US20090215530A1 - Virtual eprom simulator apparatus - Google Patents

Virtual eprom simulator apparatus Download PDF

Info

Publication number
US20090215530A1
US20090215530A1 US12/434,571 US43457109A US2009215530A1 US 20090215530 A1 US20090215530 A1 US 20090215530A1 US 43457109 A US43457109 A US 43457109A US 2009215530 A1 US2009215530 A1 US 2009215530A1
Authority
US
United States
Prior art keywords
data
copy
information
piece
person
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/434,571
Inventor
Keith Edwin Curtis
Eugene Thomas Bond
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aristocrat Technologies Australia Pty Ltd
Original Assignee
Aristocrat Technologies Australia Pty Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aristocrat Technologies Australia Pty Ltd filed Critical Aristocrat Technologies Australia Pty Ltd
Priority to US12/434,571 priority Critical patent/US20090215530A1/en
Publication of US20090215530A1 publication Critical patent/US20090215530A1/en
Assigned to NUGAME, INC. reassignment NUGAME, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CURTIS, KEITH E., BOND, EUGENE T.
Assigned to ARISTOCRAT LEISURE INDUSTRIES PARTY LTD reassignment ARISTOCRAT LEISURE INDUSTRIES PARTY LTD ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NUGAME, INC.
Assigned to ARISTOCRAT TECHNOLOGIES AUSTRALIA PTY LIMITED reassignment ARISTOCRAT TECHNOLOGIES AUSTRALIA PTY LIMITED CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: ARISTOCRAT LEISURE INDUSTRIES PARTY LTD
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Definitions

  • the present invention is particularly adapted to the field of casino gaming devices which house one or more games on internal EPROMs.
  • Such devices include what are commonly known as slot machines, video poker machines, and more recent implementations that have combined both and may offer a variety of games on a single machine, referred to as a “multi-game.”
  • EPROMs employed in gaming applications are naturally subject to the inherent limitations and potential faults of EPROMs in any other computer-based apparatus.
  • the gaming industry fosters other reasons for assuring the integrity of EPROM contents: regulatory compliance and, due to the possibility of instant pecuniary gain or loss, detecting and thwarting cheaters who could benefit from purposely altered software or payout tables.
  • a commonly configured multi-game machine would include a number of games such as: keno, poker, slots, blackjack and others. These games can be played separately or be combined into new games, games within games, pushing the limits of software and hardware.
  • Typical gaming machines of this type also employ a combination of mechanical devices, electronics, microprocessors and complex software to generate the gaming experience.
  • Some of the common hardware components used are as follows: a cabinet, handle, jackpot tower, coin acceptor, bill acceptor, credit meters, back-lit glass, reels, monitor, game door, buttons, payout hopper, lights and speakers.
  • the electronics include many of the following components: microprocessor, read only memory (ROM), RAM, high speed data bus, peripheral logic chips for serial and parallel ports, driver circuitry for lamps, speakers, video and other devices.
  • Typical software components would include: power-up initialization, device drivers, game recovery, state machine, random number generator, payout routine, credit management, graphics engine, sound, game engine, game data, security, accounting and reporting functions.
  • Software authentication is usually a process carried out by a third party (other than the manufacturer or the casino operator) representing the gaming enforcement agency that has jurisdiction over the device. The purpose is to ensure that the software controlling the game has not been tampered with, and software authentication is usually required after a large jackpot has been obtained by a player. Authentication also verifies that the gaming software was previously examined and approved by the gaming agency in whose jurisdiction the jackpot occurred. Moreover, casinos wish to verify that the software running the game is legitimate, particularly if a particular machine is not earning the expected amount of revenue, or in response to player complaints about the behavior of a particular game.
  • authentication is usually accomplished by one of two methods. Both methods require opening of the game, removal of the CPU and removal of EPROMs containing the software.
  • the removed EPROMs are compared, using an industry standard EPROM programmer/reader, with a custodial (or master) set of EPROMs which have been kept in a secure location. If the comparison indicates that they are the same, the software is considered to be authentic.
  • the second method involves plugging each EPROM into an electronic authentication device, for example a widely used proprietary device marketed under the trade name Kobitron, which generates an authentication identification (ID) for the image resident in the EPROM. The resulting authentication IDS are compared to previously recorded IDs for those EPROMs. If they are identical, the software is verified as authentic.
  • ID authentication identification
  • Bond et al. the present inventors, disclosed in a patent application entitled “Software Authentication Control System,” U.S. Ser. No. 60/089654, filed 17 Jun. 1998, a method for authenticating software stored in non-EPROM-type media that is consistent with accepted practice.
  • a limitation of this disclosure is that it is also not backwards compatible (at the hardware level) with present EPROM-type authentication devices.
  • V-PROM Virtual programmable read-only memory.
  • V-PROMs are logical containers (like file folders or directories) that contain related stored binary information (software and data). V-PROMs aid in the retrieval and management of related stored binary information by logically grouping discrete data and program entities together as if they were stored in EPROM type media.
  • V-PROM Registry A program/data directory which provides crucial information used in the management, retrieval and authentication of related programs and data sets. It is comprised of a relational database directory that was designed to store logical EPROM-like grouping information in V-PROM Registries containing the location and media type of related stored programs and data sets, each group having a unique V-PROM name. of the software games to be installed for a specific application; e. g., operator/casino installation.
  • the present invention offers a number of advantages over prior art devices, including: backwards compatibility with existing EPROM media authentication devices; the ability to present software and data, such as gaming software, stored in non-ROM media as if it were stored in an EPROM media; added security for protecting the software/data presentation process; functionality to browse a list of all software resident on the machine as if it were in an EPROM library; functionality for selecting resident gaming software for presentation to an authentication device; functionality for registering presentation users; functionality for reporting presentation users and activities.
  • the present invention is a control system for electronic gaming machines which is controlled with a typical microprocessor configuration, including a CPU, RAM and non-volatile storage devices such as a hard drive and/or CD-ROM, input/output interfaces, video display, operating system, power supply, and a plurality of programs and associated tables and other reference data in ROM/EPROM-type media.
  • a typical microprocessor configuration including a CPU, RAM and non-volatile storage devices such as a hard drive and/or CD-ROM, input/output interfaces, video display, operating system, power supply, and a plurality of programs and associated tables and other reference data in ROM/EPROM-type media.
  • the ROM/EPROM includes a presentation capability for passing the program and the data to an external device, such as an authenticator, in response to an authorized user request directive.
  • the presentation function includes a user registration program, a V-PROM library which groups related gaming software and data into the logical containers termed “V-PROMs,” a V-PROM selection program, a loader program, a data presentation program.
  • a mass storage medium, in communication with the invention control program, containing approved gaming software and related data means associated through V-PROMs is used for non-volatile storage.
  • the means for emulating an EPROM includes: a pseudo-EPROM memory utilizing some other storage medium, a connection between the EPROM simulator to and from the CPU, a means for addressing the pseudo EPROM memory, an input data buffer, an output data buffer, and an interface for connecting the EPROM emulation means to an industry standard EPROM reader.
  • the V-PROM presentation function of the machine's diagnostic routines which presents mass media based gaming software to ROM media authentication devices, is activated by a key switch operation initiated by the user (typically a gaming enforcement agent).
  • a key switch operation initiated by the user (typically a gaming enforcement agent).
  • a log of previous presentation screen users is displayed including: usernames, date, time, type of event, V-PROMs presented/authenticated, and the date and time when then log was created.
  • the user is required to register or exit the diagnostic function. To register, the user must enter a username and password. If the password does not match the previously established password for that account, a user registration error is entered into the log and the screen is automatically exited.
  • New users if allowed, establish their password during their first login session.
  • users can be pre-enrolled. If the password does match, the collected registration information is appended to the presentation users' log.
  • the V-PROM selection screen is activated.
  • the user may browse the entire library of V-PROMs resident on the storage media of the machine, termed V-PROM Registry Set. This information includes V-PROM names, description of related gaming software and data, version numbers, creation times and dates, statistical and marketing information. From this screen, by pressing a button, the user can “present” the currently selected V-PROM image (gaming software and related data, logically grouped) to the E-PROM emulator which then can be authenticated by a connected prior art device that is capable of reading EPROMs.
  • the user After presentation, the user is required to log the results of the authenticating device's inspection. After this, the user can select another V-PROM image for presentation.
  • the screen When the user is finished testing V-PROMs, the screen is exited via a button press, the diagnostic function is ended and normal game play may resume. In the event of a V-PROM failing inspection, upon exiting the diagnostic function, the game enters a lock-up state which can only be cleared by a special process.
  • V-PROMs can also contain other V-PROMs, thus, a given software configuration can be stored as a V-PROM containing a series of ‘smaller’ V-PROMs which contain all of the software to be installed for a specific installation, such as a specific casino.
  • V-PROM Registry Set has the added benefit of abstracting the type of storage media from the authentication process thus allowing for the use of a wider variety of storage media.
  • Curtis et al. for a Software Verification and Authentication Control System.
  • Still another object of the present invention is to provide a device for use within a gaming machine that allows for gaming software to be authenticated with pre-exiting means through emulating the physical characteristics of gaming software stored in EPROM-type media.
  • Still another object of the present invention is to provide a method for accessing/presenting gaming software stored in non-EPROM media as if it were stored in EPROM-type media.
  • Still another object of the present invention is to provide a method of displaying a resident library of gaming software stored in non-ROM media as if it were stored in EPROM-type media.
  • Still another object of the present invention is to provide a method for securing the gaming software presentation process.
  • Still another object of the present invention is to provide a method for registering presentation users.
  • Still another object of the present invention is to provide a method for reporting presentation users and activities.
  • Still another object of the present invention is to provide a method for selecting gaming software for presentation to an authentication device.
  • FIG. 1 is a simplified schematic diagram of the device of the present invention and related hardware components
  • FIG. 2 is a block diagram of the EPROM Simulator component detailing process control flow.
  • FIG. 3 is a timing diagram describing the protocol for downloading to the EPROM simulator.
  • FIG. 4 is a block diagram describing the V-PROM presentation process.
  • FIG. 1 illustrates the hardware components utilized in the preferred embodiment of this invention. Other hardware configurations are possible because of the modular nature of this design.
  • the present invention is a control system, FIG. 1 , for a gaming machine.
  • the machine is not shown, but can be either a single game or multi-game machine.
  • the control system FIG. 1 , is comprised of four major modules.
  • Module (A) is a drawing of a commercially available Single Board Computer (SBC).
  • Module (B) is a drawing of a commercially available storage media.
  • Module (C) represents the existence of a power supply.
  • Module (D) represents the EPROM Simulator Board. All four components interconnect.
  • Module (A) connects to Module (B) through the use of either an EIDE cable or SCSII cable in the case of a SCSII based SBC. Module (A) also connects to Modules (D) through a parallel I/O cable. Module (C) supplies power to the other four modules via power cables and connectors.
  • Module (A) the SBC, is comprised of the following components: ( 1 ) an X-86 CPU such as a PentiumTM or Pentium IITM processor with MMXTM [Pentium, Pentium II and MMX are trademarks of Intel Corp.] or equivalent technology; ( 1 a ) high speed processor cache for improved performance; ( 2 ) glue logic chips for driving high speed data busses and interfacing the processor to other high speed components such as RAM, video processors, network chips, and I/O boards; ( 3 ) high speed RAM sockets, typically DIMM or SIMM style.
  • Module (B) represents the use of general purpose mass storage media.
  • the media represented in Module (B) can include: Hard disks, CD-ROMS, solid state storage devices, or other common media used in the PC industry.
  • This media is connected ( 1 ) to the SBC (A) through a PC industry standard interface such as EIDE, SCSII, or PCMCIA.
  • ( 2 ) represents a drive spindle in the case where spinning media is used.
  • Module (C) represents a power supply. For the most part, this supply is designed to provide the voltages and current required for using standard PC hardware.
  • Module (D) represents the EPROM simulator Board. This board is interfaced to the SBC via a parallel cable (not depicted) connect to (A- 7 b ) and (D- 2 ) parallel I/O connectors. This board is responsible for receiving downloaded V-PROM images, stored in RAM ( 5 ), allowing for their interrogation by an EPROM reader or Authentication Device attached to EPROM header ( 1 ).
  • This board contains the following components: ( 3 ) a gate logic chip; ( 4 ) five digital counter chips used for addressing RAM ( 5 ); ( 6 ) three resisters used for biasing the parallel control lines-strobe, autofeed, and init (see FIG. 2 ); ( 7 ) four input buffer chips for RAM ( 5 ); ( 8 ) output buffer chips for RAM ( 5 ).
  • FIG. 2 provides more detail on the control system for the EPROM Simulator module (D).
  • FIG. 2 describes the following sub-component interactions: control logic ( 2 ), components (D- 3 , 4 ) responds to parallel I/O control lines, strobe ( 1 b ), autofeed ( 1 c ) and init (nid), inputs; the strobe input ( 1 b ) is used to trigger the control logic to write the data ( 1 a ), supplied via the parallel I/O data lines, through the input RAM buffers ( 3 ) into the RAM chip ( 4 ); the autofeed input ( 1 c ) is used to trigger the control logic to increment the address counter; the init input ( 1 d ) is used to control access to the RAM buffers ( 3 ) either via PC or EPROM control address counter are not selected and held resent for start of next data load from PC.
  • control logic 2
  • components D- 3 , 4
  • FIG. 2 describes the following sub-component interactions: control logic ( 2 ), components (
  • EPROM FIG. 1 .
  • A- 10 contains the diagnostic program for the gaming machine.
  • Storage device (A- 11 ) contains the BIOS and Operating System software.
  • the media type of device (A- 11 ) varies from SBC to SBC, in some cases the BIOS and Operating System software is stored in two separate devices. Distinct software games, and data are stored on media device (B).
  • game software can be stored on a fileserver attached through the network via connector ( 4 a ).
  • EPROM FIG. 1 , A- 10
  • the contents of EPROM contains the following software components illustrated in FIG. 4 : diagnostic routines; V-PROM Presentation program ( 9 ); user access log presentation program ( 2 ); user login/registration program ( 3 ); V-PROM Library and selection program ( 5 ); and software data loader program ( 7 ).
  • V-PROMS are stored in non-volatile storage (B).
  • the V-PROM Registry is stored in secure non-volatile storage not depicted.
  • FIG. 4 details the flow of control during the V-PROM presentation process and is described in the following paragraph.
  • the machines diagnostic routines are triggered by a user via a key switch. Diagnostic routines are selected according to the number of consecutive key switches initiated by the user. Among these diagnostic routines is the V-PROM Presentation Program ( 1 ), FIG. 4 .
  • V-PROM Presentation Program 1
  • FIG. 4 Upon entering the V-PROM Presentation screen, a log of previous presentation screen users is displayed ( 2 ) including: usernames, date, time, type of event, V-PROMS presented/authenticated, and the date and time when then log was created.
  • the user is required to register or exit the diagnostic function ( 2 ). To register, the user must enter a username and password ( 3 ).
  • a user registration error is entered into the log ( 4 a ) and the screen is automatically exited ( 4 b ).
  • New users if allowed, establish their password during their first login session, not depicted.
  • users can be pre-enrolled, not depicted.
  • the collected registration information is appended to the presentation users' log, not depicted.
  • the V-PROM selection screen is activated ( 5 ). The user may browse the entire V-PROM registry ( 7 a ) library of V-PROMS resident on the storage media ( 7 b ) of the machine.
  • This information includes V-PROM names, description of related gaming software and data, version numbers, creation times and dates, statistical and marketing information.
  • the V-PROM browsing program ( 5 ) invokes the loader program ( 6 ) passing it the name of the selected V-PROM.
  • the loader retrieves the image ( 7 b ) referencing the registry ( 7 a ), and calls the data presenter ( 8 ) which subsequently downloads the image to the EPROM simulator ( 9 ).
  • the user ( 11 ) connects a prior art device that is capable of reading/authenticating EPROMS. This device ( 10 ) authenticates the downloaded V-PROM image.
  • the user After presentation ( 8 ), the user ( 11 ) is required to enter the results of the authenticating device's inspection ( 12 ). After this, the user can select another V-PROM image for presentation ( 5 ).
  • the screen is exited via a button press ( 6 ), the diagnostic function is ended ( 6 a ) and normal game play may resume.
  • the game upon exiting the diagnostic function, the game enters a lock-up state which can only be cleared by a special process, not depicted.
  • FIG. 3 illustrates the protocol that is used to download data to the EPROM simulator.
  • the data is communicated via a parallel I/O cable.
  • the data is synchronously clocked into the simulator by pulsing the strobe line.
  • the destination address is incremented by the autofeed line.
  • the init line is used to reset the destination address counter to zero.

Abstract

It will be appreciated by persons skilled in the art that numerous variations and/or modifications may be made to the invention as shown in the specific embodiments without departing from the spirit or scope of the invention as broadly described. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive.

Description

    RELATED APPLICATIONS
  • This application is a divisional of U.S. patent application Ser. No. 09/720,570, having a filing date of Dec. 23, 2004 which claims priority to PCT Application No. PCT/AU99/00511, having a filing date of Jun. 24, 1999 which is incorporated herein by reference in its entirety.
  • BACKGROUND OF THE INVENTION
  • The present invention is particularly adapted to the field of casino gaming devices which house one or more games on internal EPROMs. Such devices include what are commonly known as slot machines, video poker machines, and more recent implementations that have combined both and may offer a variety of games on a single machine, referred to as a “multi-game.” EPROMs employed in gaming applications are naturally subject to the inherent limitations and potential faults of EPROMs in any other computer-based apparatus. However, the gaming industry fosters other reasons for assuring the integrity of EPROM contents: regulatory compliance and, due to the possibility of instant pecuniary gain or loss, detecting and thwarting cheaters who could benefit from purposely altered software or payout tables.
  • In jurisdictions where gaming is permitted, use of such devices is regulated by law. Consequently, in regulated jurisdictions gaming devices are routinely, regularly and randomly verified by the authorities to ensure the compliance, integrity and authenticity of their EPROMs. The present invention is particularly designed to aid in complying with gaming regulations requiring an EPROM-based method for determining the authenticity of the device. A commonly configured multi-game machine would include a number of games such as: keno, poker, slots, blackjack and others. These games can be played separately or be combined into new games, games within games, pushing the limits of software and hardware.
  • Typical gaming machines of this type also employ a combination of mechanical devices, electronics, microprocessors and complex software to generate the gaming experience. Some of the common hardware components used are as follows: a cabinet, handle, jackpot tower, coin acceptor, bill acceptor, credit meters, back-lit glass, reels, monitor, game door, buttons, payout hopper, lights and speakers. The electronics include many of the following components: microprocessor, read only memory (ROM), RAM, high speed data bus, peripheral logic chips for serial and parallel ports, driver circuitry for lamps, speakers, video and other devices. Typical software components would include: power-up initialization, device drivers, game recovery, state machine, random number generator, payout routine, credit management, graphics engine, sound, game engine, game data, security, accounting and reporting functions. As a result, the increasing complexity of such gaming devices commensurately increases the difficulty of ensuring EPROM integrity as well as regulatory compliance.
  • Software authentication is usually a process carried out by a third party (other than the manufacturer or the casino operator) representing the gaming enforcement agency that has jurisdiction over the device. The purpose is to ensure that the software controlling the game has not been tampered with, and software authentication is usually required after a large jackpot has been obtained by a player. Authentication also verifies that the gaming software was previously examined and approved by the gaming agency in whose jurisdiction the jackpot occurred. Moreover, casinos wish to verify that the software running the game is legitimate, particularly if a particular machine is not earning the expected amount of revenue, or in response to player complaints about the behavior of a particular game.
  • Disadvantages of Prior Art Solutions In prior art devices, authentication is usually accomplished by one of two methods. Both methods require opening of the game, removal of the CPU and removal of EPROMs containing the software. In the first method, the removed EPROMs are compared, using an industry standard EPROM programmer/reader, with a custodial (or master) set of EPROMs which have been kept in a secure location. If the comparison indicates that they are the same, the software is considered to be authentic. The second method involves plugging each EPROM into an electronic authentication device, for example a widely used proprietary device marketed under the trade name Kobitron, which generates an authentication identification (ID) for the image resident in the EPROM. The resulting authentication IDS are compared to previously recorded IDs for those EPROMs. If they are identical, the software is verified as authentic.
  • These methods are common to the gaming industry, but they only apply to software stored in EPROM-style media. U.S. Pat. No. 5,643,086 (Alcorn et al.), assigned to a corporate manufacturer of multi-game devices, discloses an apparatus for authenticating software stored using media other than EPROMs, such as a hard drive. However, in the Alcorn apparatus, the software inspects itself and renders a verdict as to its own authenticity. Self-verification and the potential for compromised security at the point of manufacture render the Alcorn technique a generally unacceptable practice in the gaming industry. In addition, Alcorn's apparatus cannot be used with a Kobitron, upon which regulators and owners have come to rely.
  • Bond et al., the present inventors, disclosed in a patent application entitled “Software Authentication Control System,” U.S. Ser. No. 60/089654, filed 17 Jun. 1998, a method for authenticating software stored in non-EPROM-type media that is consistent with accepted practice. A limitation of this disclosure, however, is that it is also not backwards compatible (at the hardware level) with present EPROM-type authentication devices.
  • Present authentication methods are well-suited to prior art devices which use EPROM type storage; however, new operating systems, multi-game devices, and multimedia functionality require new mass storage technologies. Storing gaming software on these technologies render present, accepted, EPROM media authentication devices and procedures useless.
  • And though Alcorn discloses a method for ‘authenticating’ software stored in mass media, it ignores the existing authentication paradigm presently expected in the gaming industry. Thus, there is a need for a means of authenticating software stored in modern media that is compatible with existing gaming regulations and practices. The industry is comfortable with having a set of EPROMS for “system” software and a set for each model (comprising a unique pay schedule, symbols/graphics, and/or play rules), or a set for each game in a multi-game environment.
  • In brief, the industry requires a method of authentication which is in harmony with current accepted practices, compatible with current authentication hardware, but which can also avail itself of the advantages of new and future storage technologies.
  • DEFINITIONS
  • V-PROM Virtual programmable read-only memory. In the present invention, V-PROMs are logical containers (like file folders or directories) that contain related stored binary information (software and data). V-PROMs aid in the retrieval and management of related stored binary information by logically grouping discrete data and program entities together as if they were stored in EPROM type media.
  • V-PROM Registry A program/data directory which provides crucial information used in the management, retrieval and authentication of related programs and data sets. It is comprised of a relational database directory that was designed to store logical EPROM-like grouping information in V-PROM Registries containing the location and media type of related stored programs and data sets, each group having a unique V-PROM name. of the software games to be installed for a specific application; e. g., operator/casino installation.
  • BRIEF SUMMARY OF THE INVENTION
  • The present invention offers a number of advantages over prior art devices, including: backwards compatibility with existing EPROM media authentication devices; the ability to present software and data, such as gaming software, stored in non-ROM media as if it were stored in an EPROM media; added security for protecting the software/data presentation process; functionality to browse a list of all software resident on the machine as if it were in an EPROM library; functionality for selecting resident gaming software for presentation to an authentication device; functionality for registering presentation users; functionality for reporting presentation users and activities.
  • The present invention, from an apparatus perspective, is a control system for electronic gaming machines which is controlled with a typical microprocessor configuration, including a CPU, RAM and non-volatile storage devices such as a hard drive and/or CD-ROM, input/output interfaces, video display, operating system, power supply, and a plurality of programs and associated tables and other reference data in ROM/EPROM-type media.
  • The ROM/EPROM includes a presentation capability for passing the program and the data to an external device, such as an authenticator, in response to an authorized user request directive. The presentation function includes a user registration program, a V-PROM library which groups related gaming software and data into the logical containers termed “V-PROMs,” a V-PROM selection program, a loader program, a data presentation program. A mass storage medium, in communication with the invention control program, containing approved gaming software and related data means associated through V-PROMs is used for non-volatile storage.
  • The means for emulating an EPROM includes: a pseudo-EPROM memory utilizing some other storage medium, a connection between the EPROM simulator to and from the CPU, a means for addressing the pseudo EPROM memory, an input data buffer, an output data buffer, and an interface for connecting the EPROM emulation means to an industry standard EPROM reader.
  • From a process perspective, the V-PROM presentation function of the machine's diagnostic routines, which presents mass media based gaming software to ROM media authentication devices, is activated by a key switch operation initiated by the user (typically a gaming enforcement agent). Upon entering the V-PROM presentation screen, a log of previous presentation screen users is displayed including: usernames, date, time, type of event, V-PROMs presented/authenticated, and the date and time when then log was created. After display of the log, the user is required to register or exit the diagnostic function. To register, the user must enter a username and password. If the password does not match the previously established password for that account, a user registration error is entered into the log and the screen is automatically exited. New users, if allowed, establish their password during their first login session. Optionally, users can be pre-enrolled. If the password does match, the collected registration information is appended to the presentation users' log. After registration, the V-PROM selection screen is activated. The user may browse the entire library of V-PROMs resident on the storage media of the machine, termed V-PROM Registry Set. This information includes V-PROM names, description of related gaming software and data, version numbers, creation times and dates, statistical and marketing information. From this screen, by pressing a button, the user can “present” the currently selected V-PROM image (gaming software and related data, logically grouped) to the E-PROM emulator which then can be authenticated by a connected prior art device that is capable of reading EPROMs. After presentation, the user is required to log the results of the authenticating device's inspection. After this, the user can select another V-PROM image for presentation. When the user is finished testing V-PROMs, the screen is exited via a button press, the diagnostic function is ended and normal game play may resume. In the event of a V-PROM failing inspection, upon exiting the diagnostic function, the game enters a lock-up state which can only be cleared by a special process.
  • V-PROMs can also contain other V-PROMs, thus, a given software configuration can be stored as a V-PROM containing a series of ‘smaller’ V-PROMs which contain all of the software to be installed for a specific installation, such as a specific casino.
  • The V-PROM Registry Set has the added benefit of abstracting the type of storage media from the authentication process thus allowing for the use of a wider variety of storage media. For more detail see patent application of Curtis et al. for a Software Verification and Authentication Control System.
  • Objects of the Invention It is an object of the present invention to provide a device for use within a microprocessor-based device, which allows for authentication of internal data and software code stored in modern media in manner consistent with that which occurs in current EPROM-based technology.
  • It is another object of the present invention to provide a device for use within a gaming machine, such as a slot machine or a multi-game machine, which allows for authentication of gaming software stored in modern media in a manner consistent with that of EPROM-based prior art systems.
  • Still another object of the present invention is to provide a device for use within a gaming machine that allows for gaming software to be authenticated with pre-exiting means through emulating the physical characteristics of gaming software stored in EPROM-type media.
  • Still another object of the present invention is to provide a method for accessing/presenting gaming software stored in non-EPROM media as if it were stored in EPROM-type media.
  • Still another object of the present invention is to provide a method of displaying a resident library of gaming software stored in non-ROM media as if it were stored in EPROM-type media.
  • Still another object of the present invention is to provide a method for securing the gaming software presentation process.
  • Still another object of the present invention is to provide a method for registering presentation users.
  • Still another object of the present invention is to provide a method for reporting presentation users and activities.
  • Still another object of the present invention is to provide a method for selecting gaming software for presentation to an authentication device.
  • BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS
  • The present invention is more readily understandable by reference to the following detailed description read in pari materia with the accompanying drawings in which:
  • FIG. 1 is a simplified schematic diagram of the device of the present invention and related hardware components;
  • FIG. 2 is a block diagram of the EPROM Simulator component detailing process control flow.
  • FIG. 3 is a timing diagram describing the protocol for downloading to the EPROM simulator.
  • FIG. 4 is a block diagram describing the V-PROM presentation process.
  • DETAILED DESCRIPTION OF THE INVENTION
  • FIG. 1 illustrates the hardware components utilized in the preferred embodiment of this invention. Other hardware configurations are possible because of the modular nature of this design. The present invention is a control system, FIG. 1, for a gaming machine. The machine is not shown, but can be either a single game or multi-game machine.
  • The control system, FIG. 1, is comprised of four major modules.
  • Module (A) is a drawing of a commercially available Single Board Computer (SBC). Module (B) is a drawing of a commercially available storage media.
  • Module (C) represents the existence of a power supply. Module (D) represents the EPROM Simulator Board. All four components interconnect.
  • Module (A) connects to Module (B) through the use of either an EIDE cable or SCSII cable in the case of a SCSII based SBC. Module (A) also connects to Modules (D) through a parallel I/O cable. Module (C) supplies power to the other four modules via power cables and connectors.
  • In detail, Module (A), the SBC, is comprised of the following components: (1) an X-86 CPU such as a Pentium™ or Pentium II™ processor with MMX™ [Pentium, Pentium II and MMX are trademarks of Intel Corp.] or equivalent technology; (1 a) high speed processor cache for improved performance; (2) glue logic chips for driving high speed data busses and interfacing the processor to other high speed components such as RAM, video processors, network chips, and I/O boards; (3) high speed RAM sockets, typically DIMM or SIMM style. (4) integrated high speed network interface; (4 a) network interface connector; (5) integrated high speed video processor, (5 a) video monitor connector; (6) power connector; (7) custom peripheral I/O chip for driving serial I/O, parallel I/O; disk subsets such as EIDE or SCSII; (7 a) EIDE or SCSII storage media connectors; (7 b) serial and parallel I/O connectors; (8) integrated sound chip; (8 a) sound connector; and (9) stackable PC104 Plus connector. It is important to note that this invention, due to hardware abstraction accomplished through the use of a general purpose OS, is not tied to a specific SBC or manufacturer. This invention treats the SBC as a component which can be swapped or upgraded as new boards become commercially available.
  • Module (B) represents the use of general purpose mass storage media.
  • The media represented in Module (B) can include: Hard disks, CD-ROMS, solid state storage devices, or other common media used in the PC industry.
  • This media is connected (1) to the SBC (A) through a PC industry standard interface such as EIDE, SCSII, or PCMCIA. (2) represents a drive spindle in the case where spinning media is used. Although this invention can function without mass storage, it is specifically designed to exploit the advantages of such devices.
  • Module (C) represents a power supply. For the most part, this supply is designed to provide the voltages and current required for using standard PC hardware.
  • Module (D) represents the EPROM simulator Board. This board is interfaced to the SBC via a parallel cable (not depicted) connect to (A-7 b) and (D-2) parallel I/O connectors. This board is responsible for receiving downloaded V-PROM images, stored in RAM (5), allowing for their interrogation by an EPROM reader or Authentication Device attached to EPROM header (1). This board contains the following components: (3) a gate logic chip; (4) five digital counter chips used for addressing RAM (5); (6) three resisters used for biasing the parallel control lines-strobe, autofeed, and init (see FIG. 2); (7) four input buffer chips for RAM (5); (8) output buffer chips for RAM (5).
  • FIG. 2 provides more detail on the control system for the EPROM Simulator module (D). FIG. 2 describes the following sub-component interactions: control logic (2), components (D-3,4) responds to parallel I/O control lines, strobe (1 b), autofeed (1 c) and init (nid), inputs; the strobe input (1 b) is used to trigger the control logic to write the data (1 a), supplied via the parallel I/O data lines, through the input RAM buffers (3) into the RAM chip (4); the autofeed input (1 c) is used to trigger the control logic to increment the address counter; the init input (1 d) is used to control access to the RAM buffers (3) either via PC or EPROM control address counter are not selected and held resent for start of next data load from PC. Following data loading and reassertion of the INIT (id) line, an EPROM reader, or Authentication Device, can read the data stored in RAM (4) through the output RAM buffers (5) as if it were reading an EPROM.
  • The software which controls the functioning of the present invention is stored in three different places. EPROM (FIG. 1. A-10) contains the diagnostic program for the gaming machine. Storage device (A-11) contains the BIOS and Operating System software. The media type of device (A-11) varies from SBC to SBC, in some cases the BIOS and Operating System software is stored in two separate devices. Distinct software games, and data are stored on media device (B). In some configurations, game software can be stored on a fileserver attached through the network via connector (4 a).
  • The contents of EPROM (FIG. 1, A-10) contains the following software components illustrated in FIG. 4: diagnostic routines; V-PROM Presentation program (9); user access log presentation program (2); user login/registration program (3); V-PROM Library and selection program (5); and software data loader program (7). V-PROMS are stored in non-volatile storage (B). The V-PROM Registry is stored in secure non-volatile storage not depicted.
  • FIG. 4 details the flow of control during the V-PROM presentation process and is described in the following paragraph. The machines diagnostic routines are triggered by a user via a key switch. Diagnostic routines are selected according to the number of consecutive key switches initiated by the user. Among these diagnostic routines is the V-PROM Presentation Program (1), FIG. 4. Upon entering the V-PROM Presentation screen, a log of previous presentation screen users is displayed (2) including: usernames, date, time, type of event, V-PROMS presented/authenticated, and the date and time when then log was created. After display of the log, the user is required to register or exit the diagnostic function (2). To register, the user must enter a username and password (3). If the password does not match (4) the previously established password for that account, a user registration error is entered into the log (4 a) and the screen is automatically exited (4 b). New users, if allowed, establish their password during their first login session, not depicted. Optionally, users can be pre-enrolled, not depicted. If the password does match, the collected registration information is appended to the presentation users' log, not depicted. After registration, the V-PROM selection screen is activated (5). The user may browse the entire V-PROM registry (7 a) library of V-PROMS resident on the storage media (7 b) of the machine. This information includes V-PROM names, description of related gaming software and data, version numbers, creation times and dates, statistical and marketing information. From this screen (5), by pressing a button (6), the user can download the selected image to the EPROM emulator (9). To do this, the V-PROM browsing program (5) invokes the loader program (6) passing it the name of the selected V-PROM. The loader retrieves the image (7 b) referencing the registry (7 a), and calls the data presenter (8) which subsequently downloads the image to the EPROM simulator (9). The user (11) connects a prior art device that is capable of reading/authenticating EPROMS. This device (10) authenticates the downloaded V-PROM image. After presentation (8), the user (11) is required to enter the results of the authenticating device's inspection (12). After this, the user can select another V-PROM image for presentation (5). When the user is finished testing V-PROMS, the screen is exited via a button press (6), the diagnostic function is ended (6 a) and normal game play may resume. In the event of a V-PROM failing inspection, upon exiting the diagnostic function, the game enters a lock-up state which can only be cleared by a special process, not depicted.
  • FIG. 3 illustrates the protocol that is used to download data to the EPROM simulator. The data is communicated via a parallel I/O cable. The data is synchronously clocked into the simulator by pulsing the strobe line.
  • The destination address is incremented by the autofeed line. The init line is used to reset the destination address counter to zero.

Claims (26)

1. A method for facilitating data verification, the method comprising the steps of:
obtaining at least one piece of information about at least one portion of data;
presenting the at least one piece of information to a person for viewing;
determining whether the person wants to verify the at least one portion of the data; and
subsequent to determining that the person wants to verify the at least one portion of the data: obtaining a copy of the at least one portion of data; and providing a data verification device with access to the copy of the at least one portion of data, thereby facilitating data verification.
2. The method as claimed in claim 1, wherein the step of obtaining the copy of the at least one portion of data comprises the steps of:
retrieving the copy of the at least one portion of data from a data storage device via a computer network; and
subsequent to retrieving the copy of the at least one portion of data from the data storage device, storing the copy of the at least one portion of data in a memory device.
3. The method as claimed in claim 2, wherein the step of providing the data verification device with access to the copy of the at least one portion of data comprises the step of enabling the data verification device to read the copy of the at least one portion of data from the memory device.
4. The method as claimed in claim 2, wherein the data storage device comprises a non-volatile hard disk that comprises the at least one portion of data, and wherein the memory device comprises a volatile random access memory.
5. The method as claimed in claim 1, wherein the step of obtaining the copy of the at least one portion of data comprises the step of processing the at least one piece of information in order to determine a location from which the copy of the at least one portion of data can be obtained.
6. The method as claimed in claim 1, further comprising the steps of:
prompting the person to provide login information;
processing the login information to determine whether the person is an authorized person; and
if and only if it is determined that the person is the authorized person, performing the said steps of:
obtaining the at least one piece of information;
presenting the at least one piece of information;
determining whether the person wants to verify the at least one portion of data;
obtaining the copy of the at least one portion of data; and providing the data verification device with access.
7. The method as claimed in claim 6, further comprising the step of adding an entry to a log file, wherein the entry represents a result of the step of processing the login information.
8. The method as claimed in claim 6, wherein the step of prompting the person comprises the step of displaying a prompt on a visual display device of a gaming machine, wherein the prompt comprises a request for a username and a request for a password.
9. The method as claimed in claim 1, wherein the step of obtaining the at least one piece of information comprises the step of retrieving the at least one piece of information from a secure non-volatile read only memory.
10. The method as claimed in claim 1, wherein the step of presenting the at least one piece of information comprises the step of displaying the at least one piece of information on a visual display device of a gaming machine.
11. The method as claimed in claim 1, wherein the at least one piece of information comprises:
a file name of the at least one portion of data;
a version number of the at least one portion of data; and
a date and a time of creation of the at least one portion of data.
12. The method as claimed in claim 1, wherein the at least one portion of data comprises software embodying a game of chance.
13. The method as claimed in claim 4, wherein the at least one portion of data is arranged in a format that that the data verification device is capable of processing, wherein the format is different to a format of the non-volatile hard disk.
14. A system for facilitating data verification, the system comprising an electronic processing module and a memory device comprising software, the electronic processing module and the memory device being arranged such that the electronic processing module can process the software, wherein processing of the software causes the electronic processing module to perform the following steps:
obtaining at least one piece of information about at least one portion of data;
presenting the at least one piece of information to a person for viewing; determining whether the person wants to verify the at least one portion of the data; and
subsequent to determining that the person wants to verify the at least one portion of the data:
obtaining a copy of the at least one portion of data; and providing a data verification device with access to the copy of the at least one portion of data, thereby facilitating data verification.
15. The system as claimed in claim 14, wherein the step of obtaining the copy of the at least one portion of data comprises the steps of:
retrieving the copy of the at least one portion of data from a data storage device via a computer network; and
subsequent to retrieving the copy of the at least one portion of data from the data storage device, storing the copy of the at least one portion of data in a memory device.
16. The system as claimed in claim 15, wherein the step of providing the data verification device with access to the copy of the at least one portion of data comprises the step of enabling the data verification device to read the copy of the at least one portion of data from the memory device.
17. The system as claimed in claim 15, wherein the data storage device comprises a non-volatile hard disk that comprises the at least one portion of data, and wherein the memory device comprises a volatile random access memory.
18. The system as claimed in claim 14, wherein the step of obtaining the copy of the at least one portion of data comprises the step of processing the at least one piece of information in order to determine a location from which the copy of the at least one portion of data can be obtained.
19. The system as claimed in claim 14, further comprising the steps of:
prompting the person to provide login information;
processing the login information to determine whether the person is an authorized person; and
if and only if it is determined that the person is the authorized person, performing the said steps of:
obtaining the at least one piece of information;
presenting the at least one piece of information;
determining whether the person wants to verify the at least one portion of data;
obtaining the copy of the at least one portion of data; and
providing the data verification device with access.
20. The system as claimed in claim 19, further comprising the step of adding an entry to a log file, wherein the entry represents a result of the step of processing the login information.
21. The system as claimed in claim 19, wherein the step of prompting the person comprises the step of displaying a prompt on a visual display device of a gaming machine, wherein the prompt comprises a request for a username and a request for a password.
22. The system as claimed in claim 14, wherein the step of obtaining the at least one piece of information comprises the step of retrieving the at least one piece of information from a secure non-volatile read only memory.
23. The system as claimed in claim 14, wherein the step of presenting the at least one piece of information comprises the step of displaying the at least one piece of information on a visual display device of a gaming machine.
24. The system as claimed in claim 14, wherein the at least one piece of information comprises:
a file name of the at least one portion of data;
a version number of the at least one portion of data; and
a date and a time of creation of the at least one portion of data.
25. The system as claimed in claim 14, wherein the at least one portion of data comprises software embodying a game of chance.
26. The system as claimed in claim 17, wherein the at least one portion of data is arranged in a format that that the data verification device is capable of processing, wherein the format is different to a format of the non-volatile hard disk.
US12/434,571 1998-06-24 2009-05-01 Virtual eprom simulator apparatus Abandoned US20090215530A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/434,571 US20090215530A1 (en) 1998-06-24 2009-05-01 Virtual eprom simulator apparatus

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US9051498P 1998-06-24 1998-06-24
PCT/AU1999/000511 WO1999067721A1 (en) 1998-06-24 1999-06-24 Virtual eprom simulator apparatus
AUPCT/AU99/00511 1999-06-24
US72057004A 2004-12-23 2004-12-23
US12/434,571 US20090215530A1 (en) 1998-06-24 2009-05-01 Virtual eprom simulator apparatus

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US72057004A Division 1998-06-24 2004-12-23

Publications (1)

Publication Number Publication Date
US20090215530A1 true US20090215530A1 (en) 2009-08-27

Family

ID=22223115

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/720,570 Expired - Fee Related US7761283B1 (en) 1998-06-24 1999-06-24 Virtual EPROM simulator apparatus
US12/434,571 Abandoned US20090215530A1 (en) 1998-06-24 2009-05-01 Virtual eprom simulator apparatus

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/720,570 Expired - Fee Related US7761283B1 (en) 1998-06-24 1999-06-24 Virtual EPROM simulator apparatus

Country Status (5)

Country Link
US (2) US7761283B1 (en)
AU (1) AU760639B2 (en)
NZ (1) NZ509020A (en)
WO (1) WO1999067721A1 (en)
ZA (1) ZA200100146B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
NZ509018A (en) 1998-06-17 2002-06-28 Aristocrat Technologies Au Software verification and authentication
AU2009222627B2 (en) 2008-10-09 2011-07-21 Aristocrat Technologies Australia Pty Limited Gaming system and gaming system processor module
US11287939B2 (en) 2008-10-09 2022-03-29 Aristocrat Technologies Australia Pty Limited Gaming system and gaming system processor module
US11385758B2 (en) 2008-10-09 2022-07-12 Aristocrat Technologies Australia Pty Limited Gaming system and gaming system processor module
US8918582B2 (en) 2012-09-11 2014-12-23 International Business Machines Corporation Simulating EEPROM in virtual distributed switches
EP3029833B1 (en) * 2014-12-03 2019-03-13 General Electric Technology GmbH Semiconductor switching circuit

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5003507A (en) * 1988-09-06 1991-03-26 Simon Johnson EPROM emulator for selectively simulating a variety of different paging EPROMs in a test circuit
US5070479A (en) * 1985-06-24 1991-12-03 Nintendo Company Limited External memory having an authenticating processor and method of operating same
US5643086A (en) * 1995-06-29 1997-07-01 Silicon Gaming, Inc. Electronic casino gaming apparatus with improved play capacity, authentication and security
US5707286A (en) * 1994-12-19 1998-01-13 Mikohn Gaming Corporation Universal gaming engine
US5768563A (en) * 1993-07-20 1998-06-16 Dell Usa, L.P. System and method for ROM program development
US6402614B1 (en) * 1995-06-30 2002-06-11 Walker Digital, Llc Off-line remote system for lotteries and games of skill
US6527638B1 (en) * 1994-03-11 2003-03-04 Walker Digital, Llc Secure improved remote gaming system
US6620047B1 (en) * 1995-06-29 2003-09-16 Igt Electronic gaming apparatus having authentication data sets

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2776006B2 (en) 1990-07-06 1998-07-16 松下電器産業株式会社 Information recording / reproducing device
NZ509018A (en) * 1998-06-17 2002-06-28 Aristocrat Technologies Au Software verification and authentication

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5070479A (en) * 1985-06-24 1991-12-03 Nintendo Company Limited External memory having an authenticating processor and method of operating same
US5003507A (en) * 1988-09-06 1991-03-26 Simon Johnson EPROM emulator for selectively simulating a variety of different paging EPROMs in a test circuit
US5768563A (en) * 1993-07-20 1998-06-16 Dell Usa, L.P. System and method for ROM program development
US6527638B1 (en) * 1994-03-11 2003-03-04 Walker Digital, Llc Secure improved remote gaming system
US5707286A (en) * 1994-12-19 1998-01-13 Mikohn Gaming Corporation Universal gaming engine
US5643086A (en) * 1995-06-29 1997-07-01 Silicon Gaming, Inc. Electronic casino gaming apparatus with improved play capacity, authentication and security
US6620047B1 (en) * 1995-06-29 2003-09-16 Igt Electronic gaming apparatus having authentication data sets
US6402614B1 (en) * 1995-06-30 2002-06-11 Walker Digital, Llc Off-line remote system for lotteries and games of skill

Also Published As

Publication number Publication date
WO1999067721A1 (en) 1999-12-29
AU760639B2 (en) 2003-05-22
NZ509020A (en) 2003-01-31
ZA200100146B (en) 2002-06-26
US7761283B1 (en) 2010-07-20
AU4492799A (en) 2000-01-10

Similar Documents

Publication Publication Date Title
AU748955B2 (en) Software verification and authentication
RU2331928C2 (en) Loading procedures for peripheral units
AU2007227234B2 (en) Universal game download system for legacy gaming machines using ROM and NVRAM emulation
AU2009206188B2 (en) Pass-through live validation device and method
US7819750B2 (en) USB software architecture in a gaming machine
CN101300606B (en) Gaming machine update and mass storage management
RU2331926C9 (en) Standards and protocols for communications with usb-periphery
AU2004202447B2 (en) Gaming machine having hardware-accelerated software authentication
US20030069074A1 (en) Method for developing gaming programs compatible with a computerized gaming operating system and apparatus
US20060036874A1 (en) Data pattern verification in a gaming machine environment
US20090215530A1 (en) Virtual eprom simulator apparatus
AU2013237705B2 (en) Universal game download system for legacy gaming machines using rom and nvram emulation

Legal Events

Date Code Title Description
STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

AS Assignment

Owner name: NUGAME, INC., NEVADA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CURTIS, KEITH E.;BOND, EUGENE T.;SIGNING DATES FROM 19980622 TO 19980623;REEL/FRAME:034426/0895

AS Assignment

Owner name: ARISTOCRAT LEISURE INDUSTRIES PARTY LTD, AUSTRALIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NUGAME, INC.;REEL/FRAME:034440/0928

Effective date: 19980805

Owner name: ARISTOCRAT TECHNOLOGIES AUSTRALIA PTY LIMITED, AUS

Free format text: CHANGE OF NAME;ASSIGNOR:ARISTOCRAT LEISURE INDUSTRIES PARTY LTD;REEL/FRAME:034441/0128

Effective date: 20000428