[go: nahoru, domu]

US20080220880A1 - Trusted Cabinet Identification System - Google Patents

Trusted Cabinet Identification System Download PDF

Info

Publication number
US20080220880A1
US20080220880A1 US12/109,064 US10906408A US2008220880A1 US 20080220880 A1 US20080220880 A1 US 20080220880A1 US 10906408 A US10906408 A US 10906408A US 2008220880 A1 US2008220880 A1 US 2008220880A1
Authority
US
United States
Prior art keywords
cabinet
trusted
network
components
gaming
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/109,064
Inventor
Fred Barrie
Harold K. Robb
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LNW Gaming Inc
Original Assignee
Bally Gaming Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/220,781 external-priority patent/US8392707B2/en
Priority claimed from US11/319,034 external-priority patent/US8118677B2/en
Priority claimed from US11/550,781 external-priority patent/US8708826B2/en
Application filed by Bally Gaming Inc filed Critical Bally Gaming Inc
Priority to US12/109,064 priority Critical patent/US20080220880A1/en
Assigned to BALLY GAMING, INC. reassignment BALLY GAMING, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ROBB, HAROLD K., BARRIE, FRED
Publication of US20080220880A1 publication Critical patent/US20080220880A1/en
Assigned to BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT reassignment BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT AMENDED AND RESTATED PATENT SECURITY AGREEMENT Assignors: BALLY GAMING, INC.
Assigned to BALLY GAMING, INC, ARCADE PLANET, INC., SHFL ENTERTAINMENT, INC, BALLY TECHNOLOGIES, INC., SIERRA DESIGN GROUP, BALLY GAMING INTERNATIONAL, INC. reassignment BALLY GAMING, INC RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS). Assignors: BANK OF AMERICA, N.A.
Assigned to SG GAMING, INC. reassignment SG GAMING, INC. CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: BALLY GAMING, INC.
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3202Hardware aspects of a gaming system, e.g. components, construction, architecture thereof
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3241Security aspects of a gaming system, e.g. detecting cheating, device integrity, surveillance

