throbber
98/35309
`
`_WO
`
`PCT/AU98/00072
`
`38
`
`of
`
`servers is able to decode messages from the smartcard withoutpossibility
`any server 11
`compromising the system by forging messages.
`To further prevent tampering messages may be paddedout with extra
`each time a messageis
`to
`encryption, that is
`data, prior
`randomly generated
`outto the same
`sent. The messages may
`each time.
`also be padded
`length
`(eg. due to a
`error)
`mustbe resent
`Each time an
`encrypted message
`system
`to determine which
`will be different. It will not therefore be
`possible
`are associated with which events. The recipient may ignore the
`messages
`extra data.
`
`it
`
`e
`
`e
`*
`
`e
`
`Server
`serverfor a traditional distributed
`The server 11 functions much as
`gaming system would, with someadditional features:
`An account is maintained for each smartcard that exists. In addition to
`player accounting and games information the account holds the
`encryption key(s) used for the smartcard and other information required
`monitorsecurity.
`Software to detect tampering.
`Encryption for smartcard communications and highly
`smartcard keys.
`The server 11 reads the gametype played
`and verifies the gamble.
`outcome and amountbet are used to
`account.
`adjust the players
`Any
`.
`discrepancy betweenthe server determined result and that of the game
`or an
`console are either system bugs
`attempt at tampering.
`
`secure
`
`storage of
`
`The
`
`to
`
`Security
`
`Server
`
`Ensuring security of the server 11 may be a difficult and expensive
`on the server 11
`process, In theory any software modifications
`require
`complete recertification of the software.
`server 113 (See Figure 9) may be provided
`An encryption
`physically
`separate the functions of the server 11 and encryption.
`Whensoftware
`on the server 11 the security system does not
`unrelated to
`security is
`changed
`need to be recertified. All communications between the server 11 and
`server 113.
`consoles 12 passes through
`the security
`server 113
`server 11 and security
`To match the bandwidth of the game
`gameservers 11 may be used with one or more
`one or more
`to the application
`servers 113, in any combination.
`security
`Hierarchical Server Architecture
`
`to
`
`Patent Owner NexRF Exhibit 2003, Page 501 of 938
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Patent Owner NexRF Exhibit 2003, Page 501 of 938
`
`

`

`98/35309
`
`_WO
`
`PCT/AU98/00072
`
`39
`
`an
`of servers
`network may
`A
`be constructed containing
`hierarchy
`large
`(See Figure 10). The function of the servers is somewhat different to that
`overa
`server
`described for a
`single level network
`system. Advantages
`single
`are
`possible:
`e
`the top level server 111 the
`When random numbersare
`generated by
`a
`cannot
`high level of control. The top
`operate withoutit, ensuring
`games
`level server 111 is able to maintain
`accurate
`of the
`accounting
`highly
`
`entire system.
`The lowerlevel servers 112 need not have a
`level of security if they
`a
`are determined by
`are not involved in payouts, in which case
`payouts
`higher level server 111 that does have
`level security.
`high
`The low level servers 112 are used for local monitoring and
`and can
`improve response time.
`Ina very large system the load is distributed across
`multiple
`Lowerlevel servers 112 off load communicationstraffic.
`Communications from the console 12 to its server 11 must be
`relatively
`keep games responsive. Communications betweenthelevels of
`fast to
`a
`server need notbe fast, if the top level server 111 generates
`number
`large
`of random numbers and downloads them to the lowerlevel servers 112 for
`later use. Games can
`without immediate communication to the
`proceed
`of random numbers runsout.
`top level server 111 until the supply
`.
`Smartcards 23 may use
`public key encryption(ordigital signatures)
`game outcome messages, with the public key knownto eachof the
`appropriate levels of servers. In this implementation
`both the low level
`level server 111 can
`server 112 and
`track of games and
`keep
`higher
`accounting information. The low level server 112 can
`verify transactions, but
`
`high
`
`accounting
`
`servers.
`
`on
`
`e
`
`*
`
`e
`
`e
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`not
`
`modify
`
`them.
`
`of
`
`are:-
`possible implementations
`Examples
`an entire state, such as Nevada in the
`State wide networks
`spanning
`USAor Victoria in Australia. The lowerlevel servers 112 would be located
`in casinos or clubs and the top level server 111 controlled by the governing
`ofthat state.
`body
`OnInternet a central
`server 113 distributes games
`high security
`servers. The lowerlevel
`to lower security
`(including random numbers)
`to not loose gamesor
`servers 112 have a reduced
`results, but
`responsibility
`for them to
`since it is not
`tamper with games, security requirements
`
`possible
`
`Patent Owner NexRF Exhibit 2003, Page 502 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 502 of 938
`
`

