`
`BIOMETRIC BROADBAND GAMING
`SYSTEM AND METHOD
`
`Inventor(s):
`
`Michael A. Kerr
`302 Chimney Rock Rd.
`Stateline, NV 89449
`
`Assignee:
`
`Entity:
`
`NONE
`
`Small
`
`Attorney for Applicant(s):
`
`Michael A. Kerr
`P. 0. Box 2345
`Stateline, NV 89449
`Tel: (775) 588-9498
`Fax: (775) 588-9788
`Reg. No. 42,722
`
`5
`
`10
`
`15
`
`20
`
`25
`
`30
`
`35
`
`Attorney Docket Number: KerrOl.003
`
`
`
`Page2
`
`BIOMETRIC BROADBAND GAMING
`SYSTEM AND METHOD
`
`CROSS REFERENCES TO RELATED APPLICATIONS
`
`This patent application is a continuation-in-part of provisional patent application
`60/266,856 filed on February 6, 2001.
`
`BACKGROUND OF THE INVENTION
`
`5
`
`15
`
`1. Field of Invention
`
`The present invention is a biometric broadband interactive gaming system and
`
`method. More particularly, the biometric broadband interactive gaming system and method
`
`20
`
`operates in a networked environment which interfaces with a plurality of network access
`
`devices including personal computers, wireless devices, and interactive set-top boxes.
`
`2. Description of Related Art
`
`The related art includes gaming devices, on-line gaming, networked interactive
`
`25
`
`gaming, and biometrics.
`
`Gaming Devices
`
`For purposes of this patent, the term "gaming" shall refer to either gambling and/or
`
`gaming applications. Gaming devices include games of skill and games of chance. Games of
`
`30
`
`chance include many casino-type gaming devices in which the outcome of the game depends,
`
`at least in part, on a randomly generated event. For example, a game of chance may use a
`
`random number generator to generate a random or pseudo-random number. The random
`
`number may then be compared to a predefined table to determine the outcome of the event.
`
`If the random number falls within a certain range of numbers on the table, the player may win
`
`35
`
`a predefined prize. The table may also contain display information that allows the gaming
`
`
`
`Page 3
`
`device to generate a display that corresponds to the outcome of the game. The gaming device
`
`may present the outcome of the game on a large variety of display devices, such as
`
`mechanical spinning reels or video screens.
`
`Games of skill comprise a skill component in which a player combines letters or
`
`5 words (word puzzles), answers questions (trivia), overcomes challenges (video games),
`
`competes with other players (networked video games), and the like. Generally, a game of
`
`skill is a game requiring a level of skill which does not rely solely on chance. Some games of
`
`skill require a high degree of expertise and knowledge and other games of skill require very
`
`limited expertise or knowledge.
`
`On-Line Gaming
`
`In June 2001, Nevada signed a bill that could result in Nevada being the first state to
`
`offer legalized gambling over the Internet. The new law authorizes state gaming regulators to
`
`set up an infrastructure to license and oversee online gaming in Nevada when such gaming
`
`15
`
`becomes legal. Online gaming is a federal issue whose legality is unclear at present.
`
`A variety of technological limitations have been asserted as preventing Congress's
`
`endorsement of on-line gaming. These technological limitations are related to the preventing
`
`of underage gambling, controlling of gambling addiction, and ensuring the security and
`
`reliability of on-line gaming is secure and reliable.
`
`20
`
`To prevent underage gambling prior art systems and methods use passwords, user
`
`ID's, credit cards and "click-through" agreements that ask the player to agree to being of
`
`legal gambling age by clicking on a button. Presently, there are no systems and methods to
`
`control on-line gambling addiction. With respect to ensuring that on-line gaming is secure
`
`and reliable, prior art systems and methods use various cryptographic techniques such as
`
`25
`
`RSA encryption, digital certificates, or other similar well known cryptographic methods.
`
`These cryptographic methods are helpful in ensuring secure communications, however these
`
`cryptographic methods do not ensure that the individual accessing the on-line game is a valid
`
`user.
