Method and apparatus for securing gaming machine operating data

ABSTRACT

A method and apparatus for securing control or operating code or data of a gaming machine is disclosed. One embodiment of the method includes the steps of obtaining gaming device operational code encrypted in a symmetrical encryption process with a first private key, providing the encrypted code to the gaming device, decrypting the code using the first private key, storing the decrypted code at the gaming device, and utilizing the decrypted code to operate the gaming device. In one embodiment, the gaming device includes a master gaming controller having an associated memory, a processor for executing code, and a secure access module having the decryption key associated therewith.

FIELD OF THE INVENTION

[0001] The present invention relates to gaming machine control code oroperational data, and more particularly, methods and apparatus forsecuring such code or data.

BACKGROUND OF THE INVENTION

[0002] Gaming machines are well known and have a variety ofconfigurations. These machines include those known as “slot” and “video”machines. In general, these machines are arranged to present a game forplay by a player. When referred to as “gaming” machines, the machinesare generally arranged to require that a player place a wager to beentitled to play the game and pay out winnings to the player in theevent the player is a winner of the game.

[0003] These gaming machines are commonly controlled by gaming controlcode and operated with associated data. It is desirable to ensure thatthis code or data is secure. As will be appreciated, seriousconsequences may arise if the code is tampered with. For example, aperpetrator may attempt to alter the gaming machine control code so thatgame wins are registered with greater frequency, or winnings paid fornormally non-winning events. No matter how accomplished, the perpetratorgenerally attempts to cause the code to allow the perpetrator to defraudthe gaming machine and obtain money therefrom.

[0004] A problem with maintaining the gaming control code or other datasecure is that in many instances, it is desirable to provide the code ordata to the gaming machine from other than only a secure, read-onlyformat. For example, so that different games may be played on aparticular machine or various features of the machine updated, in manyinstances the gaming machine is arranged to accept new control code orother data. As stated above, however, it is necessary to ensure that thecode or data provided to the gaming machine is secure.

SUMMARY OF THE INVENTION

[0005] Methods and apparatus for securing gaming device control andoperation code and data are disclosed.

[0006] In one embodiment of a method, control code or operational datais encrypted using a private key of a symmetrical encryption/decryptionscheme. This encrypted code is provided to the gaming device. In one ormore embodiments, the encrypted code is stored at a memory of the gamingdevice. Alternatively, the code is transmitted to the gaming device.

[0007] The gaming device is caused to seek the encrypted code and isthen decrypted with the private key of the symmetricalencryption/decryption scheme. In one embodiment, when operation of thegaming machine is initiated, a decryption device or element is located,the encrypted code is located, and then the decryption device isutilized to decrypt the code.

[0008] Once decrypted, the code is stored at a memory of the gamingdevice for use in the operation of the gamine device. In one embodiment,the code comprises operating code enabling a gaming controller of thegaming device to present one or more particular games to a player. Inanother embodiment, the code comprises data for use in presenting a gameor otherwise operating the gaming device. Such data may comprise audioand video data.

[0009] In one embodiment, after the code is decrypted, it is verifiedbefore it is stored or used. In one embodiment, the verificationincludes verification of certain token strings or signatures.

[0010] One embodiment of the invention comprises a gaming device forimplementing the method of the invention. In one embodiment, the gamingdevice includes a gaming controller having a processor and an associatedmemory. The gaming controller also includes a secure access module. Thedecryption key is associated with the secure access module.

[0011] In one embodiment of the invention, operation of the gamingdevice includes the step of searching for the secure access module. Thesecure access module then searches for and obtains the encrypted code.The secure access module decrypts the code and stores it at the memory.

[0012] In accordance with the invention, all or substantially all of thecode or data is encrypted, making the code or data unreadable withoutfirst being decrypted. Once encrypted, the code or data may betransmitted, stored or the like with little risk of tampering by anunauthorized party. The decryption key is associated with the secureaccess module and is thereby also securely maintained. In this manner,the gaming device control code or operating data is securely maintained.

[0013] Further objects, features, and advantages of the presentinvention over the prior art will become apparent from the detaileddescription of the drawings which follows, when considered with theattached figures.

DESCRIPTION OF THE DRAWINGS

[0014]FIG. 1 illustrates one example environment of use of an apparatusand method of the present invention;

[0015]FIG. 2 is a block diagram of a gaming machine controller forimplementing a method in accordance with the present invention;

[0016]FIG. 3 is a flow diagram illustrating in a method in accordancewith an embodiment of the invention; and

[0017]FIG. 4 is a flow diagram illustrating a particular implementationof the method illustrated in FIG. 3.

DETAILED DESCRIPTION OF THE INVENTION

[0018] The invention is a method and apparatus for securing control codeor other data for use by a gaming machine. In the following description,numerous specific details are set forth in order to provide a morethorough description of the present invention. It will be apparent,however, to one skilled in the art, that the present invention may bepracticed without these specific details. In other instances, well-knownfeatures have not been described in detail so as not to obscure theinvention.

[0019] In general, the invention is a method and apparatus for providingsecure code to a gaming device. As used herein, the term “code”generally means instructions or information in any of a variety of formsfor use in controlling one or more functions of a gaming device. Thiscode may comprise executable control code for controlling the operationof the gaming device or one or more aspects thereof, such as forpresenting a game for play and controlling the various peripheraldevices/features of the gaming machine, and/or may comprise operationalinformation such as video data (such as for generation of images) orsound data (for use in generating sound) for use in presenting the game.The method and apparatus of the invention may be implemented in a widevariety of environments generally comprising “computing” environments,such as electronically and electro-mechanically controlled devices forpresenting games. FIG. 1 illustrates the preferred environment to whichthe invention is applied, that of an electronic gaming device 20.

[0020] The gaming device 20 illustrated in FIG. 1 is illustrated as butone example of a device with which the invention is useful. Asillustrated, the electronic gaming device 20 includes a cabinet 22housing a display 24. The display 24 may comprise a video display or oneor more mechanically or electro-mechanically controlled devices, such asreels. The display 24 comprises one peripheral of the gaming device 20.

[0021] In one embodiment of such a gaming device 20, a player ispermitted to play a game once a bet has been placed. In order to place abet, the player must first provide credit in the form of monies or otherelements of value as required by the game operator. In the embodimentillustrated, the gaming device 20 includes a coin acceptor 26 foraccepting one or more coins, tokens or the like. In general, the coinacceptor comprises another peripheral device, and may have at least thefunction of validating presented coins and indicating the value of theaccepted coins. The device 20 illustrated also includes a bill validator28 for accepting paper currency, tickets or the like. The bill validator28 is yet another peripheral device, and may have at least the functionof validating the presented bill monies and indicating the value of theaccepted bills.

[0022] Once the player has provided the appropriate credit, the playeris permitted to place a bet. In one embodiment, the device 20 includes abet button 30 for indicating the desired bet to be placed. Once a bet isplaced, the player is permitted to start the game. In the embodimentillustrated, the game involves the rotation of displayed reels. Theplayer depresses a spin button 32, and the display is caused to display24 images of simulated rotating reels.

[0023] A player may be paid a winning if the outcome of the game is aparticular predetermined outcome as displayed by the display 24. Thesewinnings may be paid by a coin dispenser (not shown) to a coin tray 34.Alternately, the player may be paid winnings in the form of a ticketdispensed by a ticket generator 36.

[0024] Many gaming devices, such as that illustrated, include a cardreader 38 for reading information from a player card. This informationmay be used in a player tracking system, as is well known in the art.

[0025] In general, it will be appreciated that a gaming device 20 suchas illustrated may include a variety of peripheral devices or elementsfor implementing the game, both in permitting input by a player andproviding output to the player. These devices may include thosedescribed above and/or a wide variety of other devices. It will beappreciated that the present invention is applicable to a gaming device20 such as that illustrated, and gaming devices arranged to present awide variety of other games and configured in a wide variety of othermanners.

[0026] Referring now to FIG. 2, in a preferred embodiment of theinvention, the gaming machine 20 includes a computing environment inwhich data is utilized to control the operation of the gaming device 20or otherwise present a game for play by a player. In one or moreembodiments, the gaming machine 20 includes a master gaming controller42. As illustrated, the master gaming controller 42 includes a processor44 and memory for storing data. In a preferred embodiment, the mastergaming controller 42 includes a memory in the form of at least one datamass storage device 46. In one embodiment, the mass storage device 46 iscapable of storing data comprising operational code. As is well known,the mass storage device(s) 46 may comprise a wide variety of devices andmediums capable of storing electronic data, such as a hard drive,CD-ROM, DVD-ROM, floppy disc, tape or the like.

[0027] In a preferred embodiment, the memory for storing data alsoincludes one or more memory devices permitting higher speed data access.In one embodiment, this memory comprises read-only-memory (ROM) 50. Thememory may comprise a variety of other data storage and access devices,such as static RAM, Dynamic RAM, Synchronous Dynamic RAM, RD RAM andFLASH ROM. Besides a mass storage device such as a hard drive, in oneembodiment, the master gaming controller 42 includes a read-only memorydevice in the form of an EPROM 52. As described below, in the preferredembodiment, code enabling start-up of the gaming controller is containedon the EPROM, while game specific code is stored on the hard drive. Ofcourse, the various code, including the boot-up and game code may bestored in a variety of manners using a variety of storage devices.

[0028] In one embodiment, a communications or data link 48 is providedbetween the master gaming controller 42 and another device. The otherdevice may comprise a remote server or computer. The data link 54permits transmission of data to and/or from the master gaming controller42. The data link 54 may comprise a wired or wireless communicationslink, e.g. Ethernet, Token Ring, Firewire®, etc. As stated above, thedata link 54 may be useful in transmitting player tracking or similarinformation regarding play of the gaming device 20 to a remote location.

[0029] As is well known, appropriate input/output controllers anddevices are provided for permitting data to flow to and from theprocessor 44 of the master gaming controller 42. In one or moreembodiments, at least one bus 56 is provided for this purpose. In one ormore embodiments, additional hardware and/or software may be providedfor permitting communications with the master gaming controller 42through the data link 54. For example, data may be transmitted throughthe link 54 using an IEEE-1394 protocol/architecture. In such anembodiment, a physical card including at least one port may beassociated with the bus. This card may include hardware and/or softwareembodying the IEEE-1394 protocol, including physical, link and otherlayers as defined thereby. The port may be arranged to accept a networkwire or cable. In this manner, data may be transmitted from thecontroller 42 to a remote location, or vice versa, over the link 54.

[0030] As illustrated, one or more peripherals 60 are associated withthe master gaming controller 42. The peripherals 40 may include, but arenot limited to, the display 24, coin acceptor 26, bill validator 28,ticket generator 36, and card reader 38 of the gaming machine 20illustrated in FIG. 1. Those of skill in the art will appreciate thatthe peripherals 60 need not include all of those devices so described,and may include a variety of other devices. At least one communicationsor data link 58 is provided between each peripheral 60 and the mastergaming controller 42. In one embodiment, the communications link 58permits data to be transferred between the processor 44 of the mastergaming controller 42 and each peripheral 60 via the system bus 56 of themaster gaming controller 42. Again, this link may comprise a wired orwireless communications pathway.

[0031] In a preferred embodiment of the invention, the master gamingcontroller 42 includes a secure access module (SAM) 62. As described ingreater detail below, the SAM is preferably a computing module which iscapable of decrypting symmetrically encrypted data. In one embodiment,the SAM 62 includes a private key. Such modules are available, such asfrom Gemplus SA.

[0032] In accordance with the present invention, at least a portion ofthe code or data which is used to control or permit the operation of thegaming machine can be changed, such as by update or completereplacement. This code or data may be stored in a memory associated withthe gaming device 20, such as the mass storage device 46 of the mastergaming controller 42.

[0033] The configuration of the gaming device 20 described above isparticularly adapted to implement a method of securing gaming machinecontrol or operation data. Such a method is described in more detailbelow.

[0034] A method in accordance with the invention will be described withreference to FIG. 3. In one embodiment, in a first step S1, code to beprovided to a gaming machine is encrypted. In the preferred embodimentof the invention, this step comprises encrypting all or substantiallyall of the code or data to be provided to the gaming machine using a keyin a symmetrical encryption scheme. Such schemes include Data EncryptionStandard (DES), FEAL, Blowfish, and IDEA. These encryption schemes areknown to those of skill in the art. In general, in such schemes, asingle key is provided and this key is both used to encrypt and decryptthe data. This key is referred to as the “private” key, as the key mustremain private or secret to both the encryptor and decryptor, or elsethe data may be readily decrypted. In general, the keys which are usedto encrypt and decrypt are referred to herein as comprising the samekey. As is known in the art of symmetrical encryption however, the keysneed not be perfectly identical, but may be slightly different from oneanother and still result in symmetrical encryption/decryption. Asreferred to herein, when the term “first key,” “private key” or similarterminology is referred to in the context of encryption and decryption,it is contemplated that the keys are of the type permitting symmetricalencryption/decryption and thus may be identical or trivially deviant.

[0035] In a step S2, the encrypted code is stored for later access anduse by the gaming machine. As described in greater detail below, in oneor more embodiments, the encrypted code may be stored on a hard driveassociated with the gaming machine. In one or more other embodiments,the encrypted code may be stored remotely from the gaming machine.

[0036] In a step S3, the decrypting key (which may be referred to as thefirst or private key) is provided to the gaming machine. In oneembodiment, the private key is stored on or embedded in the SAM 62. Inone or more other embodiments, the private key may be provided as partof software of the gaming machine.

[0037] In a step S4, the private key provided to the gaming machine isutilized to decrypt the encrypted code. In the preferred embodiment ofthe invention, the private key is utilized to decrypt the symmetricallyencrypted code. Such a decryption process is well known in the art.

[0038] In a step S5, the decrypted code is installed or otherwiseexecuted by the gaming machine. In one embodiment, the decrypted code isstored in the RAM 50 of the gaming machine 20 and is utilized to controlthe operation of the machine.

[0039]FIG. 4 illustrates an operation flow diagram of a particularimplementation of the method illustrated in FIG. 3 and described above.In a step S100, code or data for use in controlling/operating a gamingmachine is created or generated. This step may comprise, for example,creating code for controlling the overall operation of a gaming machine.In other embodiments, the step may comprise creating code forcontrolling only certain aspects of a gaming machine. The step maycomprise generating data for use by the gaming machine used in itsoperation, such as sound or video data for use by the machine.

[0040] In a step S101, the code or other data is encrypted. As describedabove, this step preferably comprises encrypting the data using aprivate key in a symmetrical encryption process. The result of this stepis the generation of encrypted code. As described above, it is preferredthat the entirety of the code, or at least substantially all of the codebe encrypted. In this manner, the code is not readable by a third partywithout first being decrypted.

[0041] In a step S102, the encrypted code is stored for access by thegaming machine. In one embodiment, the encrypted code is stored on themass storage device 46 (such as a hard drive) of the gaming machine.

[0042] Of course, in one or more embodiments, the encrypted code may bestored between the time it is created and when it is transmitted andstored at the gaming device. For example, the code may be encrypted at afirst computing device, and then stored on a CD-ROM. The encrypted codeon the CD-ROM may be transferred from the CD-ROM to the mass storagedevice 46 of the gaming machine, such as via an optical readerassociated with the gaming device.