Definitions

  • the disclosed embodiments relate generally to identification, and more particularly, to a trusted device that provides cabinet identification to components with that cabinet.
  • gaming machines were stand-alone devices. Security of the gaming machines was accomplished via physical locks, security protocols, security personnel, physical and video monitoring, and the need to be physically present at a machine to attempt to breach the security of the gaming machine. By the same token, management of the gaming machines required a great deal of personal physical interaction with each gaming machine. The ability to change parameters of the gaming machine also required physical interaction.
  • gaming machines have become customizable via electronic communications and remotely controllable.
  • Manufacturers of gaming equipment have taken advantage of the increased functionality of gaming machines by adding additional devices and features to gaming machines, thereby maintaining a player's attention to the gaming machines for longer periods of time increasing minimum bet and bet frequency and speed of play. This, in turn, leads to the player wagering at the gaming machine for longer periods of time, with more money at a faster pace, thereby increasing owner profits.
  • gambling-related information may include, for example, information on sports betting and betting options for those sporting events. Additionally, the gambling-related information may also include information such as horse racing and off-track betting.
  • News and advertisements can also maintain a player's attention by providing the player with access to information ranging from show times, to restaurant and hotel specials, and to world events, thus reducing the need and/or desire of the player to leave the gaming machine.
  • the player may participate in a “premium” promotion where the player is registered with the gaming establishment as a club member when the player inserts an ID card into the gaming machines during play.
  • the player may be rewarded for certain play patterns (e.g. wager amounts, wager totals, payouts, time of play, or the like) and earn redeemable benefits or upgrade of club member status.
  • Attempts to distribute gambling-related information and advertisements to players and to allow the recognition of premium membership players have resulted in additional system components that may be attached to the gaming devices.
  • These components for accessing and displaying information for gaming machines may include a keypad, card reader, and display equipment.
  • Other internal components to the gaming cabinet have also been added, such as specialized processors and devices.
  • the amount of interactivity and data presentation/collection possible with current processor based gaming machines has led to a desire to connect gaming machines in a gaming network.
  • a number of devices associated with a gaming machine or with a group of gaming machines may be part of the network. It has become important for the devices within a gaming machine or cabinet to be aware of each other and to be able to communicate to a control server. Not only is the presence or absence of a network device important, but also the physical location of the device and the ability to associate devices within a particular gaming machine has become a necessary component of a gaming network.
  • a gaming network may have a large number of dynamically changing and reconfigurable components. Because of the desire to keep down-time to a minimum, it is important that the population of devices on the network be determinable and verifiable. In the past, this has meant pre-programming knowledge of all other devices into each device, so that communication between devices could take place. Such a requirement of pre-programming or pre-knowledge is too time consuming to be practical in a gaming network environment.
  • the current approach to identifying a slot machine relies on slot techs that manually enter the casino's house number (asset number) into the slot machine.
  • the disadvantage of this method is that it is very easy for a slot tech to put in the wrong address (a typo) or to duplicate a slot address.
  • To associate a device in the slot machine a slot technician either manually enters a house number into the device or a device in the slot machine may have a separate device id. This separate device id must be mapped by the host system to the slot machine. Both methods have the disadvantage of putting a wrong device id or duplicating a device id.
  • the current approach uses a slot technician to manually install public key certificates on a slot machine. This approach has the same limitation as above because if a device is removed for a slot machine, the slot technician must remember to re-associate the device to the slot machine.
  • the trusted cabinet identification device described herein provides unique cabinet identifiers and security features. More particularly, the trusted cabinet identification device is secured within a cabinet of a gaming machine that is linked to a central server over a network. The gaming machine includes a plurality of components to be identified within the cabinet. The trusted cabinet identification device includes an interface processor and a security device.
  • the interface processor communicates unique identifiers and encryption keys to one or more components to be identified within the cabinet.
  • the interface processor is capable of communicating in multiple protocols.
  • the security device stores unique identifiers and encryption keys, as well as performs security functions.
  • the trusted cabinet identification device enables components within the gaming cabinet to obtain unique identifiers and encryption keys as needed, and register with the central server over the network.
  • a method of identifying components within a gaming machine cabinet that is linked to a central server over a network includes: storing a unique cabinet identifier and encryption key, generating a digital signature from the encryption key, transmitting the unique cabinet identifier to a component to be identified within the cabinet upon power-up of the component, transmitting the digital signature to the component to confirm origin of the unique cabinet identifier, and enabling components within the gaming machine cabinet to register with a game floor manager system on the central server via the network.
  • FIG. 1 is a diagram of an embodiment of functional layers of a gaming network
  • FIG. 2 is a block diagram of an embodiment of a gaming network
  • FIG. 3 is a flow diagram of initialization of a network device in an embodiment of a gaming network
  • FIG. 4 is a flow diagram of traffic authentication in an embodiment of a gaming network
  • FIG. 5 is a flow diagram of an attack detection protocol in an embodiment of a gaming network
  • FIG. 6 is a flow diagram illustrating a network device initialization sequence in an embodiment of the gaming network
  • FIG. 7 is a block diagram illustrating examples of possible network attacks
  • FIG. 8 is a block diagram of a gaming machine configuration in an embodiment of the cabinet identification device
  • FIG. 9 is a flow diagram illustrating one embodiment of game machine device management using the cabinet identification device.
  • FIG. 10 is a flow diagram illustrating the transmission step of FIG. 9 ;
  • FIG. 11 is a flow diagram illustrating the identification step of FIG. 9 .
  • FIG. 12 is a flow diagram illustrating the communication step of FIG. 9 .
  • FIG. 13 illustrates a gaming machine with a legacy GMU and a trusted cabinet identification device connected to a game motherboard, and an iVIEW connected to the legacy GMU and the trusted cabinet identification device;
  • FIG. 14 illustrates a gaming machine with a legacy GMU and a trusted cabinet identification device connected to a game motherboard, and an iVIEW connected to the legacy GMU;
  • FIG. 15 illustrates a gaming machine with an IP network-based GMU and a trusted cabinet identification device connected to a game motherboard, and an iVIEW connected to the IP network-based GMU and the trusted cabinet identification device, all of which are connected to a controlled access switch;
  • FIG. 16 illustrates a gaming machine with a minimum configuration for the trusted cabinet identification device with a IP network-based GMU, a game motherboard, an iVIEW, and a controlled access switch;
  • FIG. 17 is a logical flow diagram illustrating a device powering up, retrieving a cabinet identifier, and registering with the slot floor system.
  • the disclosed embodiments are directed to a trusted cabinet identification device that provides a cabinet identifier and other security related information to various components associated with the gaming machine cabinet.
  • a trusted cabinet identification device that provides a cabinet identifier and other security related information to various components associated with the gaming machine cabinet.
  • the gaming network described herein proposes an architecture and system that provides an appropriate level of security from network attack.
  • the gaming network described herein provides additional protection to the network itself particularly when use of commercially based IP equipment is envisioned, above and beyond particular security protocols, for activities and transactions carried on the network.
  • the gaming network is independent of, and in addition to, security techniques for particular transactions or activities.
  • the network includes a core layer 101 over a distribution layer 102 above an access layer 103 .
  • the core layer 101 serves as a gateway between servers and the gaming devices.
  • the core layer 101 is contemplated to be a so-called “back end” layer that resides in an administrative location, separate from the gaming floor, for example, and protected physically and electronically.
  • the distribution layer 102 serves to collect traffic between the core layer 101 and the access layer 103 .
  • the distribution layer may comprise trunks and switches that route message and signal traffic through the network.
  • the access layer 103 provides a physical interface between the gaming machines (and any of their associated devices) and the rest of the network. This is done via managed switches.
  • the core layer 101 includes one or more servers 201 that are coupled via a communication path 202 to one or more switches 203 .
  • the servers and switches of the core layer 101 are located within the gaming establishment premises in a secure administrative area.
  • the servers 201 may, but are not required to be, game servers.
  • the communication path 202 may be hardwire (e.g., copper), fiber, wireless, microwave, Ethernet, wireless Ethernet, or any other suitable communication path that may be protected from attack.
  • the switches 203 are L2/L3 switches. However, one of ordinary skill in the art will appreciate that other types of switches may be used without departing from the scope or spirit of the disclosed embodiments.
  • the distribution layer 102 communicates with the core layer 101 via high bandwidth communications links 204 .
  • These links may be copper, fiber, Ethernet, wireless Ethernet, or any other suitable link. If desired, redundant links 205 may be built into the system to provide more failsafe operation.
  • the communications links 204 connect the core layer switches 203 to the distribution layer switches 206 . These may be one or more switches, such as L2 switches, for example.
  • the distribution layer 102 communicates with the access layer 103 via a high capacity communication link 207 .
  • the link 207 may be Ethernet, wireless Ethernet, wire, fiber, wireless, or any other suitable communication link.
  • the communication link 207 is coupled to a gaming carousel 208 that comprises a plurality of gaming machines (e.g., 16 gaming machines 215 A- 215 P).
  • a managed switch 209 is coupled to the link 207 to provide an interface switch to a plurality of other managed switches 210 through 213 .
  • each of the managed switches 210 - 213 manages four game machines 215 . It is understood that the types of switches may be changed without departing from the scope of the disclosed embodiments. Further, switches with more or fewer ports may be substituted and more or fewer tiers of switches in the access layer may be used, as well, without departing from the scope or spirit of the disclosed embodiments.
  • each game machine has its own managed switch.
  • the network uses TCP/IP sessions between the gaming machines 215 and the servers 201 .
  • the TCP/IP sessions are used to exchange private information concerning game operations, game performance, network management, patron information, revised game code, accounting information, configuration and download, and other sensitive information.
  • sessions may be a single message and acknowledgement, or the sessions may be an extended interactive, multiple transaction session.
  • Other instantiations may include UDP/IP, token ring, MQ, and the like.
  • intrusion detectors provide additional security.
  • there may be intrusion detectors located between each layer such as intrusion detector 220 located between the core layer 101 and the distribution layer 102 , and the intrusion detector 221 located between the distribution layer 102 and the access layer 103 .
  • certain sensitive locations or choke points may include intrusion detectors such as the intrusion detector 223 coupled to the switch 209 .
  • the intrusion detector 223 may disable the individual ports of switch 209 to isolate attacks while permitting continued operation of the remainder of the gaming network.
  • FIG. 8 is a block diagram of an example gaming machine configuration in one embodiment.
  • the gaming machine 215 communicates with the network (e.g. through a managed switch such as switch 210 ) via communications path 214 which may be Ethernet, wireless Ethernet, wire, fiber, wireless, or any other suitable communication link.
  • the gaming machine 215 may include a communications interface 801 that handles communication between the gaming machine and its associated devices and the remainder of the gaming network.
  • Communication interface 801 is coupled to a game monitoring unit (GMU) 802 .
  • GMU serves as the processor of the gaming machine.
  • An interface referred to as a “SMIB” 803 is coupled to the GMU and to the communication interface 801 .
  • SIB smart interface board or slot machine interface board
  • SMIB 803 is coupled to one or more peripherals or other devices connected to the gaming machine 215 , such as devices 804 A to 804 N of FIG. 8 .
  • SMIB 803 uses an Ethernet or other high-speed communications link to the communication interface 801 , GMU 802 , and devices 804 A through 804 N.
  • the SMIB includes switching capabilities.
  • the SMIB is implemented with a Mastercom 300 .
  • the gaming network may use a number of network services for administration and operation.
  • Dynamic Host Configuration Protocol (DHCP) allows central management and assignment of IP addresses within the gaming network.
  • the dynamic assignment of IP addresses is used in one embodiment instead of statically assigned IP addresses for each network component.
  • a DNS domain name service
  • DNS servers are well known in the art and are used to resolve the domain names to IP addresses on the Internet.
  • NTP Network Time Protocol
  • RMON Remote Monitoring
  • SNMP simple network management protocol
  • SNMPv3 is used to take advantage of embedded security mechanisms to mitigate malicious attacks made against the configuration management function.
  • TFTP vial file transfer protocol
  • the network may be implemented using the IPv6 protocol designed by the IETF (Internet Engineering Task Force).
  • IPv6 IPv6 protocol designed by the IETF (Internet Engineering Task Force).
  • QoS Quality of Service
  • the network may take advantage of the Quality of Service (QoS) features available with IPv6.
  • QoS refers to the ability of a network to provide a guaranteed level of service (i.e. transmission rate, loss rate, minimum bandwidth, packet delay, etc).
  • QoS may be used as an additional security feature in that certain transactions may request a certain QoS as a rule or pursuant to some schedule. Any fraudulent traffic of that nature that does not request the appropriate QoS is considered an attack and appropriate quarantine and counter measures are taken.
  • IPv4 Type of Service capabilities of IPv4 may also be used in a similar manner to provide additional security cues for validation of transactions.
  • ToS Type of Service
  • certain types of transactions may be associated with a particular specific ToS or a rotating schedule of ToS that is known by network monitors.
  • the traffic content varies in size and sensitivity.
  • Messages may comprise transactional messages related to game play, such as coin-in.
  • Other messages may be related to management, administration, or sensitive information, such as administrator passwords, new game code, pay tables, win rates, patron personal data, or the like.
  • the gaming network includes network security features, host security features, audit protocols, and design architecture approaches to reduce the likelihood of success of network attacks. Where attacks cannot be prevented, the gaming network attempts to make such attacks expensive in terms of the computational power required, the time, risk, effect, and duration of the attack. Identification of attacks and the rapid recovery from such attacks should be emphasized, as should the limiting of the effect of any attacks.
  • the gaming network provides for traffic confidentiality. All nodes within the network exchange information that is confidentially protected.
  • One method for providing confidentially protected data is by using encryption.
  • a number of encryption schemes may be used, such as an FIPS approved encryption algorithm and an NIST specified encryption mode, such as the Advanced Encryption Standard (AES).
  • AES Advanced Encryption Standard
  • a suitable message authentication mechanism may be, for example, an FIPS approved algorithm such as the Keyed-Hash Message Authentication Code (HMAC) and SHA-1. All nodes automatically drop messages that have been replayed. As noted above, replayed messages are a means of attack on network security.
  • HMAC Keyed-Hash Message Authentication Code
  • Key management mechanisms should be sufficient to resist attack.
  • a 1024 bit Diffie-Hellman key exchange with a 1024 bit DSA/RSA digital signature is used to render key attacks computationally infeasible.
  • the key sizes are given as examples only. Smaller or greater key size can be used in the gaming network as security recommends.
  • the gaming network should be robust, maintaining the availability of critical services.
  • the network should include protection against misrouting and also discard any traffic that has a source or destination outside of the network.
  • the gaming network should also require a minimum level of authentication and assurance before permitting an additional device on the network and prevent such connection when the assurance is not provided.
  • Host protection and security includes secure host initialization where the host performs a self-integrity check upon power-up initialization. All operating system components that are not needed are disabled. When software patches are downloaded to the gaming network, the host verifies them. The host checks for unused IP ports and disables them prior to connecting to the gaming establishment network. When processing network traffic, any traffic not addressed to the host is dropped from the processing stack as soon as possible. In the gaming network, all service, guest, and default administrator accounts that may be part of the operating system are disabled. In one embodiment, one-time passwords and/or multi-part passwords are used for remote login, if remote login is enabled. The one-time password may itself be a multi-part password.
  • Audit requirements include integrity protection of audit logs from date of creation and throughout their use.
  • Events that are audited in an embodiment of the gaming network include account logon events (both success and failure), account management (both success and failure), directory service events (failure), logon events (success and failure), object access (failure), policy changes (success and failure), privilege use (failure), system events (success and failure), access to a host or networking device logged by user name and the time of access, and all other internal user actions.
  • Anomalous behavior is audited and logged for purposes of evidence for law enforcement and/or attack recognition. Audit information is collected and stored in a secure manner to preserve the chain of evidence. If there is a failure of the audit system, automatic shutdown is initiated.
  • the gaming network is designed so that there is no single point of failure that would prevent remaining security features from operating when one is compromised.
  • the gaming network also will continue to operate in the event of bridging to another network, such as the Internet.
  • the gaming network provides confidence that a network device is contacting a legitimate DHCP server rather than a spoofed server.
  • the gaming network uses Internet Key Exchange (IKE) in one embodiment.
  • IKE Internet Key Exchange
  • Phase I of IKE includes two modes, referred to as “main mode” and an “aggressive mode”.
  • Phase II has a single mode referred to as “quick mode”.
  • Main mode takes six packets to complete while aggressive mode takes 3 packets.
  • Quick mode takes 3 packets to complete.
  • Phase I is used for initialization and Phase II is used to create security for subsequent traffic and messages.
  • FIG. 3 is a flow diagram illustrating the initialization of a network device using main mode of Phase I.
  • Phase I is used to authenticate devices to each other and to protect subsequent Phase II negotiations.
  • the network device is referred to as the initiator and the server is referred to as the responder.
  • the initiator sends a first IKE packet to the responder.
  • the packet may or may not include vendor ID's (VID) that can inform the responder of the extensions the initiator supports.
  • VIP vendor ID's
  • Each IKE message includes a mandatory Security Association (SA) that defines how to handle the traffic between the two devices.
  • SA of the initial packet lists the security properties that the initiator supports, including ciphers, hash algorithms, key lengths, life times and other information.
  • the responder replies with an IKE packet that may or may not include a VID, but does include a mandatory SA payload. At this stage, the packets are not encrypted because there is still no key for encryption.
  • the third packet is from the initiator to the responder and uses the Diffie-Hellman key exchange protocol.
  • the packet contains a key exchange (KE) payload, a NONCE payload, and a certificate request (CR) payload.
  • KE key exchange
  • NONCE NONCE
  • CR certificate request
  • the public keys are created whenever the phase I negotiation is performed and are destroyed when the phase I SA is destroyed.
  • the NONCE payload is a large random number that has not been used before on the network (“never-used-before”) and is useful in defeating replays.
  • the CR payload includes the name of the Certification Authority for which it would like to receive the responder's certificate. (Note that the CR can be sent in the third and fourth packets or in first and second packets, as desired).
  • the responder returns its own KE, NONCE, and CR in the fourth packet.
  • the third and fourth packets are used by each device to generate a shared secret using public key algorithms. Because only public keys are sent in this exchange, and no encryption key is yet available, the messages are still not encrypted.
  • the initiator uses the KE to generate a shared secret and uses it to encrypt the fifth message.
  • the fifth message includes an Identification (ID) payload, zero or more certificate (CERT) payloads (or CRL) and a Signature payload (SIG) that is the digital signature that the responder must verify.
  • ID payload is used to tell the other party who the sender is and may include an IP address, FQDN (fully qualified domain name), email address, or the like. In an embodiment of the gaming network, it is an IP address.
  • the CERT payload is optional if the initiator or responder cache the public key locally. In an embodiment of the gaming network, the public key is not cached locally and failure to receive a CERT payload is a failure of the negotiation.
  • the SIG payload includes the digital signature computed with the private key of the corresponding public key (sent inside the CERT payload) and provides authentication to the other party.
  • the responder sends a message with its ID, CERT, and SIG payloads.
  • the initiator and responder have successfully verified the other party's SIG payload, they are mutually authenticated.
  • the result of the successful negotiation is the Phase I SA.
  • phase II negotiation can proceed to create SA's to protect the actual IP traffic with an IPsec protocol.
  • Each of the phase II packets are protected with the phase I SA by encrypting each phase II packet with the key material derived from phase I.
  • Phase II in the gaming network is illustrated in FIG. 4 .
  • the initiator sends a message with a number of payloads.
  • the message includes SA and NONCE payloads that are the keying material used to create the new key pair.
  • the NONCE payload includes random never-used-before data.
  • the SA payload is the phase II proposal list that includes the ciphers, HMACs, hash algorithms, life times, key lengths, IPsec encapsulation mode, and other security properties.
  • the message may include IDi (initiators ID) and IDr (responders ID), which can be used to make local policy decisions.
  • the responder replies with a message with the same payload structure as the first message.
  • the initiator replies with a HASH value at step 403 .
  • the result is two SA's. One is used for inbound traffic and the other for outbound traffic.
  • Rekeying is done when the lifetime of the SA used for protecting network traffic expires.
  • PFS perfect forward secrecy
  • the network ensures the set of secret keys generated by one protocol message exchange is independent of the key sets generated by the other protocol message exchanges. This means compromise of one key set does not lead to compromise of the other sets. Additional protection for network traffic is provided by use of a “virtual private network” (VPN). As a result, all network traffic is protected, and not just TCP/IP traffic.
  • VPN virtual private network
  • the network may be constrained to a particular regulatory jurisdiction.
  • a regulatory jurisdiction has its own private key and a multi-tiered approach is used to validate devices.
  • a combination key at an administrative location is used to sign messages and data. If there are attempts to communicate outside the jurisdiction, the lack of the regulatory jurisdiction key prevents communication. This is another security feature that is used to limit inside and outside attacks on the gaming network.
  • the system uses a secure key server to store private keys and certificates.
  • the secure key server requires multi-part passwords as described above for access and enablement.
  • the secure key server is resistant to network or Internet attacks, denial of service attacks, and other software or protocol attacks.
  • the secure key server is also resistant to physical attacks such as forced break-in attempts, changes in temperature, changes in pressure, vibration, and attempts to disassemble the secure key server. In one embodiment, any attack attempt results in the destruction of stored keys, certificates, etc, to prevent compromise of the system.
  • a physical transfer of certificates may be implemented as an additional security protection.
  • No game machine or other device may be added to the system without a physical visit and installation of a certificate.
  • a mere handshaking protocol is not sufficient to add a device onto the system. Rather, a potential new device will require a trusted person or persons to activate the device, install an appropriate certificate, and add it to the network.
  • the gaming network uses IKE, IPsec, and VPN to protect legitimate traffic from mischief.
  • the gaming network also provides systems to block illegitimate traffic.
  • Firewalls are installed at choke points within the access and distribution layers to isolate network segments from one another. Firewalls can limit the spread of damage from propagating beyond the compromised network segment.
  • the use of NONCE never-used-before random numbers also prevents illegitimate traffic by blocking replay of legitimate messages. IKE and protection of all post-initialization traffic makes it more difficult for illicit messages to achieve successful delivery.
  • the gaming network reduces the possibility of access to the network by blocking all unused IP ports. Only IP ports required for gaming operation are enabled.
  • private IP addresses are used. Typically IP addresses provide global uniqueness with the intention of participating in the global Internet. However, certain blocks of addresses have been set aside for use in private networks. These blocks of IP addresses are available to anyone without coordination with IANA or an Internet registry. Since multiple private networks may be using the same block of IP addresses, they lack global uniqueness and are thus not suitable for connection on the global Internet. Private network hosts can communicate with all other hosts inside the private network, both public and private. However, they cannot have IP connectivity to any host outside of the enterprise. Allocation of private network IP addresses may be accomplished pursuant to RFC 1918 protocol.
  • the volume of network traffic is monitored at each link and compared to expected flow rates and/or historical flow rates. Histograms may be generated so that analysis and comparison of flow rates may be accomplished. Heuristic algorithms may be implemented to determine if the flow rate is within an acceptable range. If not, a data leak or attack is assumed and appropriate alarms are triggered. Heavy flow areas can be disabled so that appropriate investigation can be made.
  • IDS sensors and/or intrusion prevention systems are installed between the core, distribution, and access layers. IDS and intrusion prevention sensors may also be installed at choke points within the access and distribution layers to detect malicious traffic within these layers.
  • IDS Intrusion detection system
  • One suitable IDS is “arpwatch” (www.securityfocus.com/tools/142) that monitors IP address changes, MAC addresses, flow rate changes, and other network activity and can be configured to notify an administrator when IP/MAC/DID address bindings (e.g. the combination of game machine DID and/or one or more associated device DIDs) change for a device on a gaming network. When a change is detected, automatic isolation procedures may be implemented to isolate the possible intrusion. Subsequent analysis and review by network administrators can determine appropriate responses.
  • the system may keep a physical map of the location of the IDS sensors so that when an intrusion is detected, the physical location of the attack can be immediately identified. Security can be dispatched to the location to apprehend the attackers, appropriate systems may be shut down or disabled, and perimeter measures can be taken to increase the chances of securing the attacker.
  • FIG. 5 is a flow diagram of one embodiment of the operation of the intrusion detection system of the gaming network.
  • the gaming network is initialized and IP addresses are assigned to network devices. This may be accomplished using the technique described in FIGS. 3 and 4 or by any other suitable technique.
  • a mapping of the IP addresses of the network devices, their respective MAC addresses, and the DID is performed. This binding should remain stable through a session unless the core layer specifically initiates a change or if a regularly scheduled or anticipated change occurs.
  • the system monitors the network. Such monitoring may be accomplished by any suitable means for tracking IP/MAC/DID mapping. As noted above, one such method includes Arpwatch.
