Software Verification and Authentication in a Gaming Device
|
|
|
- Prosper Andrews
- 10 years ago
- Views:
Transcription
1 Software Verification and Authentication in a Gaming Device White Paper Date: February 15, California Street, Suite 307 Fremont, CA 94538
2 1 Introduction Gaming machine development has progressed further in the last several years than in all of the years since their invention. This is especially true of video based gaming machines. No longer are poker hands simply being dealt or are keno cards checked off as random numbers are drawn. Bonus games are added and have increasingly sophisticated animation. Video monitors have higher screen resolution and color depth. And audio has gone from a mono speaker to stereo surround sound. All of this requires increasing amounts of program media storage to store the executable code, graphic images and sound data. Gaming machine manufacturers have had to turn to other memory storage devices not typically associated with gaming machines. This change in technology has outgrown the current methods of ensuring the integrity of the gaming machine s software. The scope of this paper is to discuss the verification and authentication methods associated with this change in technology. Strictly speaking, verification and authentication are two separate processes. Verification is the process of determining that the program code or other stored data is intact and is not corrupted by storage media failures. In contrast, authentication is the process of determining that the program code or other stored data are authentic copies of the approved components. 2 Verification In order to check for corruption in the storage media, the gaming machine software performs the verification process that is internal to the gaming machine. At selected events such as power resets, door closures, and before game play, the software performs a mathematical calculation and uses the software itself that resides in the storage media as the data for this calculation. With a properly chosen mathematical algorithm, errors in the data, or in this case, the storage media, can be detected. For EPROM based storage media, the gaming regulations generally do not specify the exact algorithm that must be used, only that it must be able to detect percent of all possible media failures 1. The most common algorithm is the cyclic redundancy check (CRC). The CRC of the software data is calculated and the results are stored in the EPROM itself at the time it is programmed. During the operation of the game, the software calculates the CRC of itself and compares it with the results previously stored in the EPROM. If the results match, it is assumed that the software is intact and therefore, the program storage media is free from any failures. 3 Authentication In order to authenticate the software in the storage media, the contents of the media are checked against a known good copy. For EPROM based storage media, there are two common methods of authentication. Both involve a process that is external to the gaming machine. The EPROM device(s) is(are) physically removed from the machine. In the first method, the EPROM is inserted into an electronic device and the data is read. The data is then compared, bit by bit, with the data of a master EPROM that has been kept in a secure location. If the results of the comparison indicate that both EPROM s have the same binary image, that is, every single bit in every single location matches exactly, then the software is considered to be authenticated. 1 Example, Nevada Regulation 14, Technical Standards for Gaming Devices, Standard 1, Integrity of Devices, Section Control Program Requirements. Page 2 of 3
3 In the second method, the EPROM is inserted into an electronic device. However, instead of simply reading the contents, an algorithm is performed on the data, in much the same way as during verification. The result of the algorithm is referred to as the EPROM s signature. This signature is compared with the previously calculated signature of the master EPROM. If the calculated signature matches that of the master EPROM signature, then the software is considered to be authenticated. The methods for verification and authentication discussed so far work reasonably well for EPROM technology as the storage media. However, the methods do not work well or simply do not work at all for the other storage technologies gaining use. Case in point is high capacity storage devices such as hard drives. 4 High Capacity Storage Devices These storage devices typically have from 10 to even 40,000 times the storage capacity of a single EPROM chip. Thus the attractiveness in using these devices to store the increasing amounts of graphics and sound data in gaming machines. There are several devices in use today and can be divided into two categories: rotating media and solid state. Hard s CD-ROM s DVD s Flash Unlike EPROM technology, these are mass storage devices only. The program does not actually execute directly from them. The program is copied into higher speed memory and executed from there. Although flash could be used in a system where the program can execute directly from the flash device, there are other considerations of why it generally does not. That consideration is the operating system. The operating system is the software that controls the resources of the electronic hardware. There are many variations of operating systems to select from. They range from proprietary to those commercially available from third parties. They all have one thing in common though, a format to store that data. The format is how the data is organized in the device so that the operating system and application can access it. In addition to the software considerations of using these devices, there are hardware considerations as well. The first is the many interface technologies available. The interface dictates how to connect the devices, both electrically and mechanically, to the computer. Below is a summary of the various software data formats and hardware interfaces for these mass storage devices. SOFTWARE HARDWARE DEVICE Data Format Electrical Mechanical Hard FAT16 FAT32 Unix SCSI/SCSI 2 CD-ROM ISO9660 Unix SCSI/SCSI 2 Page 3 of 3
4 SOFTWARE HARDWARE DEVICE Data Format Electrical Mechanical DVD Linear IDE IC chips FAT16 PCMCIA-Type I Flash FAT32 PCMCIA PCMCIA-Type II PCMCIA-Type III CompactFlash 5 Levels of Verification and Authentication Many manufacturers have physical constraints in choosing a location to mount the storage device such as cooling requirements, size, maximum cable length, etc. This sometimes results in a less than optimal location for easy removal. It would be beneficial for the manufacturers to have all verification and authentication take place without removing the storage device. However, there may be instances where the storage device would need to be removed. Therefore different levels of verification and authentication can be defined based on length of time to verify or authenticate as well as level of security such as routine or resolving a dispute. Define two levels of verification: Level Process Data 0 Internal Control Program 1 Internal Control Program, Graphic data, Sound data Define four levels of authentication: Level Process Data 0 Internal Control Program 1 Internal Control Program, Graphic data, Sound data 2 External Control Program 3 External Control Program, Graphic data, Sound data Process: Internal External Storage media remains internal to the gaming machine Storage media is removed from the gaming machine Page 4 of 3
5 6 Verification/Authentication Environment Internal External 1 2 CD-ROM 3 DRAM EPROM Hard 4 5 Verification takes place over steps 1, 2, 3, and 4, in the above figure. In Step 1: In Step 2: In Step 3: In Step 4: Verify nonvolatile storage media Verify storage media is intact and not corrupted by media failure. Verify code as it is brought into DRAM to execute is intact and not corrupted by media failure. Continuously verify code/data in DRAM is intact and not corrupted by media failures. Authentication takes place over steps 1, 2, and 4, in the above figure. In Step 1: In Step 2: In Step 4: Authenticate code/data in storage media itself Authenticate code/data as it is brought into DRAM to execute Authenticate code/data in storage media itself and send results via serial port to laptop The internal authentication involves performing a given authentication algorithm and sending the results to a laptop or some other data collection device. A standard format for sending the results is beneficial to the manufacturers and regulators alike. The format should have a minimum of information to make its parsing easier. The essential information includes the following: Gaming machine manufacturer ID Authentication file size Authentication level Authentication method used File(s) verified and their Authentication data (digest) Authentication file signature. This allows a lot of flexibility for the manufacturers to select their own authentication algorithms. Page 5 of 3
Implementation Guide. SAS Serial Protocol. for. Montana Department of Justice Gambling Control Division. October 22, 2012. Version 1.4.
Implementation Guide for SAS Serial Protocol Montana Department of Justice Gambling Control Division October 22, 2012 Version 1.4.1 Montana SAS Implementation Guide Page 2 Table of Contents 1 Introduction...
Management Challenge. Managing Hardware Assets. Central Processing Unit. What is a Computer System?
Management Challenge Managing Hardware Assets What computer processing and storage capability does our organization need to handle its information and business transactions? What arrangement of computers
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Parts of a Computer. Preparation. Objectives. Standards. Materials. 1 1999 Micron Technology Foundation, Inc. All Rights Reserved
Parts of a Computer Preparation Grade Level: 4-9 Group Size: 20-30 Time: 75-90 Minutes Presenters: 1-3 Objectives This lesson will enable students to: Identify parts of a computer Categorize parts of a
1 PERSONAL COMPUTERS
PERSONAL COMPUTERS 1 2 Personal computer a desktop computer a laptop a tablet PC or a handheld PC Software applications for personal computers include word processing spreadsheets databases web browsers
CF to Serial Adapter Quick Installation Guide
CF to Serial Adapter Quick Installation Guide Features and Benefits 16-bit CompactFlash interface Compatible with 16-bit PCMCIA Card (via a CF-to-PCMCIA adapter) Supports RS232E serial port specification
CSCA0102 IT & Business Applications. Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global
CSCA0102 IT & Business Applications Foundation in Business Information Technology School of Engineering & Computing Sciences FTMS College Global Chapter 2 Data Storage Concepts System Unit The system unit
Obj: Sec 1.0, to describe the relationship between hardware and software HW: Read p.2 9. Do Now: Name 3 parts of the computer.
C1 D1 Obj: Sec 1.0, to describe the relationship between hardware and software HW: Read p.2 9 Do Now: Name 3 parts of the computer. 1 Hardware and Software Hardware the physical, tangible parts of a computer
Computer Basics: Chapters 1 & 2
Computer Basics: Chapters 1 & 2 Definition of a Computer What does IPOS stand for? Input Process Output Storage Other types of Computers Name some examples of other types of computers, other than a typical
Embedded Software development Process and Tools: Lesson-3 Host and Target Machines
Embedded Software development Process and Tools: Lesson-3 Host and Target Machines 1 1. Host-Target Based Development Approach 2 Host-Target System Development Approach During development process, a host
Chapter 5 Busses, Ports and Connecting Peripherals
Chapter 5 Busses, Ports and Connecting Peripherals 1 The Bus bus - groups of wires on a circuit board that carry information (bits - on s and off s) between computer components on a circuit board or within
Chapter 6. Inside the System Unit. What You Will Learn... Computers Are Your Future. What You Will Learn... Describing Hardware Performance
What You Will Learn... Computers Are Your Future Chapter 6 Understand how computers represent data Understand the measurements used to describe data transfer rates and data storage capacity List the components
Programming NAND devices
Technical Guide Programming NAND devices Kelly Hirsch, Director of Advanced Technology, Data I/O Corporation Recent Design Trends In the past, embedded system designs have used NAND devices for storing
Network Client. Troubleshooting Guide FREQUENTLY ASKED QUESTIONS
Network Client Troubleshooting Guide 1 Network Client Troubleshooting Guide The first section of this guide answers some frequently asked questions (FAQs) about the operation of Intellex and the Network
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Hard Disk Drives and RAID
Hard Disk Drives and RAID Janaka Harambearachchi (Engineer/Systems Development) INTERFACES FOR HDD A computer interfaces is what allows a computer to send and retrieve information for storage devices such
MINIMUM TOOL REQUIREMENT FOR EPROM UPGRADE
Installing and Updating SE422 Access Control Units Firmware! Read all procedures before attempting the field replacement of the EPROM firmware in any equipment. Components are static sensitive and care
UltraCade Multi-Game System Frequently Asked Questions
The UltraCade Frequently Asked Questions (FAQ) is a collected list of the most common questions asked by our customers. Please make sure your Tech Support team has a copy of these questions to better serve
Security Policy Revision Date: 23 April 2009
Security Policy Revision Date: 23 April 2009 Remote Desktop Support Version 3.2.1 or later for Windows Version 3.1.2 or later for Linux and Mac 4 ISL Light Security Policy This section describes the procedure
Lecture 2: Computer Hardware and Ports. [email protected] http://faculty.sau.edu.sa/y.alharbi/en
BMTS 242: Computer and Systems Lecture 2: Computer Hardware and Ports Yousef Alharbi Email Website [email protected] http://faculty.sau.edu.sa/y.alharbi/en The System Unit McGraw-Hill Copyright 2011
EUCIP IT Administrator - Module 1 PC Hardware Syllabus Version 3.0
EUCIP IT Administrator - Module 1 PC Hardware Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted by ECDL
Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Christian Schindelhauer
Algorithms and Methods for Distributed Storage Networks 3. Solid State Disks Institut für Informatik Wintersemester 2007/08 Solid State Disks Motivation 2 10 5 1980 1985 1990 1995 2000 2005 2010 PRODUCTION
SERVICE LEVEL AGREEMENT (SLA)
SERVICE LEVEL AGREEMENT (SLA) between SoftLogica Inc. and Customers of WAPT/WAPT Pro products for Technical Support Services Page 1 of 6 TABLE OF CONTENTS PURPOSE...3 SCOPE OF AGREEMENT...3 MAINTENANCE
PC2400 EEPROM PROGRAMMER INSTRUCTION MANUAL
PC2400 EEPROM PROGRAMMER INSTRUCTION MANUAL LAST UPDATE 23/09/09 LLOYD RESEARCH LTD., 7&7A BROOK LANE, WARSASH, SOUTHAMPTON, HANTS., SO31 9FH. Tel: +44 (0)1489 885515/574040 Fax: +44 (0)1489 885853 Internet:
Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface
Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Application te Programming Flash Microcontrollers through the Controller Area Network (CAN) Interface Abstract This
Checking the Package Contents. Installing the Printer Software. Connecting. Unpacking the. the Printer. Printer. Attaching
Installing the Printer Software Checking the Package Contents Connecting the Printer Unpacking the Printer Installing the Ink Cartridges Plugging in the Printer Attaching the Printer Parts 4032216-00 EUL
SecureLinx Spider Duo Quick Start Guide
SecureLinx Spider Duo Quick Start Guide SecureLinx Spider Duo Quick Start Guide SecureLinx Spider Duo QUICK START GUIDE CONTENTS Overview... 2 What s In The Box... 3 Installation and Network Settings...
