Architecture for manufacturing authenticatable gaming systems
First Claim
Patent Images
1. A method comprising:
- manufacturing a console-based gaming system with authenticatable data stored in programmatically accessible memory, the authenticatable data having corresponding verification data; and
authenticating the console-based gaming system for online participation in a gaming service by receiving the authenticatable data from the console-based gaming system and utilizing the verification data to verify the authenticatable data.
2 Assignments
0 Petitions
Accused Products
Abstract
An architecture is described to manufacture console-based gaming systems in a manner that allows them to be authenticated to a remote entity for online participation. The architecture involves placing pre-established secrets on the game console during console manufacturing that may be subsequently used to guarantee the authenticity of the game console during registration time.
74 Citations
25 Claims
-
1. A method comprising:
-
manufacturing a console-based gaming system with authenticatable data stored in programmatically accessible memory, the authenticatable data having corresponding verification data; and authenticating the console-based gaming system for online participation in a gaming service by receiving the authenticatable data from the console-based gaming system and utilizing the verification data to verify the authenticatable data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
manufacturing a game console that includes a symmetric key stored in programmatically accessible memory; and using symmetric key cryptography to verify the symmetric key on the game console as a basis for authenticating the game console for online participation in a gaming service. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A method comprising:
-
manufacturing a game console that stores a verifiable certificate and a private key from a public key pair in programmatically accessible memory; and using public key cryptography to verify the verifiable certificate and the private key of the game console as a basis for authenticating the game console for online participation in a gaming service. - View Dependent Claims (17, 18)
-
-
19. A method comprising:
-
during manufacturing; assigning a console ID to each game console; randomly generating a symmetric key; storing the symmetric key and the console ID in programmatically accessible memory in the game console; encrypting the symmetric key using a public key of a public key pair to produce an encrypted symmetric key; maintaining the encrypted symmetric key and the console ID in a database; transferring the encrypted symmetric key and the console ID to a data center; during registration of the game console at the data center; receiving a proffered symmetric key and the console ID from the game console; locating a record using the console ID received from the game console, the record containing the encrypted symmetric key; decrypting the encrypted symmetric key using the public key cipher and a private key from the public key pair to recover the symmetric key; and evaluating the symmetric key recovered from the encrypted symmetric key with the proffered symmetric key received from the game console as a basis for authenticating the game console for online participation in a gaming service.
-
-
20. A method comprising:
-
prior to registration; generating a root public key pair having a root public key and a corresponding root private key; generating a root certificate that contains the root public key and is signed by the root private key; generating a certification authority (CA) public key pair having a CA public key and a corresponding CA private key; generating a CA certificate that contains the CA public key and is signed by the root private key; generating a console public key pair having a console public key and a corresponding console private key; generating a console certificate that contains the console public key and is signed by the CA private key; storing the console certificate and the console private key in programmatically accessible memory of a game console; during registration; receiving the console certificate and proof of knowledge of the console private key from the game console; using the root public key to verify the CA certificate and recover the CA public key; using the CA public key to verify the console certificate and recover the console public key; and using the console public key to evaluate the proof of knowledge of the console private key received from the game console for online participation in a gaming service.
-
-
21. A systems comprising:
-
a manufacturing-based computing system configured to write authenticatable data into programmatically accessible memory of a game console, the authenticatable data having corresponding verification data maintained separately from the game console; and an authentication computing system configured to authenticate the game console for online participation in a gaming service by receiving the authenticatable data from the game console and utilizing the verification data to verify the authenticatable data.
-
-
22. A system, comprising:
-
a manufacturing-based computing system configured to write a randomly generated symmetric key and a console ID into a programmatically accessible memory in the game console, the manufacturing-based computing system further storing the symmetric key in encrypted form; and an authentication computing system configured to authenticate the game console by receiving a proffered symmetric key and the console ID from the game console, the authentication computing system using the console ID to locate the symmetric key in encrypted form and then decrypting the symmetric key, the authentication computing system using the symmetric key to evaluate the proffered symmetric key received from the game console as a basis for authenticating the game console for online participation in a gaming service.
-
-
23. A system, comprising:
-
a manufacturing-based computing system configured to write a console certificate and a console private key into programmatically accessible memory of the game console, the console certificate being part of a certificate chain starting from a root certificate signed by a root private key, leading to the console certificate containing a console public key associated with the console private key; and an authentication computing system configured to authenticate the game console by verifying a proffered console certificate submitted by the game console using the certificate chain, the authentication computing system using the console public key from the console certificate to evaluate proof of knowledge of the console private key submitted by the game console for online participation in a training service.
-
-
24. A system, comprising:
-
writing means for writing an original symmetric key and a console ID into programmatically accessible memory of a game console; encryption means for encrypting the original symmetric key using a public key of a public key pair to produce an encrypted symmetric key; storage means for maintaining the encrypted symmetric key separately from the game console; and authentication means for authenticating the game console by comparing a proffered symmetric key submitted by the game console with the original symmetric key decrypted from the encrypted symmetric key to determine if the proposed symmetric key matches the original symmetric key for online participation in a gaming service.
-
-
25. A system, comprising:
-
certificate generation means for generating a certificate chain from a root certificate signed by a root private key to a console certificate associated with a game console, the console certificate containing a console public key from a console public key pair, writing means for writing the console certificate and a console private key from the console public key pair in programmatically accessible memory of the game console; and authentication means for authenticating the game console by verifying a proffered console certificate submitted by the game console using the certificate chain and if valid, extracting the console public key from the console certificate to evaluate proof of knowledge of the console private key submitted by the game console for online participation in a gaming service.
-
Specification