摘要:
There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events. A detector is included for detecting selected system events so that they may be recorded.
摘要:
A system for verifying one or more downloaded components 54 of a gaming device 10 that includes the gaming device, which has an alterable hard drive 80 (or other persistent storage media 90), and the downloaded components that further include gaming-related content 92-96. A related method includes: enabling initiation of a game on the gaming device 10; downloading the gaming-related content 92-96 to the alterable hard drive 80 while the gaming device 10 is enabled for game play; reading an identifier associated with the gaming-related content 92-96; verifying that the identifier is valid (using verification software 70); and reconfiguring the gaming device 10 to utilize the newly-downloaded, gaming-related content 92-96 in response to an initiating event.
摘要:
There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events. A detector is included for detecting selected system events so that they may be recorded.
摘要:
A system for verifying one or more downloaded components 54 of a gaming device 10 that includes the gaming device, which has an alterable hard drive 80 (or other persistent storage media 90), and the downloaded components that further include gaming-related content 92-96. A related method includes: enabling initiation of a game on the gaming device 10; downloading the gaming-related content 92-96 to the alterable hard drive 80 while the gaming device 10 is enabled for game play; reading an identifier associated with the gaming-related content 92-96; verifying that the identifier is valid (using verification software 70); and reconfiguring the gaming device 10 to utilize the newly-downloaded, gaming-related content 92-96 in response to an initiating event.
摘要:
A method is disclosed for authenticating a gaming device, wherein the gaming device includes a plurality of components, one of which is a storage device. The method includes: starting up the gaming device; authenticating a data file stored on the storage device, wherein the authenticating comprises: opening and reading a file allocation structure in a storage device using a file allocation reader; processing the file allocation structure using a processor to provide access to files stored in the storage device, wherein the files in the storage device include installed identification data from one or more selected gaming units as to components actually installed on the selected gaming units, and wherein the files also include registered identification data for components supposed to be installed on the selected gaming units, each component including hardware components and software components, and each gaming unit including multiple components with identification data; and examining the installed identification data and registered identification data to determine enablement of the gaming units.
摘要:
A method is disclosed for authenticating a gaming device, wherein the gaming device includes a plurality of components, one of which is a storage device. The method includes: starting up the gaming device; authenticating a data file stored on the storage device, wherein the authenticating comprises: opening and reading a file allocation structure in a storage device using a file allocation reader; processing the file allocation structure using a processor to provide access to files stored in the storage device, wherein the files in the storage device include installed identification data from one or more selected gaming units as to components actually installed on the selected gaming units, and wherein the files also include registered identification data for components supposed to be installed on the selected gaming units, each component including hardware components and software components, and each gaming unit including multiple components with identification data; and examining the installed identification data and registered identification data to determine enablement of the gaming units.
摘要:
There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events. A detector is included for detecting selected system events so that they may be recorded.
摘要:
There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events. A detector is included for detecting selected system events so that they may be recorded.
摘要:
A rollback attack prevention system 10 for a gaming machine 20 includes a configuration log 30 and a revocation list 40. Preferably, the configuration log 30 includes a protected record of software that has been installed on the gaming machine 20. Further, the revocation list 40 includes an inventory of unauthorized software that the prevention system 10 prevents from being installed and/or used on the gaming machine 20.
摘要:
A rollback attack prevention system 10 for a gaming machine 20 includes a configuration log 30 and a revocation list 40. Preferably, the configuration log 30 includes a protected record of software that has been installed on the gaming machine 20. Further, the revocation list 40 includes an inventory of unauthorized software that the prevention system 10 prevents from being installed and/or used on the gaming machine 20.