User Guide USB 2.0 LAPTOP DOCKING STATION WITH VIDEO N2953
USB 2.0 LAPTOP DOCKING STATION WITH VIDEO 410-1864-001B / ACP51US 1 YEAR LIMITED WARRANTY: We pride ourselves on the quality of our products. For complete warranty details and a list of our worldwide offices,
Chapter 5 Understanding Input. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 5 Understanding Input Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Define input and differentiate among a program, command, and user response Identify
USB 2.0 VGA ADAPTER USER MANUAL
USB 2.0 VGA ADAPTER USER MANUAL CONTENTS INTRODUCTION... 3 FEATURES... 3 SYSTEM REQUIREMENTS... 3 PACKAGE CONTENTS... 3 SUPPORTED COMMON DISPLAY RESOLUTION... 4 TECHNICAL SPECIFICATIONS... 4 INSTALLATION
Computer Hardware HARDWARE. Computer Hardware. Mainboard (Motherboard) Instructor Özgür ZEYDAN
Computer Hardware HARDWARE Hardware: the collection of physical elements that comprise a computer system. Bülent Ecevit University Department of Environmental Engineering 1. Case and inside 2. Peripherals
STEM ANIMATION. RScientific OVERVIEW ELIGIBILITY TIME LIMITS ATTIRE PROCEDURE
STEM ANIMATION OVERVIEW Participants use computer graphics tools and design processes (i.e., animation) to communicate, inform, analyze and/or illustrate a topic, idea, subject, or concept that focuses
Computer Storage. Computer Technology. (S1 Obj 2-3 and S3 Obj 1-1)
Computer Storage Computer Technology (S1 Obj 2-3 and S3 Obj 1-1) Storage The place in the computer where data is held while it is not needed for processing A storage device is device used to record (store)
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
CONFIGURATION M5000 APPLICATIONS SOFTWARE INSTALLATION HARDWARE INSTALLATION OPTION INSTALLATION HIGH MEMORY OPTION SIMM PACK INSTALLATION
CONFIGURATION This section contains text modules concerning configuring either software or hardware applications. When software is released or a new module card is purchased, refer to this section in order
Enova X-Wall LX Frequently Asked Questions
Enova X-Wall LX Frequently Asked Questions Q: What is X-Wall LX? A: X-Wall LX is the third generation of Enova real-time hard drive cryptographic gateway ASIC (Application Specific Integrated Circuit)
Eureka Technology. Understanding SD, SDIO and MMC Interface. by Eureka Technology Inc. May 26th, 2011. Copyright (C) All Rights Reserved
Understanding SD, SDIO and MMC Interface by Eureka Technology Inc. May 26th, 2011 Copyright (C) All Rights Reserved Copyright by Eureka Technology Inc. All Rights Reserved Introduction This white paper
NCDware Publications Roadmap
NCDware Publications Roadmap Part Number 9300671 Rev. A November, 1998 Network Computing Devices, Inc. 350 North Bernardo Avenue Mountain View, California 94043 Telephone (650) 694-0650 FAX (650) 961-7711
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
Digital Cameras: Activities, Assessment, and Administration
Digital Cameras: Activities, Assessment, and Administration Wondering how to extend a field trip?... how to enrich student portfolios?... how to streamline administrative record-keeping? Consider using
Executable Integrity Verification
Executable Integrity Verification Abstract Background Determining if a given executable has been trojaned is a tedious task. It is beyond the capabilities of the average end user and even many network
Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD
Design Examples and Case Studies of Program Modeling and Programming with RTOS-2: Lesson-3 CASE STUDY OF AN EMBEDDED SYSTEM FOR SMART CARD 1 1. Smart Card System Requirements 2 Purpose Enabling authentication
Office of Liquor Gaming and Regulation Random Number Generators Minimum Technical Requirements Version 1.4
Department of Employment, Economic Development and Innovation Office of Liquor Gaming and Regulation Random Number Generators Minimum Technical Requirements Version 1.4 The State of Queensland, Department
With respect to the way of data access we can classify memories as:
Memory Classification With respect to the way of data access we can classify memories as: - random access memories (RAM), - sequentially accessible memory (SAM), - direct access memory (DAM), - contents
Enterprise Erase LAN
Enterprise Erase LAN Network Erasing and Asset Management Server Version 2.0 Users Guide 888.700.8560 toll free www.tabernus.com 11130 Jollyville Rd Suite 301 Austin, TX 78757 Table of Contents 1 Product
Title: ZOLL USB Direct Connect Cable Installation Instructions
ZOLL USB Direct Connect Cable Installation Instructions Document Status: Released Document #: 48x126-ZOLL-003 Page 1 of 7 Revision History DATE REV REASON January 9, 2008 A Initial Release August 12, 2008
Protected Cash Withdrawal in Atm Using Mobile Phone
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 4 April, 2013 Page No. 1346-1350 Protected Cash Withdrawal in Atm Using Mobile Phone M.R.Dineshkumar
FLASH TECHNOLOGY DRAM/EPROM. Flash. 1980 1982 1984 1986 1988 1990 1992 1994 1996 Year Source: Intel/ICE, "Memory 1996"
10 FLASH TECHNOLOGY Overview Flash memory technology is a mix of EPROM and EEPROM technologies. The term flash was chosen because a large chunk of memory could be erased at one time. The name, therefore,
QuickSpecs. HP IP Console Switch with Virtual Media Overview
Overview HP's IP Console Switch with Virtual Media is a key component in managing the heterogeneous data center and along with the IP Viewer software allows remote access to multiple servers running various
Animated Lighting Software Overview
Animated Lighting Software Revision 1.0 August 29, 2003 Table of Contents SOFTWARE OVERVIEW 1) Dasher Pro and Animation Director overviews 2) Installing the software 3) Help 4) Configuring the software
22 nd NISS Conference
22 nd NISS Conference Submission: Topic: Keywords: Author: Organization: Tutorial BIOMETRICS - DEVELOPING THE ARCHITECTURE, API, ENCRYPTION AND SECURITY. INSTALLING & INTEGRATING BIOMETRIC SYSTEMS INTO
Filing Systems. Filing Systems
Filing Systems At the outset we identified long-term storage as desirable characteristic of an OS. EG: On-line storage for an MIS. Convenience of not having to re-write programs. Sharing of data in an
Electronic Mail Security. Email Security. email is one of the most widely used and regarded network services currently message contents are not secure
Electronic Mail Security CSCI 454/554 Email Security email is one of the most widely used and regarded network services currently message contents are not secure may be inspected either in transit or by
STIM202 Evaluation Kit
Table of contents: 1 FEATURES... 2 2 GENERAL DESCRIPTIONS AND SYSTEM CONTENTS... 2 3 SYSTEM REQUIREMENTS... 2 4 GETTING STARTED... 3 4.1 INSTALLATION OF NI-SERIAL CABLE ASSEMBLY DRIVER... 3 4.2 INSTALLATION
CS 464/564 Introduction to Database Management System Instructor: Abdullah Mueen
CS 464/564 Introduction to Database Management System Instructor: Abdullah Mueen LECTURE 14: DATA STORAGE AND REPRESENTATION Data Storage Memory Hierarchy Disks Fields, Records, Blocks Variable-length
Computer Components Study Guide. The Case or System Box
Computer Components Study Guide In this lesson, we will briefly explore the basics of identifying the parts and components inside of a computer. This lesson is used to introduce the students to the inside
Application Note. Atmel CryptoAuthentication Product Uses. Atmel ATSHA204. Abstract. Overview
Application Note Atmel CryptoAuthentication Product Uses Atmel Abstract Companies are continuously searching for ways to protect property using various security implementations; however, the cost of security
Trabajo 4.5 - Memorias flash
Memorias flash II-PEI 09/10 Trabajo 4.5 - Memorias flash Wojciech Ochalek This document explains the concept of flash memory and describes it s the most popular use. Moreover describes also Microdrive
Logical Operations. Control Unit. Contents. Arithmetic Operations. Objectives. The Central Processing Unit: Arithmetic / Logic Unit.
Objectives The Central Processing Unit: What Goes on Inside the Computer Chapter 4 Identify the components of the central processing unit and how they work together and interact with memory Describe how
Quick Start Guide. DVR DS-7200HWI-SH Series DVR. www.hikvision.com. First Choice For Security Professionals
Quick Start Guide DVR DS-7300HWI-SH Series DVR DS-7200HWI-SH Series DVR NOTE: For more detailed information, refer to the User s Manual on the CD-ROM. You must use your PC or MAC to access the files. www.hikvision.com
Read Me UNISTREAM AUTOMATION IDE
Read Me UNILOGIC SOFTWARE UNISTREAM AUTOMATION IDE Unitronics UniLogic software is the programming Integrated Development Environment (IDE) you use to configure hardware, communications, and develop both
Product Support Bulletin
EPSON Product Support Bulletin Subject: Proper Method for Running Benchmark and Diagnostics Programs Date: 06/04/93 PSB No: S-0158 Page(s): 1 of 1 Originator: MWT This bulletin describes the proper method
Installation Guide v1.11 and Higher
Progeny Imaging Installation Guide v1.11 and Higher 00-02-1604 Rev. D ECN P3483 Revision Date: 6/2/2015 0120 Contents 1. About This Manual... 3 Text Conventions... 3 2. Welcome to Progeny Imaging... 4
Embedded Display Module EDM6070
Embedded Display Module EDM6070 Atmel AT91SAM9X35 Based Single Board Computer BY Product Overview Version 1.0 Dated: 3 rd Dec 2013 Table of Contents Product Overview... 2 Introduction... 2 Kit Contents...
Firmware security features in HP Compaq business notebooks
HP ProtectTools Firmware security features in HP Compaq business notebooks Embedded security overview... 2 Basics of protection... 2 Protecting against unauthorized access user authentication... 3 Pre-boot
Discovering Computers 2011. Living in a Digital World
Discovering Computers 2011 Living in a Digital World Objectives Overview Differentiate among various styles of system units on desktop computers, notebook computers, and mobile devices Identify chips,
Sample Project List. Software Reverse Engineering
Sample Project List Software Reverse Engineering Automotive Computing Electronic power steering Embedded flash memory Inkjet printer software Laptop computers Laptop computers PC application software Software
RAM & ROM Based Digital Design. ECE 152A Winter 2012
RAM & ROM Based Digital Design ECE 152A Winter 212 Reading Assignment Brown and Vranesic 1 Digital System Design 1.1 Building Block Circuits 1.1.3 Static Random Access Memory (SRAM) 1.1.4 SRAM Blocks in
MMGD0203 Multimedia Design MMGD0203 MULTIMEDIA DESIGN. Chapter 3 Graphics and Animations
MMGD0203 MULTIMEDIA DESIGN Chapter 3 Graphics and Animations 1 Topics: Definition of Graphics Why use Graphics? Graphics Categories Graphics Qualities File Formats Types of Graphics Graphic File Size Introduction
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status
10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary
Be sure to connect the USB cable from TonePort into your computer s USB port, and then proceed with the following steps
GearBox/TonePort setup for Line 6 Monkey Compatibility Check Mac OS X This document is designed to provide information for using the Line 6 Monkey compatibility utility. One of the very useful functions
INTEGRITY CERTIFICATION REQUIREMENTS: SLOT MACHINES
INTEGRITY CERTIFICATION REQUIREMENTS: SLOT MACHINES Document History Change Topic Old Section(s) Old Page New Section New Page Changed Table of Contents - 3-4 Added Document History - - Document History
Copyright 1999 by EPSON America, Inc. 3/99 Torrance, California, USA
EPSON is a registered trademark of SEIKO EPSON Corporation. PhotoPC is a registered trademark, and HyPict, Image Authentication System, and FaxAdvice are trademarks of EPSON America, Inc. SoundAdvice is
CSCA0201 FUNDAMENTALS OF COMPUTING. Chapter 5 Storage Devices
CSCA0201 FUNDAMENTALS OF COMPUTING Chapter 5 Storage Devices 1 1. Computer Data Storage 2. Types of Storage 3. Storage Device Features 4. Other Examples of Storage Device 2 Storage Devices A storage device
PUF Physical Unclonable Functions
Physical Unclonable Functions Protecting next-generation Smart Card ICs with SRAM-based s The use of Smart Card ICs has become more widespread, having expanded from historical banking and telecommunication
UniKey Family 0. UniKey Time
UniKey Family 0 UniKey STD HID based driverless dongle Unique Hardware ID Automatic Protection Remote Update 4k Internal Memory API (for numerous platforms) Offline Licensing Options Customization Service
Lesson 1 Quiz. 3. The Internet is which type of medium? a. Passive b. Broadcast c. One-to-one d. Electronic print
Lesson 1 Quiz 1. Which technology trend in Web development can be defined as a group of XMLbased technologies that enable computers using different operating systems and software to easily exchange information
miniflash User Manual
miniflash User Manual 1 miniflash 2015 Cloud-9 All Rights Reserved All portions of this hardware are copyrighted and are the proprietary and trade secret information of Cloud-9. Use, reproduction or publication
Common Access Card Application
Infrastructure Management & Monitoring for Business-Critical Continuity TM Common Access Card Application The introduction of smart cards and common access cards (CAC) can create real challenges in environments
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
Virtual Private Networks (VPN) Connectivity and Management Policy
Connectivity and Management Policy VPN Policy for Connectivity into the State of Idaho s Wide Area Network (WAN) 02 September 2005, v1.9 (Previous revision: 14 December, v1.8) Applicability: All VPN connections
Computers. Hardware. The Central Processing Unit (CPU) CMPT 125: Lecture 1: Understanding the Computer
Computers CMPT 125: Lecture 1: Understanding the Computer Tamara Smyth, [email protected] School of Computing Science, Simon Fraser University January 3, 2009 A computer performs 2 basic functions: 1.
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Signature Verification Why xyzmo offers the leading solution.
Dynamic (Biometric) Signature Verification The signature is the last remnant of the hand-written document in a digital world, and is considered an acceptable and trustworthy means of authenticating all
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller
Implementing a Digital Answering Machine with a High-Speed 8-Bit Microcontroller Zafar Ullah Senior Application Engineer Scenix Semiconductor Inc. Leo Petropoulos Application Manager Invox TEchnology 1.0
이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다
020-101186-01 020-101186-01 이 기기는 업무용 급 으로 전자파적합등록을 한 기기이오니 판매자 또는 사용자는 이점을 주의하시기 바라며 가정 외의 지역에서 사용하는 것을 목적으로 합니다 Table of Contents About this Document... 1 Document Conventions... 1 Audience... 1 Related
Cisco Digital Media System: Cisco Digital Media Player 4305G
Cisco Digital Media System: The Cisco Digital Media System (DMS) is a comprehensive suite of digital signage, Enterprise TV, and desktop video applications that allow companies to use digital media to
Universal Push2TV HD Adapter PTVU1000 Installation Guide
Universal Push2TV HD Adapter PTVU1000 Installation Guide 2011 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or
SecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine FIPS 140-2 Non-Proprietary Security Policy Abstract: This document specifies Security Policy enforced by SecureDoc Cryptographic Engine compliant with the
The Programming Interface
: In-System Programming Features Program any AVR MCU In-System Reprogram both data Flash and parameter EEPROM memories Eliminate sockets Simple -wire SPI programming interface Introduction In-System programming
Tomorrow s Technology and You
Tomorrow s Technology and You 8 th Edition Slide 1 Tomorrow s Technology and You 8/e Hardware Basics: Peripherals Slide 2 Objectives List several examples of input devices and explain how they can make
Chapter 1 Computer System Overview
Operating Systems: Internals and Design Principles Chapter 1 Computer System Overview Eighth Edition By William Stallings Operating System Exploits the hardware resources of one or more processors Provides