  • decision block 504 it is determined if there has been any change to the IP/MAC/DID mapping. If the answer is no, the system continues monitoring the network at step 503 . If the answer is yes, meaning that there has been some change in IP/MAC/DID mapping, the system disables the IP address and the network device associated with the MAC address and DID in question at step 505 . This step of disabling may also include shutting down ports or sections of the network to contain or limit any presumed attack on the network. The system notifies the administrator at step 506 so that analysis and correction may begin.
  • the mapping may be between any two of the parameters IP address, MAC, and DID.
  • the DID of the gaming machine may be used exclusively.
  • the DID of an associated device such as a reel controller, LED controller, CPU, safeRAM, hard drive, physical cabinet, printer, or other associated devices may be used singly or in combination with the gaming machine DID.
  • Each associated device may have a unique ID (such as a 32 bit hex value) so that the combination of game machine DID and/or one or more associated device DID's results in a unique ID that is difficult to duplicate. Fraudulent communications that lack the requisite binding will be detected easily. Further, malicious hardware that attempts to join the network will lack not only the correct device ID's but also the combination bindings described above.
  • the DHCP server is pre-loaded with a list of valid IP addresses, MAC addresses, machine and associated device DIDs, and IP/MAC/DID bindings. If the game machine requesting initialization or permission to join the network is not on the pre-determined list, the machine is not permitted on the network and an attack is logged. An alarm can be triggered so that the attacker can be identified and captured when possible.
  • GUIDs globally unique identifiers
  • the switch could be at the game cabinet level, a bank of machine level, and/or a casino level.
  • the GUID is used to positively identify a valid managed switch.
  • each managed switch is what is referred to herein as a “collection” of devices associated with that switch.
  • the DIDs and MAC addresses can be used to identify the devices as being valid members of the collection.
  • the dynamically assigned IP address can then be mapped to the collection so that the members of the network are known, and communication with the collection and its constituent devices can occur.
  • the IP addresses can be subnet IP addresses for members of the collection if desired.
  • GUIDs are registered at network creation and when valid devices are added to the system. Once registered, dynamically assigned IP addresses can be properly mapped for communication using the IP address if desired. In another embodiment, each network device has its own GUID that is registered and may be mapped to a dynamically assigned IP address. If desired, the bindings described above may be implemented even with dynamically assigned IP addresses, once the proper mapping has been made using GUIDs.
  • Another embodiment takes advantage of GUIDs to create logical collections instead of physical collections.
  • a logical collection may be disparate physically but may be useful for certain management, reporting, or game play operations.
  • By being able to uniquely identify devices and collections it is possible to create filters that allow communication with subsets of network devices at levels from single devices to collections to all devices and anywhere in between.
  • An additional security feature of the gaming network requires a secure boot sequence within each gaming machine and server such that an initial boot is accomplished using code residing in unalterable media.
  • the initial boot code verifies the operating system and all network services it includes. Consequently, network services will not be enabled until the full operating system has been verified as legitimate.
  • FIG. 6 is a flow diagram illustrating the boot initialization of a network device, such as a gaming machine in one embodiment of the gaming network.
  • the device boots from a locally stored unalterable media.
  • the network device establishes security for communication with a network host. This may be accomplished by the IKE phase I method described in FIG. 3 . Once secure host communication is established, traffic security is established at step 603 . This may be accomplished by IKE phase II, as described in FIG. 4 .
  • the network device submits its operating system for verification. Such verification may be by any desirable method and may be in addition to other network security features.
  • the host receives the verification request and checks the operating system of the network device.
  • the network device contains a legitimate operating system. If not, the device is disabled at step 607 . This process may initiate notice to a network administrator, as well as, disabling of some portion of the network associated with the device in an attempt to mitigate damage from an attack. If the operating system of the network device is legitimate at step 606 , the host enables the appropriate network services for the network device at step 608 and operation begins. As noted above, all traffic is protected in the gaming network to some degree. In addition, some traffic includes additional security checks.
  • the game machine provides a secure boot and initial O/S verification as follows.
  • EPROM verification software resides within an input/output processor (IOP).
  • the verification software verifies all EPROMs on the IOP board (i.e., mains and personalities) upon application of power to the game machine.
  • the BIOS+ performs a self-verification on all of its code.
  • the board e.g. a Pentium class board
  • the board begins executing code from the BIOS+ contained in the conventional ROM device. This process verifies the conventional ROM device and detects any substitution of the BIOS+.
  • the BIOS+ Upon boot-up of the processor, the BIOS+ executes a SHA-1 verification of the entire O/S that is presented.
  • the digital signature is calculated and compared with an encrypted signature stored in a secure location on the game machine using, for example, the RSA private/public key methodology. If the signatures compare, the BIOS+ allows the operating system to boot, followed by the game presentation software. Next, display programs and content are verified, before being loaded into the IOP RAM to be executed for normal game operation.
  • each message is protected using the security of the gaming network.
  • certain messages incorporate additional security checks even if the package is considered trustworthy.
  • code downloads may require that they be cryptographically signed and verified before executing.
  • the digital signature for the code is independent of and in addition to the authentication provided by VPN and the other network security features.
  • the gaming network implements increasing number versioning of network downloaded updates so that rollback attempts may be mitigated or eliminated.
  • the gaming network includes wireless intrusion detection mechanisms detecting, for example, 802.1.1a/b/g devices. Such detection has scope beyond network attacks and may detect wireless attacks on the gaming establishment, even if not specifically targeting the gaming network.
  • One embodiment provides a process for identifying devices coupled to a game machine. This process is described in FIG. 9 .
  • each device e.g. devices 804 A- 804 N
  • the address is received by a switch in the game machine (e.g. the SMIB 802 ) and a table of addresses of associated devices is assembled. This table is made available to the devices in the game machine so that the IP addresses of other devices within the gaming machine become available to each device.
  • each device identifies itself to other devices in the gaming machine.
  • a verification process is initiated so that it can be determined if the devices are valid devices on the network.
  • devices may begin to transmit data between themselves and to the core layer or other back-end server of the network.
  • any network-connected device inside the gaming machine will attempt to communicate with the network at step 1002 by sending its MAC/IP address via the SMIB or other switching device.
  • the nature of this initial communication may be for a DHCP or BOOTP configuration, an ARP request, or any other attempt to identify itself to the back-end system.
  • the MAC/IP addresses that are part of these communication attempts are added at step 1003 to a table. This table is managed by the SMIB 803 in one embodiment, or by the GMU 802 in another embodiment.
  • a table will be generated that contains the MAC/IP addresses of all of the devices in the gaming machine.
  • the devices send only their MAC addresses but the switch or other management device associates an IP address with each MAC address to populate a table. This embodiment may be used when IP addresses are assigned dynamically as described above.
  • the switch or GMU periodically transmits raw Ethernet frames, USB packets, or TCP packets that include a list of the attached MAC/IP addresses associated with that game machine.
  • the frame is sent on a regular basis (e.g. every three to five seconds) so that other devices can expect that frame and react appropriately if it is not received.
  • the transmitted frame is sent to switches and game machines on the network.
  • the transmission is via User Datagram Protocol (UDP) but any suitable protocol may be used without departing from the spirit and scope of the disclosed embodiments.
  • UDP User Datagram Protocol
  • game machine devices need only be able to recognize the frame to take action.
  • Eventually all of the MAC/IP addresses of game machine devices are published throughout the network. In this embodiment, there is no necessity of flooding the network with broadcasts frames with address information. This information is distributed organically throughout the network.
  • the process in one embodiment is an ongoing process, shown by the return path from step 1005 to step 1002 in FIG. 10 .
  • the tables are rebroadcast periodically by the switch. This rebroadcast allows devices to learn about other new devices that have been added to the network. The rebroadcast also allows a device to know when another device has left the network. At this point in the process the information being collected is pre-authentication. It allows a list of possible devices to be known and addressable so that if the device is valid and authenticated, it can participate on the network.
  • the identification process 802 is described in conjunction with FIG. 11 .
  • a device receives a MAC/IP transmission frame from the switch at step 1101 . This is an ongoing process during runtime as the switch periodically transmits Ethernet frames containing updated and new MAC/IP address information as described above.
  • the device identifies other devices within the same game machine or cabinet from information in the Ethernet frame.
  • the device initiates an identification communication with one or more other devices in the game machine.
  • the form of this transmission at step 1104 may be as simple as sending an “I'm here” message.
  • the identification message may include identification information about the device at step 1104 . This information may include information such as the port address, device ID, a preferred communication protocol, and the like. In other embodiments, such information is provided during communication negotiations.
  • the verification procedure is intended to establish that the device with which another device is communicating is a valid gaming device.
  • verification may be accomplished by using the protocol described herein in connection with FIGS. 3 and 4 . Any suitable verification protocol may be utilized without departing from the scope and spirit of the disclosed embodiments.
  • In-cabinet devices have similar security concerns as other network devices described herein.
  • a verification method such as is described in pending U.S. patent application Ser. No. 10/243,912, filed on Sep. 13, 2002, and entitled “Device Verification System and Method”, assigned to the assignee of the disclosed embodiments, and incorporated by reference herein in its entirety.
  • the disclosed embodiments provide a system and method for verifying a device by verifying the components of that device.
  • the components may comprise, for example, software components, firmware components, hardware components, or structural components of an electronic device.
  • These components include, without limitation, processors, persistent storage media, volatile storage media, random access memories, read-only memories (ROMs), erasable programmable ROMs, data files (which are any collections of data, including executable programs in binary or script form, and the information those programs operate upon), device cabinets (housings) or cathode ray tubes (CRTs).
  • Identification numbers or strings of the components are read and then verified. The process of verifying may comprise matching each identification number in a database to determine whether each identification number is valid.
  • verification of that file in effect, comprises verifying part of an operating system.
  • the file names may comprise the identification numbers.
  • the database may comprise a relational database, object database, or may be stored in XML format, or in a number of other formats that are commonly known.
  • the database may also comprise an independent system stack of bindings, which comprise numbers, identification strings or signatures in the database for matching or authenticating the components, from manufacturers of the components, each identification number being verified using the binding from the manufacturer of the respective component to verify the component.
  • a system stack may comprise a subset of one or more global component databases containing bindings from manufacturers of the components, each binding of the subset being associated with at least one of the identification numbers of one of the components in the device.
  • Structural components such as cabinets, may contain an electronic identification chip embedded within them, such as a so-called Dallas chip or an IBUTTON device manufactured by Dallas Semiconductor of Dallas, Tex. These devices allow a unique identifier, placed within a semiconductor or chip, to be placed on a component that may or may not be electronic, such as a computer or gaming machine cabinet.
  • the IBUTTON device is a computer chip enclosed in a 16 mm stainless steel can.
  • the steel button can be mounted, preferably permanently or semi-permanently, on or in the structural component.
  • Two wires may be affixed to the IBUTTON device, one on the top, and one on the bottom, to exchange data between the IBUTTON device and a processor, serial port, universal serial bus (USB) port, or parallel port.
  • the matching process may comprise matching each identification number based on the type of component that the identification number identifies.
  • the identification number and the type of component are matched in the database in order to verify that the identification number is valid. Operation of the device may be stopped if any one of the identification numbers is not matched in the database. In the case of a game or gaming machine type of device, a tilt condition message is generated if any one of the identification numbers is not matched in the database.
  • the database may consist of a set of signatures, also called bindings.
  • a well-known hash function such as the Secure Hash Function ⁇ 1, also known as SHA-1
  • This 160-bit hash value also called an abbreviated bit string
  • DSA Digital Signature Algorithm
  • the DSA uses a private key of a private key/public key pair, and randomly or pseudo-randomly generated integers, to produce a 320-bit signature of the 160-bit hash value of the data file or firmware contents.
  • This signature is stored in the database in addition to the identification number.
  • the verification software may be stored on a persistent storage media such as a hard disk device, read only memory (ROM), electrically erasable programmable read-only memory (EEPROM), in the aforementioned CMOS memory, battery-backed random access memory, flash memory or other type of persistent memory.
  • a persistent storage media such as a hard disk device, read only memory (ROM), electrically erasable programmable read-only memory (EEPROM), in the aforementioned CMOS memory, battery-backed random access memory, flash memory or other type of persistent memory.
  • the verification software is stored in a basic input/output system (BIOS) on a solid-state persistent memory device or chip. BIOS chips have been used for storing verification software, such as the BIOS+chip used by Bally Gaming Systems, Inc. of Las Vegas, Nev. in their EVO gaming system. Placing the verification software in the BIOS is advantageous because the code in the BIOS is usually the first code executed upon boot or start-up of the device, making it hard to bypass the verification process.
  • the verification software may be stored in a firmware hub, which may comprise the part of an electronic device or computer that stores BIOS information.
  • a firmware hub is used in place of a peripheral component interconnect (PCI) bus to connect elements of chipsets.
  • PCI peripheral component interconnect
  • the persistent storage media may be a removable storage unit such as a CD-ROM reader, a WORM device, a CD-RW device, a floppy disk device, a removable hard disk device, a ZIP disk device, a JAZZ disk device, a DVD device, a removable flash memory device, or a hard card device.
  • the database is preferably stored in a non-removable, secure device either within the device being verified, or remotely on a server, in order to enhance security.
  • the verification software executes a DSA verification of the data files and firmware components. Also stored in the database is the public key of the private key/public key pair. For each data file and firmware component, as part of the DSA verification, the processor and verification software first computes the hash value of the digital contents of the component using the SHA-1 algorithm. The verification software then processes or authenticates this computed hash value, using the DSA signature verification algorithm, which also takes, as input, the aforementioned public key stored in the database. The verification part of the DSA produces a boolean result (yes or no) as to whether the inputs solve the algorithm. If the algorithm is not solved by the inputs, then an unexpected result is produced, thereby failing to verify the particular component.
  • the set of executable instructions may use the Rivest-Shamir-Adleman (RSA) algorithm to verify the components.
  • RSA Rivest-Shamir-Adleman
  • a first abbreviated bit string or hash value is computed from each component's digital contents and encrypted into a digital signature.
  • the digital signature is stored in the database along with the identification number for the component.
  • the component is verified by computing a second abbreviated bit string computed from the component's digital contents.
  • the signature is retrieved from the database by searching the database for the identification number.
  • the signature is decrypted to recover the first abbreviated bit string.
  • the component is then verified by comparing the second abbreviated bit string with the first abbreviated bit string. If the first and second abbreviated bit strings do not match, then the component is not verified. As discussed below, this may cause a fault tilt to occur to prohibit the loading operation of the device. Otherwise, use of the device is permitted.
  • collections of data files may be signed together in order speed up processing.
  • the abbreviated bit strings, hash values, or signatures, also called digests, of the collection of data files are collected into a catalog file, and the catalog is signed as described above.
  • a device initiates a communication with another device.
  • the sending device may include a section of the first message to provide needed information to the intended recipient. This information may include at step 1202 the type of device, the protocol the device is using, any restrictions related to QOS, and other communication related information.
  • the recipient determines if it can communicate with the sender directly or if an interface is needed at decision block 1204 . If an interface is needed at step 1206 , the sender and receiver may need to communicate through the GMU, for example, if the GMU includes software or firmware for translating appropriately for the devices. If the devices can communicate directly, then messages are sent back and forth using an accepted protocol at step 1205 .
  • the disclosed embodiments allow devices to be aware of each other's presence through MAC/IP transmissions. This permits the use of a single network port for each device to use in communicating with each other and with a back-end system.
  • the devices do not need pre-knowledge of the MAC/IP addresses of other devices but can learn them at start up and during run-time.
  • the system also allows a new device to be added to a game cabinet and have it be integrated and identified to the system without extensive IT effort.
  • a preferred embodiment of the trusted cabinet identification device 1300 , system, and/or method enables the ability to: (1) uniquely identifying a gaming machine on a gaming floor; (2) uniquely associating components in a gaming machine to that gaming machine; and (3) distributing public key certificates.
  • the trusted cabinet identification device 1300 includes two main components, an interface processor 1310 and a security device 1320 .
  • the interface processor 1310 provides communication from external devices through various standard interfaces such as USB, RS-232, and I2C to the security device 1320 .
  • the security device 1320 stores information, such as unique identifiers and encryption keys, as well as providing services such as hashing, encryption, digital signatures and random number generation. Additionally, the security device 1320 may conform to a published standard such as the GEMPLUS smartcard specification.
  • the trusted cabinet identification device 1300 provides a two part solution and substantial benefits in terms of providing access to security and identification information by external devices that would not ordinarily be able to communicate with a dedicated single interface security device. Using an off the shelf microcontroller as a front end for this communication service, the ability to support nearly any external device becomes the simple matter of a firmware upgrade.
  • the trusted cabinet identification device 1300 has the ability to communicate with multiple devices within a gaming machine. Without the use of the trusted cabinet identification device 1300 , prior techniques have required a unique ID associated with a single device. Multiple ID chips were installed in a gaming cabinet, with each device in the gaming cabinet wired to one chip. The host system then had to have a master list of all ID chips and the associated gaming machine.
  • the trusted cabinet identification device 1300 and the controlled access switch 1330 complement one another in identifying cabinet devices.
  • the controlled access switch 1330 groups devices that are based on an IP network.
  • a preferred embodiment of the trusted cabinet identification device 1300 communicates with multiple protocols including RS232, USB, I 2 C, and Ethernet. This enables the trusted cabinet identification device 1300 to provide a fixed, tamper-resistant asset identifier in conjunction with the controlled access switch 1330 grouping function, as well as supporting cabinet identification with legacy products such as the legacy GMU 1340 (game monitoring unit, i.e., the GMU model MC250).
  • legacy GMU 1340 game monitoring unit, i.e., the GMU model MC250
  • a controlled access switch 1330 may not be permanently identified as associated with a particular asset number without an asset identifier like the trusted cabinet identification device 1300 . If the controlled access switch 1330 device is removed from the gaming machine 1350 , the slot floor system has to be updated to reflect the new controlled access switch 1330 device in the gaming machine 1350 .
  • the trusted cabinet identification device 1300 is designed to be permanently attached in a tamper evident manner to the gaming machine cabinet. By permanently attaching the trusted cabinet identification device 1300 to the cabinet, the slot floor system does not have to be manually updated when any component is replaced, including the controlled access switch 1330 .
  • a gaming machine 1350 with a legacy GMU 1340 is attached to a gaming machine's game motherboard 1360 .
  • An iView 1370 (a system gaming and/or player tracking user interface and processor, or other comparable component) is also attached to the GMU 1340 .
  • financial transactions through the iView 1370 are problematic. Since the iView 1370 is not directly connected to the game motherboard 1360 , the iView 1370 is reliant upon a slot technician to manually configure the game motherboard 1360 , the GMU 1340 and the iView 1370 with the correct slot asset number. If any of these values are incorrect, the financial transactions are credited to the incorrect device.
  • the slot floor system can identify the issue for resolution. However, the slot floor system can still function properly and allow financial transactions through any of those devices without disabling the gaming machine 1350 .
  • Listed below is the table for the slot floor system that would be used to associate the devices in a gaming machine. Since the GMU 1340 , iView 1370 , and the game motherboard 1360 have the same cabinet identifier, then all of these devices are in the same cabinet.
  • FIG. 14 the minimum configuration required for an embodiment of the trusted cabinet identification device 1300 configured for use with the legacy GMU 1340 (MC250) is shown.
  • the GMU 1340 is connected to the trusted cabinet identification device 1300 , which is then attached to the rest of the devices in the gaming machine 1350 .
  • the GMU 1340 retrieves the cabinet identifier and then passes this information to the game motherboard 1360 and iView 1370 .
  • This configuration of the trusted cabinet identification device 1300 has the benefit of uniquely identifying the gaming machine cabinet for each device.
  • the gaming machine 1350 has had the GMU 1340 (model MC250) replaced with an IP network-based GMU 1380 (model MC300).
  • the controlled access switch 1330 in this embodiment can associate the game motherboard 1360 , the GMU 1380 , and the iView 1370 to being inter-related. If the controlled access switch 1330 uses the cabinet identifier from the trusted cabinet identification device 1300 , then in a situation where the controlled access switch 1330 fails, the association of the device will not have to be updated on the slot floor system. However, if the game motherboard 1360 was not connected to the controlled access switch 1330 , then the controlled access switch would not be able to associate the game motherboard to the other devices in the gaming machine cabinet.
  • FIG. 16 the minimum configuration for the trusted cabinet identification device 1300 with a GMU 1380 (MC300) is shown.
  • the GMU 1380 retrieves the cabinet identifier from the trusted cabinet identification device 1300 and then relays the cabinet identifier to all of the other attached devices.
  • the trusted cabinet identification device 1300 permanently attaches to the gaming machine cabinet and enables multiple devices in a gaming machine 1350 to query the device for the trusted cabinet identification device's unique identifier.
  • the use of the trusted cabinet identification device 1300 guarantees globally unique identifiers.
  • the trusted cabinet identification device 1300 provides a globally unique identifier, is powered from USB or EPI ports, and is accessed only on power-ups of attached devices to minimize power consumption and processing requirements. Additionally, the trusted cabinet identification device 1300 has the following interconnects: (1) USB (enabling multiple hosts to the communicate with the trusted cabinet identification device)—as used in GSA devices and controlled access switch type network switches; (2) EPI (I 2 C)—as used in some manufacture-specific GMUs; (c) Serial RS232—as used in legacy gaming manufacturers and some manufacture-specific NT boards.
  • the trusted cabinet identification device 1300 is epoxyed (or otherwise secured) into gaming machine cabinet for tamper evident security, since the gaming machines 1350 already have physical security for the cabinet. If the component devices (e.g., gaming machine motherboard 1360 , NVRAM, hard drive, GMU 1340 or 1380 , iVIEW 1370 , controlled access switch 1330 , or the like) are replaced in the field, the slot floor system can easily recreate the association. This is accomplished by having the attached devices send the trusted cabinet identification device 1300 a unique identifier to the slot floor system upon registration with the system.
  • the component devices e.g., gaming machine motherboard 1360 , NVRAM, hard drive, GMU 1340 or 1380 , iVIEW 1370 , controlled access switch 1330 , or the like
  • the trusted cabinet identification device 1300 has the capability to sign a message from an attached device. This signature uses a shared key with slot floor system to guarantee that the message did indeed originate from the gaming machine 1350 .
  • the trusted cabinet identification device 1300 is a trusted device in the gaming machine 1350 that other attached devices use to build a trusted connection to the slot floor system.
  • FIG. 17 a logical flow diagram is shown that presents a component device powering up, at step 1700 , retrieving a cabinet identifier, at step 1710 , and registering with the slot floor system, at step 1720 .
  • each of the component devices that are connected to the trusted cabinet identification device 1300 retrieve the cabinet identifier from the device 1300 on component device power up.
  • the cabinet identifier is not intended to be stored on each component device.
  • the trusted cabinet identification device supports USB, I2C, Ethernet, and RS232 connections.
  • the component devices register with the slot floor system.
  • Each component device registers with the slot floor system in a device specific way with the appropriate network identifier and the cabinet identifier.
  • the network identifier can be an IP address or a slot line address.
  • the slot floor system can then associate all devices in the gaming machine with the cabinet in which they reside.
  • the disclosed embodiments have been described in connection with in-cabinet devices identifying themselves to each other, it is not limited to such an application.
  • the disclosed embodiments may be used to provide identification of any network devices by organically updating identification information periodically in Ethernet frames.
  • the disclosed embodiments are not limited to the specific network configuration described herein. Rather, the system can work with any number of network configurations without departing from the scope and spirit of the disclosed embodiments.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A trusted cabinet identification device is secured within a cabinet of a gaming machine that is linked to a central server over a network. The gaming machine includes a plurality of components to be identified within the cabinet. The trusted cabinet identification device includes an interface processor and a security device. The interface processor communicates unique identifiers and encryption keys to one or more components to be identified within the cabinet. Preferably, the interface processor is capable of communicating in multiple protocols. The security device stores unique identifiers and encryption keys, as well as performing security functions. The trusted cabinet identification device enables components within the gaming cabinet to obtain unique identifiers and encryption keys as needed, and register with the central server over the network.

Description

    RELATED APPLICATION
  • This patent application is a continuation-in-part of pending U.S. patent application Ser. No. 11/319,034, filed on Dec. 23, 2005 entitled “DEVICE IDENTIFICATION,” which is a continuation-in-part of pending U.S. patent application Ser. No. 11/220,781, filed on Sep. 7, 2005 entitled “GAMING NETWORK,” all of which are incorporated herein by reference. This patent application is also a continuation-in-part of pending U.S. patent application Ser. No. 11/550,781, filed on Oct. 18, 2006 entitled “Controlled Access Switch,” which is incorporated herein by reference.
  • COPYRIGHT NOTICE
  • A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all copyright rights whatsoever.
  • FIELD
  • The disclosed embodiments relate generally to identification, and more particularly, to a trusted device that provides cabinet identification to components with that cabinet.
  • BACKGROUND
  • In early gaming environments, gaming machines were stand-alone devices. Security of the gaming machines was accomplished via physical locks, security protocols, security personnel, physical and video monitoring, and the need to be physically present at a machine to attempt to breach the security of the gaming machine. By the same token, management of the gaming machines required a great deal of personal physical interaction with each gaming machine. The ability to change parameters of the gaming machine also required physical interaction.
  • In view of the increased processing power and availability of computing devices, gaming machines have become customizable via electronic communications and remotely controllable. Manufacturers of gaming equipment have taken advantage of the increased functionality of gaming machines by adding additional devices and features to gaming machines, thereby maintaining a player's attention to the gaming machines for longer periods of time increasing minimum bet and bet frequency and speed of play. This, in turn, leads to the player wagering at the gaming machine for longer periods of time, with more money at a faster pace, thereby increasing owner profits.
  • One technique that has been employed to maintain a player's attention at the gaming machine has been to provide players with access to gambling-related information. In this regard, attaching a small electronic display to the gaming device, gambling-related information, as well as news and advertisements can be sent to the player. The gambling-related information may include, for example, information on sports betting and betting options for those sporting events. Additionally, the gambling-related information may also include information such as horse racing and off-track betting. News and advertisements can also maintain a player's attention by providing the player with access to information ranging from show times, to restaurant and hotel specials, and to world events, thus reducing the need and/or desire of the player to leave the gaming machine.
  • In addition, the player may participate in a “premium” promotion where the player is registered with the gaming establishment as a club member when the player inserts an ID card into the gaming machines during play. The player may be rewarded for certain play patterns (e.g. wager amounts, wager totals, payouts, time of play, or the like) and earn redeemable benefits or upgrade of club member status.
  • Attempts to distribute gambling-related information and advertisements to players and to allow the recognition of premium membership players have resulted in additional system components that may be attached to the gaming devices. These components for accessing and displaying information for gaming machines may include a keypad, card reader, and display equipment. Other internal components to the gaming cabinet have also been added, such as specialized processors and devices.
  • The amount of interactivity and data presentation/collection possible with current processor based gaming machines has led to a desire to connect gaming machines in a gaming network. In addition to the gaming machines themselves, a number of devices associated with a gaming machine or with a group of gaming machines may be part of the network. It has become important for the devices within a gaming machine or cabinet to be aware of each other and to be able to communicate to a control server. Not only is the presence or absence of a network device important, but also the physical location of the device and the ability to associate devices within a particular gaming machine has become a necessary component of a gaming network.
  • A gaming network may have a large number of dynamically changing and reconfigurable components. Because of the desire to keep down-time to a minimum, it is important that the population of devices on the network be determinable and verifiable. In the past, this has meant pre-programming knowledge of all other devices into each device, so that communication between devices could take place. Such a requirement of pre-programming or pre-knowledge is too time consuming to be practical in a gaming network environment.
  • The current approach to identifying a slot machine relies on slot techs that manually enter the casino's house number (asset number) into the slot machine. The disadvantage of this method is that it is very easy for a slot tech to put in the wrong address (a typo) or to duplicate a slot address. To associate a device in the slot machine a slot technician either manually enters a house number into the device or a device in the slot machine may have a separate device id. This separate device id must be mapped by the host system to the slot machine. Both methods have the disadvantage of putting a wrong device id or duplicating a device id. Finally, the current approach uses a slot technician to manually install public key certificates on a slot machine. This approach has the same limitation as above because if a device is removed for a slot machine, the slot technician must remember to re-associate the device to the slot machine.
  • Currently, there is a continuing need to uniquely identify a gaming machine and associate devices within the gaming machine to each other. A unique identifier cannot be guaranteed in a gaming machine, since all components are field replaceable. There is also a need to automate the distribution of public key certificates, which is currently not possible for individual devices with a gaming machine. Current solutions require a human being to setup the initial certificates/public keys.
  • SUMMARY
  • Briefly, and in general terms, the trusted cabinet identification device described herein provides unique cabinet identifiers and security features. More particularly, the trusted cabinet identification device is secured within a cabinet of a gaming machine that is linked to a central server over a network. The gaming machine includes a plurality of components to be identified within the cabinet. The trusted cabinet identification device includes an interface processor and a security device.
  • The interface processor communicates unique identifiers and encryption keys to one or more components to be identified within the cabinet. Preferably, the interface processor is capable of communicating in multiple protocols. The security device stores unique identifiers and encryption keys, as well as performs security functions. The trusted cabinet identification device enables components within the gaming cabinet to obtain unique identifiers and encryption keys as needed, and register with the central server over the network.
  • Similarly, in another embodiment, a method of identifying components within a gaming machine cabinet that is linked to a central server over a network is provided. As stated above, the gaming machine includes a plurality of components to be identified within the cabinet. The method includes: storing a unique cabinet identifier and encryption key, generating a digital signature from the encryption key, transmitting the unique cabinet identifier to a component to be identified within the cabinet upon power-up of the component, transmitting the digital signature to the component to confirm origin of the unique cabinet identifier, and enabling components within the gaming machine cabinet to register with a game floor manager system on the central server via the network.
  • These and other features and advantages of the disclosed embodiments will become apparent from the following detailed description when taken in conjunction with the accompanying drawings, which illustrate, by way of example, the features of the disclosed embodiments.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a diagram of an embodiment of functional layers of a gaming network;
  • FIG. 2 is a block diagram of an embodiment of a gaming network;
  • FIG. 3 is a flow diagram of initialization of a network device in an embodiment of a gaming network;
  • FIG. 4 is a flow diagram of traffic authentication in an embodiment of a gaming network;
  • FIG. 5 is a flow diagram of an attack detection protocol in an embodiment of a gaming network;
  • FIG. 6 is a flow diagram illustrating a network device initialization sequence in an embodiment of the gaming network;
  • FIG. 7 is a block diagram illustrating examples of possible network attacks;
  • FIG. 8 is a block diagram of a gaming machine configuration in an embodiment of the cabinet identification device;
  • FIG. 9 is a flow diagram illustrating one embodiment of game machine device management using the cabinet identification device;
  • FIG. 10 is a flow diagram illustrating the transmission step of FIG. 9;
  • FIG. 11 is a flow diagram illustrating the identification step of FIG. 9; and
  • FIG. 12 is a flow diagram illustrating the communication step of FIG. 9.
  • FIG. 13 illustrates a gaming machine with a legacy GMU and a trusted cabinet identification device connected to a game motherboard, and an iVIEW connected to the legacy GMU and the trusted cabinet identification device;
  • FIG. 14 illustrates a gaming machine with a legacy GMU and a trusted cabinet identification device connected to a game motherboard, and an iVIEW connected to the legacy GMU;
  • FIG. 15 illustrates a gaming machine with an IP network-based GMU and a trusted cabinet identification device connected to a game motherboard, and an iVIEW connected to the IP network-based GMU and the trusted cabinet identification device, all of which are connected to a controlled access switch;
  • FIG. 16 illustrates a gaming machine with a minimum configuration for the trusted cabinet identification device with a IP network-based GMU, a game motherboard, an iVIEW, and a controlled access switch; and
  • FIG. 17 is a logical flow diagram illustrating a device powering up, retrieving a cabinet identifier, and registering with the slot floor system.
  • DETAILED DESCRIPTION
  • The disclosed embodiments are directed to a trusted cabinet identification device that provides a cabinet identifier and other security related information to various components associated with the gaming machine cabinet. The preferred embodiments of the system and method are illustrated and described herein, by way of example only, and not by way of limitation.
  • The gaming network described herein proposes an architecture and system that provides an appropriate level of security from network attack. There exist techniques to authenticate and verify individual messages or activities in existing gaming establishment networks relying on proprietary protocols, transport and message formats. However, the gaming network described herein provides additional protection to the network itself particularly when use of commercially based IP equipment is envisioned, above and beyond particular security protocols, for activities and transactions carried on the network. The gaming network is independent of, and in addition to, security techniques for particular transactions or activities.
  • Referring now to the drawings, wherein like reference numerals denote like or corresponding parts throughout the drawings and, more particularly to FIGS. 1-7, there is shown one embodiment of the gaming network. As shown in FIG. 1, the network includes a core layer 101 over a distribution layer 102 above an access layer 103. The core layer 101 serves as a gateway between servers and the gaming devices. The core layer 101 is contemplated to be a so-called “back end” layer that resides in an administrative location, separate from the gaming floor, for example, and protected physically and electronically.
  • The distribution layer 102 serves to collect traffic between the core layer 101 and the access layer 103. The distribution layer may comprise trunks and switches that route message and signal traffic through the network. The access layer 103 provides a physical interface between the gaming machines (and any of their associated devices) and the rest of the network. This is done via managed switches.
  • One embodiment of a network using the layered scheme of FIG. 1 is illustrated in FIG. 2. The core layer 101 includes one or more servers 201 that are coupled via a communication path 202 to one or more switches 203. In one embodiment, the servers and switches of the core layer 101 are located within the gaming establishment premises in a secure administrative area. The servers 201 may, but are not required to be, game servers. The communication path 202 may be hardwire (e.g., copper), fiber, wireless, microwave, Ethernet, wireless Ethernet, or any other suitable communication path that may be protected from attack. In one embodiment, the switches 203 are L2/L3 switches. However, one of ordinary skill in the art will appreciate that other types of switches may be used without departing from the scope or spirit of the disclosed embodiments.
  • The distribution layer 102 communicates with the core layer 101 via high bandwidth communications links 204. These links may be copper, fiber, Ethernet, wireless Ethernet, or any other suitable link. If desired, redundant links 205 may be built into the system to provide more failsafe operation. The communications links 204 connect the core layer switches 203 to the distribution layer switches 206. These may be one or more switches, such as L2 switches, for example.
  • The distribution layer 102 communicates with the access layer 103 via a high capacity communication link 207. The link 207 may be Ethernet, wireless Ethernet, wire, fiber, wireless, or any other suitable communication link. In the embodiment of FIG. 2, the communication link 207 is coupled to a gaming carousel 208 that comprises a plurality of gaming machines (e.g., 16 gaming machines 215A-215P). A managed switch 209 is coupled to the link 207 to provide an interface switch to a plurality of other managed switches 210 through 213. In the embodiment illustrated, each of the managed switches 210-213 manages four game machines 215. It is understood that the types of switches may be changed without departing from the scope of the disclosed embodiments. Further, switches with more or fewer ports may be substituted and more or fewer tiers of switches in the access layer may be used, as well, without departing from the scope or spirit of the disclosed embodiments. In another embodiment, each game machine has its own managed switch.
  • In one embodiment of the gaming network, the network uses TCP/IP sessions between the gaming machines 215 and the servers 201. The TCP/IP sessions are used to exchange private information concerning game operations, game performance, network management, patron information, revised game code, accounting information, configuration and download, and other sensitive information. In one embodiment, sessions may be a single message and acknowledgement, or the sessions may be an extended interactive, multiple transaction session. Other instantiations may include UDP/IP, token ring, MQ, and the like.
  • In one embodiment of the gaming network, intrusion detectors provide additional security. In this regard, there may be intrusion detectors located between each layer, such as intrusion detector 220 located between the core layer 101 and the distribution layer 102, and the intrusion detector 221 located between the distribution layer 102 and the access layer 103. In addition, certain sensitive locations or choke points may include intrusion detectors such as the intrusion detector 223 coupled to the switch 209. The intrusion detector 223 may disable the individual ports of switch 209 to isolate attacks while permitting continued operation of the remainder of the gaming network.
  • FIG. 8 is a block diagram of an example gaming machine configuration in one embodiment. The gaming machine 215 communicates with the network (e.g. through a managed switch such as switch 210) via communications path 214 which may be Ethernet, wireless Ethernet, wire, fiber, wireless, or any other suitable communication link. The gaming machine 215 may include a communications interface 801 that handles communication between the gaming machine and its associated devices and the remainder of the gaming network. Communication interface 801 is coupled to a game monitoring unit (GMU) 802. The GMU serves as the processor of the gaming machine. An interface referred to as a “SMIB” 803 (smart interface board or slot machine interface board) is coupled to the GMU and to the communication interface 801. SMIB 803 is coupled to one or more peripherals or other devices connected to the gaming machine 215, such as devices 804A to 804N of FIG. 8. In one embodiment, SMIB 803 uses an Ethernet or other high-speed communications link to the communication interface 801, GMU 802, and devices 804A through 804N. In one embodiment, the SMIB includes switching capabilities. In one embodiment, the SMIB is implemented with a Mastercom 300.
  • The gaming network may use a number of network services for administration and operation. Dynamic Host Configuration Protocol (DHCP) allows central management and assignment of IP addresses within the gaming network. The dynamic assignment of IP addresses is used in one embodiment instead of statically assigned IP addresses for each network component. A DNS (domain name service) is used to translate between the domain names and the IP addresses of network components and services. DNS servers are well known in the art and are used to resolve the domain names to IP addresses on the Internet.
  • Similarly, Network Time Protocol (NTP) is used to synchronize time references within the network components for security and audit activities. It is important to have a consistent and synchronized clock so that the order and the timing of transactions within the gaming network can be known with reliability and certainty. Network information can be gathered centrally at a single workstation by using the Remote Monitoring (RMON) protocol. SNMP (simple network management protocol) allows network management components to remotely manage hosts on the network, thus providing scalability. In one embodiment of the gaming network, SNMPv3 is used to take advantage of embedded security mechanisms to mitigate malicious attacks made against the configuration management function. Still further, TFTP (trivial file transfer protocol) is used by servers to boot or download code to network components.
  • In one embodiment, the network may be implemented using the IPv6 protocol designed by the IETF (Internet Engineering Task Force). When using IPv6, the network may take advantage of the Quality of Service (QoS) features available with IPv6. QoS refers to the ability of a network to provide a guaranteed level of service (i.e. transmission rate, loss rate, minimum bandwidth, packet delay, etc). QoS may be used as an additional security feature in that certain transactions may request a certain QoS as a rule or pursuant to some schedule. Any fraudulent traffic of that nature that does not request the appropriate QoS is considered an attack and appropriate quarantine and counter measures are taken.
  • Similarly, the Type of Service (ToS) capabilities of IPv4 may also be used in a similar manner to provide additional security cues for validation of transactions. Again, certain types of transactions may be associated with a particular specific ToS or a rotating schedule of ToS that is known by network monitors.
  • Traffic Content
  • In an embodiment of the gaming network, the traffic content varies in size and sensitivity. Messages may comprise transactional messages related to game play, such as coin-in. Other messages may be related to management, administration, or sensitive information, such as administrator passwords, new game code, pay tables, win rates, patron personal data, or the like.
  • Security
  • The gaming network includes network security features, host security features, audit protocols, and design architecture approaches to reduce the likelihood of success of network attacks. Where attacks cannot be prevented, the gaming network attempts to make such attacks expensive in terms of the computational power required, the time, risk, effect, and duration of the attack. Identification of attacks and the rapid recovery from such attacks should be emphasized, as should the limiting of the effect of any attacks.
  • Accordingly, the gaming network provides for traffic confidentiality. All nodes within the network exchange information that is confidentially protected. One method for providing confidentially protected data is by using encryption. A number of encryption schemes may be used, such as an FIPS approved encryption algorithm and an NIST specified encryption mode, such as the Advanced Encryption Standard (AES).
  • In addition, all nodes within the gaming network apply source authentication and integrity of all traffic. A suitable message authentication mechanism may be, for example, an FIPS approved algorithm such as the Keyed-Hash Message Authentication Code (HMAC) and SHA-1. All nodes automatically drop messages that have been replayed. As noted above, replayed messages are a means of attack on network security.
  • Key management mechanisms should be sufficient to resist attack. In one embodiment, a 1024 bit Diffie-Hellman key exchange with a 1024 bit DSA/RSA digital signature is used to render key attacks computationally infeasible. It should be noted that the key sizes are given as examples only. Smaller or greater key size can be used in the gaming network as security recommends. The gaming network should be robust, maintaining the availability of critical services. The network should include protection against misrouting and also discard any traffic that has a source or destination outside of the network. The gaming network should also require a minimum level of authentication and assurance before permitting an additional device on the network and prevent such connection when the assurance is not provided.
  • Host protection and security includes secure host initialization where the host performs a self-integrity check upon power-up initialization. All operating system components that are not needed are disabled. When software patches are downloaded to the gaming network, the host verifies them. The host checks for unused IP ports and disables them prior to connecting to the gaming establishment network. When processing network traffic, any traffic not addressed to the host is dropped from the processing stack as soon as possible. In the gaming network, all service, guest, and default administrator accounts that may be part of the operating system are disabled. In one embodiment, one-time passwords and/or multi-part passwords are used for remote login, if remote login is enabled. The one-time password may itself be a multi-part password. When using a multi-part password, different trusted individuals each hold a part of the multi-part password. The entire password is required for enablement of the system. This prevents any single individual from compromising security. Moreover, all host software components are operated with the lowest privilege necessary for sufficient operation. For example, software that can operate with “user” privilege will do so, to limit its usefulness to an attacker.
  • Audit requirements include integrity protection of audit logs from date of creation and throughout their use. Events that are audited in an embodiment of the gaming network include account logon events (both success and failure), account management (both success and failure), directory service events (failure), logon events (success and failure), object access (failure), policy changes (success and failure), privilege use (failure), system events (success and failure), access to a host or networking device logged by user name and the time of access, and all other internal user actions. Anomalous behavior is audited and logged for purposes of evidence for law enforcement and/or attack recognition. Audit information is collected and stored in a secure manner to preserve the chain of evidence. If there is a failure of the audit system, automatic shutdown is initiated.
  • The gaming network is designed so that there is no single point of failure that would prevent remaining security features from operating when one is compromised. The gaming network also will continue to operate in the event of bridging to another network, such as the Internet.
  • Secure Initialization of Network Devices
  • The gaming network provides confidence that a network device is contacting a legitimate DHCP server rather than a spoofed server. The gaming network uses Internet Key Exchange (IKE) in one embodiment. There are a number of modes and phases of IKE. Phase I of IKE includes two modes, referred to as “main mode” and an “aggressive mode”. Phase II has a single mode referred to as “quick mode”. Main mode takes six packets to complete while aggressive mode takes 3 packets. Quick mode takes 3 packets to complete. In some embodiments, Phase I is used for initialization and Phase II is used to create security for subsequent traffic and messages. FIG. 3 is a flow diagram illustrating the initialization of a network device using main mode of Phase I.
  • Phase I is used to authenticate devices to each other and to protect subsequent Phase II negotiations. In the following description, the network device is referred to as the initiator and the server is referred to as the responder. Referring to FIG. 3, at step 301, the initiator sends a first IKE packet to the responder. The packet may or may not include vendor ID's (VID) that can inform the responder of the extensions the initiator supports. Each IKE message includes a mandatory Security Association (SA) that defines how to handle the traffic between the two devices. The SA of the initial packet lists the security properties that the initiator supports, including ciphers, hash algorithms, key lengths, life times and other information. At step 302, the responder replies with an IKE packet that may or may not include a VID, but does include a mandatory SA payload. At this stage, the packets are not encrypted because there is still no key for encryption.
  • The third packet, at step 303, is from the initiator to the responder and uses the Diffie-Hellman key exchange protocol. The packet contains a key exchange (KE) payload, a NONCE payload, and a certificate request (CR) payload. The public keys are created whenever the phase I negotiation is performed and are destroyed when the phase I SA is destroyed. The NONCE payload is a large random number that has not been used before on the network (“never-used-before”) and is useful in defeating replays. The CR payload includes the name of the Certification Authority for which it would like to receive the responder's certificate. (Note that the CR can be sent in the third and fourth packets or in first and second packets, as desired).
  • At step 304, the responder returns its own KE, NONCE, and CR in the fourth packet. The third and fourth packets are used by each device to generate a shared secret using public key algorithms. Because only public keys are sent in this exchange, and no encryption key is yet available, the messages are still not encrypted.
  • At step 305, the initiator uses the KE to generate a shared secret and uses it to encrypt the fifth message. The fifth message includes an Identification (ID) payload, zero or more certificate (CERT) payloads (or CRL) and a Signature payload (SIG) that is the digital signature that the responder must verify. The ID payload is used to tell the other party who the sender is and may include an IP address, FQDN (fully qualified domain name), email address, or the like. In an embodiment of the gaming network, it is an IP address. The CERT payload is optional if the initiator or responder cache the public key locally. In an embodiment of the gaming network, the public key is not cached locally and failure to receive a CERT payload is a failure of the negotiation. The SIG payload includes the digital signature computed with the private key of the corresponding public key (sent inside the CERT payload) and provides authentication to the other party.
  • At step 306, the responder sends a message with its ID, CERT, and SIG payloads. When both the initiator and responder have successfully verified the other party's SIG payload, they are mutually authenticated. The result of the successful negotiation is the Phase I SA.
  • After the phase I negotiation is successfully completed, the phase II negotiation can proceed to create SA's to protect the actual IP traffic with an IPsec protocol. Each of the phase II packets are protected with the phase I SA by encrypting each phase II packet with the key material derived from phase I. Phase II in the gaming network is illustrated in FIG. 4. At step 401, the initiator sends a message with a number of payloads. The message includes SA and NONCE payloads that are the keying material used to create the new key pair. As noted above, the NONCE payload includes random never-used-before data. The SA payload is the phase II proposal list that includes the ciphers, HMACs, hash algorithms, life times, key lengths, IPsec encapsulation mode, and other security properties. Optionally, the message may include IDi (initiators ID) and IDr (responders ID), which can be used to make local policy decisions.
  • At step 402, the responder replies with a message with the same payload structure as the first message. The initiator replies with a HASH value at step 403. After phase II is completed, the result is two SA's. One is used for inbound traffic and the other for outbound traffic.
  • Rekeying is done when the lifetime of the SA used for protecting network traffic expires. In one embodiment, PFS (perfect forward secrecy) protocol is used for rekeying. The network ensures the set of secret keys generated by one protocol message exchange is independent of the key sets generated by the other protocol message exchanges. This means compromise of one key set does not lead to compromise of the other sets. Additional protection for network traffic is provided by use of a “virtual private network” (VPN). As a result, all network traffic is protected, and not just TCP/IP traffic.
  • In an alternate embodiment, the network may be constrained to a particular regulatory jurisdiction. In this embodiment, a regulatory jurisdiction has its own private key and a multi-tiered approach is used to validate devices. During initialization, a combination key at an administrative location is used to sign messages and data. If there are attempts to communicate outside the jurisdiction, the lack of the regulatory jurisdiction key prevents communication. This is another security feature that is used to limit inside and outside attacks on the gaming network.
  • In one embodiment, the system uses a secure key server to store private keys and certificates. The secure key server requires multi-part passwords as described above for access and enablement. The secure key server is resistant to network or Internet attacks, denial of service attacks, and other software or protocol attacks. The secure key server is also resistant to physical attacks such as forced break-in attempts, changes in temperature, changes in pressure, vibration, and attempts to disassemble the secure key server. In one embodiment, any attack attempt results in the destruction of stored keys, certificates, etc, to prevent compromise of the system.
  • In another embodiment, a physical transfer of certificates may be implemented as an additional security protection. No game machine or other device may be added to the system without a physical visit and installation of a certificate. In other words, a mere handshaking protocol is not sufficient to add a device onto the system. Rather, a potential new device will require a trusted person or persons to activate the device, install an appropriate certificate, and add it to the network.
  • Blocking Illegitimate Traffic
  • As described above, the gaming network uses IKE, IPsec, and VPN to protect legitimate traffic from mischief. The gaming network also provides systems to block illegitimate traffic. Firewalls are installed at choke points within the access and distribution layers to isolate network segments from one another. Firewalls can limit the spread of damage from propagating beyond the compromised network segment. The use of NONCE never-used-before random numbers also prevents illegitimate traffic by blocking replay of legitimate messages. IKE and protection of all post-initialization traffic makes it more difficult for illicit messages to achieve successful delivery.
  • In addition to detecting false messages using the techniques above, the gaming network reduces the possibility of access to the network by blocking all unused IP ports. Only IP ports required for gaming operation are enabled. To further limit the ability of outside access to the gaming network, private IP addresses are used. Typically IP addresses provide global uniqueness with the intention of participating in the global Internet. However, certain blocks of addresses have been set aside for use in private networks. These blocks of IP addresses are available to anyone without coordination with IANA or an Internet registry. Since multiple private networks may be using the same block of IP addresses, they lack global uniqueness and are thus not suitable for connection on the global Internet. Private network hosts can communicate with all other hosts inside the private network, both public and private. However, they cannot have IP connectivity to any host outside of the enterprise. Allocation of private network IP addresses may be accomplished pursuant to RFC 1918 protocol.
  • In another embodiment, the volume of network traffic is monitored at each link and compared to expected flow rates and/or historical flow rates. Histograms may be generated so that analysis and comparison of flow rates may be accomplished. Heuristic algorithms may be implemented to determine if the flow rate is within an acceptable range. If not, a data leak or attack is assumed and appropriate alarms are triggered. Heavy flow areas can be disabled so that appropriate investigation can be made.
  • Detecting and Reacting To Attacks
  • Intrusion detection system (IDS) sensors and/or intrusion prevention systems are installed between the core, distribution, and access layers. IDS and intrusion prevention sensors may also be installed at choke points within the access and distribution layers to detect malicious traffic within these layers. One suitable IDS is “arpwatch” (www.securityfocus.com/tools/142) that monitors IP address changes, MAC addresses, flow rate changes, and other network activity and can be configured to notify an administrator when IP/MAC/DID address bindings (e.g. the combination of game machine DID and/or one or more associated device DIDs) change for a device on a gaming network. When a change is detected, automatic isolation procedures may be implemented to isolate the possible intrusion. Subsequent analysis and review by network administrators can determine appropriate responses.
  • The system may keep a physical map of the location of the IDS sensors so that when an intrusion is detected, the physical location of the attack can be immediately identified. Security can be dispatched to the location to apprehend the attackers, appropriate systems may be shut down or disabled, and perimeter measures can be taken to increase the chances of securing the attacker.
  • FIG. 5 is a flow diagram of one embodiment of the operation of the intrusion detection system of the gaming network. At step 501, the gaming network is initialized and IP addresses are assigned to network devices. This may be accomplished using the technique described in FIGS. 3 and 4 or by any other suitable technique. At step 502, a mapping of the IP addresses of the network devices, their respective MAC addresses, and the DID is performed. This binding should remain stable through a session unless the core layer specifically initiates a change or if a regularly scheduled or anticipated change occurs.
  • At step 503, the system monitors the network. Such monitoring may be accomplished by any suitable means for tracking IP/MAC/DID mapping. As noted above, one such method includes Arpwatch. At decision block 504, it is determined if there has been any change to the IP/MAC/DID mapping. If the answer is no, the system continues monitoring the network at step 503. If the answer is yes, meaning that there has been some change in IP/MAC/DID mapping, the system disables the IP address and the network device associated with the MAC address and DID in question at step 505. This step of disabling may also include shutting down ports or sections of the network to contain or limit any presumed attack on the network. The system notifies the administrator at step 506 so that analysis and correction may begin.
  • In an alternate embodiment of the system, the mapping may be between any two of the parameters IP address, MAC, and DID. In addition, there may be multiple devices inside of the gaming machine. In some instances, the DID of the gaming machine may be used exclusively. In other instances, the DID of an associated device such as a reel controller, LED controller, CPU, safeRAM, hard drive, physical cabinet, printer, or other associated devices may be used singly or in combination with the gaming machine DID. Each associated device may have a unique ID (such as a 32 bit hex value) so that the combination of game machine DID and/or one or more associated device DID's results in a unique ID that is difficult to duplicate. Fraudulent communications that lack the requisite binding will be detected easily. Further, malicious hardware that attempts to join the network will lack not only the correct device ID's but also the combination bindings described above.
  • In yet another embodiment, the DHCP server is pre-loaded with a list of valid IP addresses, MAC addresses, machine and associated device DIDs, and IP/MAC/DID bindings. If the game machine requesting initialization or permission to join the network is not on the pre-determined list, the machine is not permitted on the network and an attack is logged. An alarm can be triggered so that the attacker can be identified and captured when possible.
  • In some instances, it may be useful to use dynamically assigned IP addresses in a gaming network. In such a situation, it is still important to be able to identify with certainty that only valid devices are on the network. In one embodiment, globally unique identifiers (GUIDs) are used to identify managed switches at one or more levels of hierarchy. For example, the switch could be at the game cabinet level, a bank of machine level, and/or a casino level. The GUID is used to positively identify a valid managed switch.
  • Associated with each managed switch is what is referred to herein as a “collection” of devices associated with that switch. The DIDs and MAC addresses can be used to identify the devices as being valid members of the collection. The dynamically assigned IP address can then be mapped to the collection so that the members of the network are known, and communication with the collection and its constituent devices can occur. The IP addresses can be subnet IP addresses for members of the collection if desired.
  • GUIDs are registered at network creation and when valid devices are added to the system. Once registered, dynamically assigned IP addresses can be properly mapped for communication using the IP address if desired. In another embodiment, each network device has its own GUID that is registered and may be mapped to a dynamically assigned IP address. If desired, the bindings described above may be implemented even with dynamically assigned IP addresses, once the proper mapping has been made using GUIDs.
  • Another embodiment takes advantage of GUIDs to create logical collections instead of physical collections. A logical collection may be disparate physically but may be useful for certain management, reporting, or game play operations. By being able to uniquely identify devices and collections, it is possible to create filters that allow communication with subsets of network devices at levels from single devices to collections to all devices and anywhere in between.
  • An additional security feature of the gaming network requires a secure boot sequence within each gaming machine and server such that an initial boot is accomplished using code residing in unalterable media. The initial boot code verifies the operating system and all network services it includes. Consequently, network services will not be enabled until the full operating system has been verified as legitimate.
  • FIG. 6 is a flow diagram illustrating the boot initialization of a network device, such as a gaming machine in one embodiment of the gaming network. At step 601, the device boots from a locally stored unalterable media. At step 602, the network device establishes security for communication with a network host. This may be accomplished by the IKE phase I method described in FIG. 3. Once secure host communication is established, traffic security is established at step 603. This may be accomplished by IKE phase II, as described in FIG. 4.
  • If any of the steps fail in this sequence, communication is terminated and a network administrator is notified. At step 604, the network device submits its operating system for verification. Such verification may be by any desirable method and may be in addition to other network security features. At step 605, the host receives the verification request and checks the operating system of the network device.
  • At decision block 606, it is determined if the network device contains a legitimate operating system. If not, the device is disabled at step 607. This process may initiate notice to a network administrator, as well as, disabling of some portion of the network associated with the device in an attempt to mitigate damage from an attack. If the operating system of the network device is legitimate at step 606, the host enables the appropriate network services for the network device at step 608 and operation begins. As noted above, all traffic is protected in the gaming network to some degree. In addition, some traffic includes additional security checks.
  • In one embodiment, the game machine provides a secure boot and initial O/S verification as follows. EPROM verification software resides within an input/output processor (IOP). The verification software verifies all EPROMs on the IOP board (i.e., mains and personalities) upon application of power to the game machine. Next, after the application of power to the machine, the BIOS+ performs a self-verification on all of its code. Once satisfactorily completed, the board (e.g. a Pentium class board) begins executing code from the BIOS+ contained in the conventional ROM device. This process verifies the conventional ROM device and detects any substitution of the BIOS+.
  • Upon boot-up of the processor, the BIOS+ executes a SHA-1 verification of the entire O/S that is presented. The digital signature is calculated and compared with an encrypted signature stored in a secure location on the game machine using, for example, the RSA private/public key methodology. If the signatures compare, the BIOS+ allows the operating system to boot, followed by the game presentation software. Next, display programs and content are verified, before being loaded into the IOP RAM to be executed for normal game operation.
  • During communication, each message is protected using the security of the gaming network. However, certain messages incorporate additional security checks even if the package is considered trustworthy. For example, code downloads may require that they be cryptographically signed and verified before executing. For messages such as these, the digital signature for the code is independent of and in addition to the authentication provided by VPN and the other network security features. In addition to the digital signature check and verification, the gaming network implements increasing number versioning of network downloaded updates so that rollback attempts may be mitigated or eliminated.
  • It may be desired to have some network communication links be wireless instead of hard wired. In such an environment, the gaming network includes wireless intrusion detection mechanisms detecting, for example, 802.1.1a/b/g devices. Such detection has scope beyond network attacks and may detect wireless attacks on the gaming establishment, even if not specifically targeting the gaming network.
  • Initialization of Gaming Machine Devices
  • One embodiment provides a process for identifying devices coupled to a game machine. This process is described in FIG. 9. At step 901, during initialization, each device (e.g. devices 804A-804N) attempts to communicate with the network and transmits its MAC/IP address. The address is received by a switch in the game machine (e.g. the SMIB 802) and a table of addresses of associated devices is assembled. This table is made available to the devices in the game machine so that the IP addresses of other devices within the gaming machine become available to each device.
  • At the identification step 902 each device identifies itself to other devices in the gaming machine. At step 903 a verification process is initiated so that it can be determined if the devices are valid devices on the network. At step 904 devices may begin to transmit data between themselves and to the core layer or other back-end server of the network.
  • MAC/IP Transmission
  • A description of one embodiment of the MAC/IP transmission of step 901 is illustrated in the flow diagram of FIG. 10. During a boot or initialization sequence 1001, any network-connected device inside the gaming machine will attempt to communicate with the network at step 1002 by sending its MAC/IP address via the SMIB or other switching device. The nature of this initial communication may be for a DHCP or BOOTP configuration, an ARP request, or any other attempt to identify itself to the back-end system. The MAC/IP addresses that are part of these communication attempts are added at step 1003 to a table. This table is managed by the SMIB 803 in one embodiment, or by the GMU 802 in another embodiment. Eventually at step 1004, a table will be generated that contains the MAC/IP addresses of all of the devices in the gaming machine.
  • In one embodiment, the devices send only their MAC addresses but the switch or other management device associates an IP address with each MAC address to populate a table. This embodiment may be used when IP addresses are assigned dynamically as described above.
  • At step 1005, the switch or GMU, or whichever device is managing the address table, periodically transmits raw Ethernet frames, USB packets, or TCP packets that include a list of the attached MAC/IP addresses associated with that game machine. In one embodiment, the frame is sent on a regular basis (e.g. every three to five seconds) so that other devices can expect that frame and react appropriately if it is not received. The transmitted frame is sent to switches and game machines on the network. In one embodiment, the transmission is via User Datagram Protocol (UDP) but any suitable protocol may be used without departing from the spirit and scope of the disclosed embodiments. In this manner, game machine devices need only be able to recognize the frame to take action. Eventually all of the MAC/IP addresses of game machine devices are published throughout the network. In this embodiment, there is no necessity of flooding the network with broadcasts frames with address information. This information is distributed organically throughout the network.
  • The process in one embodiment is an ongoing process, shown by the return path from step 1005 to step 1002 in FIG. 10. The tables are rebroadcast periodically by the switch. This rebroadcast allows devices to learn about other new devices that have been added to the network. The rebroadcast also allows a device to know when another device has left the network. At this point in the process the information being collected is pre-authentication. It allows a list of possible devices to be known and addressable so that if the device is valid and authenticated, it can participate on the network.
  • Identification
  • The identification process 802 is described in conjunction with FIG. 11. A device receives a MAC/IP transmission frame from the switch at step 1101. This is an ongoing process during runtime as the switch periodically transmits Ethernet frames containing updated and new MAC/IP address information as described above. At step 1102 the device identifies other devices within the same game machine or cabinet from information in the Ethernet frame. At step 1103 the device initiates an identification communication with one or more other devices in the game machine. The form of this transmission at step 1104 may be as simple as sending an “I'm here” message. In other embodiments, the identification message may include identification information about the device at step 1104. This information may include information such as the port address, device ID, a preferred communication protocol, and the like. In other embodiments, such information is provided during communication negotiations.
  • Verification
  • Once two devices have identified themselves to each other, a verification procedure can take place. The verification procedure is intended to establish that the device with which another device is communicating is a valid gaming device. In one embodiment of the disclosed embodiments, verification may be accomplished by using the protocol described herein in connection with FIGS. 3 and 4. Any suitable verification protocol may be utilized without departing from the scope and spirit of the disclosed embodiments. In-cabinet devices have similar security concerns as other network devices described herein.
  • In one embodiment, a verification method such as is described in pending U.S. patent application Ser. No. 10/243,912, filed on Sep. 13, 2002, and entitled “Device Verification System and Method”, assigned to the assignee of the disclosed embodiments, and incorporated by reference herein in its entirety. The disclosed embodiments provide a system and method for verifying a device by verifying the components of that device. The components may comprise, for example, software components, firmware components, hardware components, or structural components of an electronic device. These components include, without limitation, processors, persistent storage media, volatile storage media, random access memories, read-only memories (ROMs), erasable programmable ROMs, data files (which are any collections of data, including executable programs in binary or script form, and the information those programs operate upon), device cabinets (housings) or cathode ray tubes (CRTs). Identification numbers or strings of the components are read and then verified. The process of verifying may comprise matching each identification number in a database to determine whether each identification number is valid. In the case where a data file comprises one of a plurality of operating system files, verification of that file, in effect, comprises verifying part of an operating system. For data files, the file names may comprise the identification numbers.
  • The database may comprise a relational database, object database, or may be stored in XML format, or in a number of other formats that are commonly known. The database may also comprise an independent system stack of bindings, which comprise numbers, identification strings or signatures in the database for matching or authenticating the components, from manufacturers of the components, each identification number being verified using the binding from the manufacturer of the respective component to verify the component. Especially in the context of smaller devices such as personal digital assistants (PDAs), such a system stack may comprise a subset of one or more global component databases containing bindings from manufacturers of the components, each binding of the subset being associated with at least one of the identification numbers of one of the components in the device.
  • Structural components, such as cabinets, may contain an electronic identification chip embedded within them, such as a so-called Dallas chip or an IBUTTON device manufactured by Dallas Semiconductor of Dallas, Tex. These devices allow a unique identifier, placed within a semiconductor or chip, to be placed on a component that may or may not be electronic, such as a computer or gaming machine cabinet. The IBUTTON device is a computer chip enclosed in a 16 mm stainless steel can. The steel button can be mounted, preferably permanently or semi-permanently, on or in the structural component. Two wires may be affixed to the IBUTTON device, one on the top, and one on the bottom, to exchange data between the IBUTTON device and a processor, serial port, universal serial bus (USB) port, or parallel port.
  • The matching process may comprise matching each identification number based on the type of component that the identification number identifies. The identification number and the type of component are matched in the database in order to verify that the identification number is valid. Operation of the device may be stopped if any one of the identification numbers is not matched in the database. In the case of a game or gaming machine type of device, a tilt condition message is generated if any one of the identification numbers is not matched in the database.
  • The database may consist of a set of signatures, also called bindings. At least with respect to the components that comprise data files or firmware, a well-known hash function, the Secure Hash Function −1, also known as SHA-1, may be used to compute a 160-bit hash value from the data file or firmware contents. This 160-bit hash value, also called an abbreviated bit string, is then processed to create a signature of the game data using an equally well-known, one-way, private signature key technique, the Digital Signature Algorithm (DSA). The DSA uses a private key of a private key/public key pair, and randomly or pseudo-randomly generated integers, to produce a 320-bit signature of the 160-bit hash value of the data file or firmware contents. This signature is stored in the database in addition to the identification number.
  • Either contained in the device, or in communication with the device, is a processor and a memory containing executable instructions or a software program file for verification of the components (verification software), which may itself be one of the components to verify. The verification software may be stored on a persistent storage media such as a hard disk device, read only memory (ROM), electrically erasable programmable read-only memory (EEPROM), in the aforementioned CMOS memory, battery-backed random access memory, flash memory or other type of persistent memory. Preferably, the verification software is stored in a basic input/output system (BIOS) on a solid-state persistent memory device or chip. BIOS chips have been used for storing verification software, such as the BIOS+chip used by Bally Gaming Systems, Inc. of Las Vegas, Nev. in their EVO gaming system. Placing the verification software in the BIOS is advantageous because the code in the BIOS is usually the first code executed upon boot or start-up of the device, making it hard to bypass the verification process.
  • Alternatively, the verification software may be stored in a firmware hub, which may comprise the part of an electronic device or computer that stores BIOS information. In personal computer hub technology, such as that manufactured by the Intel Corporation of Santa Clara, Calif., a hub is used in place of a peripheral component interconnect (PCI) bus to connect elements of chipsets.
  • The persistent storage media may be a removable storage unit such as a CD-ROM reader, a WORM device, a CD-RW device, a floppy disk device, a removable hard disk device, a ZIP disk device, a JAZZ disk device, a DVD device, a removable flash memory device, or a hard card device. However, the database is preferably stored in a non-removable, secure device either within the device being verified, or remotely on a server, in order to enhance security.
  • The verification software executes a DSA verification of the data files and firmware components. Also stored in the database is the public key of the private key/public key pair. For each data file and firmware component, as part of the DSA verification, the processor and verification software first computes the hash value of the digital contents of the component using the SHA-1 algorithm. The verification software then processes or authenticates this computed hash value, using the DSA signature verification algorithm, which also takes, as input, the aforementioned public key stored in the database. The verification part of the DSA produces a boolean result (yes or no) as to whether the inputs solve the algorithm. If the algorithm is not solved by the inputs, then an unexpected result is produced, thereby failing to verify the particular component. This may cause a fault tilt to occur to prohibit the loading operation of the device. Otherwise, use of the device is permitted. A detailed description of the DSA can be found in the U.S. government's Federal Information Processing Standards Publication (FIPS) 186-2. That publication describes each step of the DSA signature generation and verification.
  • Alternatively, the set of executable instructions may use the Rivest-Shamir-Adleman (RSA) algorithm to verify the components. Using the RSA algorithm, a first abbreviated bit string or hash value is computed from each component's digital contents and encrypted into a digital signature. The digital signature is stored in the database along with the identification number for the component. When the device is verified, the component is verified by computing a second abbreviated bit string computed from the component's digital contents. The signature is retrieved from the database by searching the database for the identification number. The signature is decrypted to recover the first abbreviated bit string. The component is then verified by comparing the second abbreviated bit string with the first abbreviated bit string. If the first and second abbreviated bit strings do not match, then the component is not verified. As discussed below, this may cause a fault tilt to occur to prohibit the loading operation of the device. Otherwise, use of the device is permitted.
  • Instead of creating a digital signature for (i.e., signing) each data file individually, collections of data files may be signed together in order speed up processing. The abbreviated bit strings, hash values, or signatures, also called digests, of the collection of data files are collected into a catalog file, and the catalog is signed as described above.
  • Communication
  • After verification between devices has been completed, they may begin communication. At step 1201 of FIG. 12, a device initiates a communication with another device. The sending device may include a section of the first message to provide needed information to the intended recipient. This information may include at step 1202 the type of device, the protocol the device is using, any restrictions related to QOS, and other communication related information. At step 1203 the recipient determines if it can communicate with the sender directly or if an interface is needed at decision block 1204. If an interface is needed at step 1206, the sender and receiver may need to communicate through the GMU, for example, if the GMU includes software or firmware for translating appropriately for the devices. If the devices can communicate directly, then messages are sent back and forth using an accepted protocol at step 1205.
  • The disclosed embodiments allow devices to be aware of each other's presence through MAC/IP transmissions. This permits the use of a single network port for each device to use in communicating with each other and with a back-end system. The devices do not need pre-knowledge of the MAC/IP addresses of other devices but can learn them at start up and during run-time. The system also allows a new device to be added to a game cabinet and have it be integrated and identified to the system without extensive IT effort.
  • Trusted Cabinet Identification Device
  • Referring now to FIGS. 13-17, a preferred embodiment of the trusted cabinet identification device 1300, system, and/or method enables the ability to: (1) uniquely identifying a gaming machine on a gaming floor; (2) uniquely associating components in a gaming machine to that gaming machine; and (3) distributing public key certificates.
  • As shown in FIG. 13, in one embodiment, the trusted cabinet identification device 1300 includes two main components, an interface processor 1310 and a security device 1320. The interface processor 1310 provides communication from external devices through various standard interfaces such as USB, RS-232, and I2C to the security device 1320. The security device 1320 stores information, such as unique identifiers and encryption keys, as well as providing services such as hashing, encryption, digital signatures and random number generation. Additionally, the security device 1320 may conform to a published standard such as the GEMPLUS smartcard specification.
  • The trusted cabinet identification device 1300 provides a two part solution and substantial benefits in terms of providing access to security and identification information by external devices that would not ordinarily be able to communicate with a dedicated single interface security device. Using an off the shelf microcontroller as a front end for this communication service, the ability to support nearly any external device becomes the simple matter of a firmware upgrade.
  • Notably, the trusted cabinet identification device 1300 has the ability to communicate with multiple devices within a gaming machine. Without the use of the trusted cabinet identification device 1300, prior techniques have required a unique ID associated with a single device. Multiple ID chips were installed in a gaming cabinet, with each device in the gaming cabinet wired to one chip. The host system then had to have a master list of all ID chips and the associated gaming machine.
  • In one embodiment, the trusted cabinet identification device 1300 and the controlled access switch 1330 (shown in FIGS. 15 and 16) complement one another in identifying cabinet devices. The controlled access switch 1330 groups devices that are based on an IP network. A preferred embodiment of the trusted cabinet identification device 1300 communicates with multiple protocols including RS232, USB, I2C, and Ethernet. This enables the trusted cabinet identification device 1300 to provide a fixed, tamper-resistant asset identifier in conjunction with the controlled access switch 1330 grouping function, as well as supporting cabinet identification with legacy products such as the legacy GMU 1340 (game monitoring unit, i.e., the GMU model MC250).
  • Since the controlled access switch 1330 is not permanently attached to the cabinet of the gaming machine 1350 and is designed to be field replaceable in case of a malfunction, a controlled access switch 1330 may not be permanently identified as associated with a particular asset number without an asset identifier like the trusted cabinet identification device 1300. If the controlled access switch 1330 device is removed from the gaming machine 1350, the slot floor system has to be updated to reflect the new controlled access switch 1330 device in the gaming machine 1350. The trusted cabinet identification device 1300 is designed to be permanently attached in a tamper evident manner to the gaming machine cabinet. By permanently attaching the trusted cabinet identification device 1300 to the cabinet, the slot floor system does not have to be manually updated when any component is replaced, including the controlled access switch 1330.
  • As shown in FIG. 13, a gaming machine 1350 with a legacy GMU 1340 is attached to a gaming machine's game motherboard 1360. An iView 1370 (a system gaming and/or player tracking user interface and processor, or other comparable component) is also attached to the GMU 1340. Without the trusted cabinet identification device 1300, financial transactions through the iView 1370 are problematic. Since the iView 1370 is not directly connected to the game motherboard 1360, the iView 1370 is reliant upon a slot technician to manually configure the game motherboard 1360, the GMU 1340 and the iView 1370 with the correct slot asset number. If any of these values are incorrect, the financial transactions are credited to the incorrect device. With the trusted cabinet identification device 1300, even if a slot technician incorrectly configures any devices in the gaming machine 1350, the slot floor system can identify the issue for resolution. However, the slot floor system can still function properly and allow financial transactions through any of those devices without disabling the gaming machine 1350. Listed below is the table for the slot floor system that would be used to associate the devices in a gaming machine. Since the GMU 1340, iView 1370, and the game motherboard 1360 have the same cabinet identifier, then all of these devices are in the same cabinet.
  • NETWORK
    DEVICE CABINET INDENTIFIER ADDRESS
    GMU 1340 (MC250) 425F3FD4-62AB-33FS- 5-2E
    BC2E-25271A4E5523
    iView
    1370 425F3FD4-62AB-33FS- 172.26.247.3
    BC2E-25271A4E5523
    Game Motherboard
    1360 425F3FD4-62AB-33FS-
    BC2E-25271A4E5523
  • In FIG. 14, the minimum configuration required for an embodiment of the trusted cabinet identification device 1300 configured for use with the legacy GMU 1340 (MC250) is shown. The GMU 1340 is connected to the trusted cabinet identification device 1300, which is then attached to the rest of the devices in the gaming machine 1350. In this configuration, the GMU 1340 retrieves the cabinet identifier and then passes this information to the game motherboard 1360 and iView 1370. This configuration of the trusted cabinet identification device 1300 has the benefit of uniquely identifying the gaming machine cabinet for each device.
  • As shown in FIG. 15, the gaming machine 1350 has had the GMU 1340 (model MC250) replaced with an IP network-based GMU 1380 (model MC300). The controlled access switch 1330 in this embodiment can associate the game motherboard 1360, the GMU 1380, and the iView 1370 to being inter-related. If the controlled access switch 1330 uses the cabinet identifier from the trusted cabinet identification device 1300, then in a situation where the controlled access switch 1330 fails, the association of the device will not have to be updated on the slot floor system. However, if the game motherboard 1360 was not connected to the controlled access switch 1330, then the controlled access switch would not be able to associate the game motherboard to the other devices in the gaming machine cabinet.
  • NETWORK
    DEVICE CABINET INDENTIFIER ADDRESS
    IP Network based 3F2504E0-4F89-11D3- 5-2E
    GMU 1380 (MC300) 9A0C-0305E82C3301
    iView
    1370 3F2504E0-4F89-11D3- 172.26.247.3
    9A0C-0305E82C3301
    Game Motherboard
    1360 3F2504E0-4F89-11D3-
    9A0C-0305E82C3301
    Trusted Cabinet 3F2504E0-4F89-11D3-
    Identification Device 1300 9A0C-0305E82C3301
  • In FIG. 16, the minimum configuration for the trusted cabinet identification device 1300 with a GMU 1380 (MC300) is shown. In this embodiment of the trusted cabinet identification device 1300, the GMU 1380 retrieves the cabinet identifier from the trusted cabinet identification device 1300 and then relays the cabinet identifier to all of the other attached devices.
  • In a preferred embodiment, the trusted cabinet identification device 1300 permanently attaches to the gaming machine cabinet and enables multiple devices in a gaming machine 1350 to query the device for the trusted cabinet identification device's unique identifier. The use of the trusted cabinet identification device 1300 guarantees globally unique identifiers.
  • In one embodiment, the trusted cabinet identification device 1300 provides a globally unique identifier, is powered from USB or EPI ports, and is accessed only on power-ups of attached devices to minimize power consumption and processing requirements. Additionally, the trusted cabinet identification device 1300 has the following interconnects: (1) USB (enabling multiple hosts to the communicate with the trusted cabinet identification device)—as used in GSA devices and controlled access switch type network switches; (2) EPI (I2C)—as used in some manufacture-specific GMUs; (c) Serial RS232—as used in legacy gaming manufacturers and some manufacture-specific NT boards.
  • Further, in some embodiments the trusted cabinet identification device 1300 is epoxyed (or otherwise secured) into gaming machine cabinet for tamper evident security, since the gaming machines 1350 already have physical security for the cabinet. If the component devices (e.g., gaming machine motherboard 1360, NVRAM, hard drive, GMU 1340 or 1380, iVIEW 1370, controlled access switch 1330, or the like) are replaced in the field, the slot floor system can easily recreate the association. This is accomplished by having the attached devices send the trusted cabinet identification device 1300 a unique identifier to the slot floor system upon registration with the system.
  • In one embodiment, the trusted cabinet identification device 1300 has the capability to sign a message from an attached device. This signature uses a shared key with slot floor system to guarantee that the message did indeed originate from the gaming machine 1350. The trusted cabinet identification device 1300 is a trusted device in the gaming machine 1350 that other attached devices use to build a trusted connection to the slot floor system.
  • Referring now to FIG. 17, a logical flow diagram is shown that presents a component device powering up, at step 1700, retrieving a cabinet identifier, at step 1710, and registering with the slot floor system, at step 1720. More specifically, each of the component devices that are connected to the trusted cabinet identification device 1300 retrieve the cabinet identifier from the device 1300 on component device power up. The cabinet identifier is not intended to be stored on each component device. In retrieving the cabinet identifier, the trusted cabinet identification device supports USB, I2C, Ethernet, and RS232 connections. Next, the component devices register with the slot floor system. Each component device registers with the slot floor system in a device specific way with the appropriate network identifier and the cabinet identifier. The network identifier can be an IP address or a slot line address. The slot floor system can then associate all devices in the gaming machine with the cabinet in which they reside.
  • Although the disclosed embodiments have been described in connection with in-cabinet devices identifying themselves to each other, it is not limited to such an application. The disclosed embodiments may be used to provide identification of any network devices by organically updating identification information periodically in Ethernet frames. In addition, the disclosed embodiments are not limited to the specific network configuration described herein. Rather, the system can work with any number of network configurations without departing from the scope and spirit of the disclosed embodiments.
  • It will be apparent from the foregoing that, while particular forms of the disclosed embodiments have been illustrated and described, various modifications can be made without departing from the spirit and scope of the disclosed embodiments. Accordingly, it is not intended that the disclosed embodiments be limited, except as by the appended claims.

