WO2001098860A2 - Method providing for a verifiable game-of-chance played even over a computer network - Google Patents

Method providing for a verifiable game-of-chance played even over a computer network Download PDF

Info

Publication number
WO2001098860A2
WO2001098860A2 PCT/US2000/012439 US0012439W WO0198860A2 WO 2001098860 A2 WO2001098860 A2 WO 2001098860A2 US 0012439 W US0012439 W US 0012439W WO 0198860 A2 WO0198860 A2 WO 0198860A2
Authority
WO
WIPO (PCT)
Prior art keywords
player
game
secret
hash
participant
Prior art date
Application number
PCT/US2000/012439
Other languages
French (fr)
Other versions
WO2001098860A3 (en
Inventor
Timothy P. Barber
Original Assignee
Barber Timothy P
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Barber Timothy P filed Critical Barber Timothy P
Priority to AU2000261973A priority Critical patent/AU2000261973A1/en
Priority to PCT/US2000/012439 priority patent/WO2001098860A2/en
Publication of WO2001098860A2 publication Critical patent/WO2001098860A2/en
Publication of WO2001098860A3 publication Critical patent/WO2001098860A3/en

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3241Security aspects of a gaming system, e.g. detecting cheating, device integrity, surveillance

Definitions

  • the present invention pertains to the field of auditing multi-player games of chance, especially a game played over a computer network. More particularly, the present invention concerns how to ensure that when participants in a game of chance each provide a number for use in the game of chance, no ⁇ participant can cheat, without the other participants knowing, by adjusting the number the participant provides based on the numbers provided by the other participants .
  • the present invention has as an objective providing a method, to be used as part of a game of chance, which may be played by players communicating over a computer network, that verifies that an indicator of a next step in a game of chance is unbiased in that it was not improperly affected by any of the participants in response to learning about selections other participants make that contribute to the indicator.
  • a method for generating an indicator of a next event in a game of chance played by a plurality of players comprising the steps of: selecting a hash function, i.e. a function that is hard to invert, in that it is difficult to determine what input produced a given output; determining a means of associating with each player any message received from the player; acquiring a hash output from at least one of the players, the hash output resulting from hashing a secret mathematical object picked by the at least one of the players; acquiring a secret mathematical object from each of the at least one of the players that chooses to continue participating in the game; and determining whether the secret mathematical object acquired from each continuing player hashes to the hash output provided by the continuing player.
  • a hash function i.e. a function that is hard to invert, in that it is difficult to determine what input produced a given output
  • determining a means of associating with each player any message received from the player acquiring a hash output from at least one of the players,
  • the method further comprises the steps of selecting a combination function and then combining the secret mathematical objects from each of the continuing players according to the combination function, for providing the indicator of the next event in the game of chance.
  • the method further comprises the steps of: determining a distribution function, having as input the indicator of the next event in the game, and having multiple output values, each output value assigned before the indicator of the next event is determined to correspond to a particular player, each output value providing a number of credits the corresponding participant is to receive; and using the indicator of .the next event, after it is determined from the combination function, as input to the distribution function, for providing credits associated with each player still in the game after the indicator of the next event in the game is determined.
  • the present invention is especially useful in playing a game of chance over a computer network, but is also useful in any situation where some participants can calculate the output of a hash function.
  • Fig. 1 is a flow chart of the method of the present invention.
  • the present invention enables various participants, who may be communicating over a computer network such as the Internet, to participate in a game of chance, which may result in the exchange of credits between the players, and to do so in a way that verifies that no participant is cheating. Credits may represent currency, coupons, game points, frequent flyer miles, phone minutes, or any other units of real or perceived value.
  • the present invention is played over the Internet, and participants access web pages of one of the participants, called here a focus player, using any commercially available Internet browser.
  • the other participants are ordinary players . As one step in many games of chance, at least one number or other mathematical object must be determined that will propel the game to a next step.
  • the present invention is concerned with such games of chance, and in the best mode, a number is used to propel such a game to a next step.
  • This number called here a pseudo- random number
  • An indicator could be for example a mathematical object such as a number corresponding to the roll of a die, or corresponding to the value of a card dealt from a deck of cards.
  • pseudo-random numbers it is possible that many such pseudo-random numbers will be needed, and the present invention can be used repeatedly to provide each needed pseudorandom number .
  • a pseudo-random number i.e. an indicator
  • a hash function is a mathematical function that maps an input to an output in a way that practically prohibits determining the input from the output.
  • a hash function is an extremely hard-to-invert mathematical function. Examples of a hash function that can be used include SHA1, MD4, and MD5, as well as various forms of public-key encryption.
  • the focus player In addition to posting the hash function, the focus player also posts a description of the kind of object to be hashed.
  • the object to be hashed is an integer; in a more complex embodiment the object to be hashed would be a sequence of integers, but other kinds of mathematical objects, such as operators, are also possible.
  • the output of the hash function is some object having a value that corresponds to the value of the input to the hash function.
  • the focus player signals the start of the game and specifies how much time the participants have to provide a hash output.
  • each player hashes a secret object the player has decided on, and provides the hash output corresponding to the secret object to the focus player, but without the secret object.
  • the player receives an identification number from the focus player.
  • identification no. 1 for the focus player
  • the first participant after the focus player can have identification no. 2, and so on.
  • the focus player posts all hash outputs. Then all participants can view the hash outputs, but none of the participants knows the secret object used by any of the other participants to produce a hash output.
  • a next step 14 the focus player and each player agree on a combination function to be used to produce the pseudo-random number for the player.
  • the focus player uses the same combination function for all players, and communicates what the function is by posting the function on its web page.
  • the combination function can be any mathematical function that maps the secret hash inputs of all of the final participants including the focus player, to some combination result, the unbiased indicator of a next event in the game .
  • the combination function is the same function for all players in the preferred embodiment, but it is a function that will produce an output in a predetermined range, regardless of the secret numbers that are combined. Therefore, regardless of the number of participants that end up in the game, some dropping out because of not providing a secret object in time, others because of being kicked out for having apparently cheated, the combination function will produce an unbiased number in a desired range.
  • the combination function might be as follows:
  • ⁇ l r ⁇ 2 r - - - r - k are the secret numbers selected by players 1, 2, .-., k and where n is some integer that bounds the predetermined range in which the combination values are to fall.
  • n is some integer that bounds the predetermined range in which the combination values are to fall.
  • the focus player posts the secret object received from each player along with whether, for any participant, the originally provided hash output disagrees with the hash of the subsequently revealed secret hash input.
  • the focus player can post the difference between the hash of the secret object and the original hash output provided by each player. The difference in each case should be zero. If the difference is not zero for a player, then all of the participants know immediately that the player has apparently provided a secret object different from what the player used to create the hash output originally provided to the focus player. In the preferred embodiment, that player would be kicked out of the game.
  • the focus player compute the hash of the secret object finally provided by each player, or post the difference between the original hash output and the hash of the later-provided secret object for each player.
  • the players can verify the game on their own. All that is necessary to the present invention, in order to provide a means of verifying a game of chance, is that the focus player communicate to all players the secret object ultimately provided by each player.
  • a next step 17 the focus player computes for each player the value of the combination function agreed to, and posts the computed value along with the player's identification number.
  • the pseudo-random number serving in a game of chance as an unbiased indicator, such as the roll of a die, or the selection of a card from a deck of cards.
  • the method of the present invention can be simplified. Once the focus player receives hash outputs from all players except one, and then posts all the received hash outputs along with its own if it is a full participant, the one player that has not provided a hash output need only provide a secret object. For example, in a two-player game between a focus player and one ordinary player, the single ordinary player never has to provide a hash output. As soon as the focus player communicates a hash output, the other player can provide a secret object. Then the focus player can reveal his or her secret object and demonstrate that the secret object corresponds to the earlier revealed hash output.
  • a Ar-valued outcome distribution can be generated from a pre-determined distribution function, called here a T function; each of the k values corresponds to the credits won by a different player.

