GAMING MACHINES SOFTWARE

Brand Owner (click to sort) Address Description
53 CARD POKER Vision Gaming & Technology, Inc. 2055 Boggs Rd Duluth GA 30096 GAMING MACHINES AND SOFTWARE FOR USE WITH GAMING MACHINES;Color is not claimed as a feature of the mark.;53 CARD POKER;
AMERICAN STAR KENO Vision Gaming & Technology, Inc. 2055 Boggs Rd Duluth GA 30096 GAMING MACHINES AND SOFTWARE FOR USE WITH GAMING MACHINES;Color is not claimed as a feature of the mark.;AMERICAN AND KENO;
GOOFY GOPHERS! Vision Gaming & Technology, Inc. 2055 Boggs Rd Duluth GA 30096 GAMING MACHINES AND SOFTWARE FOR USE WITH GAMING MACHINES;
JAZZ PLAYER Vision Gaming & Technology, Inc. 2055 Boggs Rd Duluth GA 30096 GAMING MACHINES AND SOFTWARE FOR USE THEREWITH;
KICK'N ASS ARISTOCRAT TECHNOLOGIES AUSTRALIA PTY LTD BUILDING A, PINNACLE OFFICE PARK 85 EPPING ROAD NORTH RYDE, NSW 2113 Australia Gaming machines and software for gaming purposes;KICKING ASS;
MARDI GRAS MANIA CONVERSE PROJECT 920 FRONTAGE ROAD STAUNTON BRIDGE GREENVILLE SC 29611 Gaming machines and software for use in gaming machines;
SPIN POKER Action Gaming Inc. 175 E Reno Ave., STE C-6 Las Vegas NV 89119 Gaming machines and software for operating gaming machines;POKER;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and apparatus for authenticating gaming machine software is disclosed. In one embodiment the method and apparatus is used to authenticate the contents of a removable media. Use of a removable media provides means to store large amounts of software on a single media to install software, perform software updates, diagnose gaming machines, authenticate software, or configure gaming machines. An authentication file may contain a listing of each file on the removable media and an associated hash value calculated with a hash function. The hash values are calculated and stored in an authentication file and encryption of the one or more hash values may occur. A hash value re-calculation is performed on each file at a later time to determine the hash value at the time of use. The re-calculated hash values are compared to the decrypted hash values stored in the authentication file.