This invention relates to the use of cryptographic algorithms for the authentication of RFID capable devices used within casino environment and, more specifically to the cryptographic authentication of RFID capable gaming chips.
Among all the approaches and measures that have been presented in the past years as concrete solutions for deterring counterfeiting and prevent unlawful and fraudulent wins within casinos, RFID-based solutions have received the greatest attention from both the industry and research communities.
Radio Frequency Identification technology is currently widely used in multiple industry sectors including manufacturing, transportation, postal tracking, medical, pharmaceutical and highway toll management. A typical RFID system configuration comprises an RFID transponder usually located on the object to be identified, an RFID interrogator or reader and a computing device. The interrogator is typically made of a radio frequency module, a control unit and a coupling element that transfers a sufficient amount of energy to the transponder. The transponder actually carries the data and it normally consists of a coupling element and an electronic microchip.
Several patents pertaining to RFID-based casino gaming chip monitoring for anti-counterfeiting purposes and player tracking have been issued. U.S. Pat. No. 5,166,502 (Rendelman et al.) shows a construction of radio frequency transponder embedded in a gaming chip. The transponder is tagged with information concerning the chip such as chip identity and value. The particular transponder described in that patent was specifically designed to work with slot machines. However, extending the application field of afore mentioned chip to gaming tables such as black jack tables or baccarat was not considered in this patent, and it would not work because the information contained in the chip cannot be changed.
In U.S. Pat. Nos. 5,651,548 and 5,735,742, French et al. present other RFID-based apparatus and methods of tracking gaming chip movement within casinos. These methods address the flaws of the previous patent by allowing chip tracking at various places within the casino including gaming tables and chip trays. Possibility of reading and writing in the integrated circuit containing token information is also explored. However, the solution proposed by French et al. will not prevent malicious players from impersonating a genuine RFID capable gaming chip. In fact, the method described by French et al. does not address security issues at all; hence, intercepting the communication between the interrogating device and the gaming chip and subsequently resending the intercepted serial number through the means of an easily constructed mini-sender is made quite easy. This and other powerful attacks on RFID capable devices have proven that relying solely on the uniqueness of the chip serial number is not enough to ensure security and thus prevent chip replication.
Some security approaches devised in the past for chip memory content protection were essentially limited to string of security bits which could be irreversibly toggled by the RFID device. If this approach is successful in preventing writing into a specific memory location, it would not prevent reading from that memory location.
In summary, the present invention discloses system and methods that prevent gaming chip counterfeiting, RFID capable gaming chip tampering and RFID capable gaming chip impersonation. Further, the present invention enforces RFID capable gaming chips validity assessment at gaming tables, cashier stations or at any other location within the casino where assessing the validity of the gaming chip is required.
Thus, it is an object of the present invention is to provide a security system for casino gaming chips authentication. In accordance with this object, there is provided a system for authenticating RFID-capable gaming chips in a casino, said system comprising at least one security server, at least one secure network, a casino management system and a plurality of magnetic couplers distributed within the casino, wherein said gaming chips are adapted to provide a response to a challenge issued by said magnetic couplers when said chips are located in the vicinity of said magnetic couplers, whereby said chip is authenticated when said response matches a computed response by said server.
In accordance with another aspect of the invention, there is provided a method for authenticating RFID-capable gaming chips within a casino, comprising the steps of:
In accordance with yet another aspect of the invention, there is provided a method for authenticating an RFID reader to a gaming chip within the casino comprising:
Using such authentication it can be guaranteed that a gaming chip used within the casino will partly or entirely disclose the security critical information to an interrogating device only after successful assessment that the interrogating device is indeed legitimately empowered to access this security information. Similarly, using such authentication will help assessing that any RFID capable gaming chip used at a gaming table or at any other location within the casino actually contains legitimate security information introduced into the gaming chip memory during commissioning or at any other time by legitimate staff within the casino. This means that any tampering with the gaming chip memory content will be detected. A gaming chip authentication system as disclosed in the invention will impede malicious players from dissimulating fake gaming chips—that is, those gaming chips with a valid serial number but invalid security code or temporarily stolen security code—among valid gaming chips.
Another object of the present invention is to provide a gaming chip authentication security system that uses a set of secrets whereby each secret out of the set can be used only a predefined number of times. This may include for example using the secret only once. In this case the secret is considered to be one-time password and the term one-time password will be used for this type of secrets interchangeably.
Another object of the invention is to describe a method for changing the authentication secret on a regular basis following a predefined time schedule specified by legitimate casino staff.
The details of one or more embodiments of the invention are set forth in the accompanying drawings and the description below.
These and other objects and advantages of the invention will become apparent upon reading the detailed description and upon referring to the drawings in which:
Embodiments of the security system for gaming chip authentication used in casino to ensure that the chip circulating within the casino and used at the gaming tables are genuine will typically encompass RFID capable gaming tables as described in International application no. PCT/CA2005/001338 filed on Sep. 1, 2005 by the Applicant, which is hereby incorporated by reference.
The embodiments of the security system for gaming chip authentication rely on the existence of a data network within the casino to ensure that legitimate casino staff has properly commissioned the chip used within the casino. It assumed that the network is secure and data traveling though the network from one node to another suffers no additional delay except the propagation time. The embodiments of a system for gaming chip authentication as disclosed in the present invention do not rely on any specific or on any proprietary encryption algorithm to ensure that no security critical information contained within the chip memory has been modified by any entity external to the casino operating staff. This means that any standard asymmetric key encryption algorithm such as RSA or ECC or any standard symmetric key encryption such as DES or AES could be used interchangeably as long they offer the same level of bit security. However, a low footprint encryption algorithm will be preferably used since it will significantly alleviate the network traffic. The embodiments of a system for gaming chip authentication as disclosed in the present invention do not rely on any specific or on any proprietary RFID communication protocol or any RFID frequency. Hence any RFID integrated circuits such as those available off-the-shelves from integrated circuit suppliers such as EM-Microelectronic, Philips Semiconductors, Texas Instruments could be used interchangeably in these embodiments.
In one embodiment of the invention, a gaming table equipped with an RFID reader and interrogation zones communicates in a secure way with a security server in order to fetch gaming chip authenticating information. Such information is then stored temporarily in the reader to speed up communication between the reader and the gaming chips. This temporarily stored information could possibly be used to successfully authenticate gaming chips even in the event of a complete network collapse. Authentication is done following a challenge response protocol whereby a digital signature is used to ensure the integrity of the messages sent by the parts intervening in the protocol
In another embodiment of the invention, the reader is allowed to process gaming chip-authenticating information but the reader is not allowed to store this information. This significantly reduces the amount of memory required at the reader side. But at the same time this requires careful network design since the traffic generated within the network could easily become overwhelming and could lead to a network collapse if no special care is taken.
In another embodiment of the invention, the gaming chip, in this document also subsequently called the “tag”, is assumed to encompass a minimal cryptographic device beside a random number generator. The cryptographic device would preferably be of symmetric key type since these are easier to implement and require less area on the integrated circuit of the tag.
Referring to
Each gaming chip 302 has a memory 407 to store the information received from the security server via the reader 301. Upon arrival at the casino, or at any other time as the case may be, the gaming chips are commissioned. This means that the gaming chips are registered in the casino database. The words gaming chip and tag will be used in the remaining part of this document interchangeably.
During the commissioning phase, all the parameters and all the necessary information needed for successful subsequent chip authentication is encoded into the chip memory 407. As illustrated in
Upon receipt of the hash value H, the host 305 uses its private key to compute 306 a digital signature Z over the hash. This digital signature is then sent 303c to the reader which uses the security server's public key to verify 307b the signed message received 303c from the security server 305. Upon successful signature verification, the signed message is sent 303d to the tag 302, which then securely stores 304b the signed message into its memory 407.
When a tag enters the reader's field, the reader initiates an authentication process by sending 603f a random number I between 1 and n to the tag. The tag responds to this authentication request by retrieving the correct password using i as an access index 409 to valid locations 410 of one of its memory tables 408. The retrieved value is then sent 603g, 603h to the host trough the reader along with the tag's serial number. Using the tag's serial number, the host verifies that the password Si received from the tag actually corresponds to the value stored in the database at position i for that given tag. If this is the case, access is granted and the host acknowledges 603i I to the reader. Upon receipt of the acknowledgment the reader marks the value of i as invalid and informs 603j the tag that it should invalidate the memory location 413 containing the value of i. Again as with the previously discussed embodiment, when the value of i reaches n, the tag has reached the predefined authentication quota and no other authentication is possible. Using this embodiment, several chips could be authenticated simultaneously since they could all share the same value of I while their respective serial number could be used to discriminate them on the host side.
The authentication process as described in this invention and in all the preferred embodiments described herein does not restrict communication between the security server and the chips only to communication through the gaming tables or cashier station. Indeed, chips may also be interrogated and requested to authenticate at other locations within the casino. For example, the casino could be equipped with readers and magnetic couplers coils located at employee portals 103 or at the casino exits 104 in order to prevent employee or player theft.
The embodiment of the present invention are not limited to passive RIFD chip as they will work equally with battery assisted RFID devices both active and semi-passive devices comprised.
Filing Document | Filing Date | Country | Kind | 371c Date |
---|---|---|---|---|
PCT/CA05/01519 | 9/30/2005 | WO | 00 | 11/7/2007 |
Number | Date | Country | |
---|---|---|---|
60614957 | Oct 2004 | US |