throbber
I 1111111111111111 11111 1111111111 111111111111111 IIIII IIIII IIIIII IIII IIII IIII
`US00874 7229B2
`
`c12) United States Patent
`Kerr
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 8,747,229 B2
`*Jun. 10, 2014
`
`(54) GAMING SYSTEM NETWORK AND
`METHOD FOR DELIVERING GAMING
`MEDIA
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`(75)
`
`Inventor: Michael A. Kerr, Reno, NV (US)
`
`(73) Assignee: NEXRF, Corp., Reno, NV (US)
`
`( *) Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 145 days.
`
`This patent is subject to a terminal dis(cid:173)
`claimer.
`
`(21) Appl. No.: 12/981,403
`
`(22) Filed:
`
`Dec. 29, 2010
`
`(65)
`
`Prior Publication Data
`
`US 2011/0159952 Al
`
`Jun. 30, 2011
`
`Related U.S. Application Data
`
`(63)
`
`Continuation of application No. 10/681,034, filed on
`Oct. 8, 2003, now Pat. No. 8,403,755, which is a
`continuation of application No. 09/899,559, filed on
`Jul. 5, 2001, now abandoned.
`
`(60)
`
`Provisional application No. 60/266,956, filed on Feb.
`6, 2001.
`
`(51)
`
`(52)
`
`(58)
`
`(2006.01)
`(2006.01)
`
`Int. Cl.
`A63F 9124
`G07F 17100
`U.S. Cl.
`USPC .................................. 463/42; 463/16; 463/25
`Field of Classification Search
`None
`See application file for complete search history.
`
`4,339,798 A
`4,856,787 A
`5,586,937 A
`5,594,491 A
`5,630,757 A
`5,643,086 A
`5,738,583 A
`5,761,416 A
`5,762,552 A
`5,768,382 A
`5,779,545 A
`5,800,268 A
`
`7/1982 Hedges et al.
`8/1989 Itkis
`12/1996 Menashe
`1/1997 Hodge et al.
`5/1997 Gagin et al.
`7/1997 Alcorn et al.
`4/1998 Comas et al.
`6/1998 Mandal et al.
`6/1998 Vuong et al.
`6/1998 Schneier et al.
`7/1998 Berg et al.
`9/1998 Molnick
`(Continued)
`OTHER PUBLICATIONS
`
`"Internet Industry Interacting Gambling Code: A Code for Industry
`Co-Regulation in the Area oflnternet Gambling Content Pursuant to
`the Requirements of the Interactive Gaming Act of 200 l ". Internet
`Industry Association. Dec.2001.
`
`(Continued)
`
`Primary Examiner - Paul AD' Agostino
`(74) Attorney, Agent, or Firm - Michael A. Kerr; Kerr IP
`Group, LLC
`
`ABSTRACT
`(57)
`A gaming server system is described, the gaming server sys(cid:173)
`tem including a verification system, a memory module, a
`centralized gaming server, and a paytable module. The veri(cid:173)
`fication system is configured to access a registration database
`having registration data for registered users. The memory
`module is configured to store images corresponding to at least
`one game outcome, with the images communicated to the
`network access devices. The paytable module is associated
`with the centralized gaming server, and it is configured to
`determine one or more prizes associated with a game out(cid:173)
`come. The centralized gaming server is configured to gener(cid:173)
`ate at least one random game outcome by random generation
`at the centralized gaming server, and configured to access the
`memory module and communicate the images corresponding
`to the random game outcome to the network access devices.
`
`24 Claims, 9 Drawing Sheets
`
`'
`
`L- --------- __________ J
`
`'
`
`

`

`US 8,747,229 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`
`5,851,149 A
`5,871,398 A
`5,902,983 A
`5,971,849 A *
`6,001,016 A *
`6,010,404 A
`6,106,396 A
`6,142,876 A
`6,178,510 Bl
`6,409,602 Bl
`6,500,068 B2
`6,508,709 Bl *
`6,508,710 Bl
`6,527,638 Bl
`6,575,834 Bl
`6,612,928 Bl
`6,628,939 B2
`6,676,522 B2
`6,682,421 Bl
`6,709,333 Bl
`6,709,631 B2
`6,719,631 Bl
`6,749,512 B2
`6,875,110 Bl
`6,884,162 B2
`6,942,574 Bl
`7,107,245 Bl*
`7,338,372 B2
`
`12/1998 Xidos et al.
`2/ 1999 Schneier et al.
`5/ 1999 Crevalt et al.
`10/1999 Falciglia ......................... 463/16
`12/1999 Walker et al .................... 463/42
`1/2000 Walker et al.
`8/2000 Alcorn et al.
`11/2000 Cumbers
`1/2001 O'Connor et al.
`6/2002 Wiltshire et al.
`12/2002 Walker et al.
`1/2003 Karmarkar ...................... 463/42
`1/2003 Paravia et al.
`3/2003 Walker et al.
`6/2003 Lindo
`9/2003 Bradford et al.
`9/2003 Paulsen
`1/2004 Rowe
`1/2004 Rowe et al.
`3/2004 Bradford et al.
`3/2004 Mori et al.
`4/2004 Tulley et al.
`6/2004 MacGregor et al.
`4/2005 Crumby
`4/2005 Raverdy et al.
`9/2005 LeMay et al.
`9/2006 Kowalick ........................ 705/44
`3/2008 Morrow et al.
`
`7,341,522 B2
`7,534,169 B2
`7,611,407 Bl
`8,029,349 B2
`2001/0004768 Al
`2001/0005908 Al
`2002/0002073 Al
`2002/0007494 Al
`2002/0056125 Al
`2002/0056143 Al
`2002/0077167 Al
`2002/0142815 Al
`2002/0142844 Al
`2006/0189382 Al
`2007 /0087834 Al
`2007 /0270212 Al
`2008/0026844 Al
`2008/0057894 Al
`2008/0097858 Al
`2009/0325708 A9 *
`2011/0159953 Al*
`2011/0165936 Al *
`
`3/2008 Yamagishi
`5/2009 Amaitis et al.
`11/2009 Itkis et al.
`10/2011 Lind
`6/2001 Hodge et al.
`6/2001 Hodge et al.
`1/2002 Montgomery et al.
`1/2002 Hodge
`5/2002 Hodge et al.
`5/2002 Hodge et al.
`6/2002 Merari
`10/2002 Candelore
`10/2002 Kerr
`8/2006 Muir et al.
`4/2007 Moser et al.
`11/2007 Cockerille et al.
`1/2008 Wells
`3/2008 Aleksic et al.
`4/2008 Vucina et al.
`12/2009 Kerr ................................ 463/42
`6/2011 Kerr ................................ 463/29
`7/2011 Kerr ................................ 463/25
`
`OTHER PUBLICATIONS
`
`Wirelss Network. Wikipedia.http://en.wikipedia.org/wiki/Wire(cid:173)
`less_network. Nov. 17, 2008.
`"Tracking Cookie." Wikipedia.http://en.wikipedia.org/wiki/Track(cid:173)
`ing_cookie. May 24, 2009.
`
`* cited by examiner
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 1 of 9
`
`US 8,747,229 B2
`
`14
`
`(
`
`10 ~
`tHI 12
`~
`24)
`
`[ij]B
`□
`I iii iiii ii iiiii iii t00°(
`FIG. la
`
`26
`
`FIG. lb
`
`t'
`
`C
`
`'
`
`22
`
`FIG. le
`
`18
`
`liil
`
`<
`
`20
`
`FIG. ld
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 2 of 9
`
`US 8,747,229 B2
`
`[ii]B
`
`/111111 1111 1111111■ 0\
`
`FIG. 2
`
`Network
`
`32
`
`r30
`
`---,
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 3 of 9
`
`US 8,747,229 B2
`
`( 62
`
`Network
`Interface
`Module
`
`~
`
`~
`
`60
`
`( 52
`
`Biometric
`Input
`
`( 54
`
`( 58
`
`~
`
`~
`
`Compression
`Module
`
`~
`
`~
`
`Encryption
`Module
`
`~l
`
`,,
`
`Memory
`Module
`
`56
`
`A
`
`,,
`
`Memory
`Module
`
`FIG. 3
`
`(34
`
`Transactional
`Semc
`
`...
`...
`
`~ Transactional
`r
`Database
`
`--------------- -
`r----
`ification System
`: Ver
`I
`I
`
`--------------------------------- ------------------------------- ---,
`,,
`64
`(66
`/40
`/42
`
`ll
`
`I
`
`Network
`[nterface
`Module
`
`-
`
`~
`
`~
`
`,
`
`Decryption
`Module
`
`~
`
`~
`
`Verification
`Server
`
`~
`
`,
`
`~
`
`~
`
`Biometric
`Registration
`Database
`
`' I
`' I
`' I
`' I
`
`~l
`a
`,,
`,, (68 r------------ ------------------------------
`
`I
`___ J
`
`I
`I
`I 1-, ___ _
`
`-------------------,
`
`I
`I
`I
`I
`I
`I
`
`I
`I
`I
`
`I
`
`I
`
`Memory
`Module
`
`I
`I
`I
`I
`I
`I
`I
`I
`1
`I
`
`I
`I
`
`I
`
`Broadband
`Gaming
`Server
`
`~
`
`,
`
`~
`
`Mini
`~ Video Server
`
`'
`'
`'
`'
`L--------------------J
`
`FIG. 4
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 4 of 9
`
`US 8,747,229 B2
`
`REGISTRATION DATA FIELDS
`
`NAME
`
`BIOMETRIC
`
`ADDRESS
`
`PLAYER ID
`
`USER NAME
`
`MACID
`
`PASSWORD
`
`IP ADDRESS
`
`CREDIT CARD BROWSER
`
`DATE
`
`TIME
`
`COOKIES
`
`CRYPTO KEYS
`
`USER SUBMITTED DATA
`
`NAME
`
`BIOMETRIC
`
`ADDRESS
`
`PLAYER ID
`
`USER NAME
`
`MACID
`
`PASSWORD
`
`IP ADDRESS
`
`CREDIT CARD BROWSER
`
`DATE
`
`TIME
`
`COOKIES
`
`CRYPTOKEYS
`
`FIG. 5
`
`PLAYER DATA FIELDS
`
`PLAYER ID
`
`SESSION TIME FOR TYPE OF GAME
`
`DATE
`
`TIMEIN
`
`AMOUNT PLA YEO DURING SESSION
`
`CREDIT CARD INFORMATION
`
`TIMEOUT
`
`TRANSACTION REQUEST
`
`TYPE GAME
`
`TRANSACTION APPROVAL
`
`CREDITS IN
`
`TRANSFER OF CREDITS
`
`CREDITS OUT TRANSFER TO PLAYER CREDIT CRD
`
`BONUS
`
`CRYPTOKEYS
`
`FIG. 6
`
`

`

`\0 = N
`
`N
`'N
`-....l
`~
`~
`00
`
`d r.,;_
`
`0 ....
`Ul
`.....
`rJJ =(cid:173)
`
`('D
`('D
`
`1,0
`
`0 ....
`N
`~o
`? ....
`2'
`
`.i;...
`
`~ = ~
`
`~
`~
`~
`•
`00
`~
`
`' ' ' I
`I
`:
`'
`
`' I
`
`I
`I
`I
`
`MODULATION!
`
`ENCRYPTION
`
`/102b
`
`IOOb
`
`/
`
`MODULATION
`
`ENCRYPTJON
`
`r102a
`
`100a
`
`ENCODER
`
`MPEG
`
`98
`
`ENCODER
`
`TCP/IP
`
`/96
`
`92
`
`(90
`
`94
`
`SERVER
`
`MINI-VIDEO
`
`MEMORY
`
`L ____________________________________________________________________________________________________________ J
`I
`I
`
`L---------------------------------------------------------------1
`I
`I
`I
`I
`I
`
`BROADBAND GAMJNG SYSTEM
`
`88
`
`SYSTEM
`
`TRANSACTIONAL
`
`' I
`' I
`
`I
`I
`I
`I
`I
`
`---------------------------------------------------~
`
`I
`
`~--L..-~
`
`GAMING
`
`84
`
`DECRYPTION
`
`VERIFICATION
`
`PLAYER
`
`' ' I
`
`I
`I
`1
`
`! r _________ f __ ------VERIFiCAHONSYSTEM-
`
`34
`
`r--------------------------------------------;r36
`
`_ 80
`
`I
`
`co~;:;:,;WN I,,-82
`
`(38
`
`FIG. 7
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 6 of 9
`
`US 8,747,229 B2
`
`START
`
`152
`
`New Player Access Web Site/Channel/Kiosk/Registration Terminal
`
`Registration Process fnitiated
`
`Player Provides Standard Information:
`NAME, ADDRESS, CREDIT/DEBTT
`CARD NUMBER
`
`Player Provide Personal ID
`
`Player Provide Biometric
`
`Player Biometric Compressed
`and Encrypted
`
`153
`
`154
`
`156
`
`158
`
`160
`
`Verification System Processes Player Data
`and Generates Player Profile
`
`162
`
`164
`
`Verification System Identities Security Info: Biometric MAC ID,
`IP Address for Server, Browser, Cookies, etc,
`
`FIG. 8
`
`166
`
`Valid Player Identified
`
`Registration Process
`Completed
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 7 of 9
`
`US 8,747,229 B2
`
`176
`
`178
`
`174
`
`180
`
`182
`
`184
`
`User Access Gaming Site/Channel
`
`Provide Personal 1D
`
`Provide Biometric
`
`Biometric Compression
`
`Biometric Encryption
`
`Communicate Personal ID
`and Biometric Inforn,ation
`
`Verification System Request Security Info
`
`Verification System Ensure
`Network Access Device is Valid
`
`Compare User Submitted Information
`with Registered Player Information
`
`186
`
`188
`
`190
`
`N
`
`y
`
`194
`
`Re-Input Biometric
`
`Player Permitted to
`Access Gaming System
`
`FIG. 9
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 8 of 9
`
`US 8,747,229 B2
`
`r-200
`
`START
`
`201
`
`Receive Verification System
`Authorization for Player
`
`202
`
`Buffer Players Who Want to
`Play Game
`
`N
`
`y
`
`Generate
`Initial Player Matrix
`
`208
`
`210
`
`Transmit Initial Player
`Matrix to Transactional System
`
`Start Gaming
`Module
`
`209
`
`Transactional
`System
`Validation
`
`FIG. 10
`
`

`

`U.S. Patent
`
`Jun.10,2014
`
`Sheet 9 of 9
`
`US 8,747,229 B2
`
`-------------
`
`C 212
`
`-,
`
`Gaming Module
`
`Random Number Calculated
`For Gaming Module
`
`Paytable Determine Prize and
`Video Output
`
`Group Players According to
`Video Output
`
`Final Player Matrix Generated
`
`Player Matrix Communicated
`to Transactional Server
`
`214
`
`216
`
`218
`
`222
`
`226\
`
`N
`
`Initiate
`Diagnostic
`Analysis
`
`225
`
`Transactional
`System
`Validation
`
`FIG. 11
`
`228
`
`230
`
`232
`
`y
`
`Broadcast A Plurality
`of Video Streams
`
`Encode Video Streams
`
`Encrypt Video Streams
`
`END
`
`

`

`US 8,747,229 B2
`
`1
`GAMING SYSTEM NETWORK AND
`METHOD FOR DELIVERING GAMING
`MEDIA
`
`CROSS REFERENCES TO RELATED
`APPLICATIONS
`
`2
`systems and methods to control on-line gambling addiction.
`With respect to ensuring that on-line gaming is secure and
`reliable, prior art systems and methods use various crypto(cid:173)
`graphic techniques such as RSA encryption, digital certifi-
`5 cates, or other similar well known cryptographic methods.
`These cryptographic methods are helpful in ensuring secure
`communications, however these cryptographic methods do
`not ensure that the individual accessing the on-line game is a
`valid user.
`In view of the prior art systems, a minor or other unautho-
`rized individual simply needs a user ID and a corresponding
`password to access a gaming site. The obtaining of a user ID
`and password is a relatively simple task as this information is
`generally not modified. Commonly the user ID information is
`15 acquired by identifying the web site's naming convention for
`the player. The player password can be easily determined by
`remembering the pattern of keys typed by the player during
`the log-on procedures or by simply requesting the password
`from the player as part of a diagnostic procedure. The latter is
`20 a trick commonly used by hackers to access a system. The
`password problem may be overcome by modifying the pass(cid:173)
`word on a regular basis, however the player must then remem(cid:173)
`ber the modified password. Should the player forget the pass(cid:173)
`word a new password is mailed. During the mailing process it
`25 is common for e-mail to be easily intercepted in cyberspace.
`Additionally, it is common for unauthorized users to simulate
`being at a certain location by submitting an IP address that
`identifies an authorized user.
`Therefore, a better system and method for identifying a
`30 valid user is needed. Additionally, it would be beneficial to
`provide a gaming system and method that would prevent
`underage gambling, be simple to implement, prevent gam(cid:173)
`bling addiction, and provide a higher degree of security and
`reliability from unauthorized users.
`Networked Interactive Gaming
`Networked interactive gaming in an open networked envi(cid:173)
`ronment such as the Internet is well-known. However, inter(cid:173)
`active gaming in an open network such as the Internet is
`confined to communicating with other devices using the same
`40 TCP/IP protocols. Currently networked interactive gaming
`systems using the TCP/IP protocol are not configured to
`communicate with interactive set-top boxes using MPEG
`protocols.
`Networked interactive gaming in an open networked envi-
`45 ronment using traditional security methods such as secure
`socket layers and digital certificates are well known. How(cid:173)
`ever, networked interactive gaming in an open networked
`environment using traditional security methods does not pre(cid:173)
`vent gambling from a minor having acquired a parent's user
`50 ID and password without the parent's consent.
`Networked interactive gaming using LANs and WANs for
`progressive slot machines having large jackpots are also well(cid:173)
`known. However, networked interactive systems using LAN s
`and WANs for progressive slot machines generally exist in a
`55 highly secure proprietary network environment. Thus, the
`creation of a progressive slot machine with a large jackpot in
`an open network environment is not well known.
`Biometrics
`A biometric is a measurable psychological and/or behav-
`60 ioral trait that can be captured and subsequently compared
`with another instance at the time of verification. This defini-
`tion includes the matching of fingerprints, voice patterns,
`hand geometry, iris and retina scans, vein patterns and other
`such methodologies. For purposes of the invention described
`heretofore, the definition of biometrics also includes signa(cid:173)
`ture verification, keystroke patterns and other methodologies
`weighted towards individual behavior.
`
`This patent application is a continuation of Ser. No. 10/681,
`034, filed Oct. 8, 2003 now U.S. Pat. No. 8,403,755, which is
`a continuation of patent application Ser. No. 09/899,559 hav- 10
`ing a filing date of Jul. 5, 2001, now abandoned, which claims
`the benefit of provisional patent application 60/266,956 filed
`Feb. 6, 2001.
`
`BACKGROUND
`
`1. Field
`The present invention is an interactive gaming system net(cid:173)
`work and method for delivering gaming media. More particu(cid:173)
`larly, the interactive gaming system and method operates in a
`networked environment that interfaces with a gaming server
`and a video server.
`2. Description of Related Art
`The related art includes gaming devices, on-line gaming,
`networked interactive gaming, and biometrics.
`Gaming Devices
`For purposes of this patent, the term "gaming" shall refer to
`either gambling and/or gaming applications. Gaming devices
`include games of skill and games of chance. Games of chance
`include many casino-type gaming devices in which the out(cid:173)
`come of the game depends, at least in part, on a randomly
`generated event. For example, a game of chance may use a
`random number generator to generate a random or pseudo(cid:173)
`random number. The random number may then be compared
`to a predefined table to determine the outcome of the event. If 35
`the random number falls within a certain range of numbers on
`the table, the player may win a predefined prize. The table
`may also contain display information that allows the gaming
`device to generate a display that corresponds to the outcome
`of the game. The gaming device may present the outcome of
`the game on a large variety of display devices, such as
`mechanical spinning reels or video screens.
`Games of skill comprise a skill component in which a
`player combines letters or words (word puzzles), answers
`questions (trivia), overcomes challenges ( video games), com(cid:173)
`petes with other players (networked video games), and the
`like. Generally, a game of skill is a game requiring a level of
`skill which does not rely solely on chance. Some games of
`skill require a high degree of expertise and knowledge and
`other games of skill require very limited expertise or knowl(cid:173)
`edge.
`On-Line Gaming
`In June 2001, Nevada signed a bill that could result in
`Nevada being the first state to offer legalized gambling over
`the Internet. The new law authorizes state gaming regulators
`to set up an infrastructure to license and oversee online gam(cid:173)
`ing in Nevada when such gaming becomes legal. Online
`gaming is a federal issue whose legality is unclear at present.
`A variety of technological limitations have been asserted as
`preventing Congress's endorsement of on-line gaming. These
`technological limitations are related to the prevention of
`underage gambling, controlling of gambling addiction, and
`ensuring the security and reliability of on-line gaming.
`To prevent underage gambling prior art systems and meth(cid:173)
`ods use passwords, user IDs, credit cards and "click-through" 65
`agreements that ask the player to agree to being of legal
`gambling age by clicking on a button. Presently, there are no
`
`

`

`US 8,747,229 B2
`
`3
`Biometric applications for games of skill and games of
`chance are limited. For example biometric gaming applica(cid:173)
`tions are taught in U.S. Pat. No. 6,010,404 granted to Walker
`et al. teaches a method and apparatus for using player input
`codes (e.g., numeric, biometric or physical) to affect the
`outcomes of electronic gambling devices, such as slot
`machines. Additionally, U.S. Pat. No. 6,142,876 granted to
`Cumbers teaches a system and method for passively tracking
`the play of players playing gaming devices such as slot
`machines. Players provide identification information and
`facial recognition data is acquired by a digital or video cam(cid:173)
`era. For each player an account file and a file of the facial
`image data is stored. When the player plays the slot machine,
`a camera scans the player and acquires facial image data
`which is compared to stored data to identify the player. Fur(cid:173)
`thermore, U.S. Pat. No. 5,902,983 granted to Crevelt et al.
`teaches a gaming machine configured to perform EFT trans(cid:173)
`actions which are limited to preset amounts. The patent
`teaches the use of a fingerprint imaging device, and retinal
`scans for verifying a player's identity.
`Although biometric applications for gaming applications
`are known, biometric applications for on-line gaming sys(cid:173)
`tems are not known. Furthermore, the managing of biometric
`information and gaming information in an open network
`environment are not known. Additionally, the use ofbiomet- 25
`rics in a gaming system and method to prevent underage
`gambling and prevent gambling addiction is not known.
`
`20
`
`4
`method includes generating, with a centralized gaming server
`communicatively coupled to each of the plurality of network
`access devices, at least one random game outcome with ran(cid:173)
`dom generation at the centralized gaming server. Finally, the
`5 method includes determining one or more prizes associated
`with the random game outcome with a paytable module asso(cid:173)
`ciated with the centralized gaming server, and communicat(cid:173)
`ing a plurality of images corresponding to the at least one
`random game outcome from the centralized gaming server to
`10 each network access device.
`One advantage of the present invention is that it provides a
`system and method to prevent underage gambling.
`A further advantage of the present invention is that it pro(cid:173)
`vides a more secure and reliable and secure gaming system
`15 and method.
`Another advantage of the present invention is that it pro(cid:173)
`vides a system and method for managing biometric informa(cid:173)
`tion and gaming information in an open network environ(cid:173)
`ment.
`Another advantage of the present invention is that it per(cid:173)
`mits a plurality of users in a geographically broad area to play
`the same game.
`A further advantage of the present invention is that it pro(cid:173)
`vides a pseudo-real time gaming system and method.
`Another advantage of the present invention is that it simu(cid:173)
`lates a game of chance such as a slot machine in an on-line
`environment.
`An additional advantage of the present invention is that it
`provides a networked jackpot.
`
`SUMMARY
`
`30
`
`BRIEF DESCRIPTION
`
`A gaming server system is described, the gaming server
`system configured to communicate with at least one network
`access device communicatively coupled to a network. The
`gaming server system includes a verification system, a
`memory module, a centralized gaming server, and a paytable 35
`module. The verification system is configured to access a
`registration database having a plurality of registration data
`associated with each registered user. The memory module is
`configured to store a plurality of images corresponding to at
`least one game outcome that are communicated to the at least 40
`one network access device. The centralized gaming server is
`communicatively coupled to each of the at least one network
`access device, the centralized gaming server configured to
`generate at least one random game outcome by random gen(cid:173)
`eration at the centralized gaming server. The paytable module 45
`is associated with the centralized gaming server, and it is
`configured to determine one or more prizes associated with a
`game outcome. The centralized gaming server is also config(cid:173)
`ured to access the memory module and communicate the
`plurality of images corresponding to the at least one random 50
`game outcome to the at least one network access device
`In one embodiment, the verification system is configured to
`receive user identification information associated with a
`player from each network access device, and verify the player
`accessing the network access device is a registered user by 55
`comparing the user identification information to the registra(cid:173)
`tion data.
`A method for generating a game outcome with a gaming
`server system configured to communicate with a plurality of
`network access devices that are communicatively coupled to
`a network is also described. The method comprises enabling
`a verification system to receive user identification informa(cid:173)
`tion from at least one network access device. The method
`further comprises verifying with the verification system that
`the user accessing the at least one network access device is a
`registered user by comparing the user identification informa(cid:173)
`tion to registration data stored in a registration database. The
`
`A networked gaming system that comprises a verification
`system, a broadband gaming system and a transactional sys(cid:173)
`tem is described. The verification system operations include
`ensuring that a user is a registered player by using a biometric
`input. The broadband gaming system operations include
`managing and performing at least one game. The transac(cid:173)
`tional system operations include providing oversight for each
`transaction conducted by the verification system and the
`broadband gaming system.
`A verification system for playing the networked gaming
`system is described. The networked games include games of
`chance and games of skill. The verification system commu(cid:173)
`nicates with a biometric input module and a network access
`device to generate a user identification information. The user
`identification information is compared to information in a
`registration database. If an acceptable match is made between
`the user identification information and the information in the
`registration database, the user is designated as a player. The
`player then has access to both the broadband gaming system
`and the transactional system.
`A broadband gaming system which is in communication
`with the verification system is described. The broadband
`gaming system includes a buffer which stores information
`about players who desire to play a game. The buffer is opera-
`tively coupled to a random number generator that generates a
`random number for each player in the buffer. A paytable
`module in communication with the random number generator
`60 determines the outcome associated with the random number
`generator. The paytable also determines which images are
`associated with the outcome for each player. Preferably, the
`images are stored on a mini video server and then cached in a
`memory module. The images are intelligently buffered for
`65 downstream communications. In its preferred embodiment, a
`plurality of encoders are operatively coupled to the memory
`module caching the broadcast video streams. The plurality of
`
`

`

`US 8,747,229 B2
`
`5
`encoders encode the broadcast downstream images according
`the requirements for each network access device. Each
`encoder is operatively coupled to an encryption module that
`encrypts the broadcast. A modulation module is operatively
`coupled to the encryption module and modulates encrypted 5
`images for downstream transmission. Each network access
`device includes a tuner, a demodulation module, and a
`decryption module that permits an image to be viewed by the
`network access device.
`A transactional system and method that ensures secure 10
`communications occur in the verification system and the
`broadband gaming system is described. The transactional
`system also performs accounting, bonusing, tracking and
`other such functions. Preferably, the transactional system is
`capable of receiving a plurality of funds from a financial 15
`account and converting them to credits that are used in the
`broadband gaming system.
`The above description sets forth, rather broadly, the more
`important features of the present invention so that the detailed
`description of the preferred embodiment that follows may be 20
`better understood and contributions of the present invention
`to the art may be better appreciated. There are, of course,
`additional features of the invention that will be described
`below and will form the subject matter of claims. In this
`respect, before explaining at least one preferred embodiment 25
`of the invention in detail, it is to be understood that the
`invention is not limited in its application to the details of the
`construction and to the arrangement of the components set
`forth in the following description or as illustrated in the draw(cid:173)
`ings. The invention is capable of other embodiments and of 30
`being practiced and carried out in various ways. Also, it is to
`be understood that the phraseology and terminology
`employed herein are for the purpose of description and should
`not be regarded as limiting.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Preferred embodiments of the present invention are shown
`in the accompanying drawings wherein:
`FIG. la through FIG. ld provide diagrams of a plurality of
`network access devices.
`FIG. 2 is a high level diagram of a gaming system net(cid:173)
`worked to a plurality of network access devices.
`FIG. 3 is a block diagram of an illustrative biometric input
`module.
`FIG. 4 is a block diagram of a gaming system configured to
`receive a biometric input from a network access device.
`FIG. 5 is a table of the data fields in a verification system.
`FIG. 6 is a table of the data fields in a broadband gaming
`system and in a transactional system.
`FIG. 7 is a block diagram of a broadband gaming system.
`FIG. 8 is a flowchart of the registration method for the
`gaming system.
`FIG. 9 is a flowchart of the verification method for the
`gaming system.
`FIG. 10 is a flowchart of the information processed by the
`gaming system.
`FIG. 11 is a continuation of the flowchart of the informa(cid:173)
`tion processed by the gaming system in FIG. 10.
`
`DETAILED DESCRIPTION
`
`In the following detailed description of the preferred
`embodiments, reference is made to the accompanying draw(cid:173)
`ings, which form a part of this application. The drawings
`show, by way of illustration, specific embodiments in which
`the invention may be practiced. It is to be understood that
`
`6
`other embodiments may be utilized and structural changes
`may be made without departing from the scope of the present
`invention.
`Network Access Devices
`Referring to FIG. la through FIG. ld there is shown a
`plurality of illustrative network access devices. Each of the
`network access devices is configured to be capable of running
`a gaming application. For illustrative purposes the gaming
`application shown simulates the spinning reels of a slot
`machine.
`The network access device in FIG. la is a personal com(cid:173)
`puter 10 having a network interface card (not shown) that may
`be operatively coupled to a modem (not shown). Another
`network access device shown in FIG. lb includes a television
`12 operatively coupled to an interactive set-top box 14 that is
`operatively coupled to a cable network (not shown). The other
`network access device shown in FIG. le is a wireless device
`16 such as a digital phone or personal digital system (PDA) or
`other such wireless device which is configured to communi-
`cate with a network using wireless networking protocols. Yet
`another network access device is shown in FIG. ld and
`includes a gaming terminal 18 such as a slot machine on a
`casino floor that is operatively coupled to a plurality of other
`gaming terminals. It shall be appreciated by those skilled in
`the art of networking that the distinguishing feature between
`each of these network access devices is the type of commu-
`nications protocols used by each device to enable communi(cid:173)
`cations between similar network access devices.
`Each of the network access devices either includes a bio(cid:173)
`metric input module operatively coupled to the network
`access device or includes a biometric input module commu(cid:173)
`nicatively coupled to the network access device. A biometric
`is a measurable psychological and/or behavioral trait that can
`be captured and subsequently compared with another
`35 instance at the time of verification. This definition includes
`the matching of fingerprints, voice patterns, hand geometry,
`iris and retina scans, vein patterns and other such methodolo(cid:173)
`gies. For purposes of the invention described heretofore, the
`definition of biometrics also includes signature verification,
`40 keystroke patterns and other methodologies weighted
`towards individual behavior.
`In one illustrative embodiment, the biometric input module
`is a fingerprint scanner 20 resident on the gaming terminal 18
`wherein the biometric input is a fingerprint. In another illus-
`45 trative embodiment, the biometric input module is the screen
`22 of wireless device 16 wherein the screen is configured to
`receive a biometric input such as a user signature. In yet
`another illustrative embodiment, the biometric input module
`is a telephone 24 that is configured to receive a voice pattern
`50 from a user prior to engaging communications with the inter(cid:173)
`active set-top box 14. In yet another illustrative embodiment
`the biometric input module is a keyboard 26 operatively
`coupled to computer 10 wherein the user is requested to input
`a keystroke pattern. An illustrative example of a biometric
`55 input module operatively coupled to the network access
`device is shown in FIG. ld having the fingerprint scanner 20
`on the gaming terminal 18. An illustrative example of a bio(cid:173)
`metric input module, e.g. the telephone 24, communicatively
`coupled to the network access device, e.g. the interactive
`60 set-top box 14, is shown in FIG. lb.
`The biometric input is used to prevent unauthorized gam(cid:173)
`ing activity and efficiently store credits on the user's behalf.
`By way of example and not oflimitation, unauthorized gam(cid:173)
`ing activity includes preventing underage gaming and prohib-
`65 iting players with histories of gambling addiction. Addition(cid:173)
`ally, player credits may be stored on a network so that the
`player does not need to carry coins, paper currency, coupons,
`
`

`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket