http://rdf.ncbi.nlm.nih.gov/pubchem/patent/NZ-509018-A
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_29173eec48e854692d98bc52ec8101d0 |
classificationCPCAdditional | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F17-3223 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-2109 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/A63F2300-401 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F17-3202 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-51 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F17-3227 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F17-3241 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G07F17-32 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F1-00 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G07F17-32 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-51 |
filingDate | 1999-06-17-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_b47a79bbc4b7a2cc3a48d773ec2a3393 |
publicationDate | 2002-06-28-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | NZ-509018-A |
titleOfInvention | Software verification and authentication |
abstract | A device for controlling electronic gaming machines comprises a single board computer (SBC) having a microprocessor, memory means, storage means and a ROM (Read Only Memory). The ROM includes: a loader program; verification program; an authentication program; and a presentation program. Additional Mass storage media in communication with the SBC store pre-verified and approved gaming software (program files) and related data files, each of which have a verification signature appended to them. Prior to usage of the gaming software, the program file software or data file is retrieved by the loader program and checked by the verification program, which compares the verification signature with a newly calculated verification signature. If the newly calculated signature matches the verification signature, the requested file is deemed to be intact (a validated image). The verification processes ensure that the file has been retrieved in its entirety and is free from corruption caused by storage media faults. If any corruption has occurred, the control device displays an error and the process is halted. After verification, all pending requests for authorization from authentication agents are processed by a queuing means. Each request includes a set of authentication instructions and a reply destination. After queuing, an authentication interpreter processes the validated image pursuant to the requester's instruction. The presentation program reports the resulting authentication identification to the requested destination, which either acknowledges or refuses authentication. If acknowledged, the image is used or executed. If refused, an error is displayed and the process is halted. |
priorityDate | 1998-06-17-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Predicate | Subject |
---|---|
isDiscussedBy | http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID23056 http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419547247 |
Total number of triples: 22.