Secure communications in gaming system
First Claim
Patent Images
1. A computer-implemented method of providing secure communications in a gaming system environment, the method comprising:
- receiving by at least one processor information;
producing by the at least one processor hashed information from the received information based on at least a key and a hash algorithm;
producing by the least one processor encrypted information from the received information based on the key and an encryption algorithm;
storing by the least one processor the encrypted information in a SQL database related to the hashed information;
receiving by the least one processor the hashed information and a request for the received information;
retrieving by the least one processor the encrypted information from the database; and
restoring by the least one processor the received information by relating the hashed information to the encrypted information and performing decryption based on the key and the encryption algorithm.
8 Assignments
0 Petitions
Accused Products
Abstract
Secure communications are provided in a gaming system environment using a hash manager to hash information, store the hashed information to a database, and to retrieve and unhash the information when needed. Information may include a user identifier, pass phrase and/or package of executable gaming machine instructions. This approach may provide security without requiring a user to reenter log in information (e.g., user identifier and/or pass phrase) during a login or security session.
-
Citations
19 Claims
-
1. A computer-implemented method of providing secure communications in a gaming system environment, the method comprising:
-
receiving by at least one processor information; producing by the at least one processor hashed information from the received information based on at least a key and a hash algorithm; producing by the least one processor encrypted information from the received information based on the key and an encryption algorithm; storing by the least one processor the encrypted information in a SQL database related to the hashed information; receiving by the least one processor the hashed information and a request for the received information; retrieving by the least one processor the encrypted information from the database; and restoring by the least one processor the received information by relating the hashed information to the encrypted information and performing decryption based on the key and the encryption algorithm. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A gaming management system, comprising:
-
at least one user input device operable to request information; at least one database; at least one server communicatively coupled to the at least one user input device and the at least one database, the at least one server configured to; receive information at a first time; and receive a request for the information at a second time; and a hash manager configured to; produce hashed information from the received information based on at least a key and a hash algorithm; produce encrypted information from the received information based on the key and an encryption algorithm; store the encrypted information in one of the databases related to the hashed information; retrieve the encrypted information from the database; and restore the received information by relating the hashed information to the encrypted information and performing decryption based on the key and the encryption algorithm. - View Dependent Claims (14, 15, 16)
-
-
17. A computer-implemented method of providing secure communications in a gaming system environment, the method comprising:
-
receiving by at least one processor a key and a package of executable gaming machine instructions; producing by the at least one processor hashed information from the received information based on the key and a hash algorithm; encrypting by the at least one processor at least the received package of executable gaming machine instructions based on the key to produce encrypted information; storing by the at least one processor the encrypted information in a SQL database related to the hashed information; retrieving by the at least one processor the encrypted information from the database; restoring by the at least one processor the package of executable gaming machine instructions by relating the hashed information to the encrypted information and performing decryption based on the key. - View Dependent Claims (18, 19)
-
Specification