Off-line remote lottery system
    42.
    发明授权
    Off-line remote lottery system 失效
    离线远程彩票系统

    公开(公告)号:US6024640A

    公开(公告)日:2000-02-15

    申请号:US858123

    申请日:1997-05-19

    摘要: An off-line remote lottery system which enables players to purchase instant-type lottery game outcomes from a randomized prize datastream in a central computer and view the outcomes on remotely disposed gaming computers which do not require an on-line connection to the central computer during play, the central computer storing identification data for a plurality of gaming computers and being configured for randomly assigning outcomes from the randomized prize datastream to the gaming computers in response to purchase requests by players for a requested number of outcomes in each purchase request, each gaming computer including a game program in memory for execution on the gaming computer to generate games which yield the purchased outcomes or aggregate net payoff of the purchased outcomes, and a redemption function for generating a redemption request to cash-out winnings, the system enabling outcome purchase and redemption of winnings to be effectuated directly with the central computer over a telephone network, or via a plurality of agent terminals located at various lottery retailers.

    摘要翻译: 一种离线远程彩票系统,使得玩家能够从中央计算机中的随机奖品数据流购买即时型彩票游戏结果,并且在远程设置的游戏计算机上查看不需要在中央计算机上的在线连接的结果 播放,中央计算机存储多个游戏计算机的识别数据,并且被配置为响应于玩家对每个购买请求中所请求的结果数量的购买请求而将随机分配的奖励数据流的结果随机分配给游戏计算机,每个游戏 计算机,包括用于在游戏计算机上执行的游戏程序,以产生产生购买结果或购买结果的总收益的游戏,以及用于生成兑现奖金的兑换请求的兑换功能,该系统使能结果购买 并通过中央计算直接兑现奖金 r通过电话网络,或经由位于各种彩票零售商的多个代理终端。

    Event auditing system
    43.
    发明授权
    Event auditing system 失效
    活动审计制度

    公开(公告)号:US5978475A

    公开(公告)日:1999-11-02

    申请号:US896785

    申请日:1997-07-18

    IPC分类号: G06F1/00 G06F21/00 H04L9/00

    摘要: In many computer applications, sensitive information must be kept on an untrusted machine. Such information must be protected against attackers, as well as against partially trusted entities to be given partial, but not total, access to the stored information. This invention provides a method, apparatus and computer-readable data structure for inhibiting an attacker from accessing or corrupting information stored by an untrusted machine. More specifically, in a log file generated during a process in which the untrusted machine is in limited communication with a trusted machine, entries generated prior to the attack remain secure (they cannot be modified without detection), even though subsequent entries can not be trusted. One embodiment of the invention also allows a partially trusted verifier to read and verify entries in the log file, but not to change them without detection. In another embodiment of the invention, operating with or without the trusted machine, the untrusted machine's log file can also incorporate log files of other processes.

    摘要翻译: 在许多计算机应用中,敏感信息必须保存在不受信任的机器上。 此类信息必须受到攻击者的保护,同时还可以防止部分受信任的实体被部分访问,而不是全部访问存储的信息。 本发明提供了一种用于禁止攻击者访问或破坏由不可信机器存储的信息的方法,装置和计算机可读数据结构。 更具体地说,在不信任机器与受信任机器有限通信的处理期间生成的日志文件中,在攻击之前生成的条目保持安全(即使不检测也不能修改它们),即使后续条目不可信 。 本发明的一个实施例还允许部分可信验证者读取和验证日志文件中的条目,但是不在不检测的情况下更改它们。 在本发明的另一个实施例中,在使用或不使用可信机器的情况下,不受信任的机器的日志文件也可以包含其他进程的日志文件。

    Remote-auditing of computer generated outcomes, authenticated billing
and access control, and software metering system using cryptographic
and other protocols
    44.
    发明授权
    Remote-auditing of computer generated outcomes, authenticated billing and access control, and software metering system using cryptographic and other protocols 失效
    计算机生成结果的远程审计,认证计费和访问控制以及使用加密和其他协议的软件计费系统

    公开(公告)号:US5970143A

    公开(公告)日:1999-10-19

    申请号:US677544

    申请日:1996-08-08

    IPC分类号: A63F13/12 G07F17/32 H04L9/32

    摘要: A computer device and method for encoding a message corresponding to an outcome of a computer game, and a computer device and method for decoding the message to detect a fraudulent outcome. The computer device used to generate the encoded message includes (1) a memory device containing encoding control code and (2) a processor configured to process the encoding control code in conjunction with a computer game outcome to generate an encoded message containing the computer game outcome and to transmit the encoded message to a human-readable output device, such as a display device. The computer device includes various tamper resistant or tamper evidence features. A secure module containing the processor and memory is used to plug into an existing personal computer or dedicated game device. The device also includes a system for metering use of a computer game. The method for encoding the message includes the steps of executing a computer game program to generate a computer game outcome, encoding the computer game outcome to generate an encoded message, and providing the encoded message to a user, who may then transmit the encoded message to a device configured for decoding the encoded message to reveal the computer game outcome. A second central or host computer device is used to decode the encoded message. The second computer device has (a) a memory device containing decoding control code and an encoded message corresponding to a computer game outcome and (b) a processor configured to process the code to decode the encoded message to reveal the computer game outcome.

    摘要翻译: 用于对与计算机游戏的结果相对应的消息进行编码的计算机设备和方法,以及用于解码消息以检测欺诈结果的计算机设备和方法。 用于生成编码消息的计算机设备包括(1)包含编码控制代码的存储设备和(2)配置成结合计算机游戏结果处理编码控制代码以生成包含计算机游戏结果的编码消息的处理器 并将编码的消息发送到诸如显示设备的人类可读输出设备。 计算机设备包括各种防篡改或篡改证据的特征。 包含处理器和存储器的安全模块用于插入现有的个人计算机或专用游戏设备。 该装置还包括用于计量使用计算机游戏的系统。 用于对消息进行编码的方法包括以下步骤:执行计算机游戏程序以产生计算机游戏结果,编码计算机游戏结果以生成编码消息,以及将编码消息提供给用户,然后用户可以将编码消息发送到 被配置为解码编码消息以显示计算机游戏结果的设备。 第二个中央或主机计算机设备用于对编码的消息进行解码。 第二计算机设备具有(a)包含解码控制代码和对应于计算机游戏结果的编码消息的存储设备,以及(b)处理器,被配置为处理代码以解码编码消息以显示计算机游戏结果。

    Digital signature with auditing bits
    45.
    发明授权
    Digital signature with auditing bits 失效
    数字签名与审计位

    公开(公告)号:US5956404A

    公开(公告)日:1999-09-21

    申请号:US724622

    申请日:1996-09-30

    IPC分类号: H04L9/32 H04L9/00

    摘要: A method for digitally signing a message by a tamper-resistant device to generate a digital signature. The method includes the step of hashing the message to form message bits; and encrypting with a private key the message bits, redundancy bits for the security of the signature, and auditing bits to form the digital signature for the message. The auditing bits provide an audit trail for the message. The auditing bits include one or more of the following categories: signature-packet version bits to identify the version of the device generating the signature; device ID bits to identify the token generating the digital signature; key ID bits to identify the private key; a packet-sequence number, which increments every time the device generates a signature to indicate the sequence of signatures generated; bits generated by hashing the prior signature to provide an auditing trail of signatures generated and a time-stamp to indicate the time when the signature is generated. The auditing bits may further include a random number.

    摘要翻译: 一种用于通过防篡改设备对消息进行数字签名以产生数字签名的方法。 该方法包括散列消息以形成消息比特的步骤; 并用私钥加密消息比特,用于签名的安全性的冗余比特,以及审计比特,以形成消息的数字签名。 审计位提供了消息的审计跟踪。 审计位包括以下类别中的一个或多个:用于标识生成签名的设备的版本的签名包版本位; 设备ID位以识别生成数字签名的令牌; 密钥ID位来标识私钥; 分组序列号,其每当设备生成签名以指示生成的签名序列时递增; 通过对先前的签名进行散列而产生的比特来提供所生成的签名的审计跟踪,以及用于指示签名被生成的时间的时间戳。 审计位还可以包括随机数。

    Method and apparatus for analyzing information systems using stored tree
database structures
    47.
    发明授权
    Method and apparatus for analyzing information systems using stored tree database structures 失效
    用于使用存储的树数据库结构分析信息系统的方法和装置

    公开(公告)号:US5850516A

    公开(公告)日:1998-12-15

    申请号:US772413

    申请日:1996-12-23

    申请人: Bruce Schneier

    发明人: Bruce Schneier

    摘要: A computer-implemented method and apparatus electronically represent and quantify the security of a system as a logical tree structure including leaf nodes representing attacks against the system and intermediate nodes representing various logical combinations of attacks necessary to mount a successful overall attack. An indication of the overall security of the system is quantified in a value of a root node of the tree. The values of the various nodes can be Boolean or continuous, representing simple binary security attributes such as feasible/infeasible or more complicated attributes such as cost, time or probability. The nodes' attributes and values can also represent defenses as well as attacks. The attack trees can be used to calculate the cost, time or probability of an attack to list the security assumptions of a system, to compare competing systems, to evaluate system modifications, to perform security subsystem analysis, to allocate a security budget, and for many other uses.

    摘要翻译: 计算机实现的方法和装置以电子方式表示和量化系统的安全性,作为逻辑树结构,包括表示对系统的攻击的叶节点和表示安装成功的整体攻击所必需的各种攻击逻辑组合的中间节点。 在树的根节点的值中量化系统的总体安全性的指示。 各种节点的值可以是布尔或连续的,代表简单的二进制安全属性,如可行/不可行或更复杂的属性,如成本,时间或概率。 节点的属性和值也可以表示防御以及攻击。 攻击树可用于计算攻击的成本,时间或概率,列出系统的安全假设,比较竞争系统,评估系统修改,执行安全子系统分析,分配安全预算,以及 许多其他用途。