WO1996034368A1 - Tamper protection and activation method for an electronic gaming device and device therefor - Google Patents
Tamper protection and activation method for an electronic gaming device and device therefor Download PDFInfo
- Publication number
- WO1996034368A1 WO1996034368A1 PCT/FR1996/000645 FR9600645W WO9634368A1 WO 1996034368 A1 WO1996034368 A1 WO 1996034368A1 FR 9600645 W FR9600645 W FR 9600645W WO 9634368 A1 WO9634368 A1 WO 9634368A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- game
- encryption
- key
- box
- portable object
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C15/00—Generating random numbers; Lottery apparatus
- G07C15/005—Generating random numbers; Lottery apparatus with dispensing of lottery tickets
Definitions
- the invention relates to the activation and anti-fraud protection of an electronic gaming device and the corresponding device.
- a portable box intended to allow a player to perform one or more tests of games of chance, success or failure in said tests conditioning a score or a level of gain according to predetermined rules of the game .
- This box then also constitutes the transaction element for the payment of the gain and includes all the elements necessary for the verification thereof.
- each autonomous unit can be used only once. This naturally poses an economic and ecological problem due to this unit use combined with an estimated distribution of the order of several tens of millions of units per month.
- this type of box can only be used once, it is also associated with a unique type of game.
- the current market for games of chance shows that the lifespan of a type of game is generally short and that these must be renewed often which then leads the manufacturer of the case to constantly design new external forms for the product as well as new software interfaces.
- An object of the invention is to propose an electronic game device capable of being usable several times with possibly different types of game.
- the invention therefore aims to integrate this concept of security in a multi-application and multi-use game device.
- the invention therefore first of all proposes a method of activating and anti-fraud protection of an electronic game device comprising at least one box in which at least one encryption-result key has been stored, as well as at minus a portable object capable of cooperating with the box, and in which has been stored a set of digital game data that can be authenticated and representative of a game.
- the portable object is made to cooperate with the box.
- the authentication of the game data set and this set of game data is stored in a working memory of the box, so as to authorize the progress of the game at the level of the box.
- we encrypt within the box a result information dependent on said game, using at least said encryption-result key.
- This encrypted result information is stored in a result memory of the portable object. Then, the portable object is made to cooperate with a validation station having access to said encryption-result key, said station carrying out validation processing from at least said encrypted result information and said encryption-result key.
- the digital game data that is to say the application or the game software
- the digital game data are deported outside the electronic unit and incorporated into an object memory.
- portable which can come in different forms, such as credit card, domino, token, etc.
- the electronic unit it can be sold only once and can be used several times with any portable object containing game software.
- the portable object which is intended to contain both the digital game data defining the game itself, as well as the result information allowing the player to validate this result so as to touch possibly his gain.
- the portable object here constitutes the transaction element while the box is only used by the player for playing.
- the result information which will be encrypted in the box before being transferred to the portable object naturally depends on the nature of the game. This can for example be binary information of the "won” or " lost ", or even, for example, information representative of a gain level.
- the digital game data set stored in the portable object can be authenticated so as to allow verification of its auditing within the housing.
- the word “authentifiable” must inte ⁇ rtate be broadly by including “instance storage in” clear "digital data set themselves jointly obtained a certificate of authentication from these digital data set by an appropriate algorithm, or even encryption at least partial of this set, or for example encryption of the authentication certificate.
- the verification of the authenticity of the set of game data can be carried out before, during or after the storage of the latter in the working memory of the box. It should also be noted here that, according to the invention, all of the digital game data is transferred to the working memory of the box (in practice this data is for example read in the portable object then copied into the memory of work of the case) so that the cooperation between the portable object and the case could possibly be suppressed during the course of the game at the case.
- the invention therefore thus avoids the use of complex software means that would require the direct operation of the game software of the portable object by the processing unit of the box without transfer to the memory of the box. Also, according to an embodiment of the method according to the invention, it is advantageously provided that the set of game data of a portable object is read via a serial protocol between the portable object and The box. This minimizes the hardware and software resources of the portable object.
- the game software is directly operated by the unit's processing unit directly in its working memory.
- the validation processing carried out by the validation station must make it possible to determine and / or verify the result information from the content of the portable object. Indeed only this memorized content must be authentic to authorize a possible payment of a gain.
- the validation processing carried out by the validation station may include a decryption of the encrypted result information stored in the result memory of the portable object, using the encryption-result key.
- this validation processing can be carried out in a different manner. More precisely, it is possible to store in the portable object, together with the encrypted result information, the unencrypted result information, that is to say "in the clear”. The station then verifies said result information by re-encrypting, using the encryption-result key, the unencrypted result information which is stored in the portable object and by comparing this re-encrypted result information with the information. results encrypted and stored in the result memory of the portable object.
- the device according to the invention generally comprises several boxes and several portable objects. Also, when the authentication of the set of game data of one of the portable objects has been verified and that said set has been stored in the working memory of one of the boxes, any subsequent operation is advantageously prohibited. by any of the boxes, from the set of game data for this portable object.
- the set of game data stored in the portable object can be authenticated by adding a linked authentication certificate to it. in a one-to-one way to the digital game data.
- the verification of the authentication of the game data set then comprises a recalculation of the authentication certificate within the box and a comparison between the recalculated authentication certificate and the certificate d authentication stored in the portable object.
- any subsequent use of a set of game data can be prohibited by altering in the corresponding portable object, at least partially said authentication certificate and / or at least partially the game data itself.
- We can for this purpose consider arbitrarily modifying the value of some of the bits of the authentication certificate and / or of some of the digital game data. Therefore, if a player tries to replay with the same portable object, the unit the box will recalculate an authentication certificate which will differ from the altered authentication certificate, which will prevent any activation of the game.
- the storage of the encrypted result information in the portable object is advantageously authorized only if all further use of the play data set for this portable object.
- the method it is possible to store in the box at least one game encryption key.
- the authentication of the set of game data stored in the portable object can then comprise at least partial encryption of this set of game data, or of information linked to this set of game data (for example the authentication certificate), using the game encryption key, and this, before reading by the unit's processing unit, of the game data set of the portable object.
- the verification of the authentication of the game data set then includes a decryption within the box using the game encryption key.
- the encrypted transfer of the application, or of the associated authentication certificate makes it possible to avoid the loading of a fraudulent application leading inevitably to obtaining a gain. You can possibly only encrypt and decrypt the authentication certificate.
- the game-encryption key which has been previously encrypted using the box-encryption key can be stored in the box. This further increases security and makes it even more difficult for a third party to know the game encryption key.
- the game encryption key can be common to all boxes and all portable objects.
- the encryption-box key is preferably different for each box.
- the encryption key-housing of a housing is stored therein before the storage of the encryption key-game, for example during its manufacture.
- the set of game data of a portable object can be stored therein, already at least partially encrypted, or associated with information already at least partially encrypted, using the encryption key. Game.
- the encryption-result key can be the encryption-box key, or the encryption-game key, or can be obtained from a combination of these two keys.
- any validation station knows this encryption-game key since it is common to all the elements of the device. This being so, when the encryption-result key is not known in advance by the validation station, provision is made for storing in the portable object cooperating with the box, key information associated so one-to-one with said encryption-result key, the validation station then having access to said encryption-result key by reading said key information stored in the portable object.
- the encryption-result key is the encryption-box key
- it can advantageously be provided to associate with each box an identifier defining it uniquely, and thereby identifying the encryption-box key that has been stored in the box.
- a table of identifiers can for example be stored in a protected manner in a central computer to which all the validation stations are linked. The box identifier is then stored with the encrypted result information in the portable object.
- the validation station then having access to the identifier as well as to the correspondence table can determine the encryption-result key and decrypt the encrypted result information.
- the subject of the invention is also an electronic game device.
- this electronic game device comprises at least one housing, at least one portable object and at least one validation station.
- the portable object comprises a game memory containing a set of authenticated game data representative of a game, a result memory capable of containing encrypted result information, a first communication interface capable of cooperating with a communication interface -box, and a second communication interface able to communicate with a communication-station interface.
- the housing comprises a key memory containing at least one encryption-result key, a working memory accessible in writing and in reading, and a processing unit connected to these memories as well as to the communication-housing interface.
- the processing unit is capable, during cooperation between the communication interface-box and the first communication interface of the object, of verifying the authentication of the set of game data stored in the object and to store said assembly in the working memory so as to allow the progress of the game at the level of the housing.
- the processing unit of the box is also capable of encrypting result information dependent on said game, using the encryption-result key, and of communicating this encrypted result information to the communication-box interface for the purposes of its storage in the result memory of the object.
- the validation station includes means able to determine said encryption-result key and processing-station means able to read the encrypted result information via the communication interface.
- any of the portable objects is capable of cooperating with any of the boxes and with any of the validation stations .
- the first communication interface of the portable object is a serial interface. Furthermore, and for reasons of economy, it is possible to provide that the portable object has only one and the same communication interface capable of cooperating with the communication-box interface or with the communication interface. - station.
- the station processing means may include station decryption means capable of decrypting the encrypted result information for the purpose of its determination.
- the processing unit of the box is able to also communicate the unencrypted result information to the communication-box interface for the purpose of its storage in the result memory of the object.
- the station-processing means are then further able to read the unencrypted result information via the station-communication interface. They then include station-encryption means capable of encrypting said unencrypted result information using the encryption-result key, as well as comparison means for comparing the recalculated encrypted result information with the information. result result stored in the result memory of the portable object. This comparison thus makes it possible to verify the result information.
- the means for verifying the authentication of this set of game data then preferably comprise certificate calculation means capable of recalculating said certificate d authentication within the box, from the set of game data, and comparison means capable of comparing the recalculated certificate and the certificate stored in the game memory of the portable object.
- the device it is possible to provide encryption means capable of at least partially encrypting the set of authenticated game data, or information linked to this set of game data (for example the certificate of authentication), using at least one game encryption key.
- the key memory of the box is then able to contain this game encryption key while the means for verifying the authentication of the game data set comprise decryption means connected to the key memory.
- These encryption means may only encrypt the authentication certificate.
- These encryption means can be incorporated within a manufacturing unit so as to directly deliver a set of at least partially encrypted game data or an authentication certification already at least partially encrypted, which will be intended to be stored as is in the portable object.
- FIG. 1 very schematically represents the hardware architecture of a portable object of a device according to the invention
- FIG. 2 very schematically represents the hardware architecture of a housing of the device according to the invention
- FIG. 3 very schematically represents the hardware architecture of a validation station of the device according to the invention
- FIGS. 4a and 4b schematically illustrate an embodiment of the method according to the invention
- the device according to the invention comprises several autonomous electronic boxes BT, several portable objects OB and several validation stations ST.
- each portable object OB for example a card of the smart card type, a token, or a module, comprises, for example within an ASIC (Application Specifies Integrated Circuit) a micro- CPU controller connected via a bus to a serial type ESC input / output interface, to a game memory MJ, as well as to a result memory MR, such as a register.
- ASIC Application Specifies Integrated Circuit
- the game memory MJ for example a read only memory, is intended to receive a set of digital game data, or game software, representative of a particular type of game.
- the register MR is intended for its part to receive encrypted result information coming from the BT box after the progress of at least part of the game.
- the ESC interface includes means of cooperation with a homologous interface ESB of the box BT (FIG. 2) and a homologous interface ESS of the station ST (FIG. 3). These cooperation means may consist of a mechanical connector or alternatively of capacitive / inductive, or optical coupling means.
- the hardware electronic structure of the portable box BT is articulated around a processing unit UT, such as a microprocessor or a microcontroller.
- This processing unit UT is connected via a bus to a working memory MT, accessible by writing and reading, for example a random access memory (RAM), to a program memory MM as well as to a standard memory of key MC which is a protected memory which can be a part of the memory MM-
- the unit of processing is also connected to a liquid crystal display screen AF as well as to a keyboard C1 comprising for example keys for controlling movements in two orthogonal directions.
- the processing unit is connected to a communication interface-ESB box capable of cooperating with the communication interface ESC, and which can for example include a mechanical connector disposed in a housing in which the connector of the portable object.
- the ESB interface also includes serial / parallel conversion means connected to the internal bus of the box. All of the means of this box are supplied by autonomous supply means AL such as batteries. All or part of the components of this case can be made in the form of an Asia.
- the working memory MT is dimensioned so as to be able to receive the game application stored in the memory MJ of the object while the memory MM contains the program for internal management of the box (management of inputs / outputs, management of the keyboard, of the screen, program for loading the application into the working memory ). According to the embodiment described with reference to the figure
- each validation station ST comprises a processing block articulated around a processor PR connected to an input / output interface ESS capable of cooperating with the input / output interface ESC of the portable object. Furthermore, the station is connected via an appropriate link, to a central file TB containing information necessary, as will be seen in more detail below, for the verification of the result information contained in the portable object.
- the station's PR processor software embeds the various functional means necessary for its operation (encryption, decryption, comparison, reading, etc.).
- the digital game data set JE On a manufacturing site, the digital game data set JE, forming the game application software, is processed by processing means comprising a well-known authentication certificate calculation algorithm of the SHA (Secure Hash Algorithm) type. of the skilled person. The latter may however, for more details, refer to publication 180-1 of May 31, 1994 issued by the FIPS (Federal Information Processing Standards).
- SHA Secure Hash Algorithm
- calculation means determine a CTF audit certificate from logical functions operating on the bits of the digital game data (step 1).
- the authentication certificate comprises for example 120 bits.
- encryption means for example using the DES encryption algorithm (Data Encryption Standard) perform an encryption of the CTF authentication certificate (step 2) so as to issue an encrypted authentication certificate CTFc.
- the digital game data and the encrypted authentication certificate are then stored in the game memory MJ of the portable object (step 3).
- the portable object is then ready to be distributed to the public.
- the box there is stored in the key memory MC thereof, for example during its manufacture on site, an encryption-box key Kf (step 4).
- the box is then also ready for distribution to the public.
- a player can obtain such a box from a validation station of the ST station type.
- the box and the station are made to cooperate by means of respective communication interfaces so as to read (step 5) the encryption key-box Kf stored in the key memory of the box.
- These interfaces can be, in particular when they are of the capacitive / inductive coupling type, the same as the ESB and ESS interfaces. They can also be distinct from the latter, for example of the mechanical connector type.
- the processor PR of the validation station knowing the encryption key-set Km, (for example stored in the central file TB) then performs by means of encryption means of the DES type an encryption (step 6) of the key Km using the encryption key / box Kf.
- This encryption-game key encrypted under Kf, and referenced Kmc is then stored (step 7) in the key memory of the box.
- the player When the player wishes to play a particular game, he obtains from a specialized retailer a portable object containing the corresponding game software. The player then inserts the portable object into the corresponding housing of the housing so as to make the respective ESC and ESB interfaces of the object and the housing cooperate.
- the decryption means for example of the DES type, software incorporated in the processing unit UT of the box decrypt the encrypted game encryption key Kmc.
- the processing unit reads the digital game data as well as the encrypted authentication certificate CTFc stored in the portable object, via a serial protocol via the ESB interface.
- the processing unit UT then recalculates an authentication certificate from the digital game data JE, decrypts the encrypted authentication certificate CTFc using the game encryption key Km, compares the recalculated authentication certificate and the authentication certificate stored so as to verify the authenticity of the game software (step 8).
- the digital game data set JE is stored in the working memory MT of the box so that it can be used subsequently and directly by the processing unit UT for the purpose of executing the game.
- the authentication verification of the JE game software can be done either "on the fly", or when all of the software has been transferred in the working memory MT, this latter solution requiring a greater capacity of random access memory.
- IFR result information is delivered by the game software, and this is encrypted (step 10 ) by the processing unit UT using an encryption-result key which is, in this case, identical to the encryption-game key Km.
- IFRc an encrypted result information IFRc which is transferred via the respective interfaces of the housing and of the portable object so as to be stored (step 11) in the result memory MR of the object. The player can then go to validate his result so as to possibly touch his gain.
- the player removes the portable object from the box, and communicates it to a validation station, which can be the same as that from which he obtained his box, or else another. Cooperation is then established between the portable object and the station.
- the processor PR of the station then reads in the result memory of the portable object (step 12) the encrypted result information IFRc and the decryption means of this station, for example of the DES type, knowing the encryption key. game Km, decipher the IFRc information so as to obtain the IFR result information and allow the payment of the gain.
- step 21 After storing Tir-formation of encrypted result IFRc in the result memory of the object, it is checked whether this alteration has taken place (step 21). If so, allow the storage in the result memory MR ' and if not, this storage is prohibited.
- the portable object is supplied via the housing or the station. All the functions which have just been described in relation to the data stored or to be stored in the portable object, in particular the alteration of the authentication certificate, can be performed directly by software by the processing unit of the box.
- the microprocessor CPU of the portable object can be omitted. This being the case, the existence of such a microprocessor makes it possible to carry out these alteration (or invalidation) operations and to verify alteration and then possibly prohibit the writing of the encrypted result information, directly to the portable object level.
- the existence of a microprocessor CPU on the portable object possibly allows encryption of the game software at the portable object before transfer to the working memory of the box.
- the encryption-result key used to encrypt the result information is not the Km encryption-game key and is not known in advance by the validation station. This can be the case when the encryption-result key is simply the encryption-box key Kf.
- the mode of implementation illustrated in FIG. 6 provides not only for the storage of the encrypted result information IFRc in the result memory of the object (step 11) but also for the storage, in this memory of result or in another memory (step 30) of key information
- This ICR information can be, for example, the encryption-result key proper or else an identifier of the box which is associated in a one-to-one fashion with the box and consequently the encryption-box key Kf which has been stored.
- the processor of the validation station then reads (step 31) the key information ICR and determines from a correspondence table between the identifiers and the encryption-box keys, stored, preferably in a protected manner, in the TB file, the key to encryption-result Kr (in this case the key Kf) which was used (step 32).
- the result information can then be decrypted (step 13).
- This variant of the invention also makes it possible to precisely identify the boxes having led to winning games and to possibly carry out statistics. This offers an additional possibility of detecting a possible fraud if one realizes that the same box very often leads to winning games.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP96914253A EP0824732B1 (en) | 1995-04-28 | 1996-04-26 | Tamper protection and activation method for an electronic gaming device and device therefor |
DE69603023T DE69603023T2 (en) | 1995-04-28 | 1996-04-26 | ACTIVATION AND PROTECTION PROCEDURES AGAINST THE FRAUD OF AN ELECTRONIC PLAYING DEVICE AND RELATED DEVICE |
AU57673/96A AU5767396A (en) | 1995-04-28 | 1996-04-26 | Tamper protection and activation method for an electronic ga ming device and device therefor |
DK96914253T DK0824732T3 (en) | 1995-04-28 | 1996-04-26 | Method of activating and protecting against fraud of an electronic gaming device and associated device |
GR990402050T GR3030973T3 (en) | 1995-04-28 | 1999-08-13 | Tamper protection and activation method for an electronic gaming device and device therefor |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR95/05175 | 1995-04-28 | ||
FR9505175A FR2733613B1 (en) | 1995-04-28 | 1995-04-28 | ANTI-FRAUD ACTIVATION AND PROTECTION METHOD OF AN ELECTRONIC GAME DEVICE, AND CORRESPONDING DEVICE |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1996034368A1 true WO1996034368A1 (en) | 1996-10-31 |
Family
ID=9478579
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/FR1996/000645 WO1996034368A1 (en) | 1995-04-28 | 1996-04-26 | Tamper protection and activation method for an electronic gaming device and device therefor |
Country Status (10)
Country | Link |
---|---|
EP (1) | EP0824732B1 (en) |
AT (1) | ATE181609T1 (en) |
AU (1) | AU5767396A (en) |
CA (1) | CA2219634A1 (en) |
DE (1) | DE69603023T2 (en) |
DK (1) | DK0824732T3 (en) |
ES (1) | ES2132920T3 (en) |
FR (1) | FR2733613B1 (en) |
GR (1) | GR3030973T3 (en) |
WO (1) | WO1996034368A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7373507B2 (en) | 2000-08-10 | 2008-05-13 | Plethora Technology, Inc. | System and method for establishing secure communication |
US8282490B2 (en) | 2006-06-02 | 2012-10-09 | Wms Gaming Inc. | Handheld wagering game system and methods for conducting wagering games thereupon |
US8858332B2 (en) | 2006-01-27 | 2014-10-14 | Wms Gaming Inc. | Handheld device for wagering games |
US9489804B2 (en) | 2012-09-28 | 2016-11-08 | Bally Gaming, Inc. | Community gaming system with varying eligibility criteria |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4462076A (en) * | 1982-06-04 | 1984-07-24 | Smith Engineering | Video game cartridge recognition and security system |
US4882473A (en) * | 1987-09-18 | 1989-11-21 | Gtech Corporation | On-line wagering system with programmable game entry cards and operator security cards |
EP0360613A2 (en) * | 1988-09-22 | 1990-03-28 | Bally Gaming International, Inc. | Game machine data transfer system |
WO1992010806A1 (en) * | 1990-12-10 | 1992-06-25 | Gtech Corporation | Wagering system using smartcards for transfer of agent terminal data |
EP0547975A1 (en) * | 1991-12-19 | 1993-06-23 | Bull Cp8 | Method and system to authenticate, by an external medium, a portable object connected via a transmission line to this medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2697653B1 (en) * | 1992-11-04 | 1995-01-20 | Info Telecom | Electronic game of chance device. |
-
1995
- 1995-04-28 FR FR9505175A patent/FR2733613B1/en not_active Expired - Fee Related
-
1996
- 1996-04-26 DE DE69603023T patent/DE69603023T2/en not_active Expired - Fee Related
- 1996-04-26 WO PCT/FR1996/000645 patent/WO1996034368A1/en active IP Right Grant
- 1996-04-26 AU AU57673/96A patent/AU5767396A/en not_active Abandoned
- 1996-04-26 ES ES96914253T patent/ES2132920T3/en not_active Expired - Lifetime
- 1996-04-26 CA CA002219634A patent/CA2219634A1/en not_active Abandoned
- 1996-04-26 AT AT96914253T patent/ATE181609T1/en not_active IP Right Cessation
- 1996-04-26 EP EP96914253A patent/EP0824732B1/en not_active Expired - Lifetime
- 1996-04-26 DK DK96914253T patent/DK0824732T3/en active
-
1999
- 1999-08-13 GR GR990402050T patent/GR3030973T3/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4462076A (en) * | 1982-06-04 | 1984-07-24 | Smith Engineering | Video game cartridge recognition and security system |
US4882473A (en) * | 1987-09-18 | 1989-11-21 | Gtech Corporation | On-line wagering system with programmable game entry cards and operator security cards |
EP0360613A2 (en) * | 1988-09-22 | 1990-03-28 | Bally Gaming International, Inc. | Game machine data transfer system |
WO1992010806A1 (en) * | 1990-12-10 | 1992-06-25 | Gtech Corporation | Wagering system using smartcards for transfer of agent terminal data |
EP0547975A1 (en) * | 1991-12-19 | 1993-06-23 | Bull Cp8 | Method and system to authenticate, by an external medium, a portable object connected via a transmission line to this medium |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7373507B2 (en) | 2000-08-10 | 2008-05-13 | Plethora Technology, Inc. | System and method for establishing secure communication |
US8858332B2 (en) | 2006-01-27 | 2014-10-14 | Wms Gaming Inc. | Handheld device for wagering games |
US8282490B2 (en) | 2006-06-02 | 2012-10-09 | Wms Gaming Inc. | Handheld wagering game system and methods for conducting wagering games thereupon |
US8684843B2 (en) | 2006-06-02 | 2014-04-01 | Wms Gaming Inc. | Handheld wagering game system and methods for conducting wagering games thereupon |
US9412228B2 (en) | 2006-06-02 | 2016-08-09 | Bally Gaming, Inc. | Handheld wagering game system and methods for conducting wagering games thereupon |
US10068418B2 (en) | 2006-06-02 | 2018-09-04 | Bally Gaming, Inc. | Handheld wagering game system and methods for conducting wagering games thereupon |
US9489804B2 (en) | 2012-09-28 | 2016-11-08 | Bally Gaming, Inc. | Community gaming system with varying eligibility criteria |
Also Published As
Publication number | Publication date |
---|---|
DK0824732T3 (en) | 2000-01-24 |
AU5767396A (en) | 1996-11-18 |
ATE181609T1 (en) | 1999-07-15 |
DE69603023T2 (en) | 2000-03-30 |
CA2219634A1 (en) | 1996-10-31 |
GR3030973T3 (en) | 1999-12-31 |
EP0824732A1 (en) | 1998-02-25 |
EP0824732B1 (en) | 1999-06-23 |
FR2733613B1 (en) | 1997-07-18 |
FR2733613A1 (en) | 1996-10-31 |
DE69603023D1 (en) | 1999-07-29 |
ES2132920T3 (en) | 1999-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0981808B1 (en) | Security procedure for controlling the transfer of value units in a chip card gaming system | |
EP0253722B1 (en) | Method for diversifying a basic key and for authenticating a key worked out from a predetermined basic key and system for operation | |
EP0719438B1 (en) | Access control system for restricting access to authorised hours and renewing it using a portable storage medium | |
EP0596760B1 (en) | Electrical device applied to games of chance | |
EP0912920B1 (en) | System for secure data storage on cd-rom | |
CA1289240C (en) | Method to authentify external validation data by means of a portable device such as a memory card | |
FR2731536A1 (en) | METHOD FOR SECURE INFORMATION RECORDING ON A PORTABLE MEDIUM | |
FR2681165A1 (en) | Process for transmitting confidential information between two chip cards | |
EP0425053A1 (en) | Data processing system having memory card authenticating means, electronic circuit for use in that system and method for using this authentication | |
FR2713419A1 (en) | A method of generating DSA signatures with low cost portable devices. | |
FR2802666A1 (en) | COMPUTER SYSTEM FOR ACCREDITATION ACCESS APPLICATION | |
EP2048814A1 (en) | Biometric authentication method, corresponding computer program, authentication server, terminal and portable object. | |
EP1086411B1 (en) | Method for verifying the execution of a software product | |
FR2686170A1 (en) | MEMORY CARD FOR MICROCOMPUTER. | |
EP0824732B1 (en) | Tamper protection and activation method for an electronic gaming device and device therefor | |
WO1998037525A1 (en) | Method for protecting a parent security key for authenticating user cards | |
FR2608338A1 (en) | Device for exchanging confidential data between a series of terminals and a concentrator | |
EP2131300B1 (en) | Securing method and device for a portable electronic entity | |
WO1999006971A1 (en) | Slot machine with in-built security system | |
WO1998006070A1 (en) | System for managing the transfer of units of value in a chip card game system | |
FR2730076A1 (en) | Authentication by server of holder of object incorporating microprocessor | |
FR2789774A1 (en) | Security module for secure comparison of an authentication code with one stored in memory has additional auxiliary registers in which randomly chosen data words are placed for use in authenticating the code in the main registers | |
CA2285642A1 (en) | Rollup certification in a reader | |
FR2856815A1 (en) | Chip card data authentication process, involves comparing signature of data to be authenticated and signature of data stored in chip card memory and attesting authenticity of stored data in case of conformity of signatures | |
FR2814575A1 (en) | Encryption/identification message transfer process having two systems with public/secret whole numbers exchanging data using random drawn numbers/mathematical functions and reciprocal mathematics procedures. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU BR CA CN JP MX US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 1996914253 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2219634 Country of ref document: CA Ref country code: CA Ref document number: 2219634 Kind code of ref document: A Format of ref document f/p: F |
|
ENP | Entry into the national phase |
Ref country code: US Ref document number: 1997 945622 Date of ref document: 19971028 Kind code of ref document: A Format of ref document f/p: F |
|
WWP | Wipo information: published in national office |
Ref document number: 1996914253 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1996914253 Country of ref document: EP |