AU1539300A - Electronic casino gaming with authentication and improved security - Google Patents
Electronic casino gaming with authentication and improved security Download PDFInfo
- Publication number
- AU1539300A AU1539300A AU15393/00A AU1539300A AU1539300A AU 1539300 A AU1539300 A AU 1539300A AU 15393/00 A AU15393/00 A AU 15393/00A AU 1539300 A AU1539300 A AU 1539300A AU 1539300 A AU1539300 A AU 1539300A
- Authority
- AU
- Australia
- Prior art keywords
- program
- signature
- controller
- digital
- signatures
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims description 43
- 238000012795 verification Methods 0.000 claims description 32
- 238000010200 validation analysis Methods 0.000 claims description 3
- 238000013475 authorization Methods 0.000 claims 1
- 230000008859 change Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 239000000370 acceptor Substances 0.000 description 3
- 230000001010 compromised effect Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 208000001613 Gambling Diseases 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 1
- 230000002153 concerted effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
Landscapes
- Slot Machines And Peripheral Devices (AREA)
- Storage Device Security (AREA)
Description
WO 00/33196 PCT/AU99/01056 1 Electronic casino gaming with authentication and improved security Introduction The present invention relates generally to electronic gaming machines or consoles and in particular the invention provides an improved system for executing casino games in RAM as opposed to the conventional unalterable 5 ROM. The improvements provide an authentication process based upon digital signatures, with the U.S. Digital Signature Standard (DSS) being the preferred means of implementation. For the sake of clarity the following terms are defined for the purpose of this specification. 10 A gambling machine, usually referred to as a gaming machine, is a traditional gaming machine. Typical examples include slot machines of the type made by Aristocrat Leisure Industries or IGT. A casino refers to the operator of gambling machines. A digital signature is a pair of large numbers represented in a computer 15 as strings of binary digits. The digital signature is computed using a set of rules (i.e., the DSA) and a set of parameters such that the identity of the signatory and integrity of the data can be verified. Strong encryption is the encryption of data such that it is computationally infeasible for a third party - for example a government 20 agency - to retrieve the encrypted data without a key. A hash, or message digest, is the output from a function that produces a value that is unique for any message input into it. A one-way hash produces an output that is computationally difficult to relate to the input. It is also computationally difficult to produce two different messages with the 25 same message digest. An unforgeable log is produced by chaining together hash values such that the nth entry in the log is dependent on the (n-1)'h entry, and thus previous entries cannot be altered without re-computing the whole chain. A logic cage is a secure area inside the gaming machine that cannot be 30 accessed without sufficient security clearance. References "The Digital Signature Standard" U.S. Federal Information Processing Standards Publication 186 "The Secure Hash Standard" U.S. Federal Information Processing 35 Standards Publication 180-1 WO 00/33196 PCT/AU99/01056 2 "Cryptographic Support for Secure Logs on Untrusted Machines" by Bruce Schneier and John Kelsey (available at http://www.counterpane.conm/secure-logs. html) Background of the Invention 5 Traditionally, microprocessor based gaming machines store their program contents in unalterable ROM or EPROM. During installation and after a large jackpot payout, the machine is physically inspected and the EPROMs are removed. These EPROMs are placed in a verification device which produces an output string using a known algorithm usually referred to 10 as a hash function. This string is compared against a string that has been already generated when the game software was approved by the gaming jurisdiction. Authentication is achieved by a match of the approved string and the EPROM generated string. The main disadvantage of such a system is that the current limited 15 capacity of EPROM technology ensures that games cannot be as sophisticated as if they were stored in an alternative medium such as a hard disk or CD ROM. The other problem with using RAM is that it cannot be extracted and placed in a verification device, since the contents of the RAM are necessarily volatile. 20 Another system, disclosed and described in U.S. Pat. No. 5,643,086 uses a private key to encrypt a message digest of the approved copy of the software, and thus produce an unalterable digital signature which can be decrypted with a corresponding public key and compared against a message digest generated by an unalterable EPROM in the gaming machine. 25 The disadvantage of the above invention is that it relies on strong encryption, currently subject to export restrictions from the U.S. and other countries. This software can only be signed by one party and if a single private key is compromised, the whole system is compromised. A related problem that exists is that of version control. Once a gaming 30 machine software program is found to be faulty, a modification or 'patch' is usually distributed. Unfortunately, conventional EPROM based machines, and the disclosed system above, have no method implemented of ensuring that the earlier version of the software is not re-installed, either deliberately or by accident, later. Once software is approved, it is impossible for the 35 machine to revoke that approval. If a rogue element was able to 'sneak past' a WO 00/33196 PCT/AU99/01056 3 jurisdiction a dubious piece of software, there would be no way to stop it being used in a casino, even after detection Summary of the Invention The invention provides a gaming machine with enhanced capability 5 for storing games due to enhanced security and authentication capabilities. According to a first aspect the present invention provides a programmable controller, including a readable and writable storage means to hold a program during its execution by the programmable controller, and program authentication means comprising digital signature verification 10 means which verifies a digital signature associated with the program and prevents execution of the program if the digital signature is not valid. According to a second aspect the present invention provides a method of verifying a program or a program component for a programmable controller, including a readable and writable storage means to hold a program 15 during its execution by the programmable controller, and program authentication means comprising digital signature verification means which verifies a digital signature associated with the program, and the method including a step of verifying the digital signature against a key, and preventing execution of the program if the digital signature is not valid. 20 Preferably, the digital signature is generated by a method that does not include encryption such that de-encryption is not performed during the digital signature verification. According to a third aspect the present invention provides a programmable controller, including a readable and writable storage means to 25 hold a program during its execution by the programmable controller, and program authentication means comprising digital signature verification means which verifies each of a plurality of digital signatures associated with the program and prevents execution of the program if any one of the digital signatures is not valid. 30 According to a fourth aspect the present invention provides a method of verifying a program or a program component for a programmable controller, including a readable and writable storage means to hold a program during its execution by the programmable controller, and program authentication means comprising digital signature verification means which 35 verifies each of a plurality of digital signatures associated with the program, and the method including steps of verifying each of the digital signatures WO 00/33196 PCT/AU99/01056 4 against a respective key, and preventing execution of the program if any one of the digital signatures is not valid. Preferably the or each digital signature is generated by a method that does not include encryption such that de-encryption is not performed during 5 the digital signature verification. In one embodiment, the programmable controller is used to control the operation of a game played on an electronic gaming machine and the signed program is a game program or a component of a game program. Preferably multiple signatures may be applied to the game software, to 10 ensure that only software approved by not only the manufacturer, but also the jurisdictional authority and optionally the casino itself, is executed by the machine Preferably also a system is provided for revoking signature keys. This can be password based - a password is entered which allows one of the 15 public signatures stored in the machine to be changed. Alternatively, a revocation certificate can be used, which must be valid, or the revocation system can be time based, where the machine stores a set of signatures, good for say 10 years, and the current active signature is based upon the current system clock. 20 A system of equivalent signatures is also preferably provided, such that any one of these signatures can be used as part of the verification. Ideally a manufacturer will have at least one signature for its office in each jurisdiction. Any one could be used to sign a game, but it would be apparent in the event of a problem where the responsibility would lie, and could be 25 revoked easily. Preferably a system for version control is also included, such that once a later version of software runs on a gaming machine it is then impossible to run an earlier version of the same software. This would preferably permanently revoke faulty games once a fix had been issued. 30 Preferably any signature and version changes are held in secure unforgeable logs updated after each change to help detect possible fraud.
Preferably also the unforgeable logs are implemented using tamper-proof devices such as smartcards to ensure that the log can never be deleted.
WO 00/33196 PCT/AU99/01056 5 Brief Description of the Drawings Embodiments of the present invention will now be described by way of example with reference to the accompanying drawings in which: Figure 1 illustrates a conventional gaming machine in which the 5 present invention may be implemented; Figure 2 is a block diagram of a control unit according to the present invention; Figure 3 is a diagrammatic representation of a method of signature generation and verification according to the present invention; 10 Figure 4 is a flow diagram of a software approval process according to the present invention; and Figure 5 is a flow diagram illustrating a method of executing approved software according to the present invention. Detailed Description of the preferred embodiments 15 In the following detailed description the methodology of the embodiments will be described, and it is to be understood that it is within the capabilities of the non-inventive worker in the art to introduce the methodology on any standard microprocessor-based gaming machine or gaming console by means of appropriate programming. 20 Referring to Figure 1 of the drawings, the first embodiment of the invention is illustrated in which a slot machine 40, of the type having a video display screen 41 which displays a plurality of rotatable reels 42 carrying symbols 43, is arranged to pay a prize on the occurrence of a predetermined symbol or combination of symbols. 25 In the slot machine 40 illustrated in Figure 1, the game is initiated by a push button 44, however, it will be recognized by persons skilled in the art that this operating mechanism might be replaced by a pull handle or other type of actuator in other embodiments of the invention. The top box 45 on top of the slot machine 40 carries the artwork panel 35 which displays the 30 various winning combinations for which a prize is paid on this machine. The program which implements the game and user interface is run on a standard gaming machine control processor 100 as illustrated schematically in Figure 2. This processor forms part of a controller 110 which drives the video display screen 141 and receives input signals from sensors 144. The 35 sensors 144 may be touch sensors, however, in alternative embodiments these may be replaced by a pull handle or another type of actuator such as WO 00/33196 PCT/AU99/01056 6 button 44 in Figure 1. The controller 110 also receives input pulses from a mechanism 120 indicating the user has provided sufficient credit to begin playing. The mechanism 120 may be a coin input chute, a bank note acceptor (bill acceptor), a credit card reader, or other type of validation 5 device. The controller 120 also drives a payout mechanism 130 which for example may be a coin output. The controller 110 also includes ROM 170 in which fixed and secure program components are held. This ROM may also contain part or all of a program to perform a program verification function for programs running on 10 the CPU 100 out of RAM 150 or loaded onto or from the disk 160. Alternatively, the program verification may be performed by a stand alone verification system 140 interposed between the RAM 150, the disk 160 and the CPU 100. The verification system may make use of a tamper proof storage element such as a smart card 180 (or a device containing a smart card 15 chip, or the verification system 140 may itself be implemented as a smart card or smart card chip in which case, it will not require the separate smart card 180. An Input/Output function 190 is also provided for the CPU to communicate with a gaming machine network for administration participation in system wide prizes and bonuses and for downloading of 20 game programs. The game played on the machine shown in Figures 1 and 2 is a relatively standard game which includes a 3 by 5 symbol display and allows multiple pay lines. Slot machines such as those of the type described with reference to 25 Figures 1 and 2 can be adapted to embody the present invention with generally only a software change to modify the functions of some of the user interfaces of the machine. The system, when built will consist of an electronic gaming machine, with standard features such as graphics capability, a monitor, sound output 30 and interfaces to gaming hardware such as hoppers, bill acceptors etc. The gaming machine would also have a sophisticated central processor, say a Pentium or PowerPC for example, with a large amount of RAM, a storage device such as a hard disk, CD-ROM or remote network storage and optionally a smartcard interface. 35 The machine would furthermore have an unalterable EPROM which would have stored in it program code to perform the DSS algorithm, also WO 00/33196 PCT/AU99/01056 7 know as the DSA. It would also contain code to perform the Secure Hash Algorithm (SHA-1), the designated U.S. Federal standard message digest algorithm. This EPROM would be able to be extracted and inspected by the traditional means. In alternative implementations, other digital signature 5 algorithms could be used such as GOST, ESIGN or even the previously disclosed RSA method which requires encryption. Figure 3, copied from the U.S. Federal standard FIPS 180-1, describes the operations that produce and verify a digital signature using DSA and SHA-1. An important distinguishing characteristic of this system is that it 10 does not use encryption to produce a digital signature. It is thus not subject to export restrictions from the US and other countries. Each set of software that is to be installed in any gaming machine at present must be approved, both by the gaming jurisdictional authority and by the machine manufacturer. It also may need to be approved by the casino in 15 which the machine will reside. In the preferred implementation, all interested parties will digitally sign each piece of approved software prior to installation. The process of game software being produced, approved and authenticated would proceed as in Figure 4. These signatures will be stored with the software on a mass storage 20 device inside the gaming machine. When the machine needs to load a piece of software, or upon an external command after a significant event such as a jackpot payout, it will execute the SHA-1 program code in the EPROM on the software being loaded, and then perform a DSA verification operation using the SHA-1 output as one of the parameters. The DSA verification operation 25 will be repeated for every digital signature stored with the software, and all must be valid, so that it is impossible to execute program code that has not been approved by the manufacturer, the jurisdictional authority and optionally the casino and/or other parties. The process of executing pre approved software would proceed as in Figure 5. 30 A significant benefit of multiple signatures, as opposed to other disclosed systems which use only one, is that it protects all parties from a rogue element working within either the manufacturer, the jurisdiction or the casino. To successfully install a fraudulent piece of software in a gaming machine that uses this system would require a concerted conspiracy 35 involving trusted personnel working for all parties.
WO 00/33196 PCT/AU99/01056 8 To perform the digital signature verification, it is also necessary that the machine store public keys for the appropriate parties - jurisdiction, casino and manufacturer. In the preferred implementation, these keys are stored in EEPROM, which can be modified at suitable times by a program stored in the 5 EPROM, under strict security conditions. This enables signatures to be revoked if compromised, or periodically updated. In an alternative implementation, a plurality of signature public keys are stored in the unalterable EPROM and variables stored in EEPROM indicate which of these signatures are active. In another alternative implementation, a tamper-proof 10 device such as a smartcard stores the public keys. The program code in the EPROM passes the output from the SHA-1 algorithm to the smartcard along with the signature values stored with the software. The smartcard then performs the DSS or other signature verification and returns either an authentication or denial code to the gaming machine. Once revoked, the 15 smartcard will not allow keys to be re-enabled. Since it will be possible to change the digital signatures that authenticate software running in the machine, it is important that an unforgeable log is kept of all software changes or signature changes. This can be achieved by the use of a hash chain, where every entry in the log is 20 'hashed' with the previous log entry's hash value. In a preferred implementation, this hash chain, or the most recent part of it, is stored within a tamper-proof device such as a smartcard or the traditionally used logic cage. A smartcard is preferred, since it can have a secret, unique identification code, and is thus non-reproducible and unforgeable itself. 25 Program code stored in the unalterable EPROM accesses the smartcard during signature or software update. Since the latest hash value would always be stored on the smartcard, it would be impossible to change the software without creating a log entry. This would ensure that all modifications to the software stored on the machine was accurately logged 30 which L would be extremely useful in the event of a major jackpot payout. The EPROM can be proven to be unaltered by I the conventional means of placing it in a verification device. A more detailed description of a possible implementation of a hash chain unforgeable log can be found in the paper "Cryptographic Support for 35 Secure Logs on Untrusted Machines" - see references above.
WO 00/33196 PCT/AU99/01056 9 Each signature for a file would be linked to the file, but need not be contained within the file. In the event of a signature key revocation, new signatures may have to be downloaded from a network device or using the machine's operator mode. In this case. the new signatures being 5 downloaded would indicate which file they are to attach to, and which signature they replace. This would be more economical than re-downloading the whole software set upon a signature key change. In an alternative implementation, multiple public keys for each corresponding signature are stored. At any one time, only one for each 10 interested party would be active. The schedule for selecting which public keys are active could be time-based, so signatures would in effect have a lifetime. Periodically, the machine would have to be updated with the new signatures as either a maintenance task or upon the payments of an additional license fee to the manufacturer or jurisdiction. 15 In the event of an authentication failure due to signatures (and therefore the license to run the software) expiring, it could be implemented that the casino would have a 'grace' period to obtain new keys before the machine completely refused to run the software. For example, the machine could display a notice, similar to that found on computer shareware 20 products, informing of the license expiry that would have to be manually accepted by the machine operator every time the machine was reset. In the alternative implementation, it would also be possible to have multiple signatures active for each party at any one time. One possibility would be that these would correspond to different divisions within the 25 manufacturer or jurisdiction. This would aid tracing in the event of a software or security failure. Another security aspect that will be implemented in the gaming machine is the concept of version control. Each digitally signed piece of software stored on the mass storage device within the machine will have an 30 associated identification code and version number. It will be impossible to download software with a corresponding identification code and an earlier version number. It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the invention as shown in 35 the specific embodiments without departing from the spirit or scope of the invention as broadly described. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.
Claims (42)
1. A programmable controller, including a readable and writable storage means to hold a program during its execution by the programmable controller, and program authentication means comprising digital signature 5 verification means which verifies a digital signature associated with the program and prevents execution of the program if the digital signature is not valid, the digital signature being generated by a method that does not include encryption such that de-encryption is not performed during the digital signature verification. 10
2. The controller as claimed in claim 1, wherein a plurality of signatures are applied to the game software.
3. A programmable controller, including a readable and writable storage means to hold a program during its execution by the programmable controller, and program authentication means comprising digital signature 15 verification means which verifies each of a plurality of digital signatures associated with the program and prevents execution of the program if any one of the digital signatures is not valid.
4 The electronic gaming machine as claimed in claim 2 or 3, wherein one of the digital signatures is applied to the software by or on behalf of a 20 manufacturer of the electronic gaming machine.
5. The controller as claimed in claim 2, 3 or 4, wherein one of the digital signatures is applied to the software by or on behalf of a jurisdictional authority that has jurisdiction to authorize use of the game in a location in which the game is installed. 25
6. The controller as claimed in claim 2, 3, 4 or 5, wherein one of the digital signatures is applied to the software by or on behalf of a casino in which the electronic gaming machine is installed.
7. The controller as claimed in any one of claims 1 to 6, wherein the programmable controller is used to control the operation of a game played on 30 an electronic gaming machine and the program with which the digital signature is associated is a game program or a component of a game program.
8. The controller as claimed in any one of claims 1 to 7, wherein the signature verification means stores one or more public signature keys in secure storage and uses a public signature key from the secure storage to 35 verify the digital signature associated with the game program. WO 00/33196 PCT/AU99/01056 11
9. The controller as claimed in claim 8, wherein the signature verification means includes signature revocation means for removing public signature keys from a set of valid keys as a method of revoking signature keys.
10. The controller as claimed in claim 9, wherein the signature revocation 5 means is activated by a password such that when the password is entered it allows a particular public signature stored in the verification means to be changed or deleted.
11. The controller as claimed in claim 9 or 10, wherein a digital revocation certificate can be used, which must be validated by the validation means 10 before it causes a public signature key to be revoked.
12. The controller as claimed in claim 9, 10 or 11, wherein revocation is time based, whereby the machine stores a set of public signature keys, which are valid for a fixed period of time, after which they are automatically revoked. 15
13. The controller as claimed in claim 12, wherein the fixed period before automatic revocation is a period of 10 years.
14. The controller as claimed in claim 12 or 13, wherein identification of a current active public signature is based upon comparison of a time stamp embedded in the signature with a time and date obtained from a current time 20 value from a system clock.
15. The controller as claimed in any one of claims 8 to 14, wherein a plurality of equivalent signatures are provided in the secure storage, such that any one of the equivalent signatures can be used as part of the verification authorization. 25
16. The controller as claimed in claim 15, wherein each of the equivalent signatures is identifiable as being associated with a person or entity responsible for issuing or authorizing the program
17. The controller as claimed in any one of claims 1 to 16, wherein the verification program records versions of a program that have been verified 30 and will not re-verify versions earlier than the latest version that it has already verified.
18. The controller as claimed in claim 17, wherein the record of verified program versions is stored in a secure log and entries in the record are unforgable and unalterable after being written. 35
19. The controller as claimed in claim 18, wherein a record of digital signature key updates is kept in the secure log. WO 00/33196 PCT/AU99/01056 12
20. The controller as claimed in claim 18 or 19, wherein the secure log is recorded in a tamper proof device.
21 The controller as claimed in claim 20, wherein the tamper proof device is a smartcard or contains a smartcard chip. 5
22. A method of verifying a program or a program component for a programmable controller, including a readable and writable storage means to hold a program during its execution by the programmable controller, and program authentication means comprising digital signature verification means which verifies a digital signature associated with the program, the 10 digital signature being generated by a method that does not include encryption and the method including a step of verifying the digital signature against a key, in which de-encryption is not performed during the digital signature verification, and preventing execution of the program if the digital signature is not valid. 15
23. The method as claimed in claim 22, a plurality of signatures are applied to the game software.
24. A method of verifying a program or a program component for a programmable controller, including a readable and writable storage means to hold a program during its execution by the programmable controller, and 20 program authentication means comprising digital signature verification means which verifies each of a plurality of digital signatures associated with the program, and the method including steps of verifying each of the digital signatures against a respective key, and preventing execution of the program if any one of the the digital signatures is not valid.
25 25. The method as claimed in claim 23 or 24, wherein one of the digital signatures is applied to the software by or on behalf of a manufacturer of the electronic gaming machine.
26. The method as claimed in claim 23 or 24 or 25, wherein one of the digital signatures is applied to the software by or on behalf of a jurisdictional 30 authority that has jurisdiction to authorize use of the game in a location in which the game is installed.
27. The method as claimed in claim 23 or 24 or 25 or 26, wherein one of the digital signatures is applied to the software by or on behalf of a casino in which the electronic gaming machine is installed. 35
28. The method as claimed in any one of claims 22 to 27, wherein the programmable controller is used to control the operation of a game played on WO 00/33196 PCT/AU99/01056 13 an electronic gaming machine and the program with which the digital signature is associated is a game program or a component of a game program.
29. The method as claimed in any one of claims 22 to 28, wherein the signature verification means stores one or more public signature keys in 5 secure storage and uses a public signature key from the secure storage to verify the digital signature associated with the game program.
30. The method as claimed in claim 29, wherein the signature verification means includes signature revocation means for removing public signature keys from a set of valid keys as a method of revoking signature keys. 10
31. The method as claimed in claim 30, wherein the signature revocation means is activated by a password such that when the password is entered it allows a particular public signature stored in the verification means to be changed or deleted.
32. The method as claimed in claim 30 or 31, wherein a digital revocation 15 certificate can be used, which must be validated by the validation means before it causes a public signature key to be revoked.
33. The method as claimed in claim 30, 31 or 32, wherein revocation is time based, whereby the machine stores a set of public signature keys, which are valid for a fixed period of time, after which they are automatically 20 revoked.
34. The method as claimed in claim 33, wherein the fixed period before automatic revocation is a period of 10 years.
35. The method as claimed in claim 33 or 34. wherein identification of a current active public signature is based upon comparison of a time stamp 25 embedded in the signature with a time and date obtained from a current time value from a system clock.
36. The method as claimed in any one of claims 29 to 35, wherein a plurality of equivalent signatures are provided in the secure storage, such that any one of the equivalent signatures can be used as part of the 30 verification.
37. The method as claimed in claim 36, wherein each of the equivalent signatures is identifiable as being associated with a person or entity responsible for issuing or authorizing the program.
38. The method as claimed in any one of claims 22 to 37, wherein the 35 verification program records versions of a program that have been verified WO 00/33196 PCT/AU99/01056 14 and will not re-verify versions earlier than the latest version that it has already verified
39. The method as claimed in claim 38, wherein the record of verified program versions is stored in a secure log and entries in the record are 5 unforgable and unalterable after being written.
40. The method as claimed in claim 39, wherein a record of digital signature key updates is kept in the secure log.
41. The method as claimed in claim 39 or 40, wherein the secure log is recorded in a tamper proof device. 10
42. The method as claimed in claim 41, wherein the tamper proof device is a smartcard or contains a smartcard chip.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU15393/00A AU767422B2 (en) | 1998-11-26 | 1999-11-26 | Electronic casino gaming with authentication and improved security |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPP7342 | 1998-11-26 | ||
AUPP7342A AUPP734298A0 (en) | 1998-11-26 | 1998-11-26 | Electronic casino gaming with authentication and improved security |
AU15393/00A AU767422B2 (en) | 1998-11-26 | 1999-11-26 | Electronic casino gaming with authentication and improved security |
PCT/AU1999/001056 WO2000033196A1 (en) | 1998-11-26 | 1999-11-26 | Electronic casino gaming with authentication and improved security |
Publications (2)
Publication Number | Publication Date |
---|---|
AU1539300A true AU1539300A (en) | 2000-06-19 |
AU767422B2 AU767422B2 (en) | 2003-11-06 |
Family
ID=25615985
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU15393/00A Expired AU767422B2 (en) | 1998-11-26 | 1999-11-26 | Electronic casino gaming with authentication and improved security |
Country Status (1)
Country | Link |
---|---|
AU (1) | AU767422B2 (en) |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09251268A (en) * | 1996-03-15 | 1997-09-22 | Matsushita Electric Ind Co Ltd | Multiple digital signature system |
US5638447A (en) * | 1996-05-15 | 1997-06-10 | Micali; Silvio | Compact digital signatures |
-
1999
- 1999-11-26 AU AU15393/00A patent/AU767422B2/en not_active Expired
Also Published As
Publication number | Publication date |
---|---|
AU767422B2 (en) | 2003-11-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6722986B1 (en) | Electronic casino gaming with authentication and improved security | |
US7798900B2 (en) | Secure gaming system | |
US6962530B2 (en) | Authentication in a secure computerized gaming system | |
US7367889B2 (en) | Gaming machine having hardware-accelerated software authentication | |
CA2844557C (en) | Multi-tiered static chain of trust | |
US7179170B2 (en) | Pass-through live validation device and method | |
US20030203755A1 (en) | Encryption in a secure computerized gaming system | |
US20020187828A1 (en) | Method and apparatus for securing gaming machine operating data | |
AU2002349252A1 (en) | Method and apparatus for securing gaming machine operating data | |
JP3491065B2 (en) | Gaming machine inspection equipment | |
AU767422B2 (en) | Electronic casino gaming with authentication and improved security | |
AU2003223536B2 (en) | Authentication in a secure computerized gaming system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FGA | Letters patent sealed or granted (standard patent) | ||
MK14 | Patent ceased section 143(a) (annual fees not paid) or expired |