Claims (20)

1. A trusted cabinet identification device secured within a cabinet of a gaming machine that is linked to a central server over a network, wherein the gaming machine includes a plurality of components to be identified within the cabinet, the device comprising:
an interface processor, wherein the interface processor communicates unique identifiers and encryption keys to one or more components to be identified within the cabinet, and wherein the interface processor is capable of communicating in multiple protocols; and
a security device, wherein the security device stores unique identifiers and encryption keys, and wherein the security device performs security functions;
wherein the trusted cabinet identification device enables components within the gaming cabinet to obtain unique identifiers and encryption keys as needed, and register with the central server over the network.
2. The device of claim 1, wherein the multiple protocols include USB, RS232, I2C, and Ethernet.
3. The device of claim 1, wherein the security functions includes hashing, encryption, digital signature generation, random number generation, or combinations thereof.
4. The device of claim 1, wherein the trusted cabinet identification device is secured within the cabinet in a tamper-resistant manner.
5. The device of claim 1, wherein the trusted cabinet identification device enables a message to be digitally signed regarding a unique identifier to confirm message origination from the gaming machine.
6. The device of claim 5, wherein the digitally signed message is sent to a slot floor system on the central server to create a trusted connection.
7. The device of claim 1, wherein the trusted cabinet identification device is only directly connected to a game monitoring unit.
8. The device of claim 7, wherein the trusted cabinet identification device is indirectly connected to other components to be identified within the cabinet via the game monitoring unit.
9. The device of claim 1, wherein the trusted cabinet identification device is directly connected to all components to be identified within the cabinet.
10. The device of claim 1, wherein the trusted cabinet identification device is connected to a controlled access switch that assists the components to be identified within the cabinet with transmission of their corresponding addresses.
11. A trusted cabinet identification system associated with a gaming machine that is linked to a central server over a network, wherein the gaming machine includes a plurality of components to be identified within a cabinet of the gaming machine, the system comprising:
an interface processor, wherein the interface processor communicates unique identifiers and encryption keys to one or more components to be identified within the cabinet, and wherein the interface processor is capable of communicating in multiple protocols; and
a security device, wherein the security device stores unique identifiers and encryption keys, and wherein the security device performs security functions;
wherein the trusted cabinet identification system enables components within the gaming cabinet to obtain unique identifiers and encryption keys as needed, and register with the central server over the network.
12. The device of system 11, wherein the multiple protocols include USB, RS232, I2C, and Ethernet.
13. The device of system 11, wherein the security functions includes hashing, encryption, digital signature generation, random number generation, or combinations thereof.
14. The device of system 11, wherein the trusted cabinet identification device is secured within the cabinet in a tamper-resistant manner.
15. The device of system 11, wherein the trusted cabinet identification device enables a message to be digitally signed regarding a unique identifier to confirm message origination from the gaming machine.
16. The device of system 15, wherein the digitally signed message is sent to a slot floor system on the central server to create a trusted connection.
17. The device of system 11, wherein the trusted cabinet identification device is only directly connected to a game monitoring unit.
18. The device of system 17, wherein the trusted cabinet identification device is indirectly connected to other components to be identified within the cabinet via the game monitoring unit.
19. The device of system 11, wherein the trusted cabinet identification device is directly connected to all components to be identified within the cabinet.
20. The device of system 11, wherein the trusted cabinet identification device is connected to a controlled access switch that assists the components to be identified within the cabinet with transmission of their corresponding addresses.
US12/109,064 2005-09-07 2008-04-24 Trusted Cabinet Identification System Abandoned US20080220880A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/109,064 US20080220880A1 (en) 2005-09-07 2008-04-24 Trusted Cabinet Identification System

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US11/220,781 US8392707B2 (en) 2005-09-07 2005-09-07 Gaming network
US11/319,034 US8118677B2 (en) 2005-09-07 2005-12-23 Device identification
US11/550,781 US8708826B2 (en) 2001-09-28 2006-10-18 Controlled access switch
US12/109,064 US20080220880A1 (en) 2005-09-07 2008-04-24 Trusted Cabinet Identification System

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/319,034 Continuation-In-Part US8118677B2 (en) 2005-09-07 2005-12-23 Device identification

Publications (1)

Publication Number Publication Date
US20080220880A1 true US20080220880A1 (en) 2008-09-11

Family

ID=39742196

Family Applications (1)

Application Number Title Priority Date Filing Date
US12/109,064 Abandoned US20080220880A1 (en) 2005-09-07 2008-04-24 Trusted Cabinet Identification System

Country Status (1)

Country Link
US (1) US20080220880A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100048304A1 (en) * 2008-08-22 2010-02-25 Aristocrat Technologies Australia Pty Limited Network interface, gaming system and gaming device
US20100255902A1 (en) * 2009-04-01 2010-10-07 Igt Gaming Device Security Mechanism
US20100260339A1 (en) * 2009-04-09 2010-10-14 Barson Andrew W Apparatus And Method For Enabling A Transfer of Data
US20100296395A1 (en) * 2009-05-22 2010-11-25 Fujitsu Limited Packet transmission system, packet transmission apparatus, and packet transmission method
US20110119487A1 (en) * 2009-11-13 2011-05-19 Velocite Systems, LLC System and method for encryption rekeying
WO2011137003A1 (en) * 2010-04-28 2011-11-03 Wms Gaming, Inc. Wagering game machine cabinet license compliance
CN109541475A (en) * 2018-12-18 2019-03-29 武汉精能电子技术有限公司 The method that automatic identification is carried out to multiple functions module simultaneously
US10747185B2 (en) * 2017-07-24 2020-08-18 Tyco Safety Products Canada Ltd. System and method for performing encryption between alarm panel and monitoring station

Citations (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3662105A (en) * 1970-05-21 1972-05-09 Univ Kentucky Res Found Electrical sensor of plane coordinates
US4448419A (en) * 1982-02-24 1984-05-15 Telnaes Inge S Electronic gaming device utilizing a random number generator for selecting the reel stop positions
US4618672A (en) * 1980-04-30 1986-10-21 Ricoh Company, Ltd. Bisazo compounds useful as charge generating pigments in electrophotography
US4676506A (en) * 1985-02-14 1987-06-30 Ainsworth Nominees Pty, Limited Odds indicator for poker machines
US4837728A (en) * 1984-01-25 1989-06-06 Igt Multiple progressive gaming system that freezes payouts at start of game
US5429361A (en) * 1991-09-23 1995-07-04 Bally Gaming International, Inc. Gaming machine information, communication and display system
US5475839A (en) * 1990-03-28 1995-12-12 National Semiconductor Corporation Method and structure for securing access to a computer system
US5599231A (en) * 1994-10-31 1997-02-04 Nintendo Co., Ltd. Security systems and methods for a videographics and authentication game/program fabricating device
US5655961A (en) * 1994-10-12 1997-08-12 Acres Gaming, Inc. Method for operating networked gaming devices
US5701204A (en) * 1994-06-29 1997-12-23 Minolta Co., Ltd. Zoom lens system
US5759102A (en) * 1996-02-12 1998-06-02 International Game Technology Peripheral device download method and apparatus
US5770533A (en) * 1994-05-02 1998-06-23 Franchi; John Franco Open architecture casino operating system
US5769716A (en) * 1996-09-30 1998-06-23 International Game Technology Symbol fall game method and apparatus
US5779545A (en) * 1996-09-10 1998-07-14 International Game Technology Central random number generation for gaming system
US5796389A (en) * 1994-08-22 1998-08-18 International Game Technology Reduced noise touch screen apparatus and method
US5809482A (en) * 1994-09-01 1998-09-15 Harrah's Operating Company, Inc. System for the tracking and management of transactions in a pit area of a gaming establishment
US5816918A (en) * 1996-04-05 1998-10-06 Rlt Acquistion, Inc. Prize redemption system for games
US5833536A (en) * 1995-11-15 1998-11-10 International Game Technology System for playing electronics card game with player selection of cards in motion on display
US5833540A (en) * 1996-09-24 1998-11-10 United Games, Inc. Cardless distributed video gaming system
US5851148A (en) * 1996-09-30 1998-12-22 International Game Technology Game with bonus display
US5876284A (en) * 1996-05-13 1999-03-02 Acres Gaming Incorporated Method and apparatus for implementing a jackpot bonus on a network of gaming devices
US5885158A (en) * 1996-02-13 1999-03-23 International Game Technology Gaming system for multiple progressive games
US5919091A (en) * 1995-07-10 1999-07-06 Caesars World, Inc. Combined cashless/cash gaming machine
US5948136A (en) * 1997-07-30 1999-09-07 Sony Corporation Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network
US5967896A (en) * 1998-04-06 1999-10-19 Walker Asset Management Limited Partnership Method and apparatus for controlling a gaming device having a plurality of balances
US5984779A (en) * 1996-09-18 1999-11-16 Bridgeman; James Continuous real time Pari-Mutuel method
US6008784A (en) * 1996-11-06 1999-12-28 Acres Gaming Incorporated Electronic display with curved face
US6010404A (en) * 1997-04-03 2000-01-04 Walker Asset Management Limited Partnership Method and apparatus for using a player input code to affect a gambling outcome
US6055236A (en) * 1998-03-05 2000-04-25 3Com Corporation Method and system for locating network services with distributed network address translation
US6068442A (en) * 1997-05-12 2000-05-30 Flemmer; Rory C. SCARA robot and articulator
US6077163A (en) * 1997-06-23 2000-06-20 Walker Digital, Llc Gaming device for a flat rate play session and a method of operating same
US6110041A (en) * 1996-12-30 2000-08-29 Walker Digital, Llc Method and system for adapting gaming devices to playing preferences
US6113493A (en) * 1997-02-21 2000-09-05 Walker Digital, Llc System and method for generating and executing insurance policies for gambling losses
US6113495A (en) * 1997-03-12 2000-09-05 Walker Digital, Llc Electronic gaming system offering premium entertainment services for enhanced player retention
US6203433B1 (en) * 1997-08-20 2001-03-20 Fuji Xerox Co., Ltd. Network game system, a network game server, a network game client, a player selection program, a medium storing a player selection program, and a medium storing a player information collection program
US6227972B1 (en) * 1997-07-01 2001-05-08 Walker Digital, Llc Method and apparatus for expiration of prepaid slot machine plays
US6243774B1 (en) * 1998-06-30 2001-06-05 International Business Machines Corporation Apparatus program product and method of managing computer resources supporting concurrent maintenance operations
US6244958B1 (en) * 1996-06-25 2001-06-12 Acres Gaming Incorporated Method for providing incentive to play gaming devices connected by a network to a host computer
US6280328B1 (en) * 1996-09-25 2001-08-28 Oneida Indian Nation Cashless computerized video game system and method
US6349881B1 (en) * 1999-06-30 2002-02-26 Richard Bruce Wilkey Identification system for personal property
US20020056100A1 (en) * 1999-04-16 2002-05-09 Tsutomu Shimomura A broadband data broadcasting service
US20020126846A1 (en) * 2001-03-09 2002-09-12 Multerer Boyd C. Multiple user authentication for online console-based gaming
US6473858B1 (en) * 1999-04-16 2002-10-29 Digeo, Inc. Method and apparatus for broadcasting data with access control
US20030050764A1 (en) * 2001-09-11 2003-03-13 Manegold Eric S. System and process to ensure performance of mandated safety and maintenance inspections
US6606387B1 (en) * 1998-03-20 2003-08-12 Trusted Security Solutions, Inc. Secure establishment of cryptographic keys
US6633787B1 (en) * 1999-01-21 2003-10-14 Murata Kikai Kabushiki Kaisha Production machine
US20030195033A1 (en) * 2002-04-10 2003-10-16 Gazdic Daniel J. Gaming software authentication
US6655180B2 (en) * 2001-07-31 2003-12-02 Security People, Inc. Locker lock with adjustable bolt
US6685567B2 (en) * 2001-08-08 2004-02-03 Igt Process verification
US20040023709A1 (en) * 2002-08-05 2004-02-05 Nicole Beaulieu Gaming apparatus and gaming method
US20040054952A1 (en) * 2002-09-13 2004-03-18 Morrow James W. Device verification system and method
US20040131112A1 (en) * 1999-03-30 2004-07-08 Canac Inc. Method and apparatus for assigning addresses to components in a control system
US6778878B1 (en) * 2000-11-27 2004-08-17 Accu-Assembly Incorporated Monitoring electronic component holders
US20040177265A1 (en) * 2003-03-06 2004-09-09 International Business Machines Corporation Providing security based on a device identifier prior to booting an operating system
US20050016235A1 (en) * 2003-06-04 2005-01-27 Zusi Christopher J. Automated machine setup with modular tooling
US20050065828A1 (en) * 2003-09-23 2005-03-24 Kroswek Thomas R. Systems and methods for supply chain management
US20050111443A1 (en) * 2003-11-25 2005-05-26 Marcon International, Inc. Serial bus identification circuit for a computer chip enclosed in a stainless steel can
US20050223219A1 (en) * 2003-03-10 2005-10-06 Cyberscan Technology, Inc. Dynamic configuration of a gaming system
US20050227769A1 (en) * 2001-09-28 2005-10-13 Morrow James W Gaming device network managing system and method
US6973569B1 (en) * 2000-06-30 2005-12-06 Sun Microsystems, Inc. Inexpensive secure on-line certification authority system and method
US20060081697A1 (en) * 2001-09-11 2006-04-20 Zonar Compliance Systems, Llc Ensuring the performance of mandated inspections combined with the collection of ancillary data
US7121460B1 (en) * 2002-07-16 2006-10-17 Diebold Self-Service Systems Division Of Diebold, Incorporated Automated banking machine component authentication system and method
US20060287079A1 (en) * 2005-05-31 2006-12-21 Nobuyuki Nonaka Player authentication device, player management server, gaming machine and sandwiched device
US7162036B2 (en) * 2001-08-06 2007-01-09 Igt Digital identification of unique game characteristics
US20070054740A1 (en) * 2005-09-07 2007-03-08 Bally Technologies, Inc. Hybrid gaming network
US20070055753A1 (en) * 2005-09-07 2007-03-08 Robb Harold K Device identification
US20070060302A1 (en) * 2005-08-17 2007-03-15 Igt Scan based configuration control in a gaming environment
US20070136817A1 (en) * 2000-12-07 2007-06-14 Igt Wager game license management in a peer gaming network
US20070192606A1 (en) * 2004-03-08 2007-08-16 Yutaka Yasukura Electronic terminal device protection system
US20070191109A1 (en) * 2001-08-20 2007-08-16 Bally Gaming, Inc. Local Game-Area Network Method
US7260834B1 (en) * 1999-10-26 2007-08-21 Legal Igaming, Inc. Cryptography and certificate authorities in gaming machines
US20070287536A1 (en) * 2006-05-24 2007-12-13 Igt Extension component for authenticating game data
US20080030746A1 (en) * 2006-07-28 2008-02-07 Xerox Corporation Verification system for variable printing products
US20080045342A1 (en) * 2003-03-05 2008-02-21 Bally Gaming, Inc. Data Integrity and Non-Repudiation
US20080076558A1 (en) * 2006-09-22 2008-03-27 Aruze Gaming America, Inc. Gaming system, server, gaming terminal and game control method
US20080090653A1 (en) * 2006-10-16 2008-04-17 Kuehling Brian L Secure progressive controller
US7382251B2 (en) * 2004-04-07 2008-06-03 Commerceguard Ab Method and system for arming a container security device without use of electronic reader
US20080141017A1 (en) * 2006-07-13 2008-06-12 Mccoull James Ross Gaming machine having a secure boot chain and method of use
US20080313312A1 (en) * 2006-12-06 2008-12-18 David Flynn Apparatus, system, and method for a reconfigurable baseboard management controller
US7506381B2 (en) * 2001-06-15 2009-03-17 Nokia Corporation Method for securing an electronic device, a security system and an electronic device
US20090172156A1 (en) * 2007-12-29 2009-07-02 Cisco Technology, Inc. Address security in a routed access network
US20090215528A1 (en) * 2005-09-09 2009-08-27 Wms Gaming Inc. Gaming network with remote file system for storing game content
US20100062844A1 (en) * 2003-03-05 2010-03-11 Bally Gaming, Inc. Authentication and validation systems for gaming devices
US7778794B2 (en) * 2007-11-26 2010-08-17 The Boeing Company System and method for identifying an element of a structure in an engineered environment
US20100228405A1 (en) * 2007-06-13 2010-09-09 Intrago Corporation Shared vehicle management system
US7953976B2 (en) * 2003-10-14 2011-05-31 International Business Machines Corporation Method and apparatus for pervasive authentication domains
US8335915B2 (en) * 2002-05-14 2012-12-18 Netapp, Inc. Encryption based security system for network storage

