Method of securing data on a portable gaming device from tampering
First Claim
Patent Images
1. A gaming device, comprising:
- writeable memory containing gaming data used to perform operations at the gaming device;
a first mechanism for determining whether the gaming device is a trusted device; and
a second mechanism for wiping the gaming data from the writeable memory when it is determined that the gaming device can no longer be trusted.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for securing select data on a gaming device are disclosed. The gaming device includes writeable memory such as RAM and/or hard drive that contains the select data. The select data may for example be gaming data associated with operating the gaming device. The gaming device also includes one or more mechanisms for determining whether it is a trusted device (e.g., whether it has been compromised). The gaming device also includes mechanisms for immediately removing the select data from writeable memory when it is determined that the gaming device is not trusted.
122 Citations
43 Claims
-
1. A gaming device, comprising:
-
writeable memory containing gaming data used to perform operations at the gaming device; a first mechanism for determining whether the gaming device is a trusted device; and a second mechanism for wiping the gaming data from the writeable memory when it is determined that the gaming device can no longer be trusted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for securing data on a gaming device, the method comprising:
-
storing data in writeable memory on a gaming device, the data including at least select data; at the gaming device, continuously determining whether the gaming device is trusted; and immediately removing at least the select data from writeable memory when it is determined that the gaming device is not trusted. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A method of securing data on a client device against tampering, comprising:
-
selecting data stored on a client device, the data including at least operational data associated with operating the client device, the operational data comprising executable code, binaries or resources; locally monitoring a client device to see if it has been compromised; and immediately removing the selected data from the client device when it is determined that the client has been compromised. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification