✨ Casino Operator Requirements Technical Standards




1 NOVEMBER NEW ZEALAND GAZETTE 3377

C.3.1.3. Validity Checks

a. All memory devices containing program memory or critical memory must be validated by some form of check such as signatures, checksums or use of validity codes.

b. Memory that does not dynamically change (eg. EPROM) must be validated at least every time the hardware is reset (eg. turning the power off and on) or the software is reset.

c. A validity check of critical data memory must be undertaken at least before and after a game play or transaction of significance.

d. If a validity check fails, the software must act in accordance with error handling requirements (Refer C.3.2.15. Event Handling).

e. If validity checking of critical memory information fails, and data memory remains operational, the software must be able to recover the critical memory information, where all instances of critical memory information are not corrupt.

C.3.1.4 Signatures

C.3.1.4.1. Exemption from Automatic Signature Calculations

When gaming is conducted in an environment that does provide constant monitoring by inspectors or by video monitoring, the Authority does not mandate automatic signature verification of gaming floor equipment software initiated by a central monitoring (back house) system.

C.3.1.4.2. Signature Computations Mandatory

When gaming is conducted in an environment that does not provide constant monitoring by inspectors or by video monitoring, the Authority requires verification of gaming floor equipment software initiated by a central monitoring (back house) system

C.3.1.4.3. Signature Algorithm Requirements

A signature algorithm must meet the following requirements:

a. it must combine all the contents of the software or data being processed, ie. each and every bit of the contents must influence the signature result;

b. it must combine the bits in a complicated and cross-interactive manner. An example of such a technique is the popular CRC method;

c. use of primitive techniques such as parity or simple "checksum" (regardless whether 8 or 16 bit or whether exclusive-or or add arithmetic is used) is inadequate and will not be acceptable;

d. it must produce a result of at least 16 bits in width. The algorithm must detect at least 99.995% and preferably 99.998% of all possible data errors.

C.3.1.4.4. Signature Seeding

a. Signature algorithm "seeds" (or more generally "algorithm coefficients") are to be supplied by the initiator of the signature request at the time of activation.

b. The following principles must apply to signature seeding:

i. the "seed" information is to be at least 15 bits in length;


Next Page →

PDF embedding disabled (Crown copyright)

View this page online at:


VUW Te Waharoa PDF NZ Gazette 1994, No 114


NZLII PDF NZ Gazette 1994, No 114





✨ LLM interpretation of page content

πŸ›οΈ Casino Operator Requirements Detailed Table of Contents (continued from previous page)

πŸ›οΈ Governance & Central Administration
Casino, Operator Requirements, Validity Checks, Signatures, Memory Devices, Error Handling, Software Validation