EP1008252A1 - Procede et systeme pour securiser les serveurs informatiques de jeux - Google Patents
Procede et systeme pour securiser les serveurs informatiques de jeuxInfo
- Publication number
- EP1008252A1 EP1008252A1 EP97942092A EP97942092A EP1008252A1 EP 1008252 A1 EP1008252 A1 EP 1008252A1 EP 97942092 A EP97942092 A EP 97942092A EP 97942092 A EP97942092 A EP 97942092A EP 1008252 A1 EP1008252 A1 EP 1008252A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- card
- player
- virtual casino
- signals
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F7/00—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
- G07F7/08—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
- G07F7/10—Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
- G07F7/1008—Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/34—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
- G06Q20/341—Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/409—Device specific authentication in transaction processing
- G06Q20/4097—Device specific authentication in transaction processing using mutual authentication between devices and transaction partners
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3234—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving additional secure or trusted devices, e.g. TPM, smartcard, USB or software token
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the field of the invention is that of remote service provision. More precisely, the invention relates to a method and a system allowing players of a virtual casino (or any service provider offering games: individual or played in a group), to access in a safe and rapid manner, by means of a connected microphone. to a communication network, to the various games that the virtual casino offers to its players.
- the problem is to prevent a malicious user from accessing the virtual casino without being authorized, without paying the corresponding rights or by claiming that he did not participate in the games of money debited to him by the casino. virtual.
- access keys generated by memory cards and to modify the telephone handsets so that they can read the memory cards.
- the said card emits short acoustic identification signals, of DTMF type, encrypted at least in part, varying with each operation, when it is actuated by the player, - the said acoustic identification signals are received by the microphone and transmitted by the communication network to the IT department of the virtual casino,
- the transmitted signals and the identification data of the player and the card held by the IT department are processed and compared electronically by the IT department of the virtual casino.
- the virtual casino can verify that the caller has an authentic card and not a computer decoy. He was also able to identify the card holder as being a person authorized to use the services he offers. So that in case of coincidence, the player is immediately put in communication with the voice server or the operator of the virtual casino.
- fraudsters no longer have the possibility of stealing identification data since they are automatically transmitted in encrypted form.
- recording, in any form whatsoever, acoustic signals will not be of any use to a fraudster to be identified by the virtual casino. Indeed, the acoustic identification signals vary with each operation. That is to say each time the card is pressed.
- said card Preferably said card:
- the method further comprises the following step: the player transmits, by means of a keyboard associated with the telephone handset and / or the card, a confidential code. After transmission to the virtual casino IT department, via the communication network, this confidential code is processed and compared to the player's personal confidential code held by the virtual casino IT department.
- the virtual casino can verify that the caller is the person authorized to enter into contact with its services. A stolen card cannot be used by the thief for lack of knowing the confidential code.
- the process further comprises the following step:
- the orders given by the player to the virtual casino are validated by the player by actuating the card so that it emits an encrypted acoustic validation signal, - the said validation signal is recorded by the computer service of the virtual casino.
- the method according to the invention may include the following additional step:
- the invention also relates to a system allowing the players of a virtual casino, to access in a safe and rapid manner, the various games that the virtual casino offers to its players.
- the characteristic of this system is to understand the means for implementing the method defined above and its variant embodiments. More specifically: -
- the system according to the invention comprises a card, in credit card format, personalized with specific identifiers for each card and each player, made available to them.
- the card includes means for transmitting brief acoustic identification signals. These transmission means are actuated by the player by means of an element accessible from the outside of the card.
- the card also comprises encryption means making it possible to encrypt at least in part and to vary the acoustic signals each time the card is actuated.
- the system according to the invention comprises means for receiving and transforming acoustic signals, in particular a microphone of a telephone handset, into electronic signals transmissible remotely by means of a communication network, -
- the system according to invention comprises computer means, dependent on the computer service of the virtual casino, connected to the communication network and located remotely from the means for receiving acoustic signals, said computer means comprising:
- the virtual casino can verify that the caller has an authentic card and not a computer decoy. He was also able to identify the card holder as being a person authorized to use the services he offers. So that in case of coincidence, the player is immediately put in communication with the voice server or the operator of the virtual casino. Furthermore, fraudsters no longer have the possibility of stealing identification data since they are automatically transmitted in encrypted form. In addition, the recording, in any form whatsoever, of acoustic signals will not be of any use to a fraudster to be identified by the computer services of the virtual casino. Indeed, the acoustic identification signals vary with each operation. That is to say each time the card is pressed.
- said card further comprises:
- said computer means further include:
- said means of processing and said means of comparing electronic signals and identification data contained in the database include means making it possible to recalculate the electronic signals according to the state
- the system further comprises second means for comparing a personal confidential code to the player, contained in the database, with a confidential code issued by the player.
- This code is issued by means of a keyboard associated with the telephone handset and / or the card and transmitted to the computer means of the virtual casino, by the communication network.
- the virtual casino can verify that the caller is indeed a person authorized to participate in the games. A stolen card cannot be used by the thief for lack of knowing the confidential code.
- the system according to the invention is such that:
- said card also emits, when activated by the player of the virtual casino, an encrypted acoustic signal for validation of the orders given by the player,
- Said computer means further comprise means for detecting and recording the validation signal. Thanks to this system, the player validated, by an electronic signature, the order he gave to the virtual casino.
- the computer means further comprising means for editing an acknowledgment of receipt of the orders given, intended to be addressed to the player.
- FIG. 1 showing a schematic perspective view of the system and the method according to the invention
- FIG. 2 presenting the map in the form of a block diagram
- the system and method according to the invention allow the player 11 to call, in a safe and rapid manner, in particular by means of a telephone handset 16 comprising a microphone 17, the services (the various games) 30 as the virtual casino 12 provides its players 11.
- the telephone handset 16, located remotely from the computer services 18 of the virtual casino, is connected to the computer services 18 via a communication network 15.
- the system includes a card 10, in credit card format , personalized with specific identifiers for each card and for each player 11. This card is made available to 1 1 players by the virtual casino.
- the card 10 comprises transmission means, in particular a loudspeaker 13 emitting brief acoustic identification signals 20, of the DTMF type.
- These signals are emitted when the emission means 13 and the organs which control them are actuated by the player by means of a button 14 accessible from the outside of the card (not visible in FIG. 1 because located on the other side of the card).
- These transmission means 13 are excited by a DTMF signal generator 99, controlled by a microprocessor 104 supplied by a battery 106 and controlled by a resonator 107.
- the microprocessor 104 contained in the card comprises encryption means 103 making it possible to encrypt, at least in part, the acoustic signals 20, comprising an encryption algorithm 108 and identifiers 109 specific for each card 10 and for each player 11, in particular the secret key 250 used by the encryption algorithm 108.
- the acoustic signals 20 are received by the microphone 17 of the telephone handset, against which the player attaches the card 10.
- the system also comprises means 19 for transmitting the acoustic signals 20, located in the telephone handset 16. These means transmission 19 transmit the acoustic signals remotely, after processing and conversion into electronic signals, via the communication network 15.
- the system also includes computer means 21, dependent on the computer services 18 of the virtual casino.
- These IT means are connected to the communication network 15 and located at a distance from the telephone handsets 16.
- These IT means 21 themselves include:
- a database 23 containing the references of the cards and the players and their identification data
- the microprocessor 104 and the encryption means 103 are designed so that the acoustic signal 20 varies with each operation. Indeed, to encrypt an identification code is to transform it into a series of information, incomprehensible to everyone, and that only the holder of the encryption key can decrypt. But that absolutely does not prevent the copy of the encrypted identification code, either during its acoustic transmission (tape recorder), or by hacking of the telephone line. This copy, used unduly by a fraudster, will be treated by the receiving system as having all the characteristics of the original, then interpreted in order to verify the identifiers of the card.
- One of the variants consists in using a so-called timestamping function (for example, as described in US Pat. No. 4,998,279).
- This time stamping function uses the "time” parameter which is constantly changing. The "copy” is thus late when it is issued.
- Such a solution requires synchronization between the transmission means 13 and the computer means 21. For this, both must have a "time base” and a “frequency standard”. These two time bases have their own precision and their own drift. As a result, they slowly out of sync, but gradually. To overcome this technical difficulty, a certain drift is tolerated between the time bases of the transmission means 13 and computer means 21. The greater this drift, the more the uncertainty increases on the "validity" of the information received. and more increases the risk of fraud.
- any illegal copy of the transmission of the encrypted signal, and fraudulently reused within 30 seconds, will be perceived as valid by the computer means analysis system 21.
- Another variant consists to use incremental lists (for example, as described in US Patent No. 4,928,098).
- the sending and receiving devices have the ordered list of successive encryption of the identification code or else have algorithms allowing them to be established as they arise.
- the computer means 21 are awaiting the encrypted result C (n). If they actually receive the message C (n), it validates the operation.
- the computer means 21 can receive a different message, in fact the user of the card can have actuated the transmission means 13 of the card several times, by play, by mistake, so that the card is in the situation to send the encrypted result C (n + p) when it is next used with the computer means 21. If the computer means 21 receive a different message, they search forward, in the list of successive encrypted results, if there is a message C (n + p) identical to that received. To resolve the ambiguity "is this an authentic message sent by the sender?" or "is this a fraudulent message?", the solution is to request or wait for the next transmission.
- the microprocessor 104 on board the card 10 includes an incremental counter 105.
- the incremental counter 105 is incremented by one or more units. Obviously, like a ratchet wheel, it cannot go back, it cannot that advance with each use.
- the state C (p, n) 242 of the counter 105 enters into the calculation of the encrypted message 244 transmitted by the transmission means 13.
- the coded part S (p, n) 241 is calculated by the algorithm 108 (the equivalent of which 247 is stored in the computer means 21 by means of the secret key 250 specific to each card and of the state C (p, n) 242 of the counter 105.
- the card 10 transmits , in addition to the identification number I (p) 240 of the card and the encrypted identification code S (p, n) 241, the state C (p, n) 242 of its incremental counter 105 on each transmission.
- the computer means 21 store 230, in the data base 23, the state C (p, n) 242 of the incremental counter 105 during the last validated operation.
- the comparison means 25 of the computer means 21 can compare 245 the information received relating to the state C (p, n) 242 of the counter 105, with the previous information received C (p, m) 2 46 and kept in memory 230, 23. a) - If state C (p, n) 242 of counter 105 (fig. 2) expressed in message 244 is strictly greater (n> m) than that C (p, m) 246 previously received, then message 244 is accepted and analysis continues.
- the encrypted code S '(p, n) 248 thus calculated is compared 249 to that actually received S (p, n) 241, by comparison means 25.
- This method and these means therefore make it possible to validate or invalidate the message 244, without it being necessary for the user of the card to actuate it several times, as is the case in the variant embodiment described above.
- the existence within the card 10 of an incremental counter 105 makes it possible, at no additional cost, to fix, at the time of the individual programming of the card, the number maximum number of times the card can be used. Once this maximum is reached, the latter no longer sends a coherent message and is therefore refused by the computer means 21.
- the frame 244 transmitted contains, for a given card (p),
- variable part S (p, n) 241 apparently random (the result of an encryption algorithm 108 on the secret key 250 specific to this card (p)).
- - is always different from one card to another, - is, for a given card, always different on each issue.
- the computer means 21 allow, for a given card (p), to:
- the computer means 21 also comprise second comparison means 26. These comparison means make it possible to compare a personal confidential code with the player
- This code is transmitted by means of a keyboard 27 associated with the telephone handset 16 and / or the card 10 and transmitted to the computer means 21 of the virtual casino, by the communication network. 15.
- the virtual casino has the assurance that the caller 11 is indeed the person authorized to enter into contact with his services. A stolen card cannot be used by the thief for lack of knowing the confidential code.
- the system according to the invention is such that:
- the card 10 emits, when it is actuated 14 by the player, an encrypted acoustic signal for validation of the orders given by the player 11, - the said computer means 21 comprise means of detection 21a and recording 21b of the signal of confirmation.
- the computer means 21 further comprise means 28 for editing an acknowledgment 29 of the orders given. This acknowledgment of receipt is addressed to player 11.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Telephonic Communication Services (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR9611916 | 1996-09-25 | ||
FR9611916A FR2753861B1 (fr) | 1996-09-25 | 1996-09-25 | Procede et systeme pour securiser les serveurs informatiques de jeux |
PCT/FR1997/001687 WO1998013972A1 (fr) | 1996-09-25 | 1997-09-25 | Procede et systeme pour securiser les serveurs informatiques de jeux |
Publications (1)
Publication Number | Publication Date |
---|---|
EP1008252A1 true EP1008252A1 (fr) | 2000-06-14 |
Family
ID=9496212
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP97942092A Withdrawn EP1008252A1 (fr) | 1996-09-25 | 1997-09-25 | Procede et systeme pour securiser les serveurs informatiques de jeux |
Country Status (5)
Country | Link |
---|---|
US (1) | US6904520B1 (fr) |
EP (1) | EP1008252A1 (fr) |
AU (1) | AU4389397A (fr) |
FR (1) | FR2753861B1 (fr) |
WO (1) | WO1998013972A1 (fr) |
Families Citing this family (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7730300B2 (en) | 1999-03-30 | 2010-06-01 | Sony Corporation | Method and apparatus for protecting the transfer of data |
US6697489B1 (en) | 1999-03-30 | 2004-02-24 | Sony Corporation | Method and apparatus for securing control words |
US7565546B2 (en) * | 1999-03-30 | 2009-07-21 | Sony Corporation | System, method and apparatus for secure digital content transmission |
DE19925509A1 (de) | 1999-06-04 | 2000-12-07 | Deutsche Telekom Ag | Akustisch-mechanisches Verifikations-Sendegerät |
US7039614B1 (en) | 1999-11-09 | 2006-05-02 | Sony Corporation | Method for simulcrypting scrambled data to a plurality of conditional access devices |
US7013393B1 (en) | 1999-12-21 | 2006-03-14 | Pierre Stevens | Universal intelligent card for secure access to system functions |
US7151831B2 (en) | 2001-06-06 | 2006-12-19 | Sony Corporation | Partial encryption and PID mapping |
US7747853B2 (en) | 2001-06-06 | 2010-06-29 | Sony Corporation | IP delivery of secure digital content |
US7895616B2 (en) | 2001-06-06 | 2011-02-22 | Sony Corporation | Reconstitution of program streams split across multiple packet identifiers |
US7992067B1 (en) | 2001-11-09 | 2011-08-02 | Identita Technologies International SRL | Method of improving successful recognition of genuine acoustic authentication devices |
US7292690B2 (en) * | 2002-01-02 | 2007-11-06 | Sony Corporation | Video scene change detection |
US7823174B2 (en) | 2002-01-02 | 2010-10-26 | Sony Corporation | Macro-block based content replacement by PID mapping |
US7215770B2 (en) * | 2002-01-02 | 2007-05-08 | Sony Corporation | System and method for partially encrypted multimedia stream |
US7292691B2 (en) * | 2002-01-02 | 2007-11-06 | Sony Corporation | Progressive video refresh slice detection |
US7765567B2 (en) | 2002-01-02 | 2010-07-27 | Sony Corporation | Content replacement by PID mapping |
US8818896B2 (en) | 2002-09-09 | 2014-08-26 | Sony Corporation | Selective encryption with coverage encryption |
US8572408B2 (en) | 2002-11-05 | 2013-10-29 | Sony Corporation | Digital rights management of a digital device |
US7724907B2 (en) * | 2002-11-05 | 2010-05-25 | Sony Corporation | Mechanism for protecting the transfer of digital content |
US8667525B2 (en) | 2002-12-13 | 2014-03-04 | Sony Corporation | Targeted advertisement selection from a digital stream |
US8645988B2 (en) | 2002-12-13 | 2014-02-04 | Sony Corporation | Content personalization for digital content |
US20040165586A1 (en) * | 2003-02-24 | 2004-08-26 | Read Christopher Jensen | PID filters based network routing |
US7853980B2 (en) | 2003-10-31 | 2010-12-14 | Sony Corporation | Bi-directional indices for trick mode video-on-demand |
US7637810B2 (en) | 2005-08-09 | 2009-12-29 | Cfph, Llc | System and method for wireless gaming system with alerts |
US8616967B2 (en) | 2004-02-25 | 2013-12-31 | Cfph, Llc | System and method for convenience gaming |
US8092303B2 (en) | 2004-02-25 | 2012-01-10 | Cfph, Llc | System and method for convenience gaming |
US7534169B2 (en) | 2005-07-08 | 2009-05-19 | Cfph, Llc | System and method for wireless gaming system with user profiles |
US20070060358A1 (en) | 2005-08-10 | 2007-03-15 | Amaitis Lee M | System and method for wireless gaming with location determination |
US8041190B2 (en) | 2004-12-15 | 2011-10-18 | Sony Corporation | System and method for the creation, synchronization and delivery of alternate content |
US7895617B2 (en) | 2004-12-15 | 2011-02-22 | Sony Corporation | Content substitution editor |
US10510214B2 (en) | 2005-07-08 | 2019-12-17 | Cfph, Llc | System and method for peer-to-peer wireless gaming |
US8070604B2 (en) | 2005-08-09 | 2011-12-06 | Cfph, Llc | System and method for providing wireless gaming as a service application |
FR2895824B1 (fr) * | 2005-12-29 | 2009-02-27 | Alain Clement Kotto | Terminal multifonctionnel electronique a reconnaissance accoustique permettant le rechargement instantane a distance d'une carte prepayee. |
US8185921B2 (en) | 2006-02-28 | 2012-05-22 | Sony Corporation | Parental control of displayed content using closed captioning |
US7549576B2 (en) | 2006-05-05 | 2009-06-23 | Cfph, L.L.C. | Systems and methods for providing access to wireless gaming devices |
US7644861B2 (en) | 2006-04-18 | 2010-01-12 | Bgc Partners, Inc. | Systems and methods for providing access to wireless gaming devices |
US8939359B2 (en) | 2006-05-05 | 2015-01-27 | Cfph, Llc | Game access device with time varying signal |
US9306952B2 (en) | 2006-10-26 | 2016-04-05 | Cfph, Llc | System and method for wireless gaming with location determination |
US8292741B2 (en) | 2006-10-26 | 2012-10-23 | Cfph, Llc | Apparatus, processes and articles for facilitating mobile gaming |
US8645709B2 (en) | 2006-11-14 | 2014-02-04 | Cfph, Llc | Biometric access data encryption |
US8510567B2 (en) | 2006-11-14 | 2013-08-13 | Cfph, Llc | Conditional biometric access in a gaming environment |
US9411944B2 (en) | 2006-11-15 | 2016-08-09 | Cfph, Llc | Biometric access sensitivity |
US8319601B2 (en) | 2007-03-14 | 2012-11-27 | Cfph, Llc | Game account access device |
US8581721B2 (en) | 2007-03-08 | 2013-11-12 | Cfph, Llc | Game access device with privileges |
US9183693B2 (en) | 2007-03-08 | 2015-11-10 | Cfph, Llc | Game access device |
US8974302B2 (en) | 2010-08-13 | 2015-03-10 | Cfph, Llc | Multi-process communication regarding gaming information |
US8956231B2 (en) | 2010-08-13 | 2015-02-17 | Cfph, Llc | Multi-process communication regarding gaming information |
US9807076B2 (en) * | 2016-02-15 | 2017-10-31 | Sap Se | Networked score communications system |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4339798A (en) * | 1979-12-17 | 1982-07-13 | Remote Dynamics | Remote gaming system |
BR8103249A (pt) | 1981-05-21 | 1982-12-28 | Schause S A Ind Mecanica & Ele | Cartao sonoro para codificacao numerica atraves de linha telefonica |
US4928098A (en) | 1984-03-30 | 1990-05-22 | Siemens Aktiengesellschaft | Method for code protection using an electronic key |
US4998279A (en) | 1984-11-30 | 1991-03-05 | Weiss Kenneth P | Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics |
US4707592A (en) | 1985-10-07 | 1987-11-17 | Ware Paul N | Personal universal identity card system for failsafe interactive financial transactions |
EP0289590A4 (fr) | 1986-10-31 | 1989-08-22 | Call It Co | Carte de poche a donnees electroniques et systeme et procede de transmissions. |
JPS63211843A (ja) | 1987-02-27 | 1988-09-02 | Nec Corp | フアクシミリ通信システムの親展通信方式 |
US4994926C1 (en) | 1988-09-22 | 2001-07-03 | Audiofax Ip L L C | Facsimile telecommunications system and method |
FR2640835B1 (fr) | 1988-12-07 | 1994-06-24 | France Etat | Dispositif d'authentification pour serveur interactif |
FR2653248B1 (fr) | 1989-10-13 | 1991-12-20 | Gemolus Card International | Systeme de paiement ou de transfert d'information par carte a memoire electronique porte monnaie. |
FR2660771B1 (fr) * | 1990-04-05 | 1992-07-24 | Bernard Alain | Systeme de paiement de services par telephone. |
ATE136975T1 (de) | 1990-05-29 | 1996-05-15 | Microchip Tech Inc | Integrierte schaltungen, insbesondere zum gebrauch in fernsteuersystemen |
TW200624B (en) * | 1992-04-06 | 1993-02-21 | American Telephone & Telegraph | A universal authentication device for use over telephone lines |
CA2085775A1 (fr) | 1992-12-18 | 1994-06-19 | John Troli | Carte personnelle multifrequence a deux tonalites |
GB2274523A (en) * | 1993-01-25 | 1994-07-27 | Chandra Kamar Patni | Portable electronic fund transfer device |
FR2700906B1 (fr) | 1993-01-28 | 1995-03-10 | France Telecom | Système et procédé de transmission de télécopies sécurisées. |
FR2701181A1 (fr) * | 1993-02-01 | 1994-08-05 | Goreta Lucas | Jeu par téléphone utilisant un objet intégrant un système de synthèse de fréquence vocale (DTMF) et de code crypté comme clef d'entrée et d'identification. |
CN1124079A (zh) * | 1993-05-07 | 1996-06-05 | 艾鲁奈克斯技术公司 | 计算机至电话机接口 |
DE4325459A1 (de) * | 1993-07-29 | 1995-02-09 | C2S Gmbh Cryptografische Siche | Tongeber mit Identifikations- und Authentisierungs-Einrichtung |
EP0744087A4 (fr) * | 1994-02-10 | 1999-04-14 | Elonex Technologies Inc | Telephone intelligent |
FR2722930B1 (fr) | 1994-07-20 | 1996-10-04 | Serero Moise | Procede de stockage et d'obtention de copies de documents a distance et systeme correspondant |
US5583933A (en) * | 1994-08-05 | 1996-12-10 | Mark; Andrew R. | Method and apparatus for the secure communication of data |
EP0872109A4 (fr) | 1995-04-07 | 1998-12-23 | Sheldon Howard | Systemes d'acces a des communications telephoniques et de conduite de transactions telephoniques |
IL114521A0 (en) | 1995-07-10 | 1995-11-27 | Luzzatto Marco | A method and device for determining authorization of credit card users by a telephone line |
FR2739235B1 (fr) | 1995-09-25 | 1998-06-19 | Goreta Lucas | Systeme de traitement de signal acoustique sur ligne telephonique associe a un systeme d'emission de signaux acoustiques |
FR2753859B1 (fr) * | 1996-09-25 | 2001-09-28 | Fintel Sa | Procede et systeme pour securiser les prestations de service des operateurs de telecommunication |
-
1996
- 1996-09-25 FR FR9611916A patent/FR2753861B1/fr not_active Expired - Fee Related
-
1997
- 1997-09-25 EP EP97942092A patent/EP1008252A1/fr not_active Withdrawn
- 1997-09-25 US US09/269,349 patent/US6904520B1/en not_active Expired - Lifetime
- 1997-09-25 AU AU43893/97A patent/AU4389397A/en not_active Abandoned
- 1997-09-25 WO PCT/FR1997/001687 patent/WO1998013972A1/fr not_active Application Discontinuation
Non-Patent Citations (1)
Title |
---|
See references of WO9813972A1 * |
Also Published As
Publication number | Publication date |
---|---|
US6904520B1 (en) | 2005-06-07 |
FR2753861B1 (fr) | 1999-03-26 |
AU4389397A (en) | 1998-04-17 |
FR2753861A1 (fr) | 1998-03-27 |
WO1998013972A1 (fr) | 1998-04-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO1998013972A1 (fr) | Procede et systeme pour securiser les serveurs informatiques de jeux | |
EP1008257B1 (fr) | Procede et systeme pour securiser les centres de gestion d'appels telephoniques | |
EP0950303B1 (fr) | Procede et systeme pour securiser les prestations de service a distance des organismes financiers | |
EP0950307B1 (fr) | Procede et systeme pour securiser les prestations de service d'operateurs de telecommunication | |
EP0077238B1 (fr) | Procédé et dispositif pour authentifier la signature d'un message signé | |
EP0638344B1 (fr) | Système sécurisé de participation à des jeux interactifs avec vérification de la chronologie d'évènements | |
EP0426541B1 (fr) | Procédé de protection contre l'utilisation frauduleuse de cartes à microprocesseur, et dispositif de mise en oeuvre | |
WO1995030975A1 (fr) | Systeme pour transactions securisees par telephone | |
EP1008256B1 (fr) | Procede et systeme pour securiser les prestations de service diffusees sur un reseau informatique du type internet | |
EP1412926B1 (fr) | Procede de gestion d'achat de contenus numeriques diffuses et moyens de telechargement de tels contenus | |
EP1549011A1 (fr) | Procédé et système de communication entre un terminal et au moins un équipment communicant | |
EP0800300A1 (fr) | Vérification d'intégrité des réquêtes dans un réseau client serveur | |
WO2002067534A1 (fr) | Systeme de paiement electronique a distance | |
EP1368716B1 (fr) | Methode anti-clonage | |
EP1216461A1 (fr) | Procede et systeme d'identification vocale sure et rapide d'un objet nomade emettant un signal acoustique | |
EP2257936A1 (fr) | Procede et systeme de distribution de billets de banque a partir d'un distributeur automatique de billets | |
EP1449092A2 (fr) | Procede de securisation d un acces a une ressource numerique | |
FR2832829A1 (fr) | Procede, systeme et dispositif permettant d'authentifier des donnees transmises et/ou recues par un utilisateur | |
WO1998021880A1 (fr) | Procede et systeme pour securiser la transmission des telecopies au moyen d'une carte d'identification | |
EP2016700A1 (fr) | Procede d'activation d'un terminal | |
EP1802026A2 (fr) | Procédé de déblocage d'une ressource par un dispositif sans contact | |
FR2814374A1 (fr) | Systeme de jeu, notamment pour jeu de hasard, comportant un serveur vocal accessible a travers un reseau de transmission d'informations tel qu'un reseau telephonique | |
WO2005031665A1 (fr) | Systeme de machines à sous securise | |
FR2865060A1 (fr) | Procede pour modifier de maniere sure le contenu de la memoire non volatile d'une carte a microcircuit a l'aide d'un terminal portable et d'un serveur distant. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
17P | Request for examination filed |
Effective date: 19990423 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LI LU MC NL PT SE |
|
AX | Request for extension of the european patent |
Free format text: SI PAYMENT 19990423 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20020403 |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: WD Ref document number: 1029684 Country of ref document: HK |