. . "Once authenticated, the gaming systems can participate in online gaming or other services, or proceed to authenticate individual users with the key distribution center." . .