throbber
PATENT APPLICATION
`
`BIOMETRIC BROADBAND GAMING
`SYSTEM AND METHOD
`
`Inventor(s):
`
`Michael A. Kerr
`302 Chimney Rock Rd.
`Stateline, NV 89449
`
`Assignee:
`
`Entity:
`
`NONE
`
`Small
`
`Attorney for Applicant(s):
`
`Michael A. Kerr
`P. 0. Box 2345
`Stateline, NV 89449
`Tel: (775) 588-9498
`Fax: (775) 588-9788
`Reg. No. 42,722
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Attorney Docket Number: KerrOl.003
`
`

`

`Page2
`
`BIOMETRIC BROADBAND GAMING
`SYSTEM AND METHOD
`
`CROSS REFERENCES TO RELATED APPLICATIONS
`
`This patent application is a continuation-in-part of provisional patent application
`60/266,856 filed on February 6, 2001.
`
`BACKGROUND OF THE INVENTION
`
`5
`
`15
`
`1. Field of Invention
`
`The present invention is a biometric broadband interactive gaming system and
`
`method. More particularly, the biometric broadband interactive gaming system and method
`
`20
`
`operates in a networked environment which interfaces with a plurality of network access
`
`devices including personal computers, wireless devices, and interactive set-top boxes.
`
`2. Description of Related Art
`
`The related art includes gaming devices, on-line gaming, networked interactive
`
`25
`
`gaming, and biometrics.
`
`Gaming Devices
`
`For purposes of this patent, the term "gaming" shall refer to either gambling and/or
`
`gaming applications. Gaming devices include games of skill and games of chance. Games of
`
`30
`
`chance include many casino-type gaming devices in which the outcome of the game depends,
`
`at least in part, on a randomly generated event. For example, a game of chance may use a
`
`random number generator to generate a random or pseudo-random number. The random
`
`number may then be compared to a predefined table to determine the outcome of the event.
`
`If the random number falls within a certain range of numbers on the table, the player may win
`
`35
`
`a predefined prize. The table may also contain display information that allows the gaming
`
`

`

`Page 3
`
`device to generate a display that corresponds to the outcome of the game. The gaming device
`
`may present the outcome of the game on a large variety of display devices, such as
`
`mechanical spinning reels or video screens.
`
`Games of skill comprise a skill component in which a player combines letters or
`
`5 words (word puzzles), answers questions (trivia), overcomes challenges (video games),
`
`competes with other players (networked video games), and the like. Generally, a game of
`
`skill is a game requiring a level of skill which does not rely solely on chance. Some games of
`
`skill require a high degree of expertise and knowledge and other games of skill require very
`
`limited expertise or knowledge.
`
`On-Line Gaming
`
`In June 2001, Nevada signed a bill that could result in Nevada being the first state to
`
`offer legalized gambling over the Internet. The new law authorizes state gaming regulators to
`
`set up an infrastructure to license and oversee online gaming in Nevada when such gaming
`
`15
`
`becomes legal. Online gaming is a federal issue whose legality is unclear at present.
`
`A variety of technological limitations have been asserted as preventing Congress's
`
`endorsement of on-line gaming. These technological limitations are related to the preventing
`
`of underage gambling, controlling of gambling addiction, and ensuring the security and
`
`reliability of on-line gaming is secure and reliable.
`
`20
`
`To prevent underage gambling prior art systems and methods use passwords, user
`
`ID's, credit cards and "click-through" agreements that ask the player to agree to being of
`
`legal gambling age by clicking on a button. Presently, there are no systems and methods to
`
`control on-line gambling addiction. With respect to ensuring that on-line gaming is secure
`
`and reliable, prior art systems and methods use various cryptographic techniques such as
`
`25
`
`RSA encryption, digital certificates, or other similar well known cryptographic methods.
`
`These cryptographic methods are helpful in ensuring secure communications, however these
`
`cryptographic methods do not ensure that the individual accessing the on-line game is a valid
`
`user.
`
`In view of the prior art systems, a minor or other unauthorized individual simply
`
`30
`
`needs a user ID and a corresponding password to access a gaming site. The obtaining of a
`
`

