Class / Patent application number | Description | Number of patent applications / Date published |
380251000 | ELECTRONIC GAME USING CRYPTOGRAPHY | 7 |
20090067629 | Table-based encryption/decryption techniques for gaming networks, and gaming networks incorporating the same - The exemplary embodiments described herein relate to a light-weight encryption/decryption technique for peripherals (e.g., gaming machines, overhead displays, a jackpot controllers, etc.) attached to gaming networks. In certain exemplary embodiments, a peripheral device for use in a networked gaming environment is provided. A network interface is configured to send and receive at least one data stream, with each said data stream including at least a data block and a predetermined portion to be used in key generation. An encrypt table includes an index of random numbers in a predetermined range, with the encrypt table size and the range of the random numbers being set in dependence on the predetermined portion of the data stream. A decrypt table is provided, with the decrypt table being the inverse of the encrypt table. Key generating programmed logic circuitry is configured to generate a key in dependence on the predetermined portion of the data stream. Encrypting programmed logic circuitry is configured to generate an encrypted data stream by encrypting a data block of an unencrypted data stream for encrypted transmission via the network interface in dependence on the key and the encrypt table. Decrypting programmed logic circuitry is configured to generate a decrypted data stream by decrypting a data block of an encrypted data stream received by the network interface in dependence on the key and the decrypt table. | 03-12-2009 |
20090110195 | ENCRYPTED DATA INSTALLATION - A base encryption method may be applied to plain data to form base encrypted data. An installation encryption method may be applied to the base encryption data to provide encrypted installation data. During installation, the encrypted installation data are encrypted to form encrypted storage data for storage on a storage medium such as a hard drive. Preferably, the data are not fully decrypted at any stage of the installation process. The host CPU may be minimally involved (or not involved) in the encryption/decryption process. Some embodiments provide a logic seal (a/k/a a “tell-tale circuit”) that monitors access to a machine. In some such implementations, an encryption/decryption key may be stored in the logic seal. When the logic seal is broken, countermeasures may be taken, e.g., at least some data may be deleted. For example, one or more cryptographic keys may be erased. | 04-30-2009 |
20090220078 | ON-THE-FLY ENCRYPTION ON A GAMING MACHINE - Systems, apparatus and methods for on-the-fly encryption of data storage on a computerized wagering gaming machine are described herein. In some embodiments, a method includes accessing, using an on-the-fly encryption operation, data from a nonvolatile data storage in a computerized wagering gaming machine. | 09-03-2009 |
20100119068 | Digital File Anti pirating - A digital file system where the files are encrypted and are decrypted for playing by using a specified decryption key. The decryption key can be personalized, e.g., to a machine, to a user, to a location or some other personalization. | 05-13-2010 |
20110123024 | ROLLBACK ATTACK PREVENTION SYSTEM AND METHOD - A rollback attack prevention system | 05-26-2011 |
20120183138 | Trusted Communications Between Untrusting Parties - A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence. | 07-19-2012 |
20140153718 | Trusted Communications Between Untrusting Parties - A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence. | 06-05-2014 |