Consultant - United States since Dec 2009
Owner
Next Gaming LLC May 2005 - Nov 2009
CTO
Consulting Projects 2000 - 2005
Principal
Spongelab 2000 - 2001
CTO
WarnerBros Online / New Media 1998 - 2000
CTO
Us Patents
Systems And Methods For Server Based Lottery And Casino Gaming Machines Including A Remote Display
In one aspect a switch can be placed on any existing video gaming machine. A player can be informed that they have the option to play other games on the video gaming machine. The switch can be either an icon on the video gaming machine's video or a physical switch. Once the player touches the icon or presses the physical switch as an indication of his or her interest to play other games a server can take control of the video display and its touch screen. Similarly, when the player is playing any of the additional games available on video gaming machine, there will be an icon or a switch button to offer the option to go back to the slot's original game.
Systems And Methods For Server Based Lottery And Casino Gaming Machines
Bruce Merati - San Diego CA, US Robert J. Piechowiak - Las Vegas NV, US Roger H. Goeb - Las Vegas NV, US
Assignee:
NEXT GAMING LLC - San Diego CA
International Classification:
A63F 13/00
US Classification:
463 20, 463 40, 463 25, 463 17
Abstract:
In one embodiment a switch can be placed on any existing video gaming machine. A player can be informed that they have the option to play other games on the video gaming machine. The switch can be either an icon on the video gaming machine's video or a physical switch. Once the player touches the icon or presses the physical switch as an indication of his or her interest to play other games a server can take control of the video display and its touch screen. Similarly, when the player is playing any of the additional games available on video gaming machine, there will be an icon or a switch button to offer the option to go back to the slot's original game.
Among other things, systems and techniques are described for authenticating one or more client devices. A system includes one or more client devices and a server to communicate with the one or more client devices over a network. The server receives a request for network connection from at least one of the client devices. In response to the received request, the server performs authentication of the requesting client device based on at least two factors. The at least two factors includes a transmission control protocol (TCP) header verification to identify a media access control (MAC) address of the requesting client device as an authorized or unauthorized MAC address; and a challenge-reply verification performed based on the TCP header verification. The challenge-reply verification includes sending a challenge message sent to the requesting client device; receiving a reply message from the requesting client device; and identifying the received reply message as a correct or incorrect reply.
Systems And Methods For Securely Managing Program Execution
Disclosed are various embodiments securing the execution of unauthorized applications on a computing device. A file system stored in a storage device includes files and file system data structures. The file system data structures have kernel space accessible portions. When a file is executed, a computing device can determine whether the file can be executed based on a file system data structure corresponding to the file based on the kernel space accessible portion. The operating system can determine whether to execute the file or take another action based on flags stored in the kernel space accessible portion.