GB2121569A - System guaranteeing integrity of a gambling system - Google Patents
System guaranteeing integrity of a gambling system Download PDFInfo
- Publication number
- GB2121569A GB2121569A GB08312834A GB8312834A GB2121569A GB 2121569 A GB2121569 A GB 2121569A GB 08312834 A GB08312834 A GB 08312834A GB 8312834 A GB8312834 A GB 8312834A GB 2121569 A GB2121569 A GB 2121569A
- Authority
- GB
- United Kingdom
- Prior art keywords
- integrity
- memory
- value
- relationship
- responsive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 208000001613 Gambling Diseases 0.000 title abstract description 26
- 238000010200 validation analysis Methods 0.000 claims abstract description 82
- 238000000034 method Methods 0.000 claims abstract description 62
- 238000012795 verification Methods 0.000 claims abstract description 13
- 238000009795 derivation Methods 0.000 claims abstract description 5
- 238000012545 processing Methods 0.000 claims abstract description 5
- 230000006870 function Effects 0.000 claims description 33
- 238000004891 communication Methods 0.000 claims description 7
- 238000013507 mapping Methods 0.000 claims description 7
- 230000003213 activating effect Effects 0.000 claims 23
- 230000004913 activation Effects 0.000 claims 2
- 238000012546 transfer Methods 0.000 abstract description 6
- 230000008569 process Effects 0.000 description 8
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 239000002131 composite material Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 238000003780 insertion Methods 0.000 description 1
- 230000037431 insertion Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000007789 sealing Methods 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
- G06F12/1408—Protection against unauthorised use of memory or access to memory by using cryptography
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3241—Security aspects of a gaming system, e.g. detecting cheating, device integrity, surveillance
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F9/00—Details other than those peculiar to special kinds or types of apparatus
- G07F9/02—Devices for alarm or indication, e.g. when empty; Advertising arrangements in coin-freed apparatus
Abstract
Data and associated validation information stored in a nonsecure location are verified as to integrity by cryptograph techniques. Verification activates a gambling system to operate in a gambler-responsive mode, and non-verification activates an alarm mode. The system is used in postal metering, electronic mail, electronic funds transfer and other source data processing systems. The validation information is formed by deriving a first value from the data according to a first relationship, and then deriving the validation information from the first value by means of a nonpublic derivation having an inverse function. The validation word is then associated with the data and stored in the nonsecure portion. Verification is accomplished by deriving 430 a first value from the data by the first relationship, and deriving 450 a second value from the validation information by means of the inverse function. The first and second values are operatively related 450 to determine system integrity. All relationships are one way function, in a preferred embodiment. In a preferred embodiment, the first and inverse second relationships are public and the second relationship is secret. <IMAGE>
Description
SPECIFICATION
A system and method for guaranteeing the integrity of a gambling system
This invention relates to secure systems, such as gambling apparatus, and more particularly to a system for guaranteeing the integrity of information content in the secure system, such as the control program of gambling apparatus.
It is often the case in electronic gambling systems that a microprocessor electronics based gambling system can be customized for different types of play by changing a memory device (such as an EPROM) or by changing the memory device contents (such as by remotely downloading data into a read-write memory (RAM or EPROM). However, it is currently the practice of some state gambling commissions, such as New
Jersey, U.S.A. to require a seal be applied to all circuitry on each circuit board (including the EPROM or RAM) as part of the certification process. Thus, inventories must be maintained of the sealed boards for each of a plurality of machines, both in manufacturing output and maintaining a repair stock pile. This approach is both costly and inefficient, inasmuch as many machines have a common nucleus and utilize the same circuit board with a different control memory program for each of a plurality of games being selected by interchanging a memory device or its contents.
Although this approach is costly and cumbersome, there has heretofore been no alternative technique provided to perform the important function of guaranteeing the integrity of the gambling machines.
In accordance with one aspect of the present invention, a system is provided wherein data and associated validation information stored in a nonsecure location are verified as to integrity by cryptographic techniques.
Good integrity verification activates the system to operate in a first mode, and bad integrity verification activates the system to operate in a second mode. In a preferred embodiment, the system is a gambling system, with a first mode corresponding to user responsive operation and the second mode corresponding to an alarm mode. Other systems where the present invention would be useful include postal metering, electronic mail, electronic funds transfer and other secure data processing systems
In accordance with another aspect of the present invention, the system has an interface port for communicating with an external device, such as a central control computer. Data and associated validation information are loaded into memory in the nonsecure location, and the system verifies the integrity of the data and associated validation information as stored in the memory by cryptographic techniques operatively relating the data to the associated validation word. The system is activated to either a first or second operative mode responsive to a verification result of good or bad integrity, respectively.
For example, a central computer could download information to one or a plurality of remotely located systems which would each verify the integrity of the information received and stored in its respective memory. Where the remotely located systems are gambling systems, the downloaded information can be odds, control programs, random number seeds, etc.
In accordance with one of the illustrated embodiments of the present invention, a gambling apparatus is disclosed having a secure portion which is certified and sealed by the Gaming Commission, and having a nonsecure portion, not sealed by the Gaming Commission, the integrity of which is verified by the secure portion. The secure portion of the gambling apparatus comprises a circuit board having a central processor and a first memory. The nonsecure portion of the gambling apparatus is comprised of a second portion of the circuit board, or an independent circuit board, having a second memory such as a nonsecure ROM,
EPROM, or read-write memory (RAM). Utilizing cryptographic techniques, the integrity of the nonsecure portion of the system is verified by the secure portion of the system.
The gambling system is operable in three modes, and powers up in a test mode for verifying the integrity of the gambling system. Where a positive verification is made that the nonsecure memory (e.g. ROM) has satisfactory integrity, the system is activated to an operable mode responsive to player user control inputs.
Alternatively, where the results of the test mode is a negative verification showing the nonsecure memory does not have good integrity, and gambling system is forced to an inoperable mode nonresponsive to player user control inputs, and an alarm is activated.
The nonsecure portion of the circuit board, the integrity of which is cryptographically detectable, has a first nonvolatile memory (such as a ROM, PROM, EPROM or EEPROM nonvolatile memory or a read-write (RAM] volatile memory) having a validation word stored therein, the validation word being derived from the first memory contents according to a first relationship. The validation word is formed by deriving a first value from the first memory's contents. The validation word is then derived from the first value by means of a nonpublic derivation having an inverse function. The validation word is then combined to form a part of the contents of the first memory.
The secure portion of the circuit board has a processor and a second nonvolatile memory mounted thereon. The integrity of the secure portion is overt and detectable, such as by physical seal. The secure portion of the board includes means for deriving a second value from the validation word of the first memory means of the inverse function. The secure portion also includes means for comparing the first and second values, and means for verifying the integrity of the second memory. The verification means activates the gaming system to the user reponsive play mode responsive to a comparison result of equality, or activates the gaming system to the user nonresponsive (alarm) mode responsive to a comparison result of inequaiity.
The relationship for deriving the first value, the nonpublic relationship, and the inverse relationship of the non-public relationship, are such that interrelating or cross deriving one to another is very complex and an extremely difficult and time consuming task. In a preferred embodiment, the encryption function is secret and the inverse function is public.
A better understanding of the invention may be had from the following detailed examples, the detailed description being taken in conjunction with the accompanying drawings in which:
Figure 1 is a perspective view of a gaming system such as a video slot gambling machine, illustrating one apparatus which can utilize the present invention;
Figure 2 is a top view showing one embodiment of a circuit board as contained in the gaming system of
Figure 1 having a secure portion and a nonsecure portion;
Figure 3 is a flow chart illustrating one embodiment of the encryption method utilized in accordance with one embodiment of the present invention;
Figure 4 is a flow chart of the decryption/test method as utilized in accordance with one embodiment of the present invention; and
Figure 5A-D are computer program listings for one embodiment of the present inention.
Referring now to Figure 1, a gaming system is shown illustrative of one embodiment of the present invention. A housing 100 is provided which contains the necessary human player control interfaces as well as electronic circuitry and mechanical circuitry. Human player control inputs are provided, such as push buttons 110 and control handle 120. Aviewing area, 130 such as video screen is provided on the front of the cabinet housing 100 for player viewing of the gaming machine response to player inputs. Coin shoots 140 are provided for accepting player coins and returning bent coins. The number of credits which the player has as well as the active game display are provided on the visual display means 130. For example, the gaming system of Figure 1 can be a slot machine gambling system having 3,4, or any number of reels, or may alternatively be any other type of gaming or gambling system. Where applicable, a pay out shoot 145 may be provided for outputting coins to winning players.
The housing 100 also contains an electronic circuit board 200, as shown in Figure 2, which provides the control and game electronic circuitry necessary to create the desired gambling system in conjunction with the video display 130 and user interface controls 110 and 120. Additionally, the housing 100 contains necessary power supplies, limit switches, etc. necessary to implement the remainder of the desired gaming system.
Referring to Figure 2, the circuit board 200 as discussed with reference to Figure 1 is shown in block diagram form. The circuit board 200 may be comprised of a single circuit board or of a plurality of circuit boards with appropriate interconnections provided. The circuit board 200 is comprised of two functionally separate units, a sealed secured portion 210 and a nonsealed, nonsecure circuit portion 250. The sealed circuit board portion 210, as illustrated, contains a microprocessor 220, a read only memory (such as a ROM,
PROM, or EPROM), and miscellaneous electronic and electromechanical circuitry 240. The sealed portion of the circuit board 210 represents the sealed portion of the gaming system in a physical sealing manner which would comply with a particular State Gaming Commission's requirements.
The nonsealed portion of the circuit board, 250, contains an interconnection socket 260 for a memory device, (e.g. for a RAM, ROM, PROM, or EPROM). When the socket 260 provides interconnection for a read-write memory, RAM or EPROM, the data contents of the read-write memory can be downloaded into the read-write memory. For example, a control program can be down-loaded from a remote site into the read-write memory of a local gambling system via an interface port 270 (Figure 2) of the local gambling system and the downloaded program verified by the secure portion of the circuit board in accordance with the teachings of the present invention. Multiple gambling systems can be configured to meet crowd selection patterns by specifying control programs either locally or remotely for each system. The systems can also be selectively forced inoperative by downloading appropriate control programs. This portion of the circuit board is not physically sealed, and thus the memory inserted into the ROM socket 260 can easily be changed or interchanged . While this is desirable from the view point of minimizing spare parts stock piling and maximizing manufacturing flexibility, the nonsealed socket does pose security risks and problems.
However, in accordance with the present invention, cryptographic techniques are utilized to verify the integrity of the nonsecure portion of the circuit board, 250, via means of cryptographic processing by the secure portion of the circuit board, 210. The microprocessor 220 may be of any type, with its selection being made based upon desired operating speed, instruction set capabilities, and cost considerations. In addition, the microprocessor 220 may be comprised of a plurality of circuits including a general purpose microprocessor (of a 4,8, 16,32, etc. bits register length), in conjunction with special purpose peripheral processors and interface chips, such as number crunchers, fast Fourier processors, fast multipliers, etc.
Referring to Figures 3 and 4, the methodology utilized to accomplish the invention of the illustrated embodiments can be more readily understood by reference to the encryption (Figure 3) and decryption (Figure 4) flow charts.
Referring to Figure 3, the encryption process utilized for creating a verifiably secure memory for insertion into the nonsealed socket 260 (of Figure 2) is illustrated in flow chart form. The procedure starts at step 300.
Proceeding at step 310 the last N bytes of the nonsecure memory are designated as a validation word W and reserved from the remaining contents of the nonsecure memory which is designed as the vector R. A control program which has been developed is loaded into the encryption systems memory and designated as the contents of the nonsealed and nonsecure memory (the vector R). The validation word W is as yet undefined,
but will represent the encrypted key to insure the integrity of the remainder of the contents of the memory.
Proceeding to step 320 an integer value F(R) is computed from the vector R by means of a one way public function F. F is a one way function mapping R into an integer whose magnitude is comparable to that of one
element of R. F need not be one to one, but should be such that changing R while leaving F(R) unchanged is a
difficult task. The function F is a public function in that it is also utilized in the encryption process and may be
discovered or known by members of the public.
Proceeding to step 330, a validation word W is computed from the value F(R) by means of a secret function
D which maps words into words with an inverse function E which is a public encryption function. Thus, W =
D(F(R)), and E(D) = 1. Thus, when the function E is utilized in the encryption process, E (W) should equal F(R)
only when the contents of the memory (the vector R and the validation word W) has not been tampered with.
Thus, the integrity of the contents of the nonsealed nonsecure memory can be verified.
Proceeding to step 340, the validation word W is placed in the memory locations which had been set aside
as the last N bytes of the nonsealed memory. At this point the encryption proces has ended as evidenced at
step 350. The contents of the nonsealed memory (vector R) plus the validation word (appropriately located in the last N bytes) can be committed to the nonsecure and nonsealed memory (e.g. ROM, EPROM, RAM).
For further details on one way mapping functions, and public key cyrptography concepts, reference is
made to the literature in general, such as "A Method for Obtaining Digital Signatures and Public Key
Cryptocism Systems", by R.L. Rivest, et al., as published in the February, 1978, Volume 21, Number 2 issue of the Communications of theACM, at pages 120-126, hereby incorporated herein by reference. A second reference, "The Mathematics of Public Key Cryptography" by Martin E. Hellman, published in Scientific
American, pages 146-157,19, deals generally with the mathematics involved in public key cryptography, and
is hereby incorporated herein by reference. Both of the aforementioned references deal with the general
problem of secure electronics communication system, either for message transfer, or for funds transfer. The
references address themselves to techniques to prevent tampering with new electronic communication
systems and fund transfer systems and means to protect the vast quantities of private information such as
credit records and medical history stored in computer data banks. Encryption and decryption are utilized for transforming information so that it is unintelligible and therefore useless to those who are not meant to have
access to it. Secondly, cryptographic techniques are utilized to insure that messages sent have not been tampered with, of critical concern in electronic funds transfer.
Referring to Figure 4, the decryption process is illustrated in flow chart form, illustrating one embodiment of the present invention. The process flow starts when the gambling system of Figure 1 is powered up, at step 400. The process proceeds to step 410 where the system is set to the test mode, wherein the system is
nonresponsive to players control inputs. The contents of the nonsealed portion of the circuit board are examined by the secure sealed portion of the circuit board, by defining the last N bytes of the nonsealed
memory contents as the validation word W, and defining the remaining nonsealed memory contents as a vector R, whose elements are the individual words of the nonsealed memory.
Proceeding, as illustrated at step 430, the integer value F(R) is computed for the nonsealed memory contents represented as the vector R by means of the public function F. Next, an integer value E(W) is computed from the validation word W based upon the public encryption function E. It will be recalled that the function E is the inverse of the function D. Thus, E(W) = E(D(F(R))) = F(R) only when the contents of the nonsealed memory have not been tampered with.
