WO2005021118A1 - Systeme permettant d'executer un jeu de hasard au moyen d'un reseau de communication - Google Patents
Systeme permettant d'executer un jeu de hasard au moyen d'un reseau de communication Download PDFInfo
- Publication number
- WO2005021118A1 WO2005021118A1 PCT/ES2003/000439 ES0300439W WO2005021118A1 WO 2005021118 A1 WO2005021118 A1 WO 2005021118A1 ES 0300439 W ES0300439 W ES 0300439W WO 2005021118 A1 WO2005021118 A1 WO 2005021118A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- agent
- game
- player
- players
- impartial
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3202—Hardware aspects of a gaming system, e.g. components, construction, architecture thereof
- G07F17/3223—Architectural aspects of a gaming system, e.g. internal configuration, master/slave, wireless communication
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3225—Data transfer within a gaming system, e.g. data sent between gaming machines and users
- G07F17/3232—Data transfer within a gaming system, e.g. data sent between gaming machines and users wherein the operator is informed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3241—Security aspects of a gaming system, e.g. detecting cheating, device integrity, surveillance
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/326—Game play aspects of gaming systems
- G07F17/3272—Games involving multiple players
- G07F17/3276—Games involving multiple players wherein the players compete, e.g. tournament
Definitions
- the present invention describes a system for the execution of games of chance through a communication network, so that the activity carried out in said games, that is to say the surrounding information or data, can be recorded securely through the use of operations cryptographic
- the electronic game system of the invention includes the elements necessary to perform an audit of the actions of the game that allows to verify its honesty.
- the exposition of this invention contains material that is subject to copyright protection. The holders of said Copyright have no objection regarding the reproduction of the description of this patent application document as it appears in its published or final version in the Patent Offices by third parties, but all rights are reserved as regards Copyright in other aspects derived from said document.
- Computer networks and especially the worldwide interconnected network system we know as the Internet, have allowed certain common activities, such as buying, searching for information, or playing, to be done remotely.
- the term game as will be used in this description encompasses, either from the usual games in casinos, with roulettes, dice, cards, caster wheels or other less popular games of chance, played with a finite number of elements.
- Playing remotely or Online Game has a number of advantages for players, since it provides them with independence of space (they do not have to physically move to the casino), and of time (the availability of schedules of an Online Casino, that is, that operates on the Internet, can be mostly continuous, and in any case much larger than that of a traditional casino). These advantages, among others, have made the remote game experience rapid growth.
- the remote game currently has a series of security, honesty and audit problems that must be resolved.
- access to minors, compulsive players and dishonest players is prohibited.
- the casino has a list of dishonest and compulsive players.
- all players are authenticated at the casino entrance. This authentication basically consists of the verification of an official documentation such as the national identity document, the driver's license, or the passport. If the player is of legal age and is not in any of the mentioned lists, he may Access the casino The authentication is valid since the process to obtain the mentioned documentation is rigorous, and the documentation is difficult to falsify.
- an Online Casino players before accessing the casino register through the network.
- a second group with representative examples being inventions US 6,106,396, US 6,117,011, US 6,264,560 and W09811686, contemplate only network-level security. These inventions encrypt only the communications between the parties of the game to ensure their privacy, without providing any game protocol to ensure that the game is honest. Nor do they define any method to save the information that is generated during the game, so that once it is finished, there is unalterable evidence of its execution. This does not guarantee an honest audit in case of conflict, since the evidence can be altered. Inventions US 6,264,557 and US 6,165,072, contemplate the security of communications and the honesty of some of the games.
- the first invention relates to a gaming machine that allows gaming inside the casino without the need for an intermediary, also commenting on the possibility that the machines can be connected remotely through a communication network such as the Internet. The players rent the machines and all the prizes are distributed among the participants in the game.
- the second invention describes an Online Casino architecture that allows the game with a central figure that distributes the messages without intervening in the game. This system encrypts the communications between the parts of the game to ensure your privacy. It does not provide any game protocol to ensure that the game is honest. Nor does it define any method to save the information generated during the game, so that there is unalterable evidence of the honest execution of the game. If the system operator conspires with some player to benefit him, the rest of the players will be defenseless.
- the present invention relates to a gaming system, preferably remote, which according to the arrangement of its elements allows the execution of a game with or without intermediary. In the game organization with intermediary, he actively participates in the game.
- the intermediary would typically be an Online Casino.
- players play directly with each other, according to a P2P model.
- honesty, audit, and security of the game are guaranteed through the use of an Activity Record 115 that stores the actions that occur in that game, linked to each other in a secure manner and by cryptographic processes and protocols in the phases of that game.
- the present invention describes a system for the execution of a game of chance through a communication network that stores the actions developed in said game and guarantees to some players of said game that the execution thereof is honest and impartial. Allowing at least one Audit Authority to verify that said actions in said game have been honest and have not been manipulated.
- the system comprises an Activity Record 115 that stores said actions in said game, linked together in a secure manner, and a set of programs and / or execution platforms that constitute a Player Agent 101 by means of which at least one of said Players participate in that game.
- the system additionally recommended comprises a set of programs and / or execution platforms that constitute an Access Control Agent 105 that allows an Access Control Authority to authenticate said players by means of credentials. .
- the recommended system comprises a set of programs and / or execution platforms that constitute a Certification Agent 103 through which a Certification Authority creates and makes said identification credentials accessible to at least one of said players.
- the recommended system additionally includes a set of programs and / or execution platforms that constitute a Virtual Game Table 113, intended to centralize and distribute said actions in said game to said players that have been authenticated by said Control Agent of Access 105.
- the invention additionally provides a set of programs and / or execution platforms that constitute an Audit Agent 111 with which said Audit Authority verifies the honesty of the game by reviewing said actions occurring in said game that are included in said Activity Record 115.
- the recommended system further comprises a set of programs and / or execution platforms that constitute a Bank Agent 123, by means of the which a Trust Entity, such as a Casino Banking or a Financial Entity, creates and makes available to at least one of said players a proof of the credit that said at least one of said players has to participate in said game.
- a Trust Entity such as a Casino Banking or a Financial Entity
- the proposed invention further comprises a set of programs and / or execution platforms that constitute an Impartial Agent 107.
- said Agent Impartial 107 makes said Player Agent 101 accessible to said players.
- said Impartial Agent 107 generates game events such as a roulette position, a card from a deck, or a face of a dice.
- the recommended system additionally comprises a set of programs and / or execution platforms that constitute a Croupier Agent 109, destined to perform the actions corresponding to a Croupier in a Casino type game.
- a characteristic aspect of the invention consists in the use of a data chain by means of which said actions are securely linked to each other, where each link of said data chain is formed by a first part describing one of said actions and a second part which is a summary calculated with a cryptographic summary function of said first part of said link and the second part of at least one previous link of said data chain.
- the authenticity of said second part of each link is guaranteed by a digital signature with the private component of at least one pair of asymmetric keys owned by the author of said link, which can be said Player Agent 101, said Agent
- Access Control 105 a Certification Agent 103, an Audit Agent 111, a
- Figure 1 shows the elements that make up the system for the impartial execution of a game of chance through a communication network.
- Figure 2 shows an example of how the elements of said system of the present invention interact with each other through a Communication Network 201.
- Figure 3 the phases that a player performs in the execution of the game can be seen.
- Figure 4 shows the phases of the development of the game.
- the essence of gambling is the random obtaining of at least one event (the position of a roulette, a card of the deck, a face of a dice, etc.), the outcome of the game being determined based on At least this event.
- the events are obtained through a roulette, a deck of cards, or some dice for example.
- the honesty of the game depends very directly on these elements, and the conditions of its manipulation. For this reason the organisms that regulate, the games in which events of chance take part dictate some specifications or a regulation that must fulfill the elements used in the game.
- the review and certification that these elements comply with the regulation is usually carried out by an audit firm. The players are protected against possible manipulations thanks to this regulation and certification of the elements of the game.
- a game hand is the set of actions that players and the Croupier perform in a card game to obtain the result of the game. This result, and actions, depends on each particular game.
- a roll is the set of actions that players and the Croupier perform to obtain the result of the game, which is based on obtaining a single random value.
- This group includes roulette, dice and coin machines. In the case of roulette the player is the winner if he had previously bet on the result. In the dice or in a coin machine the player wins if the result he obtains corresponds to a pre-established prize.
- a game is a set of playing hands, or rolls, made by the player at a Game Table. A player's game starts when he enters the Game Table, and ends when he leaves.
- a player's credit is the maximum amount of money he can bet on a Game Table.
- a player to be able to play at a table must have a minimum amount of credit.
- Each player, independently, must be able to verify that any other player can cover his bets with his credit.
- J The ith player.
- • m ⁇ ⁇ m 2 Concatenation of messages i and 2 .
- Player Agent 101 is this set of programs that can be an application with secure remote connection capability, or a Plug-In in a browser available to the player.
- the execution platform as its name indicates allows the execution of Player Agent 101, and has the ability to connect to a communication network.
- the execution platform can be a personal computer, a personal digital assistant, or a mobile telephone terminal, for example.
- the Player Agent 101 must be audited and certified by an Audit Authority of recognized prestige.
- each player has a pair of asymmetric keys indicated as (PJ, SJ). Player Agent 101 has access to this pair of player keys with his or her prior consent.
- Certification Agent 103 has access to this pair of player keys with the prior consent of said Certification Authority.
- the functions of access control to the remote game system are performed by a set of programs and / or execution platforms that are called the Control Agent of Access 105.
- the Access Control Agent 105 validates credentials issued by the Certification Authority.
- the Access Control Authority has a pair of asymmetric keys denoted as (PE, SE), and the Access Control Agent 105 uses said key pair 5 with the prior consent of said Access Control Authority .
- the present invention considers the possibility of an Impartial Entity to have a set of programs and / or execution platforms so that it can participate more actively in the remote game, for example by generating the game events or making the Player Agent accessible 101 to the players.
- this set will be called Impartial Agent 107
- the associated execution platform allows the execution of said Impartial Agent 107.
- Such an execution platform can be a computer, or a secure tamper-proof module capable of executing applications inside it, such as Hardware Secure Module (HSM) nShield from manufacturer nCipher
- HSM Hardware Secure Module
- the Impartial Entity has a pair of asymmetric keys that will be denoted as (P 7 , Yes), which is used by the Impartial Agent 107 with the prior consent of the Impartial Entity.
- Crupier is the one who represents the Casino at the Game Table, and controls game development. In games where players play with each other, Poker would be an example, the Crupier is one more player who plays on behalf of the casino. In a remote game system, the functions of the Crupier can be performed automatically by means of communication and / or associated programs. Hereafter this
- Croupier Agent 109 has a pair of asymmetric keys denoted as (Pe, S C ).
- the Impartial Agent 107 executes a cryptographic protocol for the impartial generation of game events, together with the Croupier Agent
- Impartial Agent 107 impartially generates game events.
- Crupier Agent 109 executes a cryptographic protocol for the impartial generation of game events, together with the Agent of the Player 101.
- pseudo-random values are obtained. Obtaining any random value during the game process is done through routines generating pseudo-random numbers (PRNG). These routines use an initial value called seed to generate a sequence of unpredictable values.
- PRNG pseudo-random numbers
- all sources of random numbers of the present invention will use sources of natural noise in obtaining the seeds. Examples of such sources may be the cadence of mouse movements or keystrokes caused by players, or the use of a device specially designed for this purpose.
- This audit company verifies that the elements comply with the legislation. Once the audit has been carried out, and if it is satisfactory, the elements are certified. Before starting the game the participants can verify the certification of the elements of the game, so that they are certain that these elements have not been altered after their certification, and do not tend to favor any part in particular. In a remote gaming system it is also necessary to perform similar audits, that is, to verify the certification of its elements, periodic and random tests of the proper functioning of the system, and to review the traces that collect the actions of the game. To perform these tasks, an Audit Authority has some computing means and / or associated programs that are called the Audit Agent 111.
- the Audit Authority through the Audit Agent 111 verifies and certifies the elements of the gaming system, and check those game actions that have been stored in a Database (BD) of the game system.
- the game elements are a set of programs and / or execution platforms.
- the certification of these elements depends on whether they are computer programs or execution platforms.
- the certification of a computer program consists of a digital signature of the computer program with a pair of asymmetric keys owned by the Audit Authority denoted as (PA, SA) -
- the public PA component of this pair of keys can be certified by an Authority of Certification of recognized prestige, such as Verisign [www.verisign.com, 2003]. This public component is available to any interested party in the validation of the certificate of the computer program.
- the execution platforms are certified through a seal that ensures that they have not been altered once audited.
- the Game Table has already indicated in a traditional casino, it is the place where players and the Croupier meet to develop the game.
- the Virtual Game Table 113 is called a set of programs and / or execution platforms that centralize, and distributes the messages generated by the players during a game. For example, when a player wants a card, the Player Agent 101 makes the request to the Virtual Game Table 113 and it makes it accessible that said request has been made to the rest of the Agents of the Players 101.
- Game 113 is called Private Game Virtual Table 113, and the second alternative
- Virtual Game Table 113 shared. Additionally all the actions that are sent to the Virtual Game Table 113 are stored in a BD. The review of these actions allows a subsequent audit of the game.
- Conventional Casinos can give rise to situations that raise questions for casino participants. To solve them usually the Casinos record with a video system all the actions that occur in the enclosure. In a remote game system the actions of the participants, that is, the messages that are sent during the game, must be recorded for the same reason.
- Known remote game systems store some of the game actions in a BD, so that this information can be used in an audit of the remote game system. However, control of the BD by a BD administrator or an external attacker could modify the data.
- the Auditor must be certain that the data comes from a registered player, that they have not been modified, and what the sequence of the actions is. If the data of the BD are altered they must show an inconsistency that demonstrates the modification in a certain way.
- a characteristic aspect of the present invention resides in the fact that the actions of the players in a game are stored in an Activity Log 115, linked together in a secure manner. More specifically, such actions are represented by Player Agent 101 as a link in a CDNE chain.
- a detailed description of the construction and properties of the CDNE chains is found in the international application PCT / ES02 / 00485, of the same applicant. For greater clarity of this exposure, these properties are briefly described below.
- a chain link can only be added at the end of the CDNE chain. If added. at any other point it is necessary to redo the entire chain until the end, a task that is not computationally possible. m If a link in the chain is removed, the chain will present a jump that can be detected upon verification. • If an entry is modified the chain is inconsistent, and the modification is verifying the construction process. m Tickets let you know the exact moment, and the order in which they occurred. • The entries in the registry incorporate information about its author, and any third party can verify this information. Additionally, the author of the entry cannot repudiate it because the information could only be calculated by it. • The calculation of the pieces of the chain is done in parallel when the game protocol allows it. This measure improves its efficiency while maintaining the previous properties.
- the data field Dk typically describes an action performed by the player, although it can also be a step in a game protocol performed by Player Agent 101 with other Agents.
- the chained summary of link X k is constructed in three phases: First, the chained summary of the previous link X k - ⁇ is concatenated with the data of the current message Dk.
- the summary of the concatenated set is calculated, and finally said summary is digitally signed with the private key of the link author:
- Each player will normally have an execution platform with a different computing power. If the construction is sequential, the total time for the execution of a step of the game will be the sum of all the individual times. In the case of a parallel execution, the time will be equal to the time of the slowest platform.
- the logic of the Casino-type games and the CDNE chain allow the links to be built in parallel.
- the expression 3 shows the parallel calculation of some links using the chained summary of the previous link X k -i-
- Bank Agent 123 (described below) accesses the Activity Log
- the CDNE chain data field indicates whether the operation is an income or a refund, and links the movement with the reason that originated it.
- the concepts related to the credit increase are the following: «Credit purchase: The data field includes the transaction number of the entry made by the player. "Collection of winnings of a game: The data field includes the Virtual Game Table number 113 corresponding to the game in which the player has won, and also incorporates a signed summary of the game. ⁇ Prize: The player is graceful with an amount of money, and the data field includes the reference of the prize awarded. If the operation is a refund the concept collects the following data:
- the data field includes the request for refund of the user, the payment method, and the data related to this payment (entity and number of the player's current account, for example) • Fine: In the event that a player performs an operation that is not allowed, a fine can be imposed with a direct charge to his credit.
- Player Agent 101 If Player Agent 101 receives a link that is poorly constructed and does not belong to the chain of the game, it generates an incident. This issue is a link in another chain
- CDNE that is stored in a database that is called Incident Registry 119.
- the evidence is attached to show that an anomalous event has really occurred.
- Basic operations such as the entry and exit of the players of the remote game system, the creation or closing of the Virtual Game Tables 113 are also links of another CDNE chain created by the Access Control Agent 105.
- the BD that stores this chain CDNE receives the name of Access Control Registry 121.
- Players to bet inside a traditional casino use chips issued by the casino, which are only valid inside.
- Casino Banking is in charge of exchanging the player's legal money for chips, and vice versa.
- the functions of the Bank are performed by a set of programs and / or execution platforms that are called the Agent of Bank 123.
- the Agent of Bank 123 is managed by a Trusted Entity, such as the Banking of an Online Casino, or a Financial Entity.
- Bank Agent 123 provides proof of the credit available to the player, which is made accessible to other players so that they can know the credit of the new player, and is also stored in Activity Record 115. Once a player leaves a Virtual Game Table 113 the Bank Agent 123 updates the credit of this player by reviewing Activity Record 115.
- Activity Record 115 reflects the initial amount available to the player and all bets with the consequent earnings and loses.
- the Banking Agent has a pair of certified asymmetric keys, which are denoted as (PJB, SB). The certification of the keys is preferably carried out by a certification authority of recognized prestige.
- the proposed solution has a high computational cost, and the part of Banking needs to participate in each monetary transfer between the players.
- a proof of credit is used, which is called Digital Check.
- the Agent of Player 101 makes the request for an amount to the Agent of Bank 123. If the player has the requested credit, the Agent of Bank 123 issues the corresponding Digital Check.
- the Digital Check is used for a single Virtual Game Table 113, and can only be used once. Additionally, the Digital Check has a unique serial number and is linked to an instant of the game. The entry of a player in a game is indicated by a link in the CDNE chain of departure.
- the Digital Check is entered in the data field of the link and in this way players can know the credit of the new player.
- the properties of this chain guarantee that any manipulation of an entry will be detected, and therefore by reviewing the chain (initial capital, increases, and credit decrements) the credit of each player is known reliably.
- the Player's Agent 101 obtains the identifier of the Virtual Game Table 113 and the last link in the chain
- SB is the private component of the Bank's asymmetric key pair
- T k is the instant of issuance of the check
- C k is the description indicated by the table
- the point at which the player asked to enter, the player's request Q k and the serial number of the check that has been issued.
- Vk is the credit available to the player at the Virtual Game Table 113.
- the Bank makes this Digital Check accessible to Player Agent 101 and Croupier Agent 109. In certain Casino games a player may request that a deck be used of new cards, or that the Croupier be replaced. The manufacturer of card decks does not mark the cards because his reputation depends on it.
- the substitution of the Crupier is also a measure to generate more confidence to the player, because if he has any suspicion about the behavior of the Crupier he can request his substitution.
- the present invention provides for this purpose a set of programs and / or execution platforms, preferably safe tamper-proof, that constitute an Impartial Agent 107.
- said Impartial Entity makes the Player Agent 101 accessible to said Players by means of said Impartial Agent 107.
- the download of Player Agent 101 from a trusted site would be equivalent to opening a deck of cards in front of the player.
- the Impartial Agent 107 can generate the game events, or participate with the Croupier Agent 109 in obtaining the game events by means of a cryptographic protocol for the joint generation of game events. So far, the system elements shown in Figure 1 and Figure 2 have been described as an example of implementation. The following describes how they interact with each other to ensure an honest and safe game. This interaction, as shown in Figure 3, includes the basic operations performed in a Casino: Registration of
- Certification 103 collects credential requests, and issues credentials once the
- Certification Authority has validated the request data.
- Players request credentials through Player Agent 101, and therefore the first step that players take is the download of Player Agent 101.
- Player Agent 101 is downloaded from Impartial Agent 107, through a secure connection such as SSL, TLS or WTLS in the case of mobile telephony.
- the player once he has Player Agent 101, enters his data so that his credentials are generated.
- Player Agent 101 makes this data accessible to Certification Agent 103, preferably using a secure communication protocol, examples mentioned being: SSL, TLS, or WTLS. If it is not possible to use a secure communication protocol, the privacy of the player's data can be protected by a digital envelope, as detailed in the notation.
- the digital envelope is prepared with the public key PR of the Certification Authority.
- the data provided by the player in the credentials request are at least one of the following: name, surname, date of birth, name of the parents, place of birth, address where he resides, the number of the National identity document, social security number, address where you reside, telephone number, and email address.
- Identification credentials are a digital certificate of a pair of keys owned by the player. If the player does not have an asymmetric key pair, Player Agent 101 generates a pair of asymmetric keys that are called, (Pj, Sj).
- the private component, Sj is encrypted with a symmetric cryptosystem and a high entropy password. This protection prevents anyone, except the player, from using it.
- Some examples of symmetric cryptosis are the old DES encryption standard [National Bureau of Standards, NBS
- FIPS PUB 46-1 Data Encryption Standard, US Department of Commerce, January 1988] triple DES [ANS ⁇ X9.17 (Revised), American National Standard for Financial Institution Key Management (Wholesale), American Bankers Association, 1985], or Rijndael [Daemen, J. and Rijmen, V. The Block Cipher Rijndael, Smart Card Research and Applications, LNCS 1820, J.-J. Quisquater and B. Schneier, Eds., Springer-Verlag, pp. 288-296, 2000].
- the player can make the protected key accessible to the Certification Authority as a backup, with the certainty that no one will have access to it because the password is only known by the player.
- the Player Agent 101 With the data entered by the user and the public component Pj of its key pair, the Player Agent 101 generates a certificate request, which is sent to the Certification Agent 103.
- the Certification Agent 103 stores the certificate requests until The Certification Authority has verified the data provided by the players. Verification of this data is done by accessing official BDs, such as the police BD, and optionally also requires the physical presence of the player to present their documentation. If the data is correct, the Certification Authority issues the digital certificate of the public component of the player's key pair through the Certification Agent 103.
- the player can only use this key pair in the remote game system, or in a further implementation Securely create a key pair for each of the following functions: • Authentication keys, (P, S j ): The player uses this key pair to authenticate.
- the Access Control Agent 105 additionally contacts authenticated players and allows players to view existing Virtual Game Tables 113, and create new ones.
- the player is authenticated in the Access Control Agent 105 by means of a strong cryptographic authentication protocol.
- strong authentication protocols are contained in the ISO / IEC 9594-8 (X.509) [ISO / IEC 9594- 8 "Information technology - Open Systems Interconnection - The Directory: Overview of concepts, models, and services ", International Organization for Standardization, Geneva, Switzerland, 1995 (equivalent to ITU-T Rec.
- a player to participate in the game which takes place at a game table, must exchange his legal course money for chips.
- players obtain a Digital Check for a Virtual Game Table 113, which is issued by the Trust Entity.
- the player must have an account in the Trust Entity open with enough money to play, and when the player makes a request through Player Agent 101, the Trust Entity issues the Digital Check.
- the Digital Check request is signed by Player Agent 101 with the key pair owned by the player. If the key pair is duly certified and the private component is adequately protected, the digital signature may have legal validity, and the player may not subsequently repudiate the request. Additionally, the digital signature also prevents the amount of the request from being modified.
- the Digital Check is included in the Monetary Record 117 and in the Activity Record 115.
- the inclusion in the Monetary Record 117 allows you to have control of all the capital movements of the player, and the inclusion in the Activity Record 115 allows the Other participants in the game may know the credit available to the player.
- the number of gaming tables is limited, and in some cases Players must wait to enter one of them.
- the number of Virtual Game Tables 113 may vary according to the number of players, and as mentioned the player can choose if he wants to play alone (Virtual Game Table
- a player wants to create a new Virtual Game Table 113 he makes a request C k to the Access Control Agent 105 through the Player Agent 101.
- the request C k details the type of Virtual Game Table 113 (public or private), the game you want to play, and if you want a Croupier Agent 109 to control the game.
- the Access Control Agent 105 creates an identifier Id of the Virtual Game Table 113, which allows subsequent control of the Virtual Tables of Game 113. Assigns the created identifier (Idjyj) to an instance of the Virtual Game Table 113, and if the request indicates that a Croupier Agent 109 controls the game, the Access Control Agent 105 obtains an instance of the Croupier Agent 109 associating it with the Virtual Game Table 113.
- the Access Control Agent 105 creates the CDNE chain of the game, where in the data field of the first link you have the request to create the Virtual Game Table 113 N k . In a traditional casino or Bingo players cannot enter the game whenever they want, the game has some guidelines and the entry of a player is made at the points allowed by the game.
- a player may request entry into a Virtual Game Table 113 at any time, but will only be admitted once the roll or hand that is being played at that time is finished. The moment a player enters a Virtual Game Table 113, the game of said player begins. As mentioned to enter a Virtual Game Table 113 it is necessary to have credit. The player shows his credit to the rest of the participants by means of a Digital Check, CH k , which is only valid for a Virtual Game Table 113, and a given time. When a player wants to access a Virtual Game Table 113 the Player Agent 101 obtains the IdM identifier of the Virtual Game Table 113, and the last entry of the Virtual Game Table 113.
- Each of these phases is one, or several new links of the CDNE chain of the game.
- These stages and the links of the CDNE chain of the game implemented by the Player Agent 101 and / or by the Croupier Agent 109 are detailed below, according to the proposed system.
- the Croupier's Agent 109, or the Player's Agent 101 who performs this task marks the Start of the Roll or Hand of Game 401, and thereby marks the end of player entry.
- Players can enter the Virtual Game Table 113 in the period between the end and the start of the game hand or roll.
- the data field of the link in the starting chain details that a new game hand is started. All players know or can meet the other participants in the game, and their credit.
- each bet is a link in the CDNE chain, and therefore it is signed with the player's key pair and is made accessible to the rest of the members of the Virtual Game Table 113, that is, the bet is not can repudiate or modify.
- the Player Agent 101 constructs a link in the CDNE chain that indicates in the data field the specific type of bet, and the value. Bets 403 can be made in parallel by all players, because a sequential order is not necessary. This operation involves an expansion of the CDNE chain of the game.
- the Croupier Agent 109 or the Player 101 Agent who performs the actions of a Croupier, accepts the valid Betting 403 with a new link in the CDNE chain of the game.
- the data field includes an operation code that denotes the end of Bets 403 and the start of the game.
- the CDNE chain of the game contracts at this point. With this measure all players can see the Bets 403 made, and cannot modify them.
- a bet is valid if it conforms to the rules of the game, and the player has credit to place it.
- Each casino game is different and therefore to guarantee honesty in each of them different problems must be solved. For example, in the Black Jack the cards They are distributed openly, but in Poker they should only know their recipient.
- the result is based on a single value obtained at random, in the Black Jack several values are obtained.
- casino games can be divided into the following groups: card games, open card games, and covered card games.
- a characteristic example of the second group is the Black Jack.
- a significant example of the third group is Poker.
- the Croupier Agent 109 executes a cryptographic protocol for the Impartial Generation of Game Events 405, together with the Impartial Agent 107. Below are five non-limiting examples of execution of said Game. first option. In the execution examples, a cryptographic commitment protocol is used as the base tool.
- a first commitment protocol was introduced by Blum in 1982 [Blum M., Coin ⁇ ipping by telephone: a protocol for solving impossible problems, Proc. IEEE Computer Conference, pages 133-137, IEEE, 1982].
- a commitment protocol C p consists of two phases, a commitment phase followed by a commitment release phase.
- the commitment reveals X and / or the information to verify the commitment, T_C P ⁇ X ⁇ .
- each participant enters a certain information in a box, which closes with a key and delivers said box to the rest of the participants.
- the second phase he gives the key to open the box and retrieve the information inside the initial box.
- the verifiers of the commitment cannot know anything about X from T, and the compromised information X cannot be altered by the owner between the first and second phases.
- An overview of the state of the art in relation to compromise protocols can be found in [Schneier B., Applied Cryptography: protocols, algorithms, and source code in C, Second Edition, Wiley, 1996].
- the player makes a bet A through his Player Agent 101.
- the Agent of Player 101 makes the Agent of Croupier 109 accessible.
- the Agent of Croupier 109 obtains a value V ⁇ randomly from which the outcome of the game is derived, and makes V ⁇ the Agent of Player 101 accessible.
- Next Player Agent 101 makes Player A's bet accessible to Croupier Agent 109, which verifies the correctness of the T lC p ⁇ A ⁇ commitment protocol.
- the player makes a bet A through the Agent of Player 101.
- the Agent of Player 101 makes the Agent of Crupier 109 accessible to me.
- the Agent of Crupier 109 obtains a first Vi value randomly and executes a commitment protocol with
- Croupier Agent 109 makes Ti and T 2 accessible to Impartial Agent 107.
- Impartial Agent 107 makes Vi and X ⁇ accessible to Croupier Agent 109.
- Croupier Agent 109 makes Vi accessible,
- Croupier Agent 109 makes Ti accessible to Player Agent 101 and to the Impartial Agent.
- Player Agent 101 makes a player's bet A available to Croupier Agent 109.
- Impartial Agent 107 obtains a second value V ⁇ and through the private component Si of the key pair of the
- Impartial Authority calculates a digital signature Xi on ⁇ V ⁇ , T ⁇ , X ⁇ - S (V 2 ⁇ ⁇ ).
- Impartial Agent 107 makes V ⁇ and Xi accessible to Croupier Agent 109.
- Croupier Agent 109 makes Vi, Ti, V ⁇ and X ⁇ accessible to Player 101 Agent.
- Croupier Agent 109 and Player 101 Agent derive said Game event from Vi and V ⁇ .
- the Player Agent 101 In a fourth example of execution of said first option the Player Agent 101
- the Impartial Agent 107 makes V 2 accessible, and Xi to Croupier Agent 109.
- Croupier Agent 109 makes Vi, V, Ti and X ⁇ accessible to Player 101 Agent.
- Croupier Agent 109 and Player 101 Agent derive said game event from Vi and V 2 .
- the player places a bet A through the Agent of Player 101.
- Player Agent 101 makes Ti accessible to Croupier Agent 109.
- Impartial Agent 107 makes V 2 , and Xi accessible to Croupier Agent 109.
- Croupier Agent 109 makes Vi, V 2 , and Xi accessible to Player Agent 101. Croupier Agent 109 and Player Agent
- Player Agent 101 digitally signs A with the private component of a pair of asymmetric keys owned, such as (Pj, S), (P j , S), (P j , S j ), (Pf, S ).
- the Croupier Agent 109 makes the I ⁇ M identifier of the Virtual Game Table 113 accessible to the Impartial Agent 107.
- the Impartial Agent 107 includes IdM in the signature
- Impartial Agent 107 includes a serial number N ⁇ in each digital signature it makes.
- Impartial Agent 107 impartially generates game events.
- the impartial generation of these events is carried out through a PRG PR such as the one described previously.
- the Impartial Agent attaches the digital signature of the game event.
- the digital signature is generated with the private component S of the key pair of the Impartial Authority (P, S).
- the Impartial Agent attaches the result of applying a summary function with code to the game event.
- the password used is kept secret and is only in the possession of the Agent of Player 101 and the Impartial Agent. Summary functions with code are typically called MAC, in [Menezes, AJ, Oorschot, PC, Vanstone, SA, Handbook of Applied
- the Player Agent 101 executes a cryptographic protocol for the Impartial Generation of Game Events 405, together with the Croupier Agent 109.
- the Agent of the Game Player 101 and Croupier Agent 109 perform one of the protocols described in the international application [PCT ES02 / 00485].
- the Player Agent 101 and the Croupier Agent 109 perform one of the protocols described in the invention US 6,264,557.
- the Player Agent 101 and the Croupier Agent 109 perform one of the protocols described in the invention US 6,165,072.
- the messages sent by Players Agents 101 and / or Croupier Agent 109 during the game cryptographic protocol are links in the CDNE chain of the game.
- the End of the Roll or Game Hand 407 it can be verified that the game has been honest with the data of the CDNE chain of the game.
- one of the Players Agents 101 detects any irregularity, it generates an incident that is stored in the Incident Register 119 that will be verified by the Audit Authority through the Audit Agent 111 is responsible for verifying the incidents. If all Players Agents 101 agree with the result, they build a new link in the CDNE chain that indicates that the player accepts the result and the CDNE chain of the game expands.
- the Agent of the Croupier 109 or the Agent of the Player 101 who performs the Croupier's actions, marks the end of the roll or hand of play, with a new entry that contracts the CDNE chain of the game. At this time the period begins so that players can enter or leave the Virtual Game Table 113.
- the Virtual Game Table 113 ends his game and collects his benefits.
- Players can only leave the Virtual Game Table 113 after the end of the game or roll, and if they leave it before, without justification, they can be fined.
- the Player Agent 101 performs the following actions: Constructs a link in the chain where the data field indicates that the player wants to leave the Virtual Game Table 113.
- the Croupier Agent 109 or the Player Agent 101 who performs the Croupier's actions, creates a new link in the CDNE chain of the game and the chain contracts.
- the data field of the chain shows the ups and downs of the Mesa
- Player Agent 101 asks the Bank Agent 123 to collect benefits.
- Bank Agent 123 accesses Activity Record 115 and based on
- the Agent of the Bank 123 builds a link in the CDNE chain of the Monetary Registry 117, indicating in the data field that the income comes from a certain item, the amount to be entered, the Virtual Game Table 113, and a cryptographic summary of The game played. If the Player 101 Agent agrees with the link in the Monetary Record chain 117, he accepts the link, and otherwise generates an incident that is stored in the Incident Record 119.
- Some of the Agents described above can be grouped together a more complex set of programs and / or platforms that is called Game Agent, and that is similar to the Online Casinos currently in existence.
- a first group that forms a Game Agent is constituted by the Access Control Agent 105, the Agent of the Bank 123, and a plurality of Virtual Game Tables 113.
- a second group that forms a Game Agent is constituted by the Access Control Agent 105, the Agent of Bank 123, a plurality of Virtual Tables of
- a third grouping that forms a Game Agent is constituted by the Access Control Agent 105, and a plurality of Virtual Game Tables 113.
- a fourth grouping that forms a Game Agent is it constitutes by means of the Access Control Agent 105, the Certification Agent 103, and a plurality of Virtual Game Tables 113.
- a fifth grouping that forms a Game Agent is constituted by the Access Control Agent 105, the Agent of the Bank 123, a plurality of Agents of the Crupier
- a sixth grouping that forms a Game Agent is constituted by the Access Control Agent 105, the Bank Agent 123, a plurality of Virtual Game Tables
- a seventh grouping that forms a Gaming Agent is constituted by the Access Control Agent 105, a plurality of Croupier Agents 109, and a plurality of
- FIG. 1 An eighth grouping that forms a Game Agent is constituted by the Access Control Agent 105, the Certification Agent 103, a plurality of Croupier Agents 109 and a plurality of Virtual Game Tables 113. Additionally any of the previous groupings can incorporate a system of Remote access port filtering, typically called a firewall, and an intruder detection system. The intruder detection system monitors the system to detect possible unauthorized access, and records the actions taken. This information allows measures to eliminate weakness.
- a firewall typically called a firewall
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Slot Machines And Peripheral Devices (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2003262579A AU2003262579A1 (en) | 2003-08-27 | 2003-08-27 | System which is used to conduct a game of chance using a communication network |
EP03818388A EP1669115A1 (fr) | 2003-08-27 | 2003-08-27 | Systeme permettant d'executer un jeu de hasard au moyen d'un reseau de communication |
EP06015875A EP1741477A3 (fr) | 2003-08-27 | 2003-08-27 | Système pour la réalisation d'un jeu de hasard à travers un réseau de communication |
PCT/ES2003/000439 WO2005021118A1 (fr) | 2003-08-27 | 2003-08-27 | Systeme permettant d'executer un jeu de hasard au moyen d'un reseau de communication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/ES2003/000439 WO2005021118A1 (fr) | 2003-08-27 | 2003-08-27 | Systeme permettant d'executer un jeu de hasard au moyen d'un reseau de communication |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005021118A1 true WO2005021118A1 (fr) | 2005-03-10 |
Family
ID=34259317
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/ES2003/000439 WO2005021118A1 (fr) | 2003-08-27 | 2003-08-27 | Systeme permettant d'executer un jeu de hasard au moyen d'un reseau de communication |
Country Status (3)
Country | Link |
---|---|
EP (2) | EP1741477A3 (fr) |
AU (1) | AU2003262579A1 (fr) |
WO (1) | WO2005021118A1 (fr) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2418153A (en) * | 2005-07-15 | 2006-03-22 | Kroopier Technologies S L | Gaming system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6165072A (en) * | 1997-09-02 | 2000-12-26 | Quixotic Solutions Inc. | Apparatus and process for verifying honest gaming transactions over a communications network |
WO2001098860A2 (fr) * | 2000-06-22 | 2001-12-27 | Barber Timothy P | Procede permettant de jouer a un jeu de hasard verifiable mis en oeuvre meme sur un reseau informatique |
WO2002027424A2 (fr) * | 2000-09-26 | 2002-04-04 | Ezlotto Co., Ltd. | Systeme et procede de traitement par l'intermediaire d'internet d'activites relatives a une loterie immediate |
-
2003
- 2003-08-27 WO PCT/ES2003/000439 patent/WO2005021118A1/fr active Application Filing
- 2003-08-27 EP EP06015875A patent/EP1741477A3/fr not_active Withdrawn
- 2003-08-27 AU AU2003262579A patent/AU2003262579A1/en not_active Abandoned
- 2003-08-27 EP EP03818388A patent/EP1669115A1/fr not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6165072A (en) * | 1997-09-02 | 2000-12-26 | Quixotic Solutions Inc. | Apparatus and process for verifying honest gaming transactions over a communications network |
WO2001098860A2 (fr) * | 2000-06-22 | 2001-12-27 | Barber Timothy P | Procede permettant de jouer a un jeu de hasard verifiable mis en oeuvre meme sur un reseau informatique |
WO2002027424A2 (fr) * | 2000-09-26 | 2002-04-04 | Ezlotto Co., Ltd. | Systeme et procede de traitement par l'intermediaire d'internet d'activites relatives a une loterie immediate |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2418153A (en) * | 2005-07-15 | 2006-03-22 | Kroopier Technologies S L | Gaming system |
GB2418153B (en) * | 2005-07-15 | 2006-12-06 | Kroopier Technologies S L | Method and system for the generation of a file of auditable records for remote and on-site electronic gaming |
WO2007010055A1 (fr) | 2005-07-15 | 2007-01-25 | Kinamik Data Integrity, S.L. | Procede et systeme de generation d'un fichier d'enregistrements verifiables dans les jeux par des moyens electroniques presents et a distance |
US9155959B2 (en) | 2005-07-15 | 2015-10-13 | Scytl Secure Electronic Voting S.A. | Method and system for the generation of a file of auditable records for remote and on-site electronic gaming |
Also Published As
Publication number | Publication date |
---|---|
EP1741477A2 (fr) | 2007-01-10 |
EP1741477A3 (fr) | 2007-12-12 |
EP1669115A1 (fr) | 2006-06-14 |
AU2003262579A1 (en) | 2005-03-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6935952B2 (en) | Method and apparatus for remote gaming | |
US6962530B2 (en) | Authentication in a secure computerized gaming system | |
WO1996000950A1 (fr) | Systeme de jeu a distance perfectionne et protege | |
Racsko | Blockchain and democracy | |
WO2003050771A1 (fr) | Procede de vote electronique securise et protocoles cryptographiques et programmes informatiques utilises | |
US20080200225A1 (en) | Methods and apparatus for facilitating game play and generating an authenticatable audit-trail | |
US9155959B2 (en) | Method and system for the generation of a file of auditable records for remote and on-site electronic gaming | |
Ruffing et al. | (Short Paper) Burning Zerocoins for Fun and for Profit-A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol | |
Chalkias et al. | Distributed auditing proofs of liabilities | |
Clark et al. | Research perspectives and challenges for bitcoin and cryptocurrencies | |
US9087432B2 (en) | Creation and monitoring of “fair play” online gaming | |
AU2013368958A1 (en) | Methods for enhancing payouts and play in games of chance | |
US20140187305A1 (en) | Providing Games with Enhanced Prize Structures | |
WO2005021118A1 (fr) | Systeme permettant d'executer un jeu de hasard au moyen d'un reseau de communication | |
Kuacharoen | Design and implementation of a secure online lottery system | |
US20040167792A1 (en) | Method and management system for gaming management between a gaming management center and at least one gaming terminal, gaming management center and gaming terminal | |
Stajano et al. | Cyberdice: peer-to-peer gambling in the presence of cheaters | |
Lee et al. | Non-iterative privacy preservation for online lotteries | |
Ruffing et al. | Burning zerocoins for fun and for profit | |
WO2004035159A1 (fr) | Procede d'obtention d'un resultat impartial d'un jeu se deroulant sur un reseau de communication, et protocoles et programmes associes | |
WO2005006267A1 (fr) | Systeme en ligne securise et verifiable | |
AU2004222712B2 (en) | Improved remote gaming system | |
WO2020242338A1 (fr) | Procédé de vérification de résultats de jeu lors de jeux de hasard en ligne | |
Castella-Roca et al. | A smart card-based mental poker system | |
Zhao et al. | Fair online gambling scheme and TTP-free mental poker protocols |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003818388 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2003818388 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |