METHODS FOR ELECTRONIC DATA SECURITY AND PROGRAM AUTHENTICATION
First Claim
1. A gaming system comprising,a target device comprising:
- a first logic device designed or configured to
1) receive encrypted game data from a source device;
2) generate a first value by applying a first one-way function to the encrypted game data;
3) send the first value to an authorization device;
4) receive a decryption key from the authorization device for revealing game data from the encrypted game data;
5) generate a second value by applying a second one-way function to the game data;
6) send the second value to the authorization device,
7) receive an authorization message from the authorization device indicating whether the target device is authorized to use the game data;
8) generate a play of a wager-based game using the game data;
a display for displaying an outcome to the wager-based game;
a first communication interface for communicating with the source device and the authorization device;
a source device comprisinga memory for storing the game data;
a second logic device designed or configured to
1) receive an encryption key from the authorization device;
2) embed at least a portion of the encryption key in the game data;
3) to encrypt the game data embedded with at least the portion of the encryption key with the encryption key;
4) to send the encrypted game data to the target device;
a second communication interface for communicating with the authorization device and the target device;
the authorization device comprising;
a memory storing the game data wherein the game data is an authorized copy of the game data stored on the source device;
a third logic device designed or configured to receive a plurality of download requests and for each download request, a) to generate a new encryption key pair including the encryption key and the decryption key wherein the new encryption key pair is used only one time;
b) to embed at least the portion of the encryption key in the game data in the same manner as the source device;
c) to generate a third value by applying the second one-way function to the game data including the embedded encryption key;
d) to encrypt the game data embedded with at least the portion of the encryption key with the encryption key;
e) to generate a fourth value by applying the first one-way function to the encrypted game data;
f) to receive from the target device the first value, g) to compare the first value to the fourth value;
h) when it is determined the first value and the fourth value match, to send to the target device the decryption key, i) to receive from the target device, the second value;
j) to compare the second value to the third value;
k) when it is determined the second value and third value match, to send the authorization message to the target device indicating it is authorized to use the game data it received from the source device.
1 Assignment
0 Petitions
Accused Products
Abstract
Apparatus and methods for improving security and preventing tampering in a gaming system are described. In particular, the gaming system may comprise an authorization device that is configured to control a download of gaming data, such as an executable image for generating a game of chance, from a first gaming device to a second gaming device. For each download between two different devices, the authorization device may be operable to generate a unique encryption key pair utilized in the download and determine whether the downloaded data is authentic. The gaming device receiving the download of game data may be configured such that it doesn'"'"'t utilize the game data until an approval is received from the authorization device.
272 Citations
20 Claims
-
1. A gaming system comprising,
a target device comprising: -
a first logic device designed or configured to
1) receive encrypted game data from a source device;
2) generate a first value by applying a first one-way function to the encrypted game data;
3) send the first value to an authorization device;
4) receive a decryption key from the authorization device for revealing game data from the encrypted game data;
5) generate a second value by applying a second one-way function to the game data;
6) send the second value to the authorization device,
7) receive an authorization message from the authorization device indicating whether the target device is authorized to use the game data;
8) generate a play of a wager-based game using the game data;a display for displaying an outcome to the wager-based game; a first communication interface for communicating with the source device and the authorization device; a source device comprising a memory for storing the game data; a second logic device designed or configured to
1) receive an encryption key from the authorization device;
2) embed at least a portion of the encryption key in the game data;
3) to encrypt the game data embedded with at least the portion of the encryption key with the encryption key;
4) to send the encrypted game data to the target device;a second communication interface for communicating with the authorization device and the target device; the authorization device comprising; a memory storing the game data wherein the game data is an authorized copy of the game data stored on the source device; a third logic device designed or configured to receive a plurality of download requests and for each download request, a) to generate a new encryption key pair including the encryption key and the decryption key wherein the new encryption key pair is used only one time;
b) to embed at least the portion of the encryption key in the game data in the same manner as the source device;
c) to generate a third value by applying the second one-way function to the game data including the embedded encryption key;
d) to encrypt the game data embedded with at least the portion of the encryption key with the encryption key;
e) to generate a fourth value by applying the first one-way function to the encrypted game data;
f) to receive from the target device the first value, g) to compare the first value to the fourth value;
h) when it is determined the first value and the fourth value match, to send to the target device the decryption key, i) to receive from the target device, the second value;
j) to compare the second value to the third value;
k) when it is determined the second value and third value match, to send the authorization message to the target device indicating it is authorized to use the game data it received from the source device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification