5
IEEE Computer Society Technology Summi t 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

Embed Size (px)

DESCRIPTION

IEEE Computer Society Technology Summit 2008 Download Software Get the Software in the Casino –Set up a communication link with identified endpoints – VPN, HTTPS, etc. –Firewall keeps most bad guys out –Store new Game content on Content Server –Authenticate software on Content Server

Citation preview

Page 1: IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

IEEE Computer Society Technology Summit 2008

EGM Security with Software Download

IEEE Computer Society Technology Summit 2008

Page 2: IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

IEEE Computer Society Technology Summit 2008

EGM Security • Bring the Game Up

– Socketed BIOS is checked – BIOS contains authentication algorithm

and driver for high capacity storage device

– BIOS checks the Operating System, – Operating system check the gaming

application program

Page 3: IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

IEEE Computer Society Technology Summit 2008

Download Software• Get the Software in the Casino

– Set up a communication link with identified endpoints – VPN, HTTPS, etc.

– Firewall keeps most bad guys out– Store new Game content on Content

Server– Authenticate software on Content Server

Page 4: IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

IEEE Computer Society Technology Summit 2008

Download to the EGM• Get the software to the EGM

– Secure the link between Content Server and EGM (1.066(3))

– Download software into segregated portion of memory (1.066(7))

– Two separate logs record download action – Authenticate software before any other

action - no decrypting, decompressing, etc. – Authentic software can be installed

Page 5: IEEE Computer Society Technology Summit 2008 EGM Security with Software Download IEEE Computer Society Technology Summit 2008

IEEE Computer Society Technology Summit 2008

Questions• Questions?• Contact Info: Marc McDermott• Email:

[email protected]• Ph: 702-315-4253