×

METHODS FOR ELECTRONIC DATA SECURITY AND PROGRAM AUTHENTICATION

  • US 20080214300A1
  • Filed: 05/13/2008
  • Published: 09/04/2008
  • Est. Priority Date: 12/07/2000
  • Status: Abandoned Application
First Claim
Patent Images

1. A gaming system comprising,a target device comprising:

  • a first logic device designed or configured to

         1) receive encrypted game data from a source device;

         2) generate a first value by applying a first one-way function to the encrypted game data;

         3) send the first value to an authorization device;

         4) receive a decryption key from the authorization device for revealing game data from the encrypted game data;

         5) generate a second value by applying a second one-way function to the game data;

         6) send the second value to the authorization device,

         7) receive an authorization message from the authorization device indicating whether the target device is authorized to use the game data;

         8) generate a play of a wager-based game using the game data;

    a display for displaying an outcome to the wager-based game;

    a first communication interface for communicating with the source device and the authorization device;

    a source device comprisinga memory for storing the game data;

    a second logic device designed or configured to

         1) receive an encryption key from the authorization device;

         2) embed at least a portion of the encryption key in the game data;

         3) to encrypt the game data embedded with at least the portion of the encryption key with the encryption key;

         4) to send the encrypted game data to the target device;

    a second communication interface for communicating with the authorization device and the target device;

    the authorization device comprising;

    a memory storing the game data wherein the game data is an authorized copy of the game data stored on the source device;

    a third logic device designed or configured to receive a plurality of download requests and for each download request, a) to generate a new encryption key pair including the encryption key and the decryption key wherein the new encryption key pair is used only one time;

    b) to embed at least the portion of the encryption key in the game data in the same manner as the source device;

    c) to generate a third value by applying the second one-way function to the game data including the embedded encryption key;

    d) to encrypt the game data embedded with at least the portion of the encryption key with the encryption key;

    e) to generate a fourth value by applying the first one-way function to the encrypted game data;

    f) to receive from the target device the first value, g) to compare the first value to the fourth value;

    h) when it is determined the first value and the fourth value match, to send to the target device the decryption key, i) to receive from the target device, the second value;

    j) to compare the second value to the third value;

    k) when it is determined the second value and third value match, to send the authorization message to the target device indicating it is authorized to use the game data it received from the source device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×