Controlled access switch
First Claim
1. A controlled configuration and management system for monitoring and controlling one or more gaming devices in a gaming system on at least one gaming floor using a secure authentication procedure for authorizing devices to access the gaming system, the system comprising:
- an authentication server for determining if gaming devices are authorized to access the gaming system;
an authenticator coupled to the authentication server;
a gaming machine comprising at least one gaming device enabled for the secure authentication procedure of the controlled access system couple to the authenticator;
the gaming machine further comprising at least one gaming device non-enabled for the secure authentication procedure of the controlled access system; and
a controlled access switch coupled between the at least one non-enabled gaming device and the authenticator, wherein the controlled access switch operates as a front end to the secure authentication procedure for the at least one non-enabled gaming device wherein;
the at least one non-enabled gaming device is associated with a unique identifier;
the authentication server maintains a database of identifiers associated with authorized non-enabled gaming devices;
the secure authentication procedure comprises sending the identifier associated with the non-enabled gaming device to the authentication server via the authenticator; and
the authentication server either accepts or rejects the non-enabled gaming device based on the identifier associated with that device.
5 Assignments
0 Petitions
Accused Products
Abstract
A Controlled Access Switch (CAS) that can act as an 802.1x supplicant. The system implements server based software that uses SNMP and a database to insure that only secured non-802.1x capable devices are allowed access. The CAS allows an organization to use the CAS as a front end to non-802.1x capable devices such as printers and faxes and become the Supplicant in the 802.1x system. It then secures its ingress ports in coordination with the CAS Control Program running on a central site server.
74 Citations
4 Claims
-
1. A controlled configuration and management system for monitoring and controlling one or more gaming devices in a gaming system on at least one gaming floor using a secure authentication procedure for authorizing devices to access the gaming system, the system comprising:
-
an authentication server for determining if gaming devices are authorized to access the gaming system; an authenticator coupled to the authentication server; a gaming machine comprising at least one gaming device enabled for the secure authentication procedure of the controlled access system couple to the authenticator; the gaming machine further comprising at least one gaming device non-enabled for the secure authentication procedure of the controlled access system; and a controlled access switch coupled between the at least one non-enabled gaming device and the authenticator, wherein the controlled access switch operates as a front end to the secure authentication procedure for the at least one non-enabled gaming device wherein; the at least one non-enabled gaming device is associated with a unique identifier; the authentication server maintains a database of identifiers associated with authorized non-enabled gaming devices; the secure authentication procedure comprises sending the identifier associated with the non-enabled gaming device to the authentication server via the authenticator; and the authentication server either accepts or rejects the non-enabled gaming device based on the identifier associated with that device. - View Dependent Claims (2)
-
-
3. In a controlled access system using a secure authentication procedure for authorizing devices to access the system comprising:
- a device non-enabled for the secure authentication procedure and associated with an identifier, an authentication server, implementing a control program and maintaining a database of identifiers, for determining if devices are authorized to access the system, an authenticator coupled to the authentication server, and a controlled access switch coupled to the authenticator, a method for operating the system comprising;
coupling a device non-enabled for the secure authentication procedure to a port on the controlled access switch; the controlled access switch communicating with the control program on the authentication server via the authenticator; the authentication server checking the database for the identifier of the non-enabled device; if the identifier associated with the device is found in the database, authorizing the device to access the system; if the identifier associated with the device is not found in the database; notifying an administrator; if the administrator agrees to allow the device to access the system, authorizing the device to access the system; if the administrator does not agree to allow the device to access the system, denying the device access to the system. - View Dependent Claims (4)
- a device non-enabled for the secure authentication procedure and associated with an identifier, an authentication server, implementing a control program and maintaining a database of identifiers, for determining if devices are authorized to access the system, an authenticator coupled to the authentication server, and a controlled access switch coupled to the authenticator, a method for operating the system comprising;
Specification