Secured verification of configuration data for field programmable gate array devices
First Claim
1. A method of authenticating data within or about a gaming machine, the method comprising:
- providing a central processing unit for use in conjunction with the gaming machine;
providing a volatile programmable electronic device for use in conjunction with the gaming machine;
providing a configurator for use in conjunction with the gaming machine;
transferring a configuration file from said configurator to said volatile programmable electronic device;
configuring said volatile programmable electronic device with said configuration file; and
comparing at least a representative portion of data from said configuration file with at least a representative portion of data from a separate custodial file, wherein at least a substantial portion of said separate custodial file is identical to at least a substantial portion of said configuration file, and wherein said separate custodial file resides in a location separate from said memory device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for providing automated and secured verification of configuration data for a volatile progrannmable electronic device, such as an FPGA, is disclosed. A configurator including at least one memory unit, such as a ROM or EEPROM, contains a configuration file, which file is transferred to the volatile programmable electronic device or FPGA on demand. Data from the configuration file is compared with data from a separate custodial file, which custodial file is substantially identical to the configuration file and resides in a location separate from the memory unit or units that store the actual configuration file. In some instances the comparison is made before any actual loading of the configuration file into the FPGA occurs, whereby loading is prohibited if no match is confirmed, while in other instances the FPGA is configured using the configuration file and is then shut down if no match is later confirmed.
-
Citations
20 Claims
-
1. A method of authenticating data within or about a gaming machine, the method comprising:
-
providing a central processing unit for use in conjunction with the gaming machine;
providing a volatile programmable electronic device for use in conjunction with the gaming machine;
providing a configurator for use in conjunction with the gaming machine;
transferring a configuration file from said configurator to said volatile programmable electronic device;
configuring said volatile programmable electronic device with said configuration file; and
comparing at least a representative portion of data from said configuration file with at least a representative portion of data from a separate custodial file, wherein at least a substantial portion of said separate custodial file is identical to at least a substantial portion of said configuration file, and wherein said separate custodial file resides in a location separate from said memory device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A microprocessor based gaming machine, comprising:
-
a central processing unit;
a volatile programmable electronic device;
a configurator;
a configuration file located within said configurator;
a separate custodial file located within the microprocessor based gaming machine and separate from said configurator, wherein at least a substantial portion of said separate custodial file is identical to at least a substantial portion of said configuration file; and
a comparator designed to compare at least a representative portion of data from said configuration file with at least a representative portion of data from said custodial file. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method of authenticating data in a microprocessor based machine, comprising:
-
transferring a configuration file from a memory device associated with the microprocessor based machine to a volatile programmable electronic device associated with the microprocessor based machine;
configuring said volatile programmable electronic device with said configuration file; and
comparing at least a representative portion of data from said configuration file with at least a representative portion of data from a separate custodial file, wherein at least a substantial portion of said separate custodial file is identical to at least a substantial portion of said configuration file, and wherein said separate custodial file resides in a location separate from said memory device.
-
-
20. A method of authenticating data in a microprocessor based machine, comprising:
-
providing a CPU within with the microprocessor based machine;
providing an FPGA within with the microprocessor based machine;
providing a configurating EEPROM within with the microprocessor based machine;
storing a configuration file within said EEPROM;
storing a separate custodial file within the microprocessor based machine and separate from said EEPROM, wherein at least a substantial portion of said separate custodial file is identical to at least a substantial portion of said configuration file;
holding the operating contents of said FPGA as substantially empty upon a shut down phase of the microprocessor based machine;
booting up the microprocessor based machine;
initiating a request to transfer said configuration file from said EEPROM to said FPGA;
utilizing said CPU to compare at least a representative portion of data from said configuration file with at least a representative portion of data from a separate custodial file;
confirming whether said configuration file has been successfully compared to said custodial file to a sufficient level of satisfaction; and
configuring said FPGA with said configuration file.
-
Specification