A Expired AU758509B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check and disk memory
AU2007200645A Expired AU2007200645B2 (en) 1995-06-29 2007-02-14 Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security
AU2010201666A Expired AU2010201666B2 (en) 1995-06-29 2010-04-27 Electronic casino gaming system with improved play capacity, authentication and security

Family Applications Before (6)

Application Number Title Priority Date Filing Date
AU47184/00A Abandoned AU4718400A (en) 1995-06-29 2000-07-12 Electronic casino gaming system with improved play capacity, authentication and security
AU27592/02A Expired AU758507B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check utilising decryption
AU27594/02A Expired AU758203B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check and remote memory
AU27593/02A Expired AU758204B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus, utilising hashing and decryption
AU27595/02A Expired AU758257B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check and dual memories
AU27591/02A Expired AU758509B2 (en) 1995-06-29 2002-03-22 Casino gaming apparatus with gaming data check and disk memory

Family Applications After (1)

Application Number Title Priority Date Filing Date
AU2010201666A Expired AU2010201666B2 (en) 1995-06-29 2010-04-27 Electronic casino gaming system with improved play capacity, authentication and security

Country Status (1)

Country Link
AU (8) AU4718400A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4727544A (en) * 1986-06-05 1988-02-23 Bally Manufacturing Corporation Memory integrity checking system for a gaming device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4218582A (en) * 1977-10-06 1980-08-19 The Board Of Trustees Of The Leland Stanford Junior University Public key cryptographic apparatus and method
DE3316414A1 (en) * 1982-05-12 1983-12-22 Bally Manufacturing Corp., 60618 Chicago, Ill. DEVICE AND METHOD FOR ENSURE THE INTEGRITY OF A PLAYING DEVICE
US4759064A (en) * 1985-10-07 1988-07-19 Chaum David L Blind unanticipated signature systems
US4752068A (en) * 1985-11-07 1988-06-21 Namco Ltd. Video game machine for business use

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4727544A (en) * 1986-06-05 1988-02-23 Bally Manufacturing Corporation Memory integrity checking system for a gaming device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
BAUSPIESS et. al., Int. Journal devoted to the Study of Technical and Financial Aspects of Computer Security, 1992, vol 11, pages 427-437 *

Also Published As

Publication number Publication date
AU2007200645A1 (en) 2007-03-08
AU758509B2 (en) 2003-03-20
AU2759202A (en) 2002-05-16
AU2759402A (en) 2002-05-16
AU758257B2 (en) 2003-03-20
AU2759302A (en) 2002-05-30
AU2759102A (en) 2002-06-06
AU2010201666A1 (en) 2010-05-20
AU2010201666B2 (en) 2013-01-31
AU4718400A (en) 2000-09-14
AU758203B2 (en) 2003-03-20
AU758507B2 (en) 2003-03-20
AU758204B2 (en) 2003-03-20
AU2759502A (en) 2002-05-16

Similar Documents

Publication Publication Date Title
US6106396A (en) Electronic casino gaming system with improved play capacity, authentication and security
CA2225805C (en) Electronic casino gaming system with improved play capacity, authentication and security
EP1497006B1 (en) Authentication in a secure computerized gaming system
US7783040B2 (en) Encryption in a secure computerized gaming system
US20030203755A1 (en) Encryption in a secure computerized gaming system
AU2014201187B2 (en) Multi-tiered static chain of trust
US20030014639A1 (en) Encryption in a secure computerized gaming system
US20070021195A1 (en) Gaming system file authentication
CA2450201C (en) Method and apparatus for securing gaming machine operating data
USRE39369E1 (en) Electronic casino gaming system with improved play capacity, authentication and security
US20100120529A1 (en) Wagering game machine digitally signed volume management
AU2013205523A1 (en) Electronic casino gaming system with improved play capacity, authentication and security
EP1441464A1 (en) Electronic casino gaming system with authentication and security
AU2007200645B2 (en) Electronic Casino Gaming System With Improved Play Capacity, Authentication and Security

Legal Events

Date Code Title Description
FGA Letters patent sealed or granted (standard patent)
MK14 Patent ceased section 143(a) (annual fees not paid) or expired