Examination of gaming equipment. Examination of gambling equipment

Currently in high demand. This is primarily due to the legal ban on holding gambling using slot machines. There are only a few special zones left where such activities are allowed. And in all other regions it is banned.

However, some entrepreneurs began to use some gaps in the laws regarding incentive lotteries, carrying out their activities in the same way. Expertise gaming equipment just designed to determine the legality or illegality of the actions of people conducting non-drawing lotteries.

Lottery clubs or slot machines?

Taking advantage of the obvious gaps in the legislation, many entrepreneurs give out machines for lotteries without circulation, and when faced with checks, they find a way out of this for themselves.

There is also the opposite situation, when, due to inaccuracies in legislative definitions, the owners of non-circulation lotteries are subject to prohibitive actions.

To determine the type of institution and the measures that need to be taken against it, an examination of the machines is needed, which will answer many questions.

Essence of expertise

Examination of equipment for gambling establishments is a complex event that aims to detect algorithms in slot machines, as well as hidden data arrays, mechanisms and other components that are inaccessible from the outside.

Very often, slot machines and lotteries are used to maximize earnings by installing in them such an algorithm for obtaining a win that makes the percentage of wins significantly lower than the average value.

If according to the standard algorithm, which is guided by the theory of probability, there is a certain value of the percentage of cases in which there is a win, then when the algorithm is changed, this percentage is greatly reduced. As a result, the institution receives super profits, and customers lose more than they should.

For example, the One-Armed Bandit has a winning percentage of 75. And given that all machines are programmed electronically, the owners of the establishment can deliberately underestimate this percentage.

Inspection of lottery equipment

Since only lottery equipment can be legal in many regions of the country, it is with it that experts most often encounter in their work. They have to find out if this equipment to permitted.

This may be needed in two cases:

  • Entrepreneurs to prove their case and innocence.
  • Law enforcement and other services to identify violators.

In each case, expertise solves the tasks assigned to certain interested parties. Our experts will help identify violations or prove their absence. We always conduct independent research that is objective.

Considering that tickets are not needed for lotteries today, and technical means are developing significantly, many people today can participate in the lottery using an electronic device.

There are lottery terminals that allow a participant to register for a lottery. Such draws are usually instant, and the amount is calculated after the person has paid the participation fee. After that, the terminal prompts you to select a field with a color, where there is a combination of numbers.

Depending on whether the combination turns out to be winning, the client either receives a win or is left with nothing.

The essence of the devices lies in the fact that they are programmed in a certain way for some algorithms, which determine the frequency and degree of the client's winnings.

When examining this type of equipment, examination of gaming equipment determines the correctness and admissibility of such algorithms. To answer whether the lottery is legal, or with its help, the owners of the institution receive super profits, actually deceiving their customers, providing them with conditions in which it is impossible to win.

In addition to the percentage of winnings and its compliance with the statistical algorithm, experts also check the randomness of the distribution of winnings. This is important to know in order to answer the question of whether the lottery is fair. Or she can be rigged to win right person.

Play Equipment Inspection

Considering that casinos are allowed in some regions, and even where they are prohibited, law enforcement officers periodically find underground organizations, our experts are from time to time tasked with studying slot machines.

Modern machines are controlled by software algorithms, which makes it possible and tempting for their owners to independently influence the percentage of visitors' winnings. Even where casinos are allowed, such interventions remain illegal, and the examination is designed to determine if there are any technical and software violations that allow you to get super profits by deceiving customers.

Often, dissatisfied customers sue the casino, losing a large sum. This means that the company must prove:

  • That the loss of a person is not associated with a change in algorithms.
  • That in the machines there was no artificial underestimation of the percentage of winnings.

To do this, the most the right way― order our expertise, which is often the only way to maintain your reputation and avoid a major lawsuit.

Having received an expert opinion in court, the client will lose any leverage on your enterprise, since the conclusion will indicate which algorithms you used: standard or modified ones.

Play equipment subject to inspections

All equipment must be checked, in relation to which the owners or technical workers can apply changes to the software or electronic code responsible for the winning algorithms.

In fact, absolutely all slot machines are subject to checks, in which the number of winnings can be set using the program. So, the following types of equipment fall under the checks:

  • Roulette wheels.
  • Wheels of Fortune.
  • Programs for poker and other card games.
  • All kinds of gambling machines.

When do you use the services of an expert?

The services of an expert are required in the event of any dispute or conflict of interest. Also, if problems with gambling equipment are found or suspected, then it makes sense to conduct examinations.

Most often, cases in which you need to resort to expert help come down to:

  • Instructions from authorized government agencies that control lottery or gambling equipment.
  • The emergence of the need to establish whether the equipment has control elements that allow you to change the winning algorithms.
  • The need to establish compliance with the general strategy of the lottery and the program that is embedded in the device.
  • The need to determine the compliance of machines and devices with certificates and technical documentation that the enterprise has.
  • Identification of elements of schemes and programs that allow you to randomize the results of the game.

How is the examination carried out?

In all cases where an examination is required, a general scheme is applied, which is the same for absolutely each individual case of verification. The scheme consists of three main stages:

  • Documentation research.
  • Analysis of equipment, each individual sample.
  • Preparation of expert opinion on the results of the audit.

The first stage requires the study of technical documents that are attached to machines and other equipment. These include descriptions, manuals and instructions, as well as recommendations for special cases.

1 AREA OF USE

1.1. This recommendation is intended for use in testing centers slot machines(CIIA) and contains a description of the methods and procedure for the examination of gaming programs (IP) of slot machines with cash prize(IADV) in order to detect undeclared capabilities in them.

2. REGULATORY REFERENCES

1. "Regulations on licensing activities for the production and sale of special gaming equipment intended for the gambling business", approved by Decree of the Government of the Russian Federation of 06.10.2006, No. 603;

3.4. Examination of gaming programs used in the IADV is carried out by a commission of experts (experts) of the CIIA. TsIIA specialists (experts) who conduct an examination of gaming programs used in the IADV must have documentary evidence of competence to conduct such an examination.

3.5. After the examination, its materials (testing program and test protocol) are submitted to the TsIIA FSUE "VNIIMS" for the preparation of an expert opinion. The final result of the examination is a document (expert opinion), the form of which is given in the Appendix, issued by the TsIIA FSUE "VNIIMS", confirming (or not confirming) the presence of undeclared features in the game programs used in the IADV.

4. TERMS AND DEFINITIONS

4.1. slot machine with cash prize: A special device that, after making a monetary bet, gives the user (player) the right to play a game with the possibility of receiving a monetary gain.

4.2. average winning percentage: The ratio of win to bet, calculated for the total number of games and expressed as a percentage.

4.3. game program: A software tool that allows the gaming machine to respond to the actions of the player.

4.3. undeclared IP capabilities: Functional objects and tools that are not specified in the accompanying technical documentation or do not correspond to those specified, the use of which may violate the random nature of the game process (i.e., the appearance of various kinds of trends or patterns in the results of the game), the established average winning percentage, as well as confidentiality , availability or integrity of the processed information.

4.4. processed information: Data involved in the functioning of the UI and presented in a form suitable for transmission, interpretation or processing.

4.5. availability of processed information: The state of the processed information, ensuring its receipt in a legitimate way in accordance with the accompanying technical documentation.

4.6. confidentiality of processed information: The state of limited access to the processed information in accordance with the accompanying technical documentation and its protection from unauthorized access.

4.7. integrity of processed information: The state of information being processed, characterized by the absence of changes, intentional or accidental.

5. GENERAL REQUIREMENTS FOR GAMING SOFTWARE USED IN THE IADV

The general requirements for IP are given in the table.

No. p / p

1. Documentation requirements

1.1.

An IP submitted for examination must be accompanied by documentation in accordance with the requirements of this recommendation.

2. Requirements for the randomness of the gameplay

2.1.

The IP used in the gaming machine should ensure that winnings are obtained only depending on the case (i.e., there should be no various kinds of trends or patterns in the results of the game). The average percentage of winnings technologically incorporated in the IP cannot be lower than a certain value established by law.

5.2.

3. Requirements for the availability of processed information

3.1.

The IPs used in the IADV should provide the opportunity to receive the necessary processed information in a timely and complete manner in an authorized manner.

4. Requirements for the integrity of the processed information

4.1.

After the type of gaming machine is approved, the IP used in the gaming machine of this type should not be changed. For each copy of the IADV of the approved type, an exact copy of the IP of the IADV that has been tested for the purpose of type approval is used.

5.4.1

4.2.

The IP contains means of detecting, designating and protecting against failures (functional defects), as well as changes of an accidental or intentional nature that violate the integrity of the information being processed.

5.4.2.

5. Requirements for the confidentiality of processed information

5.1.

The IP used in the IADV contains means for authorizing access to confidential processed information and protecting confidential processed information from unauthorized access.

5.1. DOCUMENTATION REQUIREMENTS

5.1.1. Along with the documentation listed in Appendix B of the metrology rules PR 50.2.023, IP submitted for examination must be accompanied by technical documentation in accordance with the requirements of this recommendation.

5.3. REQUIREMENTS FOR THE AVAILABILITY OF PROCESSED INFORMATION

5.3.1. The IPs used in the IADV should provide the opportunity to receive the necessary processed information in a timely and complete manner in an authorized manner.

5.3.1.1 The processed information may be presented in symbolic, graphic, digital, printed or other form.

5.3.1.2 The IP must ensure that the processed information is presented in such a way that the player has a complete and unambiguous understanding of all the possibilities of the IP related to the gaming process (the amount of credit, the bet per line, the number of active lines, the service menu, the rules of the game, the conditions for receiving bonuses, key assignments, etc.), as well as the state of the gameplay at any given time.

5.3.1.3 The information being processed, the possibility of obtaining which is provided by the IP, the completeness of its content, as well as the procedure (method) for obtaining it, including using additional software and (or) hardware (protocols), must exactly correspond to the technical documentation accompanying the IP .

5.3.2 The technical documentation must contain an exhaustive list of methods for presenting (receiving) the processed information, as well as a list of software and (or) hardware used to perform these functions.

5.3.3. It is forbidden to use software and (or) hardware for receiving, transmitting, interpreting and using processed information that is not specified in the technical documentation for the IP.

5.3.4. Violation or restriction of the availability of processed information is allowed only in cases provided for by the technical documentation accompanying the IP (for example, in the event of failure protection).

5.4. REQUIREMENTS FOR THE INTEGRITY OF PROCESSED INFORMATION

5.4.1. After the approval of the IADV type, the IP used in the gaming machine of this type should not be changed. For each copy of the IADV of the approved type, an exact copy of the IP of the IADV that has been tested for the purpose of type approval is used. It is not allowed to change both the entire IP and its individual parts (graphical interface, text messages, sound design, service menu elements, etc.).

5.4.1.1. The IP used in the approved type of IADV should not contain functionality that changes the composition of the program itself and is not described in the accompanying technical documentation.

5.4.1.2. If there are functionalities described in the accompanying technical documentation that allow changing the composition of the IP of an approved type of gaming machine (changing the IP version, etc.), the IP examination is carried out again after each change in the IP.

5.4.1.3. The technical documentation accompanying the IP IADV of the approved type must contain an exhaustive list of the functionality of the IP, as well as a list of software and (or) hardware used to perform these functionality.

5.4.1.4. The UI of the gaming machine is designed in such a way that it is not affected by other software.

5.4.2. The IP must contain means for detecting, designating and protecting against failures (functional defects), as well as changes of an accidental or intentional nature that violate the integrity of the information being processed (checksum, digital signature, etc.).

5.4.3. In the event of a failure or changes in the processed information of an accidental or intentional nature, the user is notified about this. The SP issues a warning (visual and (or) audible signal) about the need to complete the work. If it is impossible to designate and (or) eliminate a failure or changes in the processed information of an accidental or intentional nature, the IP must provide for a situation of emergency shutdown.

5.4.4. The SP makes a record in the corresponding log of events related to the violation of the integrity of the processed information as a result of failures or changes of an accidental or intentional nature.

5.5. REQUIREMENTS FOR THE PRIVACY OF PROCESSED INFORMATION

5.5.1. The IP used in the IADV contains means of authorizing access to confidential processed information and protecting confidential processed information from unauthorized access.

5.5.1.1. Means for authorizing access to confidential processed information should provide access to confidential processed information to an authorized user and ensure that access is denied to an unauthorized user.

5.5.1.2. The IP used in the IADV must ensure the protection of confidential processed information during its storage and transmission. Protection of confidential processed information is provided by electronic signature, encryption or other means.

5.5.1.3. All events related to access to confidential information must be recorded in the IP event log.

6. METHODS FOR EXAMINATION OF IE TO DETECT UNDECLARED OPPORTUNITIES

The following methods are used during the examination of the IP IADV in order to detect undeclared capabilities:

1. Type-approval testing by IADS, confirming the random nature of the game process and the absence of violation of the established average winning percentage.

2. Testing of the IE of the IADV in order to detect violations of the requirements for confidentiality, availability and integrity of the processed information.

6.1. Type approval tests by the IABV, confirming the random nature of the game process and the absence of violation of the established average winning percentage, are determined by the system of testing gaming machines with cash prizes and monitoring their compliance with the approved type. IADV tests for the purpose of type approval are regulated by the following regulatory documents: PR 50.2.023, MI 2674, MI 2562, MI 2662.

6.2. The IADV test results are presented in the IADV Test Report, the form of which is given in Appendix D of the Rules for Metrology PR 50.2.023.

6.3. Testing of IP IAADV in order to detect violations of the requirements for confidentiality, availability and integrity of the processed information includes the following steps:

1. Carrying out verification of technical documentation;

2. Testing IP for compliance with the requirements for the availability, integrity and confidentiality of the processed information;

3. Drawing up a protocol for testing IP IADV.

7. CHECK THE TECHNICAL DOCUMENTATION

7.1. Submission of documentation for examination in accordance with paragraph of this recommendation is a necessary condition for its implementation. At the same time, the sufficiency of the set of submitted documentation for the audit is assessed, and an analysis of the structure and completeness of its content is carried out.

At the same time, the following sections of the technical documentation for IP are checked:

7.1.1. General information about IP.

This section should include:

IP name, its version;

Software required for the functioning of IP;

Programming languages, development environment, compilation tools used in the development of IP.

7.1.2. Description of the logical structure of IP.

This section should describe:

The structure of the IP with a description of the functions of the constituent parts and the relationship between them;

Implemented IP algorithms, as well as their block diagrams;

Information processing methods used;

Connections of IP with other software, as well as methods for receiving and transmitting processed information.

For all the described functions of the IP, the input and output data, as well as the result of their execution, must be indicated.

7.1.3. Description of the technical means used.

The section indicates the types of electronic computers and devices that are necessary for the operation of the IP, as well as the types of additional devices with which the IP interacts.

The section contains a description of the methods and procedure for calling the IP from the corresponding data carrier.

7.1.5. Input data.

In the "Input data" section, the description, format and organization of the IP input data should be indicated.

7.1.6. In the "Imprint" section, the description, format and organization of the IP output data should be indicated.

7.1.7 SP maintenance manual. The section should describe the rules of the game, game events (with obligatory illustration) and interfaces of the IP, its service menu with a detailed indication of all its items, methods of accessing and navigating through the items, ways to access the IP event log, as well as methods for diagnosing, configuring and IP initialization.

7.1.8. Description of the implemented methods for protecting IP and processed information.

The description of the implemented methods (user authorization, event log, data encoding, etc.) is checked to protect the software and processed information from unacceptable changes and failures.

7.2. Depending on the features of the IP, it is allowed to introduce additional sections or combine individual sections.

7.3. It is allowed to illustrate the content of sections with explanatory examples, tables, diagrams, graphs.

7.4. It is allowed to include various materials in the appendix to the IP description, which are inappropriate to be included in the sections of the description.

7.5. The results of the verification of technical documentation, including identified non-conformities obtained from the analysis of software documentation, are recorded in the testing protocol.

7.6. The list of technical documents accompanying the IP, the scope and methods of checking the documentation can be adjusted by agreement between the contractor and the customer of the IP examination.

8. CONDUCTING IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS OF AVAILABILITY, INTEGRITY AND CONFIDENTIALITY OF PROCESSED INFORMATION

8.1. IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS FOR THE AVAILABILITY OF PROCESSED INFORMATION

8.1.1. Based on the analysis of technical documentation, the following is checked:

8.1.1.1. The completeness and timeliness of providing the user with information about the features of the game. It is checked, in particular, in the IP help menu information about the rules of the game, the number pay lines, rates, winning combinations, bonus games etc. At the same time, it is checked (to the extent necessary) that the IP game rules presented to the user correspond to the actual ones.

8.1.1.2. The completeness and timeliness of the presentation to the user of the processed information corresponding to each game state of the IP, the conditions for the transition from one to another, as well as their number.

8.1.1.3 The completeness and timeliness of the receipt by the user of the processed information corresponding to each item of the service menu, as well as ways to access and navigate through the items of the service menu.

8.1.1.4 The procedure (method), completeness and timeliness of obtaining the processed information when using both basic (regular) and additional software and (or) hardware.

8.1.2. IE IADV is considered to have passed testing for compliance with the requirements for the availability of the processed information, if during the testing process the program provides authorized access to the processed information in the ways provided for by the technical documentation.

8.2. IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS FOR THE INTEGRITY OF PROCESSED INFORMATION

8.2.1. All the functionalities of the IP IADV declared in the technical documentation are checked and their compliance with the submitted technical documentation is determined. IP IADV is being investigated for the presence of functionality not described in the technical documentation (including those that allow changing the composition of the IP), as well as for undeclared influence from other (other) software.

8.2.2. If there are functionalities that allow you to change the composition of the approved type of IP IADV (changing the version of the IP, etc.) and described in the technical documentation, the possibility of changing the composition of the IP is investigated and its compliance with the submitted technical documentation is determined.

8.2.3. The response of the IP when receiving invalid input data is checked, as well as the possibility of entering invalid data when setting up and initializing the IP.

8.2.4. The presence and sufficiency of means of protecting the integrity of the IP and the information being processed is checked. For this:

8.2.4.1. IP failures are simulated (power off, deliberate introduction of functional defects and changes), which can lead to a violation of the integrity of the IP and the information being processed. The reaction of the IP to the specified failures is checked, including the presence of warnings (visual and (or) sound signal) about the need to complete the work.

8.2.4.2. The IP identification methods (self-identification and (or) using additional software and (or) hardware) and methods of working with them are checked. The compliance of identification methods with the level of required protection of IP and processed information is assessed.

8.2.4.3. Mechanical means of protecting the integrity of the IP and processed information (locks, seals, control labels, etc.) are checked.

8.2.4.4. The presence of the event log and entries in it is checked, fixing the violation of the integrity of the IP and (or) processed information as a result of failures or changes of an accidental or intentional nature, as well as the possibility of editing and deleting entries in the event log.

8.2.5. IP IADV is considered to have passed testing for compliance with the requirements for the integrity of the information being processed, if as a result of testing it is established that the functionality of the IP is described in the technical documentation, as well as the availability of means for detecting, designating and protecting against failures (functional defects) and changes of an accidental or intentional nature in accordance with with the provided technical documentation.

8.3. IP TESTING FOR COMPLIANCE WITH THE REQUIREMENTS FOR THE PRIVACY OF PROCESSED INFORMATION

8.3.1. Based on the analysis of technical documentation, the following is checked:

8.3.1.1. Organization of a way for a user to access confidential processed information, as well as a procedure for changing the parameters of access to it. In the event that access to confidential processed information is multilevel, then the organization of the user's access method to confidential processed information of each access level is checked.

8.3.1.2. Organization of a way to access confidential processed information using both basic (regular) and additional software and (or) hardware, as well as the procedure for changing the parameters of access to it.

8.3.1.3. Availability and sufficiency of means of protecting processed confidential information from unauthorized access and changes.

Remedies may include:

Coding with the organization of the user's access to confidential processed information (for example, the use of passwords);

Coding without organizing a way for a user to access confidential processed information (for example, using an electronic signature (checksum) of files containing confidential processed information);

Software event log;

Mechanical means of protection (locks, seals, labels).

8.3.2. During this test, the following tests may be performed:

The reaction of the IP to the repeated input of incorrect information during authorization is checked;

The procedure for changing authorization parameters is checked.

8.3.2.2. Checking the software event log:

The appearance of the corresponding entry in the event log is checked after accessing and changing confidential processed information;

The possibility of editing and deleting entries in the event log is checked.

8.3.2.3. The response of the power supply to the operation of mechanical means of protection is checked (visual and (or) sound signal, entry in the event log).

8.3.3. Depending on the features of the IP and IADI, other tests of the means of protecting the processed confidential information of the IP can be performed.

8.3.4. SP IADV is considered to have passed testing for compliance with the requirements for confidentiality of processed information, if as a result of testing it is established that there are means of authorizing access and protecting confidential processed information from unauthorized access.

8.4. DEVELOPING A TESTING PROTOCOL

8.4.1. After the examination of the IP IADV in order to detect undeclared capabilities, a testing protocol is drawn up, the form of which is given in the Appendix.

8.4.2. The results of the IADV test for the purpose of type approval, confirming the random nature of the game process and the absence of a violation of the established average winning percentage, are entered into the protocol for testing the IP IAVA.

8.4.3. The results of the verification of technical documentation and testing, establishing the presence or absence of violations of the requirements for confidentiality, accessibility and integrity of the information being processed, are entered into the test protocol of the IE IADV.

9. PROCEDURE FOR EXAMINATION OF SP TO DETECT UNDECLARED OPPORTUNITIES

9.1. The objectives of the examination of the IP IADV, the organizations conducting such an examination, the requirements for experts and the results of the examination are set out in paragraph of this recommendation.

9.2. Documents submitted for examination are drawn up in accordance with the requirements of clause of this recommendation and are submitted both on paper and in in electronic format on CD.

9.3. The procedure for the examination of IP IAADV includes:

Submission of an application for examination, the form of which is given in the Appendix and the necessary documentation to the CIIA;

Making a decision on the application (taking into account the completeness and sufficiency of the submitted documentation) and appointing experts (expert) to conduct the examination (refusal to conduct an examination is possible if the materials submitted by the applicant are insufficient for the examination);

Submission to CIIA IP in electronic form and, if necessary, on the original medium;

Development of a testing program for IP IADV, the form of which is given in the Appendix;

Carrying out verification of technical documentation and IP testing;

Submission of examination materials (testing program, test protocol and IP in electronic form and, if necessary, on the original media) to the TsIIA FSUE "VNIIMS";

Conducting an examination of the examination materials submitted to FSUE “VNIIMS” and issuing an expert opinion to the FSUE “VNIIMS” TsIIA on the absence (or detection) of undeclared capabilities in the IP IARV.

9.4. Information on the issuance of an expert opinion is entered into the register of the IE of the IADV Data Bank, which is maintained by the TsIIA FSUE VNIIMS.

9.5. Works related to the examination of the IP IADV, as well as the verification of examination materials, the preparation and issuance of expert opinions, are carried out on a contractual basis.

9.6. If disagreements arise between the CIIA conducting the examination, FSUE "VNIIMS" and the customer of the examination, they are resolved in accordance with the procedure established by the legislation of the Russian Federation.

Annex A

APPROVE

Head of CIIA

FSUE "VNIIMS"

__________________

"___" _______ 200_

Expert opinion

according to the results of testing the IE IADV for the presence of undeclared capabilities, provided by _____________________________________________________________

(name of the organization that submitted the IP for examination)

1. Commission of experts (expert) CIIA ______________________________________

(name CIIA)

composed of ________________________________________________________________________________

conducted testing of IP IADV for the presence of undeclared capabilities.

Testing was conducted in the period from _____ to ______ _________ 200__ at CIIA

(name CIIA)

2. The CIIA that conducted the testing was presented with the relevant

documentation and IP IADV __________________________________________________________

(including the name of the IP with the version)

3. After reviewing the presented IP and reviewing the accompanying documentation, the commission of experts (expert) of the CIIA recognized the materials provided as sufficient for testing.

4. Commission of CIIA experts _______________________________________________

(name CIIA)

tested IP IADV in accordance with MI 3017-2006 approved by Federal State Unitary Enterprise

"VNIIMS" ___________ 2006, specialists of the CIIA FSUE "VNIIMS" verified the submitted materials of the examination of the IP IADV.

5. As a result of the examination, it was found that there are no undeclared features in the IP IAADV: violation of the randomness of the game process, confidentiality, accessibility and integrity of the processed information (in case of detection of non-declared features, their nature is fixed). The expert opinion is drawn up in 2 copies.

Members of the expert commission (expert)

Annex B

TESTING PROGRAM

_________________________________________________,

(name of IP IADV)

submitted for examination and testing __________

__________________________________________________

(name of the applicant organization)

Location

The program contains a description and sequence of procedures for testing the IP IADI in accordance with the recommendations of this methodology (testing for compliance with the requirements for documentation, for the availability, integrity and confidentiality of the information being processed).

The testing program after the presentation of the substantive part is signed by the developers - a commission of experts (expert) of the CIIA conducting the testing of the IP IADV, approved by the head of the CIIA and agreed with the applicant.

Annex B

_________________________________________________

(name of the organization that conducts testing of IP IAVA)

I approve

Head of CIIA

___________________

"__" ________ 200_

Protocol for testing the game program IADV

The name of the program ________________________________________________________

___________________________________________________________________________

Version / Identification number ___________________________________________

IP developer organization _________________________________________________

1. Documentation

Requirement

Present

Missing

Note

IP structure, sequence of data processing (text, graph)

Description of functions, IP parameters

Description of IP algorithms

Description of menus, dialogs, list of commands for each interface

Description of IP identification method

Description of methods for protecting IP and data from inadmissible changes

Error and Fault Messages

IP object code introduced

__________________________________________________________________________________

2. Random gameplay

Requirement

Present

Missing

Note

2.2 Average winning percentage (value)

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

3. Availability of processed information

Requirement

Present

Missing

Note

Timely and complete receipt of the necessary processed information in an authorized manner.

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

4. Integrity of processed information

Requirement

Present

Missing

Note

Changing the IP used in an approved gaming machine.

4.2.

Means of detecting, designating and protecting against failures (functional defects) and changes of an accidental or intentional nature that violate the integrity of the information being processed.

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

5. Confidentiality of processed information

Requirement

Present

Missing

Note

Conclusion: _______________________________________________________________________

__________________________________________________________________________________

__________________________________________________________________________________

Conclusion on the results of testing: ____________________________________

___________________________________________________________________________

___________________________________________________________________________

Performers (positions, surnames, initials, signatures):

Date of testing

Familiarized with (position, surname, initials, signature of the applicant):

The documents attached to this application fully reflect the principle of operation (functioning) of the IE IADV. All produced copies of the IP are made according to the same technical documentation as the samples submitted for examination and are their exact copies.

The Applicant undertakes to pay all expenses for the examination of IP IADV in accordance with the terms of the concluded agreement.

«PECULIARITIES OF EXAMINATION OF GAMING PROGRAMS OF GAMING MACHINES WITH MONEY WIN WITH THE PURPOSE OF DETECTING UNDECLARED OPPORTUNITIES IN THEM Yu.A. ..."

FEATURES OF EXAMINATION OF GAMING PROGRAMS OF GAMING MACHINES

WITH A CASH WIN WITH THE PURPOSE OF DETECTING IN THEM UNDECLARED

OPPORTUNITIES

Yu.A. Kudeyarov, A.Yu. Stefanov, Yu.V. Stefanov

(All-Russian Research Institute of Metrological Service (FSUE

"VNIIMS"))

Since 2000, a system of technical control of the technical and functional characteristics of slot machines with a cash prize (IAV) has been operating in Russia, based on the Law Russian Federation dated April 27, 1993 No. 4871-1 "On ensuring the uniformity of measurements". In the development of Article 13 of the said Law, the State Standard of Russia from April 01, 2000 No.

the rules for metrology PR 50.2.023-2000 developed by the All-Russian Research Institute of Metrological Service (VNIIMS) "GSI. Rules for testing slot machines in order to approve the type and control their compliance with the approved type" (hereinafter - Rules) . These Rules implement two types of state metrological control of IADV: tests for the purpose of type approval and control over compliance with the approved type.

The specified system of testing slot machines with a cash prize and monitoring their compliance with the approved type meets both the interests of the state and participants in activities related to slot machines, is provided with all the necessary components, and operates in almost all regions of Russia (from Kamchatka to Kaliningrad areas, from Murmansk region to the North Caucasus and Altai).



Over the past few years, the development of the gambling business in Russia has necessitated a more detailed regulation of all aspects of its activities. The technical side is no exception. Over the past two years, the legislation in the field of technical regulation of the gambling business has undergone quite significant changes, which resulted in the entry into force of several legal acts, one of which is the "Regulation on licensing activities for the production and sale of special gaming equipment intended for gambling business", approved by Decree of the Government of the Russian Federation of October 6, 2006 N 603 (hereinafter referred to as the Regulation). Clause 3 e. of the Regulations defines the following licensing requirement in the production and sale of slot machines: "the use in slot machines of gaming programs that do not contain undeclared features (functional objects and tools not specified in the accompanying technical documentation, when using which there may be a violation of the confidentiality, availability or integrity of the information being processed)", and clause 5 d of the Regulations says that the license applicant needs to submit to the licensing authority a copy of the document containing the results of the examination of gaming programs used in slot machines and (or) other gaming equipment, in order to establish the absence of undeclared capabilities in them - for each unit of the software product.

It should be noted that this Regulation for the first time introduces such a concept as "undeclared capabilities of the gaming program" of a gaming machine, gives a definition of this concept, and also assigns a procedure for establishing the absence of undeclared capabilities in the gaming program - an examination of the gaming software of a gaming machine.

In an effort to most fully and effectively resolve the issue of state metrological control over slot machines, specialists from the Center for Testing Slot Machines with Cash Win (TsIIA) of FSUE "VNIIMS" from the moment the Regulations entered into force began to develop a regulatory and technical document that defines methods and procedure for conducting an examination of gaming programs (IP) of the IADV in order to detect undeclared features in them.

The result of this work was the methodology MI 3017 - 2006 "GSI. Slot machines with cash prizes. Methods and procedure for conducting an examination of gaming programs in order to detect undeclared features in them" .

MI 3017 - 2006 is intended for use in CIIA and contains a description of the methods and procedures for conducting an examination of gaming programs of slot machines with a cash prize in order to detect undeclared features in them. Wherein we are talking only about those gaming programs that are an integral part of slot machines with cash prizes and determine their functional characteristics.

MI 3017 - 2006 gives a more extended definition of the concept of "undeclared features of a game program" in comparison with the Regulations, namely: "functional objects and tools that are not specified in the accompanying technical documentation or do not correspond to those indicated, the use of which may violate the random nature of the game process (i.e. the appearance of various kinds of trends or patterns in the results of the game), the established average winning percentage, as well as the confidentiality, availability or integrity of the information being processed.

As can be seen from the definition, the game program is examined not only for the presence of functional objects and tools that are not specified in the accompanying technical documentation or do not correspond to those indicated, the use of which may violate the confidentiality, availability or integrity of the information being processed, but also when using which it is possible to violate the random nature of the gameplay (i.e.

the appearance in the results of the game of various kinds of trends or patterns), as well as the established average winning percentage. Such a definition is not given by chance. The fact is that the presence or absence in game programs of such undeclared features as a violation of the randomness of the game process and a violation of the established percentage of winnings by the game program is determined by the already existing system of testing the IADV and monitoring their compliance with the approved type, which are regulated by such regulatory documents as already mentioned the Rules for Metrology PR 50.2.023 - 2000, as well as the methods of MI 2674 GSI. Slot machines with cash prizes. Requirements for the development of test programs for the purpose of type approval", MI 2562 - 2001 "GSI. Slot machines with cash prizes. Methodology for processing statistical information during tests for the purpose of type approval", MI 2662 - 2005 "GSI. Slot machines with cash prizes. Standard methodology for monitoring compliance with the approved type ". Thus, the examination of game programs IADV partially uses the results of the already existing system of testing IADV and monitoring their compliance with the approved type, which undoubtedly reduces time costs and makes the study of the game program for the presence of undeclared capabilities the most complete.

MI 3017 - 2006 contains a number of definitions used in the examination of IP in order to detect undeclared features in them, and also establishes the following requirements for gaming programs used in the IADV:

1. Documentation requirements that determine the required set of technical documentation for submission of a game program for examination.

2. Requirements for the randomness of the game process, which consist in the fact that the IP used in the IADV should provide a win only depending on the case (i.e., there should be no various kinds of trends or patterns in the results of the game). The average percentage of winnings technologically incorporated in the IP cannot be lower than a certain value established by law.

The compliance of the properties of the IP with the requirements of the randomness of the game process is confirmed during the tests of the IADV in order to approve the type based on the processing and analysis of statistical information in accordance with MI 2562 - 2001.

3. The requirements for the availability of processed information provide that the IP used in the IADV must provide the possibility of timely and complete receipt of the necessary processed information in an authorized way. In other words, the IP must ensure that the necessary information is presented in such a way that the player or other user has a complete and unambiguous understanding of all the possibilities of the IP associated with the game process (credit amount, bet per line, number of active lines, service menu, game rules, conditions for bonus drops, key assignments, etc.), as well as the state of the game process at each moment of time.

In accordance with these requirements, the processed information, the possibility of obtaining which is provided by the IP, the completeness of its content, as well as the procedure (method) for its receipt, including using additional software and (or) hardware (protocols), must exactly correspond to technical documentation accompanying IP.

These requirements contain a ban on the use of software and (or) hardware for receiving, transmitting, interpreting and using processed information that is not specified in the technical documentation for the IP.

At the same time, the requirements allow violation or restriction of the availability of the information being processed, but only in cases provided for by the technical documentation accompanying the IP (for example, in the event of failure protection).

4. The requirements for the integrity of the information being processed consist in the impossibility of changing the game program after the approval of the IADV type. For each copy of the IADV of the approved type, an exact copy of the IP of the IADV that has passed the test for the purpose of type approval is used. At the same time, it is not allowed to change both the entire IP and its individual parts (graphical interface, text messages, sound design, service menu elements, etc.).

In addition, the IP used in the approved type of IADV should not contain functionality that changes the composition of the program itself and is not described in the accompanying technical documentation. If such functionality is present and described in the accompanying technical documentation (changing the version of the IP component, etc.), then the examination of the IP is carried out again after each change in the IP.

The IP of the gaming machine, in accordance with these requirements, is developed in such a way that it is not affected by other software.

The requirements for the integrity of the information being processed oblige the IP to contain means of detecting, designating and protecting against failures (functional defects), as well as changes of an accidental or intentional nature that violate the integrity of the information being processed (checksum, digital signature, etc.) .

In the event of a failure or changes in the processed information of an accidental or intentional nature, the requirements require the SP to issue a warning (visual and (or) sound signal) about the need to shut down the work or provide for a situation of emergency shutdown.

5. The requirements for the confidentiality of processed information oblige the IP used in the IADV to contain means of authorizing access to confidential processed information and protecting confidential processed information from unauthorized access. The main task of the means of authorizing access to confidential processed information is to provide access to confidential processed information to an authorized user and deny access to an unauthorized user. Also, IP must ensure the protection of confidential processed information during its storage and transmission (using an electronic signature, encryption or other means).

When examining IP IADV in order to detect undeclared capabilities, according to MI 3017 - 2006, two methods are used:

1. IADV type approval tests confirming the random nature of the game process and the absence of violation of the established average winning percentage.

2. IP testing in order to detect violations of the requirements for confidentiality, availability and integrity of the processed information.

Type approval tests by the IADV, confirming the random nature of the game process and the absence of violation of the established average winning percentage, as mentioned above, are determined by the system of testing slot machines with cash prizes and monitoring their compliance with the approved type.

IP testing in order to detect violations of the requirements for confidentiality, availability and integrity of the processed information, in turn, includes the following steps:

1. Carrying out verification of technical documentation;

2. Testing IP for compliance with the requirements for the availability, integrity and confidentiality of the processed information;

3. Drawing up an IP testing protocol.

During the verification of technical documentation, the sufficiency of the set of submitted technical documentation is assessed, and an analysis of the structure and completeness of its content is carried out. Special attention is given to the version of the game program, the software necessary for its operation, its structure, implemented algorithms, description of links with other software, as well as methods for receiving and transmitting processed information. The description of the implemented methods (user authorization, event log, data encoding, etc.) is also checked to protect the software and processed information from unacceptable changes and failures.

The results of the verification of technical documentation, including identified non-conformities obtained from the analysis of software documentation, are recorded in the testing protocol.

Testing IP for compliance with the requirements for the availability of processed information consists in checking, based on the analysis of technical documentation, the completeness and timeliness of providing the user with information about the features of the game. In particular, information about the rules of the game, the number of paylines, bets, winning combinations, bonus games, etc. is checked in the IP help menu. At the same time, the conformity of the IP game rules presented to the user with the actual ones is controlled (to the required extent).

In addition, the completeness and timeliness of the presentation to the user of the processed information corresponding to each item of the service menu, each game state of the IP, as well as the conditions for the transition from one to another and their number are investigated.

Special attention is paid to checking the order (method) of obtaining processed information when using both basic (regular) and additional software and (or) hardware.

An individual entrepreneur is considered to have passed testing for compliance with the requirements for the availability of processed information if, during the testing process, the program provides authorized access to the processed information in the ways provided for in the technical documentation.

When testing the IP for compliance with the requirements for the integrity of the information being processed, all the functionality of the IP declared in the technical documentation is checked and their compliance with the submitted technical documentation is determined. The IP is being investigated for the presence of functionality that is not described in the technical documentation (including those that allow changing the composition of the IP), as well as for undeclared influence from other (other) software.

We study, in particular, the reactions of the IP when receiving invalid input data, as well as the possibility of introducing invalid data when setting up and initializing the IP. It also checks the availability and sufficiency of means of protecting the integrity of the IP and the information being processed. For this, for example, IP failures are simulated (power off, deliberate introduction of functional defects and changes), which can lead to a violation of the integrity of the IP and the processed information. The reaction of the IP to these failures is studied, including the presence of warnings (visual and (or) sound signal) about the need to complete the work.

The IP is considered to have passed testing for compliance with the requirements for the integrity of the information being processed if, as a result of testing, it is established that the functionality of the IP is consistent with those described in the technical documentation, as well as the availability of means for detecting, designating and protecting against failures (functional defects) and changes accidental or intentional nature in accordance with the submitted technical documentation.

Testing the IP for compliance with the confidentiality requirements of the processed information consists of checking the organization of the user's access method to the confidential processed information, as well as the procedure for changing the access parameters to it. In the event that access to confidential processed information is multilevel, then the organization of the user's access method to confidential processed information of each access level is checked.

When testing IP for compliance with the requirements for the confidentiality of the processed information, the availability and sufficiency of means of protecting the processed confidential information from unauthorized access and changes are examined.

An individual entrepreneur is considered to have passed testing for compliance with the requirements for confidentiality of processed information if, as a result of testing, it is established that there are means of authorizing access and protecting confidential processed information from unauthorized access.

Examination of game programs is carried out by a commission of experts (experts) of the CIIA at the testing stage of the IADV for the purpose of type approval (after the type approval of the IADV) carried out by CIIA accredited for such tests.

After the examination of the IP in order to detect undeclared capabilities, a testing protocol is drawn up, in which the results of the IADV test for the purpose of type approval are entered, confirming the random nature of the game process and the absence of violation of the established average winning percentage, as well as the results of the verification of technical documentation and testing, establishing the presence or absence of violations of the requirements for confidentiality, availability and integrity of the information being processed.

The examination materials (testing program and test protocol) are submitted to the TsIIA FSUE "VNIIMS" for the preparation of an expert opinion. The final result of the examination is an expert opinion issued by the TsIIA FSUE "VNIIMS", confirming (or not confirming) the presence of undeclared features in the game programs used in the IADV.

The MI 3017 - 2006 developed by FSUE "VNIIMS" allow for the full examination of IADV gaming programs, as required by the legislation of the Russian Federation in the field of state technical regulation. The methods proposed in MI 3017 - 2006 for the examination of IP in order to detect undeclared opportunities have a number of advantages compared to other methods. These include, for example, a relatively short period of examination, which is achieved through the use of an already existing testing system for IADV and control over their compliance with the approved type, the relative ease of performing all stages of the examination, the possibility of implementing an examination throughout the territory of the Russian Federation for through the use of accredited CIIA.

At the same time, any methods, including the methods for conducting the examination of IP IABV, need constant development and improvement. Many methods, such as, for example, the most effective in our opinion, the method of analyzing the source codes of IP IADV, are associated with a significant amount of difficulties, both of a legislative nature (imperfection of copyright legislation), and with unreasonably large time and material costs. We see the future in the improvement of the methods for conducting the examination of IP IAVA, as well as in the creation of new methods and methods for testing IAVA, which use to a greater extent than on this moment, the potential of mathematical statistics.

Bibliography.

1. PR 50.2.023-2000 "GSI. Rules for testing slot machines in order to approve the type and control their compliance with the approved type."

2. "Regulations on licensing activities for the production and sale of special gaming equipment intended for the gambling business", approved by Decree of the Government of the Russian Federation of October 6, 2006 N 603.

3. MI 3017 - 2006 "GSI. Slot machines with cash prizes. Methods and procedure for conducting an examination of gaming programs in order to detect undeclared features in them."

4. MI 2674 - 2001 "GSI. Slot machines with cash prizes. Requirements for the development of test programs for the purpose of type approval".

5. MI 2562 - 2001 "GSI. Slot machines with cash prizes. Methods for processing statistical information during tests for the purpose of type approval".

6. MI 2662 - 2005 "GSI. Slot machines with cash prizes. Standard methodology for monitoring compliance with the approved type."

Annotation.

Methods for conducting an examination of gaming programs of slot machines with
responsibility for the consequences. The further technical systems... "the idea that in bu ... "STATE TECHNICAL UNIVERSITY (NOVOCHERKASSKY POLYTECHNICAL INSTITUTE) SUMMARY OF LECTURES "SOCIAL PSYCHOLOGY" Lecturer Didenk ... "

“Technical specifications Power supply .............. 50 Hz 220 V Maximum power .............. 90 W Heating element (TEN) ... ......... 2x45W Fuse ..............»

2017 www.site - "Free e-library- different materials"

The materials of this site are posted for review, all rights belong to their authors.
If you do not agree that your material is posted on this site, please write to us, we will remove it within 1-2 business days.

Leave a request for examination

Expertise lottery equipment This includes a whole range of studies conducted to detect the presence of latent algorithms in machines, and in machines - information arrays and parts of the constituent mechanisms that are closed to control, established in order to influence the results of the draws.

After all, lottery equipment is a technical device specially manufactured and used only for all kinds of lotteries. This equipment must be equipped with lottery software.

When Lottery Hardware Is Investigated

For any disputes that directly or indirectly relate to disputes related to lottery equipment, you should immediately seek help from NP NC "NEiS". We provide high-quality professional services, and the terms of the study are very short.

In practice, most often this species research is required if:

  • presence of an order government organizations who control the lottery equipment;
  • the emergence of the need to establish the presence or absence of latent control mechanisms;
  • the need to determine the conformity of the lottery strategy and the programmable part of the equipment;
  • the emergence of the need to identify the technical components of the equipment;
  • the emergence of a need to determine the compliance of the hardware components of the equipment with the certification documentation;
  • the need to identify an element that arbitrarily determines the results of the payoff.

It is not uncommon for the administration of this type of business itself to initiate an examination of lottery equipment in the event of a case initiated on suspicion of cheating.

Modern lotteries

When conducting modern lotteries, there is no need to replicate special lottery tickets. And, although replicated lotteries still exist, the most popular have become lotteries, in which participation is accepted electronically - registration in specialized lottery terminals. Such drawings are instantaneous, and the amount of winnings is calculated after receiving a fee for participating in the lottery from the player.

Similar lottery terminals use different statistical algorithms in their activities to identify winning numbers. The purpose of the examination of lottery equipment is to determine the legitimacy of the algorithms used - the compliance of the client's winning opportunity with the mathematically expected result. When testing lottery equipment, the real randomness of the distribution of the percentage of winnings is investigated.

Stages of the examination

In our expert center, the examination of lottery equipment is carried out according to a certain methodology, which implies a certain procedure:

  1. Research of accompanying documentation.
  2. Direct analysis of a piece of equipment.
  3. Drawing up an expert report.

At the first stage, our specialist will analyze the existing technical documentation on equipment. Additionally, the possibility of configuring the equipment in one way or another is being investigated. During the examination, it is also necessary to provide documentation confirming the legality of the purchase of equipment and the complete set of the delivery itself.

At the second stage, the actual study of the lottery equipment itself is carried out. It includes:

  • visual inspection of the equipment and the place where it is installed;
  • analysis of the technical components of the object under study;
  • examining electronic components for improper system algorithms;
  • identification of closed structural units that cannot be controlled.

At the final stage of the study of lottery equipment, an expert opinion is prepared. Specialist of NP NTs "NEiS" draws up a written opinion, signs it (responsible for it accordingly) and hands it over to the customer. Copies of all examined documents, a description of specific actions and expert conclusions are attached to the expert opinion. Expert opinion is determined by the judiciary as evidence.

Questions to the expert

In order for the expert opinion to become one hundred percent proof of your innocence when considering your dispute in court or as confirmation of your innocence before law enforcement agencies, experts should ask precise and capacious questions.

Here are examples of the most typical of them:

  • Are there elements in the object of study that determine the result of winning?
  • Are there algorithms in the software that determine the player's specific winning percentage?
  • Are there hidden elements in the technical design of the object that are not subject to external control?
  • Does the hardware part of the lottery equipment comply with the certification documents?
  • Does the program element of the object comply with the lottery conditions?
  • Is it possible to set up the lottery equipment in such a way as to predetermine the result of the drawing?

Expertise of slot machines- is a kind of computer-technical expertise and allows you to establish important circumstances and facts, many of which play a decisive role in sentencing or in resolving a dispute. Examination of slot machines, gaming equipment and gaming programs - this is a set of studies that are carried out in order to detect undeclared features in gaming programs, as well as to establish whether the equipment submitted for expert examination is gaming or lottery.

Examination of slot machines, gambling and lottery equipment is carried out according to a certain scheme, the same for almost all cases of examination. The scheme implies the following procedure:

Conditions for conducting an expert inspection of slot machines or gambling equipment

To conduct an inspection, you need a room with the ability to connect to the mains, the presence of keys, knowledge of passwords.
It is possible to conduct research on system electronic boards, each of which must have a tag with an inscription from which machine it was withdrawn. The boards can be sent to LLC "CEAiE" separately from the bodies of the machines. In this case, the departure of specialists is not planned.

The following questions may be asked to resolve the examination:

1. Is the equipment presented for research gaming or entertainment?
2. What is the functional purpose and principle of operation of this equipment?
3. Are the electronic boards that are submitted for examination intended for gambling?
4. Are the electronic boards submitted for examination correct or not?
5. What software is reproduced in the memory of electronic boards submitted for examination?
6. Is this software gaming (lottery, entertainment)?
7. What element of electronic boards contains software?
8. What is the functional purpose of the electronic boards submitted for research?
9. What is the date of the last software reinstallation, date of initialization or data reset of the storage devices?
10. Determine the technically based average winning percentage of a slot machine?
11. ETC

Examination of slot machines and gambling equipment is carried out in the following cases:

1. Expertise gambling equipment if necessary, determine the algorithms that determine the results of the draw
2. Examination of slot machines and gambling equipment as prescribed by regulatory authorities
3. Examination of slot machines and gambling equipment, if necessary, to determine the compliance of the software part of the device with the lottery
4. Examination of gambling equipment, if necessary, to determine the conformity of certification to the hardware
5. Independent expertise gambling equipment, if it is necessary to determine the technical component of lottery equipment
6. Examination of gambling equipment, if necessary, to identify hidden elements

Payment for expert services is calculated individually, based onthe number of questions posed as an expert task andamount of play equipment.

The Center for Economic Analysis and Expertise meets all the requirements of Russian legislation in the field of appraisal, economic, construction, financial and other expertise and has the right to provide it on the territory of the Russian Federation. To use any services of examination and evaluation - contact us using Call us, we will help!