Abstract

A method for self-auditing a game of chance even when the game is played over a computer network, and, in particular, over the Internet. The invention provides a way to structure games of chance so that any participant can mathematically verify that no cheating has occurred. The invention is of use in any game of chance that can be structured so that, in the best mode, each participant selects a secret number and in which the outcome of the game depends on an event that is indicated by some combination of the secret numbers. The method allows for auditing, or verifying, that each participant has selected a secret number and not later changed the secret number after learning the secret number of any other player. The method relies on using hash functions such as SHA1, MD4, and MD5, as well as various forms of public-key encryption as a basis for enabling each participant to reveal the participant's secret number essentially in stages, in a way that makes it impossible for a participant to change secret numbers without the other players knowing.

Description

METHOD PROVIDING FOR A VERIFIABLE GAME-OF-CHANCE PLAYED EVEN OVER A COMPUTER NETWORK
CROSS-REFERENCE TO RELATED APPLICATIONS
This application claims priority from Provisional
FIELD OF THE INVENTION
The present invention pertains to the field of auditing multi-player games of chance, especially a game played over a computer network. More particularly, the present invention concerns how to ensure that when participants in a game of chance each provide a number for use in the game of chance, noι participant can cheat, without the other participants knowing, by adjusting the number the participant provides based on the numbers provided by the other participants .
BACKGROUND OF THE INVENTION
Today it is possible to participate in a game of chance over a computer network, such as the Internet. In so doing, unless precautions are taken, a participant cannot be certain that the outcome has not been improperly affected by another participant. Often a game of chance relies for its progression on an indicator of a next step. Many such games can be imagined in which each participant plays a role in affecting the value of such an indicator. For example, each participant could input to a computer a number known only to the participant, i.e. a secret number, and the computer could calculate a value to be used as the indicator of the next step in the game, where its value is based on a combination of the secret numbers it receives from each participant.
What is needed is a way to verify that no participant has cheated in such a game of chance, i.e. that no participant providing a secret number to be used in determining an indicator of a next step in the game, has adjusted the secret- number, even if the game is played over a computer network. Obviously, a method that provides this- would also be of use in games of chance not played over a network.
SUMMARY OF THE INVENTION
Accordingly, the present invention has as an objective providing a method, to be used as part of a game of chance, which may be played by players communicating over a computer network, that verifies that an indicator of a next step in a game of chance is unbiased in that it was not improperly affected by any of the participants in response to learning about selections other participants make that contribute to the indicator.
The above object is achieved in the present invention by a method for generating an indicator of a next event in a game of chance played by a plurality of players, the method comprising the steps of: selecting a hash function, i.e. a function that is hard to invert, in that it is difficult to determine what input produced a given output; determining a means of associating with each player any message received from the player; acquiring a hash output from at least one of the players, the hash output resulting from hashing a secret mathematical object picked by the at least one of the players; acquiring a secret mathematical object from each of the at least one of the players that chooses to continue participating in the game; and determining whether the secret mathematical object acquired from each continuing player hashes to the hash output provided by the continuing player. In another aspect of the present invention, the method further comprises the steps of selecting a combination function and then combining the secret mathematical objects from each of the continuing players according to the combination function, for providing the indicator of the next event in the game of chance. In still another aspect of the present invention, the method further comprises the steps of: determining a distribution function, having as input the indicator of the next event in the game, and having multiple output values, each output value assigned before the indicator of the next event is determined to correspond to a particular player, each output value providing a number of credits the corresponding participant is to receive; and using the indicator of .the next event, after it is determined from the combination function, as input to the distribution function, for providing credits associated with each player still in the game after the indicator of the next event in the game is determined.
The present invention is especially useful in playing a game of chance over a computer network, but is also useful in any situation where some participants can calculate the output of a hash function.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and other objects, features and advantages of the invention will become apparent from a consideration of the subsequent detailed description presented in connection with accompanying drawings, in which: Fig. 1 is a flow chart of the method of the present invention.
BEST MODE OF THE INVENTION
The present invention enables various participants,, who may be communicating over a computer network such as the Internet, to participate in a game of chance, which may result in the exchange of credits between the players, and to do so in a way that verifies that no participant is cheating. Credits may represent currency, coupons, game points, frequent flyer miles, phone minutes, or any other units of real or perceived value. In the preferred embodiment, the present invention is played over the Internet, and participants access web pages of one of the participants, called here a focus player, using any commercially available Internet browser. The other participants are ordinary players . As one step in many games of chance, at least one number or other mathematical object must be determined that will propel the game to a next step. The present invention is concerned with such games of chance, and in the best mode, a number is used to propel such a game to a next step. This number, called here a pseudo- random number, should be unbiased. An indicator could be for example a mathematical object such as a number corresponding to the roll of a die, or corresponding to the value of a card dealt from a deck of cards. In playing the game, it is possible that many such pseudo-random numbers will be needed, and the present invention can be used repeatedly to provide each needed pseudorandom number .
Referring now to Fig. 1, the steps of the present invention in the best mode are indicated; a pseudo-random number, i.e. an indicator, is determined following the steps beginning with a step 10, where the focus player posts a so-called hash function to be used by each player in the process of developing the pseudo-random number. A hash function is a mathematical function that maps an input to an output in a way that practically prohibits determining the input from the output. In other words, a hash function is an extremely hard-to-invert mathematical function. Examples of a hash function that can be used include SHA1, MD4, and MD5, as well as various forms of public-key encryption.
In addition to posting the hash function, the focus player also posts a description of the kind of object to be hashed. In one, simpler embodiment, the object to be hashed is an integer; in a more complex embodiment the object to be hashed would be a sequence of integers, but other kinds of mathematical objects, such as operators, are also possible. The output of the hash function is some object having a value that corresponds to the value of the input to the hash function.
In a next step 11, the focus player signals the start of the game and specifies how much time the participants have to provide a hash output. In a next step 12, each player hashes a secret object the player has decided on, and provides the hash output corresponding to the secret object to the focus player, but without the secret object. In turn, the player receives an identification number from the focus player. Thus, using identification no. 1 for the focus player, the first participant after the focus player can have identification no. 2, and so on. In a next step 13, after the preset time has elapsed for would-be participants to provide a hash output, the focus player posts all hash outputs. Then all participants can view the hash outputs, but none of the participants knows the secret object used by any of the other participants to produce a hash output.
In a next step 14, or prior to this step, the focus player and each player agree on a combination function to be used to produce the pseudo-random number for the player. In the preferred embodiment, the focus player uses the same combination function for all players, and communicates what the function is by posting the function on its web page. The combination function can be any mathematical function that maps the secret hash inputs of all of the final participants including the focus player, to some combination result, the unbiased indicator of a next event in the game .
Not only is the combination function the same function for all players in the preferred embodiment, but it is a function that will produce an output in a predetermined range, regardless of the secret numbers that are combined. Therefore, regardless of the number of participants that end up in the game, some dropping out because of not providing a secret object in time, others because of being kicked out for having apparently cheated, the combination function will produce an unbiased number in a desired range. For example, the combination function might be as follows:
C(X1,Xa,...,XfcJ — Σ ** mod ffή
1=1 where κl r κ2 r - - - r -k are the secret numbers selected by players 1, 2, .-., k and where n is some integer that bounds the predetermined range in which the combination values are to fall. Thus, no matter how many secret numbers are to be combined, the same combination function can be used, and the results will always fall in a known predetermined range. In a next step 15, the focus player signals that each player must provide the secret object the player hashed. The focus player will also indicate how much time the players will be given to respond. In next step 16, after the time for responding has elapsed, in the preferred embodiment, the focus player posts the secret object received from each player along with whether, for any participant, the originally provided hash output disagrees with the hash of the subsequently revealed secret hash input. For example, the focus player can post the difference between the hash of the secret object and the original hash output provided by each player. The difference in each case should be zero. If the difference is not zero for a player, then all of the participants know immediately that the player has apparently provided a secret object different from what the player used to create the hash output originally provided to the focus player. In the preferred embodiment, that player would be kicked out of the game.
It is not essential to the present invention that the focus player compute the hash of the secret object finally provided by each player, or post the difference between the original hash output and the hash of the later-provided secret object for each player. As long as each player knows the secret object provided by every other player, the players can verify the game on their own. All that is necessary to the present invention, in order to provide a means of verifying a game of chance, is that the focus player communicate to all players the secret object ultimately provided by each player.
In. a next step 17, the focus player computes for each player the value of the combination function agreed to, and posts the computed value along with the player's identification number. Now each player has received a pseudo-random number according to the present invention, the pseudo-random number serving in a game of chance as an unbiased indicator, such as the roll of a die, or the selection of a card from a deck of cards.
The method of the present invention can be simplified. Once the focus player receives hash outputs from all players except one, and then posts all the received hash outputs along with its own if it is a full participant, the one player that has not provided a hash output need only provide a secret object. For example, in a two-player game between a focus player and one ordinary player, the single ordinary player never has to provide a hash output. As soon as the focus player communicates a hash output, the other player can provide a secret object. Then the focus player can reveal his or her secret object and demonstrate that the secret object corresponds to the earlier revealed hash output.
One particular use of the unbiased indicator is to select a tamper-proof outcome distribution. Using r for the combination result, a Ar-valued outcome distribution can be generated from a pre-determined distribution function, called here a T function; each of the k values corresponds to the credits won by a different player. Thus r is used to arrive at an unbiased outcome for a game of chance according to: Tj ( r) = vχ t for i = 1 , . . . , k, which provides that player i wins j credits.
For example, suppose in a two-person game, that player no . 2 is offered a 25% chance of winning 3 credits, and a 75% chance of losing 1 credit. To keep the game simple, assume that one player wins credits whenever the other loses credits. Then a T function that will yield the promised chances is T(0) = (-3, +3) and T( l ) = T(2) = T(3) = (+1,-1). Thus, the combination function used always produces a number in the range from 0 to 3. If the combination function yielding r is mod 4 of the sum of the secret numbers of the focus player and player no. 1, then T{ r) will yield the desired probability distribution on the outcome of the game.
It is to be understood that the above-described arrangements are only illustrative of the application of the principles of the present invention. Numerous modifications and alternative arrangements may be devised by those skilled in the art without departing from the spirit and scope of the present invention, and the appended claims are intended to cover such modifications and arrangements.

Claims

What is claimed is :
1. A method for generating an indicator of a next event in a game of chance played by a plurality of players, the method comprising the steps of: a) selecting a hash function; c) determining a means of associating with each player any message received from the player; d) acquiring a hash output from at least one of the players, the hash output resulting from hashing a secret mathematical object picked by the at least one of the players; e) acquiring a secret mathematical object from each of the at least one of the players that "chooses to continue participating in the game; and f) determining whether the secret mathematical object acquired from each continuing player hashes to the hash output provided by the continuing player.
2. The method of claim 1, further comprising the step of eliminating the player that provided the hash output if the player's secret mathematical object does not hash to the hash output provided by the player.
3. The method of claim 1, further comprising the steps of selecting a combination function and then combining the secret mathematical objects from each of the continuing players according to the combination function, for providing the indicator of the next event in the game of chance.
4. The method of claim 3, further comprising the steps of: a) determining a distribution function, having as input the indicator of the next event in the game, and having multiple output values, each output value assigned before the indicator of the next event is determined to correspond to a particular player, each output value providing a number of credits the corresponding participant is to receive; and b) using the indicator of the next event, after it is determined from the combination function, as input to the distribution function, for providing credits associated with each player still in the game after the indicator of the next event in the game is determined.
PCT/US2000/012439 2000-06-22 2000-06-22 Method providing for a verifiable game-of-chance played even over a computer network WO2001098860A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
AU2000261973A AU2000261973A1 (en) 2000-06-22 2000-06-22 Method providing for a verifiable game-of-chance played even over a computer network
PCT/US2000/012439 WO2001098860A2 (en) 2000-06-22 2000-06-22 Method providing for a verifiable game-of-chance played even over a computer network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2000/012439 WO2001098860A2 (en) 2000-06-22 2000-06-22 Method providing for a verifiable game-of-chance played even over a computer network

Publications (2)

Publication Number Publication Date
WO2001098860A2 true WO2001098860A2 (en) 2001-12-27
WO2001098860A3 WO2001098860A3 (en) 2009-10-29

Family

ID=21741360

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2000/012439 WO2001098860A2 (en) 2000-06-22 2000-06-22 Method providing for a verifiable game-of-chance played even over a computer network

Country Status (2)

Country Link
AU (1) AU2000261973A1 (en)
WO (1) WO2001098860A2 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2005015511A1 (en) * 2003-08-08 2005-02-17 Universal Gaming Concepts Inc. Method for preventing casinos or gambling machines from manipulating gambling results
WO2005021118A1 (en) * 2003-08-27 2005-03-10 Kroopier Technologies, S.L. System which is used to conduct a game of chance using a communication network
EP1563881A1 (en) * 2002-10-14 2005-08-17 Scytl Online World Security, S.A. Method of obtaining an impartial result of a game via a communication network, and related protocols and programs
EP1808833A1 (en) * 2005-12-06 2007-07-18 AB Svenska Spel Number game

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4842278A (en) * 1986-06-02 1989-06-27 Victor Markowicz Hierarchical lottery network with selection from differentiated playing pools
US5269521A (en) * 1990-08-22 1993-12-14 Rossides Michael T Expected value payment method and system for reducing the expected per unit costs of paying and/or receiving a given amount of a commodity
US6024641A (en) * 1997-11-19 2000-02-15 Sarno; Robert A. Method, apparatus and system for lottery gaming

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4842278A (en) * 1986-06-02 1989-06-27 Victor Markowicz Hierarchical lottery network with selection from differentiated playing pools
US5269521A (en) * 1990-08-22 1993-12-14 Rossides Michael T Expected value payment method and system for reducing the expected per unit costs of paying and/or receiving a given amount of a commodity
US6024641A (en) * 1997-11-19 2000-02-15 Sarno; Robert A. Method, apparatus and system for lottery gaming

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1563881A1 (en) * 2002-10-14 2005-08-17 Scytl Online World Security, S.A. Method of obtaining an impartial result of a game via a communication network, and related protocols and programs
WO2005015511A1 (en) * 2003-08-08 2005-02-17 Universal Gaming Concepts Inc. Method for preventing casinos or gambling machines from manipulating gambling results
NL1026795C2 (en) * 2003-08-08 2005-08-23 Universal Gaming Concepts Inc A method for preventing manipulation of the game outcome by a gaming table or a gaming machine.
WO2005021118A1 (en) * 2003-08-27 2005-03-10 Kroopier Technologies, S.L. System which is used to conduct a game of chance using a communication network
EP1741477A2 (en) * 2003-08-27 2007-01-10 Scytl Online World Security, S.A. System for implementing a game of chance over a communications network
EP1741477A3 (en) * 2003-08-27 2007-12-12 Kinamik Data Integrity, S.L. System for implementing a game of chance over a communications network
EP1808833A1 (en) * 2005-12-06 2007-07-18 AB Svenska Spel Number game

Also Published As

Publication number Publication date
WO2001098860A3 (en) 2009-10-29
AU2000261973A8 (en) 2009-12-10
AU2000261973A1 (en) 2002-01-02

Similar Documents

Publication Publication Date Title
US8608558B2 (en) System and method for securing electronic games
US11582209B2 (en) Trusted communications between untrusting parties
US5768382A (en) Remote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
US7362862B2 (en) Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US11083960B2 (en) Cryptographically based system and protocol for provably fair token-based games
US7717783B2 (en) Computer-based, interactive, real-time card selection game
US7896745B2 (en) System for providing go-stop game service via on-line and method therefor
EP0862824A1 (en) Remote-auditing of computer generated outcomes using cryptographic and other protocols
US20050107162A1 (en) Method and system for implementing a game
Chambers et al. Mitigating information exposure to cheaters in real-time strategy games
Kushilevitz et al. Fair e-lotteries and e-casinos
WO2001098860A2 (en) Method providing for a verifiable game-of-chance played even over a computer network
Baumgart et al. Implementation of a digital lottery server on WWW
KR100638496B1 (en) An on-line management system and method for probability game
US20040147298A1 (en) Gaming system for providing game
CN114978494A (en) Decenter poker dealing method based on block chain, and game method and device
KR20190031369A (en) Method for Providing Hwatu Game by View of Observer
AuYoung et al. Cryptographic Blackjack
Aura Session 3 Talk 5
WO2001091870A1 (en) Game

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
NENP Non-entry into the national phase

Ref country code: DE

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC DATED 06-03-2003

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP