Security system for high level transactions between devices
A technology of host equipment and remote equipment, which is applied in the field of security systems for advanced transactions, and can solve problems such as increased security risks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0236] In a poker game using 52 cards, the host system requests a card from the deck. As requested by the host system, the HRNG controller takes a set of random bit streams, constructs a deck of cards, and manages the distribution of the deck. If the poker game requires multiple decks of cards, the hardware random number generator controller constructs the cards to be presented to the host system as required.
example 2
[0238] A keno game using 80 numbers. The host system requests a keno number, and the HRNG controller takes a stream of random bits, constructs a set of 80 numbers, and manages its allocation as requested by the host system.
[0239] Authorization system using biometric identification
[0240] According to another embodiment of the present invention shown in FIG. 6, a system and method for verifying the identity of a user intending to access a security system of a service provider is provided. An example of such a system is the Internet or unsupervised gaming venues or sites where the user's age is a legally important parameter for operating the site and / or financial institution's website involving personal financial data.
[0241] In order to access this security system, the following registration can be performed:
[0242] 1. Potential users 50 intending to register with the service provider 52 will make their natural appearance at the registration center 54 or secure locat...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 