`US008506406B2
`
`c12) United States Patent
`Kerr
`
`(IO) Patent No.:
`(45) Date of Patent:
`
`US 8,506,406 B2
`* Aug. 13, 2013
`
`(54)
`
`NETWORK ACCESS DEVICE AND METHOD
`TO RUN A GAME APPLICATION
`
`(75)
`
`Inventor: Michael A. Kerr, Reno, NV (US)
`
`(73)
`
`Assignee: NexRF, Corp.
`
`( *)
`
`Notice:
`
`Subject to any disclaimer, the term ofthis
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 60 days.
`
`This patent is subject to a terminal dis(cid:173)
`claimer.
`
`(21) Appl. No.: 12/982,018
`
`(22) Filed:
`
`Dec. 30, 2010
`
`(65)
`
`Prior Publication Data
`
`US 2011/0159953 Al
`
`Jun. 30, 2011
`
`Related U.S. Application Data
`
`(63) Continuation of application No. 10/681,034, filed on
`Oct. 8, 2003, now Pat. No. 8,403,755, which is a
`continuation of application No. 09/899,559, filed on
`Jul. 5, 2001, now abandoned.
`
`(60) Provisional application No. 60/266,956, filed on Feb.
`6, 2001.
`
`(51)
`
`(52)
`
`(58)
`
`(56)
`
`(2006.01)
`
`Int. Cl.
`A63F 9124
`U.S. Cl.
`USPC .................... 463/42; 463/17; 463/13; 705/44
`Field of Classification Search
`None
`See application file for complete search history.
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`4,339,798 A
`7 / 1982 Hedges et al.
`4,856,787 A
`8/ 1989 Itkis
`5,586,937 A
`12/1996 Menashe
`l/ 1997 Hodge et al.
`5,594,491 A
`
`,30
`
`5,630,757 A
`5,643,086 A
`5,738,583 A
`5,761,416 A
`5,762,552 A
`5,768,382 A
`5,779,545 A
`5,800,268 A
`5,851,149 A
`5,871,398 A
`5,902,983 A
`5,971,849 A
`6,001,016 A
`
`5/1997 Gagin et al.
`7/1997 Alcorn et al.
`4/ 1998 Comas et al.
`6/ 1998 Mandal et al.
`6/ 1998 Vuong et al.
`6/ 1998 Schneier et al.
`7/1998 Berg et al.
`9/1998 Molnick
`l 2/ 1998 Xidos et al.
`2/ 1999 Schneier et al.
`5/ 1999 Crevalt et al.
`10/ 1999 Falciglia
`12/1999 Walker et al.
`(Continued)
`
`OTHER PUBLICATIONS
`
`"Internet Industry Interacting Gambling Code: A Code for Industry
`Co-Regulation in the Area oflnternet Gambling Content Pursuant to
`the Requirements of the Interactive Gaming Act of 200 l ". Internet
`Industry Association. Dec.2001.
`
`(Continued)
`
`Primary Examiner - Paul AD' Agostino
`(74) Attorney, Agent, or Firm - Michael A. Kerr; Kerr IP
`Group, LLC
`
`(57)
`
`ABSTRACT
`
`A network access device and method to run a gaming appli(cid:173)
`cation on a network access device are described. The network
`access device comprises a communications module config(cid:173)
`ured to allow the network access device to communicate with
`a network. The network access device is configured to trans(cid:173)
`mit user identification information to a verification system
`and transmit security information to a verification system.
`When the user identification information and security infor(cid:173)
`mation have been verified by the verification system, the
`network access device receives a random game output gen(cid:173)
`erated by a gaming system.
`
`19 Claims, 9 Drawing Sheets
`
`l'ransactional
`Server
`
`Transactional
`Database
`
`---~--, --~~-
`~~~~~~~~~~
`
`Decryption
`
`Module
`
`~=~ ,. [-i;-
`
`. -
`
`-·-· --
`
`-1
`
`L--- ------- ---------- J
`
`(34
`' ____ __._,
`
`Nlnetei:o,c,ke
`11<
`
`Module
`
`'f
`
`i
`
`r------------ ------- --------------- ------------- ------ -- -- -- ----------- --- ----- ----------7
`l Verification System
`64
`66
`42
`40
`:
`'
`'
`'
`'
`\
`
`
`Verification
`Server
`
`--~-- '
`
`Biometric
`Registration
`
`Database
`
`:
`
`::~;~,:-·
`
`
`
`US 8,506,406 B2
`Page 2
`
`(56)
`
`References Cited
`
`U.S. PATENT DOCUMENTS
`6,010,404 A
`1/2000 Walker et al.
`6,106,396 A
`8/2000 Alcorn et al.
`6,142,876 A
`11/2000 Cumbers
`6,159,095 A *
`12/2000 Frohm et al. .................... 463/19
`1/2001 O'Connor et al.
`6,178,510 Bl
`6,203,428 Bl *
`3/2001 Giobbi et al. ................... 463/16
`6,409,602 Bl
`6/2002 Wiltshire et al.
`6,500,068 B2
`12/2002 Walker et al.
`6,508,709 Bl
`1/2003 Karmarker
`6,508,710 Bl
`1/2003 Paravia et al.
`6,527,638 Bl
`3/2003 Walker et al.
`6,575,834 Bl
`6/2003 Lindo
`6,612,928 Bl
`9/2003 Bradford et al.
`6,628,939 B2
`9/2003 Paulsen
`6,676,522 B2
`1/2004 Rowe
`6,682,421 Bl
`1/2004 Rowe et al.
`6,709,333 Bl
`3/2004 Bradford et al.
`6,709,631 B2
`3/2004 Mori et al.
`6,719,631 Bl*
`4/2004 Tulley et al ..................... 463/17
`6,749,512 B2
`6/2004 MacGregor et al.
`6,875,110 Bl*
`4/2005 Crumby .......................... 463/42
`6,884,162 B2
`4/2005 Raverdy et al.
`6,942,574 Bl
`9/2005 LeMay et al.
`7,107,245 Bl*
`9/2006 Kowalick ........................ 705/44
`7,338,372 B2
`3/2008 Morrow et al.
`7,341,522 B2
`3/2008 Yarnagishi
`
`7,534,169 B2
`7,611,407 Bl
`7,753,772 Bl*
`8,029,349 B2
`2001/0004768 Al
`2001/0005908 Al
`2002/0002073 Al
`2002/0007494 Al
`2002/0056125 Al
`2002/0056143 Al
`2002/0077167 Al *
`2002/0142815 Al
`2002/0142844 Al
`2003/0119578 Al*
`2006/0003830 Al*
`2006/0189382 Al
`2007 /0087834 Al
`2007 /0270212 Al
`2008/0026844 Al
`2008/0057894 Al
`2008/0097858 Al
`
`5/2009 Amaitis et al.
`11/2009 Itkis et al.
`7/2010 Walker et al. ................... 463/ l 7
`10/2011 Lind
`6/2001 Hodge et al.
`6/2001 Hodge et al.
`1/2002 Montgomery et al.
`1/2002 Hodge
`5/2002 Hodge et al.
`5/2002 Hodge et al.
`6/2002 Merari ............................ 463/ 13
`10/2002 Candelore
`10/2002 Kerr
`6/2003 Newson .......................... 463/20
`1/2006 Walker et al. ................... 463/20
`8/2006 Muir et al.
`4/2007 Moser et al.
`11/2007 Cockerille et al.
`1/2008 Wells
`3/2008 Aleksic et al.
`4/2008 Vucina et al.
`
`OTHER PUBLICATIONS
`
`Wirelss Network. Wikipedia. http://en.wikipedia.org/wiki/Wire(cid:173)
`less_network. Nov. 17, 2008.
`"Tracking Cookie." Wikipedia. http://en.wikipedia.org/wiki/Track(cid:173)
`ing_cookie. May 24, 2009.
`
`* cited by examiner
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 1 of 9
`
`US 8,506,406 B2
`
`14
`
`~
`
`12
`
`10
`
`[ij]~ 26
`
`/iiiiiiiiiiiiiiiiilll 0
`
`(
`
`FIG. la
`
`FIG. 1 b
`
`18
`
`20
`
`FIG. le
`
`FIG. ld
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 2 of 9
`
`US 8,506,406 B2
`
`FIG. 2
`
`Network
`
`32
`
`r--------------
`1 Gaming System
`:-------
`1
`
`I
`
`------~-- - - - - -
`Broadband -G;~i~~ -s;s~~~ ~
`
`I
`
`Mini Video
`Server
`
`I
`_T_______________
`' Transactional Sys;;~-~- -
`
`I
`I
`I
`
`112
`
`38~ Transactional
`Database
`
`•---------
`----
`
`---
`
`Transactional
`Server
`
`------------------
`~
`' Verification System
`
`---------
`
`Broadband
`Gaming
`Server
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`'----------(cid:173) --- ---
`
`Registration
`Database
`
`Verification
`Server
`
`I
`I
`I
`
`- --- - _,
`
`36
`
`- ------ -,
`
`I
`I
`
`110:
`
`I
`I
`
`1 30
`---,
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`----
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 3 of 9
`
`US 8,506,406 B2
`
`( 62
`
`Network
`Interface
`Module
`
`..
`
`60
`
`( 52
`
`Biometric
`Input
`
`( 54
`.. Compression
`..
`
`Module
`
`( 58
`
`..
`
`~
`
`Encryption
`Module
`
`J~
`
`,,.
`
`Memory
`Module
`
`56
`
`A
`
`,i,
`
`Memory
`Module
`
`FIG. 3
`
`(
`
`.,,,
`....
`
`Network
`Interface
`Module
`
`Transactional
`
`..
`..
`
`L""'
`
`-
`
`Transactional
`Database
`
`""""
`34
`·~
`--------------------------------- ---------------------------------,
`64
`/66
`/42
`(40
`r
`
`I
`I
`I
`I
`I
`I
`I
`
`' I
`
`I
`I
`I
`l
`I
`I
`I
`___ J
`
`---------------
`r----
`ification System
`: Ver
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I L ___ _
`------------------,
`
`..
`...
`
`Decryption
`Module
`
`..
`
`~
`
`Verification
`Server
`
`_...
`
`~
`
`..
`
`Biometric
`Registration
`Database
`
`a
`, .. (68 r----------- ------------------------------
`
`a
`
`,r
`
`Memory
`Module
`
`Broadband
`Gaming
`Server
`
`.,,,
`
`~
`
`...
`Mini
`~ Video Server
`
`FIG. 4
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`L ____________________ J
`I
`I
`
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`I
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 4 of 9
`
`US 8,506,406 B2
`
`REGISTRATION DATA FIELDS
`
`NAME
`
`ADDRESS
`
`BIOMETRIC
`
`PLAYER ID
`
`USER NAME
`
`MACID
`
`PASSWORD
`
`IP ADDRESS
`
`CREDIT CARD BROWSER
`
`DATE
`
`TIME
`
`COOKIES
`
`CRYPTOKEYS
`
`USER SUBMITTED DATA
`
`NAME
`
`BIOMETRIC
`
`ADDRESS
`
`PLAYER ID
`
`USER NAME
`
`MAC ID
`
`PASSWORD
`
`IP ADDRESS
`
`CREDIT CARD BROWSER
`
`DATE
`
`TIME
`
`COOKIES
`
`CRYPTOKEYS
`
`FIG. 5
`
`PLAYER DAT A FIELDS
`
`PLAYER ID
`
`SESSION TIME FOR TYPE OF GAME
`
`DATE
`
`TIME IN
`
`AMOUNT PLA YEO DURING SESSION
`
`CREDIT CARD INFORMATION
`
`TIMEOUT
`
`TRANSACTION REQUEST
`
`TYPE GAME
`
`TRANSACTION APPROVAL
`
`CREDITS IN
`
`TRANSFER OF CREDITS
`
`CREDITS OUT TRANSFER TO PLAYER CREDIT CRD
`
`BONUS
`
`CRYPTOKEYS
`
`FIG. 6
`
`
`
`~ = 0--, = N
`tit = 0--,
`d r.,;_
`
`00
`
`L------------------------------------------------------------------------------------------------------------
`
`MODULATION
`
`ENCRYPTION
`
`ENCODER
`
`MPEG
`
`94
`
`_,
`
`SERVER
`
`..__
`
`MINI-VIDEO
`
`/102b
`
`I00b
`
`/
`
`~
`
`98
`
`0 ....
`Ul
`.....
`rJJ =(cid:173)
`
`('D
`('D
`
`1,0
`
`~
`
`~ ....
`~
`
`N
`~
`
`~
`
`0 ....
`
`~ = ~
`
`~
`~
`~
`•
`00
`~
`
`I
`I
`BROADBAND GAMING SYSTEM :
`L---------------------------------------------------------------1
`
`I
`I
`I
`I
`' I
`
`►IMODULATIONI
`
`►I ENCRYPTION I
`
`102a
`
`/
`
`/I00a
`
`I
`
`ENCODER
`
`TCP/IP
`
`/96
`
`,--+
`
`-.i GAMING
`
`OUTPUT l r92
`(90
`
`MODULE
`
`PAY TABLE
`
`88
`
`86
`
`I
`
`84
`
`SYSTEM
`
`~
`
`TRANSACTIONAL
`
`(38
`
`FIG. 7
`
`------J
`'
`I
`I
`I
`I
`:
`:
`I
`I
`I
`
`-----, DECRYPTION
`
`VERIFICATION
`
`PLAYER
`
`,-------7
`
`,-------7
`
`-----------------------------------------
`
`I
`I
`I
`:
`--------------------------------1
`
`VERIFICATION SYSTEM
`
`-----
`
`: I
`r--------------------------------------------:r 36 C 34
`
`:
`I
`I
`I
`
`,
`:
`I
`I
`I
`
`r
`I.
`
`BUFFER
`PLAYER
`
`~
`
`I
`I
`I
`
`I
`I
`I
`:
`:
`
`_J_[so
`
`I
`COUNTDOWN
`,~ s2
`
`TIMER
`
`:
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 6 of 9
`
`US 8,506,406 B2
`
`START
`
`152
`
`New Player Access Web Site/Channel/Kiosk/Registration Terminal
`
`Registration Process Initiated
`
`Player Provides Standard lnformation:
`NAME, ADDRESS, CREDIT/DEBIT
`CARD NUMBER
`
`Player Provide Personal ID
`
`Player Provide Biometric
`
`Player Biometric Compressed
`and Encrypted
`
`153
`
`154
`
`156
`
`158
`
`160
`
`Verification System Processes Player Data
`and Generates Player Profile
`
`162
`
`164
`
`Verification System Identifies Security Info: Biometric MAC ID,
`IP Address for Server, Browser, Cookies, etc,
`
`FIG. 8
`
`166
`
`Valid Player Identified
`
`Registration Process
`Completed
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 7 of 9
`
`US 8,506,406 B2
`
`176
`
`178
`
`174
`
`180
`
`182
`
`184
`
`User Access Gaming Site/Channel
`
`Provide Personal 1D
`
`Provide Biometric
`
`Biometric Encryption
`
`Communicate Personal ID
`and Biometric Infonnation
`
`Verification System Request Security Info
`
`Verification System Ensure
`Network Access Device is Valid
`
`Compare User Submitted Information
`with Registered Player Information
`
`186
`
`188
`
`190
`
`N
`
`194
`
`Re-Input Biometric
`
`Player Pem1itted to
`Access Gaming System
`
`FIG. 9
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 8 of 9
`
`US 8,506,406 B2
`
`START
`
`201
`
`Receive Verification System
`Authorization for Player
`
`202
`
`Buffer Players Who Want to
`Play Game
`
`r200
`
`N
`
`Generate
`Initial Player Matrix
`
`208
`
`210
`
`Transmit Initial Player
`Matrix to Transactional System
`
`Start Gaming
`Module
`
`209
`
`Transactional
`System
`Validation
`
`FIG. 10
`
`
`
`U.S. Patent
`
`Aug. 13, 2013
`
`Sheet 9 of 9
`
`US 8,506,406 B2
`
`214
`
`216
`
`C 212
`
`-
`
`,-------------------- -------------
`: Gaming Module
`
`I
`I
`
`Random Number Calculated
`For Gaming Module
`
`Paytable Determine Prize and
`Video Output
`
`I
`I
`
`I-------------------
`
`218
`
`Group Players According to
`Video Output
`
`220\,-------'-------,
`Final Player Matrix Generated
`
`222
`
`Player Matrix Communicated
`to Transactional Server
`
`226\
`
`N
`
`Initiate
`Diagnostic
`Analysis
`
`225
`
`Transactional
`System
`Validation
`
`FIG. 11
`
`228
`
`230
`
`232
`
`y
`
`Broadcast A Plurality
`of Video Streams
`
`Encode Video Streams
`
`Encrypt Video Streams
`
`END
`
`
`
`US 8,506,406 B2
`
`1
`NETWORK ACCESS DEVICE AND METHOD
`TO RUN A GAME APPLICATION
`
`CROSS REFERENCES TO RELATED
`APPLICATIONS
`
`2
`systems and methods to control on-line gambling addiction.
`With respect to ensuring that on-line gaming is secure and
`reliable, prior art systems and methods use various crypto(cid:173)
`graphic techniques such as RSA encryption, digital certifi-
`5 cates, or other similar well known cryptographic methods.
`These cryptographic methods are helpful in ensuring secure
`communications, however these cryptographic methods do
`not ensure that the individual accessing the on-line game is a
`valid user.
`In view of the prior art systems, a minor or other unautho-
`rized individual simply needs a user ID and a corresponding
`password to access a gaming site. The obtaining of a user ID
`and password is a relatively simple task as this information is
`generally not modified. Commonly the user ID information is
`15 acquired by identifying the web site's naming convention for
`the player. The player password can be easily determined by
`remembering the pattern of keys typed by the player during
`the log-on procedures or by simply requesting the password
`from the player as part of a diagnostic procedure. The latter is
`20 a trick commonly used by hackers to access a system. The
`password problem may be overcome by modifying the pass(cid:173)
`word on a regular basis, however the player must then remem(cid:173)
`ber the modified password. Should the player forget the pass(cid:173)
`word a new password is mailed. During the mailing process it
`25 is common for e-mail to be easily intercepted in cyberspace.
`Additionally, it is common for unauthorized users to simulate
`being at a certain location by submitting an IP address that
`identifies an authorized user.
`Therefore, a better system and method for identifying a
`30 valid user is needed. Additionally, it would be beneficial to
`provide a gaming system and method that would prevent
`underage gambling, be simple to implement, prevent gam(cid:173)
`bling addiction, and provide a higher degree of security and
`reliability from unauthorized users.
`Networked Interactive Gaming
`Networked interactive gaming in an open networked envi(cid:173)
`ronment such as the Internet is well-known. However, inter(cid:173)
`active gaming in an open network such as the Internet is
`confined to communicating with other devices using the same
`40 TCP/IP protocols. Currently networked interactive gaming
`systems using the TCP/IP protocol are not configured to
`communicate with interactive set-top boxes using MPEG
`protocols.
`Networked interactive gaming in an open networked envi-
`45 ronment using traditional security methods such as secure
`socket layers and digital certificates are well known. How(cid:173)
`ever, networked interactive gaming in an open networked
`environment using traditional security methods does not pre(cid:173)
`vent gambling from a minor having acquired a parent's user
`50 ID and password without the parent's consent.
`Networked interactive gaming using LANs and WANs for
`progressive slot machines having large jackpots are also well(cid:173)
`known. However, networked interactive systems using LAN s
`and WANs for progressive slot machines generally exist in a
`55 highly secure proprietary network environment. Thus, the
`creation of a progressive slot machine with a large jackpot in
`an open network environment is not well known.
`Biometrics
`A biometric is a measurable psychological and/or behav-
`60 ioral trait that can be captured and subsequently compared
`with another instance at the time of verification. This defini-
`tion includes the matching of fingerprints, voice patterns,
`hand geometry, iris and retina scans, vein patterns and other
`such methodologies. For purposes of the invention described
`heretofore, the definition of biometrics also includes signa(cid:173)
`ture verification, keystroke patterns and other methodologies
`weighted towards individual behavior.
`
`This patent application is a continuation of Ser. No. 10/681,
`034, filed Oct. 8, 2003 now U.S. Pat. No. 8,403,755 which is
`a continuation of patent application Ser. No. 09/899,559 hav(cid:173)
`ing a filing date of Jul. 5, 2001, now abandoned, which claims 10
`the benefit of provisional patent application 60/266,956 filed
`Feb. 6, 2001.
`
`BACKGROUND
`
`1. Field
`The present invention is a network access device to run a
`gaming application and method for running a gaming appli(cid:173)
`cation on a network access device. More particularly, the
`network access device and method receives a gaming output
`from a gaming server when identification and security infor(cid:173)
`mation have been verified by a verification system.
`2. Description of Related Art
`The related art includes gaming devices, on-line gaming,
`networked interactive gaming, and biometrics.
`Gaming Devices
`For purposes of this patent, the term "gaming" shall refer to
`either gambling and/or gaming applications. Gaming devices
`include games of skill and games of chance. Games of chance
`include many casino-type gaming devices in which the out(cid:173)
`come of the game depends, at least in part, on a randomly
`generated event. For example, a game of chance may use a
`random number generator to generate a random or pseudo(cid:173)
`random number. The random number may then be compared
`to a predefined table to determine the outcome of the event. If 35
`the random number falls within a certain range of numbers on
`the table, the player may win a predefined prize. The table
`may also contain display information that allows the gaming
`device to generate a display that corresponds to the outcome
`of the game. The gaming device may present the outcome of
`the game on a large variety of display devices, such as
`mechanical spinning reels or video screens.
`Games of skill comprise a skill component in which a
`player combines letters or words (word puzzles), answers
`questions (trivia), overcomes challenges ( video games), com(cid:173)
`petes with other players (networked video games), and the
`like. Generally, a game of skill is a game requiring a level of
`skill which does not rely solely on chance. Some games of
`skill require a high degree of expertise and knowledge and
`other games of skill require very limited expertise or knowl(cid:173)
`edge.
`On-Line Gaming
`In June 2001, Nevada signed a bill that could result in
`Nevada being the first state to offer legalized gambling over
`the Internet. The new law authorizes state gaming regulators
`to set up an infrastructure to license and oversee online gam(cid:173)
`ing in Nevada when such gaming becomes legal. Online
`gaming is a federal issue whose legality is unclear at present.
`A variety of technological limitations have been asserted as
`preventing Congress's endorsement of on-line gaming. These
`technological limitations are related to the prevention of
`underage gambling, controlling of gambling addiction, and
`ensuring the security and reliability of on-line gaming.
`To prevent underage gambling prior art systems and meth(cid:173)
`ods use passwords, user IDs, credit cards and "click-through" 65
`agreements that ask the player to agree to being of legal
`gambling age by clicking on a button. Presently, there are no
`
`
`
`US 8,506,406 B2
`
`3
`Biometric applications for games of skill and games of
`chance are limited. For example biometric gaming applica(cid:173)
`tions are taught in U.S. Pat. No. 6,010,404 granted to Walker
`et al. teaches a method and apparatus for using player input
`codes (e.g., numeric, biometric or physical) to affect the 5
`outcomes of electronic gambling devices, such as slot
`machines. Additionally, U.S. Pat. No. 6,142,876 granted to
`Cumbers teaches a system and method for passively tracking
`the play of players playing gaming devices such as slot
`machines. Players provide identification information and 10
`facial recognition data is acquired by a digital or video cam(cid:173)
`era. For each player an account file and a file of the facial
`image data is stored. When the player plays the slot machine,
`a camera scans the player and acquires facial image data 15
`which is compared to stored data to identify the player. Fur(cid:173)
`thermore, U.S. Pat. No. 5,902,983 granted to Crevelt et al.
`teaches a gaming machine configured to perform EFT trans(cid:173)
`actions which are limited to preset amounts. The patent
`teaches the use of a fingerprint imaging device, and retinal 20
`scans for verifying a player's identity.
`Although biometric applications for gaming applications
`are known, biometric applications for on-line gaming sys(cid:173)
`tems are not known. Furthermore, the managing of biometric
`information and gaming information in an open network 25
`environment are not known. Additionally, the use of biomet(cid:173)
`rics in a gaming system and method to prevent underage
`gambling and prevent gambling addiction is not known.
`
`SUMMARY
`
`A network access device to run a gaming application is
`described. The network access device comprises a commu(cid:173)
`nications module configured to allow the network access
`device to communicate with a network. The network access
`device is configured to transmit user identification informa(cid:173)
`tion to a verification system and transmit security information
`to a verification system. When the user identification infor(cid:173)
`mation and security information have been verified by the
`verification system, the network access device receives a
`random game output generated by a gaming system.
`In another embodiment, the network access device to run a
`gaming application comprises a communications module
`configured to allow the network access device to communi(cid:173)
`cate with a network, a means for transmitting user identifica(cid:173)
`tion information to a verification system and a means for
`transmitting security information to a verification system.
`The network access device also comprises a means for receiv(cid:173)
`ing a random game output generated by a gaming system. The
`network access device further comprises a means for display(cid:173)
`ing the images associated with the game output.
`A method for running a gaming application on a network
`access device is also described. The method comprises trans(cid:173)
`mitting user identification information to a verification sys(cid:173)
`tem. The method further comprises transmitting security to
`the verification system. When the user identification informa(cid:173)
`tion and security information are verified by the verification
`system, the network access device receives a random game
`output generated by a gaming system. The network access
`device displays at least one image associated with the random
`game output.
`One advantage of the present invention is that it provides a
`system and method to prevent underage gambling.
`A further advantage of the present invention is that it pro(cid:173)
`vides a more secure and reliable and secure gaming system
`and method.
`
`4
`Another advantage of the present invention is that it pro(cid:173)
`vides a system and method for managing biometric informa(cid:173)
`tion and gaming information in an open network environ(cid:173)
`ment.
`Another advantage of the present invention is that it per(cid:173)
`mits a plurality of users in a geographically broad area to play
`the same game.
`A further advantage of the present invention is that it pro(cid:173)
`vides a pseudo-real time gaming system and method.
`Another advantage of the present invention is that it simu(cid:173)
`lates a game of chance such as a slot machine in an on-line
`environment.
`An additional advantage of the present invention is that it
`provides a networked jackpot.
`
`BRIEF DESCRIPTION
`
`A networked gaming system that comprises a verification
`system, a broadband gaming system and a transactional sys(cid:173)
`tem is described. The verification system operations include
`ensuring that a user is a registered player by using a biometric
`input. The broadband gaming system operations include
`managing and performing at least one game. The transac-
`tional system operations include providing oversight for each
`transaction conducted by the verification system and the
`broadband gaming system.
`A verification system for playing the networked gaming
`system is described. The networked games include games of
`30 chance and games of skill. The verification system commu(cid:173)
`nicates with a biometric input module and a network access
`device to generate a user identification information. The user
`identification information is compared to information in a
`registration database. If an acceptable match is made between
`35 the user identification information and the information in the
`registration database, the user is designated as a player. The
`player then has access to both the broadband gaming system
`and the transactional system.
`A broadband gaming system which is in communication
`40 with the verification system is described. The broadband
`gaming system includes a buffer which stores information
`about players who desire to play a game. The buffer is opera(cid:173)
`tively coupled to a random number generator that generates a
`random number for each player in the buffer. A paytable
`45 module in communication with the random number generator
`determines the outcome associated with the random number
`generator. The paytable also determines which images are
`associated with the outcome for each player. Preferably, the
`images are stored on a mini video server and then cached in a
`50 memory module. The images are intelligently buffered for
`downstream communications. In its preferred embodiment, a
`plurality of encoders are operatively coupled to the memory
`module caching the broadcast video streams. The plurality of
`encoders encode the broadcast downstream images according
`55 the requirements for each network access device. Each
`encoder is operatively coupled to an encryption module that
`encrypts the broadcast. A modulation module is operatively
`coupled to the encryption module and modulates encrypted
`images for downstream transmission. Each network access
`60 device includes a tuner, a demodulation module, and a
`decryption module that permits an image to be viewed by the
`network access device.
`A transactional system and method that ensures secure
`communications occur in the verification system and the
`65 broadband gaming system is described. The transactional
`system also performs accounting, bonusing, tracking and
`other such functions. Preferably, the transactional system is
`
`
`
`US 8,506,406 B2
`
`5
`capable of receiving a plurality of funds from a financial
`account and converting them to credits that are used in the
`broadband gaming system.
`The above description sets forth, rather broadly, the more
`important features of the present invention so that the detailed
`description of the preferred embodiment that follows may be
`better understood and contributions of the present invention
`to the art may be better appreciated. There are, of course,
`additional features of the invention that will be described
`below and will form the subject matter of claims. In this 10
`respect, before explaining at least one preferred embodiment
`of the invention in detail, it is to be understood that the
`invention is not limited in its application to the details of the
`construction and to the arrangement of the components set
`forth in the following description or as illustrated in the draw- 15
`ings. The invention is capable of other embodiments and of
`being practiced and carried out in various ways. Also, it is to
`be understood that the phraseology and terminology
`employed herein are for the purpose of description and should
`not be regarded as limiting.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`6
`12 operatively coupled to an interactive set-top box 14 that is
`operatively coupled to a cable network (not shown). The other
`network access device shown in FIG. le is a wireless device
`16 such as a digital phone or personal digital system (PDA) or
`5 other such wireless device which is configured to communi(cid:173)
`cate with a network using wireless networking protocols. Yet
`another network access device is shown in FIG. ld and
`includes a gaming terminal 18 such as a slot machine on a
`casino floor that is operatively coupled to a plurality of other
`gaming terminals. It shall be appreciated by those skilled in
`the art of networking that the distinguishing feature between
`each of these network access devices is the type of commu(cid:173)
`nications protocols used by each device to enable communi(cid:173)
`cations between similar network access devices.
`Each of the network access devices either includes a bio-
`metric input module operatively coupled to the network
`access device or includes a biometric input module commu(cid:173)
`nicatively coupled to the network access device. A biometric
`is a measurable psychological and/or behavioral trait that can
`20 be captured and subsequently compared with another
`instance at the time of verification. This definition includes
`the matching of fingerprints, voice patterns, hand geometry,
`iris and retina scans, vein patterns and other such methodolo(cid:173)
`gies. For purposes of the invention described heretofore, the
`25 definition of biometrics also includes signature verification,
`keystroke patterns and other methodologies weighted
`towards individual behavior.
`In one illustrative embodiment, the biometric input module
`is a fingerprint scanner 20 resident on the gaming terminal 18
`wherein the biometric input is a fingerprint. In another illus(cid:173)
`trative embodiment, the biometric input module is the screen
`22 of wireless device 16 wherein the screen is configured to
`receive a biometric input such as a user signature. In yet
`another illustrative embodiment, the biometric input module
`35 is a telephone 24 that is configured to receive a voice pattern
`from a user prior to engaging communications with the inter(cid:173)
`active set-top box 14. In yet another illustrative embodiment
`the biometric input module is a keyboard 26 operatively
`coupled to computer 10 wherein the user is requested to input
`40 a keystroke pattern. An illustrative example of a biometric
`input module operatively coupled to the network access
`device is shown in FIG. ld having the fingerprint scarmer 20
`on the gaming terminal 18. An illustrative example of a bio(cid:173)
`metric input module, e.g. the telephone 24, communicatively
`45 coupled to the network access device, e.g. the interactive
`set-top box 14, is shown in FIG. lb.
`The biometric input is used to prevent unauthorized gam(cid:173)
`ing activity and efficiently store credits on the user's behalf.
`By way of example and not oflimitation, unauthorized gam-
`50 ing activity includes preventing underage gaming and prohib(cid:173)
`iting players with histories of gambling addiction. Addition(cid:173)
`ally, player credits may be stored on a network so that the
`player does not need to carry coins, paper currency, coupons,
`credit cards or debits cards to play a game. It shall be appre-
`55 ciated by those skilled in the art having the benefit of this
`disclosure that different biometric input modules may be used
`in conjunction with different network access devices.
`Gaming System
`Referring to FIG. 2 there is shown a high level block
`60 diagram of a gaming system 30 in communication with a
`plurality of network access devices coupled to a network 32.
`The gaming system includes a verification system 34, a
`broadband gaming system 36 and a transactional system 38.
`The verification system 34 verifies that a user operating a
`65 network access device is a registered player. The broadband
`gaming system 36 performs the function of generating a game
`and broadcasting the game results to each of the network
`
`Preferred embodiments of the present invention are shown
`in the accompanying drawings wherein:
`FIG. la through FIG. ld provide diagrams of a plurality of
`network access devices.
`FIG. 2 is a high level diagram of a gaming system net(cid:173)
`worked to a plurality of network access devices.
`FIG. 3 is a block diagram of an illustrative biometric input 30
`module.
`FIG. 4 is a block diagram of a gaming system configured to
`receive a biometric input from a network access device.
`FIG. 5 is a table of the data fields in a verification system.
`FIG. 6 is a table of the data fields in a broadband gaming
`system and in a transactional system.
`FIG. 7 is a block diagram of a broadband gaming system.
`FIG. 8 is a flowchart of the registration method for the
`gaming system.
`FIG. 9 is a flowchart of the verification method for the
`gaming system.
`FIG. 10 is a flowchart of the information processed by the
`gaming system.
`FIG. 11 is a continuation of the flowchart of the informa(cid:173)
`tion processed by the gaming system in FIG. 10.
`
`DETAILED DESCRIPTION
`
`In the following detailed description of the preferred
`emb