| http://www.w3.org/ns/prov#value | - As described in greater detail below, the technique of the present invention may be used: (1) to verify selected patterns of files, images, data, code, or other information; and/or (2) to identify unauthorized or anomalous patterns of files, images, data, code, or other information associated with the gaming machine and/or its peripheral components.
|