[0043] In one or more other embodiments, the encrypted code is stored ata location remote from the gaming machine, but accessible thereby. Forexample, the encrypted code may be stored on a hard drive associatedwith a remote computing device, server or the like which is associatedwith the gaming machine 20 via a communications link, such as thecommunication link 54 described above.

[0044] In one or more embodiments, the encrypted code may be stored andthen associated with the gaming device. For example, the encrypted codemay be stored to a CD-ROM, and the code accessed directly by the gamingmachine from that CD-ROM (and not stored to the hard drive of the gamingmachine itself).

[0045] In a step S103, the operation of the gaming machine 20 isinitiated. In a preferred embodiment, the master gaming controller 46 ofthe gaming machine 20 “boots” from code stored at the EPROM 52 or othersecure memory device. Preferably, the EPROM 52 is programmed withauthenticated operational code, such as at the location of the gamingdevice manufacturer. This operational code preferably includes thenecessary base instructions for causing the master gaming controller 46to begin operation, including performing the later described functions.Preferably, the EPROM 52 is not provided with code for implementing aparticular game, but only such code as to enable operation of the mastergaming controller 42 to be able to use other code for implementing agame.

[0046] In a step S104, a search is conducted for a decryption device. Ina preferred embodiment, this step comprises providing the EPROM 52 withcode causing a polling for a decryption device. In one embodiment, thepolling is for a SAM, such as the SAM 62 of the master gaming controller42.

[0047] In a step S105, the necessary code is obtained in decrypted form.In one embodiment, this step comprises the SAM 62 searching for theencrypted code and obtaining the code. In one or more embodiments, thisstep comprises the transferring of encrypted code from the mass storagedevice 46. In one or more embodiments, the code may be provided from aCD-ROM or through a communication link from a remote location.

[0048] In a step S106, the encrypted code is decrypted. In a preferredembodiment, this step comprises decrypting the encrypted code with theyprivate key which is associated with the SAM 46. The private key may bea copy of the private key which is used to encrypt the code. As statedabove, though the same term “private key” is used here to identify thekey used to encrypt and decrypt, in the symmetricalencryption/decryption process these keys need not be identical tofacilitate the process. Nonetheless, the same term is used because thekeys are for practical purposes, the same.

[0049] In a step S107, the decrypted code is stored. In one or moreembodiments, this step comprises storing the decrypted code to the RAM50 or other high speed accessible memory of the master gaming controller42.

[0050] In a step S108, the decrypted code is executed. In a preferredembodiment, this step comprises the processor 44 of the master gamingcontroller 42 executing or using the decrypted code to present a game orother data to the gaming device 20. In the event the code comprisesdata, then the execution step may simply comprise providing the data toa device of the gaming device. For example, the decrypted code maycomprise audio data which is delivered to an audio system for generatingparticular sounds.

[0051] A variety of other embodiments of the invention are contemplated.In one or more embodiments, a plurality of SAMs may be provided, eachhaving a different private key associated therewith. In thisarrangement, blocks of code may be encrypted with different private keysand then selectively decrypted, as is desired, using a particular SAMhaving the corresponding private key. In this arrangement, an operatormay decrypt only a specific portion or block of code/data from a groupof code. For example, a gaming manufacturer may load two versions ofoperating code on a gaming machine 20 during manufacture. One version ofthe code may be for operation of the gaming machine 20 in one locale(such as the United States), and the other version of the code foroperation of the gaming machine 20 in another locale (such asAustralia). When the gaming machine 20 arrives at its particulardestination, the operator may install a particular SAM. This SAM has aprivate key which will only decrypt the portion of the code which wasencrypted with the corresponding private key. Preferably, the SAM isselected to decrypt the code which is necessary to operate the game inthe particular jurisdiction in which the gaming device 20 is to beoperated.

[0052] In one embodiment of the invention, the method of the inventionmay be accomplished without a SAM, and thus the gaming device 20 neednot include a SAM. For example, in one embodiment, the private keynecessary for decryption may be sent to the master gaming controller 42from a remote location, such as by the data link 54. The key may bestored in the memory of the gaming controller 42.

[0053] In one embodiment, instead of providing a SAM, the decryption maybe accomplished by software executed by the processor 44 of the gamingdevice 20. In such event, the private key may be stored at the gamingdevice 20 or be transmitted thereto.

[0054] In one embodiment of the invention, the decryption may occurthrough the RAM 50 or other memory, rather than the SAM 62. In suchinstance, the private key may be provided from the SAM or other locationto the RAM 50. Because of the speed of data access at the RAM, such anarrangement may increase the speed of decryption.

[0055] In one or more embodiments, the SAM 62 or other hardware/softwarefor accomplishing the decryption may be remote from the gaming device20. For example, in one embodiment, when starting the operation of agaming device 20, an operator may plug in a particular SAM or accomplishthe decryption remotely, such as by uploading the encrypted code fromthe gaming device 20 through the communications link 54, decrypting itat a remote location (such as a remote computer having a SAM) and thentransmitting the decrypted code back to the gaming device 20 for storageand execution.

[0056] In one or more embodiments, the initiation of the decryptionprocess may be triggered by other than initiating operation of thegaming machine. This includes, for example, when a gaming machine ismanufactured, shipped and installed at a particular location. When thegaming machine is turned on, it may then immediately seek the encryptedcontrol/operation code and data to begin operation. In some instances,however, the gaming machine may already be operational and the operatormay desire to provide new code to the gaming machine. This code maycomprise code enabling the gaming machine to present an entirely newgame, or may be as simple as new video data for presenting new images toplayers. In any event, in that instance, step S103 referred to above maycomprise the step of causing the gaming machine to begin a codedecryption and installation process. For example, the gaming controller42 may be provided with a reset function which causes the controller 42to seek new code, seek the decryption device/key, and then decrypt anduse the code or data.

[0057] In one or more embodiments of the invention, the method mayinclude additional authentication steps. In one embodiment, after thecode or data is decrypted, some of the decrypted data may be confirmed.For example, the code may be provided with one or more token strings orsignatures. After the code is decrypted, the method may include checkingfor these strings or signatures before the code or data is utilized inthe operation of the gaming machine.

[0058] In one or more embodiments, the decrypted data may be transmittedto a remote source for authentication. For example, the decrypted datamay be transmitted to a remote server having an authentic copy of thecode/data against which the recently decrypted code may be verified. Ifthe decrypted code does not match the authentic code, then it isdetermined that either the private key used to decrypt the data or theencrypted data itself was tampered with. In that event, the code or datais not used by the gaming machine, and any necessary steps may be takento ensure the security of the gaming machine and associated code. Forexample, the private key may be erased and the encrypted code erased andthe process started anew.

[0059] As stated above, in one embodiment, the key is stored at the SAMto maintain the security of the key. In one or more embodiments, theprivate key may be erased after use to prevent it from remainingavailable to a third party over time.

[0060] Many advantages are realized by the invention. In accordance withthe invention, gaming control code is provided to a gaming device 20 ina totally encrypted format. Such a format prevents an outsider fromviewing or using any of the code. This overcomes problems associatedwith asymmetric encryption techniques currently used today in which thecode remains in a readable and usable form, and only a signature isencrypted and usable to ensure that the code is authentic. In accordancewith the present invention, the entirety of the code is encrypted,preventing it from being seen or used by another without the requiredkey for decryption.

[0061] The use of the symmetric encryption in accordance with theinvention permits all or substantially all of the gaming code to beencrypted in a manner which is efficient. This method of encryption isvery fast and thus does not slow the operation of the gaming machine 20.Asymmetric encryption is useful in encrypting data, but due to itscomplexities, is very slow and permits only the encryption of asignature (and not the entirety of the data) if the process is not tointerfere with other activities. For example, some gaming devices areprovided with limited computing power to reduce their cost ofmanufacture and repair. With the limited computing power, attempting todecrypt more than only an asymmetrically encrypted signature associatedwith code would result in slow or delayed operation of the device.Unlike the present invention, the complexity of asymmetric encryptionand the necessity of significant processing power to accomplishasymmetric encryption/decryption prevents encryption of the entire dataor even substantially all of the data. In accordance with the presentinvention, however, a security scheme provides for encryption of all orsubstantially all of the code/data.

[0062] The invention provides for a method of providing code to a gamingdevice in which the integrity of the code is ensured. Again, because theall or most of the code is encrypted, unauthorized persons may not viewthe code nor tamper with the code (if the code is tampered with, itsexecution will fail because it will not decrypt properly).

[0063] In accordance with the invention, decryption is convenientlyaccomplished, such as by resident software or a secure access module. Aparticular advantage of the module is that it is readily adaptable tothe master gaming controller of currently existing gaming devices.Another advantage is that the private key is embedded in the module andthus does not need to be transmitted to the gaming device, lessening therisk that the private key may be intercepted and obtained byunauthorized persons.

[0064] It will be understood that the above described arrangements ofapparatus and the method therefrom are merely illustrative ofapplications of the principles of this invention and many otherembodiments and modifications may be made without departing from thespirit and scope of the invention as defined in the claims.

I claim:
 1. A method of providing control code for operating a gamingdevice comprising the steps of: obtaining gaming device operational codeencrypted with a first private key; providing said encrypted code tosaid gaming device; decrypting said encrypted code using said firstprivate key; storing said decrypted code at said gaming device; andutilizing said decrypted code to control at least some aspect of theoperation of said gaming device.
 2. The method in accordance with claim1 including the step of encrypting said operational code with said firstprivate key.
 3. The method in accordance with claim 1 wherein saidproviding step comprises the step of transmitting said encrypted code tosaid gaming device.
 4. The method in accordance with claim 1 includingthe step of storing the encrypted code provided to said gaming device atsaid gaming device.
 5. A method of providing data for the operation of agaming device of the type presenting a game for play to a player inwhich if the player receives a predetermined outcome the player isdeclared a winner of the game comprising the steps of: encrypting saiddata in a symmetrical encryption process with a first key; providingsaid encrypted data to said gaming device; initiating operation of saidgaming device; locating a decryption device; providing said encrypteddata to said decryption device; decrypting said encrypted data with saiddecryption device using said first key; and storing said decrypted data.6. The method in accordance with claim 5 including the step of utilizingsaid data in the operation of said gaming device.
 7. The method inaccordance with claim 5 wherein said decryption device comprises asecure access module having said first key associated therewith.
 8. Themethod in accordance with claim 5 including the step of verifying theauthenticity of said decrypted data before storing said data.
 9. Themethod in accordance with claim 5 including the step of transmittingsaid first key to said decryption device.
 10. A gaming device of thetype in which a player is permitted to participate in a game uponplacing a wager and in which the player is provided an award if theplayer receives a predetermining winning event, said gaming devicecomprising: a memory device for storing data encrypted in a symmetricalencryption process; a decryption device for decrypting data encrypted ina symmetrical encryption process; a programmable memory for storing saiddecrypted data; and a controller adapted to use said decrypted data inthe operation of said gaming device.
 11. The gaming device in accordancewith claim 10 wherein said decryption device comprises a secure accessmodule.
 12. The gaming device in accordance with claim 11 wherein saidsecure access module has a private decryption key associated therewith.13. The gaming device in accordance with claim 10 wherein saidcontroller includes a processor for executing code, said processor is incommunication with said memory, and said decrypted code comprises codefor execution by said processor.
 14. The gaming device in accordancewith claim 10 wherein said programmable memory comprises RAM.
 15. Thegaming device in accordance with claim 10 including a communicationslink associated with said controller permitting data to be transmittedto said game device control from a remote location.