Abstract:
A disclosed a player tracking unit provides a touch screen display with a touch screen controller integrated into the touch screen sensor assembly. Game service interfaces may be presented on the touch screen display that allow a user to obtain one or more game services. The game service interfaces may include buttons with alpha-numeric symbols, function keys and hand-writing recognition capabilities that are recognized using input data from the touch screen sensor. Thus, with the touch screen sensor, a user may navigate through the game service interface and supply gaming information required to obtain a game service. In one embodiment, a registration game service interface is provided that allows a player to join a player tracking program at the gaming machine. In another embodiment, a metering game service interface with a calculator is provided that allows a casino operator to obtain and operate on metering information at a gaming machine.
Abstract:
A system for authenticating software is disclosed. In one embodiment, the invention is utilized in conjunction with a gaming machine to authenticate the software utilized by the gaming machine or loaded onto the gaming machine. To achieve authentication, one exemplary mode of operation is used to authenticate the contents of a removable media, the removable media being used to perform any desired operation on the gaming machine. Use of a removable media provides means to store large amounts of software on a single media to thereby access and perform numerous tasks including software install, software update, diagnosis, authentication, or configure. Prior to use of the removable media in the gaming machine, an authentication file is created. The authentication file contains a listing of each file on the removable media and an associated hash value calculated with a known hash function. These hash values are calculated and stored in an authentication file when the files on the removable media are known to be trusted. Encryption of the one or more hash values may occur. At a later date when the removable media is used in the gaming machine, a hash value re-calculation is performed on each file to determine the hash value at the time of use. The re-calculated hash values are compared to the decrypted hash values stored in the authentication file on the removable media on a file-by-file basis. If the values match, the removable media authenticates. If the values do not match, the removable media does not authenticate.
Abstract:
A method and apparatus for authenticating gaming machine software is disclosed. In one embodiment the method and apparatus is used to authenticate the contents of a removable media. Use of a removable media provides means to store large amounts of software on a single media to install software, perform software updates, diagnose gaming machines, authenticate software, or configure gaming machines. An authentication file may contain a listing of each file on the removable media and an associated hash value calculated with a hash function. The hash values are calculated and stored in an authentication file and encryption of the one or more hash values may occur. A hash value re-calculation is performed on each file at a later time to determine the hash value at the time of use. The re-calculated hash values are compared to the decrypted hash values stored in the authentication file.
Abstract:
A key for a gaming machine for authorizing various functions via a control system of the gaming machine. The key includes a connector for coupling the key to a communication port of the gaming machine and non-volatile memory that communicates with the control system to determine the appropriateness of authorization an d the functions authorized.
Abstract:
A system for authenticating software is disclosed. In one embodiment, the invention is utilized in conjunction with a gaming machine to authenticate the software utilized by the gaming machine or loaded onto the gaming machine. To achieve authentication, one exemplary mode of operation is used to authenticate the contents of a removable media, the removable media being used to perform any desired operation on the gaming machine. Use of a removable media provides means to store large amounts of software on a single media to thereby access and perform numerous tasks including software install, software update, diagnosis, authentication, or configure. Prior to use of the removable media in the gaming machine, an authentication file is created. The authentication file contains a listing of each file on the removable media and an associated hash value calculated with a known hash function. These hash values are calculated and stored in an authentication file when the files on the removable media are known to be trusted. Encryption of the one or more hash values may occur. At a later date when the removable media is used in the gaming machine, a hash value re-calculation is performed on each file to determine the hash value at the time of use. The re-calculated hash values are compared to the decrypted hash values stored in the authentication file on the removable media on a file-by-file basis. If the values match, the removable media authenticates. If the values do not match, the removable media does not authenticate.
Abstract:
A method and apparatus for authenticating gaming machine software is disclosed. In one embodiment the method and apparatus is used to authenticate the contents of a removable media. Use of a removable media provides means to store large amounts of software on a single media to install software, perform software updates, diagnose gaming machines, authenticate software, or configure gaming machines. An authentication file may contain a listing of each file on the removable media and an associated hash value calculated with a hash function. The hash values are calculated and stored in an authentication file and encryption of the one or more hash values may occur. A hash value re-calculation is performed on each file at a later time to determine the hash value at the time of use. The re-calculated hash values are compared to the decrypted hash values stored in the authentication file.
Abstract:
A disclosed gaming machine provides method and apparatus for presenting a plurality of game outcome presentations derived from one or more virtual 3-D gaming environments stored on the gaming machine. While a game of chance is being played on the gaming machine, two-dimensional images derived from a three-dimensional object in the 3-D gaming environment may be rendered to a display screen on the gaming machine in real-time as part of the game outcome presentation. To add excitement to the game, a 3-D position of the 3-D object and other features of the 3-D gaming environment may be controlled by a game player. Nearly an unlimited variety of virtual objects, such as slot reels, gaming machines and casinos, may be modeled in the 3-D gaming environment.
Abstract:
A key for a gaming machine for authorizing various functions via a control system of the gaming machine. The key includes a connector for coupling the key to a communication port of the gaming machine and non-volatile memory that communicates with the control system to determine the appropriateness of authorization and the functions authorized.
Abstract:
A key for a gaming machine for authorizing various functions via a control system of the gaming machine. The key includes a connector for coupling the key to a communication port of the gaming machine and non-volatile memory that communicates with the control system to determine the appropriateness of authorization and the functions authorized.