SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
REAL RANDOM Case Study:
Dispelling the Notion of Deception in Online Gaming
Presented by: Doug Hill for Real Random, LLC

Special Thanks to: Stewart Quealy, Media Bistro, LLC

1
• Our Genesis…

2
Nobody wants to feel they are being deceived…
de·cep·tion
: the act of making someone believe something that is
not true : the act of deceiving someone
: an act or statement intended to make people believe
something that is not true

3
Pseudo Random Number Generators:
o Created Using Algorithms
o Sequences Can Be Reproduced
o Players May Suspect Manipulation

4
Real Random Number Generators:
o Created Using Physical Media
o Sequences Are Unique
o Players Can See and Believe Results

5
Graphical Representations of Randomness

PHP () rand on Microsoft Windows

Real Random
6
References
NIST Special Publication 800-90A
Recommendation for Random Number Generation
Using Deterministic Random Bit Generators

NIST Special Publication 800-22 Revision 1a
A Statistical Test Suite for Random and Pseudorandom Number
Generators for Cryptographic Applications

Tests Performed
Frequency (Mono bit) Test

The Discrete Fourier Transform
(Spectral) Test

The Serial Test

Frequency Test within a Block

The Non-overlapping Template
Matching Test

The Approximate Entropy Test

The Runs Test

The Overlapping Template Matching
Test

The Cumulative Sums (Cusums) Test

Test for the Longest- Run-of-Ones in a Maurer’s Universal Statistical Test
Block

The Random Excursions Test

The Binary Matrix Rank Test

The Random Excursions Variant Test

The Linear Complexity Test

8
We Guarantee Each Roll is Unique
Highest Level Of Security Available Today:
Dynamic Challenge Response
Authentication and Verification
(DYCRAV (tm) Technology)
Most Powerful 2-factor Authentication

Dynamic One-Time PAD (unique passwords)
AES256 Encryption
TLS Network Security
Dynamic User Authentication

9
Partnering Opportunities:
We are developing a Software Development Kit for: Web Browser, iOS and Droid
REAL RANDOM can deliver content for your application as:
o
o
o
o

Live Dice Rolls
Stored Sequential Rolls
Still Shot of Rolls / Data Stream
Any Multiple / Type of Die Roll

Applications Under Development:
Entertainment:

Magic 8 Ball

Education:

Shut the Box

I-Gaming:

Back Alley Dice
Las Vegas Style Craps
10
Frequently Asked Questions:
Q: How can you verify the rolls are unique?
A: We use a patented “Secret Key” technology licensed from DyCrav ™. Each roll is serialized and time/date stamped
to ensure that they end user can see with their own eyes they are getting a unique roll.
Q:How can I partner with Real Random?
A: Sign up to receive access to our SDK at www.RealRandomRolls.com

Q: How many rolls per day can you generate?
A: We are currently generating 15,000 unique rolls per day
Q: How many players can use the rolls?
A: Each player will receive a roll through the SDK based upon game ID, limitations are bandwidth

11
Thank you for your time!
Contact Info:
Real Random, LLC
www.RealRandomRolls.com
302-595-2085 / doug@realrandomrolls.com
See you at the 2014 I-Gaming Expo, Atlantic City, NJ, USA, January 25, 2014

Doug Hill

Dan Boulay

Dan Bielefeldt

CEO

COO

CTO

12

Weitere ähnliche Inhalte

Ähnlich wie Doug Hill Presentation

Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksCyphort
 
AI in the Cloud: Use of Machine Learning in Games | George Dolbier
AI in the Cloud: Use of Machine Learning in Games | George DolbierAI in the Cloud: Use of Machine Learning in Games | George Dolbier
AI in the Cloud: Use of Machine Learning in Games | George DolbierJessica Tams
 
Case studies in Games, Machine Learning in the Cloud,
Case studies in Games, Machine Learning in the Cloud,Case studies in Games, Machine Learning in the Cloud,
Case studies in Games, Machine Learning in the Cloud,George Dolbier
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec JourneySaumil Shah
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesVi Tính Hoàng Nam
 
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)ClubHack
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...grecsl
 
The Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsThe Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsDr. Paolo Di Prodi
 
Introducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOpsIntroducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOpsJames Gwertzman
 
Mobile Game Hacking: Defense Against the Dark Arts | James Ahn
Mobile Game Hacking: Defense Against the Dark Arts | James AhnMobile Game Hacking: Defense Against the Dark Arts | James Ahn
Mobile Game Hacking: Defense Against the Dark Arts | James AhnJessica Tams
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseJohn Bambenek
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Alliance
 
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacCSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacNCCOMMS
 

Ähnlich wie Doug Hill Presentation (20)

Gamedev(en)
Gamedev(en)Gamedev(en)
Gamedev(en)
 
NPTs
NPTsNPTs
NPTs
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
 
AI in the Cloud: Use of Machine Learning in Games | George Dolbier
AI in the Cloud: Use of Machine Learning in Games | George DolbierAI in the Cloud: Use of Machine Learning in Games | George Dolbier
AI in the Cloud: Use of Machine Learning in Games | George Dolbier
 
Case studies in Games, Machine Learning in the Cloud,
Case studies in Games, Machine Learning in the Cloud,Case studies in Games, Machine Learning in the Cloud,
Case studies in Games, Machine Learning in the Cloud,
 
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
12 Years and a Baker's Dozen - Lessons and Learnings from my Infosec Journey
 
Ce hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online gamesCe hv6 module 51 hacking and cheating online games
Ce hv6 module 51 hacking and cheating online games
 
Cryptography
CryptographyCryptography
Cryptography
 
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)How Android Based Phone Helped Me Win American Idol (Elad Shapira)
How Android Based Phone Helped Me Win American Idol (Elad Shapira)
 
1145 track3 balac
1145 track3 balac1145 track3 balac
1145 track3 balac
 
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
Project KidHack - Teaching Kids Security through Gaming at BSidesTampa on Feb...
 
The Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence PlatformsThe Future Of Threat Intelligence Platforms
The Future Of Threat Intelligence Platforms
 
Introducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOpsIntroducing PlayFab -- Effective LiveOps
Introducing PlayFab -- Effective LiveOps
 
Mobile Game Hacking: Defense Against the Dark Arts | James Ahn
Mobile Game Hacking: Defense Against the Dark Arts | James AhnMobile Game Hacking: Defense Against the Dark Arts | James Ahn
Mobile Game Hacking: Defense Against the Dark Arts | James Ahn
 
Resume_Sharvani
Resume_SharvaniResume_Sharvani
Resume_Sharvani
 
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for DefenseSANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
SANSFIRE18: War Stories on Using Automated Threat Intelligence for Defense
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Indie Game Development Intro
Indie Game Development IntroIndie Game Development Intro
Indie Game Development Intro
 
FIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming WebinarFIDO Authentication for Gaming Webinar
FIDO Authentication for Gaming Webinar
 
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha KranjacCSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
CSF18 - The Digital Threat of the Decade (Century) - Sasha Kranjac
 

Mehr von Mediabistro

Elements of a Successful Job Listing
Elements of a Successful Job ListingElements of a Successful Job Listing
Elements of a Successful Job ListingMediabistro
 
Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014Mediabistro
 
Kelvin Wee_Inszi
Kelvin Wee_InsziKelvin Wee_Inszi
Kelvin Wee_InsziMediabistro
 
Paul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing MelbournePaul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing MelbourneMediabistro
 
Paul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing MelbournePaul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing MelbourneMediabistro
 
Angela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing MelbourneAngela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing MelbourneMediabistro
 
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing MelbourneChris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing MelbourneMediabistro
 
Terry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing MelbourneTerry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing MelbourneMediabistro
 
2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos Presentation2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos PresentationMediabistro
 
Gary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing MelbourneGary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing MelbourneMediabistro
 
James canning inside bitcoin melbourne final
James canning inside bitcoin melbourne finalJames canning inside bitcoin melbourne final
James canning inside bitcoin melbourne finalMediabistro
 
Gst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential PitfallsGst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential PitfallsMediabistro
 
Building a trading platform from scratch
Building a trading platform from scratchBuilding a trading platform from scratch
Building a trading platform from scratchMediabistro
 
Bitcoin Lateral Economics
Bitcoin Lateral EconomicsBitcoin Lateral Economics
Bitcoin Lateral EconomicsMediabistro
 
State of Ethereum, and Mining
State of Ethereum, and MiningState of Ethereum, and Mining
State of Ethereum, and MiningMediabistro
 
Future of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh ZerlanFuture of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh ZerlanMediabistro
 
Evan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody PresentationEvan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody PresentationMediabistro
 
Morning Keynote: Bobby Lee
Morning Keynote: Bobby LeeMorning Keynote: Bobby Lee
Morning Keynote: Bobby LeeMediabistro
 

Mehr von Mediabistro (20)

Elements of a Successful Job Listing
Elements of a Successful Job ListingElements of a Successful Job Listing
Elements of a Successful Job Listing
 
Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014Kelvin Wee_Inside 3D Printing Melbourne 2014
Kelvin Wee_Inside 3D Printing Melbourne 2014
 
Kelvin Wee_Inszi
Kelvin Wee_InsziKelvin Wee_Inszi
Kelvin Wee_Inszi
 
Melb oleg2
Melb oleg2Melb oleg2
Melb oleg2
 
Paul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing MelbournePaul Taylor_Inside 3D Printing Melbourne
Paul Taylor_Inside 3D Printing Melbourne
 
Paul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing MelbournePaul Mignone_Inside 3D Printing Melbourne
Paul Mignone_Inside 3D Printing Melbourne
 
Angela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing MelbourneAngela Daly_Inside 3D Printing Melbourne
Angela Daly_Inside 3D Printing Melbourne
 
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing MelbourneChris Leigh-Lancaster_Inside 3D Printing Melbourne
Chris Leigh-Lancaster_Inside 3D Printing Melbourne
 
Terry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing MelbourneTerry Wohlers_Inside 3D Printing Melbourne
Terry Wohlers_Inside 3D Printing Melbourne
 
2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos Presentation2014 07-09 Juan Llanos Presentation
2014 07-09 Juan Llanos Presentation
 
Gary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing MelbourneGary Anderson_Inside 3D Printing Melbourne
Gary Anderson_Inside 3D Printing Melbourne
 
James canning inside bitcoin melbourne final
James canning inside bitcoin melbourne finalJames canning inside bitcoin melbourne final
James canning inside bitcoin melbourne final
 
Gst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential PitfallsGst & bitcoins slides- Potential Pitfalls
Gst & bitcoins slides- Potential Pitfalls
 
Building a trading platform from scratch
Building a trading platform from scratchBuilding a trading platform from scratch
Building a trading platform from scratch
 
Bitcoin Lateral Economics
Bitcoin Lateral EconomicsBitcoin Lateral Economics
Bitcoin Lateral Economics
 
State of Ethereum, and Mining
State of Ethereum, and MiningState of Ethereum, and Mining
State of Ethereum, and Mining
 
Future of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh ZerlanFuture of Bitcoin Mining- Josh Zerlan
Future of Bitcoin Mining- Josh Zerlan
 
Evan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody PresentationEvan Wagner and Robby Dermody Presentation
Evan Wagner and Robby Dermody Presentation
 
Crypto Law
Crypto LawCrypto Law
Crypto Law
 
Morning Keynote: Bobby Lee
Morning Keynote: Bobby LeeMorning Keynote: Bobby Lee
Morning Keynote: Bobby Lee
 

Kürzlich hochgeladen

UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingScyllaDB
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...panagenda
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Hiroshi SHIBATA
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 

Kürzlich hochgeladen (20)

UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 

Doug Hill Presentation

  • 1. REAL RANDOM Case Study: Dispelling the Notion of Deception in Online Gaming Presented by: Doug Hill for Real Random, LLC Special Thanks to: Stewart Quealy, Media Bistro, LLC 1
  • 3. Nobody wants to feel they are being deceived… de·cep·tion : the act of making someone believe something that is not true : the act of deceiving someone : an act or statement intended to make people believe something that is not true 3
  • 4. Pseudo Random Number Generators: o Created Using Algorithms o Sequences Can Be Reproduced o Players May Suspect Manipulation 4
  • 5. Real Random Number Generators: o Created Using Physical Media o Sequences Are Unique o Players Can See and Believe Results 5
  • 6. Graphical Representations of Randomness PHP () rand on Microsoft Windows Real Random 6
  • 7. References NIST Special Publication 800-90A Recommendation for Random Number Generation Using Deterministic Random Bit Generators NIST Special Publication 800-22 Revision 1a A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications Tests Performed Frequency (Mono bit) Test The Discrete Fourier Transform (Spectral) Test The Serial Test Frequency Test within a Block The Non-overlapping Template Matching Test The Approximate Entropy Test The Runs Test The Overlapping Template Matching Test The Cumulative Sums (Cusums) Test Test for the Longest- Run-of-Ones in a Maurer’s Universal Statistical Test Block The Random Excursions Test The Binary Matrix Rank Test The Random Excursions Variant Test The Linear Complexity Test 8
  • 8. We Guarantee Each Roll is Unique Highest Level Of Security Available Today: Dynamic Challenge Response Authentication and Verification (DYCRAV (tm) Technology) Most Powerful 2-factor Authentication Dynamic One-Time PAD (unique passwords) AES256 Encryption TLS Network Security Dynamic User Authentication 9
  • 9. Partnering Opportunities: We are developing a Software Development Kit for: Web Browser, iOS and Droid REAL RANDOM can deliver content for your application as: o o o o Live Dice Rolls Stored Sequential Rolls Still Shot of Rolls / Data Stream Any Multiple / Type of Die Roll Applications Under Development: Entertainment: Magic 8 Ball Education: Shut the Box I-Gaming: Back Alley Dice Las Vegas Style Craps 10
  • 10. Frequently Asked Questions: Q: How can you verify the rolls are unique? A: We use a patented “Secret Key” technology licensed from DyCrav ™. Each roll is serialized and time/date stamped to ensure that they end user can see with their own eyes they are getting a unique roll. Q:How can I partner with Real Random? A: Sign up to receive access to our SDK at www.RealRandomRolls.com Q: How many rolls per day can you generate? A: We are currently generating 15,000 unique rolls per day Q: How many players can use the rolls? A: Each player will receive a roll through the SDK based upon game ID, limitations are bandwidth 11
  • 11. Thank you for your time! Contact Info: Real Random, LLC www.RealRandomRolls.com 302-595-2085 / doug@realrandomrolls.com See you at the 2014 I-Gaming Expo, Atlantic City, NJ, USA, January 25, 2014 Doug Hill Dan Boulay Dan Bielefeldt CEO COO CTO 12