`
`In view of the prior art systems, a minor or other unauthorized individual simply
`
`30
`
`needs a user ID and a corresponding password to access a gaming site. The obtaining of a
`
`
`
`Page4
`
`user ID and password is a relatively simple task as this information is generally not modified.
`
`Commonly the user ID information is acquired by identifying the web site's naming
`
`convention for the player. The player password can be easily determined by remembering
`
`the pattern of keys typed by the player during the log-on procedures or by simply requesting
`
`5
`
`the password from the player as part of a diagnostic procedure. The latter is a trick
`
`commonly used by hackers to access a system. The password problem may be overcome by
`
`modifying the password on a regular basis, however the player must then remember the
`
`modified password. Should the player forget the password a new password is mailed.
`
`During the mailing process it is common for e-mail to be easily intercepted in cyberspace.
`
`10 Additionally, it is common for unauthorized users to simulate being at a certain location by
`
`submitting an IP address that identifies an authorized user.
`
`Therefore, a better system and method for identifying a valid user is needed.
`
`Additionally, it would be beneficial to provide a gaming system and method that would:
`
`prevent underage gambling, be simple to implement, prevent gambling addiction, and
`
`15
`
`provide a higher degree of security and reliability from unauthorized users.
`
`Networked Interactive Gaming
`
`Networked interactive gaming in an open networked environment such as the Internet
`
`is well-known. However, interactive gaming in an open network such as the Internet is
`
`20
`
`confined to communicating with other devices using the same TCP/IP protocols. Currently
`
`networked interactive gaming systems using the TCP/IP protocol are not configured to
`
`communicate with interactive set-top boxes using MPEG protocols.
`
`Networked interactive gaming in an open networked environment using traditional
`
`security methods such as secure socket layers and digital certificates are well known.
`
`25 However, networked interactive gaming in an open networked environment using traditional
`
`security methods does not prevent gambling from a minor having acquired a parent's user ID
`
`and password without the parent's consent.
`
`Networked interactive gaming using LANs and WANs for progressive slot machines
`
`having large jackpots are also well-known. However, networked interactive systems using
`
`30
`
`LANs and WANs for progressive slot machines generally exist in a highly secure proprietary
`
`
`
`Page 5
`
`network environment. Thus, the creation of a progressive slot machine with a large jackpot
`
`in an open network environment is not well known.
`
`Biometrics
`
`5
`
`A biometric is a measurable psychological and/or behavioral trait that can be captured
`
`and subsequently compared with another instance at the time of verification. This definition
`
`includes the matching of fingerprints, voice patterns, hand geometry, iris and retina scans,
`
`vein patterns and other such methodologies. For purposes of the invention described
`
`heretofore, the definition of biometrics also includes signature verification, keystroke patterns
`
`1 0
`
`and other methodologies weighted towards individual behavior.
`
`Biometric applications for games of skill and games of chance are limited. For
`
`example biometric gaming applications are taught in U.S. Patent 6,010,404 granted to Walker
`
`et al. teaches a method and apparatus for using player input codes ( e.g., numeric, biometric or
`
`physical) to affect the outcomes of electronic gambling devices, such as slot machines.
`
`15 Additionally, U.S. Patent No. 6,142,876 granted to Cumbers teaches a system and method for
`
`passively tracking the play of players playing gaming devices such as slot machines. Players
`
`provide identification information and facial recognition data is acquired by a digital or video
`
`camera. For each player an account file and a file of the facial image data is stored. When the
`
`player plays the slot machine, a camera scans the player and acquires facial image data which
`
`20
`
`is compared to stored data to identify the player. Furthermore, U.S. Patent No. 5,902,983
`
`granted to Crevelt et al., teaches a gaming machine configured to perform EFT transactions
`
`which are limited to preset amounts. The patent teaches the use of a fingerprint imaging
`
`device, and retinal scans for verifying a player's identity.
`
`Although biometric applications for gaming applications are known, biometric
`
`25
`
`applications for on-line gaming systems are not known. Furthermore, the managing of
`
`biometric information and gaming information in an open network environment is not
`
`known. Additionally, the use of biometrics in a gaming system and method to prevent
`
`underage gambling and prevent gambling addiction is not known.
`
`30
`
`
`
`Page 6
`
`1.
`
`Advantages of the Invention
`
`SUMMARY OF INVENTION
`
`One of the advantages of the present invention is that it provides a secure and reliable
`
`on-line gaming system and method.
`
`5
`
`A further advantage of the present invention is that it provides a secure system and
`
`method for identifying a user in an open network environment.
`
`A further advantage of the present invention is that it provides a system and method to
`
`prevent underage gambling.
`
`A further advantage of the present invention is that it provides a more secure and
`
`10
`
`reliable and secure gaming system and method.
`
`Another advantage of the present invention is that it provides a system and method for
`
`managing biometric information and gaming information in an open network environment.
`
`Another advantage of the present invention is that it permits a plurality of users in a
`
`geographically broad area to play the same game.
`
`15
`
`A further advantage of the present invention is that it provides a pseudo-real time
`
`gaming system and method.
`
`Another advantage of the present invention is that it simulates a game of chance such
`
`as a slot machine in an on-line environment.
`
`An additional advantage of the present invention is that it provides a networked
`
`20
`
`jackpot.
`
`2.
`
`Brief Description of the Invention
`
`The present invention is a networked gaming system that comprises a verification
`
`system, a broadband gaming system and a transactional system. The verification system
`
`25
`
`operations include ensuring that a user is a registered player by using a biometric input. The
`
`broadband gaming system operations include managing and performing at least one game.
`
`The transactional system operations include providing oversight for each transaction
`
`conducted by the verification system and the broadband gaming system.
`
`The present invention comprises a verification system for playing the networked
`
`30
`
`gaming system. The networked games include games of chance and games of skill. The
`
`
`
`Page 7
`
`verification system communicates with a biometric input module and a network access
`
`device to generate a user identification information. The user identification information is
`
`compared to information in a registration database. If an acceptable match is made between
`
`the user identification information and the information in the registration database, the user is
`
`5
`
`designated as a player. The player then has access to both the broadband gaming system and
`
`the transactional system.
`
`Additionally, the present invention includes a broadband gaming system which is in
`
`communication with the verification system. The broadband gaming system includes a
`
`buffer which stores information about players who desire to play a game. The buffer is
`
`10
`
`operatively coupled to a random number generator that generates a random number for each
`
`player in the buffer. A paytable module in communication with the random number
`
`generator determines the outcome associated with the random number generator. The
`
`paytable also determines which images associated with the outcome for each player.
`
`Preferably, the images are stored on a mini video server and then cached in a memory
`
`15 module. The images are intelligently buffered for downstream communications. In its
`
`preferred embodiment, a plurality of encoders are operatively coupled to the memory module
`
`caching the broadcast video streams. The plurality of encoders encode the broadcast
`
`downstream images according to requirements for each network access device. Each encoder
`
`is operatively coupled to an encryption module that encrypts the broadcast. A modulation
`
`20 module is operatively coupled to the encryption module and modulates encrypted images for
`
`downstream transmission. Each network access device includes a tuner, a demodulation
`
`module, and a decryption module that permits an image to be viewed by the network access
`
`device.
`
`Further still the present invention provides a transactional system and method that
`
`25
`
`ensures secure communications occur in the verification system and the broadband gaming
`
`system. The transactional system also performs accounting, bonusing, tracking and other
`
`such functions. Preferably, the transactional system is capable of receiving a plurality of
`
`funds from a financial account and converting them to credits that are used in the broadband
`
`gaming system.
`
`30
`
`
`
`Page 8
`
`The above description sets forth, rather broadly, the more important features of the
`
`present invention so that the detailed description of the preferred embodiment that follows
`
`may be better understood and contributions of the present invention to the art may be better
`
`appreciated. There are, of course, additional features of the invention that will be described
`
`5
`
`below and will form the subject matter of claims. In this respect, before explaining at least
`
`one preferred embodiment of the invention in detail, it is to be understood that the invention
`
`is not limited in its application to the details of the construction and to the arrangement of the
`
`components set forth in the following description or as illustrated in the drawings. The
`
`invention is capable of other embodiments and of being practiced and carried out in various
`
`1 0 ways. Also, it is to be understood that the phraseology and terminology employed herein are
`
`for the purpose of description and should not be regarded as limiting.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`Preferred embodiments of the present invention are shown in the accompanying
`
`15
`
`drawings wherein:
`
`FIG. la through FIG. Id provide diagrams of a plurality of network access devices.
`
`FIG. 2 is a high level diagram of a gaming system networked to a plurality of network
`
`access devices.
`
`FIG. 3 is a block diagram of an illustrative biometric input module.
`
`20
`
`FIG. 4 is a block diagram of a gaming system configured to receive a biometric input
`
`from a network access device.
`
`FIG. 5 is a table of the data fields in a verification system.
`
`FIG. 6 is a table of the data fields in a broadband gaming system and in a transactional
`
`system.
`
`25
`
`FIG. 7 is a block diagram of a broadband gaming system.
`
`FIG. 8 is a flowchart of the registration method for the gaming system.
`
`FIG. 9 is a flowchart of the verification method for the gaming system.
`
`FIG. 10 is a flowchart of the gaming method for the gaming system.
`
`FIG. 11 is a flowchart of the method for purchasing credits for the gaming system.
`
`30
`
`FIG. 12 is a flowchart of the method for storing credits on the gaming system.
`
`
`
`Page9
`
`FIG. 13 is a flowchart of the information processed by the broadband gaming system.
`
`FIG. 14 is a continuation of the FIG. 13 flowchart.
`
`FIG. 15 is a flowchart of the information processed by the transactional system in
`
`communication with the broadband gaming system.
`
`5
`
`DESCRIPTION OF THE PREFERRED EMBODIMENT
`
`In the following detailed description of the preferred embodiments, reference is made
`
`to the accompanying drawings, which form a part of this application. The drawings show, by
`
`way of illustration, specific embodiments in which the invention may be practiced. It is to be
`
`1 0
`
`understood that other embodiments may be utilized and structural changes may be made
`
`without departing from the scope of the present invention.
`
`NETWORK ACCESS DEVICES
`
`Referring to FIG. la through FIG. ld there is shown a plurality of illustrative network
`
`15
`
`access devices. Each of the network access devices is configured to be capable of running a
`
`gaming application. For illustrative purposes the gaming application shown simulates the
`
`spinning reels of a slot machine.
`
`The network access device in FIG. la is a personal computer 10 having a network
`
`interface card (not shown) that may be operatively coupled to a modem (not shown).
`
`20 Another network access device shown in FIG. 1 b includes a television 12 operatively coupled
`
`to an interactive set-top box 14 that is operatively coupled to a cable network (not shown).
`
`The other network access device shown in FIG. le is a wireless device 16 such as a digital
`
`phone or personal digital system (PDA) or other such wireless device which is configured to
`
`communicate with a network using wireless networking protocols. Yet another network
`
`25
`
`access device is shown in FIG. Id and includes a gaming terminal 18 such as a slot machine
`
`on a casino floor that is operatively coupled to a plurality of other gaming tem1inals. It shall
`
`be appreciated by those skilled in the art of networking that the distinguishing feature
`
`between each of these network access devices is the type of communications protocols used
`
`by each device to enable communications between similar network access devices.
`
`30
`
`
`
`Page 10
`
`Each of the network access devices either includes a biometric input module
`
`operatively coupled to the network access device or includes a biometric input module
`
`communicatively coupled to the network access device. A biometric is a measurable
`
`psychological and/or behavioral trait that can be captured and subsequently compared with
`
`5
`
`another instance at the time of verification. This definition includes the matching of
`
`fingerprints, voice patterns, hand geometry, iris and retina scans, vein patterns and other such
`
`methodologies. For purposes of the invention described heretofore, the definition of
`
`biometrics also includes signature verification, keystroke patterns and other methodologies
`
`weighted towards individual behavior.
`
`10
`
`In one illustrative embodiment, the biometric input module is a fingerprint scanner 20
`
`resident on the gaming terminal 18 wherein the biometric input is a fingerprint. In another
`
`illustrative embodiment, the biometric input module is the screen 22 of wireless device 16
`
`wherein the screen is configured to receive a biometric input such as a user signature. In yet
`
`another illustrative embodiment, the biometric input module is a telephone 24 that is
`
`15
`
`configured to receive a voice pattern from a user prior to engaging communications with the
`
`interactive set-top box 14. In yet another illustrative embodiment the biometric input module
`
`is a keyboard 26 operatively coupled to computer 10 wherein the user is requested to input a
`
`keystroke pattern. An illustrative example of a biometric input module operatively coupled
`
`to the network access device is shown in FIG. 1 d having the fingerprint scanner 20 on the
`
`20
`
`gaming terminal 18. An illustrative example of a biometric input module, e.g. the telephone
`
`24, communicatively coupled to the network access device, e.g. the interactive set-top box
`
`14, is shown in FIG. lb
`
`The biometric input is used to prevent unauthorized gaming activity and to efficiently
`
`store credits on the user's behalf. By way of example and not of limitation, unauthorized
`
`25
`
`gaming activity includes underage gaming and players with histories of gambling addiction.
`
`Additionally, player credits may be stored on a network so that the player does not need to
`
`carry coins, paper currency, coupons, credit cards or debits cards to play a game. It shall be
`
`appreciated by those skilled in the art having the benefit of this disclosure that different
`
`biometric input modules may be used in conjunction with different network access devices.
`
`30
`
`
`
`Page 11
`
`GAMING SYSTEM
`
`Referring to FIG. 2 there is shown a high level block diagram of a gaming system 30
`
`in communication with a plurality of network access devices coupled to a network 32. The
`
`gaming system includes a verification system 34, a broadband gaming system 36 and a
`
`5
`
`transactional system 38. The verification system 34 verifies that a user operating a network
`
`access device is a registered player. The broadband gaming system 36 performs the function
`
`of generating a game and broadcasting the game results to each of the network access
`
`devices. The transactional system 38 performs a plurality of functions including tracking
`
`each transaction performed by both the verification system and the broadband gaming system
`
`10
`
`and conducting electronic fund transfers.
`
`Verification System
`
`The verification system 34 verifies that a user desiring to play the game is a registered
`
`player. The verification system 34 communicates with the biometric input module and a
`
`15
`
`network access device to generate user identification information. The user identification
`
`information includes information such as cryptographic keys that are necessary to securely
`
`identify the network access device. The user identification information also includes media
`
`access control (MAC) identification and confirmation of the user Internet Protocol (IP)
`
`address. The user identification information is compared to information in a registration
`
`20
`
`database 40 by a verification server 42. If an acceptable match is made between the user
`
`identification information and the information in the registration database, the user is
`
`designated as a player. The player then has access to either the broadband gaming system 36
`
`or the transactional system 38.
`
`In an alternative embodiment the user identification information is housed in a smart
`
`25
`
`card (not shown) that is in communication with the verification system 34. The smart card
`
`includes a stored biometric which is used to identify the user as a player. Cryptographic keys
`
`are then exchanged between the verification system 34 and the smart card to provide the
`
`player access to either the broadband gaming system or the transactional system 38.
`
`Referring to FIG. 3 there is shown an illustrative biometric input module 50. By way
`
`30
`
`of example, the illustrative biometric input module 50 is a fingerprint scanner. It shall be
`
`
`
`Page 12
`
`appreciated by those skilled in the art having the benefit of this disclosure that the use of the
`
`fingerprint scanner as the illustrative biometric input module is not restrictive. A scanned
`
`fingerprint image is collected by the biometric input 52. After the scanned fingerprint image
`
`is collected, the fingerprint image is compressed by the compression module 54. A memory
`
`5 module 56 provides fast memory resources for the compression of the fingerprint image.
`
`After compression, the fingerprint image is encrypted by the encryption module 58 for
`
`downstream transmission. The encryption module 58 also includes a memory module 60
`
`that provides fast memory resources for the encryption of the compressed fingerprint image.
`
`An encrypted compressed fingerprint image is then communicated to network 32 (see FIG. 2)
`
`10
`
`using the network interface module 62.
`
`Referring to FIG. 4 there is shown a block diagram of the verification system 34. The
`
`verification system is operatively coupled to network 32 with network interface module 64.
`
`The network interface module 64 is configured to receive user identification information
`
`generated by the network access devices and from the biometric input module. Preferably,
`
`15
`
`the biometric and other user identification information received by the verification system is
`
`an encrypted biometric that is decrypted by decryption module 66. A memory module 68 is
`
`preferably a fast memory module that expedites the decryption process. After decryption, the
`
`biometric and remaining user identification information is processed by the verification
`
`server. It shall be appreciated by those skilled in the art that the verification server 42 may
`
`20
`
`house the network interface module 64, decryption module 66 and the memory module 68.
`
`The verification server 42 is also in operative communication with a registration database 40.
`
`The verification server 42 performs the function of matching the user identification
`
`information collected from the network access device with the player information in the
`
`registration database 40. Additionally, the verification server 42 performs the caching
`
`25
`
`functions needed to ensure that once a player has been identified during an initial game,
`
`subsequent usage by the same player proceeds quickly.
`
`Preferably, the verification server 42 identifies registered players using a biometric
`
`template of the registered player residing on the registration database 40. The registered
`
`players are referenced with Personal ID numbers. When a transaction is undertaken the user
`
`30
`
`firstly calls up the particular template from the registration database 40 by inputting a
`
`
`
`Page 13
`
`Personal ID. The Personal ID includes a particular number, user ID, password or other such
`
`identification techniques. The inputting of the Personal ID is accomplished with a familiar
`
`numeric keypad, keyboard, magstripe card or smart card. The correct template is called and
`
`held in memory ready for comparison with the biometric sample provided by the user. A
`
`5
`
`comparison takes place that results in a binary true or false condition as to the identity of the
`
`user. The user is in effect claiming an identity by inputting the Personal ID and the system is
`
`subsequently verifying that the claim is genuine according to the matching criteria setup
`
`within the system.
`
`Referring to FIG. 5 there is shown the registration data fields 70 and user submitted
`
`1 0
`
`data fields 72. The registration data fields 70 include data fields that comprise the user
`
`identification information. The registration data fields include user identification information
`
`such as player name, address, user name, password, credit card information, and the date and
`
`time of the registration. The player biometric and Personal ID also comprises the user
`
`identification information and provides unique information about the player. The Personal
`
`15
`
`ID may be the same as the user name or password. It shall be appreciated by those skilled in
`
`the art that some biometric information may be compressed. Furthermore, the user
`
`identification information includes data about the network access device and the network
`
`connection such as MAC ID, IP addresses, browser type, any cookies resident on the network
`
`access device, etc. Finally, the user identification system includes cryptographic keys which
`
`20
`
`are used to encrypt and decrypt the communications between the verification system and each
`
`of the network access devices.
`
`The user submitted data fields 72 mirror the registration data fields 70. The user
`
`submitted data fields receive data generated by a user that is attempting to access the
`
`broadband gaming system 36. The user submitted information is carefully analyzed to ensure
`
`25
`
`that a valid user is being identified. It is well known that the connection of one network
`
`access device to another network access device generates security concerns. Preferably, the
`
`present verification system operates using a fast hardware-type firewall that performs a
`
`stateful multilayer inspection. In its preferred embodiment the firewall provides packet
`
`filtering using a secure protocol such as IP Sec. This protocol provides encryption of the data
`
`30
`
`at the packet level as well as at the source address level. Without access to the encryption
`
`
`
`Page 14
`
`keys, a potential intruder would have difficulty penetrating the firewall. Additionally, it
`
`would be preferable to provide a circuit level gateway and an application level gateway. The
`
`circuit level gateway works on the session layer of the OSI model or the TCP layer of the
`
`TCP/IP model and monitors TCP handshaking between packets to determine whether a
`
`5
`
`requested session is legitimate. The application level gateway filters data packets at the
`
`application layer of the OSI model. A stateful multilayer inspection firewall offers a high
`
`level of security, good performance and transparency to end users.
`
`Referring to FIG. 6 there is shown the player data fields 74 that are generated by the
`
`broadband gaming system and the transactional system after the user has been verified to be a
`
`10
`
`registered player. The player data fields 74 are used to generate a player matrix which is used
`
`as an additional internal security measure. The player data fields 74 include a Player ID that
`
`identifies the player, a timestamp that provides the date, time in and time out by the player
`
`during the game. Additionally, the type of game, credits played, and credits remaining are
`
`monitored. Based on the level of player activity a bonus is provided to the player. Further
`
`15
`
`still the session time for each type of game and the amount played during the session is
`
`monitored to better define the type of games the player likes. Transactional information is
`
`also monitored and updated, preferably, by the transactional system 38. The transactional
`
`information includes credit card information, transaction requests, transaction approval,
`
`conversion of monetary funds to credits for playing the game, any transfers of credits for
`
`20
`
`playing the game, and conversions from credits to monetary funds that are credited to the
`
`player's financial account. Preferably, communications between the transactional system and
`
`the broadband gaming system are conducted in a secure environment using cryptographic
`
`keys. Although the use of cryptography within the private network may appear excessive,
`
`one of the greatest security threats within a private network comes from its own employees.
`
`25
`
`Therefore, it is preferable to use internal firewalls for communications between the
`
`broadband gaming system, the transactional system and the verification system.
`
`Broadband Gaming System
`
`A more detailed drawing of the broadband gaming system is provided in FIG. 7. The
`
`30
`
`dashecj boundary in FIG. 7 defines the broadband gaming system 36. After player
`
`
`
`Page 15
`
`verification is completed at the verification system 34, the broadband gaming system 34 is
`
`engaged. The broadband gaming system 34 includes a player buffer 84 configured to receive
`
`the players who will be playing the game. The player buffer 84 generates an initial player
`
`matrix with player data fields 74.
`
`5
`
`A countdown timer 82 is coupled to the player buffer 80. Preferably, the countdown
`
`timer 82 is also displayed to the player. The countdown timer 82 provides a window of time
`
`within which players may join the game. The players that have joined the game before the
`
`end of the timing period are stored in the buffer. When the timing period reaches zero the
`
`initial player matrix is communicated to the transactional system 38 and to the gaming
`
`10 module 84.
`
`The gaming module 84 provides a game that is played by the plurality of players. The
`
`game may include a plurality of different games and the type of game is not restrictive to this
`
`invention. Preferably, the gaming module 84 includes at least one random number generator
`
`86 and a paytable module 88.
`
`15
`
`The random number generator 86 is operatively coupled to the player buffer. The
`
`random number generator 86 generates at least one random number that is stored in the
`
`player matrix. In one embodiment, at least one random number is generated for the plurality
`
`of players playing the game. In an alternative embodiment, at least one random number is
`
`generated for each player. In yet another embodiment, a plurality of random numbers are
`
`20
`
`generated that are applied to the plurality of players playing the game. Preferably, the
`
`random number generator 86 is a fast hardware module.
`
`A paytable module 88 is operatively coupled to the random number generator 86.
`
`The paytable module 88 is a programmable module that dete