Patent classifications
G06F2221/2109
SECURE INPUT VOLTAGE ADJUSTMENT IN PROCESSING DEVICES
Secure voltage adjustment techniques for computing systems and processing devices are presented herein. In one example, a method of controlling operating voltages for a processing device includes initializing a security portion of the processing device after application of input voltages to the processing device as supplied by voltage regulation circuitry according to voltage identifiers (VIDs) established for the processing device. The method includes, in the security portion, generating adjusted input voltages based on at least the VIDs and authenticated voltage offset information stored according to a digitally signed security process, and instructing the voltage regulation circuitry to supply the adjusted input voltages to the processing device.
NON-TRANSITORY COMPUTER READABLE MEDIUM, INFORMATION PROCESSING METHOD, AND INFORMATION PROCESSING SYSTEM
A non-transitory computer readable medium stores a program causing a computer to execute: storing login information when a player performs a login for the first time in a particular time frame; granting a right when a login is performed every certain time period in the particular time frame; and granting, in the case where the login information is not stored and the certain time period in which the right is not granted has elapsed when a login is performed in the particular time frame, the right on the basis of the certain time period in which the right is not granted.
GAMING LICENSE PRIORITIZATION BASED ON CLIENT DEVICE
Systems and methods that prioritize gaming establishment license usages based on types of client devices.
Securing communications with enhanced media platforms
Various methods and systems for securing communications with enhanced media platforms, are provided. In particular, an enhanced media platform is authenticated using a trusted location. The authenticated enhanced media platform establishes a bidirectional trust with an enhanced remote location, the enhanced media platform being stored in the enhanced remote location. Upon authentication and establishing the bidirectional trust, the enhanced media platform may securely communicate media content in a media content distribution service infrastructure while supporting custom functionality. The method for securing communications with enhanced media platforms includes communicating authentication credentials to an internal security component at the trusted location. The method further includes receiving validation credentials from the internal security component. The method also includes authenticating the enhanced remote location based on at least a portion of the validation credentials received. The method further includes establishing the bidirectional trust relationship with the enhanced remote location using the validation credentials.
Access management
According to an example aspect of the present invention, there is provided an apparatus comprising a memory configured to store an encryption key and a list of access tokens and at least one processing core configured to select a first access token from the list of access tokens based, at least partly, on at least one of a current time and a sequence number, decide, based at least partly on the first access token, whether to grant a user device access to the apparatus, and cause the apparatus to receive a second list of access tokens from at least one of the user device and a second user device.
SECURE BOOTLOADER FOR ELECTRONIC GAMING MACHINES AND OTHER COMPUTING DEVICES
Systems and techniques for providing one or more authenticable operating system volumes on an electronic gaming machine are provided. The systems and techniques may, for example, involve storing one or more datasets, each representing one or more operating system volumes for an operating system, on a shadow partition and then selecting one of those datasets as part of the boot process, authenticating it, and creating one or more operating system volumes on one or more operating system partitions of the electronic gaming machine. The systems and techniques may further involve causing a kernel of the operating system to execute from the newly created one or more operating system volumes only after authentication is successfully performed.
TRUSTED COMMUNICATIONS BETWEEN UNTRUSTING PARTIES
A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.
SECURE BOOTLOADER FOR ELECTRONIC GAMING MACHINES AND OTHER COMPUTING DEVICES
Systems and techniques for providing one or more authenticable operating system volumes on an electronic gaming machine are provided. The systems and techniques may, for example, involve storing one or more datasets, each representing one or more operating system volumes for an operating system, on a shadow partition and then selecting one of those datasets as part of the boot process, authenticating it, and creating one or more operating system volumes on one or more operating system partitions of the electronic gaming machine. The systems and techniques may further involve causing a kernel of the operating system to execute from the newly created one or more operating system volumes only after authentication is successfully performed.
Incorporating risk-based decision in standard authentication and authorization systems
Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected. Embodiments capture information pertaining to a user and user device. Information is stored to create a profile for the user and user device. A comparison between the stored information and live data can be performed within authentication systems to optimize security. If the results of the comparison demonstrate the presence of an acceptable risk, then the need for subsequent authentication can be reduced or eliminated, which improves a user experience.
Information processing apparatus
An information processing apparatus includes a touch panel which displays pieces of identification information including letters, figures, and symbols and detects a contact of the panel with a finger of a user or other object. When the touch panel detects the contact of the panel, a detection unit specifies identification information of one or more of the multiple pieces of identification information displayed on the touch panel, indicated by a position at which the contact in question occurred. The detection unit also detects an area of part of the panel where the contact occurred. A storage unit stores reference identification information and a reference area range. A control unit performs particular processing upon matching of the detected identification information with the stored reference identification information and the area of the contact detected by the detection unit falling within the stored reference area range.