Patent classifications
G06F2221/2109
Trusted communications between untrusting parties
A system and method is disclosed for assuring that networked communications between parties playing a game on a network (e.g., the Internet) are not tampered with by either of the parties for illicitly gaining an advantage over the other party. An initial sequence of tokens (e.g., card representations) for playing the game are doubly encrypted using an encryption key from each of the parties. Accordingly, during play of the game neither party can modify the initial sequence of game tokens during the game. At termination of the game, at least one of the parties can fully decrypt the initial sequence of tokens, and thereby, if desired, compare the played token sequence with the corresponding the initial token sequence.
Distributed data storage system data decoding and decryption
A method for execution by a processing module of a distributed storage includes transmitting a request to retrieve a set of encoded data slices (EDSs) to a plurality of storage nodes followed by receiving a threshold number of EDSs from one or more of the plurality of storage nodes, and decoding the EDSs to produce a transposed encrypted data segment. The method continues with the processing module partitioning the encrypted data segment into an encoded encryption key and encrypted data, performing a hash function on the encrypted data to produce a digest resultant and combining the digest resultant with the encoded encryption key to generate combined key data. The method then continues with decoding the combined key data to recover an encryption key and decrypting the encrypted data using the encryption key to recover a data segment.
Information processing apparatus
An information processing apparatus includes a touch panel which displays pieces of identification information including letters, figures, and symbols and detects a contact of the panel with a finger of a user or other object. When the touch panel detects the contact of the panel, a detection unit specifies identification information of one or more of the multiple pieces of identification information displayed on the touch panel, indicated by a position at which the contact in question occurred. The detection unit also detects an area of part of the panel where the contact occurred. A storage unit stores reference identification information and a reference area range. A control unit performs particular processing upon matching of the detected identification information with the stored reference identification information and the area of the contact detected by the detection unit falling within the stored reference area range.
COMPUTER SYSTEM AND METHOD FOR MORE EFFICIENTLY STORING, ISSUING, AND TRANSACTING TOKENIZED BLOCKCHAIN GAME ASSETS MANAGED BY A SMART CONTRACT
A computer system and method is disclosed including a vault application to facilitate the transacting of game assets represented by tokens managed by a smart contract via a hybrid approach that permits certain transactions of game assets to be conducted using an in-game centralized database approach (which does not necessarily include a decentralized network) and other transactions to be managed on a decentralized network, via a blockchain or other distributed ledger technology (DLT) network.
INCORPORATING RISK-BASED DECISION IN STANDARD AUTHENTICATION AND AUTHORIZATION SYSTEMS
Embodiments of the disclosure provide a method for enhancing standard authentication systems to include risk-based decisions. Risk-based decisions can be selectively implemented within existing authentication systems to strategically modify and supplement security if an unacceptable risk is detected. Embodiments capture information pertaining to a user and user device. Information is stored to create a profile for the user and user device. A comparison between the stored information and live data can be performed within authentication systems to optimize security. If the results of the comparison demonstrate the presence of an acceptable risk, then the need for subsequent authentication can be reduced or eliminated, which improves a user experience.
System and method to prevent surveillance and preserve privacy in virtual reality
Preserving user privacy and preventing surveillance on behalf of users of a virtual reality world. One or more plans are available when a privacy or surveillance risk to a user is detected. In one plan, configurable scripts execute on behalf of the user to create a confusing array of clone avatars that obfuscate the real user avatar behavior. A malevolent avatar, attempting to surveil the user, may have difficulty distinguishing the clones from the user and may miss out on private insights he might otherwise have learned from the user's behavior. In another exemplary privacy plan, a copy of part of the virtual world is spawned, occupied exclusively by the user's avatar, and then merged into the main world. Privacy plans may be selected manually or automatically in response to perceived privacy threats to strike a balance between privacy and enjoyment within the virtual world.
Virtual reality for security augmentation in home and office environments
A mechanism for augmenting security features associated with internet of things devices located in home and/or office environments is provided. A method can comprise as a function of retrieved data associated with a device, displaying vulnerability data associated with the device; facilitating downloading of resolution data to the device based on the vulnerability data; facilitating reconfiguring of the device based on the resolution data; and allocating reward data representative of a reward to a user device based on the reconfiguring of the device being determined to have completed.
Install-time procedural content generation for encrypted packages
A system and method for generating content for an encrypted package is provided. A package may be received that includes one or more anti-tamper hash portions and encrypted data, where the encrypted data includes one or more procedural content generation instructions. A portion of the encrypted data including the one or more procedural content generation instructions may be decrypted and a data based on the execution of the one or more procedural content generation instructions and a corpus of data may be generated. The generated data may be encrypted and anti-tamper hashes may be generated based on the encrypted generated data. The generated anti-tamper hashes may be compared to the one or more anti-tamper hashes in the anti-tamper hash portion of the received package.
Methods and architecture for cashless system security
Methods for secure transactions between gaming machines and portable devices are described. A logic device, separate from a master gaming controller on the gaming machine and placed in the gaming machine, may be operable to authenticate a portable device, such as a smart card, and authorize transactions involving transfers of indicia of credit between the portable device and the gaming machine. The logic device may be operable to send authentication information relating to the portable device to a remote host where a value amount of transactions involving the portable device authorized by the logic device may be higher when the logic device and the remote host authenticate the portable device as opposed to when the portable device is only authenticated by the logic device.
VIDEO GAME INTEGRATION OF CRYPTOGRAPHICALLY SECURED DIGITAL ASSETS
A method of integrating a cryptographic digital asset into a digital software application includes receiving a digital asset identification (ID) code, the digital asset ID code existing together with a unique owner ID code on a distributed blockchain ledger, the digital asset ID code including a code string segmented into a series of code subsets, wherein a first plurality of the code subsets includes data indicative of a plurality of attributes of the digital asset. The cryptographic digital asset is then represented on a display, wherein the cryptographic digital asset comprises a virtual object having an appearance based on the first plurality of code subsets, the virtual object further includes a plurality of object attributes. At least one of the object attributes is modified according to an aspect of the digital software application or interaction between a character avatar and the virtual object.