Patent Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3662105A (en) * 1970-05-21 1972-05-09 Univ Kentucky Res Found Electrical sensor of plane coordinates
US4618672A (en) * 1980-04-30 1986-10-21 Ricoh Company, Ltd. Bisazo compounds useful as charge generating pigments in electrophotography
US4448419A (en) * 1982-02-24 1984-05-15 Telnaes Inge S Electronic gaming device utilizing a random number generator for selecting the reel stop positions
US4837728A (en) * 1984-01-25 1989-06-06 Igt Multiple progressive gaming system that freezes payouts at start of game
US4676506A (en) * 1985-02-14 1987-06-30 Ainsworth Nominees Pty, Limited Odds indicator for poker machines
US5475839A (en) * 1990-03-28 1995-12-12 National Semiconductor Corporation Method and structure for securing access to a computer system
US5429361A (en) * 1991-09-23 1995-07-04 Bally Gaming International, Inc. Gaming machine information, communication and display system
US5770533A (en) * 1994-05-02 1998-06-23 Franchi; John Franco Open architecture casino operating system
US5701204A (en) * 1994-06-29 1997-12-23 Minolta Co., Ltd. Zoom lens system
US5796389A (en) * 1994-08-22 1998-08-18 International Game Technology Reduced noise touch screen apparatus and method
US5809482A (en) * 1994-09-01 1998-09-15 Harrah's Operating Company, Inc. System for the tracking and management of transactions in a pit area of a gaming establishment
US5741183A (en) * 1994-10-12 1998-04-21 Acres Gaming Inc. Method and apparatus for operating networked gaming devices
US5752882A (en) * 1994-10-12 1998-05-19 Acres Gaming Inc. Method and apparatus for operating networked gaming devices
US5836817A (en) * 1994-10-12 1998-11-17 Acres Gaming, Inc. Method and apparatus for operating networked gaming devices
US6257981B1 (en) * 1994-10-12 2001-07-10 Acres Gaming Incorporated Computer network for controlling and monitoring gaming devices
US5655961A (en) * 1994-10-12 1997-08-12 Acres Gaming, Inc. Method for operating networked gaming devices
US6162122A (en) * 1994-10-12 2000-12-19 Acres Gaming Incorporated Method and apparatus for operating networked gaming devices
US5820459A (en) * 1994-10-12 1998-10-13 Acres Gaming, Inc. Method and apparatus for operating networked gaming devices
US6254483B1 (en) * 1994-10-12 2001-07-03 Acres Gaming Incorporated Method and apparatus for controlling the cost of playing an electronic gaming device
US5599231A (en) * 1994-10-31 1997-02-04 Nintendo Co., Ltd. Security systems and methods for a videographics and authentication game/program fabricating device
US5919091A (en) * 1995-07-10 1999-07-06 Caesars World, Inc. Combined cashless/cash gaming machine
US5833536A (en) * 1995-11-15 1998-11-10 International Game Technology System for playing electronics card game with player selection of cards in motion on display
US5759102A (en) * 1996-02-12 1998-06-02 International Game Technology Peripheral device download method and apparatus
US5885158A (en) * 1996-02-13 1999-03-23 International Game Technology Gaming system for multiple progressive games
US5816918A (en) * 1996-04-05 1998-10-06 Rlt Acquistion, Inc. Prize redemption system for games
US5876284A (en) * 1996-05-13 1999-03-02 Acres Gaming Incorporated Method and apparatus for implementing a jackpot bonus on a network of gaming devices
US6244958B1 (en) * 1996-06-25 2001-06-12 Acres Gaming Incorporated Method for providing incentive to play gaming devices connected by a network to a host computer
US5779545A (en) * 1996-09-10 1998-07-14 International Game Technology Central random number generation for gaming system
US5984779A (en) * 1996-09-18 1999-11-16 Bridgeman; James Continuous real time Pari-Mutuel method
US5833540A (en) * 1996-09-24 1998-11-10 United Games, Inc. Cardless distributed video gaming system
US6280328B1 (en) * 1996-09-25 2001-08-28 Oneida Indian Nation Cashless computerized video game system and method
US5851148A (en) * 1996-09-30 1998-12-22 International Game Technology Game with bonus display
US5769716A (en) * 1996-09-30 1998-06-23 International Game Technology Symbol fall game method and apparatus
US6008784A (en) * 1996-11-06 1999-12-28 Acres Gaming Incorporated Electronic display with curved face
US6293866B1 (en) * 1996-12-30 2001-09-25 Walker Digital, Llc System for adapting gaming devices to playing preferences
US6110041A (en) * 1996-12-30 2000-08-29 Walker Digital, Llc Method and system for adapting gaming devices to playing preferences
US6113493A (en) * 1997-02-21 2000-09-05 Walker Digital, Llc System and method for generating and executing insurance policies for gambling losses
US6254482B1 (en) * 1997-02-21 2001-07-03 Walker Digital, Llc System and method for generating and executing insurance policies for gambling losses
US6113495A (en) * 1997-03-12 2000-09-05 Walker Digital, Llc Electronic gaming system offering premium entertainment services for enhanced player retention
US6010404A (en) * 1997-04-03 2000-01-04 Walker Asset Management Limited Partnership Method and apparatus for using a player input code to affect a gambling outcome
US6068442A (en) * 1997-05-12 2000-05-30 Flemmer; Rory C. SCARA robot and articulator
US6077163A (en) * 1997-06-23 2000-06-20 Walker Digital, Llc Gaming device for a flat rate play session and a method of operating same
US6227972B1 (en) * 1997-07-01 2001-05-08 Walker Digital, Llc Method and apparatus for expiration of prepaid slot machine plays
US5948136A (en) * 1997-07-30 1999-09-07 Sony Corporation Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network
US6203433B1 (en) * 1997-08-20 2001-03-20 Fuji Xerox Co., Ltd. Network game system, a network game server, a network game client, a player selection program, a medium storing a player selection program, and a medium storing a player information collection program
US6055236A (en) * 1998-03-05 2000-04-25 3Com Corporation Method and system for locating network services with distributed network address translation
US6606387B1 (en) * 1998-03-20 2003-08-12 Trusted Security Solutions, Inc. Secure establishment of cryptographic keys
US5967896A (en) * 1998-04-06 1999-10-19 Walker Asset Management Limited Partnership Method and apparatus for controlling a gaming device having a plurality of balances
US6243774B1 (en) * 1998-06-30 2001-06-05 International Business Machines Corporation Apparatus program product and method of managing computer resources supporting concurrent maintenance operations
US6633787B1 (en) * 1999-01-21 2003-10-14 Murata Kikai Kabushiki Kaisha Production machine
US20040131112A1 (en) * 1999-03-30 2004-07-08 Canac Inc. Method and apparatus for assigning addresses to components in a control system
US20020056100A1 (en) * 1999-04-16 2002-05-09 Tsutomu Shimomura A broadband data broadcasting service
US6473858B1 (en) * 1999-04-16 2002-10-29 Digeo, Inc. Method and apparatus for broadcasting data with access control
US6349881B1 (en) * 1999-06-30 2002-02-26 Richard Bruce Wilkey Identification system for personal property
US7260834B1 (en) * 1999-10-26 2007-08-21 Legal Igaming, Inc. Cryptography and certificate authorities in gaming machines
US6973569B1 (en) * 2000-06-30 2005-12-06 Sun Microsystems, Inc. Inexpensive secure on-line certification authority system and method
US6778878B1 (en) * 2000-11-27 2004-08-17 Accu-Assembly Incorporated Monitoring electronic component holders
US20070136817A1 (en) * 2000-12-07 2007-06-14 Igt Wager game license management in a peer gaming network
US20020126846A1 (en) * 2001-03-09 2002-09-12 Multerer Boyd C. Multiple user authentication for online console-based gaming
US7506381B2 (en) * 2001-06-15 2009-03-17 Nokia Corporation Method for securing an electronic device, a security system and an electronic device
US6655180B2 (en) * 2001-07-31 2003-12-02 Security People, Inc. Locker lock with adjustable bolt
US7162036B2 (en) * 2001-08-06 2007-01-09 Igt Digital identification of unique game characteristics
US6685567B2 (en) * 2001-08-08 2004-02-03 Igt Process verification
US20070191109A1 (en) * 2001-08-20 2007-08-16 Bally Gaming, Inc. Local Game-Area Network Method
US20030050764A1 (en) * 2001-09-11 2003-03-13 Manegold Eric S. System and process to ensure performance of mandated safety and maintenance inspections
US20030061005A1 (en) * 2001-09-11 2003-03-27 Manegold Eric S. System and process to ensure performance of mandated safety and maintenance inspections
US20060081697A1 (en) * 2001-09-11 2006-04-20 Zonar Compliance Systems, Llc Ensuring the performance of mandated inspections combined with the collection of ancillary data
US20050227769A1 (en) * 2001-09-28 2005-10-13 Morrow James W Gaming device network managing system and method
US20030195033A1 (en) * 2002-04-10 2003-10-16 Gazdic Daniel J. Gaming software authentication
US8335915B2 (en) * 2002-05-14 2012-12-18 Netapp, Inc. Encryption based security system for network storage
US7121460B1 (en) * 2002-07-16 2006-10-17 Diebold Self-Service Systems Division Of Diebold, Incorporated Automated banking machine component authentication system and method
US20040023709A1 (en) * 2002-08-05 2004-02-05 Nicole Beaulieu Gaming apparatus and gaming method
US20040054952A1 (en) * 2002-09-13 2004-03-18 Morrow James W. Device verification system and method
US20080045342A1 (en) * 2003-03-05 2008-02-21 Bally Gaming, Inc. Data Integrity and Non-Repudiation
US20100062844A1 (en) * 2003-03-05 2010-03-11 Bally Gaming, Inc. Authentication and validation systems for gaming devices
US20040177265A1 (en) * 2003-03-06 2004-09-09 International Business Machines Corporation Providing security based on a device identifier prior to booting an operating system
US20050223219A1 (en) * 2003-03-10 2005-10-06 Cyberscan Technology, Inc. Dynamic configuration of a gaming system
US20050016235A1 (en) * 2003-06-04 2005-01-27 Zusi Christopher J. Automated machine setup with modular tooling
US20050065828A1 (en) * 2003-09-23 2005-03-24 Kroswek Thomas R. Systems and methods for supply chain management
US7953976B2 (en) * 2003-10-14 2011-05-31 International Business Machines Corporation Method and apparatus for pervasive authentication domains
US20050111443A1 (en) * 2003-11-25 2005-05-26 Marcon International, Inc. Serial bus identification circuit for a computer chip enclosed in a stainless steel can
US20070192606A1 (en) * 2004-03-08 2007-08-16 Yutaka Yasukura Electronic terminal device protection system
US7382251B2 (en) * 2004-04-07 2008-06-03 Commerceguard Ab Method and system for arming a container security device without use of electronic reader
US20060287079A1 (en) * 2005-05-31 2006-12-21 Nobuyuki Nonaka Player authentication device, player management server, gaming machine and sandwiched device
US20070060302A1 (en) * 2005-08-17 2007-03-15 Igt Scan based configuration control in a gaming environment
US20090149245A1 (en) * 2005-08-17 2009-06-11 Igt Scan based configuration control in a gaming environment
US20070054740A1 (en) * 2005-09-07 2007-03-08 Bally Technologies, Inc. Hybrid gaming network
US20070055753A1 (en) * 2005-09-07 2007-03-08 Robb Harold K Device identification
US20090215528A1 (en) * 2005-09-09 2009-08-27 Wms Gaming Inc. Gaming network with remote file system for storing game content
US20070287536A1 (en) * 2006-05-24 2007-12-13 Igt Extension component for authenticating game data
US20080141017A1 (en) * 2006-07-13 2008-06-12 Mccoull James Ross Gaming machine having a secure boot chain and method of use
US20080030746A1 (en) * 2006-07-28 2008-02-07 Xerox Corporation Verification system for variable printing products
US8520233B2 (en) * 2006-07-28 2013-08-27 Xerox Corporation Verification system for variable printing products
US20080076558A1 (en) * 2006-09-22 2008-03-27 Aruze Gaming America, Inc. Gaming system, server, gaming terminal and game control method
US20080090653A1 (en) * 2006-10-16 2008-04-17 Kuehling Brian L Secure progressive controller
US20080313312A1 (en) * 2006-12-06 2008-12-18 David Flynn Apparatus, system, and method for a reconfigurable baseboard management controller
US20100228405A1 (en) * 2007-06-13 2010-09-09 Intrago Corporation Shared vehicle management system
US7778794B2 (en) * 2007-11-26 2010-08-17 The Boeing Company System and method for identifying an element of a structure in an engineered environment
US20090172156A1 (en) * 2007-12-29 2009-07-02 Cisco Technology, Inc. Address security in a routed access network

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100048304A1 (en) * 2008-08-22 2010-02-25 Aristocrat Technologies Australia Pty Limited Network interface, gaming system and gaming device
US20100255902A1 (en) * 2009-04-01 2010-10-07 Igt Gaming Device Security Mechanism
US8892469B2 (en) * 2009-04-01 2014-11-18 Igt Gaming device security mechanism
US20100260339A1 (en) * 2009-04-09 2010-10-14 Barson Andrew W Apparatus And Method For Enabling A Transfer of Data
US8718282B2 (en) * 2009-04-09 2014-05-06 Money Controls Limited Apparatus and method for enabling a transfer of data
US20100296395A1 (en) * 2009-05-22 2010-11-25 Fujitsu Limited Packet transmission system, packet transmission apparatus, and packet transmission method
US20110119487A1 (en) * 2009-11-13 2011-05-19 Velocite Systems, LLC System and method for encryption rekeying
WO2011137003A1 (en) * 2010-04-28 2011-11-03 Wms Gaming, Inc. Wagering game machine cabinet license compliance
US8632398B2 (en) 2010-04-28 2014-01-21 Wms Gaming, Inc. Wagering game machine cabinet license compliance
US10747185B2 (en) * 2017-07-24 2020-08-18 Tyco Safety Products Canada Ltd. System and method for performing encryption between alarm panel and monitoring station
CN109541475A (en) * 2018-12-18 2019-03-29 武汉精能电子技术有限公司 The method that automatic identification is carried out to multiple functions module simultaneously

Similar Documents

Publication Publication Date Title
US9530274B2 (en) Device identification
US20070054741A1 (en) Network gaming device peripherals
US20080220880A1 (en) Trusted Cabinet Identification System
US20070054740A1 (en) Hybrid gaming network
US8392707B2 (en) Gaming network
US7260834B1 (en) Cryptography and certificate authorities in gaming machines
US20110183748A1 (en) Wagering game with encryption and authentication
US7917747B2 (en) Multi-party encryption systems and methods
US20040266533A1 (en) Gaming software distribution network in a gaming system environment
US20040259633A1 (en) Remote authentication of gaming software in a gaming system environment
US20040259640A1 (en) Layered security methods and apparatus in a gaming system environment
US20060253702A1 (en) Secure gaming server
US20040266523A1 (en) Secured networks in a gaming system environment
US8926434B2 (en) Server-based gaming system and method utilizing unique memory environments
US20100120527A1 (en) Co-processor assisted software authentication method
US20080220879A1 (en) Trusted Cabinet Identification Method
US20100041471A1 (en) Multiple key failover validation in a wagering game machine
US20100120526A1 (en) Co-processor assisted software authentication system
CA2863489C (en) Creation and monitoring of "fair play" online gaming
Chassis FIPS 140-2 Security Policy

Legal Events

Date Code Title Description
AS Assignment

Owner name: BALLY GAMING, INC., NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BARRIE, FRED;ROBB, HAROLD K.;REEL/FRAME:020852/0077;SIGNING DATES FROM 20080417 TO 20080421

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS ADMINISTRATIVE AGENT, TE

Free format text: AMENDED AND RESTATED PATENT SECURITY AGREEMENT;ASSIGNOR:BALLY GAMING, INC.;REEL/FRAME:031745/0001

Effective date: 20131125

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: ARCADE PLANET, INC., NEVADA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:034501/0049

Effective date: 20141121

Owner name: BALLY TECHNOLOGIES, INC., NEVADA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:034501/0049

Effective date: 20141121

Owner name: BALLY GAMING, INC, NEVADA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:034501/0049

Effective date: 20141121

Owner name: BALLY GAMING INTERNATIONAL, INC., NEVADA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:034501/0049

Effective date: 20141121

Owner name: SHFL ENTERTAINMENT, INC, NEVADA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:034501/0049

Effective date: 20141121

Owner name: SIERRA DESIGN GROUP, NEVADA

Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:BANK OF AMERICA, N.A.;REEL/FRAME:034501/0049

Effective date: 20141121

AS Assignment

Owner name: SG GAMING, INC., NEVADA

Free format text: CHANGE OF NAME;ASSIGNOR:BALLY GAMING, INC.;REEL/FRAME:051641/0653

Effective date: 20200103