DYNAMIC CONFIGURATION OF A GAMING SYSTEM
First Claim
1. A method for a network connected gaming system to enable selective execution of at least one authorized software component, comprising the steps of:
- configuring Software Restriction Policies for the at least one authorized software component at a predetermined time;
unrestricting the Software Restriction Policies for the at least one authorized software component at a predetermined time;
enabling a link for the Software Restriction Policies for the at least one authorized software component at a predetermined time;
checking for a change of the Software Restriction Policies and if there is no policy change then looping to the beginning of this step, and enforcing the change of the Software Restriction Policies at a predetermined time.
0 Assignments
0 Petitions
Accused Products
Abstract
A method to enable dynamic configuration of gaming terminals installed in one or a plurality of gaming premises whereby certified games, certified data files and certified support software components are activated in accordance with a predetermined schedule or automatically in response to the observed gaming activity. The method may include allocating an individual PKI certificate to each executable software component and each of its versions, binding the PKI certificate to the executable software, associating a distinctive policy for each certificate and then enforcing the software execution policies in accordance with the desired authorized game configuration and schedule. The PKI certificate'"'"'s “Subject Name” (or “Issued to” field or “CommonName” field) may be a concatenation of the software component identification, its version number and optionally other identification characters. The method applies equally to other network connected gaming subsystems. The method enables a fine-grained and secure control of the authorized software components and thus the flexibility to securely configure the gaming system in accordance with a schedule or in a close-loop fashion in order to meet business objectives. In addition, a method to enable the certification authority to bind the certificates to the tested code is described.
-
Citations
26 Claims
-
1. A method for a network connected gaming system to enable selective execution of at least one authorized software component, comprising the steps of:
- configuring Software Restriction Policies for the at least one authorized software component at a predetermined time;
unrestricting the Software Restriction Policies for the at least one authorized software component at a predetermined time;
enabling a link for the Software Restriction Policies for the at least one authorized software component at a predetermined time;
checking for a change of the Software Restriction Policies and if there is no policy change then looping to the beginning of this step, and enforcing the change of the Software Restriction Policies at a predetermined time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
- configuring Software Restriction Policies for the at least one authorized software component at a predetermined time;
-
24. A method for a gaming terminal in a network connected gaming system to generate a list of authorized games available to the players comprising the steps of:
- enforcing Software Restriction Policy for preventing non-authorized software components from executing;
enforcing Software Restriction Policy for enabling execution of a selected set of authorized games;
attempting to execute each game, and adding games that have not been denied execution to a menu list. - View Dependent Claims (25, 26)
- enforcing Software Restriction Policy for preventing non-authorized software components from executing;
Specification