摘要:
The gaming network described herein includes network security features, host security features, audit protocols, and design architecture approaches to reduce the possibility of network attacks. The gaming network provides for traffic confidentiality, encryption, message authentication, secure authentication mechanisms, anti-replay protection of traffic, key management mechanisms, robust network availability, misrouting and redirection protection and prevention, rejection of external traffic, and a high entry-barrier to device addition to the network. The host protection and security includes secure host initialization, disabling unneeded components, download verification, disabling of unused IP ports, discarding traffic, strong passwords, dynamic one-time passwords for remote login, disabling default accounts, and appropriate “least-level” device privileges. Audit requirements include integrity protection of audit logs, appropriate definition of auditable events, auditing of anomalous behavior, chain of evidence preservation, shutdown if audit disabled, full log entry audit, personal ID and time access audit trail, and auditing of internal user actions.
摘要:
There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events. A detector is included for detecting selected system events so that they may be recorded.
摘要:
A method is disclosed for authenticating a gaming device, wherein the gaming device includes a plurality of components, one of which is a storage device. The method includes: starting up the gaming device; authenticating a data file stored on the storage device, wherein the authenticating comprises: opening and reading a file allocation structure in a storage device using a file allocation reader; processing the file allocation structure using a processor to provide access to files stored in the storage device, wherein the files in the storage device include installed identification data from one or more selected gaming units as to components actually installed on the selected gaming units, and wherein the files also include registered identification data for components supposed to be installed on the selected gaming units, each component including hardware components and software components, and each gaming unit including multiple components with identification data; and examining the installed identification data and registered identification data to determine enablement of the gaming units.
摘要:
A rollback attack prevention system 10 for a gaming machine 20 includes a configuration log 30 and a revocation list 40. Preferably, the configuration log 30 includes a protected record of software that has been installed on the gaming machine 20. Further, the revocation list 40 includes an inventory of unauthorized software that the prevention system 10 prevents from being installed and/or used on the gaming machine 20.
摘要:
A method is disclosed for authenticating a gaming device, wherein the gaming device includes a plurality of components, one of which is a storage device. The method includes: starting up the gaming device; authenticating a data file stored on the storage device, wherein the authenticating comprises: opening and reading a file allocation structure in a storage device using a file allocation reader; processing the file allocation structure using a processor to provide access to files stored in the storage device, wherein the files in the storage device include installed identification data from one or more selected gaming units as to components actually installed on the selected gaming units, and wherein the files also include registered identification data for components supposed to be installed on the selected gaming units, each component including hardware components and software components, and each gaming unit including multiple components with identification data; and examining the installed identification data and registered identification data to determine enablement of the gaming units.
摘要:
There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events. A detector is included for detecting selected system events so that they may be recorded.
摘要:
There is provided a method and system for verifying a device, having components. Identification numbers of the components are read and then verified. The process of verifying comprises matching each identification number in a database to determine whether each identification number is valid. In one embodiment, the database is remote from the device, wherein verification is performed over a network connecting a database server containing the database with the device. The device transmits the identification numbers for each of the components to the database server for verification. A file allocation structure reader may be located in a basic input/output system of the device for reading and verifying data files from a persistent storage media without loading an operating system. The device may comprise a gaming machine that contains a monitor for monitoring one or more system events being processed by the gaming machine. The monitor monitors routine and non-routine events. A detector is included for detecting selected system events so that they may be recorded.
摘要:
A plasma confinement ring assembly with a single movable lower ring can be used for controlling wafer area pressure in a capacitively coupled plasma reaction chamber wherein a wafer is supported on a lower electrode assembly and process gas is introduced into the chamber by an upper showerhead electrode assembly. The assembly includes an upper ring, the lower ring, hangers, hanger caps, spacer sleeves and washers. The lower ring is supported by the hangers and is movable towards the upper ring when the washers come into contact with the lower electrode assembly during adjustment of the gap between the upper and lower electrodes. The hanger caps engage upper ends of the hangers and fit in upper portions of hanger bores in the upper ring. The spacer sleeves surround lower sections of the hangers and fit within lower portions of the hanger bores. The washers fit between enlarged heads of the hangers and a lower surface of the lower ring. The spacer sleeves are dimensioned to avoid rubbing against the inner surfaces of the hanger bores during lifting of the lower ring.
摘要:
A novel enhanced system for connecting to preexisting wiring in buildings allows users with little experience wiring walls to safely change wiring receptacles and change the wiring at outlets throughout the building. Use of such a system improves safety by preventing contact with exposed wires. Moreover, users may exchange or replace wire behind wall using a novel replacement system.
摘要:
A method for cleaning metallic contaminants from an upper electrode used in a plasma chamber. The method comprises a step of soaking the upper electrode in a cleaning solution of concentrated ammonium hydroxide, hydrogen peroxide and water. The cleaning solution is free of hydrofluoric acid and hydrochloric acid. The method further comprises an optional step of soaking the upper electrode in dilute nitric acid and rinsing the cleaned upper electrode.