The decryption process proceeds as illustrated at step 450, where the computed value F(R) is compared to the computed value E(W). If F(R) = E(W), then the integrity of the nonsealed memory has been positively verified, and the gaming system flow proceeds as illustrated at step 480. The gaming system is set to a player responsive operable mode, wherein the coin chute and user controls are activated and the gaming system becomes playable, as illustrated at step 490. The control program contained in the nonsealed memory is executed by the processor in the sealed portion of the circuit board, 210, and the gaming system operation proceeds under supervision of the control program. At this point, the decryption and integrity verification procedure has been completed, as illustrated at step 500.
Referring back to decision block 450, where the result of the comparison of F(R) and E(W) results in a determination of inequality, the procedureal flow continues as illustrated at step 460. The gaming system of
Figure 1 is set to a player nonresponsive alarm mode. The user controls become inoperative, and the system proceeds to execute an alarm control program, as preferably stored in the secure sealed ROM illustrated at step 470. At this point the machine is disabled, and the operator is informed of the error condition. The tainted nonsealed memory device is removed from the nonsealed socket and the operator can choose between shutting the system down, or trying an alternte non-sealed memory integrated circuit. Where the system is shut down, the procedural flow is ended, as illustrated at block 500. Where a new integrated circuit is placed in the ROM socket 460, the decryption procedure repeats starting again at step 400 with power up.
In either event, the tainted memory chip should be turned over to authorities for evaluation as to tampering or simply system or manufacturing error.
Thus, in accordance with the discussion of the illustrated embodiment, herein, the ROM 230 in the sealed portion of the circuit board, 210, contains a verification program to monitor the security of the nonsealed portion of the circuit board 250 containing the plugged in nonsealed memory 260. The function F is a plublicly available function such that the signature F(R) provides a publicly available signature of the nonsealed memory contents less the validation check word W, while the encryption function E is publicly available to provide for a publicly available encryption key check word E(W). By computing the validation check word W using a secret decryption key, function D, which is the inverse of the public encryption function E, the integrity of the entire contents of the nonsealed memory (both the validation word Wand the remaining contents) can be protected and detected in accordance with the present invention's teachings.
An example may be illustrative. Presume the nonsealed memory to be protected is an EPROM having a capacity of 2048 bytes. The last 8 bytes are set aside as the validation word W, and the remainder is partitioned into 408 five byte words (Do, Do ... D407). Define 408 prespecified integers (pea, P2, ... P407) and an additional prespecified integer P408. Additionally, a large composite integer XNBase is prespecified. F(R) and
E(W) can then be computed as follows:
i = 407 F(R) = E Wi Pi(modulo XNBase).
i=o
E(W) = WP408 (modulo XNBase).
The validation check procedure can be modified slightly such that if F(R) plus E(W) (modulo XNBase) equal to 0 then the integrity of the EPROM is questioned and the system goes to the alarm mode. This example in its modified format has been implemented with a BASIC language program and has been successfully tested on an EPROM from an electronic slot machine. The BASIC language program and EPROM object code hexdump listing are illustrated in Figures 5a-d. While BASIC language was utilized in the illustrated program of Figure 5, any computer programming language could be utilized with an appropriate system. In the illustrated system of Figures 1-5, all arithmetic operations were exact modulo (XNBase), double precision numbers exact to 16 digits. However, other cryptographic mathematical techniques could be utilized equally well, and implemented in accordance with the teachings of the present invention.
It will be understood by those skilled in the art that other functional and operative relationships between the data and validation information can be used consistent with the teachings of the present invention.
Furthermore, in performing the verification function, operative relationships in addition to or instead of comparison can be used consistent with the teachings of the present invention.
While there have been described above various embodiments of system and methods for guaranteeing the integrity of the control program of a gambling machine having sealed and nonsealed portions, for the purpose of illustrating the manner in which the invention may be used to advantage, it will be appreciated that the invention is not limited thereto. Accordingly, any modification, variation, or equivalent arrangement within the scope of the accompanying claims should be considered to be within the scope of the invention.
Claims (1)
1. A system for selectively operating in one of a plurality of modes responsive to a determined system integrity comprising:
(a) a nonsecure portion of the system having data and validation information in a portion therein,
(b) a secure portion of the system comprised of:
(1) means for deriving a first value from the data according to a first relationship;
(2) means for deriving a second value from said validation information by means of a second relationship,
(3) means for operatively relating said first and second values to determine system integrity,
(4) means for activating said system to a selected operational mode responsive to said means for operatively relating,
2. The system as in Claim 1 further characterized in that said nonsecure portion comprises a memory.
3. The system as in Claim 1 wherein the integrity of the nonsecure portion is cryptographically verifiable, and the integrity of the secure portion is noncryptographically verifiable.
4. The system as in Claim 1 further characterized in that said validation information is derived from said data according to first and third relationships.
5. The system as in Claim 4 wherein said second relationship is the inverse of the third relationship.
6. The system as in Claim 1 further characterized in that said means for operatively relating provides bad and good system integrity outputs indicative of the determined system integrity.
7. The system as in Claim 6 wherein said means for activating said system activates said system to a first operational mode responsive to good system integrity output and activates said system to a second operational mode to a bad system integrity output.
8. The system as in Claim 1 further characterized in that said system is activated to a first operational mode responsive to a determination of good system integrity and said system is activated to a second operational mode responsive to a determination of bad system integrity.
9. The system as in Claim 7 or 8 further characterized in that said first operational mode is a normal operational mode, and said second operational mode is an alarm mode.
10. The system as in Claim 4 or 5 wherein said first and second relationships are public and said third relationship is secret.
11. The system as in Claim 4 or 5 wherein said first, second and third relationships are one way functions.
12. The system as in Claim 1 wherein said first relationship is further characterized in that changing any of the data changes the first value.
13. They system as in Claim 1 further characterized as a gaming system.
14. The system as in Claims 1 or 2 or 3 or 4 or 5 or 6 or 7 or 8 or 12 further characterized as a gaming system.
15. The system as in Claim 10 further characterized as a gaming system.
16. The system as in Claim 11 further characterized as a gaming system.
17. The system as in Claim 9 further characterized as a gaming system.
18. The system as in Claim 17 wherein said noraml operation mode is a player-responsive mode.
19. The system as in Claim 13 further characterized in that said secure portion is physically sealed.
20. A system as in Claim 1 or 13 further characterized in that said data and validation information are loaded into said nonsecure portion from an apparatus remotely located relative to the system.
21. The system as in Claim 1 or 13 wherein said nonsecure portion includes a memory, and said secure portion includes a processor and a memory.
22. The system as in Claim 1 or 13 further comprising:
interface means for communicating with a device external to the system,
means for loading the nonsecure portion with received communications responsive to the interface means.
23. The system as in Claim 22 wherein said received communications is further characterized as said data and validation information.
24. The system as in Claim 22 further comprising:
means for communicating the determined system integrity to a device external to the system.
25. The system as in Claim 1 or 13 wherein said secure portion of the system is remotely located relative to said nonsecure portion.
26. The system as in Claim 1 or 13 wherein said secure portion comprises a processor and a memory, wherein said processor executes instructions from said secure memory to derive said first and second values.
27. The system as in Claim 8 further characterized in that said first mode is a player responsive mode, and said second mode is a player nonresponsive mode.
28. The method as in Claim 27 wherein said second mode activates an alarm.
29. A system for insuring the integrity of a remotely located downloaded memory comprising;
(a) a controller including encryption circuitry for deriving validation information from data by means of a first relationship and a second relationship having an inverse,
(b) a system, remotely located relative to said controller, including a memory,
(c) means for communicating data and validation information from said controller to said remotely located system for storage in said memory,
(d) verification means comprised of:
(1) means for deriving a first value from the data contents of the memory by said first relationship;
(2) means for deriving a second value from said validation information by said inverse relationship;
(3) means for operatively relating said first and second values for providing an output indicative of system integerity, and
(4) means for manifesting an action responsive to said system integrity output.
30. The system as in Claim 29 wherein said verification means is remotely located relative to said controller.
31. The system as in Claim 30 further characterized in that said first relationship and inverse second relationship are public and said second relationship is secret.
32. The system as in Claim 30 wherein said remotely located system is a gaming system.
33. The system as in Claim 30 wherein said first, second and inverse relationships are one- way mapping functions.
34. The system as in claim 30 wherein said action is further characterized as activating said system to a normal operable mode responsive to an output of good system integrity, and activating said system to an alarm mode responsive to an output of bad system integrity.
35. The system as in Claim 30 wherein said remotely located system is further comprised of data processing means.
36. The system as in Claim 30 wherein said controller is operatively coupled to selectively communicate with a plurality of remotely located systems.
37. The system as in Claim 36 further characterized in that at least one of said remotely located systems is a gaming system.
38. The system as in Claim 37 wherein each of said remotely located systems is operatively configured responsive to communications from said controller to the respective remotely located system.
39. Agaming system comprising:
(a) a circuit board;
(b) a nonsecure portion of the circuit board, the integrity of which is cryptographically detectable, having a memory having data and validation information stored therein, wherein the validation information is derived from the data information according to a public first relationship and a secret second relationship having a public inverse relationship;
(c) a secure portion of the circuit board having processing electronics mounted thereon, the integrity of the secure portion being detectable,
wherein said secure portion of the circuit board is further comprised of:
(1) means for deriving a first value from the data omfpr, atopm according to the public first relationship,
(2) means for deriving a second value from said validation word by means of said public inverse relationship,
(3) means for operating on said first and second values to provide an integrity signal,
(4) means for activating said system to a first mode responsive to a first integrity signal indicative of good system integrity, and
(5) means for activating said system to a second mode responsive to a second integrity signal indicative of bad system integrity.
40. The system as in Claim 39 wherein said secure portion is further comprised of a processor and a second memory.
41. The system as in Claim 39 wherein said first, second and inverse second relationships are one-way functions.
42. A system as in Claim 39:
wherein said first relationship has the characteristic that changing the contents of said memory changes said first value.
43. The system of Claim 39:
wherein said second relationship is a one-waytrap-doorfunction.
44. Agaming system comprising:
(a) a cabinet having a display area and a user control;
(b) a circuit board mounted within the cabinet;
(c) a nonsecure portion of the circuit board, the integrity of which is cryptographically detectable, having a memory having data and validation information stored therein, wherein the validation infomation is derived, by means of a second relationship having an inverse relationship, from a first value derived from and changing according to a first relationship responsive to the data contents;
(d) a secure portion of the circuit board having verifiably good integrity comprising:
(1) means for deriving a second value from the data contents of the first memory according to the first relationship,
(2) means for deriving a third value from said validation information by means of said inverse relationship,
(3) means for providing an integrity output responsive to operting on said second and third values,
(4) means for activating said system to a first mode responsive to a first integrity output, and
(5) means for activating said system to a second mode responsive to a second integrity output.
45. The system as in Claim 44 wherein said first integrity output is indicative of good system integrity, and said second integrity output is indicative of bad system integrity.
46. The system as in Claim 45 wherein said first mode is further characterized as activating said system to a user control responsive system.
47. The system as in Claim 45 or 46 wherein said second mode is further characterized as activating an alarm.
48. A gaming system operable in a player responsive mode and an alarm mode, comprising:
a first memory having data and validation information contents therein, wherein said validation information is operatively associated with the remaining contents of the nonsecure memory
a secure memory;
means for validating the integrity of the first memory comprising:
means for executing instructions from the secure memory so as to derive a first value operatively associated with the data contents of the first memory;
means for executing instructions from the secure memory so as to derive a second value operatively associated with the validation information;
means for providing a goodifaulty system integrity result output responsive to operatively relating said first and second values;
means for activating said gaming system to said alarm mode responsive to a result output of faulty system integrity; and
means for activating said gaming system to said player-responsive mode responsive to a result output of good system integrity.
49. The system as in Claim 48:
wherein said first relationship has the characteristic that changing the contents of said first memory changes said first value.
50. A gaming system as in Claim 48 or 49:
wherein said validation information is derived from said first value.
51. The system as in Claim 48 wherein said first, second and inverse second relationships are one-way functions.
52. A system for insuring the integrity of information loaded into the system, comprising:
(a) a memory having initially undefined contents;
(b) means for loading data and validation information into the contents of the memory wherein said data is related to said validation information according to a public first and a secret second relationship;
(c) means for verifying the integrity of the loaded contents comprising:
(1) means for deriving a first value according to the first relationship responsive to the data contents of the memory,
(2) means for deriving a second value according to a public inverse of the second relationship responsive to the validation information,
(3) means for operatively relating the first and second values to provide an integrity output indicative of good and bad integrity of the memory contents,
(d) means for controlling the operable status of the system further comprising:
(1) means for activating said system to a normal operational mode responsive to the good integrity output, and
(2) means for activating said system to an alarm mode responsive to said bad integrity output.
53. The system as in Claim 52:
wherein said system is a gaming system.
54. The system as in Claim 53 further comprising:
an interface port for communicating with an external device;
means responsive to said interface port for loading said memory with the communications received from said external device.
55. The system as in Claim 53 or 54 wherein said memory is located in a nonsecure portion of the second system, and said means for verifying the integrity and means for controlling the operable status are located in a secure portion of the second system.
56. The system as in Claim 52 or 53 having user responsive input means, wherein said normal operational mode is further characterized as being responsive to said user responsive input means.
57. A method of controlling the operable mode of a system having a memory with data and validation information contents, comprising the steps of:
deriving a first value from the data contents according to a first relationship,
deriving a second value from the validation information according to a second relationship;
operatively relating said first and second values so as to determine system integrity,
activating the system to a selected operative mode responsive to the determined system integrity.
58. The method as in Claim 57 further characterized in that said system is a gaming system.
59. The method as in Claim 57 further characterized in that said validation information is derived from said data content according to the first relationship and an inverse to the second relationship.
60. The method as in Claim 59 further comprising the steps of:
activating the system to a normal operative mode responsive to a determination of good system integrity, and
activating said system to an alarm operative mode responsive to a determination of bad system integrity.
61. The method as in Claim 57 or 58 further comprising the steps of:
making the first and second relationships public;
maintaining the inverse to the second relationship in secrecy.
62. The method as in Claim 57 or 58 further comprising the steps of:
deriving said first value by means of a function which exhibits the characteristic that changing any of the contents of the nonsecure memory changes the first value.
63. The method as in Claim 62 wherein said validation information is derived from said first value, further comprising the steps of:
determining said second value from said validation information by means of an inverse derivation to that by which the validation information is obtained from the first value.
64. A method for creating a memory having verifiable secure data contents comprising the steps of:
deriving a first value from the data contents of the memory by a first relationship wherein changing the contents of the memory changes the first value;
deriving a validation value from said first value by a second relationship having an inverse relationship;and
storing and validation value in said memory contents.
65. A method of verifying the integrity of a memory having data content and validation value content related to said data content by first and second relationships, comprising the steps of:
deriving a first value from the data content of the memory by the first relationship;
deriving a second value from said validation value by an inverse to said second relationship;
providing an integrity output indicative of good and bad system integrity responsive to operatively relating the first value and the second value;
providing a first activation signal responsvie to said integrity output indicating good system integrity and providing a second activation signal responsive to said integrity output-indicating bad system integrity.
66. The method of Claim 64 or 65 wherein said first relationship and inverse second relationship are public and said second relationship is secret.
68. In a system, having a sealed secure circuit portion comprising a processor and a first memory, said system also having an insecure circuit portion comprising a second memory, a method of insuring the integrity of the insecure portion of the system comprising the steps of;
deriving a first value from the data content of the second memory by a first relationship wherein changing the contents of the second memory changes the first value;
deriving a validation value from said first value by a second relationship having an inverse relationship and
storing said validation value at a predefined location in said second memory.
69. The method as in Claim 68 further comprising the steps of:
(a) verifying the integrity of the second memory by means of said secure portion, further comprising the steps of:
(1) deriving a third value from the contents of the second memory by said first relationship;
(2) deriving a fourth value from said validation value by said inverse relationship; and
(3) operatively relating the third value to the fourth value and providing a relational output; and
(b) controlling the operable status of the system further comprising the steps of:
(1) activating said gaming system to a normal-responsive mode responsive to said relational output indicating good system integrity, and
(2) activating the system to an alarm mode responsive to said relational output indicating bad system integrity.
70. The method of Claim 68 or 69 further characterized in that said first and inverse second relationships are public and said second relationship is secret.
71. The method of Claim 70 further characterized in that said second memory is nonvolatile.
72. The method of Claim 68 or 69 further characterized in that system is a gaming system.
73. The method of Claim 69 further characterized in that said normal-responsive mode is a player responsive mode, and said alarm mode is a player nonresponsive mode.
74. A method of Claim 71 wherein said step of operatively relating further comprises the steps of:
comparing the magnitude of said first and second values, and indicating said good system integrity by a relational result of equality, and indicating said bad system integrity by a relational result of inequality.
75. The method of Claim 71 further characterized in that said first, second and inverse second relationships are one-way mapping functions.
76. In a gaming system, having a player responsive mode and a player nonresponsive alarm mode, said system comprising a nonsecure memory having data and validation information, said validation information being operatively related to the data, said sytem also having a secure memory, a method for selectively activating the system to a predetermined mode responsive to validating the integrity of the nonsecure memory, comprising the steps of:
(a) executing instructions from the secure memory so as to derive a first value representative of the contents of the nonsecure memory;
(b) executing instructions from the secure memory so as to derive a second value representative of the validation word;
(c) operatively relating the first and second values to provide an indication of system integrity;
(d) activating said gaming system to said player nonresponsive alarm mode responsive to an indication of improper system integrity;
(e) activating said gaming system to said player-responsive mode responsive to an indication of good system integrity.
77. The method as in Claim 76 further comprising the steps of:
deriving said first value by means of a function which exhibits the characteristic that changing any of the contents of the nonsecure memory changes the first value.
78. The method as in Claim 77:
wherein said validation word is derived from said first value, further comprising the steps of:
determining said second value from said validation word by means of an inverse derivation to that by which the validation word is obtained from the first value.
79. The method as in Claim 76 wherein said first value is derived by
operatively relating said data to a first functional mapping; and
further characterized in that said validation information is operatively related to said first value according to a second functional mapping,
wherein said second value is derived by
operatively relating said validation information to an inverse of said second functional mapping
80. The method of Claim 57 or 58 or 76 further comprising the steps of:
communicating said data and associated validation information to the system from a source external to the system;
storing said communicated data and associated validation information in said memory.
81. A method for controlling the operative mode of a system, having local and remote devices responsive to determined integrity of communicated information comprising the steps of:
operating upon data information at the remote device according to first and second relationships to derive validation information,
communicating said data and validation information from the remote device to the local device,
operating upon said data information at the local device, according to said first relationship, to derive a first value;
operating upon said validation information at said local device, according to an inverse of said second relationship, to derive a second value;
controlling the operative mode of the system responsive to operatively relating said first and second values.
82. The method as in Claim 81 further characterized in that there are a plurality of local devices, wherein the step of controlling the operative mode of the system further comprises the steps of:
selectively controlling the operative mode of each of said local devices responsive to the operative relationships for each respective first and second values.
83. The method as in Claim 81 further comprising the steps of:
deriving said first value by means of a function which exhibits the characteristic that changing any of the contents of the nonsecure memory changes the first value.
84. The method as in Claim 81 wherein said validation information is derived from said first value, further comprising the steps of:
determining said second value from said validation information by means of an inverse derivation to that by which the validation word is obtained from the first value.
85. The method as in Claim 81 further characterized in that said first and inverse second functional relationships are public, and said second functional relationship is secret.
86. The method as in Claim 81 or 85 further characterized in that said first, second and inverse second functional relationships are one-way functions.
87. A system for selectively operating in one of a plurality of modes responsive to a determined system integrity substantially as herein described with reference to the accompanying drawings.
88. A system for insuring the integrity of a remotely located downloaded memory substantially as herein described with reference to the accompanying drawings.
89. A gaming system substantially as herein described with reference to the accompanying drawings.
90. A gaming system operable in a player responsive mode and an alarm mode substantially as herein described with reference to the accompanying drawings.
91. A system for insuring the integrity of information loaded into the system substantially as herein described with reference to the accompanying drawings.
92. A method of controlling the operable mode of a system having a memory with data and validation information contents substantially as herein described with reference to the accompanying drawings.
93. A method for creating a memory having verifiable secure data contents substantially as herein described with reference to the accompanying drawings.
94. A method for verifying the integrity of a memory having data content and validaton value content related to said data content by first and second relationships substantially as herein described with reference to the accompanying drawings.
95. In a system, having a sealed secure circuit portion comprising a processor and a first memory, said system also having an insecure circuit portion comprising a second memory, a method of insuring the integrity of the insecure portion of the system substantially as herein described with reference to the accompanying drawings.
96. In a gaming system, having a player responsive mode and a player nonresponsive alarm mode, said system comprising a nonsecure memory having data and validation information, said validation information being operatively related to the data, said system also having a secure memory, a method for selectively activating the system to a predetermined mode responsive to validating the integrity of the nonsecure memory, substantially as herein described with reference to the accompanying drawings.
97. A method for controlling the operative mode of a system, having local and remote devices responsive to determined integrity of communicated information substantially as herein described with reference to the accompanying drawings.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US37741382A | 1982-05-12 | 1982-05-12 |
Publications (3)
Publication Number | Publication Date |
---|---|
GB8312834D0 GB8312834D0 (en) | 1983-06-15 |
GB2121569A true GB2121569A (en) | 1983-12-21 |
GB2121569B GB2121569B (en) | 1986-07-02 |
Family
ID=23489006
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB08312834A Expired GB2121569B (en) | 1982-05-12 | 1983-05-10 | System guaranteeing integrity of a gambling system |
Country Status (13)
Country | Link |
---|---|
AU (1) | AU1432583A (en) |
BE (1) | BE896722A (en) |
BR (1) | BR8302453A (en) |
DE (1) | DE3316414A1 (en) |
DK (1) | DK211683A (en) |
ES (1) | ES522284A0 (en) |
FR (2) | FR2527359A1 (en) |
GB (1) | GB2121569B (en) |
IT (1) | IT1168870B (en) |
NL (1) | NL8301708A (en) |
NO (1) | NO831648L (en) |
PT (1) | PT76671B (en) |
SE (1) | SE8302671D0 (en) |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2145856A (en) * | 1983-08-31 | 1985-04-03 | Univ Strathclyde | Copyright protection device |
GB2154344A (en) * | 1984-02-13 | 1985-09-04 | Nat Res Dev | Apparatus and methods for granting access to computers |
EP0399570A2 (en) * | 1985-06-27 | 1990-11-28 | InterBold | System of labelling containers |
GR880100673A (en) * | 1988-10-07 | 1990-11-29 | Panagiotis Skaltsas | Coding method for the protection of products from copying |
WO1997001902A1 (en) | 1995-06-29 | 1997-01-16 | Silicon Gaming, Inc. | Electronic casino gaming system with improved play capacity, authentication and security |
EP0762337A2 (en) * | 1995-09-08 | 1997-03-12 | Francotyp-Postalia Aktiengesellschaft & Co. | Method and device for enhancing manipulation-proof of critical data |
FR2758033A1 (en) * | 1996-12-31 | 1998-07-03 | Motorola Inc | DEVICE AND METHOD FOR PROTECTING ELECTRONIC INFORMATION IN A WIRELESS COMMUNICATION DEVICE |
US5871398A (en) * | 1995-06-30 | 1999-02-16 | Walker Asset Management Limited Partnership | Off-line remote system for lotteries and games of skill |
WO2001048713A1 (en) * | 1999-12-27 | 2001-07-05 | Virtgame.Com Corp. | Gaming system with location verification |
EP1204049A1 (en) * | 2000-11-06 | 2002-05-08 | Nordwestdeutsche Klassenlotterie (NKL) | Data processing system |
US6402614B1 (en) | 1995-06-30 | 2002-06-11 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
WO2002022223A3 (en) * | 2000-09-13 | 2003-01-30 | Int Game Tech | Transaction signature |
US6527638B1 (en) | 1994-03-11 | 2003-03-04 | Walker Digital, Llc | Secure improved remote gaming system |
WO2003094061A1 (en) * | 2002-05-03 | 2003-11-13 | Nkl Nordwestdeutsche Klassenlotterie | Data processing system for the organisation of lotteries |
EP1395899A1 (en) * | 2001-06-12 | 2004-03-10 | Igt | Method and apparatus for securing gaming machine operating data |
EP1441464A1 (en) | 1996-06-17 | 2004-07-28 | Igt | Electronic casino gaming system with authentication and security |
US6964611B2 (en) | 1996-12-30 | 2005-11-15 | Walker Digital, Llc | System and method for automated play of lottery games |
US7063615B2 (en) | 1995-06-29 | 2006-06-20 | Igt | Electronic gaming apparatus with authentication |
USRE39370E1 (en) | 1995-06-29 | 2006-10-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
USRE39369E1 (en) | 1995-06-29 | 2006-10-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
US7179168B1 (en) | 1995-06-30 | 2007-02-20 | Walker Digital, Llc | Systems and methods for allocating an outcome amount among a total number of events |
US7201662B2 (en) * | 2000-08-21 | 2007-04-10 | Igt | Method and apparatus for software authentication |
US7267612B2 (en) | 1997-05-28 | 2007-09-11 | Igt | Gaming apparatus with portrait-mode display |
US7320642B2 (en) | 2002-09-06 | 2008-01-22 | Wms Gaming Inc. | Security of gaming software |
US7362862B2 (en) | 1995-11-22 | 2008-04-22 | Walker Digital, Llc | Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons |
US7367889B2 (en) | 2003-06-09 | 2008-05-06 | Wms Gaming Inc. | Gaming machine having hardware-accelerated software authentication |
US7452270B2 (en) | 2000-06-29 | 2008-11-18 | Walker Digital, Llc | Systems and methods for presenting an outcome amount via a total number of events |
US7491122B2 (en) | 2003-07-09 | 2009-02-17 | Wms Gaming Inc. | Gaming machine having targeted run-time software authentication |
US7506381B2 (en) | 2001-06-15 | 2009-03-17 | Nokia Corporation | Method for securing an electronic device, a security system and an electronic device |
US7588495B2 (en) | 1996-12-30 | 2009-09-15 | Walker Digital, Llc | Method and handheld apparatus for facilitating remote play of a slot machine |
US7600108B2 (en) | 2003-06-17 | 2009-10-06 | Wms Gaming Inc. | Gaming machine having reduced-read software authentication |
US7828653B2 (en) | 2002-04-10 | 2010-11-09 | Wms Gaming Inc. | Gaming software authentication |
US8038530B2 (en) | 2005-02-28 | 2011-10-18 | Wms Gaming Inc. | Method and apparatus for filtering wagering game content |
AU2010201666B2 (en) * | 1995-06-29 | 2013-01-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
US8500537B2 (en) | 2007-05-17 | 2013-08-06 | Walker Digital, Llc | Group play of a lottery game |
US8579705B1 (en) | 1998-06-17 | 2013-11-12 | Eugene Thomas Bond | Software verification and authentication |
US8705739B2 (en) | 2005-08-29 | 2014-04-22 | Wms Gaming Inc. | On-the-fly encryption on a gaming machine |
US9424712B2 (en) | 2008-06-27 | 2016-08-23 | Bally Gaming, Inc. | Authenticating components in wagering game systems |
Families Citing this family (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5823879A (en) | 1996-01-19 | 1998-10-20 | Sheldon F. Goldberg | Network gaming system |
US6264560B1 (en) | 1996-01-19 | 2001-07-24 | Sheldon F. Goldberg | Method and system for playing games on a network |
US9530150B2 (en) | 1996-01-19 | 2016-12-27 | Adcension, Llc | Compensation model for network services |
US7806763B2 (en) | 1996-12-30 | 2010-10-05 | Igt | System and method for remote automated play of a gaming device |
US7988559B2 (en) | 2001-03-08 | 2011-08-02 | Igt | Computerized gaming system, method and apparatus |
US7043641B1 (en) | 2000-03-08 | 2006-05-09 | Igt | Encryption in a secure computerized gaming system |
US8678902B2 (en) | 2005-09-07 | 2014-03-25 | Bally Gaming, Inc. | System gaming |
US7162036B2 (en) | 2001-08-06 | 2007-01-09 | Igt | Digital identification of unique game characteristics |
US6685567B2 (en) | 2001-08-08 | 2004-02-03 | Igt | Process verification |
US7931533B2 (en) | 2001-09-28 | 2011-04-26 | Igt | Game development architecture that decouples the game logic from the graphics logics |
US8708828B2 (en) | 2001-09-28 | 2014-04-29 | Igt | Pluggable modular gaming modifiers and configuration templates for gaming environments |
US7749076B2 (en) | 2002-09-13 | 2010-07-06 | Bally Gaming, Inc. | System and method for an alterable storage media in a gaming machine |
US6902481B2 (en) | 2001-09-28 | 2005-06-07 | Igt | Decoupling of the graphical presentation of a game from the presentation logic |
US20040054952A1 (en) | 2002-09-13 | 2004-03-18 | Morrow James W. | Device verification system and method |
AU2002362027B2 (en) | 2001-11-26 | 2007-08-16 | Igt | Pass-through live validation device and method |
US8992326B2 (en) | 2006-09-06 | 2015-03-31 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US8568237B2 (en) | 2004-09-16 | 2013-10-29 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US8535158B2 (en) | 2004-09-16 | 2013-09-17 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US9117342B2 (en) | 2004-09-16 | 2015-08-25 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US8529349B2 (en) | 2004-09-16 | 2013-09-10 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US8986122B2 (en) | 2002-09-13 | 2015-03-24 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US9082260B2 (en) | 2004-09-16 | 2015-07-14 | Bally Gaming, Inc. | Networked gaming system communication protocols and methods |
US10803694B2 (en) | 2004-09-16 | 2020-10-13 | Sg Gaming, Inc. | Player gaming console, gaming machine, networked gaming system |
US8678901B1 (en) | 2005-09-07 | 2014-03-25 | Bally Gaming | System gaming |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0005179A2 (en) * | 1978-05-05 | 1979-11-14 | International Business Machines Corporation | Authenticating the identity of a user of an information system |
US4186871A (en) * | 1978-03-01 | 1980-02-05 | International Business Machines Corporation | Transaction execution system with secure encryption key storage and communications |
EP0033833A2 (en) * | 1980-02-11 | 1981-08-19 | International Business Machines Corporation | Transaction execution system, method of operating such a system and terminal for use in such a system |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2826469C2 (en) * | 1978-06-16 | 1982-12-02 | The Grey Lab. Establishment, 9490 Vaduz | Procedure and device for securing documents |
DE2949351C2 (en) * | 1979-12-07 | 1982-04-15 | The Grey Lab. Establishment, 9490 Vaduz | Method and device for generating and checking documents and the document used therewith |
US4328414A (en) * | 1979-12-11 | 1982-05-04 | Atalla Technovations | Multilevel security apparatus and method |
GB2082361A (en) * | 1980-08-12 | 1982-03-03 | Ass Leisure Games | Recording data in amusement machines |
-
1983
- 1983-05-05 DE DE19833316414 patent/DE3316414A1/en not_active Withdrawn
- 1983-05-06 AU AU14325/83A patent/AU1432583A/en not_active Abandoned
- 1983-05-10 NO NO831648A patent/NO831648L/en unknown
- 1983-05-10 SE SE19838302671A patent/SE8302671D0/en not_active Application Discontinuation
- 1983-05-10 PT PT76671A patent/PT76671B/en unknown
- 1983-05-10 GB GB08312834A patent/GB2121569B/en not_active Expired
- 1983-05-11 BR BR8302453A patent/BR8302453A/en unknown
- 1983-05-11 BE BE0/210750A patent/BE896722A/en not_active IP Right Cessation
- 1983-05-11 DK DK211683A patent/DK211683A/en not_active Application Discontinuation
- 1983-05-11 NL NL8301708A patent/NL8301708A/en not_active Application Discontinuation
- 1983-05-11 IT IT48275/83A patent/IT1168870B/en active
- 1983-05-11 ES ES522284A patent/ES522284A0/en active Granted
- 1983-05-13 FR FR8307995A patent/FR2527359A1/en not_active Withdrawn
- 1983-11-25 FR FR8318834A patent/FR2533722A1/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4186871A (en) * | 1978-03-01 | 1980-02-05 | International Business Machines Corporation | Transaction execution system with secure encryption key storage and communications |
EP0005179A2 (en) * | 1978-05-05 | 1979-11-14 | International Business Machines Corporation | Authenticating the identity of a user of an information system |
EP0033833A2 (en) * | 1980-02-11 | 1981-08-19 | International Business Machines Corporation | Transaction execution system, method of operating such a system and terminal for use in such a system |
Cited By (72)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2145856A (en) * | 1983-08-31 | 1985-04-03 | Univ Strathclyde | Copyright protection device |
GB2154344A (en) * | 1984-02-13 | 1985-09-04 | Nat Res Dev | Apparatus and methods for granting access to computers |
US4799258A (en) * | 1984-02-13 | 1989-01-17 | National Research Development Corporation | Apparatus and methods for granting access to computers |
EP0399570A2 (en) * | 1985-06-27 | 1990-11-28 | InterBold | System of labelling containers |
EP0399570A3 (en) * | 1985-06-27 | 1992-05-20 | InterBold | System of labelling containers |
GR880100673A (en) * | 1988-10-07 | 1990-11-29 | Panagiotis Skaltsas | Coding method for the protection of products from copying |
US6527638B1 (en) | 1994-03-11 | 2003-03-04 | Walker Digital, Llc | Secure improved remote gaming system |
US6935952B2 (en) | 1994-03-11 | 2005-08-30 | Walker Digital, Llc | Method and apparatus for remote gaming |
EP0882339B1 (en) * | 1995-06-29 | 2011-01-19 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
EP0882339A1 (en) * | 1995-06-29 | 1998-12-09 | Silicon Gaming, Inc. | Electronic casino gaming system with improved play capacity, authentication and security |
AU2010201666B2 (en) * | 1995-06-29 | 2013-01-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
USRE39401E1 (en) | 1995-06-29 | 2006-11-14 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
USRE39400E1 (en) | 1995-06-29 | 2006-11-14 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
USRE39369E1 (en) | 1995-06-29 | 2006-10-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
USRE39368E1 (en) | 1995-06-29 | 2006-10-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
USRE39370E1 (en) | 1995-06-29 | 2006-10-31 | Igt | Electronic casino gaming system with improved play capacity, authentication and security |
US7063615B2 (en) | 1995-06-29 | 2006-06-20 | Igt | Electronic gaming apparatus with authentication |
WO1997001902A1 (en) | 1995-06-29 | 1997-01-16 | Silicon Gaming, Inc. | Electronic casino gaming system with improved play capacity, authentication and security |
US7179168B1 (en) | 1995-06-30 | 2007-02-20 | Walker Digital, Llc | Systems and methods for allocating an outcome amount among a total number of events |
US7887405B2 (en) | 1995-06-30 | 2011-02-15 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
US6607439B2 (en) | 1995-06-30 | 2003-08-19 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
US7285045B2 (en) | 1995-06-30 | 2007-10-23 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
US5871398A (en) * | 1995-06-30 | 1999-02-16 | Walker Asset Management Limited Partnership | Off-line remote system for lotteries and games of skill |
US7867076B2 (en) | 1995-06-30 | 2011-01-11 | Walker Digital, Llc | Systems and methods for allocating an outcome amount among a total number of events |
US7874906B2 (en) | 1995-06-30 | 2011-01-25 | Walker Digital, Llc | Systems and methods for allocating an outcome amount among a total number of events |
US7303468B2 (en) | 1995-06-30 | 2007-12-04 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
US6942570B2 (en) | 1995-06-30 | 2005-09-13 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
US6402614B1 (en) | 1995-06-30 | 2002-06-11 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
US7008318B2 (en) | 1995-06-30 | 2006-03-07 | Walker Digital, Llc | Off-line remote system for lotteries and games of skill |
US7878894B2 (en) | 1995-06-30 | 2011-02-01 | Walker Digital, Llc | Systems and methods for allocating an outcome amount among a total number of events |
EP0762337A3 (en) * | 1995-09-08 | 2000-01-19 | Francotyp-Postalia Aktiengesellschaft & Co. | Method and device for enhancing manipulation-proof of critical data |
EP0762337A2 (en) * | 1995-09-08 | 1997-03-12 | Francotyp-Postalia Aktiengesellschaft & Co. | Method and device for enhancing manipulation-proof of critical data |
US7362862B2 (en) | 1995-11-22 | 2008-04-22 | Walker Digital, Llc | Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons |
EP1441464A1 (en) | 1996-06-17 | 2004-07-28 | Igt | Electronic casino gaming system with authentication and security |
US7837549B2 (en) | 1996-12-30 | 2010-11-23 | Walker Digital, Llc | System and method for automated play of lottery games |
US6964611B2 (en) | 1996-12-30 | 2005-11-15 | Walker Digital, Llc | System and method for automated play of lottery games |
US8388430B2 (en) | 1996-12-30 | 2013-03-05 | Walker Digital, Llc | System and method for automated play of lottery games |
US7588495B2 (en) | 1996-12-30 | 2009-09-15 | Walker Digital, Llc | Method and handheld apparatus for facilitating remote play of a slot machine |
FR2758033A1 (en) * | 1996-12-31 | 1998-07-03 | Motorola Inc | DEVICE AND METHOD FOR PROTECTING ELECTRONIC INFORMATION IN A WIRELESS COMMUNICATION DEVICE |
US7267612B2 (en) | 1997-05-28 | 2007-09-11 | Igt | Gaming apparatus with portrait-mode display |
US8579705B1 (en) | 1998-06-17 | 2013-11-12 | Eugene Thomas Bond | Software verification and authentication |
US8939834B2 (en) | 1998-06-17 | 2015-01-27 | Aristocrat Technologies Australia Pty Limited | Software verification and authentication |
EP1830328A1 (en) * | 1999-12-27 | 2007-09-05 | Progressive Gaming International Corporation | Gaming system with location verification |
WO2001048713A1 (en) * | 1999-12-27 | 2001-07-05 | Virtgame.Com Corp. | Gaming system with location verification |
US6508710B1 (en) | 1999-12-27 | 2003-01-21 | Virtgame Corp. | Gaming system with location verification |
US7452270B2 (en) | 2000-06-29 | 2008-11-18 | Walker Digital, Llc | Systems and methods for presenting an outcome amount via a total number of events |
US7201662B2 (en) * | 2000-08-21 | 2007-04-10 | Igt | Method and apparatus for software authentication |
US7520811B2 (en) | 2000-08-21 | 2009-04-21 | Igt | Method and apparatus for software authentication |
US7454385B2 (en) | 2000-09-13 | 2008-11-18 | Igt | Transaction signature |
US6675152B1 (en) | 2000-09-13 | 2004-01-06 | Igt | Transaction signature |
EP2592603A1 (en) * | 2000-09-13 | 2013-05-15 | Igt | Transaction signature |
WO2002022223A3 (en) * | 2000-09-13 | 2003-01-30 | Int Game Tech | Transaction signature |
US7062470B2 (en) | 2000-09-13 | 2006-06-13 | Igt | Transaction signature |
EP1204049A1 (en) * | 2000-11-06 | 2002-05-08 | Nordwestdeutsche Klassenlotterie (NKL) | Data processing system |
WO2002037349A1 (en) * | 2000-11-06 | 2002-05-10 | Nkl Nordwestdeutsche Klassenlotterie | Data processing system |
EP1395899A1 (en) * | 2001-06-12 | 2004-03-10 | Igt | Method and apparatus for securing gaming machine operating data |
AU2002349252B2 (en) * | 2001-06-12 | 2007-04-26 | Igt | Method and apparatus for securing gaming machine operating data |
EP1395899A4 (en) * | 2001-06-12 | 2005-04-06 | Igt Reno Nev | Method and apparatus for securing gaming machine operating data |
US7506381B2 (en) | 2001-06-15 | 2009-03-17 | Nokia Corporation | Method for securing an electronic device, a security system and an electronic device |
US7828653B2 (en) | 2002-04-10 | 2010-11-09 | Wms Gaming Inc. | Gaming software authentication |
US8226473B2 (en) | 2002-04-10 | 2012-07-24 | Wms Gaming Inc. | Gaming software authentication |
US8419533B2 (en) | 2002-04-10 | 2013-04-16 | Wms Gaming Inc. | Gaming software authentication |
WO2003094061A1 (en) * | 2002-05-03 | 2003-11-13 | Nkl Nordwestdeutsche Klassenlotterie | Data processing system for the organisation of lotteries |
US7320642B2 (en) | 2002-09-06 | 2008-01-22 | Wms Gaming Inc. | Security of gaming software |
US7874916B2 (en) | 2002-09-06 | 2011-01-25 | Wms Gaming Inc. | Security of gaming software |
US7367889B2 (en) | 2003-06-09 | 2008-05-06 | Wms Gaming Inc. | Gaming machine having hardware-accelerated software authentication |
US7600108B2 (en) | 2003-06-17 | 2009-10-06 | Wms Gaming Inc. | Gaming machine having reduced-read software authentication |
US7491122B2 (en) | 2003-07-09 | 2009-02-17 | Wms Gaming Inc. | Gaming machine having targeted run-time software authentication |
US8038530B2 (en) | 2005-02-28 | 2011-10-18 | Wms Gaming Inc. | Method and apparatus for filtering wagering game content |
US8705739B2 (en) | 2005-08-29 | 2014-04-22 | Wms Gaming Inc. | On-the-fly encryption on a gaming machine |
US8500537B2 (en) | 2007-05-17 | 2013-08-06 | Walker Digital, Llc | Group play of a lottery game |
US9424712B2 (en) | 2008-06-27 | 2016-08-23 | Bally Gaming, Inc. | Authenticating components in wagering game systems |
Also Published As
Publication number | Publication date |
---|---|
IT1168870B (en) | 1987-05-20 |
NL8301708A (en) | 1983-12-01 |
DK211683A (en) | 1983-11-13 |
SE8302671D0 (en) | 1983-05-10 |
SE8302671L (en) | 1984-11-13 |
NO831648L (en) | 1983-11-14 |
FR2533722A1 (en) | 1984-03-30 |
BE896722A (en) | 1983-09-01 |
ES8405185A1 (en) | 1984-05-16 |
GB2121569B (en) | 1986-07-02 |
PT76671A (en) | 1983-06-01 |
FR2527359A1 (en) | 1983-11-25 |
GB8312834D0 (en) | 1983-06-15 |
ES522284A0 (en) | 1984-05-16 |
AU1432583A (en) | 1983-11-17 |
DK211683D0 (en) | 1983-05-11 |
BR8302453A (en) | 1984-01-17 |
IT8348275A0 (en) | 1983-05-11 |
PT76671B (en) | 1986-03-12 |
DE3316414A1 (en) | 1983-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
GB2121569A (en) | System guaranteeing integrity of a gambling system | |
EP1486922B1 (en) | Gaming machine having hardware-accelerated software authentication | |
US7203841B2 (en) | Encryption in a secure computerized gaming system | |
US7827397B2 (en) | Gaming machine having a secure boot chain and method of use | |
US7783040B2 (en) | Encryption in a secure computerized gaming system | |
US6149522A (en) | Method of authenticating game data sets in an electronic casino gaming system | |
US6106396A (en) | Electronic casino gaming system with improved play capacity, authentication and security | |
US7063615B2 (en) | Electronic gaming apparatus with authentication | |
US6620047B1 (en) | Electronic gaming apparatus having authentication data sets | |
JP2005523668A (en) | Authentication in an encrypted computerized game system | |
US20030203755A1 (en) | Encryption in a secure computerized gaming system | |
EP1489567A1 (en) | Gaming machine having reduced-read software authentication | |
US8827802B2 (en) | Electronic gaming machine including a smartcard for protection, and method of use | |
AU2002362027A1 (en) | Pass-through live validation device and method | |
WO2006121933A2 (en) | Trusted computing in a wagering game machine | |
Levinthal et al. | The Silicon Gaming Odyssey Slot Machine | |
AU2009202742B2 (en) | Gaming security system | |
JPS59214476A (en) | Method and apparatus for ensuring integrity of gamble apparatus | |
AU2017204350B2 (en) | An electronic gaming machine | |
AU2001245518B2 (en) | Encryption in a secure computerized gaming system | |
AU2009230767A1 (en) | A method and gaming device for controlling use of one of more peripheral devices | |
AU2019232845A1 (en) | A security method | |
EP1881467A2 (en) | A gaming machine | |
AU2011218679A1 (en) | Gaming security system | |
AU2001245518A1 (en) | Encryption in a secure computerized gaming system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PCNP | Patent ceased through non-payment of renewal fee |