Software verification and authentication
First Claim
1. A system, comprising:
- a gaming machine comprising a storage medium that stores gaming software for the gaming machine, a processor configured to authenticate and execute the gaming software stored by the storage medium; and
an authentication agent apparatus external to the gaming machine and configured to transmit an authentication algorithm to said gaming machine, the authentication algorithm including instructions which the processor of the gaming machine executes to authenticate the gaming software stored in the storage medium; and
receive from the gaming machine an outcome of the processor executing and applying the authentication algorithm to the gaming software stored in the storage medium.
10 Assignments
0 Petitions
Accused Products
Abstract
A device for controlling electronic gaming machines comprises a single board computer (SBC) having a microprocessor, memory means, storage means and a ROM (Read Only Memory). The ROM includes: a loader program; verification program; an authentication program; and a presentation program. Additional Mass storage media in communication with the SBC store pre-verified and approved gaming software (program files) and related data files, each of which have a verification signature appended to them. Prior to usage of the gaming software, the program file software or data file is retrieved by the loader program and checked by the verification program which compares the verification signature with a newly calculated verification signature. If the newly calculated signature matches the verification signature, the requested file is deemed to be intact (a validated image).
34 Citations
15 Claims
-
1. A system, comprising:
-
a gaming machine comprising a storage medium that stores gaming software for the gaming machine, a processor configured to authenticate and execute the gaming software stored by the storage medium; and an authentication agent apparatus external to the gaming machine and configured to transmit an authentication algorithm to said gaming machine, the authentication algorithm including instructions which the processor of the gaming machine executes to authenticate the gaming software stored in the storage medium; and
receive from the gaming machine an outcome of the processor executing and applying the authentication algorithm to the gaming software stored in the storage medium. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method for authenticating gaming software stored in a gaming machine, the method comprising:
-
receiving, with the gaming machine, a plurality of instructions of an authentication algorithm transmitted by an external authentication agent; executing, with a processor of the gaming machine, the plurality of instructions to apply the authentication algorithm to the gaming software stored in the gaming machine; transmitting, an outcome of applying the authentication algorithm to the gaming software, from the gaming system to an authentication responder external to the gaming machine; and determining, at the gaming machine, whether the gaming software is authentic based upon a response received from the authentication responder in response to the transmitted outcome. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A gaming machine, comprising:
-
a data storage device configured to store gaming software; and a gaming controller configured to receive a plurality of instructions of an authentication algorithm from an authentication agent that is external to the gaming machine, execute the plurality of instructions to apply the authentication algorithm to the gaming software, transmit an outcome of applying the authentication algorithm to the gaming software to an authentication responder external to the gaming machine, and determine whether the gaming software is authentic based upon a response received from the authentication responder in response to the transmitted outcome. - View Dependent Claims (13, 14, 15)
-
Specification