EP1008252A1 - Method and system for ensuring the security of computer servers of games - Google Patents

Method and system for ensuring the security of computer servers of games

Info

Publication number
EP1008252A1
EP1008252A1 EP19970942092 EP97942092A EP1008252A1 EP 1008252 A1 EP1008252 A1 EP 1008252A1 EP 19970942092 EP19970942092 EP 19970942092 EP 97942092 A EP97942092 A EP 97942092A EP 1008252 A1 EP1008252 A1 EP 1008252A1
Authority
EP
Grant status
Application
Patent type
Prior art keywords
card
means
player
virtual casino
signals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP19970942092
Other languages
German (de)
French (fr)
Inventor
Alain Gayet
Jean Moulin
Franck Rosset
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FINTEL
Fintel SA
Original Assignee
Fintel SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Card specific authentication in transaction processing
    • G06Q20/4097Mutual authentication between card and transaction partners
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3234Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The invention concerns a method and a system enabling gamesters (11) of a virtual casino to accede safely and rapidly, by means of a microphone (17) connected to a communication network (15), to the different games that the virtual casino (12) offers to its gamesters (11). The method comprises the following steps: the virtual casino provides each of its gamesters (11) with a card (10), formatted like a credit card, personalised by specific identifiers for each card and each gamester; said card (10) emits brief identifying sound signals (20), of the DTMF type, at least partly encrypted, varying with each operation, when it is actuated (14) by the gamester (11); said identifying sound signals are received by the microphone (17) and transmitted by the communication network (15) to the computer service (18) of the virtual casino; the transmitted signals and the identification data of the gamester and the card in the possession (23) of the computer service (18), are electronically processed (24) and compared (25) by the computer service (18) of the virtual casino, such that in the event of coincidence, the gamester (11) can immediately be put through to the services (30) which the virtual casino offers to the gamesters.

Description

Method and system for secure computer servers games.

The field of the invention is that remote services. More specifically, the invention relates to a method and system allowing players a virtual casino (or all providers offering games: individual or practiced in group) to access securely and rapidly, using a microphone connected a communication network, the various games that the online casino offers its players. The problem is to prevent a malicious user to access the virtual casino without authority, without paying the corresponding rights or claiming that he was not involved in money that is debited to him by the casino games virtual. To solve this problem it has been proposed to use access keys generated by the memory cards and change handsets so they can read memory cards. These solutions, in addition to their cost, are impractical and time consuming to implement. In fact, the problem can be effectively solved if we know simultaneously solve another problem: to design a method and system convenient to use, fast to implement and economical. Indeed, since it is aimed at a wide audience, ease of use and time savings become major problems that can not be excluded.

It has been proposed (FR 2702181 in the name of Lucas Goreta, WO 96 04741 in the name of Andrew MARK) to use a card emitting acoustic signals, encrypted, of the DTMF type. Thus, the holder of such a card can couple it to the microphone in the telephone handset automatically transfer its identifiers to the computer services of the virtual casino. As these identifiers are encrypted, it is likely that a third party will not be able to understand the content. However, the recording of signals from the card remains possible and a defrauder in possession of such a recording can replace the beneficiary of the card.

The solutions of L. and A. MARK Goreta therefore do not prevent a malicious user to access, without authorization, computer services of the virtual casino. The objectives of the present invention are achieved and the problems of technical prior art are solved, according to the invention using a method comprising the following steps: - the virtual casino provides of each of his players a card, the credit card format, customized by specific identifiers for each card and each player,

- the said card emits short acoustic identification signals, of DTMF type, encrypted at least in part, varying with each operation, when it is actuated by the player, - the said acoustic identification signals are received by the microphone and transmitted by the communication network iT to the virtual casino,

- the transmitted signals and the player's identification data and card held by the computer service are processed and electronically compared by the computer service of the virtual casino. Thus, through this process, the virtual casino can verify that the caller actually has an authentic card and not a computer artifice. It could also identify the card holder as a person authorized to use its services. So that in case of coincidence, the player is immediately communicated with the voice server or the operator of the virtual casino. In addition, fraudsters do not have the opportunity to steal the identification data since they are automatically transmitted in encrypted form. In addition, the record in any form whatsoever, acoustic signals will be of no use to a fraudster to identify itself with the virtual casino. Indeed, the acoustic identification signals vary at each operation. That is to say, each time the card is used. Preferably the said card:

- further counts the number of times C (p, n) that it is actuated,

- emits acoustic signals representing the number of times C (p, n) that it has been operated,

- encrypts acoustic signals as a function of the number of times C (p, n) that it has been pressed. Also preferably, the said computer means for processing and electronically comparing the transmitted signals and the player's identification data and card held by the computer service of the virtual casino,

- memorize the number of times C (p, m) that the card has been activated during the last validated operation,

- compare the number of times C (p, n) that the card has been operated, during the current operation with the memorized number of times N 1 - reject the current operation if C (p, n) is less than or equal to C (p, m) and continue verifying the current operation if C (p, n) is greater than C (p, m),

- recalculate the electronic signals S '(p, n) according to the identification data and the number of times C (p, n) that the card has been operated, when the current operation, and then compare them with the signals e S (p, n) transmitted. So that in case of coincidence, the player can access the games offered by the online casino.

To increase security, in an alternative embodiment, the method further comprises the step of: the player transmits, using a keypad associated with the telephone handset and / or the card, a confidential code. After transmission to the IT department of the virtual casino, via the communication network, this confidential code is processed and compared to the player's pin code held by the computer service of the virtual casino.

Thus, the virtual casino can verify that the caller is actually the person authorized to enter into relations with its services. A stolen card can not be used by the fault thief to know the PIN. In another alternative embodiment, also to enhance the safety of the process and prevent the player can not challenge the order he pas.sé the virtual casino, the method further comprises the step of:

- orders given by the player to the virtual casino are validated by the player by moving the card to emit an encrypted acoustic validation signal, - the said validation signal is recorded by the computer service of the virtual casino.

Advantageously, the method according to the invention may comprise the following additional step:

- an acknowledgment of the validation signal is sent to the player.

Through this process, the player has validated, with an electronic signature, the order he gave to the virtual casino.

The invention also relates to a system allowing players a virtual casino, to access securely and rapidly, various games that the online casino offers its players. This system has the characteristic of comprising means for implementing the method defined above and its alternative embodiments. Specifically: - The system of the invention comprises a card, the credit card format, customized by specific identifiers for each card and each player made available to them. The card has means for transmitting short acoustic identification signals. These transmission means are actuated by the player by means of an element accessible from outside the card. The card further comprises encryption means for encrypting at least partially and varying the acoustic signals each time the card is used.

- The system according to the invention comprises means for receiving and processing acoustic signals, in particular a microphone of a telephone handset, into electronic signals transmitted remotely by means of a communication network, - The system according to the invention comprises computer means dependent on the computer service of the virtual casino, connected to the communication network and remotely located means for receiving acoustic signals, said computer means comprising:

* A database containing the references of the cards and players and their identification data, * processing means and means for comparing electronic signals and identification data contained in the database.

Thus, with this system, the virtual casino can verify that the caller actually has an authentic card and not a computer artifice. It could also identify the card holder as a person authorized to use its services. So that in case of coincidence, the player is immediately communicated with the voice server or the operator of the virtual casino. In addition, fraudsters do not have the opportunity to steal the identification data since they are automatically transmitted in encrypted form. In addition, the record in any form whatsoever, acoustic signals will be of no use to a fraudster to identify itself by IT departments of the virtual casino. Indeed, the acoustic identification signals vary at each operation. That is to say, each time the card is used. Preferably said card further comprises:

- an incremental counter interconnected to emission means and encryption means that is incremented by at least one unit whenever the card is used. So that the state of the incremental counter is sent to the computer means and acoustic signals are encrypted according to the state of the incremental counter. Preferably also the said computer means further comprises:

- of the C memory means (p, m) of the incremental counter during the last validated operation, - of the state comparison means C (p, n) of the incremental counter emitted during the operation current with the state C (p, m) of the memorized incremental counter.

So that the verification of the current operation is refused if C (p, n) is less than or equal to

C (p, m) and is continued if C (p, n) is strictly greater than C (p, m).

Also preferably said processing means and said means for comparing electronic signals and identification data contained in the database includes means for recalculating the electronic signals according to the state

C (p, n) of the incremental counter and the identification data and then comparing them with the transmitted electronic signals. So that in case of coincidence, the player can immediately access the various games offered by the online casino. In order to increase system security, in an alternative embodiment, the system further comprises second means of comparing a confidential personal code to the player, contained in the database, a pin code emitted by the player. This code is output via a keypad associated with the telephone handset and / or the card and transmitted to the computer resources of the virtual casino, via the communication network. Thus, the virtual casino can verify that the caller is a person entitled to participate in the games. A stolen card can not be used by the fault thief to know the PIN.

In another embodiment, also in order to enhance system security and prevent the player can challenge the order he gave to the virtual casino, the system according to the invention is such that:

- said card further transmits, when actuated by the player of the virtual casino, an encrypted acoustic signal validating the orders given by the player,

- the said computer means further comprises means for detecting and recording the validation signal. With this system, the player has validated, with an electronic signature, the order he gave to the virtual casino.

Advantageously in this case the computer means further comprising editing means of an acknowledgment of the orders given, to be sent to the player. Other features and advantages of the invention will become apparent from reading the description of embodiments of the invention, given as indicative and non-limiting example, and:

- Figure 1 showing a schematic perspective view of the system and method according to the invention,

- Figure 2 having the card in the form of a block diagram,

- Figure 3 with the verification algorithm of the authenticity of the transmitted signal. The system and method according to the invention allow the player to call 11, of quickly and effectively, in particular by means of a telephone handset 16 having a microphone 17, services (various games) 30 that the virtual casino 12 makes available to its players 11. the handset 16 remotely located computer services 18 virtual casino is connected to the computer services 18 via a communication network 15. the system comprises a card 10, the credit card format , customized by specific identifiers for each card and each player 11. This card is available to players 1 1 virtual casino. The card 10 comprises emission means including a loudspeaker 13 emitting short acoustic identification signals 20, of DTMF. These signals are transmitted when the transmitting means 13 and organs that control are actuated by the player by means of an accessible button 14 from the outside of the card (not visible in Figure 1 as located on the other side of the card). These transmission means 13 are energized by a generator 99 of DTMF signals, controlled by a microprocessor 104 powered by a battery 106 and controlled by a resonator 107. The microprocessor 104 contained in the card comprises encryption means for encrypting 103, at least in part, the acoustic signals 20 including an encryption algorithm 108 and 109 specific identifiers for each card and for each 10 player 1 1, in particular the secret key 250 used by the encryption algorithm 108.

The acoustic signals 20 are received by the microphone 17 of the telephone handset, against which the player places side by side the card 10. The system also comprises transmission means 19, acoustic signals 20, located in the telephone handset 16. These transmission means 19 transmit remote acoustic signals, after processing and conversion into electronic signals, via the communication network 15.

The system also includes computer means 21 dependent on IT services 18 of the virtual casino. These computer means are connected to the communication network 15 and remotely located telephone handsets 16. These computer means 21 themselves comprise:

- a database 23 containing the references of the cards and players and their identification data,

- processing means 24 and comparing means 25 of the electronic signals and identification data contained in the database.

So that in case of coincidence, the services of the 30 virtual casino are immediately accessible to the player 11.

Preferably, the microprocessor 104 and the encryption means 103 are designed such that the acoustic signal 20 varies at each operation. Indeed, encrypt an identification code that is transformed into a sequence information, incomprehensible to everyone, and that only the holder of the encryption key, will decrypt. But this in no way prevents a copy of the encrypted identification code either during its acoustic transmission (recorder) or by pirating the telephone line. This print improperly used by a hacker, will be processed by the receiving system as having all the characteristics of the original, and then interpreted to verify the identifiers of the card.

The problem is the following: how to make impossible any attempt to reproduce? It will hereinafter be described various embodiments of the general means allowing to distinguish between the original and the copy, when analyzing the encrypted signal received by the computer means 21, by inserting a distinctive feature in the signal 20 of the DTMF type issued by the board 10.

One variant is to use a so-called time stamp (e.g., as it was described in U.S. Patent No. 4,998,279). This timestamp function uses the "time" parameter that is constantly evolving. The "copy" is thus delayed, when it is issued. Such a solution requires synchronization between the transmitter means 13 and computer means 21. For that both must have a "time base" and a "frequency standard". These two time bases have their own precision and their own drift. The result is that they get out of sync slowly but gradually. To overcome this technical difficulty, a certain drift is tolerated between the time bases of the emission means 13 and computer means 21. As this drift, the greater the uncertainty increases on the "validity" of the information received and increases the risk of fraud. So if a drift of one minute is tolerated, unlawful copying of issuing the encrypted signal, and reused fraudulently within 30 seconds, will be seen as valid by the analysis of IT resources system 21. Another alternative is using incremental lists (e.g., as it was described in US patent No. 4928 098). The transmitting and the receiving device have an ordered list of successive encryptions of the identification code or feature algorithms to establish the As. At a given instant the computer means 21 are waiting for the encrypted result C (n). If they actually receive the message C (n), it validates the operation. But the computer means 21 may receive a different message, indeed the card user may be actuated several times the transmission means 13 thereof, by game, by mistake, so that the card is in the situation transmitting the encrypted result C (n + p) at its next utilization with the computer means 21. If the computer means 21 receive a different message, they look forward, in the list of successive encrypted results, if any message C (n + p) identical to that received. To remove ambiguity "is this an authentic message emitted by the transmitter?" or "is it a fraudulent message?", the answer is to request or await the next show. If it is identical to C (n + p + l), then the system validates the message and instead waiting for the next show in the state C (n + p + 2). If it is different, the message is not validated and the analysis system remains in waiting for message C (n). Such an embodiment is not very ergonomic since it obliges the card holder to operate several times this.

According to a preferred embodiment, to distinguish the original signal from its copy, the microprocessor 104 embedded in the card 10 comprises an incremental counter 105. At each use of the card, the incremental counter 105 is incremented by one or more units. Obviously, like a ratchet wheel, it can not go back, it can only go forward to each use.

In the case of this embodiment, the state C (p, n) 242 of the counter 105 included in the calculation of the encrypted message 244 transmitted by the transmitting means 13. The encoded part S (p, n) 241 is calculated by the algorithm 108 (the equivalent of which 247 is stored in the computer means 21 by means of the secret key 250 specific to each card and the state C (p, n) 242 of the counter 105. the card 10 transmits in addition to the identification number I (p) 240 of the card and the encrypted identification code S (p, n) 241, the state C (p, n) 242 of its incremental counter 105 at each transmission. the computer means 21 store 230, in the 23 data ba.se, the state C (p, n) 242 of the incremental counter 105 during the last validated operation. Thus, each message reception 244, the comparing means 25 of the 21 computer means may compare 245 the received information relating to the state C (p, n) 242 of the counter 105 at the previous information received C (p, m) 2 46 and stored in memory 230, 23. a) - If C (state p, n) 242 of the counter 105 (Fig. 2) expressed in message 244 is strictly greater than (n> m) than C (p, m) 246 received previously, then the message 244 is accepted and the analysis continues. b) - If the state C (p, n) 242 of the counter 105 expressed in message 244 is less than or equal (n <m) than C (p, m) 246 received previously, then the message is denied. The message received can only be a copy made previously or a computer artifice. If the conditions defined in point a) above are met, the computer means 21 are used to read the fixed part I (p) 240 and search in their own database 23, 230 corresponding private key of the card. The calculation means 239 of the processing means 24 may then by means of the algorithm 247, the counter state C (p, n) 242 and the secret key ID (p) 250, proceed with the calculation of the encrypted code expected by the computer means 21. the encrypted code S '(p, n) 248 thus calculated is compared 249 to the actually received S (p, n) 241, by the comparison means 25. This method and these means thus allow validate or invalidate message 244, without requiring the user to actuate the card several times therein, as is the case in the embodiment described above. The existence within the card 10 of an incremental counter 105 provides no additional cost, set at the time of the individual programming of the card, the maximum number of times the card can be used. Once the maximum is reached, it no longer issues consistent message and is therefore refused by the computer means 21. The frame 244 issued contains, for a given card (p),

- a fixed part I (p) 240 (the identification number of the card), - a variable incremental C (p, n) 242 (the counter state)

- a variable part S (p, n) 241 seemingly random (the result of an encryption algorithm 108 on the secret key 250 specific to this card (p)).

The frame transmitted:

- is always different from one card to another - is, for a given card, always different at each show.

The computer means 21 enable, for a given card (p) of:

- read the fixed part I (p) 240 (the identification number of the card),

- search in their own database 23 the secret key 250 of this card and the last record received from the state C (p, m) 246 of the counter 105 of this card, - reject this frame 244 if the state of counter C (p, n) 242 of the current operation is less than or equal to C (p, m) 246 previously received and continue verifying the current operation if the state C (p, n) 242 is strictly greater than C (p, m) 246 received previously,

- to "decrypt" message 244 received and validating the content in the recalculating means of the encryption algorithm 247, the specific key 250 of the card and the counter state C (p, n ) 242, then comparing the result of this calculation to the received message.

Thus, thanks to this combination of means it is possible to transmit, by means of a card having the format of a credit card, DTMF type acoustic frequency identification, received by the microphone of a connected equipment the telephone network, and to be sure of the authenticity of the calling card and thus dismiss all fraudsters use any sound recording or computer or computer artifice.

To increase the security of the system, in the embodiment shown in Figure

I, the computer means 21 also comprise second comparison means 26. These comparison means are used to compare a pin code to the player

II in the database with the pin code emitted by the player. This code is transmitted by means of a keyboard 27 associated with the telephone handset 16 and / or the card 10 and transmitted to the computer means 21 of the virtual casino, by the communication network. 15.

Thus, the virtual casino has assured that the caller 11 is actually the person authorized to enter into relations with its services. A stolen card can not be used by the fault thief to know the PIN. In another embodiment, also in order to enhance system security and prevent the player can challenge the order he gave to the virtual casino, the system according to the invention is such that:

- the card 10 transmits, when it is actuated by the player 14, an encrypted acoustic signal validating the orders given by player 1 1 - the said computer means 21 comprise means for detection 21a and 21b recording the signal of confirmation.

With this system, the player has validated, with an electronic signature, the order he gave to the virtual casino.

Advantageously in this case the computer means 21 further comprises editing means 28 of an acknowledgment 29 of the orders. This acknowledgment is sent to the player 11.

Claims

1. A process for players (11) of a virtual casino, to access securely and rapidly, using a microphone (17) connected to a communications network (15), the various games that the casino says virtual (12) offers players (11), said method comprising the steps of:
- virtual casino provides each of its players (11) a map (10) in credit card format, customized by specific identifiers for each card and each player,
- the said card (10) emits short acoustic identification signals, of DTMF type, encrypted at least in part, varying with each operation, when it is actuated by the player
(H),
- the said acoustic identification signals are received by the microphone (17) and transmitted through the communication network (15) to the computer service (18) the virtual casino,
- the transmitted signals and the player's identification data and card held by the computer service (18) are processed (24) and compared (25) electronically by the computer service (18) the virtual casino, so that 'in case of coincidence of virtual casino games are immediately accessible to the player.
2. Method according to claim 1, - the said card (10):
* Count (105) further the number of times C (p, n) (242) where it is pressed by the element (14),
* Emits acoustic signals (20) representative of the number of times C (p, n) (242) where it has been operated, * encrypts (103) the acoustic signals according to the number of times C (p, n)
(242) where it has been operated,
- the said computer means (21) for processing (24) and comparing (25) electronically the transmitted signals and the identification data of the player and of the card held (23) by the computer service (18) the virtual casino ( 12). * Memorize (230) the number of times C (p, m) (246) that the card has been operated at last validated operation,
* Compare (245) the number of times C (p, n) (242) that the card has been operated, during the current operation with the memorized number of times C (p, m) (246)
* Reject the current operation if C (p, n) (242) is less than or equal to C (p, m) (246) and continue verifying the current operation if C (p, n) (242 ) is greater than
C (p, m) (246)
* Recalculate (239) the electronic signals S '(p, n) (248) according to the identification data and the number of times C (p, n) (242) that the card has been operated, when the current operation, and then compare (249) the transmitted electronic signals S (p, n) (241) so that in case of coincidence of virtual casino games are immediately accessible to players.
3. Process according to claims 1 or 2, further comprising the step of:
- the player transmits, through a keyboard (27) associated with the microphone and / or the card, PIN, after transmission to the IT department (18) of the virtual casino, via the communication network, PIN is processed and compared (26) to the player's pin code held by the computer service of the virtual casino.
4. Process according to Claims 1, 2 or 3, further comprising the step of:
- orders given by the player to the virtual casino are validated by the player by operating (14) the card to emit an encrypted acoustic validation signal, - the said validation signal is recorded (21b) by the computer service of virtual casino.
5. The method of claim 4, further comprising the step of:
- an acknowledgment (29) of the validation signal is addressed to the player.
6. System allowing players (11) of a virtual casino, to access securely and rapidly, various games virtual casino says offers its players, said system comprising:
- a card (10) in credit card format, customized by specific identifiers for each card and each player made available to them; said card comprising:
* Means (13) of emitting short acoustic identification signals, of DTMF type, operated by the player of the virtual casino using an element accessible from the outside of the card (10),
* Encryption means for encrypting at least partially and varying the acoustic signals each time the card is used,
- means for receiving and processing acoustic signals, in particular a microphone (17) of a telephone handset (16) in electronic signals transmitted remotely via a communication network (15),
- computer means (21) dependent on the computer service of the virtual casino, connected to the communication network and remotely located means for receiving acoustic signals, said computer means comprising: * a database (23) containing the references cards and players and their identification data,
* Processing means (24) and means for comparing (25) the electronic signals and identification data contained in the database, so that in case of coincidence, the virtual casino games are immediately accessible to players.
7. The system of claim 6,
- the said card (10) further comprising:
* An incremental counter (105) interconnected to emission means (13) and encryption means (103), incrementing is at least one unit whenever the card (10) is actuated by one member (14 ), so that the state of the incremental counter (105) is transmitted to the computer means (21) and acoustic signals are encrypted according to the state of the incremental counter,
- the said computer means (21) further comprising: * means for storing (23, 230) the state C (p, m) (246) of the incremental counter (105) during the last validated operation,
* Means for comparing (245) the state C (p, n) (242) of the incremental counter (105) emitted during the current operation with the state C (p, m) (246) of the counter memorized incremental, so that the verification of the current operation is refused if C (p, n) (242) is less than or equal to C (p, m) (246) and is continued if C (p, n) (242) is strictly greater than C (p, m) (246)
- said processing means (24) and said comparing means (25) the electronic signals and identification data contained in the database comprising means for recalculating (239) the electronic signals as a function of the state C (p, n) (242) of the incremental counter (105) and the identification data and then comparing them (249) with the transmitted electronic signals, so that in case of coincidence, the virtual casino games are immediately accessible to players.
8. The system of claim 7, the said computer means further comprising: - second comparison means (26) a confidential personal code to the player contained in the database, a pin code emitted by the player by means a keyboard (27) associated with the telephone handset and / or the card and transmitted to the computer means (21) of the virtual casino, by the communication network (15).
9. System according to claims 7 or 8, - the said card (10) emitting in addition, when operated by the player of the virtual casino, an encrypted acoustic signal validating the orders given by the player,
- the said computer means further comprising:
* Detection means (21a) and a recording means (21b) the validation signal.
10. The system of claim 9,
- the said computer means further comprising:
* Editing means (28) of an acknowledgment of the orders given, to be sent to the player.
EP19970942092 1996-09-25 1997-09-25 Method and system for ensuring the security of computer servers of games Withdrawn EP1008252A1 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
FR9611916A FR2753861B1 (en) 1996-09-25 1996-09-25 Method and system for computer servers secures games
FR9611916 1996-09-25
PCT/FR1997/001687 WO1998013972A1 (en) 1996-09-25 1997-09-25 Method and system for ensuring the security of computer servers of games

Publications (1)

Publication Number Publication Date
EP1008252A1 true true EP1008252A1 (en) 2000-06-14

Family

ID=9496212

Family Applications (1)

Application Number Title Priority Date Filing Date
EP19970942092 Withdrawn EP1008252A1 (en) 1996-09-25 1997-09-25 Method and system for ensuring the security of computer servers of games

Country Status (4)

Country Link
US (1) US6904520B1 (en)
EP (1) EP1008252A1 (en)
FR (1) FR2753861B1 (en)
WO (1) WO1998013972A1 (en)

Families Citing this family (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7565546B2 (en) * 1999-03-30 2009-07-21 Sony Corporation System, method and apparatus for secure digital content transmission
US6697489B1 (en) 1999-03-30 2004-02-24 Sony Corporation Method and apparatus for securing control words
US7730300B2 (en) 1999-03-30 2010-06-01 Sony Corporation Method and apparatus for protecting the transfer of data
US7747853B2 (en) 2001-06-06 2010-06-29 Sony Corporation IP delivery of secure digital content
DE19925509A1 (en) * 1999-06-04 2000-12-07 Deutsche Telekom Ag Acoustic-mechanical verification transmitter
US7039614B1 (en) 1999-11-09 2006-05-02 Sony Corporation Method for simulcrypting scrambled data to a plurality of conditional access devices
US7013393B1 (en) 1999-12-21 2006-03-14 Pierre Stevens Universal intelligent card for secure access to system functions
US7215770B2 (en) * 2002-01-02 2007-05-08 Sony Corporation System and method for partially encrypted multimedia stream
US7292690B2 (en) * 2002-01-02 2007-11-06 Sony Corporation Video scene change detection
US7292691B2 (en) * 2002-01-02 2007-11-06 Sony Corporation Progressive video refresh slice detection
US7823174B2 (en) 2002-01-02 2010-10-26 Sony Corporation Macro-block based content replacement by PID mapping
US7895616B2 (en) 2001-06-06 2011-02-22 Sony Corporation Reconstitution of program streams split across multiple packet identifiers
US7336787B2 (en) * 2001-06-06 2008-02-26 Sony Corporation Critical packet partial encryption
US7765567B2 (en) 2002-01-02 2010-07-27 Sony Corporation Content replacement by PID mapping
US7992067B1 (en) 2001-11-09 2011-08-02 Identita Technologies International SRL Method of improving successful recognition of genuine acoustic authentication devices
US8645988B2 (en) 2002-12-13 2014-02-04 Sony Corporation Content personalization for digital content
US8667525B2 (en) 2002-12-13 2014-03-04 Sony Corporation Targeted advertisement selection from a digital stream
US8818896B2 (en) 2002-09-09 2014-08-26 Sony Corporation Selective encryption with coverage encryption
US7724907B2 (en) * 2002-11-05 2010-05-25 Sony Corporation Mechanism for protecting the transfer of digital content
US8572408B2 (en) 2002-11-05 2013-10-29 Sony Corporation Digital rights management of a digital device
US20040165586A1 (en) * 2003-02-24 2004-08-26 Read Christopher Jensen PID filters based network routing
US7853980B2 (en) 2003-10-31 2010-12-14 Sony Corporation Bi-directional indices for trick mode video-on-demand
US8616967B2 (en) 2004-02-25 2013-12-31 Cfph, Llc System and method for convenience gaming
US8092303B2 (en) 2004-02-25 2012-01-10 Cfph, Llc System and method for convenience gaming
US8041190B2 (en) 2004-12-15 2011-10-18 Sony Corporation System and method for the creation, synchronization and delivery of alternate content
US7895617B2 (en) 2004-12-15 2011-02-22 Sony Corporation Content substitution editor
US7534169B2 (en) 2005-07-08 2009-05-19 Cfph, Llc System and method for wireless gaming system with user profiles
US7637810B2 (en) 2005-08-09 2009-12-29 Cfph, Llc System and method for wireless gaming system with alerts
US8070604B2 (en) 2005-08-09 2011-12-06 Cfph, Llc System and method for providing wireless gaming as a service application
US20070060358A1 (en) 2005-08-10 2007-03-15 Amaitis Lee M System and method for wireless gaming with location determination
FR2895824B1 (en) * 2005-12-29 2009-02-27 Alain Clement Kotto Electronic multifunctional terminal acoustic recognition allowing instantaneous recharging a distance from a prepaid card.
US8185921B2 (en) 2006-02-28 2012-05-22 Sony Corporation Parental control of displayed content using closed captioning
US7644861B2 (en) 2006-04-18 2010-01-12 Bgc Partners, Inc. Systems and methods for providing access to wireless gaming devices
US8939359B2 (en) 2006-05-05 2015-01-27 Cfph, Llc Game access device with time varying signal
US7549576B2 (en) 2006-05-05 2009-06-23 Cfph, L.L.C. Systems and methods for providing access to wireless gaming devices
US8292741B2 (en) 2006-10-26 2012-10-23 Cfph, Llc Apparatus, processes and articles for facilitating mobile gaming
US9306952B2 (en) 2006-10-26 2016-04-05 Cfph, Llc System and method for wireless gaming with location determination
US8645709B2 (en) 2006-11-14 2014-02-04 Cfph, Llc Biometric access data encryption
US8510567B2 (en) 2006-11-14 2013-08-13 Cfph, Llc Conditional biometric access in a gaming environment
US9411944B2 (en) 2006-11-15 2016-08-09 Cfph, Llc Biometric access sensitivity
US8581721B2 (en) 2007-03-08 2013-11-12 Cfph, Llc Game access device with privileges
US9183693B2 (en) * 2007-03-08 2015-11-10 Cfph, Llc Game access device
US8319601B2 (en) 2007-03-14 2012-11-27 Cfph, Llc Game account access device
US8956231B2 (en) 2010-08-13 2015-02-17 Cfph, Llc Multi-process communication regarding gaming information
US8974302B2 (en) 2010-08-13 2015-03-10 Cfph, Llc Multi-process communication regarding gaming information
US9807076B2 (en) * 2016-02-15 2017-10-31 Sap Se Networked score communications system

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4339798A (en) * 1979-12-17 1982-07-13 Remote Dynamics Remote gaming system
US4928098A (en) 1984-03-30 1990-05-22 Siemens Aktiengesellschaft Method for code protection using an electronic key
US4998279A (en) 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
US4707592A (en) 1985-10-07 1987-11-17 Ware Paul N Personal universal identity card system for failsafe interactive financial transactions
WO1988003294A1 (en) 1986-10-31 1988-05-05 Call-It Co. Portable electronic information card and communications system and method
JPS63211843A (en) 1987-02-27 1988-09-02 Nec Corp Confidential communication system for facsimile communication system
US4994926C1 (en) 1988-09-22 2001-07-03 Audiofax Ip L L C Facsimile telecommunications system and method
FR2640835B1 (en) 1988-12-07 1994-06-24 France Etat An interactive server authentication
FR2653248B1 (en) 1989-10-13 1991-12-20 Gemolus Card International System of payment or transfer of information by electronic memory card wallet.
FR2660771B1 (en) * 1990-04-05 1992-07-24 Bernard Alain service payment system by phone.
DE69118748D1 (en) * 1990-05-29 1996-05-23 Microchip Tech Inc Integrated circuits, particularly for use in remote control systems
CA2085775A1 (en) 1992-12-18 1994-06-19 John Troli Dual tone multi frequency personal card
GB9301424D0 (en) * 1993-01-25 1993-03-17 Patni Chandra K Portable electronic fund transfer device
FR2700906B1 (en) 1993-01-28 1995-03-10 France Telecom System and method for transmitting secure faxes.
FR2701181A1 (en) * 1993-02-01 1994-08-05 Goreta Lucas Gaming by telephone, using an object incorporating a system of voice frequency synthesis (DTMF) and of encrypted code as entry and identification key
WO1994027397A1 (en) * 1993-05-07 1994-11-24 Elonex Technologies, Inc. Computer-to-telephone interface
DE4325459A1 (en) * 1993-07-29 1995-02-09 C2S Gmbh Cryptografische Siche Tone transmitter with an identification and authentication device
WO1995022183A1 (en) * 1994-02-10 1995-08-17 Elonex Technologies, Inc. Smart phone
FR2722930B1 (en) 1994-07-20 1996-10-04 Serero Moise Method of storage and obtain copies of documents and corresponding remote system
US5583933A (en) * 1994-08-05 1996-12-10 Mark; Andrew R. Method and apparatus for the secure communication of data
WO1996031971A1 (en) 1995-04-07 1996-10-10 Sheldon Howard System for accessing telephonic communications and for conducting telephonic transactions
FR2739235B1 (en) 1995-09-25 1998-06-19 Goreta Lucas acoustic signal processing system over telephone line associated to an acoustic signal transmission system
FR2753859B1 (en) * 1996-09-25 2001-09-28 Fintel Sa Method and system for secures the services of operators of telecommunication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See references of WO9813972A1 *

Also Published As

Publication number Publication date Type
FR2753861B1 (en) 1999-03-26 grant
US6904520B1 (en) 2005-06-07 grant
WO1998013972A1 (en) 1998-04-02 application
FR2753861A1 (en) 1998-03-27 application

Similar Documents

Publication Publication Date Title
US4885777A (en) Electronic transaction system
US7051209B1 (en) System and method for creation and use of strong passwords
US6956950B2 (en) Computer readable medium having a private key encryption program
US7703676B2 (en) Encrypting the output of a card reader in a card authentication system
US6038666A (en) Remote identity verification technique using a personal identification device
US7502467B2 (en) System and method for authentication seed distribution
US4601011A (en) User authorization verification apparatus for computer systems including a central device and a plurality of pocket sized remote units
US4326098A (en) High security system for electronic signature verification
US4797920A (en) Electronic funds transfer system with means for verifying a personal identification number without pre-established secret keys
US7437757B2 (en) Token for use in online electronic transactions
US6185682B1 (en) Authentication system
US4825050A (en) Security transaction system for financial data
US6073237A (en) Tamper resistant method and apparatus
US20050283444A1 (en) Transaction &amp; payment system securing remote authentication/validation of transactions from a transaction provider
US20050203966A1 (en) Opinion registering application for a universal pervasive transaction framework
US20030014315A1 (en) Method and a system for obtaining services using a cellular telecommunication system
US20020031225A1 (en) User selection and authentication process over secure and nonsecure channels
US6957185B1 (en) Method and apparatus for the secure identification of the owner of a portable device
US20020004800A1 (en) Electronic notary method and system
US7260552B2 (en) Secure remote electronic voting system and cryptographic protocols and computer programs employed
US20020176583A1 (en) Method and token for registering users of a public-key infrastructure and registration system
US6041410A (en) Personal identification fob
US20020056043A1 (en) Method and apparatus for securely transmitting and authenticating biometric data over a network
US4890323A (en) Data communication systems and methods
US5937068A (en) System and method for user authentication employing dynamic encryption variables

Legal Events

Date Code Title Description
AK Designated contracting states:

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE

17P Request for examination filed

Effective date: 19990423

AX Extension or validation of the european patent to

Free format text: SI PAYMENT 19990423

18D Deemed to be withdrawn

Effective date: 20020403

REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1029684

Country of ref document: HK