Every draw is verified on an independent system.

Despite protective security measures, electronic draw systems can be manipulated. They are also subject to hardware and software errors. Szrek tackles this threat by offering RNG systems with proof of integrity, an effective solution for the detection of faults and deterrence of fraud.

see more

The digital signature is verifiable with a public key.
The HSM incorporates an embedded RTC (Real Time Clock) on the device and a digital signature counter. Each signature and every random number generated is accounted for.

see more

Each and every draw is verified on an independant system.
Despite protective security measures, electronic draw systems can be manipulated. Szrek tackles this threat by offering RNG systems with proof of integrity, an effective solution for the detection and deterrence of fraud.

see more

The digital signature is verifiable with a public key.
The HSM incorporates an embedded RTC (Real Time Clock) on the device and a digital signature counter. Each signature and every random number generated is accounted for.

see more

The method allows verification of the specific HSM being used and any additional draw information

Complete security & fraud-detection system

Essential RNG security features address
the vulnerabilities of traditional RNG systems
complete security system rng diagram
proof-of-integrity
proof of integrity
non-repudiation of draws – can be viewed anytime on the independent system
Integrated with Internal Control System
integrated with ICS*
internal control system
fraud detection is part of our future-proof security system
fault and fraud detection
including RNG hardware failure and insider attacks
future proof security means detection, and legal protection!
legal protection
proof of integrity may be used in court
Each step of the draw is transparent and tamperproof.
tamper proof
hardware and software
Since draw information is digitally signed and time is stamped, it can be verified.
reliance standard algorithms
no privleged secret information known to any part
an independent audit provides built-in proof of integrity for verification
remote access
monitoring of draws without compromising security