`

`Page4
`
`user ID and password is a relatively simple task as this information is generally not modified.
`
`Commonly the user ID information is acquired by identifying the web site's naming
`
`convention for the player. The player password can be easily determined by remembering
`
`the pattern of keys typed by the player during the log-on procedures or by simply requesting
`
`5
`
`the password from the player as part of a diagnostic procedure. The latter is a trick
`
`commonly used by hackers to access a system. The password problem may be overcome by
`
`modifying the password on a regular basis, however the player must then remember the
`
`modified password. Should the player forget the password a new password is mailed.
`
`During the mailing process it is common for e-mail to be easily intercepted in cyberspace.
`
`10 Additionally, it is common for unauthorized users to simulate being at a certain location by
`
`submitting an IP address that identifies an authorized user.
`
`Therefore, a better system and method for identifying a valid user is needed.
`
`Additionally, it would be beneficial to provide a gaming system and method that would:
`
`prevent underage gambling, be simple to implement, prevent gambling addiction, and
`
`15
`
`provide a higher degree of security and reliability from unauthorized users.
`
`Networked Interactive Gaming
`
`Networked interactive gaming in an open networked environment such as the Internet
`
`is well-known. However, interactive gaming in an open network such as the Internet is
`
`20
`
`confined to communicating with other devices using the same TCP/IP protocols. Currently
`
`networked interactive gaming systems using the TCP/IP protocol are not configured to
`
`communicate with interactive set-top boxes using MPEG protocols.
`
`Networked interactive gaming in an open networked environment using traditional
`
`security methods such as secure socket layers and digital certificates are well known.
`
`25 However, networked interactive gaming in an open networked environment using traditional
`
`security methods does not prevent gambling from a minor having acquired a parent's user ID
`
`and password without the parent's consent.
`
`Networked interactive gaming using LANs and WANs for progressive slot machines
`
`having large jackpots are also well-known. However, networked interactive systems using
`
`30
`
`LANs and WANs for progressive slot machines generally exist in a highly secure proprietary
`
`

`

`Page 5
`
`network environment. Thus, the creation of a progressive slot machine with a large jackpot
`
`in an open network environment is not well known.
`
`Biometrics
`
`5
`
`A biometric is a measurable psychological and/or behavioral trait that can be captured
`
`and subsequently compared with another instance at the time of verification. This definition
`
`includes the matching of fingerprints, voice patterns, hand geometry, iris and retina scans,
`
`vein patterns and other such methodologies. For purposes of the invention described
`
`heretofore, the definition of biometrics also includes signature verification, keystroke patterns
`
`1 0
`
`and other methodologies weighted towards individual behavior.
`
`Biometric applications for games of skill and games of chance are limited. For
`
`example biometric gaming applications are taught in U.S. Patent 6,010,404 granted to Walker
`
`et al. teaches a method and apparatus for using player input codes ( e.g., numeric, biometric or
`
`physical) to affect the outcomes of electronic gambling devices, such as slot machines.
`
`15 Additionally, U.S. Patent No. 6,142,876 granted to Cumbers teaches a system and method for
`
`passively tracking the play of players playing gaming devices such as slot machines. Players
`
`provide identification information and facial recognition data is acquired by a digital or video
`
`camera. For each player an account file and a file of the facial image data is stored. When the
`
`player plays the slot machine, a camera scans the player and acquires facial image data which
`
`20
`
`is compared to stored data to identify the player. Furthermore, U.S. Patent No. 5,902,983
`
`granted to Crevelt et al., teaches a gaming machine configured to perform EFT transactions
`
`which are limited to preset amounts. The patent teaches the use of a fingerprint imaging
`
`device, and retinal scans for verifying a player's identity.
`
`Although biometric applications for gaming applications are known, biometric
`
`25
`
`applications for on-line gaming systems are not known. Furthermore, the managing of
`
`biometric information and gaming information in an open network environment is not
`
`known. Additionally, the use of biometrics in a gaming system and method to prevent
`
`underage gambling and prevent gambling addiction is not known.
`
`30
`
`

`

`Page 6
`
`1.
`
`Advantages of the Invention
`
`SUMMARY OF INVENTION
`
`One of the advantages of the present invention is that it provides a secure and reliable
`
`on-line gaming system and method.
`
`5
`
`A further advantage of the present invention is that it provides a secure system and
`
`method for identifying a user in an open network environment.
`
`A further advantage of the present invention is that it provides a system and method to
`
`prevent underage gambling.
`
`A further advantage of the present invention is that it provides a more secure and
`
`10
`
`reliable and secure gaming system and method.
`
`Another advantage of the present invention is that it provides a system and method for
`
`managing biometric information and gaming information in an open network environment.
`
`Another advantage of the present invention is that it permits a plurality of users in a
`
`geographically broad area to play the same game.
`
`15
`
`A further advantage of the present invention is that it provides a pseudo-real time
`
`gaming system and method.
`
`Another advantage of the present invention is that it simulates a game of chance such
`
`as a slot machine in an on-line environment.
`
`An additional advantage of the present invention is that it provides a networked
`
`20
`
`jackpot.
`
`2.
`
`Brief Description of the Invention
`
`The present invention is a networked gaming system that comprises a verification
`
`system, a broadband gaming system and a transactional system. The verification system
`
`25
`
`operations include ensuring that a user is a registered player by using a biometric input. The
`
`broadband gaming system operations include managing and performing at least one game.
`
`The transactional system operations include providing oversight for each transaction
`
`conducted by the verification system and the broadband gaming system.
`
`The present invention comprises a verification system for playing the networked
`
`30
`
`gaming system. The networked games include games of chance and games of skill. The
`
`

`

`Page 7
`
`verification system communicates with a biometric input module and a network access
`
`device to generate a user identification information. The user identification information is
`
`compared to information in a registration database. If an acceptable match is made between
`
`the user identification information and the information in the registration database, the user is
`
`5
`
`designated as a player. The player then has access to both the broadband gaming system and
`
`the transactional system.
`
`Additionally, the present invention includes a broadband gaming system which is in
`
`communication with the verification system. The broadband gaming system includes a
`
`buffer which stores information about players who desire to play a game. The buffer is
`
`10
`
`operatively coupled to a random number generator that generates a random number for each
`
`player in the buffer. A paytable module in communication with the random number
`
`generator determines the outcome associated with the random number generator. The
`
`paytable also determines which images associated with the outcome for each player.
`
`Preferably, the images are stored on a mini video server and then cached in a memory
`
`15 module. The images are intelligently buffered for downstream communications. In its
`
`preferred embodiment, a plurality of encoders are operatively coupled to the memory module
`
`caching the broadcast video streams. The plurality of encoders encode the broadcast
`
`downstream images according to requirements for each network access device. Each encoder
`
`is operatively coupled to an encryption module that encrypts the broadcast. A modulation
`
`20 module is operatively coupled to the encryption module and modulates encrypted images for
`
`downstream transmission. Each network access device includes a tuner, a demodulation
`
`module, and a decryption module that permits an image to be viewed by the network access
`
`device.
`
`Further still the present invention provides a transactional system and method that
`
`25
`
`ensures secure communications occur in the verification system and the broadband gaming
`
`system. The transactional system also performs accounting, bonusing, tracking and other
`
`such functions. Preferably, the transactional system is capable of receiving a plurality of
`
`funds from a financial account and converting them to credits that are used in the broadband
`
`gaming system.
`
`30
`
`

`

`Page 8
`
`The above description sets forth, rather broadly, the more important features of the
`
`present invention so that the detailed description of the preferred embodiment that follows
`
`may be better understood and contributions of the present invention to the art may be better
`
`appreciated. There are, of course, additional features of the invention that will be described
`
`5
`
`below and will form the subject matter of claims. In this respect, before explaining at least
`
`one preferred embodiment of the invention in detail, it is to be understood that the invention
`
`is not limited in its application to the details of the construction and to the arrangement of the
`
`components set forth in the following description or as illustrated in the drawings. The
`
`invention is capable of other embodiments and of being practiced and carried out in various
`
`1 0 ways. Also, it is to be understood that the phraseology and terminology employed herein are
`
`for the purpose of description and should not be regarded as limiting.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Preferred embodiments of the present invention are shown in the accompanying
`
`15
`
`drawings wherein:
`
`FIG. la through FIG. Id provide diagrams of a plurality of network access devices.
`
`FIG. 2 is a high level diagram of a gaming system networked to a plurality of network
`
`access devices.
`
`FIG. 3 is a block diagram of an illustrative biometric input module.
`
`20
`
`FIG. 4 is a block diagram of a gaming system configured to receive a biometric input
`
`from a network access device.
`
`FIG. 5 is a table of the data fields in a verification system.
`
`FIG. 6 is a table of the data fields in a broadband gaming system and in a transactional
`
`system.
`
`25
`
`FIG. 7 is a block diagram of a broadband gaming system.
`
`FIG. 8 is a flowchart of the registration method for the gaming system.
`
`FIG. 9 is a flowchart of the verification method for the gaming system.
`
`FIG. 10 is a flowchart of the gaming method for the gaming system.
`
`FIG. 11 is a flowchart of the method for purchasing credits for the gaming system.
`
`30
`
`FIG. 12 is a flowchart of the method for storing credits on the gaming system.
`
`

`

`Page9
`
`FIG. 13 is a flowchart of the information processed by the broadband gaming system.
`
`FIG. 14 is a continuation of the FIG. 13 flowchart.
`
`FIG. 15 is a flowchart of the information processed by the transactional system in
`
`communication with the broadband gaming system.
`
`5
`
`DESCRIPTION OF THE PREFERRED EMBODIMENT
`
`In the following detailed description of the preferred embodiments, reference is made
`
`to the accompanying drawings, which form a part of this application. The drawings show, by
`
`way of illustration, specific embodiments in which the invention may be practiced. It is to be
`
`1 0
`
`understood that other embodiments may be utilized and structural changes may be made
`
`without departing from the scope of the present invention.
`
`NETWORK ACCESS DEVICES
`
`Referring to FIG. la through FIG. ld there is shown a plurality of illustrative network
`
`15
`
`access devices. Each of the network access devices is configured to be capable of running a
`
`gaming application. For illustrative purposes the gaming application shown simulates the
`
`spinning reels of a slot machine.
`
`The network access device in FIG. la is a personal computer 10 having a network
`
`interface card (not shown) that may be operatively coupled to a modem (not shown).
`
`20 Another network access device shown in FIG. 1 b includes a television 12 operatively coupled
`
`to an interactive set-top box 14 that is operatively coupled to a cable network (not shown).
`
`The other network access device shown in FIG. le is a wireless device 16 such as a digital
`
`phone or personal digital system (PDA) or other such wireless device which is configured to
`
`communicate with a network using wireless networking protocols. Yet another network
`
`25
`
`access device is shown in FIG. Id and includes a gaming terminal 18 such as a slot machine
`
`on a casino floor that is operatively coupled to a plurality of other gaming tem1inals. It shall
`
`be appreciated by those skilled in the art of networking that the distinguishing feature
`
`between each of these network access devices is the type of communications protocols used
`
`by each device to enable communications between similar network access devices.
`
`30
`
`

`

`Page 10
`
`Each of the network access devices either includes a biometric input module
`
`operatively coupled to the network access device or includes a biometric input module
`
`communicatively coupled to the network access device. A biometric is a measurable
`
`psychological and/or behavioral trait that can be captured and subsequently compared with
`
`5
`
`another instance at the time of verification. This definition includes the matching of
`
`fingerprints, voice patterns, hand geometry, iris and retina scans, vein patterns and other such
`
`methodologies. For purposes of the invention described heretofore, the definition of
`
`biometrics also includes signature verification, keystroke patterns and other methodologies
`
`weighted towards individual behavior.
`
`10
`
`In one illustrative embodiment, the biometric input module is a fingerprint scanner 20
`
`resident on the gaming terminal 18 wherein the biometric input is a fingerprint. In another
`
`illustrative embodiment, the biometric input module is the screen 22 of wireless device 16
`
`wherein the screen is configured to receive a biometric input such as a user signature. In yet
`
`another illustrative embodiment, the biometric input module is a telephone 24 that is
`
`15
`
`configured to receive a voice pattern from a user prior to engaging communications with the
`
`interactive set-top box 14. In yet another illustrative embodiment the biometric input module
`
`is a keyboard 26 operatively coupled to computer 10 wherein the user is requested to input a
`
`keystroke pattern. An illustrative example of a biometric input module operatively coupled
`
`to the network access device is shown in FIG. 1 d having the fingerprint scanner 20 on the
`
`20
`
`gaming terminal 18. An illustrative example of a biometric input module, e.g. the telephone
`
`24, communicatively coupled to the network access device, e.g. the interactive set-top box
`
`14, is shown in FIG. lb
`
`The biometric input is used to prevent unauthorized gaming activity and to efficiently
`
`store credits on the user's behalf. By way of example and not of limitation, unauthorized
`
`25
`
`gaming activity includes underage gaming and players with histories of gambling addiction.
`
`Additionally, player credits may be stored on a network so that the player does not need to
`
`carry coins, paper currency, coupons, credit cards or debits cards to play a game. It shall be
`
`appreciated by those skilled in the art having the benefit of this disclosure that different
`
`biometric input modules may be used in conjunction with different network access devices.
`
`30
`
`

`

`Page 11
`
`GAMING SYSTEM
`
`Referring to FIG. 2 there is shown a high level block diagram of a gaming system 30
`
`in communication with a plurality of network access devices coupled to a network 32. The
`
`gaming system includes a verification system 34, a broadband gaming system 36 and a
`
`5
`
`transactional system 38. The verification system 34 verifies that a user operating a network
`
`access device is a registered player. The broadband gaming system 36 performs the function
`
`of generating a game and broadcasting the game results to each of the network access
`
`devices. The transactional system 38 performs a plurality of functions including tracking
`
`each transaction performed by both the verification system and the broadband gaming system
`
`10
`
`and conducting electronic fund transfers.
`
`Verification System
`
`The verification system 34 verifies that a user desiring to play the game is a registered
`
`player. The verification system 34 communicates with the biometric input module and a
`
`15
`
`network access device to generate user identification information. The user identification
`
`information includes information such as cryptographic keys that are necessary to securely
`
`identify the network access device. The user identification information also includes media
`
`access control (MAC) identification and confirmation of the user Internet Protocol (IP)
`
`address. The user identification information is compared to information in a registration
`
`20
`
`database 40 by a verification server 42. If an acceptable match is made between the user
`
`identification information and the information in the registration database, the user is
`
`designated as a player. The player then has access to either the broadband gaming system 36
`
`or the transactional system 38.
`
`In an alternative embodiment the user identification information is housed in a smart
`
`25
`
`card (not shown) that is in communication with the verification system 34. The smart card
`
`includes a stored biometric which is used to identify the user as a player. Cryptographic keys
`
`are then exchanged between the verification system 34 and the smart card to provide the
`
`player access to either the broadband gaming system or the transactional system 38.
`
`Referring to FIG. 3 there is shown an illustrative biometric input module 50. By way
`
`30
`
`of example, the illustrative biometric input module 50 is a fingerprint scanner. It shall be
`
`

`

`Page 12
`
`appreciated by those skilled in the art having the benefit of this disclosure that the use of the
`
`fingerprint scanner as the illustrative biometric input module is not restrictive. A scanned
`
`fingerprint image is collected by the biometric input 52. After the scanned fingerprint image
`
`is collected, the fingerprint image is compressed by the compression module 54. A memory
`
`5 module 56 provides fast memory resources for the compression of the fingerprint image.
`
`After compression, the fingerprint image is encrypted by the encryption module 58 for
`
`downstream transmission. The encryption module 58 also includes a memory module 60
`
`that provides fast memory resources for the encryption of the compressed fingerprint image.
`
`An encrypted compressed fingerprint image is then communicated to network 32 (see FIG. 2)
`
`10
`
`using the network interface module 62.
`
`Referring to FIG. 4 there is shown a block diagram of the verification system 34. The
`
`verification system is operatively coupled to network 32 with network interface module 64.
`
`The network interface module 64 is configured to receive user identification information
`
`generated by the network access devices and from the biometric input module. Preferably,
`
`15
`
`the biometric and other user identification information received by the verification system is
`
`an encrypted biometric that is decrypted by decryption module 66. A memory module 68 is
`
`preferably a fast memory module that expedites the decryption process. After decryption, the
`
`biometric and remaining user identification information is processed by the verification
`
`server. It shall be appreciated by those skilled in the art that the verification server 42 may
`
`20
`
`house the network interface module 64, decryption module 66 and the memory module 68.
`
`The verification server 42 is also in operative communication with a registration database 40.
`
`The verification server 42 performs the function of matching the user identification
`
`information collected from the network access device with the player information in the
`
`registration database 40. Additionally, the verification server 42 performs the caching
`
`25
`
`functions needed to ensure that once a player has been identified during an initial game,
`
`subsequent usage by the same player proceeds quickly.
`
`Preferably, the verification server 42 identifies registered players using a biometric
`
`template of the registered player residing on the registration database 40. The registered
`
`players are referenced with Personal ID numbers. When a transaction is undertaken the user
`
`30
`
`firstly calls up the particular template from the registration database 40 by inputting a
`
`

`

`Page 13
`
`Personal ID. The Personal ID includes a particular number, user ID, password or other such
`
`identification techniques. The inputting of the Personal ID is accomplished with a familiar
`
`numeric keypad, keyboard, magstripe card or smart card. The correct template is called and
`
`held in memory ready for comparison with the biometric sample provided by the user. A
`
`5
`
`comparison takes place that results in a binary true or false condition as to the identity of the
`
`user. The user is in effect claiming an identity by inputting the Personal ID and the system is
`
`subsequently verifying that the claim is genuine according to the matching criteria setup
`
`within the system.
`
`Referring to FIG. 5 there is shown the registration data fields 70 and user submitted
`
`1 0
`
`data fields 72. The registration data fields 70 include data fields that comprise the user
`
`identification information. The registration data fields include user identification information
`
`such as player name, address, user name, password, credit card information, and the date and
`
`time of the registration. The player biometric and Personal ID also comprises the user
`
`identification information and provides unique information about the player. The Personal
`
`15
`
`ID may be the same as the user name or password. It shall be appreciated by those skilled in
`
`the art that some biometric information may be compressed. Furthermore, the user
`
`identification information includes data about the network access device and the network
`
`connection such as MAC ID, IP addresses, browser type, any cookies resident on the network
`
`access device, etc. Finally, the user identification system includes cryptographic keys which
`
`20
`
`are used to encrypt and decrypt the communications between the verification system and each
`
`of the network access devices.
`
`The user submitted data fields 72 mirror the registration data fields 70. The user
`
`submitted data fields receive data generated by a user that is attempting to access the
`
`broadband gaming system 36. The user submitted information is carefully analyzed to ensure
`
`25
`
`that a valid user is being identified. It is well known that the connection of one network
`
`access device to another network access device generates security concerns. Preferably, the
`
`present verification system operates using a fast hardware-type firewall that performs a
`
`stateful multilayer inspection. In its preferred embodiment the firewall provides packet
`
`filtering using a secure protocol such as IP Sec. This protocol provides encryption of the data
`
`30
`
`at the packet level as well as at the source address level. Without access to the encryption
`
`

`

`Page 14
`
`keys, a potential intruder would have difficulty penetrating the firewall. Additionally, it
`
`would be preferable to provide a circuit level gateway and an application level gateway. The
`
`circuit level gateway works on the session layer of the OSI model or the TCP layer of the
`
`TCP/IP model and monitors TCP handshaking between packets to determine whether a
`
`5
`
`requested session is legitimate. The application level gateway filters data packets at the
`
`application layer of the OSI model. A stateful multilayer inspection firewall offers a high
`
`level of security, good performance and transparency to end users.
`
`Referring to FIG. 6 there is shown the player data fields 74 that are generated by the
`
`broadband gaming system and the transactional system after the user has been verified to be a
`
`10
`
`registered player. The player data fields 74 are used to generate a player matrix which is used
`
`as an additional internal security measure. The player data fields 74 include a Player ID that
`
`identifies the player, a timestamp that provides the date, time in and time out by the player
`
`during the game. Additionally, the type of game, credits played, and credits remaining are
`
`monitored. Based on the level of player activity a bonus is provided to the player. Further
`
`15
`
`still the session time for each type of game and the amount played during the session is
`
`monitored to better define the type of games the player likes. Transactional information is
`
`also monitored and updated, preferably, by the transactional system 38. The transactional
`
`information includes credit card information, transaction requests, transaction approval,
`
`conversion of monetary funds to credits for playing the game, any transfers of credits for
`
`20
`
`playing the game, and conversions from credits to monetary funds that are credited to the
`
`player's financial account. Preferably, communications between the transactional system and
`
`the broadband gaming system are conducted in a secure environment using cryptographic
`
`keys. Although the use of cryptography within the private network may appear excessive,
`
`one of the greatest security threats within a private network comes from its own employees.
`
`25
`
`Therefore, it is preferable to use internal firewalls for communications between the
`
`broadband gaming system, the transactional system and the verification system.
`
`Broadband Gaming System
`
`A more detailed drawing of the broadband gaming system is provided in FIG. 7. The
`
`30
`
`dashecj boundary in FIG. 7 defines the broadband gaming system 36. After player
`
`

`

`Page 15
`
`verification is completed at the verification system 34, the broadband gaming system 34 is
`
`engaged. The broadband gaming system 34 includes a player buffer 84 configured to receive
`
`the players who will be playing the game. The player buffer 84 generates an initial player
`
`matrix with player data fields 74.
`
`5
`
`A countdown timer 82 is coupled to the player buffer 80. Preferably, the countdown
`
`timer 82 is also displayed to the player. The countdown timer 82 provides a window of time
`
`within which players may join the game. The players that have joined the game before the
`
`end of the timing period are stored in the buffer. When the timing period reaches zero the
`
`initial player matrix is communicated to the transactional system 38 and to the gaming
`
`10 module 84.
`
`The gaming module 84 provides a game that is played by the plurality of players. The
`
`game may include a plurality of different games and the type of game is not restrictive to this
`
`invention. Preferably, the gaming module 84 includes at least one random number generator
`
`86 and a paytable module 88.
`
`15
`
`The random number generator 86 is operatively coupled to the player buffer. The
`
`random number generator 86 generates at least one random number that is stored in the
`
`player matrix. In one embodiment, at least one random number is generated for the plurality
`
`of players playing the game. In an alternative embodiment, at least one random number is
`
`generated for each player. In yet another embodiment, a plurality of random numbers are
`
`20
`
`generated that are applied to the plurality of players playing the game. Preferably, the
`
`random number generator 86 is a fast hardware module.
`
`A paytable module 88 is operatively coupled to the random number generator 86.
`
`The paytable module 88 is a programmable module that dete

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket