System and method for downloading electronic information to a video lottery terminal
First Claim
1. A gaming terminal, comprising:
- a memory configured to store a first resident security key and a first resident electronic information, the first resident security key being resident in the terminal;
a receiving component configured to receive a second encrypted electronic information from outside the gaming terminal and a second non-resident security key separately from the first resident security key and the second encrypted electronic information, the second non-resident security key being delivered to the gaming terminal;
a decrypting component configured to decrypt the second encrypted electronic information into a second decrypted electronic information in a process that requires at least the first resident security key and the second non-resident security key wherein the first resident security key decrypts the second encrypted electronic information into a first result and the second non-resident security key decrypts the first result into a second result and either the first resident security key or a separate security key decrypts the second result into the second decrypted electronic information; and
a processor configured to replace the first resident electronic information with the second decrypted electronic information.
5 Assignments
0 Petitions
Accused Products
Abstract
This invention relates to reprogramming of in-circuit programmable chips installed in video lottery terminals (VLTs) by downloading electronic information (software) to such chips. Encrypted electronic information is downloaded from a host device to a gaming terminal through a communications link. The terminal comprises a decryption component configured for decrypting the encrypted electronic information using at least two security keys, at least one said key being resident in the terminal and at least another said key being delivered to the terminal at the time of the downloading (the downloading facilitating a replacement of existing software in terminal with corresponding decrypted software obtained from decrypting the encrypted information). The encrypted information transmitted to the terminal comprises at least one next version key for later use by the decryption component in decrypting a next version of encrypted electronic information. The non-resident key may be provided to the terminal by means of an electronic plug-in security key or provided through a secure network.
40 Citations
47 Claims
-
1. A gaming terminal, comprising:
-
a memory configured to store a first resident security key and a first resident electronic information, the first resident security key being resident in the terminal; a receiving component configured to receive a second encrypted electronic information from outside the gaming terminal and a second non-resident security key separately from the first resident security key and the second encrypted electronic information, the second non-resident security key being delivered to the gaming terminal; a decrypting component configured to decrypt the second encrypted electronic information into a second decrypted electronic information in a process that requires at least the first resident security key and the second non-resident security key wherein the first resident security key decrypts the second encrypted electronic information into a first result and the second non-resident security key decrypts the first result into a second result and either the first resident security key or a separate security key decrypts the second result into the second decrypted electronic information; and a processor configured to replace the first resident electronic information with the second decrypted electronic information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A host, comprising:
-
an encryption component, the encryption component configured to encrypt a second decrypted electronic information into a second encrypted electronic information decryptable by a process that requires at least a first resident security key and a second non-resident security key, wherein the first resident security key decrypts the second encrypted electronic information into a first result and the second non-resident security key decrypts the first result into a second result and either the first resident security key or a separate security key decrypts the second result into the second decrypted electronic information, and wherein the second decrypted electronic information is configured to replace a first resident electronic information and the first resident security key is resident in a terminal separate from the host; and a transmitting component configured to transmit the second encrypted electronic information and the second non-resident security key separately. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
-
24. A method for securely downloading information to a gaming terminal, comprising:
-
receiving a second encrypted electronic information at the gaming terminal, a first resident security key being present at the gaming terminal; receiving a second non-resident security key separately from the second encrypted electronic information at the gaming terminal; decrypting the second encrypted electronic information into a second decrypted electronic information in a process that requires at least the first resident security key and the second non-resident security key wherein the first resident security key decrypts the second encrypted electronic information into a first result and the second non-resident security key decrypts the first result into a second result and either the first resident security key or a separate security key decrypts the second result into the second decrypted electronic information; and replacing a first resident electronic information with the second decrypted electronic information. - View Dependent Claims (25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A method for securely transmitting information from a host, comprising:
-
encrypting a second decrypted electronic information into a second encrypted electronic information, the second encrypted electronic information configured to be decryptable by a process that requires at least a first resident security key and a second non-resident security key, wherein the first resident security key decrypts the second encrypted electronic information into a first result and the second non-resident security key decrypts the first result into a second result and either the first resident security key or a separate security key decrypts the second result into the second decrypted electronic information, and wherein the second decrypted electronic information is configured to replace a first resident electronic information and the first resident security key is resident in a terminal separate from the host; transmitting the second encrypted electronic information; and transmitting the second non-resident security key separately from the second encrypted electronic information. - View Dependent Claims (40, 41, 42, 43, 44, 45)
-
-
46. A gaming terminal, comprising:
-
a memory configured to store a first resident security key, a second resident security key and a first resident electronic information, the first resident security key and the second resident security key both being resident in the terminal; a receiving component configured to receive a second encrypted electronic information from outside the gaming terminal and a non-resident security key separately from the first resident security key, the second resident security key and the second encrypted electronic information, the non-resident security key being delivered to the gaming terminal; a decrypting component configured to decrypt the second encrypted electronic information into a second decrypted electronic information in a process wherein three decryptions are performed one after another with the first resident security key, the second resident security key and the non-resident security key so that a first decryption begins with the second encrypted electronic information and each subsequent decryption begins with the outcome of the earlier decryption and the decrypted outcome is the second decrypted electronic information; and a processor configured to replace the first resident electronic information with the second decrypted electronic information. - View Dependent Claims (47)
-
Specification