Secure game download
First Claim
Patent Images
1. A method for a gaming terminal to authorize execution of downloaded software, comprising the steps of:
- running in the gaming machine a version of Microsoft Windows operating system having Software Restriction Policy capability, and setting the Software Restriction Policy to authorize execution of software code-signed with a certificate from a designated trusted party.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for gaming terminals, gaming kiosks and lottery terminals to ensure that the code-signing verification process of downloaded game software can be trusted. Drivers independently developed from the operating system supplier are embedded within the operating system kernel to verify that the micro-coded hardware components, the BIOS (808), the operating system components and the downloaded game software can be trusted.
239 Citations
141 Claims
-
1. A method for a gaming terminal to authorize execution of downloaded software, comprising the steps of:
-
running in the gaming machine a version of Microsoft Windows operating system having Software Restriction Policy capability, and setting the Software Restriction Policy to authorize execution of software code-signed with a certificate from a designated trusted party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 16, 17, 24, 106)
-
-
11. A method for a gaming terminal to authorize execution of downloaded software, comprising the steps of:
-
running an operating system that includes a configurable policy functionality for restricting code execution to code that has been signed by a designated trusted party;
configuring the restricting policy functionality to only authorize execution of software that is code-signed with a certificate from the designated trusted party. - View Dependent Claims (12, 13, 14, 15, 18, 19, 20, 21, 22, 23)
-
-
25. A method for operating a gaming machine comprising the steps of:
-
running an operating system loaded in the gaming machine;
downloading at least one software module into the gaming machine;
checking a code signature of at least one downloaded software module using a trusted verification driver, and authorizing execution of the downloaded software module in the gaming machine only if the downloaded software module is successfully verified by the trusted verification driver. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46)
-
-
47. A method for verifying gaming terminal software, comprising the steps of:
-
installing at least one driver into the gaming machine;
taking complete control of the gaming machine with the at least one driver;
verifying a legitimacy of all software and memory content in the gaming machine;
relinquishing control of the gaming machine, and authorizing the gaming machine to execute only of the software that is successfully verified. - View Dependent Claims (48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79)
-
-
80. A gaming machine, comprising:
-
at least one processor;
at least one data storage device;
a plurality of processes spawned by the at least one processor, the processes including processing logic for carrying out steps of;
running an operating system loaded in the gaming machine;
downloading at least one software module into the gaming machine;
checking a code signature of at least one downloaded software module using a trusted verification driver, and authorizing execution of the downloaded software module in the gaming machine only if the downloaded software module is successfully verified by the trusted verification driver. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100)
-
-
101. A gaming machine, comprising:
-
at least one processor;
at least one data storage device;
a plurality of processes spawned by the at least one processor, the processes including processing logic for carrying out steps of;
installing at least one driver into the gaming machine;
taking complete control of the gaming machine with the at least one driver;
verifying a legitimacy of all software and memory content in the gaming machine;
relinquishing control of the gaming machine, and authorizing the gaming machine to execute only of the software that is successfully verified. - View Dependent Claims (102, 103, 104, 105, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133)
-
-
134. A method for a gaming terminal to authorize execution of downloaded software, comprising the steps of:
-
running in the gaming machine a version of an operating system having Software Restriction Policy capability, and setting the Software Restriction Policy to authorize execution of software code-signed with a certificate from a designated trusted party. - View Dependent Claims (135, 136, 137, 138, 139, 140, 141)
-
Specification