Gaming network
First Claim
1. A method for initializing communication between a network device and a host located on a gaming network, comprising:
- negotiating a first security association between the network device and the host to enable the network device and the host to be authenticated to each other;
using the first security association to generate a second security association to protect message traffic between the network device and the host.
5 Assignments
0 Petitions
Accused Products
Abstract
The gaming network described herein includes network security features, host security features, audit protocols, and design architecture approaches to reduce the possibility of network attacks. The gaming network provides for traffic confidentiality, encryption, message authentication, secure authentication mechanisms, anti-replay protection of traffic, key management mechanisms, robust network availability, misrouting and redirection protection and prevention, rejection of external traffic, and a high entry-barrier to device addition to the network. The host protection and security includes secure host initialization, disabling unneeded components, download verification, disabling of unused IP ports, discarding traffic, strong passwords, dynamic one-time passwords for remote login, disabling default accounts, and appropriate “least-level” device privileges. Audit requirements include integrity protection of audit logs, appropriate definition of auditable events, auditing of anomalous behavior, chain of evidence preservation, shutdown if audit disabled, full log entry audit, personal ID and time access audit trail, and auditing of internal user actions.
-
Citations
30 Claims
-
1. A method for initializing communication between a network device and a host located on a gaming network, comprising:
-
negotiating a first security association between the network device and the host to enable the network device and the host to be authenticated to each other;
using the first security association to generate a second security association to protect message traffic between the network device and the host. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A gaming network comprising:
-
a core layer comprising a server coupled to a first switch;
a distribution layer comprising a second switch coupled to the first switch;
an access layer comprising a third switch coupled to the second switch and to a gaming device;
an intrusion detector coupled to the network to detect attempts to attack the gaming network. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method of initializing a gaming network, comprising:
-
initializing a host of the gaming network;
associating IP addresses with MAC addresses of network devices coupled to the gaming network and/or with device IDs;
(DIDs) of devices associated with the network device;
monitoring changes to the IP/MAC/DID association of devices on the gaming network;
disabling a network device when its IP/MAC/DID association is changed. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A gaming network comprising;
-
a host server;
a switching network coupling the host to a plurality of network devices, the network devices including gaming machines;
first software executed on the host server, on the switching network, and on the plurality of network devices to protect message traffic on the gaming network;
second software independent of the first software for auditing all events on the gaming network;
storage means coupled to the host server for storing audit information generated by the second software.
-
-
29. A method for authenticating communication from a device on a gaming network comprising:
-
sending a communication from a device that includes a quality of service (QOS) request;
receiving the communication at a host server and comparing the QOS request to a permitted QOS request for the device;
authenticating the communication when the QOS request matches the permitted QOS request. - View Dependent Claims (30)
-
Specification