Systems and methods for verification using encoded glyphs

ABSTRACT

Certain embodiments of the present invention provide a verification system including a processor adapted to generate a glyph for at least one component of a computing system, a display adapted to display the glyph, and a scanner adapted to scan the glyph from the display. The computing system includes the processor and the display. The scanner is adapted to verify the at least one component of the computing system based at least in part on the glyph.

RELATED APPLICATIONS

This application is related to, and claims the benefit of, ProvisionalApplication No. 60/865,294, filed on Nov. 10, 2006, and entitled“Systems and Methods for Encoded Glyphs.” The foregoing application isherein incorporated by reference in its entirety.

FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

[Not Applicable]

MICROFICHE/COPYRIGHT REFERENCE

[Not Applicable]

BACKGROUND OF THE INVENTION

The present invention generally relates to verification in computingsystems. More specifically, the present invention relates to systems andmethods for verification using encoded data glyphs.

Data glyph technology is a category, like bar coding, where data isembedded for use in image applications. Data glyph technology encodesdigital information in the form of binary 1's and 0's that are in turnrendered in the form of indistinguishable shaped marks such as smalllinear marks. Each mark generally represents a digit of binary data.U.S. Pat. No. 6,915,020, the disclosure of which is incorporated byreference, discloses glyph technology and usage thereof.

In many computing systems, including casino gaming devices, it is oftendesirable to verify one or more components including hardware, software,and/or firmware of the system. That is, verification allows one or morecomponents of the system to be shown to be operating correctly and/or ina previously approved form and/or has been approved in a particulargaming jurisdiction. Verification may be viewed to include validationand authentication. The former may refer to a form of verification thatincludes checking that the component being validated originated from aknown or trusted source and that the component has not been tamperedwith. Authentication may refer to a form of verification that includesdetermining that a component comes from an approved, known, or trustedsource. As used herein, verification is intended to encompass theconcept that a component is as it seems and has not been altered orcorrupted. Authentication may encompass digital signatures or the like.

In gaming devices, regulatory agencies often will require that currentlyrunning gaming software be at least verified. Currently, the cabinet ofa gaming device must be opened in order for the device to be verifiedbecause physical access to the verification interface is restricted. Thecurrent verification process, including stopping game play at thedevice, opening the cabinet, and performing the verification, is timeconsuming. The game personality memory device such as an EPROM must beremoved from the game and connected to a device to compare and verifythe data. In addition, the down time required may result in lost revenuesince the game has been removed from play.

BRIEF SUMMARY OF THE INVENTION

Certain embodiments of the present invention provide a verificationsystem including a processor adapted to generate a glyph for at leastone component of a computing system, a display adapted to display theglyph, and a scanner adapted to scan the glyph from the display. Thecomputing system includes the processor and the display. The scanner isadapted to verify the at least one component of the computing systembased at least in part on the glyph.

Certain embodiments of the present invention provide a method ofverification including generating a glyph for a game, displaying theglyph, and verifying the game based at least in part on the displayedglyph. The game is adapted to run on a gaming device. The glyph isdisplayed on the gaming device. In certain embodiments, the glyph may beimbedded within certain graphics or text to be indiscernible to thenaked eye.

Certain embodiments of the present invention provide a computer-readablemedium including a set of instructions for execution on a computer, theset of instructions including a glyph generation routine, a displayroutine, and a verification routine. The glyph generation routine isconfigured to generate a glyph for a game. The game is adapted to run ona gaming device. The display routine is configured to display the glyphon the gaming device. The verification routine is configured to verifythe game based at least in part on the displayed glyph.

Certain embodiments of the present invention provide a gaming deviceincluding a game memory, a display adapted to display a glyph, and aprocessor adapted to generate the glyph for the game memory. The glyphis based at least in part on the contents of the game memory. The glyphis adapted to be scanned to verify the contents of the game memory.

BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 illustrates a gaming device according to an embodiment of thepresent invention.

FIG. 2 illustrates a verification system according to an embodiment ofthe present invention.

FIG. 3 illustrates a flow diagram for a method for verifying a gamingdevice according to an embodiment of the present invention.

FIG. 4 illustrates a flow diagram for a method for verifying a gamingdevice according to an embodiment of the present invention.

The foregoing summary, as well as the following detailed description ofcertain embodiments of the present invention, will be better understoodwhen read in conjunction with the appended drawings. For the purpose ofillustrating the invention, certain embodiments are shown in thedrawings. It should be understood, however, that the present inventionis not limited to the arrangements and instrumentality shown in theattached drawings.

DETAILED DESCRIPTION OF THE INVENTION

Gaming terminals, electronic gaming tables, and other gaming devices maybe located in a local gaming environment, such as a casino, or amulti-site gaming environment, such as a plurality of networked casinos.Gaming devices may also be located in non-traditional gamingenvironments, such as restaurants, stores, and/or airports. Gamingdevices may be used to play one or more games employing one or morerewards.

The requirements and operating characteristics for games vary from oneregulated gaming jurisdiction to another. As such gaming devices may beapproved in one form in one jurisdiction and in another form in anotherjurisdiction. The game personality EPROM or other memory device storescode for the operation of the game. Shipping or providing a game wherethe components such as the game operating code has not been approved bythe controlling jurisdiction can result in the regulators requiring thegame to be withdrawn from play and/or issuing sanctions against themanufacturer.

In addition to the foregoing, it may become necessary to check thegaming device in the field or before installation in the field to makesure that the game is verified. This verification has been done in thepast by opening up the gaming device cabinet, removing the game EPROMchip, and placing it in a reading device to compare the code and verifyit.

Where game code is downloaded to a gaming terminal, it would beadvantageous to be able to verify the game code in a fast, efficient,and non-obtrusive fashion. For example, the downloaded game code may beinternally verified (and perhaps authenticated); but it would beadvantageous to provide a technique to separately verify aspects of thegame.

When a game is prepared for shipment to a customer it would beadvantageous to provide for an easy check that the operating code suchas the game code is verified (not corrupted) and is verified for thegaming jurisdiction to receive the game.

The glyph technology of the presently described invention may also beused to verify software or device adapted to run on a gaming deviceperipheral such as a bill validator, ticket printer, display, cashacceptor or other device. For example, the glyph may validate peripheraloperating software, identification of the device or its configuration.

FIG. 1 illustrates a gaming device 100 according to an embodiment of thepresent invention. The gaming device 100 includes a game memory 110, aprocessor 120, a motherboard 125, and one or more displays 130.

The motherboard 125 is in communication with the game memory 110 and theprocessor 120. The motherboard 125 is in communication with the one ormore displays 130. In certain embodiments, the motherboard 125 includesthe game memory 110. In certain embodiments, the motherboard 125includes the processor 120.

In operation, the motherboard 125 and processor 120 provide a game to auser based at least in part on data included in the game memory 110. Thegame is presented to the user through at least one of the displays 130.A glyph is generated by the processor 120 based at least in part on thegame memory 110. The glyph is then displayed on one or more of thedisplays 130.

The glyph may represent a hash value for the game or other generatedverification “tag” or selected segments or modules of the codesufficient to provide at least a rough verification of the game and itsversion, e.g. the “Nevada” version versus the “Mississippi” versionwhere the versions differ.

The game memory 110 may include an electrically programmable read-onlymemory (EPROM), for example, programmed at the factory. In certainembodiments, the game memory 110 includes a downloadable game. Forexample, the game memory 110 may include a game downloaded from a serveror over the Internet. In certain embodiments, the game memory 110includes more than one game. For example, in a multi-game gamingmachine, a user may select from two or more games to play on aparticular gaming device 100. Game code memory may also be provided in aflash memory, hard drive, or other memory, for example.

The display 130 may include a game display, a top box display, and/or aplayer tracking module (PTM) display, for example.

The processor 120 is adapted to generate a glyph. The glyph may begenerated continuously or the device may be provided with a switch orcommand to cause the processor 120 to generate the glyph. For example,the gaming device may be provided with an internal switch to prompt theprocessor 120 to generate the glyph. External switches, card readerswireless or wired switches may also be used to generate the prompt. Theglyph may represent code (or encrypted code or a hash or message digest)which relates to information regarding the game version, approval,approval jurisdictions, serial number, providence (e.g., associated gameserial number, and owner), an encrypted serial number, denomination,original set-up including peripherals such as bill validators,display(s) or ticket printers, vendor, customer, install date, version,licensee, and/or licensor, for example. Alternatively, the glyph mayprovide a code and/or identifier that may be correlated with such data.The glyph may also include unrelated data such as a watermark, image,alphanumeric tag, or the like, whereby the manufacturer can determinewhether the code has been copied.

The glyph may be used to verify a component of the gaming device 100.For example, the glyph may be used to check the validation,authorization, and/or providence of the game software, the game memory110, and/or system, for example. The glyph would allow a component ofthe gaming device 100 to be checked via one or more of the displays suchas display 130, by, when the glyph is displayed, walking by with ascanner and without opening the cabinet, for example. For example,regulators could verify the game and/or gaming memory 110 using theglyph and a scanner. When the glyph is displayed, an optical scannercould discern and decipher the data represented by the glyph and comparethe deciphered glyph with known data to verify the game, device orcomponent. For example, a regulator in Nevada with a scanner couldverify all games on a casino floor by scanning the glyphs on thedisplay. The glyphs may be displayed as by a series of lines or may bedisplayed as embedded in another graphic display such as an image ortextual material, e.g., the pay table display or help screen. As anotherexample, a manufacturer could scan the glyph to perform a final orrandom check to verify the software or gaming device. Before the gameleaves the factory, the game could be powered up and the glyph would bedisplayed and scanned to confirm the proper set-up. As another example,the glyph may be used to confirm the validity of a game download.

The glyph may be generated based at least in part on the game memory110. For example, the glyph may be generated based on one or more gamesstored in the game memory 110. For example, the value and/or form of theglyph may be determined by performing a computation on at least part ofthe data stored in the game memory 110. As an example, a hash value ofthe game code and set-up data may be used to generate the glyph fordisplay. The scanner would read the glyph and from it determine the hashvalue to compare and verify the data. Where a game is downloaded thedownload to the gaming device may itself include a hash, digitalsignature or other verifying data. This verifying data would be used togenerate the glyph.

The glyph may be displayed on one or more of the displays 130, forexample. The glyph may be displayed on a gaffed display, help screen,icon, game screen, bonus screen, and/or PTM display, for example.

In certain embodiments, the glyph is difficult to see or distinguish bya player. That is, the glyph may be “invisible” to the player as bybeing embedded in a images such as graphics or textual display. Forexample, the glyph may be presented on a display 130 using alow-contrast color. As another example, the glyph may be displayed as agrayscale or yellow feature. As another example, the glyph may be hiddenwithin an icon or image on the display 130. As another example, theglyph may be placed in a corner of the display 130, away from elementsthe user interacts with.

In certain embodiments, the glyph is encrypted. The data is encryptedand then is used to generate the corresponding glyph. The glyph might bedisplayed as angled lines, characters, or the like.

FIG. 2 illustrates a verification system 200 according to an embodimentof the present invention. The verification system 200 includes a gamingsystem component 210, a processor 220, a display 230, a scanner 240, anda database 250.

The processor 220 is in communication with the gaming system component210 and the display 230. The scanner 240 is in communication with thedatabase 250.

The display 230 is adapted to display a glyph 235. The scanner 240 isadapted to scan the display 230.

In operation, the processor 220 is adapted to generate the glyph 235based at least in part on the gaming system component 210. The display230 then displays the glyph 235. The scanner 240 then scans the glyph235 from the display 230. The gaming system component 210 is verifiedbased on the scanned glyph 235 and verification data stored in thedatabase 250.

The gaming system component 210 may include a game memory, similar tothe game memory 110, described above, for example. The gaming systemcomponent 210 may include hardware, software, and/or firmware in agaming device similar to the gaming device 100, described above, forexample. The processor 220 may be similar to the processor 120,described above, for example. The display 230 may be similar to thedisplays 130, described above, for example.

The scanner 240 may scan the glyph 235 from the display in a variety ofways. For example, the scanner 240 may optically scan the glyph 235. Asanother example, the scanner 240 may include an infrared scanner to readthe glyph 235. In certain embodiments, the glyph is audible rather thanvisual. For example, the glyph 235 may include one or more sounds ortones and the scanner 240 may include a microphone to scan the glyph235. The scanner 240 may be a hand-held scanner or reader, for example.

The glyph 235 may be similar to the glyph discussed above, for example.The glyph 235 may be encoded to provide information regarding approval,approval jurisdictions, serial number, providence (e.g., associated gameserial number, and owner), an encrypted serial number, vendor, customer,install date, version, licensee, and/or licensor, for example.Alternatively, the glyph 235 may provide a code and/or identifier thatmay be correlated with such data.

The glyph 235 may be used to verify the gaming system component 210. Theglyph 235 may allow the gaming system component 210 to be checked viathe display 230 by walking by with a scanner and without opening thecabinet, for example. For example, regulators could verify the gamingsystem component 210 using the glyph 235 and the scanner 240. As anotherexample, a manufacturer could scan the glyph 235 to perform a final orrandom check to verify the gaming system component 210.

The glyph 235 may be generated based at least in part on the gamingsystem component 210. For example, the glyph 235 may be generated basedon one or more games stored in a game memory. For example, the valueand/or form of the glyph 235 may be determined by performing acomputation on at least part of the data stored in the game memory.

In certain embodiments, the glyph 235 is difficult to see or distinguishby a player. That is, the glyph 235 may be “invisible” to the player.For example, the glyph 235 may be presented on the display 230 using alow-contrast color or embedded in an image or text. As another example,the glyph 235 may be displayed as a grayscale or yellow feature. Asanother example, the glyph 235 may be hidden within an icon or image onthe display 230. As another example, the glyph 235 may be placed in acorner of the display 230, away from elements the user interacts with.

The database 250 may include verification data. The verification datamay be for gaming system component 210, for example. That is, theverification data in the database 250 may be used to verify the gamingsystem component 210 at least in part in conjunction with the glyph 235.The verification data may be generated as part of the manufacturingprocess, for example.

In certain embodiments, the database 250 is a regulatory database. Forexample, the regulatory database may include verification informationfor games approved for a particular casino or within a particularjurisdiction. In certain embodiments, the database 250 is a masterdatabase. For example, the master database may include game data bywhich the regulator can compare the data corresponding the glyph as readin the field to verify the game or other data.

In certain embodiments, the scanner 240 may upload data based at leastin part on the scanned glyph 235. The scanner 240 may send the data tothe database 250 to be stored for records maintenance, for example. Thedata may be sent over a wired or wireless network, for example. Theregulator, manufacturer or operator may read the glyphs and upload thedata to the database 250 to verify the game or other data, provide adate of the verification, the person verifying the game, or otherrelevant data for archival purposes. Certain embodiments of the presentinvention may be used in non-gaming applications. For example, softwarevendors could check software via a screen saver, displayed icon, and/ora gaffed display, for example. A company may wish to verify that allversions of a particular software used in the company are genuine andwithin their software license. For equipment such as radar displays, orother equipment displays, it would also be advantageous to verify thesoftware on a routine basis to make sure the data has not been corruptedand is genuine. Further, this technique may also be useful to verifythat downloaded or loaded software has been accepted, loaded, and isgenuine.

FIG. 3 illustrates a flow diagram for a method 300 for verifying agaming device according to an embodiment of the present invention. Themethod 300 includes the following steps, which will be described belowin more detail. At step 310, verification information is stored. At step330, a glyph is displayed. At step 340, the glyph is read. At step 350,verification is performed based on the glyph. The method 300 may bedescribed with reference to elements of systems described above, but itshould be understood that other implementations are possible.

At step 310, verification information is stored. The verificationinformation may be stored in a database similar to the database 250,described above, for example. The verification information may be forthe game memory 312. The verification information may be for a gamingsystem component similar to the gaming system component 210, describedabove, for example. The verification information may be stored as partof the manufacturing process, for example.

In certain embodiments, the verification information may be stored in aregulatory database. For example, the regulatory database may includeverification information for games approved for a particular casino orwithin a particular jurisdiction. In certain embodiments, theverification information may be stored in a master database. Forexample, the master database may include information regarding allmanufacturers and their approved games. This database may be accessed(or accessible) via the scanner to verify the data sought to beverified.

At step 330, a glyph is displayed. The glyph may be similar to the glyph235, described above, for example. The glyph may be displayed on adisplay similar to display 130 and/or 230, described above, for example.The display may include a game display, a top box display, and/or a PTMdisplay, for example. The glyph may be displayed on one or more ofdisplays, for example. The glyph may be displayed on a gaffed display,help screen, icon, game screen, bonus screen, and/or PTM display, forexample. The display may be continuous, may require a prompt, or may bedisplayed at a separate screen that can be called up by a prompt such asby calling up the “Help” screen, for example.

In certain embodiments, the glyph is generated based at least in part onthe game memory 312. The glyph may be generated by the processor 320,for example. The processor 320 may be similar to the processor 120and/or the processor 220, described above, for example.

The glyph may be encoded to provide information regarding approval,approval jurisdictions, serial number, providence (e.g., associated gameserial number, and owner), an encrypted serial number, vendor, customer,install date, version, licensee, and/or licensor, for example.Alternatively, the glyph may provide a code and/or identifier that maybe correlated with such data.

The glyph may be used to verify the game memory 312 and/or the contentof the game memory 312. The glyph may allow the game memory 312 to bechecked via a display by walking by with a scanner and without openingthe cabinet, for example. For example, regulators could verify the gamememory 312 using the glyph and a scanner. As another example, amanufacturer could scan the glyph to perform a final or random check toverify the game memory 312.

The glyph may be generated based at least in part on the game memory312. For example, the glyph may be generated based on one or more gamesstored in the game memory 312. For example, the value and/or form of theglyph may be determined by the processor 320 performing a computation onat least part of the data stored in the game memory 312.

In certain embodiments, the glyph is difficult to see or distinguish bya player. That is, the glyph may be “invisible” to the player. Forexample, the glyph may be presented on a display using a low-contrastcolor. As another example, the glyph may be displayed as a grayscale oryellow feature. As another example, the glyph may be hidden within anicon or image on a display. As another example, the glyph may be placedin a corner of a display, away from elements the user interacts with.

At step 340, the glyph is read. The glyph may be the glyph displayed atstep 330, described above, for example. The glyph may be read by ascanner similar to scanner 210, described above, for example.

The scanner may read the glyph from the display in a variety of ways.For example, the scanner may optically scan the glyph. As anotherexample, the scanner may include an infrared scanner to read the glyph.The scanner may be a hand-held scanner or reader, for example.

At step 350, verification is performed based on the glyph. Theverification may be performed by a scanner, similar to the scanner 240,described above, for example. The verification may be based on the glyphand verification data stored in step 310, described above, for example.In one embodiment, the scanner 240 may contain verification data storedin a data structure in the scanner 240. In another embodiment thescanner 240 may communicate, for example through a wireless network,with a host computer either on site or remote (at for example a sitecontrolled by regulators) to conduct the verification.

One or more of the steps of the method 300 may be implemented alone orin combination in hardware, firmware, and/or as a set of instructions insoftware, for example. Certain embodiments may be provided as a set ofinstructions residing on a computer-readable medium, such as a memory,hard disk, DVD, or CD, for execution on a general purpose computer orother processing device.

Certain embodiments of the present invention may omit one or more ofthese steps and/or perform the steps in a different order than the orderlisted. For example, some steps may not be performed in certainembodiments of the present invention. As a further example, certainsteps may be performed in a different temporal order, includingsimultaneously, than listed above.

FIG. 4 illustrates a flow diagram for a method 400 for verifying agaming device according to an embodiment of the present invention. Themethod 400 includes the following steps, which will be described belowin more detail. At step 410, verification information is stored. At step420, a game is downloaded. At step 430, a glyph is displayed. At step440, the glyph is read. At step 450, the game is verified. The method400 is described with reference to elements of systems described above,but it should be understood that other implementations are possible.

At step 410, verification information is stored. The verificationinformation may be stored in a database similar to the database 250,described above, for example. The verification information may be for agaming system component similar to the gaming system component 210,described above, for example. The verification information may be storedas part of the manufacturing process, for example.

In certain embodiments, the verification information may be stored in aregulatory database. In certain embodiments, the verificationinformation may be stored in a master database.

At step 420, a game is downloaded. The game may be downloaded to agaming machine, for example. The game may be downloaded over a network,for example. For example, a game may be downloaded to a gaming device ina casino. As another example, a game may be downloaded over the Internetto a personal computer.

At step 430, a glyph is displayed. The glyph may be similar to the glyph235, described above, for example. The glyph may be displayed on adisplay similar to display 130 and/or 230, described above, for example.The display may include a game display, a top box display, and/or a PTMdisplay, for example. The glyph may be displayed on one or more ofdisplays, for example. The glyph may be displayed on a gaffed display,help screen, icon, game screen, bonus screen, and/or PTM display, forexample.

In certain embodiments, the glyph is generated based at least in part ona gaming system component. The glyph may be generated by a processor,for example. The processor may be similar to the processor 120, theprocessor 220, and/or the processor 320, described above, for example.

At step 440, the glyph is read. The glyph may be the glyph displayed atstep 430, described above, for example. The glyph may be read by ascanner similar to scanner 210, described above, for example.

The scanner may read the glyph from the display in a variety of ways.For example, the scanner may optically scan the glyph. As anotherexample, the scanner may include an infrared scanner to read the glyph.The scanner may be a hand-held scanner or reader, for example.

At step 450, the game is verified. The verification may be performed bya scanner, similar to the scanner 240, described above, for example. Theverification may be based on the glyph and verification data stored instep 410, described above, for example.

One or more of the steps of the method 400 may be implemented alone orin combination in hardware, firmware, and/or as a set of instructions insoftware, for example. Certain embodiments may be provided as a set ofinstructions residing on a computer-readable medium, such as a memory,hard disk, DVD, or CD, for execution on a general purpose computer orother processing device.

Certain embodiments of the present invention may omit one or more ofthese steps and/or perform the steps in a different order than the orderlisted. For example, some steps may not be performed in certainembodiments of the present invention. As a further example, certainsteps may be performed in a different temporal order, includingsimultaneously, than listed above.

Certain embodiments may be implemented in software, firmware, and/orhardware, for example. For example, certain embodiments may beimplemented as a set of instructions or routines stored on amachine-readable medium, such as a CD, DVD, CD-ROM, DVD-ROM, hard disk,floppy disk, RAM, ROM, flash memory, and/or other medium, for executionon a computer and/or other processing device. Certain embodiments may beimplemented on a standalone gaming terminal, a bank of gaming terminals,a network of gaming terminals, and/or a client-server systemcommunicating with one or more gaming terminals and/or other devices,for example.

Thus, certain embodiments of the present invention provide systems andmethods for verification using encoded glyphs. Certain embodimentsprovide for verifying a gaming device using a glyph. Certain embodimentsprovide for scanning a glyph. Certain embodiments of the presentinvention have a technical effect of verification using encoded glyphs.Certain embodiments have a technical effect of verifying a gaming deviceusing a glyph. Certain embodiments have a technical effect of scanning aglyph.

While the invention has been described with reference to one or morepreferred embodiments, those skilled in the art will understand thatchanges may be made and equivalents may be substituted without departingfrom the scope of the invention. In addition, many modifications may bemade to adapt a particular step, structure, or material to the teachingsof the invention without departing from its scope. Therefore, it isintended that the invention not be limited to the particular embodimentdisclosed, but that the invention will include all embodiments fallingwithin the scope of the appended claims.

The invention claimed is:
 1. A verification system for softwareconfigured to run on a gaming machine having a game memory configured tostore at least one game, the verification system including: a processorconfigured to: determine a hash value of game data including a game codesegment of the at least one game and a serial number of the game, andgenerate a glyph based on the hash value, the glyph including ascannable image representing the hash value of the game data; a displaysystem, having a display, and configured to embed the glyph within agraphic of a game screen on the display such that the graphic appearsunchanged to a user of the gaming machine, wherein the display and thegraphic is visible to the user; and an optical scanner configured to a)optically scan the display to retrieve the glyph, b) obtain the hashvalue from the glyph retrieved from the display, and c) compare the hashvalue obtained from the glyph to verification data associated with thegaming machine to verify the game data.
 2. The system of claim 1, andwherein the processor is a component of said gaming machine.
 3. Thesystem of claim 1, and wherein the gaming machine comprises a slotmachine.
 4. The system of claim 1, and wherein the gaming machineincludes a plurality of displays.
 5. The system of claim 1, furthercomprising an interface communicatively coupled to the gaming machine,wherein the interface is configured to prompt the display of the glyphfor verification.
 6. The system of claim 1, wherein the processor isfurther configured to generate the glyph to include a low-contrastcolor.
 7. The system of claim 1, wherein the processor is furtherconfigured to encrypt the glyph.
 8. The system of claim 1, and whereinthe gaming machine further includes a game memory.
 9. The system ofclaim 8, wherein the game memory includes a plurality of game codesegments.
 10. The system of claim 8, wherein the game memory includes adownloadable game.
 11. The system of claim 1, wherein the processor isfurther configured to encode the glyph to provide information regardingat least one of approval, approval jurisdiction, serial number,providence, version, licensee, and licensor.
 12. The system of claim 1,wherein the optical scanner is an infrared scanner.
 13. The system ofclaim 2, wherein the optical scanner is hand-held.
 14. The system ofclaim 13, further including a database, wherein the hand-held scanner isadapted to verify the gaming machine based on a hash value included inthe database.
 15. The system of claim 1, further comprising a switch toprompt the display of the glyph.
 16. A method of verification for usewith a scanner having a scanning controller, and a gaming machine havinga display, a game memory storing at least one game, and a gamingcontroller, the method including: determining, via the gamingcontroller, a hash value of game data including a game code segment ofthe at least one game and a serial number of the game; generating, viathe gaming controller, a glyph based on the hash value, the glyphincluding a scannable image representing the hash value of the gamedata; embedding the glyph within a graphic of a game screen on thegaming machine display such that the graphic appears unchanged to a userof the gaming machine, wherein the gaming machine display and thegraphic is visible to the user; using the scanner to optically scan thedisplay to retrieve the glyph; obtaining, via the scanning controller,the hash value from the glyph retrieved from the display; and verifying,via the scanning controller, the game data based at least in part on acomparison of the hash value obtained from the scanned glyph andverification data associated with the gaming machine.
 17. The method ofclaim 16, further including determining the hash value for the game dataprior to loading the game data on the gaming machine.
 18. The method ofclaim 17, further including storing the hash value for the game data ina database.
 19. The method of claim 16, further including downloadingthe game data to the gaming machine.
 20. The method of claim 16, whereingenerating the glyph comprises generating the glyph to include alow-contrast color.
 21. The method of claim 16, wherein the game data isstored in a software memory in the gaming machine.
 22. The method ofclaim 21, wherein the game data includes a plurality of game codesegments.
 23. The method of claim 16, wherein verifying the game data isbased at least in part on a second hash value stored in a database. 24.The method of claim 23, wherein the hash value is determined prior todisplaying the glyph.