G06F2221/2109

Segment-based file authentication
11394558 · 2022-07-19 · ·

Provided are servers and methods for authenticating software files. A server includes a processor circuit and a memory coupled to the processor circuit. The memory includes computer program instructions that, when executed by the processor circuit, cause the authentication server to perform operations including verifying, using a public key, signature data corresponding to a single certificate file for authenticating a software installation package file that was signed using a private source key. Operations may include, responsive to verifying that the signature data matches an originally signed single certificate file, reading an image file segment table from the software installation package file. The image file segment table includes multiple records that correspond to ones of multiple image file segments of the software installation package file.

SCALABLE CLONING AND REPLICATION FOR TRUSTED EXECUTION ENVIRONMENTS

Scalable cloning and replication for trusted execution environments is described. An example of a computer-readable storage medium includes instructions for receiving a selection of a point to capture a snapshot of a baseline trust domain (TD) or secure enclave, the TD or secure enclave being associated with a trusted execution environment (TEE) of a processor utilized for processing of a workload; initiating cloning of the TD or secure enclave from a source platform to an escrow platform; generating an escrow key to export the snapshot to the escrow platform; and exporting a state of the TD or secure enclave to the escrow platform, the state being sealed with a sealing key.

VERIFYING GAMING ESTABLISHMENT PATRON IDENTIFICATION
20220292917 · 2022-09-15 ·

A system that a system that enables a patron to sign up for a gaming establishment account independent of any direct interaction with gaming establishment personnel via utilizing one or more image capture devices to obtain images of a picture identification document presented by a user as well as images of the user presenting the picture identification document.

Video game integration of cryptographically secured digital assets

A method of integrating a cryptographically secured digital asset into a digital video game application includes receiving a digital asset identification (ID) code representative of cryptographically secure digital asset. The digital asset ID code exists together with a unique owner ID code on a distributed blockchain ledger, and includes a code string segmented into a series of code subsets. A first plurality of the code subsets includes data indicative of a plurality of attributes of the digital asset. The digital asset ID code is provided to a virtual object generator, which returns a virtual object constructed from the first plurality of the code subsets of the unique owner ID code, and where the virtual object further including a plurality of object attributes. At least one of the character attributes is then modified according to at least one of the object attributes.

Method and apparatus for preventing cheating in a video game environment by providing obfuscated game variables

A system and method for preventing cheating in a video game environment by obfuscating game variables in memory.

Randomized Transforms in a Dispersed Data Storage System
20220116215 · 2022-04-14 · ·

A method for execution by one or more modules of one or more processors of a storage network includes receiving a data object for storage, segmenting the data object into a plurality of data segments and determining a level of security and a level of performance for the plurality of data segments. The method continues by determining whether one or more data segments of the plurality of data segments is to be transformed using an all-or-nothing transformation and in response to a determination to transform one or more data segments of the plurality of data segments, transforming a data segment of the plurality of data segments to produce a transformed data segment. The method continues by dispersed error encoding the transformed data segment to produce a set of encoded data slices and transmitting the set of encoded data slices to a set of storage units of the storage network.

Systems employing directional sound recordings in a casino environment

The present disclosure relates to systems employing directional sound recordings in a casino environment.

Immersive experience password authentication in extended reality environments
11157132 · 2021-10-26 · ·

Disclosed herein are system, method, and computer program product embodiments for the performing of a user authentication task in a virtual environment, for secure authentication of a user utilizing three dimensions. An embodiment operates by using a group of objects shown in a field of view to the user, wherein the user selects a subset of these group of objects by using a virtual environment device to constitute a password. Such a password, because it is chosen in three dimensions and wherein user movement in three-dimensions may be analyzed per an individual user profile according to machine learning logic, is efficient and secure.

Center Device

Methods and apparatus provide for: facilitating communication between one or more controller devices operated by one or more users, respectively, and a data processing apparatus running an application program, wherein each controller device includes a plurality of actuation elements that are operable to be manipulated by a respective one of the one or more users to input desired operations to the data processing apparatus for use by the application program; obtaining a respective controller identifier from each of the one or more controller devices; and storing in a memory the controller identifiers in response to the control section in a sequential table, such that each entry in the sequential table includes at least a sequential table entry number and a respective one of the controller identifiers.

SYSTEMS AND METHODS FOR PROVIDING ACCESS TO WIRELESS GAMING DEVICES

Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.