Gaming machine having targeted run-time software authentication
First Claim
1. A method of authenticating memory devices'"'"' data within a gaming machine while said gaming machine is operating, said memory devices'"'"' data being authenticated substantially in parallel, said method of authenticating comprising:
- reading a next predetermined amount of data from a first memory device;
if said next predetermined amount of data is graphic data, then reading a next predetermined amount of data;
if said next predetermined amount of data is executable code, then authenticating said executable code.
9 Assignments
0 Petitions
Accused Products
Abstract
A gaming machine that authenticates its gaming software substantially continuously and repetitiously while the gaming machine is powered on. A processor, while running the gaming machine'"'"'s gaming program, determines whether the data in each of a plurality of memories is authentic. The processor may read multiple memories in a parallel fashion while making memory contents authenticity determinations. The processor may also read multiple memories in a serial fashion while making memory contents authenticity determinations. The processor may also read same memories in a parallel fashion and read other memories in a serial fashion while determining the authenticity of each memory'"'"'s contents. Furthermore, the contents of a memory may be analyzed to decipher between executable data and graphics data such that the executable data'"'"'s authenticity is determined more often than the graphics data'"'"'s authenticity
184 Citations
31 Claims
-
1. A method of authenticating memory devices'"'"' data within a gaming machine while said gaming machine is operating, said memory devices'"'"' data being authenticated substantially in parallel, said method of authenticating comprising:
reading a next predetermined amount of data from a first memory device;
if said next predetermined amount of data is graphic data, then reading a next predetermined amount of data;
if said next predetermined amount of data is executable code, then authenticating said executable code. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
11. In a gaming machine that is turned on, a method of repeatedly authenticating at least a first and a second memory substantially in parallel, said method comprising:
-
reading first data from said first memory and authenticating said first data, wherein reading first data from said first memory and authenticating said first data comprises;
reading a next file of said first data;
if said next file is a graphics data, then returning to said reading step;
if said next file is an executable code, then determining whether said executable file is authentic, then returning to said reading step until all of said first data in said first memory device has been read; and
reading second data from said second memory and authenticating said second data;
repeating said reading steps substantially continuously and substantially in parallel. - View Dependent Claims (12, 14, 15, 16, 17, 18, 19)
-
-
13. In said gaming machine, the method of claim 13, wherein said second memory is a high capacity storage memory.
-
20. A gaming machine comprising:
-
a user interface; and
a central processing unit (CPU) coupled to said user interface, said CPU comprising;
a processor;
a first memory coupled to said processor, said first memory adapted to contain gaming machine program code, said gaming machine program code comprising executable code and graphics data;
a second memory coupled to said processor, said second memory comprising data;
said gaming machine program code further comprises;
a plurality of instructions configured to cause said processor to determine the authenticity of said gaming machine program code and said data on a substantially continuous, repetitious basis such that the authenticity determination of said gaming machine program code is performed substantially in parallel with the authenticity determination of said data;
said plurality of instructions are further configured to cause said processor to determine, when reading said gaming machine program code, whether said processor is reading executable code or graphics data, if said processor reads graphics data, then said plurality of instructions cause said processor to not determine the authenticity of said graphics data unless more than a predetermined number of events have passed since the last time said graphics data was authenticated;
if said processor reads said executable code, then said plurality of instructions cause said processor to determine the authenticity of said executable code. - View Dependent Claims (21, 22)
-
-
23. A gaming machine comprising
a CPU, and a plurality of memory devices; -
said CPU adapted to determine the authenticity of data in at least two of said plurality of memory devices in a parallel, repeating fashion;
said CPU further adapted to read said data stored in at least one of said plurality of memory devices and determine whether said data is executable code or graphics data;
if said data stored in said at least one of said plurality of memories is graphics data, then said CPU is adapted to determine the authenticity of said graphics data if a predetermined number of events have passed;
if said data stored in said at least one of said plurality of memories is executable code, then said CPU is adapted to determine the authenticity of said executable code. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31)
-
Specification