Patents by Inventor Chad A. Ryan

Chad A. Ryan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20050009599
    Abstract: A gaming machine that authenticates its gaming software substantially continuously and repetitiously while the gaming machine is powered on. A processor, while running the gaming machine's gaming program, determines whether the data in each of a plurality of memories is authentic. The processor may read multiple memories in a parallel fashion while making memory contents authenticity determinations. The processor may also read multiple memories in a serial fashion while making memory contents authenticity determinations. The processor may also read same memories in a parallel fashion and read other memories in a serial fashion while determining the authenticity of each memory's contents.
    Type: Application
    Filed: July 9, 2003
    Publication date: January 13, 2005
    Inventor: Chad Ryan
  • Publication number: 20040266523
    Abstract: In one embodiment, a secure gaming system includes at least one gaming terminal and at least one gaming system server. The terminal(s) and server(s) communicate over a communication network. In one embodiment, a gaming system server authenticates a gaming terminal, applies an encryption technique to encrypt a gaming software program, and transmits the encrypted gaming software program to the gaming terminal. The gaming terminal authenticates the gaming system server, receives the encrypted gaming software program from the gaming system server, and applies a decryption technique to decrypt the encrypted gaming software program, which produces the gaming software program. In one embodiment, a certification authority and/or a registration authority generate a signed gaming terminal digital certificate and/or a signed gaming system server digital certificate, which are used to authenticate the gaming terminal and the gaming system server, respectively.
    Type: Application
    Filed: April 15, 2004
    Publication date: December 30, 2004
    Inventors: Thomas A. Gentles, Chad A. Ryan, Richard T. Schwartz, Vikram Swamy
  • Publication number: 20040266533
    Abstract: In one embodiment, a secure gaming system includes at least one gaming terminal and at least one gaming system server. The terminal(s) and server(s) communicate over a communication network. In one embodiment, a server forwards unapproved gaming software over the communication network to a lab, where the lab is configured to test compliance of the unapproved gaming software with a plurality of regulations. The server receives a notification of approval of the unapproved gaming software, where the notification of approval indicates compliance of the unapproved gaming software with the plurality of regulations. The server changes the status of the unapproved gaming software to form approved gaming software. When the server receives a request for a license to use the approved gaming software, along with an indication of payment for the license, the server downloads the approved gaming software to the requestor.
    Type: Application
    Filed: April 15, 2004
    Publication date: December 30, 2004
    Inventors: Thomas A. Gentles, Chad A. Ryan, Richard T. Schwartz, Vikram Swamy
  • Publication number: 20040259633
    Abstract: In one embodiment, a secure gaming system includes at least one gaming terminal and at least one gaming system server. The terminal(s) and server(s) communicate over a communication network. In one embodiment, a gaming system server is capable of performing an authentication routine of an executable gaming software program, by exchanging messages with a gaming terminal over the communication network. The authentication routine results in a determination of whether a copy of the executable gaming software program stored at the gaming terminal is substantially identical to a copy of the executable gaming software program accessible by the gaming system server.
    Type: Application
    Filed: April 15, 2004
    Publication date: December 23, 2004
    Inventors: Thomas A. Gentles, Chad A. Ryan, Richard T. Schwartz, Vikram Swamy
  • Publication number: 20040259640
    Abstract: In one embodiment, a secure gaming system includes at least one gaming terminal and at least one gaming system server. The terminal(s) and server(s) communicate over a communication network. Selected ones of the terminal(s) and server(s) include one or more security elements. The security elements include secure communication apparatus, access control apparatus, and integrity apparatus, in one embodiment. A secure communication apparatus may provide network access control for gaming information exchanged between a gaming terminal and/or a server over the communication network. An access control apparatus may prevent unauthorized access to gaming information within a gaming terminal and/or server. An integrity apparatus may ensure integrity of the gaming information within the gaming terminal and/or server.
    Type: Application
    Filed: April 15, 2004
    Publication date: December 23, 2004
    Inventors: Thomas A. Gentles, Chad A. Ryan, Richard T. Schwartz, Vikram Swamy
  • Publication number: 20030195033
    Abstract: A method of preparing memory contents of a gaming machine for subsequent authentication and a method of authenticating the prepared memory contents are disclosed. A first memory stores a game data set and a first authentication code generated from the game data set. The game data set includes game data files and second authentication codes generated from the respective data files. A second memory stores an authentication program for authenticating the first memory's contents, as well as a third authentication code generated from the second memory's contents. To authenticate the memory contents, the second memory's contents are first authenticated and, if deemed authentic, the game data set as a whole and each data file in the first memory are authenticated. The authentication process involves generating fresh authentication codes using the authentication program and comparing the fresh codes with appropriate ones of the stored authentication codes.
    Type: Application
    Filed: April 10, 2002
    Publication date: October 16, 2003
    Inventors: Daniel J. Gazdic, Chad A. Ryan, Craig J. Sylla