Module validation
First Claim
Patent Images
1. In a networked gaming environment, a computer implemented method of providing security to a workstation having a processor and a processor-readable storage medium with a plurality of modules stored therein, the plurality of modules consisting of a first number (N, where 1<
- N) of modules, the method comprising;
executing a user-interface application with the processor of the workstation, the user-interface application being stored in the storage medium and having an application shell for a second number (M, where 1<
M≦
N) of modules, the second number of modules consisting of a number of the first number of modules of the plurality of modules, and the application shell providing a desktop window on a display device; and
for each one of the second number of modules,retrieving a respective module of the second number of modules from the storage medium and a corresponding respective authentic module validation indicator from a database of the user-interface application, the database stored in the storage medium,calculating a respective comparison module validation indicator based at least on the retrieved respective module,comparing the respective comparison module validation indicator with the respective authentic module validation indicator, andloading the respective retrieved module in the application shell only if the respective comparison module validation indicator and the respective authentic module validation indicator are the same.
4 Assignments
0 Petitions
Accused Products
Abstract
A module validation system and methods are disclosed for use with graphical user interfaces provided by a workstation that, among other things, remotely monitor and/or control game and/or gaming devices and/or systems. Validation of modules used in shells that provide graphical user interfaces enables the module validation system to provide users with varying levels of access to a gaming system.
493 Citations
19 Claims
-
1. In a networked gaming environment, a computer implemented method of providing security to a workstation having a processor and a processor-readable storage medium with a plurality of modules stored therein, the plurality of modules consisting of a first number (N, where 1<
- N) of modules, the method comprising;
executing a user-interface application with the processor of the workstation, the user-interface application being stored in the storage medium and having an application shell for a second number (M, where 1<
M≦
N) of modules, the second number of modules consisting of a number of the first number of modules of the plurality of modules, and the application shell providing a desktop window on a display device; andfor each one of the second number of modules, retrieving a respective module of the second number of modules from the storage medium and a corresponding respective authentic module validation indicator from a database of the user-interface application, the database stored in the storage medium, calculating a respective comparison module validation indicator based at least on the retrieved respective module, comparing the respective comparison module validation indicator with the respective authentic module validation indicator, and loading the respective retrieved module in the application shell only if the respective comparison module validation indicator and the respective authentic module validation indicator are the same. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- N) of modules, the method comprising;
-
9. A networked gaming system, comprising:
-
a network; a plurality of gaming machines coupled to the network; and a workstation communicatively coupled to the plurality of gaming machines via the network, the workstation comprising at least one processor and at least one processor-readable storage medium that stores a user-interface application having an application shell, a plurality of modules for the application shell, the plurality of modules consisting of a first number (N, where 1<
N) of modules, and instructions that cause the at least one processor to provide a respective graphical user interface, by;initializing the application shell for a second number (M, where 1<
M≦
N) of modules in response to input from a respective user of the plurality of users, the second number of modules consisting of a number of the first number of modules of the plurality of modules; andfor each respective module of the second number of modules, determining whether a respective user of the plurality of users is authorized for the respective module of the second number of modules, determining whether the respective module of the second number of modules is valid, and loading the respective module in the application shell only if both the respective module is valid and the respective user is authorized for the respective module. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A module validation system that validates modules used by a shell application providing a graphical user interface, comprising:
-
a processor-readable storage medium having a database and a plurality of modules stored therein and at least one client database having a respective authentic module validation indicator associated with a respective module included therewith; and a database module enumerator that retrieves a list of modules available for use by a respective user, and for each module in the list of modules, compares a respective comparison module validation indicator with a respective authentic module validation indicator, and loads the respective module in the shell application only if the respective comparison module validation indicator and the respective authentic module validation indicator are the same. - View Dependent Claims (16, 17, 18, 19)
-
Specification