Gaming machine having sampled software verification
First Claim
Patent Images
1. In a gaming machine, a method of authenticating a media device comprising:
- setting an address pointer ADDR to a first next memory location in said media device;
determining whether said next memory location is a last memory location to be authenticated in said media device;
applying a hashing algorithm to the contents of said next memory location and updating a key-value;
adding a predetermined number N to said ADDR such that the next ADDR=ADDR+N;
setting the next ADDR to the next memory location in the media device to be authenticated;
repeating the determining, applying, adding and setting steps until the next ADDR is equal to said last memory location;
determining whether said key-value is equal to a predetermined key;
passing authentication if said key-value is equal to said predetermined key, failing authentication if said key-value is not equal to said predetermined key.
5 Assignments
0 Petitions
Accused Products
Abstract
A gaming machine adapted to authenticate the contents of a media device (memory device) by sampling a number of memory locations in the media device. A hash function is applied to the contents of the sampled memory locations thereby calculating a key-value. The key-value is compared to a previously calculated key. If the key-value and the key are equal, then the media device is considered authentic.
87 Citations
23 Claims
-
1. In a gaming machine, a method of authenticating a media device comprising:
-
setting an address pointer ADDR to a first next memory location in said media device;
determining whether said next memory location is a last memory location to be authenticated in said media device;
applying a hashing algorithm to the contents of said next memory location and updating a key-value;
adding a predetermined number N to said ADDR such that the next ADDR=ADDR+N;
setting the next ADDR to the next memory location in the media device to be authenticated;
repeating the determining, applying, adding and setting steps until the next ADDR is equal to said last memory location;
determining whether said key-value is equal to a predetermined key;
passing authentication if said key-value is equal to said predetermined key, failing authentication if said key-value is not equal to said predetermined key. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A gaming machine comprising:
-
a user interface; and
a central processing unit (CPU) coupled to said user interface, said CPU comprising;
a processor;
a first media device coupled to said processor, said first media device adaptable to store data in a plurality of memory locations;
a second memory coupled to said processor, said second memory adapted to contain executable program code, said executable program code further comprises a plurality of instructions configured to cause said processor to determine the authenticity of said data in said plurality of memory locations, said instructions include instructions for;
performing a hash calculation on a sample of memory locations from said plurality of memory locations and calculating a key-value from said sample of memory locations;
said sample of memory locations being a number of memory locations that is less than said plurality of memory locations;
comparing said key-value to a predetermined key;
authenticating said data stored in said plurality of memory locations if said key-value is equal to said predetermined key; and
not authenticating said data stored in said plurality of memory locations if said key-value is not equal to said predetermined key. - View Dependent Claims (14, 15, 16)
-
-
17. In a gaming machine that is turned on, a method of repeatedly authenticating a portion of a media device, said method comprising:
-
reading a plurality of memory locations in said media device wherein said plurality of memory locations are spaced from each other, said plurality of memory locations being less than a total number of memory locations in said media device;
after reading each memory location, calculating a hash value and using said hash value to update a key-value until all said plurality of memory locations are read and a final key-value is determined;
comparing said final key-value to a predetermined key;
passing said portion of said media device as authentic if said final key-value is equal to said predetermined key and repeating said reading, calculating and comparing steps failing said predetermined portion of said media device as authentic if said final key-value is not equal to said predetermined key and halting operation of said gaming machine. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification