Dynamic configuration of a gaming system
First Claim
1. A method for a network connected gaming system to prevent unauthorized executable files of constituent computers of the gaming system from executing, comprising the steps of:
- packaging the authorized executable files into a code signed installation package;
configuring certificate rule policies to enable execution of the code signed installation package;
enforcing the policies, andexecuting the code signed installation package upon every startup of any of the constituent computers of the gaming system or upon a command, wherein execution of any authorized executable file is predicated upon successfully executing the code signed installation package into which the authorized executable file is packaged.
4 Assignments
0 Petitions
Accused Products
Abstract
A method to enable dynamic configuration of gaming terminals installed in one or a plurality of gaming premises whereby certified games, certified data files and certified support software components are activated in accordance with a predetermined schedule or automatically in response to the observed gaming activity. The method may include allocating an individual PKI certificate to each executable software component and each of its versions, binding the PKI certificate to the executable software, associating a distinctive policy for each certificate and then enforcing the software execution policies in accordance with the desired authorized game configuration and schedule. The PKI certificate'"'"'s “Subject Name” (or “Issued to” field or “CommonName” field) may be a concatenation of the software component identification, its version number and optionally other identification characters. The method applies equally to other network connected gaming subsystems. The method enables a fine-grained and secure control of the authorized software components and thus the flexibility to securely configure the gaming system in accordance with a schedule or in a close-loop fashion in order to meet business objectives. In addition, a method to enable the certification authority to bind the certificates to the tested code is described.
-
Citations
9 Claims
-
1. A method for a network connected gaming system to prevent unauthorized executable files of constituent computers of the gaming system from executing, comprising the steps of:
-
packaging the authorized executable files into a code signed installation package; configuring certificate rule policies to enable execution of the code signed installation package; enforcing the policies, and executing the code signed installation package upon every startup of any of the constituent computers of the gaming system or upon a command, wherein execution of any authorized executable file is predicated upon successfully executing the code signed installation package into which the authorized executable file is packaged. - View Dependent Claims (2)
-
-
3. A method for a network connected gaming system to prevent unauthorized executable code of constituent computers of the gaming system from executing, comprising the steps of:
-
packaging the authorized executable files into a code signed installation package; configuring certificate rule policies to enable execution of the code signed installation package; configuring enforcement of the policies, and re-installing the code signed installation package at every startup of any of the constituent computers of the gaming system or upon a command, wherein execution of any authorized executable file is predicated upon successfully executing the code signed installation package into which the authorized executable file is packaged. - View Dependent Claims (4)
-
-
5. A method for a network connected gaming system to prevent data of unauthorized non-executable files of constituent computers of the gaming system from affecting game outcome, comprising the steps of:
-
packaging the non-executable files into a code signed installation; configuring certificate rule policies to enable execution of the code signed installation package; configuring enforcement of the policies, and executing the code signed installation package upon every startup of any of the constituent computers of the gaming system or upon a command. - View Dependent Claims (6)
-
-
7. A method for trusting at least one authorized non-executable software component certified to comply with regulatory requirements downloaded into a network connected gaming system, the gaming system including a plurality of computers, the method comprising the steps of:
-
packaging the at least one non-executable file into at least one code signed installation package; configuring certificate rule policies to enable execution of the at least one code signed installation package; configuring enforcement of the policies, and re-installing the at least one code signed installation package at every startup of any of the constituent computers of the gaming system or upon a command. - View Dependent Claims (8)
-
-
9. A method for scheduling at least one authorized executable software component installed in a network connected gaming system, the gaming system including a plurality of gaming machines, the method comprising the steps of:
-
packaging at least one authorized non-executable file that controls the scheduling of the at least one authorized executable software component into at least one code signed installation package, each of the at least one code signed installation packages including a predetermined PKI certificate; configuring certificate rule policies to enable execution of the at least one code signed installation package in selected ones of the plurality of gaming machines; and configuring enforcement of the certificate rule policies; and downloading the at least one code signed installation package into the selected ones of the plurality of gaming machines; executing the at least one code signed installation package.
-
Specification