| http://www.w3.org/ns/prov#value | - More specifically, as described in greater detail below (e.g., with respect to FIGS. 8-9), the technique of the present invention may be used: (1) to verify selected patterns of files, images, data, code, or other information; and/or (2) to identify unauthorized or anomalous patterns of files, images, data, code, or other information associated with gaming machine operations.
|