`

`_ WO 98/35309
`
`PCT/AU98/00072
`
`40
`
`are reduced. Attempts
`111.
`
`to tamper
`
`are
`
`easily detected by the top level server
`
`on an
`A low level server 112 is
`aeroplane.
`implemented
`server 112 and ground based high
`Communications between the
`aeroplane
`server 113 may
`slow, or only used when the plane has
`level, high security
`be
`landed.
`
`Verification Server
`In an alternate implementation verification of games and accountsalso
`on a verification server, in addition to verification by the normal
`takes place
`as some
`at
`game server. This enables enhanced security
`types of tampering
`on the system implementation
`server canbe detected, depending
`the game
`a
`used. The verification server may be run, for example, by
`government
`to audit commercial establishments.
`controlled regulator
`of all communications to the smartcard affecting game
`Copies
`outcomes, from the smartcard to server
`reporting game outcomes, and
`by the gameserver to the verification server.
`are sent
`acknowledgments,
`suchthat the verification server can read
`are
`Messages
`encrypted,
`messages between the gameserver and smartcard. This may require that the
`server and
`verification server has the encryption keys shared by the game
`encryption methodis used that allows a three way
`smartcard, or that an
`secure communication. Preferably, the game and verification server cannot
`of the other.
`the identity
`forge
`Verification Mode
`with a verification mode in
`means may be
`The secure
`storage
`provided
`means may downloaded to
`which the memory contents of the secure
`storage
`secret
`an external device. Preferably,
`in the interests of security,
`encryption
`means are not disclosed. Crytographic
`keys stored within the secure
`storage
`an authorised party is able to initiate the
`are used to ensure
`only
`technuiques
`it is the server
`using its secret
`key which is
`verification mode. Typically
`meansis
`authorised, but other parties may be used whenthe secure
`storage
`with a secret verification key. Preferably invocation of device
`provided
`verification disables the secure
`means from futher use, except for
`storage
`are made to memory contents.
`device verification, and minimal changes
`Downloaded Console Code
`Traditional gaming machinesdo notallow the
`of code
`downloading
`because tampered code can cheat the system.
`Because console security is
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Patent Owner NexRF Exhibit 2003, Page 503 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 503 of 938
`
`

`

`_ WO 98/35309
`
`PCT/AU98/00072
`
`41
`
`on the smartcard and encrypted communications, thenit is
`solely dependent
`reasonable to download code to the console 12 as
`part of the game
`perfectly
`code can
`compromise the security of the system,
`No
`possible
`package.
`except in so far as it may mislead the player into the nature of the game
`code may be
`being played. However, to further enhance security,
`or
`authenticated with methods such as
`digital signatures
`appreciated by persons skilled in the art that numerous
`It will be
`variations and/or modifications may be made to the invention as shownin
`or scopeof the
`from the spirit
`the specific embodiments without departing
`invention as
`broadly described. The present embodimentsare, therefore, to
`as illustrative and notrestrictive.
`be consideredin all respects
`
`encryption.
`
`10
`
`Patent Owner NexRF Exhibit 2003, Page 504 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 504 of 938
`
`

`

`_ WO 98/35309
`
`PCT/AU98/00072
`
`42
`
`a
`
`or
`
`outcome information in the secure
`storage
`gamble
`or
`a game
`outcome
`the console to
`
`produce
`
`gamble
`
`CLAIMS:
`gaming systemincludingat least one
`A method of
`1,
`gaming
`operating
`userinterface
`means and
`secure
`console, the console including
`storage
`game and observe a result, the method including
`a userto initiate a
`allowing
`the steps of:
`storing game
`meansforuse
`by
`and
`
`respectively;
`a game
`game, producing
`uponreceipt
`inputinitiating
`outcomeindication
`game and/or gamble
`play sequence including
`or
`outcome information stored in the
`determined by the game
`gamble
`meansaloneor in combination with a user
`secure
`storage
`input.
`The method of claim 1, wherein the information stored in the secure
`to a
`meansis a
`sequential list of outcome information relating
`storage
`on the console.
`sequence of future gamesto be played
`The methodof claim 2, wherein the game outcomeinformation stored
`3.
`means, is in the form of a set
`in the secure
`random numbers
`storage
`an entire game outcome.
`sufficient to
`generate
`The methodof claim 1, wherein the information stored in the secure
`4,
`means is a random numberseed from which outcome information
`on the consoleis
`to a sequence of future gamesto be
`played
`relating
`generated by operation of a random number generator.
`The method of claim 4, wherein the random number generatoris
`as a
`numberalgorithm.
`provided
`pseudo-random
`The method of claim 4 or 5, wherein the game outcome information
`6.
`generated by the random numbergenerator,is in the form ofa set of random
`an entire game outcome.
`numbers sufficient to generate
`The methodof claim 4 or 5, wherein the outcome informationis a
`7.
`outcome and the secure
`random numberused to determine a
`gamble
`meansin the console then chooses a game outcome whichwill
`processing
`outcome.
`achieve that
`gamble
`The method as claimed in claim 7, wherein the game outcome chosen
`8.
`depends upon the game being played.
`oneof claims7 or 8, wherein the game
`The methodas claimed in any
`9.
`the
`is chosen by
`
`2.
`
`storage
`
`5.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`ofa user
`a
`
`a
`
`of
`
`player.
`
`Patent Owner NexRF Exhibit 2003, Page 505 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 505 of 938
`
`

`

`_ WO 98/35309
`
`PCT/AU98/00072
`
`43
`
`the
`
`wherein
`
`The methodas claimedin any oneof claims 7, 8, or 9,
`10.
`gameis chosen by
`console.
`the
`The methodas claimed in any oneof claims 7, 8, 9 or 10, wherein the
`11.
`gamebeing played includesa
`plurality of game outcomes
`correspondingto
`to the random numberandoneof the
`outcome
`the gamble
`corresponding
`game outcomesis chosen by
`console.
`the
`The method as claimed in any one of claims 10 or 11, wherein games
`,
`12.
`or outcomes chosen by the console are chosen at random.
`The methodas claimed in any one of claims 10 or 11, wherein games
`13.
`or outcomes chosen bythe console are chosen sequentially.
`The methodas claimed in any one of the preceding
`claims wherein the
`14.
`meansis removably connectable to or readable and writable
`secure
`storage
`the console.
`by
`to future
`15.
`The method of claim 14, wherein the information relating
`meansis stored before the secure
`gaine outcomesstored in the secure
`storage
`means is connected to the console.
`storage
`meansis a
`The method of claim 15, wherein the secure
`16.
`storage
`with outcome information
`card which is
`preprogrammed
`programmable
`a user and is inserted into the console by the
`before orafter acquisition by
`one or more game outcomeson the respective console.
`user to
`produce
`The method as claimed in any one of claims 1 to 16, wherein the
`17.
`production of the game or
`ina
`outcome determination is
`performed
`gamble
`means
`means connectedto the secure storage
`secure
`by way ofa
`processing
`secure communications
`path.
`The method as claimed in claim 17, wherein communications over the
`18.
`are secured by encryption.
`secure communications
`path
`The methodas claimed in claim 17, wherein communications over the
`19.
`means.
`are secured by physical security
`secure communications path
`oneof claims 17, 18 or 19, wherein the
`The method as claimedin any
`20,
`meansis a smartcard or smartcard chip
`secure
`whichis
`processing
`fixed in the console.
`permanently
`oneof claims 1 to 13, wherein the
`21.
`The methodas claimed in any
`meansis a smartcard or smartcard chip which is permanently
`secure
`storage
`fixed in the console.
`The method as claimedin any one of claims 1 to 20, wherein the
`22.
`meansis a smartcard which is removable from the console.
`secure
`storage
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Patent Owner NexRF Exhibit 2003, Page 506 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 506 of 938
`
`

`

`_ WO 98/35309
`
`PCT/AU98/00072
`
`44
`
`23.
`
`means
`
`storage
`
`The method of claim 21 or 22, wherein the secure
`identification and credit information.
`carries
`player
`one of claims 1 to 14, wherein a
`serveris
`The method of any
`24.
`gaming
`andis in communication with each gaming console, the gaming
`provided
`to calculate the outcomeinformation in relation to a
`server
`being arranged
`means and to send outcome
`game for storage in a secure
`to
`storage
`signals
`meansis located, the method
`the console in which the secure
`the steps of:
`or
`data whichpartially
`server,
`in the gaming
`precalculating
`defines an outcomeof at least one game on one console,
`completely
`and generating and sendingto the respective console a
`signal
`to a user
`the
`initiating the game
`data prior
`indicating
`precalculated
`on the console;
`in the console, receiving the data signal and storing the data as
`information in the secure
`or
`orall of the game
`part
`gambleoutcome
`means.
`storage
`The method of claim 24, wherein the console, uponreceiptof the user
`server
`to initiate a game, generates and sends a
`to the gaming
`signal
`input
`indicating that the stored information has been used to determine the
`or
`outcome.
`respective game
`gamble
`one of claims 1 to 14, wherein a
`gamingserveris
`26.
`The method of any
`provided and is in communication with each gaming console, and each
`to initiate a game, generates and
`console, uponreceipt of the user
`input
`sends a
`to the gamingserver indicating that the stored information has
`signal
`been used to determine the respective game or
`outcome.
`gamble
`The method as claimed in claim 24, 25
`or 26, wherein the gaming
`27.
`server
`the function of an
`server
`accounting
`whereby
`additionally performs
`server is
`to maintain credit account information in
`the accounting
`arranged
`a
`on the gaming system and to send
`relation to a
`game
`player playing
`accounting information to the console on whichthe player
`is
`playing.
`The method as claimedin any oneof claims 1 to 26, wherein an
`28.
`serveris provided
`and is in communication with each gaming
`accounting
`server
`to maintain credit account
`console, the accounting
`being arranged
`on the gaming system and
`information in relation to a
`a game
`player playing
`to send accounting information to the console on which the
`is
`playing.
`player
`
`including
`
`storage
`
`25.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Patent Owner NexRF Exhibit 2003, Page 507 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 507 of 938
`
`

`

`98/35309
`
`_WO
`
`PCT/AU98/00072
`
`45
`
`storage
`
`The method of claim 27 or 28, wherein the console, upon receipt by
`of
`29.
`to initiate a
`the user
`game, generates and sends-data to the accounting
`input
`server to
`account.
`serverto allow the accounting
`the players
`update
`The method of claim 24, wherein the console communicates to the
`30.
`server to
`the game.
`gamingserver data to enable the gaming
`verify
`one of claims 24 to 30, wherein the console saves
`31.
`The method of any
`data sent to each server and uponreceipt of a secure
`signal indicating that
`serverhas received the data thendeletes the data from
`the
`respective
`memory.
`oneofclaims 24 to 31, wherein the
`32.
`The methodof any
`precalculated
`meansin the
`data is transmitted from the gameserverto the secure
`storage
`console and the gameverification data is transmitted by the secure
`,
`server.
`meansto the game
`The method of claim 27, 28 or 29, wherein the accounting data is
`33.
`meansin the console.
`transmitted from the server to the secure
`storage
`means,
`The method of claim 25 or 26, wherein the secure
`is not
`34.
`storage
`server when the gameis
`played, and each
`in communication with the gaming
`server,it will
`time the secure
`means is next connected to the gaming
`storage
`generate and senda signalto the server
`indicating the stored game outcome
`information that has been used.
`The method as claimedin any oneofclaims 24 to 34, wherein
`35.
`signals
`generated by the server and console to transmit game outcomesorto indicate
`to beingsent.
`gaine play,
`encrypted prior
`are each
`The method of claim 35, wherein encrypted signals
`36.
`provided
`suchthatdifferent
`with a
`to
`piece of unique information prior
`encryption
`are different to one another
`signals containing the same gameinformation
`after encryption.
`oneof claims 24 to 36, wherein the
`The method as claimedin any
`37.
`server includes an
`auditing function to check the game and/or gamble
`outcome data returned from the secure device in the console.
`The method as claimed in claim 35, 36 or 37, wherein the game
`38.
`to and
`and decryption of signals
`outcome calculation and the
`encryption
`from the gameserverare
`the smartcard.
`in the console by
`performed
`The method as claimedin any oneof claims 24 to 38, wherein an
`39.
`servers are
`with the console
`hierarchical network of gaming
`provided
`connected to a low order, low security network server which performs
`
`are
`
`low
`
`Patent Owner NexRF Exhibit 2003, Page 508 of 938
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Patent Owner NexRF Exhibit 2003, Page 508 of 938
`
`

`

`security and routine control and communication, while passing high security
`servers
`to
`higher level gaming
`having highersecurity.
`signals
`or
`The method as claimed in claim 1, wherein the game
`40.
`a
`of
`outcome information represents
`plurality
`outcomes which are stored in the secure
`storage
`The method as claimed in claim 40, wherein the game outcome
`41.
`a
`information is stored as
`plurality of game
`list of values representing
`outcomes.
`The methodas claimed in claim 41, wherein all unused values in the
`42.
`storage means, exceptforan initial value, are hidden and playing
`secure
`gamesdiscloses the values one
`one.
`by
`The methodas claimed in claim 40, wherein the game outcome
`43.
`a game outcome, and
`information is stored as aninitial value representing
`values representing subsequent gamesare
`fromtheinitial value
`generated
`a
`number
`algorithm.
`using
`pseudo-random
`.
`The method as claimed in claim 40, 41, 42 or 43, wherein the secure
`44.
`meansis a smartcard or smartcard chip.
`storage
`can redeem the
`The method as claimed in claim 44, wherein the
`45.
`player
`smartcard device at any time for the amountof the last disclosed value.
`The methodas claimed in claim 45, wherein the redemption of the
`46.
`value on the smartcard is carried out via secure communication between
`server.
`smartcard and an
`accounting
`The method as claimed in claim 45 or 46, wherein the last disclosed
`47.
`value of the smartcard is the sum of the value of
`outcomesfor all
`on the smartcard.
`games played
`or 47, wherein uponinitiation
`The method as claimed in claim 45, 46
`48.
`the consoleretrieves the new value of the smartcard
`of a game by
`player,
`an
`device and
`appropriate game sequence.
`displays
`The method as claimed in claim 48, wherein the
`49.
`smartcard device with a fixed numberof values.
`The methodas claimed in claim 49, wherein the smartcard device is
`with a list of predetermined outcomes, and gameplay includes a
`provided
`step in which the player makes a bet on the outcome of each game.
`The method as claimed in claim 50, wherein for each outcome
`51.
`first makes a
`bet, which is written to non-volatile
`disclosed the
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`50.
`
`player
`
`WO 98/35309
`
`PCT/AU98/00072
`
`46
`
`gamble
`predetermined gamble
`means.
`
`gamble
`
`player acquires
`
`a
`
`Patent Owner NexRF Exhibit 2003, Page 509 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 509 of 938
`
`

`

`_WO 98/35309
`
`PCT/AU98/00072
`
`47
`
`is
`
`player
`
`player
`
`on the
`storage
`the smartcard
`
`provided by
`
`on the
`
`memory in the smartcard device, and the total value owedto the
`calculated from the wins andlosses for each bet and outcome.
`The method as claimed claim 51, wherein the
`redeems the
`52,
`smartcard device for a latest value owed to the
`player.
`The method as claimed in claim 52, wherein the secure
`53.
`smartcard device is accessed via controlled access
`device.
`The method as claimed in claim 53, wherein the secure
`54.
`storage
`smartcard is accessed via a secure communications system within the
`console.
`The method as claimed in claim 54, wherein the secure
`55.
`a further smartcard device.
`is
`communications system
`provided by
`oneof claims 40 to 55, wherein the
`The method as claimed in any
`56.
`one of which
`smartcard device is
`with multiple functions, only
`programmed
`is a
`accelerator.
`gaming
`The method of claim 56, wherein the smartcard device is
`57,
`programmed
`a bank ATMcard.
`a credit card and/or
`for use as an ID card and/or
`to access the smartcard
`58.
`The methodof claim 57, wherein the
`protocol
`with another mode of the smartcard.
`device is compatible
`The method as claimedin any oneof claims 24 to 39, wherein the
`.59,
`stateof a
`means
`to the secure
`console sendsa
`storage
`signal
`to the gameto the server.
`gamebeing played
`The method of claim 59, wherein the secure
`60.
`message for transmission to the server.
`The method of claim 59 or 60, wherein the message indicates start of
`61.
`or amountbet.
`game, end of game, player selections, gametype,
`gaming system includingat least one
`gaming console, the console
`62.
`A
`a userto
`means and a userinterface allowing
`secure
`storage
`including
`game and observe a
`initiate a
`result, the system including:
`or
`meansfor storing game
`secure
`storage
`gamble
`a
`or
`information used by the console to
`game
`produce
`outcome; and
`gamecontrol meansin the console arranged
`a
`a
`game and to
`game play sequence
`input initiating
`produce
`a
`outcomeindication determined by
`game and/or gamble
`
`10
`
`15
`
`20
`
`25
`
`‘30
`
`35
`
`including
`
`describing
`
`storage
`
`means encodes the
`
`outcome
`
`gamble
`
`to receive a user
`
`Patent Owner NexRF Exhibit 2003, Page 510 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 510 of 938
`
`

`

`_, WO 98/35309
`
`PCT/AU98/00072
`
`48
`
`storage
`
`outcomeinformation stored in the secure
`the game or
`gamble
`meansaloneor in combination with a user
`input.
`The system of claim 62, wherein the information stored in the secure
`to a
`meansis a
`sequential list of outcome information relating
`storage
`on the console.
`sequenceof future games to be played
`The system of claim 63, wherein the game or
`outcome
`64.
`gamble
`means, is in the form ofa set of
`information stored in the secure
`storage
`an entire
`outcome.
`random numberssufficient to
`generate
`gamble
`The system of claim 64, wherein the information stored in the secure
`65.
`meansis a random numberseed from which outcomeinformation
`storage
`on the consoleis
`to a
`sequenceof future gamesto be played
`relating
`generated by operation of a
`number algorithm.
`pseudo-random
`The system of claim 65, wherein the game outcomeinformation
`66.
`generated by the pseudo-random number algorithm,is in the form ofa set of
`an entire game outcome.
`random numberssufficient to
`The system of claim 66, wherein the outcome information is a random
`67.
`outcome value and the console then chooses a
`a
`numberindicating
`gamble
`outcomevalue.
`game outcome which will achieve that gamble
`as claimedin any oneof claims 62 to 67, wherein the
`68.
`The system
`means is removably connectableto or readable and writable
`secure
`storage
`by the console.
`to future
`The system of claim 68, wherein the information relating
`69.
`means is stored before the secure
`game outcomesstored in the secure
`storage
`means is connected to the console.
`storage
`meansis a
`of claim 69, wherein the secure
`70.
`The
`storage
`system
`with outcome information
`card which is
`preprogrammed
`programmable
`a user andis inserted into the console
`before orafter acquisition by
`the
`by
`one or more game outcomesonthe respective console.
`user to
`produce
`as claimed in any one of claims 62 to 70, wherein a secure
`The system
`or
`outcome
`meansis provided
`to
`produce the game
`gamble
`processing
`way
`a secure
`means
`indication and is connected to the secure
`storage
`
`63.
`
`71.
`
`10
`
`15
`
`20
`
`25
`
`30
`
`generate
`
`by
`
`of
`
`communications path.
`as claimed in claim 71, wherein the secure
`72.
`The system
`processing
`meansis a smartcard or smartcard
`which is
`permanently fixed in the
`
`chip
`
`35
`
`console.
`
`Patent Owner NexRF Exhibit 2003, Page 511 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 511 of 938
`
`

`

`_ WO 98/35309
`
`PCT/AU98/00072
`
`49
`
`storage
`
`meanscarries
`
`serveris
`
`as claimed in any one of claims 62 to 67, wherein the
`73.
`The system
`meansis a smartcard or smartcard chip which is permanently
`secure
`storage
`fixed in the console.
`as claimed in any oneof claims 62 to 72, wherein the
`74,
`The system
`meansis a smartcard or smartcard chip which is removable
`secure
`storage
`from the console.
`The system of claim 74, wherein the secure
`75,
`identification and credit information.
`player
`The system of any oneof claims 62 to 75, wherein a
`76.
`gaming
`gaming console, the server
`in communication with each
`being
`provided
`to calculate the outcome information in relation to a
`gamefor
`arranged
`or
`means and to send game
`storage in a secure
`outcome
`storage
`gamble
`meansis located, and the
`to the console in which the secure
`storage
`signals
`or
`meansforreceiving the game
`outcome
`console including receiving
`gamble
`as the game or
`signal and storing the information carried in the signal
`means.
`outcomeinformation in the secure
`storage
`as claimed in claim 76, wherein the server includes an
`77.
`The system
`means for checking game and/or gamble
`outcomedata returned from
`auditing
`;
`the secure device in the console.
`The system of any one of claims 62 to 75, wherein a
`78.
`gaming
`in communication with each gaming console, the server
`including
`provided
`means for checking game and/or gamble
`an
`outcome data returned
`auditing
`from the secure device in the console.
`as claimedin claim 76, 77 or 78, the server and console
`79.
`The system
`means to encode transmission of
`each includes encryption and
`decryption
`game outcomesand/ortransmissions indicating gameplay.
`as claimed in claim 77, wherein the encryption and
`80.
`The system
`meansin the console is a smartcard.
`decryption
`as claimedin any oneof claims 76 to 80, wherein an
`81.
`The system
`are
`with the console
`hierarchical network of gamingservers
`provided
`security network server which performs
`connectedto a low order, low
`low
`security and routine control and communication, while passing high security
`servers
`to
`level gaming
`having higher security.
`higher
`signals
`as claimed in claim 62, wherein the game outcome
`82,
`The system
`a
`outcomes which
`information represents
`plurality of
`predetermined gamble
`are stored in the secure
`means.
`storage
`
`gamble
`
`serveris
`
`Patent Owner NexRF Exhibit 2003, Page 512 of 938
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Patent Owner NexRF Exhibit 2003, Page 512 of 938
`
`

`

`_.
`
`WO 98/35309
`
`50
`
`PCT/AU98/00072
`
`means
`
`storage
`
`as claimed in claim 82, wherein the secure
`83.
`The system
`is a smartcard or a smartcard
`chip.
`as claimed in claim 83, wherein the secure
`84.
`The system
`hiddenall unused values until disclosed
`to
`
`is
`
`storage device
`a
`by playing
`
`keep
`arranged
`respective game.
`as claimed in claim 84, wherein the console is
`to
`85.
`The system
`arranged
`appropriate game sequence in whichit retrieves, the new value of
`an
`display
`a
`the smartcard device uponinitiation of a
`game by
`player.
`as claimed in claim 85, wherein the smartcard device is
`86.
`The system
`with a fixed number ofvalues.
`originally provided
`as claimed in claim 86, wherein the smartcard device is
`87.
`The system
`list of predetermined outcomes, and the console includes a
`with
`provided
`meansarrangedto receive a bet on the outcomeof a game.
`bet input
`as claimed in claim 87, wherein a non-volatile memory
`88.
`The system
`in the smartcard device for recording player bet values , and the
`provided
`total value owed to the
`player.
`as claimed in claim 88, wherein the smartcard deviceis
`89.
`The system
`provided with controlled access means in communication with the secure
`means for secure communication therewith.
`storage
`as claimed in claim 88, wherein the console is
`90.
`The system
`provided
`with a secure communications system for secure communication with the
`secure
`storage device.
`as claimed in claim 91, wherein the secure
`91.
`The system
`a further smartcard device.
`communications system is
`provided by
`one of claims 83 to 91, wherein the
`as claimedin any
`92.
`The system
`means is
`smartcard device which provides the secure storage
`programmed
`one of which is a
`accelerator.
`with multiple functions, only
`gaming
`The system of claim 92, wherein the smartcard device which provides
`93.
`storage means, is programmedforuse as an ID card and/ora credit
`the secure
`a bank ATM card.
`card and/or
`The system of claim 93, wherein the protocol
`94.
`the secure
`storage means, is
`device which provides
`modeof the smartcard.
`as claimed in any one of claims 76 to 61, wherein the
`95.
`The system
`means
`signalto the server via the secure
`console sends a
`storage
`state of a
`to the server.
`to the
`game being played
`game
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`is
`
`to access the smartcard
`with another
`
`compatable
`
`describing
`
`a
`
`Patent Owner NexRF Exhibit 2003, Page 513 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 513 of 938
`
`

`

`..WO 98/35309
`
`PCT/AU98/00072
`
`51
`
`storage
`
`means encodes the
`
`The method of claim 95, wherein the secure
`96.
`message for transmission to the server.
`The method of claim 95 or 96, wherein the message indicates start of
`97.
`or amountbet.
`game, end of
`game, playerselections, game type,
`gaming console which includes a
`meansfor use in a
`A secure
`98.
`storage
`a userto initiate a game and observea result, the
`user interface allowing
`or
`means
`outcome
`to store game
`secure storage
`gamble
`being arranged
`a
`outcome.
`information used by the console to
`gamble
`produce
`meansof claim 98, wherein the informationstored
`The secure
`99.
`storage
`meansis a
`list of outcome information
`in the secure
`storage
`sequential
`on the console.
`offuture games to be played
`to a sequence
`relating
`meansof claim 99, wherein the game outcome
`100. The secure
`storage
`storage means, is in the form ofa set of
`information stored in the secure
`an entire
`outcome.
`random numberssufficient to
`generate
`gamble
`meansof claim 100, wherein the information stored
`101. The secure
`storage
`means is a random numberseed from which outcome
`in the secure
`storage
`on the
`to a sequence of future gamesto be played
`informationrelating
`generated by operation of a
`number algorithm.
`console is
`pseudo-random
`meansof claim 101, wherein the game outcome
`102. The secure
`storage
`numberalgorithm,is in the
`information generated by the pseudo-random
`an entire
`form of a set of random numberssufficient to generate
`game
`outcome.
`meansof claim 101, wherein the outcome
`103. The secure
`storage
`a
`information is a random numberindicating
`outcomevalue.
`gamble
`meansas claimed in any one claims98 to 105,
`104. The secure
`storage
`connectable to
`wherein the secure
`meansis
`to be removably
`arranged
`storage
`or readable and writable by
`the console.
`meansof claim 98, wherein the information relating
`105. The secure
`storage
`to future game outcomesstored in the secure storage meansis stored before
`meansis connected to the console.
`the secure
`storage
`meansof claim 105, wherein the secure
`106. The secure
`storage
`meansis a
`with outcome
`card which is
`preprogrammed
`programmable
`a user andis arrangedto be
`information before orafter acquisition by
`one or more
`the user to
`‘insertable into the console
`game
`by
`outcomes on the respective console.
`
`storage
`
`produce
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Patent Owner NexRF Exhibit 2003, Page 514 of 938
`
`Patent Owner NexRF Exhibit 2003, Page 514 of 938
`
`

`

`_ WO 98/35309
`
`PCT/AU98/00072
`
`52
`
`meansas claimed in any one of claims 98 to 106,
`107. The secure
`means
`and the secure
`meansis
`wherein a secure
`storage
`processing
`provided,
`by way of a
`to be connected to the secure
`means
`is
`processing
`arranged
`,
`meansis
`secure communications path, and the secure
`arranged
`outcome.
`provide the gamble
`meansas claimed in any one of claims 98 to 103,
`108. The secure
`storage
`means is a smartcard or smartcard chip whichis
`wherein the secure
`storage
`to be
`permanently fixed in the console.
`arranged
`oneof claims 98 to 107,
`means as claimed in any
`109. The secure
`storage
`meansis a smartcard which is removable from the
`wherein the secure
`
`storage
`
`storage
`
`processing
`
`to
`
`storage
`
`storage
`
`console.
`meansofclaim 109, wherein the secure
`110. The secure storage
`meanscarries
`identification and/or credit information.
`player
`111. The secure
`meansof any oneof claims 98 to 110, wherein the
`storage
`server via a
`to communicate with a
`meansis
`secure
`gaming
`storage
`arranged
`to calculate the game or
`gaming console, the server
`gamble
`being arranged
`ga

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket