Architecture for manufacturing authenticatable gaming systems
First Claim
Patent Images
1. A method comprising:
- manufacturing a console-based gaming system with authenticatable data stored in programmatically accessible memory, the authenticatable data having corresponding verification data; and
authenticating the console-based gaming system for online participation by receiving the authenticatable data from the console-based gaming system and utilizing the verification data to verify the authenticatable data.
2 Assignments
0 Petitions
Accused Products
Abstract
An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.
47 Citations
50 Claims
-
1. A method comprising:
-
manufacturing a console-based gaming system with authenticatable data stored in programmatically accessible memory, the authenticatable data having corresponding verification data; and
authenticating the console-based gaming system for online participation by receiving the authenticatable data from the console-based gaming system and utilizing the verification data to verify the authenticatable data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
manufacturing a game console that includes a symmetric key stored in programmatically accessible memory; and
using symmetric key cryptography to verify the symmetric key on the game console as a basis for authenticating the game console for online participation. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
manufacturing a game console that stores a verifiable certificate and a private key from a public key pair in programmatically accessible memory; and
using public key cryptography to verify the verifiable certificate and the private key of the game console as a basis for authenticating the game console for online participation. - View Dependent Claims (17, 18)
-
-
19. A method for manufacturing a game console, comprising:
-
writing a symmetric key in programmatically accessible memory in the game console;
encrypting the symmetric key to produce an encrypted symmetric key; and
maintaining the encrypted symmetric key in a database separate from the game console. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A method for registering a game console, comprising:
-
receiving a symmetric key and a console ID from the game console;
locating a record using the console ID, the record containing an encrypted symmetric key in which an original symmetric key assigned to the game console during manufacturing is encrypted;
decrypting the encrypted symmetric key found in the record; and
evaluating the original symmetric key recovered from the encrypted symmetric key with the symmetric key received from the game console as a basis for authenticating the game console. - View Dependent Claims (27, 28, 29)
-
-
30. A method comprising:
-
during manufacturing;
assigning a console ID to each game console;
randomly generating a symmetric key;
storing the symmetric key and the console ID in programmatically accessible memory in the game console;
encrypting the symmetric key using a public key of a public key pair to produce an encrypted symmetric key;
maintaining the encrypted symmetric key and the console ID in a database;
transferring the encrypted symmetric key and the console ID to a data center;
during registration of the game console at the data center;
receiving a proffered symmetric key and the console ID from the game console;
locating a record using the console ID received from the game console, the record containing the encrypted symmetric key;
decrypting the encrypted symmetric key using the public key cipher and a private key from the public key pair to recover the symmetric key; and
evaluating the symmetric key recovered from the encrypted symmetric key with the proffered symmetric key received from the game console as a basis for authenticating the game console.
-
-
31. A method for manufacturing a game console, comprising:
-
generating a console public key pair associated with a game console, the console public key pair having a console public key and a corresponding console private key;
creating a certificate chain of digital certificates starting from a root certificate signed by a root private key and ending at a console certificate, the console certificate containing the console public key; and
storing the console certificate and the console private key in programmatically accessible memory in the game console. - View Dependent Claims (32, 33)
-
-
34. A method for registering a game console, comprising:
-
receiving a console certificate and proof of knowledge of a console private key from the game console, the console certificate being part of a certificate chain starting from a root certificate digitally signed by a root private key of a public key pair, and ending at a console certificate containing a console public key that corresponds to the console private key in a console public key pair;
traversing the certificate chain to verify the console certificate and recover the console public key; and
using the console public key to evaluate the proof of knowledge of the console private key received from the game console. - View Dependent Claims (35)
-
-
36. A method comprising:
-
prior to registration;
generating a root public key pair having a root public key and a corresponding root private key;
generating a root certificate that contains the root public key and is signed by the root private key;
generating a certification authority (CA) public key pair having a CA public key and a corresponding CA private key;
generating a CA certificate that contains the CA public key and is signed by the root private key;
generating a console public key pair having a console public key and a corresponding console private key;
generating a console certificate that contains the console public key and is signed by the CA private key;
storing the console certificate and the console private key in programmatically accessible memory of a game console;
during registration;
receiving the console certificate and proof of knowledge of the console private key from the game console;
using the root public key to verify the CA certificate and recover the CA public key;
using the CA public key to verify the console certificate and recover the console public key; and
using the console public key to evaluate the proof of knowledge of the console private key received from the game console.
-
-
37. A computer-readable medium comprising computer-executable instructions that, when executed, direct a computing system to:
-
write a randomly generated symmetric key and a console ID into a programmatically accessible memory in the game console;
encrypt the symmetric key to produce an encrypted symmetric key; and
store the encrypted symmetric key and the console ID in a database separate from the game console. - View Dependent Claims (38, 39)
-
-
40. A computer-readable medium comprising computer-executable instructions that, when executed, direct a computing system to:
-
receive a proffered symmetric key and a console ID from the game console;
retrieve, using the console ID, an original symmetric key recorded into the game console during manufacturing; and
compare the proffered symmetric key received from the game console with the original symmetric key to determine whether the game console is authentic. - View Dependent Claims (41)
-
-
42. A computer-readable medium comprising computer-executable instructions that, when executed, direct a computing system to:
-
generate a root public key pair having a root public key and a corresponding root private key;
generate a certificate chain from a root certificate signed by the root private key to a console certificate associated with the game console, the console certificate containing a console public key from a console public key pair; and
write the console certificate and a console private key corresponding to the console public key in programmatically accessible memory of a game console.
-
-
43. A computer-readable medium comprising computer-executable instructions that, when executed, direct a computing system to:
-
receive a console certificate and proof of knowledge of a console private key from the game console, the console certificate being part of a certificate chain starting from a root certificate digitally signed by a root private key of a public key pair, and ending at the console certificate containing a console public key that corresponds to the console private key;
traverse the certificate chain to verify the console certificate and recover the console public key; and
evaluate the proof of knowledge of the console private key received from the game console using the console public key recovered from the console certificate.
-
-
44. A game console, comprising:
-
a network port for connection to a communication network;
a memory;
a symmetric key stored in the memory; and
a processor coupled to the memory and configured to retrieve the symmetric key from the memory and transmit the symmetric key and/or proof of knowledge of the symmetric key via the network port to an authentication entity that uses the symmetric key to authenticate the game console.
-
-
45. A game console, comprising:
-
a network port for connection to a communications network;
a memory;
a private key and a verifiable certificate stored in the memory, the verifiable certificate containing a public key that corresponds to the private key; and
a processor coupled to the memory and configured to transmit the verifiable certificate and proof of knowledge of the private key via the network port to an authentication entity that uses the verifiable certificate and the proof to authenticate the game console.
-
-
46. A system, comprising:
-
a manufacturing-based computing system configured to write authenticatable data into programmatically accessible memory of a game console, the authenticatable data having corresponding verification data maintained separately from the game console; and
an authentication computing system configured to authenticate the game console by receiving the authenticatable data from the game console and utilizing the verification data to verify the authenticatable data.
-
-
47. A system, comprising:
-
a manufacturing-based computing system configured to write a randomly generated symmetric key and a console ID into a programmatically accessible memory in the game console, the manufacturing-based computing system further storing the symmetric key in encrypted form; and
an authentication computing system configured to authenticate the game console by receiving a proffered symmetric key and the console ID from the game console, the authentication computing system using the console ID to locate the symmetric key in encrypted form and then decrypting the symmetric key, the authentication computing system using the symmetric key to evaluate the proffered symmetric key received from the game console as a basis for authenticating the game console.
-
-
48. A system, comprising:
-
a manufacturing-based computing system configured to write a console certificate and a console private key into programmatically accessible memory of the game console, the console certificate being part of a certificate chain starting from a root certificate signed by a root private key, leading to the console certificate containing a console public key associated with the console private key; and
an authentication computing system configured to authenticate the game console by verifying a proffered console certificate submitted by the game console using the certificate chain, the authentication computing system using the console public key from the console certificate to evaluate proof of knowledge of the console private key submitted by the game console.
-
-
49. A system, comprising:
-
writing means for writing an original symmetric key and a console ID into programmatically accessible memory of a game console;
encryption means for encrypting the original symmetric key using a public key of a public key pair to produce an encrypted symmetric key;
storage means for maintaining the encrypted symmetric key separately from the game console; and
authentication means for authenticating the game console by comparing a proffered symmetric key submitted by the game console with the original symmetric key decrypted from the encrypted symmetric key to determine if the proposed symmetric key matches the original symmetric key.
-
-
50. A system, comprising:
-
certificate generation means for generating a certificate chain from a root certificate signed by a root private key to a console certificate associated with a game console, the console certificate containing a console public key from a console public key pair;
writing means for writing the console certificate and a console private key from the console public key pair in programmatically accessible memory of the game console; and
authentication means for authenticating the game console by verifying a proffered console certificate submitted by the game console using the certificate chain and if valid, extracting the console public key from the console certificate to evaluate proof of knowledge of the console private key submitted by the game console.
-
Specification