`
`BIOMETRIC BROADBAND GAMING
`SYSTEM AND METHOD
`
`[5
`
`20
`
`25
`
`30
`
`Inventor(s):
`
`Michael A. Kerr
`302
`Chimney Rock Rd.
`Stateline, NV 89449
`
`Assignee:
`
`Entity:
`
`NONE
`
`Small
`
`Attomey for
`
`Applicant(s):
`
`Michael A. Kerr
`P. O. Box 2345
`Stateline, NV 89449
`Tel: (775) 588-9498
`Fax:
`(775) 588-9788
`Reg. No. 42,722
`
`35
`
`Attorney Docket Number: Kerr 01.003
`
`
`
`Patent Owner NexRF Exhibit 2002, Page
`
`1 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 1 of 313
`
`
`
`Page 2
`
`BIOMETRIC BROADBAND GAMING
`SYSTEM AND METHOD
`
`10
`
`15
`
`20
`
`CROSS REFERENCES TO RELATED APPLICATIONS
`
`is a
`continuation-in-part of provisional patent application
`This patent application
`60/266,856 filed on
`February 6, 2001.
`
`BACKGROUND OF THE INVENTION
`
`1. Field of Invention
`The present invention is a biometric broadband interactive gaming system and
`method. More
`the biometric broadband interactive gaming system and method
`particularly,
`operates in a networked environment whichinterfaces with a
`plurality of network access
`devices including personal computers, wireless devices, and interactive set-top boxes.
`
`2. Description
`Therelated art includes
`
`of Related Art
`
`gaming devices, on-line
`
`gaming,
`
`networked interactive
`
`25
`
`gaming,
`
`and biometrics.
`
`Devices
`Gaming
`For purposesofthis patent, the term
`shall refer to either gambling and/or
`“gaming”
`gaming applications. Gaming devices include gamesof skill and games of chance. Games of
`chance include many casino-type gaming devices in which the outcome of the game depends,
`a
`game of chance may use a
`on a
`event. For example,
`at least in part,
`randomly generated
`a random or
`to generate
`pseudo-random number. The random
`random numbergenerator
`predefined table to determine the outcome ofthe event.
`
`number maythen be comparedto a
`If the random numberfalls within a certain range of numbers on the table, the player may win
`predefined prize. The table may
`a
`also contain display information that allows the gaming
`
`30
`
`35
`
`
`
`
`Patent Owner NexRF Exhibit 2002, Page
`
`2 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 2 of 313
`
`
`
`3
`
`Page
`
`a
`
`that
`
`player
`
`combinesletters or
`
`device to generate
`to the outcome of the game. The
`gaming device
`display
`corresponds
`present the outcomeof the game on
`may
`large variety of display devices, such as
`mechanical spinning reels or video screens.
`a skill component in which a
`Games of skill comprise
`answers
`overcomes
`words (word puzzles),
`questions (trivia),
`challenges (video games),
`a game of
`competes with other players (networked video games), and the like. Generally,
`a level of skill which does not
`skill is a game requiring
`on chance. Some games of
`rely solely
`a
`and other gamesofskill require very
`high degree of expertise and
`skill require
`or
`limited
`
`expertise
`
`knowledge.
`
`knowledge
`
`On-Line Gaming
`In June 2001, Nevada signeda bill that could result in Nevada beingthefirst state to
`over the Internet. The new law authorizes state
`offer
`to
`legalized gambling
`gaming regulators
`set up an infrastructure to license and oversee online gaming in Nevada when such gaming
`a federal issue whoselegality is unclear at present.
`becomeslegal. Online gamingis
`A variety of technological limitations have been asserted as
`preventing Congress’s
`endorsement of on-line gaming. These technologicallimitations are related to the preventing
`of underage gambling, controlling of gambling addiction, and ensuring the security and
`reliability of on-line gaming is secure andreliable.
`art systems and methodsuse
`To prevent underage gambling prior
`passwords,
`ID’s, credit cards and
`to agree to
`“click-through” agreements that ask the player
`being of
`on a button. Presently, there are no
`systems and methodsto
`legal gambling age by clicking
`secure
`control on-line gambling addiction. With respect to
`ensuring that on-line gamingis
`art systems and methods use various cryptographic techniques such as
`and reliable, prior
`or other similar well known cryptographic methods.
`RSAencryption, digital certificates,
`These cryptographic methodsare
`secure
`helpful in ensuring
`communications, however these
`cryptographic methods do not ensure that the individual accessing
`the on-line gameis a valid
`user.
`
`user
`
`
`
`In view ofthe prior
`needs a user ID and a
`
`art systems,
`
`a minor or other unauthorized individual simply
`to access a
`obtaining of a
`gamingsite. The
`corresponding password
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 3 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 3 of 313
`
`
`
`4
`
`Page
`
`relatively simple task as this information is generally
`user ID and password is a
`not modified.
`Commonly the user ID information is acquired by identifying the web site's naming
`can be easily determined by remembering
`convention for the player. The player password
`or
`the pattern of keys typed by the player during the log-on procedures
`by simply requesting
`diagnostic procedure. Thelatter is a trick
`as
`part of a
`the password from the player
`password problem may be overcome
`commonly used by hackers to access a
`system. The
`on a
`must then rememberthe
`regular basis, however the
`the password
`player
`modifying
`a new passwordis mailed.
`Should the player forget the password
`modified password.
`During the mailing process it is commonfor e-mail to be easily intercepted
`in cyberspace.
`at a certain location by
`Additionally, it is common for unauthorized users to simulate being
`an IP address that identifies an authorized user.
`
`by
`
`submitting
`
`a better system and methodfor identifying
`Therefore,
`a
`Additionally, it would be beneficial to
`gaming system and method that would:
`provide
`to
`implement, prevent gambling addiction, and
`prevent underage gambling, be simple
`a
`higher degree of security and reliability from unauthorizedusers.
`
`a valid user is needed.
`
`provide
`
`protocol
`
`configured
`
`MPEG
`
`Networked Interactive Gaming
`in an open networked environment suchas the Internet
`Networked interactive gaming
`is well-known. However, interactive gaming in an open network suchas the Internetis
`with other devices using the same TCP/IP protocols. Currently
`confined to
`communicating
`are not
`to
`the TCP/IP
`networked interactive gaming systems using
`communicate with interactive set-top boxes
`using
`protocols.
`Networked interactive gaming in an
`open networked environmentusing traditional
`security methods such as secure socket layers and digital certificates are well known.
`However, networked interactive gaming in an open networked environment usingtraditional
`a
`security methods does not prevent gambling from a minor having acquired
`user ID
`consent.
`without the
`and password
`LANs and WANsfor
`Networked interactive
`slot machines
`progressive
`gaming using
`are also well-known. However, networked interactive systems using
`having large jackpots
`secure
`LANs and WANs for progressive slot machines generally exist in a
`
`parent’s
`
`parent’s
`
`highly
`
`proprietary
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page
`
`4 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 4 of 313
`
`
`
`5
`
`Page
`
`network environment. Thus,the creation of a
`progressive slot machine with a
`in an open network environment is not well known.
`
`large jackpot
`
`:
`|
`
`Biometrics
`
`A biometric is a measurable psychological and/or behavioraltrait that can be captured
`and subsequently compared with anotherinstanceat the time ofverification. This definition
`includes the matchingoffingerprints, voice patterns, hand geometry, iris and retina scans,
`vein patterns and other such
`methodologies. For purposesofthe invention described
`heretofore, the definition of biometrics also includes signature verifi cation, keystroke patterns
`and other methodologies weighted towards individual behavior.
`Biometric applications for games ofskill and games of chance are limited, For
`are
`example biometric gamingapplications
`taught in U.S. Patent 6,010,404 granted to Walker
`et al. teaches a method and apparatusfor using player input codes (e.g., numeric, biometric or
`physical) to affect the outcomesofelectronic gambling devices, such as slot machines.
`Additionally, U.S. Patent No. 6,142,876 granted to Cumbers teaches a
`system and method for
`passively tracking the play of players playing gaming devices such as slot machines. Players
`a
`provide identification information and facial recognition data is acquired by
`or video
`digital
`camera. For each player
`an accountfile and
`file ofthe facial image data is stored. When the
`player plays the slot machine, a camerascansthe player and acquires facial image data which
`is comparedto stored data to identify the player. Furthermore, U.S. Patent No. 5,902,983
`granted to Crevelt et al., teaches a
`gaming machine configured to perform EFTtransactions
`whichare limited to preset amounts. Thepatent teaches the use of a
`fingerprint imaging
`device, and retinal scans for verifying
`a
`player’s identity.
`are
`Although biometric applications for gaming applications
`known, biometric
`applications for on-line gaming systems are not known. Furthermore, the managing of
`biometric information and gaming information in an open network environmentis not
`known. Additionally, the use of biometrics in a
`gaming system and method to prevent
`underage gambling and prevent gambling addiction is not known.
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 5 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 5 of 313
`
`
`
`6
`
`Page
`
`SUMMARYOF INVENTION
`
`1.
`
`Advantagesof the Invention
`Oneof the advantagesof the present inventionis that it provides
`on-line gaming system and method.
`A further advantage of the present invention is that it provides
`a user in an
`methodfor
`open network environment.
`identifying
`A further advantageof the presentinventionis that it provides
`prevent underage gambling.
`ofthe present inventionis that it provides
`A further advantage
`reliable and secure
`gaming system and method.
`Another advantage of the present inventionis that it provides
`system and method for
`gaming information in an open network environment.
`managing biometric information and
`a
`Another advantage of the present invention is that it permits
`plurality ofusers ina
`geographically broad areato
`play the same game.
`ofthe present inventionis that it provides
`A further advantage
`gaming system and method.
`Another advantage of the present inventionis thatit simulates a game of chancesuch
`as a slot machine in an on-line environment.
`An additional advantage of the present inventionis that it provides
`
`a secure andreliable
`
`a secure system and
`
`a system and methodto
`
`a more secure and
`
`a
`
`a
`
`pseudo-real time
`
`a networked
`
`20
`
`jackpot.
`
`2.
`
`Brief
`
`Description of the Invention
`The present invention is a networked gaming system that comprises
`a verification
`system, a broadband gaming system anda transactional system. The verification system
`operations include ensuring that a user is a
`a biometric input. The
`registered player by using
`broadband gaming system operations include managing and performing
`at least one game.
`The transactional system operations include providing oversight for each transaction
`conducted by the verification system and the broadband gaming system.
`a verification system for playing the networked
`The present invention comprises
`gaming system. The networked gamesinclude games of chance and gamesofskill. The
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 6 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 6 of 313
`
`
`
`Page 7
`
`module and a network access
`
`designated
`
`operatively coupled
`
`verification system communicates with a biometric input
`a user identification information. The user identification information is
`device to generate
`registration database. If an
`to information in a
`acceptable match is made between
`compared
`the user identification information and the information in the registration database, the user is
`as a
`player. The player then has access to both the broadband gaming system and
`the transactional system.
`Additionally, the present invention includes a broadband gaming system whichis in
`communication with the verification system. The broadband gaming system includes a
`a game. The bufferis
`buffer which stores information about
`players who desire to
`play
`to a random numbergenerator that generates
`a random numberfor each
`in the buffer. A
`module in communication with the random number
`
`player
`paytable
`generator determines the outcome associated with the random numbergenerator. The
`paytable also determines which images associated with the outcomefor each player.
`are stored on a mini video server and then cached in a
`Preferably, the images
`memory
`are
`module. The
`
`images
`
`In its
`
`intelligently buffered for downstream communications.
`plurality of encoders are
`to the memory module
`preferred embodiment,
`operatively coupled
`the broadcast video streams. The
`plurality of encoders encode the broadcast
`caching
`requirements for each network access device. Each encoder
`downstream images according
`to an
`is operatively coupled
`encryption module that encrypts the broadcast. A modulation
`moduleis operatively coupled to the encryption module and modulates encrypted imagesfor
`downstream transmission. Each network access device includes a tuner, a demodulation
`module, and a
`an
`to be viewed by the network access
`decryption module that permits
`
`a
`
`to
`
`image
`
`device.
`
`a transactional system and methodthat
`Furtherstill the present invention provides
`ensures secure communications occur in the verification system and the broadband
`gaming
`system. The transactional system also performs accounting, bonusing, tracking and other
`a
`such functions. Preferably, the transactional system is capable of receiving
`plurality of
`funds from a financial account and
`converting them to credits that are used in the broadband
`
`gaming system.
`
`Patent Owner NexRF Exhibit 2002, Page
`
`7 of 313
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 7 of 313
`
`
`
`Page 8
`
`one
`
`sets
`forth, rather broadly, the more
`The above description
`importantfeatures of the
`present invention so that the detailed description of the preferred embodimentthat follows
`may be better understood and contributionsofthe present invention to the art may be better
`appreciated. There are, of course, additional features of the invention that will be described
`below andwill form the subject matter of claims. In this respect, before explainingat least
`preferred embodimentof the invention in detail, it is to be understood that the invention
`is not limited in its application to the details of the construction and to the arrangementofthe
`orasillustrated in the
`components set forth in the
`drawings. The
`following description
`of other embodiments and of being practiced and carried out in various
`invention is capable
`ways. Also,it is to be understood that the
`terminology employed herein are
`phraseology and
`for the purposeof
`description and should not be regardedas
`
`limiting.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`Preferred embodiments ofthe present invention are shown in the accompanying
`drawings wherein:
`ofa plurality of network access devices.
`FIG. 1a through FIG. 1d provide diagrams
`FIG. 2 is a
`high level diagram of a
`gaming system networkedto a
`plurality of network
`
`access devices.
`FIG. 3 is a block diagram
`ofan illustrative biometric input module.
`FIG. 4 is a block diagram of a
`gaming system configuredto receive a biometric input
`from a network access device.
`FIG.5 is a table of the data fields in a verification system.
`FIG. 6 is a table of the data fields in a broadband gaming system andina transactional
`
`.
`
`system.
`
`FIG. 7 is a block diagram of a broadband
`gaming system.
`FIG. 8 is a flowchart of the registration methodfor the gaming system.
`FIG. 9 is a flowchart of the verification method for the gaming system.
`FIG.10 is a flowchart of the gaming methodfor the gaming system.
`FIG.11 is a flowchart of the method for purchasing credits for the gaming system.
`FIG. 12 is a flowchart of the methodfor storing credits on the gaming system.
`
`Patent Owner NexRF Exhibit 2002, Page 8 of 313
`
`10
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 8 of 313
`
`
`
`Page 9
`
`FIG.13 is a flowchart of the information processed by the broadband gaming system.
`FIG. 14 is a continuation of the FIG. 13 flowchart.
`FIG.15 is a flowchart of the information processed bythetransactional system in
`communication with the broadband gaming system.
`
`DESCRIPTION OF THE PREFERRED EMBODIMENT
`In the
`of the preferred embodiments, reference is made
`following detailed
`description
`to the accompanying drawings, which form
`part of this application. The drawings show, by
`way of
`illustration, specific embodiments in whichthe invention may bepracticed. It is to be
`understood that other embodiments may
`be utilized and structural changes may be made
`departing from the scope of the present invention.
`
`without
`
`NETWORKACCESS DEVICES
`ofillustrative network
`to FIG. 1a through FIG.1d there is shown
`Referring
`plurality
`access devices. Each of the network access devices is configured to be capable of running
`a
`gaming application. Forillustrative purposes the gaming application shown simulatesthe
`spinning reels of a slot machine.
`The network access device in FIG. 1a is a
`a network
`personal computer 10 having
`interface card (not shown) that may beoperatively coupled to a modem (not shown).
`Another network access device shown in FIG. 1b includesa television 12 operatively coupled
`to an interactive set-top box 14 that is operatively coupled to a cable network (not shown).
`The other network access device shown in FIG. Ic is a wireless device 16 such as a
`digital
`or
`personal digital system (PDA)or other such wireless device whichis configured to
`phone
`communicate with a network using wireless networking protocols. Yet another network
`access device is shown in FIG. 1d and includes a
`gaming terminal 18 such as a slot machine
`on a casinofloor that is operatively coupled to a
`plurality of other gaming terminals. It shall
`be appreciated by those skilled in the art of networkingthat the distinguishing feature
`between each of these network access devicesis the type of communicationsprotocols used
`by each device to enable communications between similar network access devices.
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 9 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 9 of 313
`
`
`
`Page 10
`
`operatively coupled
`
`Each of the network access devices either includes a biometric input module
`to the network access device or includes a biometric input module
`to the network access device. A biometric is a measurable
`communicatively coupled
`psychological and/or behavioraltrait that can be captured and subsequently compared with
`another instance at the time ofverification. This definition includes the matching of
`fingerprints, voice patterns, hand geometry, iris and retina scans, vein patterns and other such
`methodologies. For purposes of the invention described heretofore, the definition of
`biometrics also includes signature verification, keystroke patterns and other
`weighted towards individual behavior.
`In one illustrative embodiment, the biometric input moduleis a
`fingerprint
`resident on the gaming terminal 18 wherein the biometric input is a
`In another
`fingerprint.
`input module is the screen 22 of wireless device 16
`illustrative embodiment, the biometric
`wherein the screen is configured
`to receive a biometric input such asa user
`signature. In yet
`anotherillustrative embodiment, the biometric input module is a
`telephone 24 that is
`to receive a voice pattern from a user
`to
`engaging communications with the
`configured
`prior
`interactive set-top box 14. In yet anotherillustrative embodimentthe biometric input module
`is a
`to computer 10 wherein the user is requested
`a
`keyboard 26 operatively coupled
`to
`input
`Anillustrative example of a biometric input module operatively coupled
`keystroke pattern.
`to the network access device is shown in FIG. 1d having the fingerprint
`scanner 20 on the
`gaming terminal 18. Anillustrative example of a biometric input module,e.g. the telephone
`to the network access
`device, e.g. the interactive set-top box
`24, communicatively coupled
`
`methodologies
`
`scanner 20
`
`14, is shown in FIG. 1b
`The biometric input is used to prevent unauthorized gamingactivity
`efficiently
`store credits on the user’s behalf. By way of example
`andnot of
`limitation, unauthorized
`gamingactivity includes underage gaming and players with histories of gambling addiction.
`Additionally, player credits may be stored on a networkso that the player does not need to
`carry coins, paper currency, coupons,credit cards or debits cards to
`a game. It shall be
`play
`appreciated by those skilled in the art
`having the benefit of this disclosure that different
`biometric input modules may be used in conjunction with different network access devices.
`
`andto
`
`Patent Owner NexRF Exhibit 2002, Page 10 of 313
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 10 of 313
`
`
`
`Page 11
`
`GAMING SYSTEM
`Referring to FIG. 2 there is shown a
`high level block diagram of a
`gaming system 30
`in communication with a
`plurality of network access devices coupled
`to a network 32. The
`gaming system includesa verification system 34,
`a broadband gaming system 36 and a
`transactional system 38. The verification system 34 verifies that a user
`a network
`operating
`access device is a
`registered player. The broadband gaming system 36 performs the function
`a game and
`broadcasting the gameresults to each ofthe network access
`of generating
`a
`devices. The transactional system 38 performs
`plurality of functions including tracking
`eachtransaction performed by boththe verification system and the broadband gaming system
`conducting electronic fund transfers.
`
`and
`
`Verification System
`The verification system 34 verifies that a user
`to play the gameis a
`desiring
`registered
`player. The verification system 34 communicates with the biometric input module and a
`network access device to generate user identification information. The user identification
`information includes information such as
`cryptographic keys that are necessary to
`securely
`identify the network access device. The user identification informationalso includes media
`access control (MAC)identification and confirmation of the user Internet Protocol (IP)
`address. The useridentification information is compared to information in a
`registration
`a verification server 42. If an
`database 40 by
`acceptable matchis made betweenthe user
`andthe information in the registration database,the useris
`identification information
`as a
`player. The player then has access to either the broadband gaming system 36
`designated
`or the transactional system 38.
`In an alternative embodimentthe useridentification information is housed in a smart
`card (not shown)thatis in communication with the verification system 34. The
`smart card
`includes a stored biometric which is used to identify the user as a
`player. Cryptographic keys
`are then exchanged betweenthe verification system 34 and the smart card to provide the
`accessto either the broadband gaming system orthe transactional system 38.
`player
`Referring to FIG. 3 there is shown anillustrative biometric input module 50. Byway
`of example,theillustrative biometric input module 50 is a
`scanner.
`It shall be
`fingerprint
`
`10
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page
`
`11 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 11 of 313
`
`
`
`12
`
`Page
`
`having the benefit of this disclosure that the use of the
`appreciated by those skilled in the art
`scanner astheillustrative biometric input module is notrestrictive. A scanned
`fingerprint
`52. After the scanned fingerprint image
`fingerprint imageis collected by the biometric input
`fingerprint image is compressed by the compression module 54. A memory
`is collected, the
`module 56 provides fast memory resources for the compression
`ofthe
`fingerprint image.
`the fingerprint image is encrypted by the encryption module 58 for
`After compression,
`module 58 also includes a memory module 60
`downstream transmission. The encryption
`that provides fast memory resources for the
`encryption of the compressed fingerprint image.
`encrypted compressed fingerprint image is then communicated to network 32 (see FIG. 2)
`An
`using the network interface module 62.
`to FIG. 4 there is shown a block diagram
`ofthe verification system 34. The
`Referring
`to network 32 with network interface module 64.
`verification system is operatively coupled
`to receive user identification information
`The network interface module 64 is configured
`generated by the network access devices and from the biometric input module.
`Preferably,
`the biometric and other user identification information received by the verification system is
`an
`encrypted biometric that is decrypted by decryption module 66. A memory module 68 is
`a fast memory module that expedites the decryption process. After decryption, the
`preferably
`the verification
`biometric and remaininguseridentification information is
`processed by
`those skilled in the art that the verification server 42 may
`
`appreciated by
`house the network interface module 64, decryption module 66 and the memory module 68.
`operative communication with a
`The verification server 42 is also in
`registration database 40.
`The verification server 42 performs the function of matching the user identification
`information collected from the network access device with the
`player information in the
`database 40. Additionally, the verification server 42
`the caching
`registration
`performs
`functions needed to ensure that once a
`an initial game,
`player has been identified during
`
`server.
`
`It shall be
`
`subsequent usage by the same
`player proceeds quickly.
`Preferably, the verification server 42 identifies registered players using
`on the registration database 40. The
`of the registered player residing
`registered
`template
`are referenced with Personal ID numbers. Whena transaction is undertaken the user
`
`a biometric
`
`players
`firstly calls up the particular template from the registration database 40 by inputting
`
`a
`
`Patent Owner NexRF Exhibit 2002, Page
`
`12 of 313
`
`10
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 12 of 313
`
`
`
`Page 13
`
`user
`
`binary
`
`Referring
`
`registration
`
`data fields 70 and user submitted
`
`the user
`
`Personal ID. The Personal ID includes a
`or other such
`particular number,
`ID, password
`identification techniques. The inputting of the Personal ID is accomplished with a familiar
`card or smart card. The correct
`template is called and
`numeric keypad, keyboard, magstripe
`with the biometric sample provided by the user. A
`held in memory ready for comparison
`takes place that results in a
`true or false condition as to the
`identity of the
`comparison
`an
`user. The user is in effect claiming
`the Personal ID and the system is
`identity by inputting
`to the matchingcriteria setup
`subsequently verifying that the claim is genuine according
`within the system.
`to FIG. 5 there is shown the registration
`data fields 72. The
`data fields 70 include data fields that comprise
`data fields include useridentification information
`identification information. The
`registration
`such as
`user name, password, credit card information, and the date and
`player name, address,
`time ofthe registration. The player biometric and Personal ID also comprises the user
`identification information and
`provides unique information about the player. The Personal
`be the same as the user name or
`ID may
`It shall be appreciated by those skilled in
`password.
`the art that some biometric information may be compressed. Furthermore, the user
`identification information includes data about the network access device and the network
`connection such as MACID, JP addresses, browsertype, any cookies resident on the network
`Finally, the user identification system includes cryptographic keys which
`access
`etc.
`device,
`are used to encrypt and decrypt
`the communications between the verification system and each
`of the network access devices.
`The user submitted data fields 72 mirror the registration data fields 70. The user
`a userthat is attempting
`to access the
`submitted data fields receive data generated by
`gaming system 36. The user submitted information is carefully analyzed
`broadband
`that a valid user is being identified.
`It is well known that the connection of one network
`access device to another network access device generates security
`Preferably,
`a fast
`a
`present verification system operates using
`hardware-type firewall that performs
`In its preferred embodimentthe firewall
`stateful multilayer inspection.
`provides packet
`a secure
`protocol such as IPSec. This protocol provides encryption of the data
`filtering using
`at the packet level as well as at the source address level. Without access to the
`
`to ensure
`
`concerns.
`
`the
`
`encryption
`
`Patent Owner NexRF Exhibit 2002, Page 13 of 313
`
`10
`
`1S
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page 13 of 313
`
`
`
`Page 14
`
`a
`
`potential intruder wouldhavedifficulty penetrating the firewall. Additionally,it
`keys,
`a circuit level gateway and an
`would be preferable to provide
`application level gateway. The
`circuit level gateway works onthe session layer of the OSI model or the TCP layer of the
`TCP/IP model and monitors TCP
`handshaking between packets to determine whether a
`requested session is legitimate. The application level gatewayfilters data packets at the
`application layer of the OSI model. A stateful multilayer inspection firewall offers a
`high
`and
`level of security, good performance
`transparencyto end users.
`Referring to FIG. 6 there is shown the player data fields 74 that are generated by the
`broadband gaming system andthe transactional system after the user has been verified to be a
`registered player. The player data fields 74 are used to generate a
`player matrix which is used
`as an additional internal security measure. The playerdata fields 74 include a
`Player ID that
`a
`identifies the player,
`timestamp that provides the date, time in and time out by the player
`during the game. Additionally, the type of game, credits played, and credits remaining are
`monitored. Based on the level of playeractivity
`a bonusis providedto the player. Further
`still the session time for each type of game and the amount
`played during the session is
`monitored to better define the type of gamesthe playerlikes. Transactional informationis
`also monitored and updated, preferably, by the transactional system 38. The transactional
`information includes credit card information, transaction requests, transaction approval,
`conversion of monetary fundsto credits for playing the game, any transfers ofcredits for
`playing the game, and conversions from credits to monetary fundsthatare credited to the
`player’s financial account.
`Preferably, communications between the transactional system and
`the broadband gaming system are conducted in a secure environment using cryptographic
`keys. Althoughthe use of cryptography within the private network may appear excessive,
`oneof the greatest security threats within a
`private network comesfrom its own
`employees.
`Therefore, it is preferable to use internal firewalls for communications between the
`broadband gaming system,the transactional system and the verification system.
`
`Broadband
`
`Gaming System
`
`A more detailed drawing of the broadband gaming system is provided in FIG. 7. The
`dashed boundary in FIG. 7 defines the broadband gaming system 36. After player
`
`15
`
`20
`
`25
`
`30
`
`Patent Owner NexRF Exhibit 2002, Page
`
`14 of 313
`
`Patent Owner NexRF Exhibit 2002, Page 14 of 313
`
`
`
`15
`
`Page
`
`verification is completedat the verification system 34, the broadband gaming system 34 is
`engaged. The broadband gaming system 34 includes a
`player buffer 84 configured to receive
`the players who will be playing the game. The player buffer 84 generates an initial player
`matrix with player data fields 74.
`A countdown timer82 is coupled to the player buffer 80. Preferably, the countdown
`timer 82is also displayed to the player. The countdown timer 82 provides a window oftime
`within whichplayers may join the game. The players that have joined the game before the
`end of the timing periodare stored in the buffer. When the timing period reaches zero the
`initial player matrix is communicatedto the transactional system 38 and to the gaming
`
`10
`
`module 84.
`
`The gaming module 84 provides a gamethatis played by the plurality of players. The
`game may
`include a
`plurality ofdifferent games and the type of gameis notrestrictive to this
`invention. Preferably, the gaming module 84 includesat least one random numbergenerator
`86 and a
`paytable module 88.
`The random numbergenerator 86is operatively coupledto the player buffer. The
`random number generator 86 generates at least one random numberthatis stored in the
`player matrix. In one embodiment,at least one random numberis generated for the plurality
`of players playing the game. In an alternative embodiment, at least one random numberis
`generated for each player. In yet another embodiment,
`a
`plurality of ra