Self-authenticating file system in an embedded gaming device
First Claim
1. A file system on an embedded gaming device, wherein access permissions to a directory or file on the file system are determined from the result of performing a cryptographic authentication sequence on at least one directory or file using at least one public key stored on the gaming device and metadata associated with the at least one directory or file.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for pre-load authentication suitable for use with an operating system in an embedded gaming device. A user-space file system that can automatically authenticate its contents is disclosed. The user-space file system can be deployed on a standalone system or using a client-server model such that a remote system server can coordinate with a local client to perform authentication. By moving the authentication into the file system functional block there is additional assurance that any game code or data stored in the file system cannot be accessed without first performing the required authentication.
37 Citations
10 Claims
- 1. A file system on an embedded gaming device, wherein access permissions to a directory or file on the file system are determined from the result of performing a cryptographic authentication sequence on at least one directory or file using at least one public key stored on the gaming device and metadata associated with the at least one directory or file.
-
4. A computerized wagering game apparatus, comprising:
- a computerized game controller having a processor, memory, random number generator, nonvolatile storage and at least one stored game data set;
an authentication program;
wherein the authentication program can verify a zero knowledge proof sequence consisting of a series of challenge/response pairs;
wherein the authentication program accesses at least one stored game data set in order to authenticate it;
wherein prior to loading the game data set into random access memory a bit stream based on at least one zero knowledge response is compared to a bit stream based on at least one zero knowledge challenge;
wherein verification comprises verifying that the zero knowledge proof sequence has been completed correctly.
- a computerized game controller having a processor, memory, random number generator, nonvolatile storage and at least one stored game data set;
-
5. A method for determining access permissions to a directory or file on an embedded gaming device comprising the steps of:
-
a. Setting up the protocol, which further consists of the steps of, i. generating a random number X to be used as the private key, ii. generating a public key PUB using the formula X2 mod M where M is a product of prime numbers selected for the protocol, iii. selecting N random numbers Q1 through QN, iv. generating challenges from these random numbers using the formula Cn=Qn2 mod M for each file to be authenticated, v. hashing the collection of N challenges and the file to be signed to obtain an abbreviated bit stream H, vi. generating responses for the first N bits of H for each challenge using alternate formulas;
if bit n=0, generate response Rn=Qn, or if bit n=1, generates response Rn=X·
Qn mod M,vii. establishing the challenges and responses collectively as the signature of the file; and b. Authenticating access to the file or folder by use of the protocol to verify that the originator of the signature of the file had knowledge of the private key which further consists of the steps of, i. hashing the collection of N challenges and the file to be authenticated to obtain an abbreviated bit stream H′
,ii. verifying that for the first N bits in H′
the challenges and the responses are correct using alternate formulas;
if bit n=0, verifying challenge Cn=Rn2 mod M, or if bit n=1, verifying response Rn2 mod M=Cn·
PUB mod M, where PUB is the public key and M is the product of prime numbers. - View Dependent Claims (6, 7, 8, 9, 10)
-
Specification