SECURE COMMUNICATIONS IN GAMING SYSTEM
First Claim
Patent Images
1. A method of providing secure communications in a gaming system environment, the method comprising:
- receiving information;
producing a set of hashed information from the received information based on at least a key and a hash algorithm;
storing the hashed information in a database;
receiving the key and a request for the information;
retrieving the hashed information from the database; and
restoring the received information from the hashed information based on the key and the hash algorithm.
8 Assignments
0 Petitions
Accused Products
Abstract
Secure communications are provided in a gaming system environment using a hash manager to hash information, store the hashed information to a database, and to retrieve and unhash the information when needed. Information may include a user identifier, pass phrase and/or package of executable gaming machine instructions. This approach may provide security without requiring a user to reenter log in information (e.g., user identifier and/or pass phrase) during a login or security session.
-
Citations
36 Claims
-
1. A method of providing secure communications in a gaming system environment, the method comprising:
-
receiving information; producing a set of hashed information from the received information based on at least a key and a hash algorithm; storing the hashed information in a database; receiving the key and a request for the information; retrieving the hashed information from the database; and restoring the received information from the hashed information based on the key and the hash algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A gaming management system, comprising:
-
at least one user input device operable to request information; at least one database; at least one server communicatively coupled to the at least one user input device and the at least one database to; receive information at a first time; receive a request for the information at a second time; and a hash manager configured to; produce a set of hashed information from the received information based on at least a key and a hash algorithm; store the hashed information in one of the databases; retrieve the hashed information from the database; and restore the received information based from the hashed information based on the key and the hash algorithm. - View Dependent Claims (16, 17, 18, 19, 20)
-
-
21. A method of providing secure communications in a gaming system environment, the method comprising:
-
comparing a hash code of a package of gaming machine instructions to be copied with a stored hash code; and determining whether to allow copying of the package of gaming machine instructions based at least in part on a result of the comparison. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A method of providing security in a gaming system environment, the method comprising:
-
generating a hash code of a package of gaming machine instructions stored on a download distribution point server based on a first hash algorithm and a first key; verifying the package of gaming machine instructions stored on a download distribution point server against a hash code stored on a read-only processor-readable memory; and storing a result of the verification. - View Dependent Claims (29, 30, 31, 32, 33)
-
-
34. A method of providing secure communications in a gaming system environment, the method comprising:
-
receiving a key and a package of executable gaming machine instructions; hashing at least the received package of executable gaming machine instructions based on the key to produce a set of hashed information; storing the hashed information in a database; retrieving the hashed information from the database; restoring the package of executable gaming machine instructions from the retrieved hashed information based on the key. - View Dependent Claims (35, 36)
-
Specification