`Bradford et al.
`
`USOO6612928B1
`US 6,612,928 B1
`*Sep. 2, 2003
`
`(10) Patent No.:
`(45) Date of Patent:
`
`(54) PLAYER IDENTIFICATION USING
`BIOMETRIC DATA IN AGAMING
`ENVIRONMENT
`(75) Inventors: Russel Tower Bradford, Incline
`Village, NV (US); Robert Anthony
`Luciano, Jr., Reno, NV (US); Russ
`Frederick Marsden, Gardnerville, NV
`(US)
`(73) Assignee: Sierra Design Group, Reno, NV (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis
`claimer.
`
`(21) Appl. No.: 09/908,878
`(22) Filed:
`Jul. 17, 2001
`e -- is
`(51) Int. Cl." ................................................. A63F 13/00
`(52) U.S. Cl. ......................................................... 463/29
`(58) Field of Search .............................. 463/29, 22, 16,
`463/42
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`5,326,104 A
`5,473,144 A
`5,613,912 A
`
`7/1994 Pease
`12/1995 Mathurin, Jr.
`3/1997 Slater
`
`5,802,199 A * 9/1998 Pare, Jr. et al. ............. 382/115
`5.991431. A 11/1999 Borza
`5,995,630 A 11/1999 Borza
`6,026,166 A 2/2000 LeBourgeois
`g
`A s: Shir
`6,149,055. A 11/2000
`it."
`6,154,131. A 11/2000 Jones, II
`6,234,900 B1
`5/2001 Cumbers
`6.264,557 B1
`7/2001 Schneier
`6,296,101 B1 10/2001 Hasegawa
`6,307.956 B1 10/2001 Black
`6,363,485 B1
`3/2002 Adams et al. .............. 713/186
`* cited b
`cited by examiner
`Primary Examiner Melvin Jones
`(74) Attorney, Agent, or Firm-Russ F. Marsden
`(57)
`ABSTRACT
`A System and method for using two authenticators to iden
`tify a player in a gaming environment is disclosed, where the
`Second authenticator is based on biometric data. The two
`authenticators allow a two-level authorization process,
`where the Second authenticator, being based on biometric
`data, allow a player to quickly and easily authenticate
`documents while remaining at game machines, authenticate
`electronically based transferS into and out of accounts at
`game machines, and further allow casinos and other estab
`lishments having age requirements and operating in an open
`environment to confirm that an underage perSon is not
`enabling the game play button (making use of the game
`machine thereby).
`
`68 Claims, 16 Drawing Sheets
`
`General Game Device Having A Fingerprint (Or Other Biometric) Reader Coupled
`To An Independent Embedded System With Needed I/O Device(s)
`416
`
`A
`
`
`
`
`
`
`
`4.08
`
`
`
`418
`
`Biometric Device
`Information
`Manager
`
`Serial Protocol
`Interface
`
`FP Reader (Or Other
`Biometric Device)
`Coupled To
`Independent
`Fmbedded System
`
`
`
`Other iO
`Devices
`
`410
`
`FP Reader (Or Othe
`Biometric Device)
`Coupled To
`Independent
`Embedded System
`
`Devices
`Directly
`oupled
`Reader
`
`
`
`
`
`
`
`
`
`414
`
`IPR2022-00602
`Apple EX1010 Page 1
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 1 of 16
`
`US 6,612,928 B1
`
`0 || ||
`
`
`
`
`
`[ GHRI[C]OIH
`
`00 I
`
`IPR2022-00602
`Apple EX1010 Page 2
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 2 of 16
`
`US 6,612,928 B1
`
`() IZ
`
`<!-- - - - - - - - - -
`
`
`
`Z ETRIQ OIH
`
`IPR2022-00602
`Apple EX1010 Page 3
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 3 of 16
`
`US 6,612,928 B1
`
`oig º?^
`
`pueOI puy
`
`3seg
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 4
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 4 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`
`
`
`
`
`
`?7 (ETRIQ OIH
`
`IPR2022-00602
`Apple EX1010 Page 5
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet S of 16
`
`US 6,612,928 B1
`
`
`
`ZOS
`
`
`
`sa
`
`| H |
`
`Ç ETRIQ OIH
`
`
`
`
`
`
`
`|-0 IS
`
`IPR2022-00602
`Apple EX1010 Page 6
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep. 2, 2003
`Sep. 2, 2003
`
`Sheet 6 of 16
`Sheet 6 of 16
`
`US 6,612,928 B1
`US 6,612,928 B1
`
`peoydi[ena]
`
`JOpepesnsy‘SqJogjwduy
`
`posisoq]
`
`
`
`adurexyMoys‘10Ae[gOLosqurepdxg
`
`
`
`
`
`Anuy(gqMONYA,UonoRsuely
`
`
`
`
`
`
`
`Burjqeus]use19gposo]lAugSxOAuy
`
`UWddINEIOeSpasopAug
`
`JOARTI
`
`
`
`
`
`
`
`paseq-gJjpayusw3nyJojpoqeuq
`
`SUOTIOVSUBITCG]puyUoVezopNy
`
`
`
`
`
`
`
`
`
`
`
`SIIXJUosI9gOUIse>pezLioyjNy
`
`ploseyposeg-juudiasuryysuesJOpouley|
`
`oseqelec]VUl](ploseySLNOWOT19410IO)
`
`
`
`9AaNoOlIoMo}snyOLP9990Ig|gggJJUNODSdIAIVg
`WaIsksdAWIMsueyOo]0D019
`
`JOAR]OLJOWONUSYINGISI]VOPAC
`
`Z19XOGIO909XOUTMD90Ae)—*|E09
`
`
`WONPULIOFUTOptaorg‘Gyjwssa1g09
`
`yuuidiesulysue1sea]TVpeey909
`
`(UoUTanseay]OSWIOIgV8]
`
`
`uosiagOUISeDpezOYINyOL
`
`
`‘eyepyulidiesul,yssoo01g809
`
`AUoseqeieqoe915
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`JoyeonuampNyISI]FT
`
`v09
`
`
`
`IPR2022-00602
`Apple EX1010 Page 7
`
`IPR2022-00602
`Apple EX1010 Page 7
`
`
`
`
`
`
`
`
`
`
`
`JWUdIesuLyYSUISAJOPOWVL4aNDImedINIUIOIgJoyIOJO)
`
`
`
`
`
`SUIZOgJOS]PoJojsIsoy
`
`SINDOOWATOTA
`
`so1AaqSumuenyyArid
`
`I19Ae]gqysenboy
`
`
`
`JapesyjuLidiosuryySulaey
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 7 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`
`
`
`
`
`
`SSODOIGUONBONUDYINY[PAd]-OM|,VU](WUOWWOINSKOPy
`
`
`
`BUISSODOIgOZAMBoUBINSSYUSIP‘poyemoynySUIPIAoIg
`
`
`
`
`
`UY[AOLJoe]gqMOTTY
`
`woneuojuyOZ.
`
` Sok
`
`EOEM
`
`
`
`
`
`poystur.]JoAeygUoUM
`
`
`
`quudiesutyysonbsy
`
`
`
`UOTOZMpareiduoyairaig
`
`
`
`gsequyeqWOLUoNeUIOjUySus.)
`
`
`
`
`
`C1]TENT]TIAAPAtOI§
`
`68[Qe[PeAV
`
`O/I
`
`UYTTOL
`
`O/98)OLAPT
`
`OlL
`
`
`
`62192[RAY
`
`
`
`Ayuaseqeyeq
`
`
`
`ysnougureyu07;
`
`UT[TdOL
`
`EDTM
`
`O/l989OLArq
`Sjo[duio>ofuoneunoju
`
`80L
`
`
`
`asequiedUlploosySuipuodsauo0;
`
`WOYeINUSDHOZAIspapmouyoy
`
`
`
`
`
`juridia3utyysonboypuy19Ae][OL
`
`ILMByeWUdINsULyposssd0ig
`
`
`yooyD“wieqwudroesuryssoo01g
`
`
`ssoo0lgOTM[enue
`
`PpoYOAuy
`
`CI[eniuyuy
`
`£PdzZIUs009yY
`
`puypojusssig
`
`90L
`
`IPR2022-00602
`Apple EX1010 Page 8
`
`IPR2022-00602
`Apple EX1010 Page 8
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 8 of 16
`
`US 6,612,928 B1
`
`8 OETRIQ OIH
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`sunoo.O quæA?I OZAWAI W08
`
`
`
`
`
`008
`
`908
`
`IPR2022-00602
`Apple EX1010 Page 9
`
`
`
`U.S. Patent
`
`US 6,612,928 B1
`
`6 GHRIQ OIH
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 10
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 10 of 16
`
`US 6,612,928 B1
`
`OlHANOI
`
`dUOII,YUYSUNIIDJOpoy]
`
`
`
`ysea]IV3uUIsy(V4q)JUNODSYspun]
`
`
`
`
`
`
`
`JoyeonuayynypuosasVsy(quaulaInseoy]
`
`peoyddTenia]
`
`poised
`
`SIOWOTYJ9yIOIO)wUdIsul]uOFoHIMODGO1AIAGJMOOLPosed|
`
`
`
`
`
`ssoo01gry2OcOl|Lagpowaw8ny-q4JoyporquugJoxeygaxLu&QUaeIosIQaIe1g
`
`
`SIXYWosiegOUIseDpozLioyny<xpaBapiaugyuudsaButy2u0seaTyPeay8001o8101
`
`
`
`
`
`rIOlJOPepeenSW‘Sq.jJoqqmduyI[entrooloptacig“(Ww4a)
`
`
`
`
`
`9101ajdurexymous‘10Ae]gOLasp,urejdxgq9001
`
`
`
`
`
`
`ZIOISUI[QeUYWadIDgpasa[IAllgaxOAU]UosiodOUISE)pezZzoyNyOL,
`
`
`cz01VaalWIAApareroossyNo
`
`wasXKSdjWASwRDoO]0DUOHeULOJU]splacid‘q]wasargcoor
`ayeasyO1OToO2‘Nsuonoesues],elepJULIGIOSUL.Anuysseqeieq
`CNAae
`
`
`
`
`
`
`AQUAWgMONUIA,UOKORsURLL
`
`Sok
`
`
`
`2D
`NoS-
`
`
`
`
`
`
`
`yUNOOYspunsUONSaTAa1w919
`
`IPR2022-00602
`Apple EX1010 Page 11
`
`
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 11 of 16
`
`US 6,612,928 B1
`
`NUOIIITYPoyewmlonySUIplAcIgSS901gUOTOTUIYINY[OA2]-OM|,VUl
`
`
`
`
`
`
`
`
`(UOWOINSROPYDUJOUIOTYJONIOIO)JuUdIosulyyBuIs~y
`
`
`
`
`
`Jopesyjudiesur.yySuarezo0taaq
`
`
`
`IT4anoloot!
`
`
`
`
`
`TVAe]gsulsogJosp)polsisiZ0y
`
`
`
`JoueINSSYIUSIWIAA(S144)sioysueryspuncorr
`
`sinsoQjsenbsyTIA
`
`
`
`
`
`
`
`
`
`
`
`‘plosayUOTORsURI],payersossyUY
`
`
`
`LOWPUYpatqeugeLAITIDJTHOTY195
`
`
`
`‘VAepdy‘rojsuesyajo[duiogaqqissodLAON}SILJ
`
`
`
`
`
`
`
`
`
`
`
`poyelsossyUyUlUONnoRsUBITp1ooaywonoesuely]puqJoyeonuUsyIny
`
`
`
`priooayUoroesuesy,puypoyussolg
`
`901]
`
`poziusoossy
`
`quudiesurysonbeypuyJoke]gOLjsonboy
`
`
`espaymouyoy
`
`
`
`UlUoResuRILpodmanyplody
`
`
`
`
`
`vIIT
`
`JsIL]8,JOAC]Jsonboy
`
`JoyeoyusynyvOrt
`
`WIMBegyuLdsaZulypossoso01g
`
`
`
`yooyD‘eyeqwudiesutr,]ssooo1g8011
`
`
`
`
`
`
`
`
`
`
`
`aseqeieqUlpiosaySurpuodsau07
`
`
`
`ad1AaqO/TsAloRIO}U]as7)
`
`
`
`
`
`
`
`QjsuelyJOJAe[gAJVONSs9yJsuesIgJsuelylOL
`
`SpunWSOINsU]IO
`
`
`Bedyuidiesuryssao01gpuyysanbay
`
`yunouryJojsuelyVYaeoIpuyof
`
`
`
`BAS]O/]SANOBIO]Sas)aXe]J
`
`
`
`OLWhowypeuruajapargos~)junouryss004)OLIATMONTYOL
`
`
`
`
`
`
`
`
`
`
`
`
`
`“spunJOAupiqepeayyooyDJO/pUYspune[qeTeayIoAe]gMOYSOL
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 12
`
`IPR2022-00602
`Apple EX1010 Page 12
`
`
`
`
`
`
`
`
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 12 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`
`
`
`
`
`
`() IZI
`
`80ZI
`
`IPR2022-00602
`Apple EX1010 Page 13
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 13 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`BECJoAe]gJONIJOFVATSUISJOPoe
`
`elHaNOM
`
`VadUSqeisy
`
`00eT
`
`
`
`OI€ICyAresroduray,ayer
`
`
`
`VadWIMParweroossyspr092y
`
`UyWonoesueL],
`
`
`
`paieroossyeieqAegpuyAvy309[09
`
`vOCl
`
`
`
`
`
`
`
`je1oueuryyokedpioosyAyjenunuo7cOel
`
`
`
`
`
`credspioseyUyeyeAepgsueys10\¢WICSuspsorasgSuenyoegWIM,
`
`
`
`
`
`
`
`
`
`vielO]SONSLINeT{asc,
`
`AvgJOpugeutuiajaq]
`
`qy]Alesodms[tApareroossy
`
`8IEl
`
`
`
`SOPIAOLgJade
`
`CIsisonboy19
`
`
`
`sprlodayUleleAeTgeueNa101¢
`
`
`
`GIAseiodwoyiMpoyelossy
`
`C]JARIgqOL
`
`MONBIEAtlWWDUdIssy
`HUQ)AI19AeTqWIMporeroossy
`
`
`
`poaoulayCy]1aAeTg
`
`IPR2022-00602
`Apple EX1010 Page 14
`
`IPR2022-00602
`Apple EX1010 Page 14
`
`
`
`
`
`
`
`U.S. Patent
`U.S. Patent
`
`Sep. 2, 2003
`Sep. 2, 2003
`
`Sheet 14 of 16
`Sheet 14 of 16
`
`US 6,612,928 B1
`US 6,612,928 B1
`
`blaanoldversa
`
`
`
`BUIS(]JOPOIs
`
`
`
`jeuoyowolgJoyyAquy
`
`Sponsuey
`
`
`
`
`
`
`
`
`
`
`
`OO+T
`
`[euorjowo1gjetoodssanss]OUISEDcOvlJuowaSeuRlAy
`VadSLLWIAAporeroossysitpazDauren
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`posueyD1ONsupolg[euOHOWoLyOWOIgISf)URDpuy
`
`
`
`
`
`80r1queJokeJ
`
`
`
`
`
`saniiqedesAejdsiq]seybol
`
`ciPl
`
`
` TpaepeojumogSiperJeuonoulolg[TVOly
`pode]ogITVISN‘owedoO
`
`
`
`
`
`éSHpst)
`
`IPR2022-00602
`Apple EX1010 Page 15
`
`
`
`
`
`JEU],OOIADG]SUTURED)YJO2S()SURISJ9AL{
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 15
`
`
`
`
`
`
`
`U.S. Patent
`
`US 6,612,928 B1
`
`
`
`[BuLION SV SÁBIA QUIBO
`
`Z09 I
`
`
`
`
`
`
`
`
`
`SI HRIQ OIH
`
`IPR2022-00602
`Apple EX1010 Page 16
`
`
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 16 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`9 I ETRIQ OIH9 [9]
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`8 [9]
`
`009||
`
`909 I
`
`0 I 9 I
`
`IPR2022-00602
`Apple EX1010 Page 17
`
`
`
`1
`PLAYER DENTIFICATION USING
`BIOMETRIC DATA IN AGAMING
`ENVIRONMENT
`RELATED APPLICATIONS
`This application claims priority from provisional appli
`cation entitled “Augmented Player Identification Using Fin
`gerprints In A Gaming Environment”, filed on Jun. 20, 2001,
`serial No. 60/300,029.
`Incorporated herein, in full by explicit reference, is
`co-pending application Ser. No. 09/788,168 entitled
`“Method And Apparatus For Maintaining Game State',
`co-pending application Ser. No. 09/838,457 entitled “Data
`Entry System And Method For Gaming Devices”, and
`co-pending application Ser. No. 09/819,112 entitled
`“Anonymous Player Identifiers. In A Gaming Environment',
`these three referenced applications being owned in their
`entirety by the same entity as this application.
`BACKGROUND OF THE INVENTION
`1. Field of the Invention
`This invention pertains generally to gaming Systems.
`More particularly, the present invention relates to a method
`and apparatus for providing addition assurance that a player
`is who they claim to be by using biometric identifiers,
`particularly fingerprints, for player identification at gaming
`devices.
`2. The Prior Art
`High reliability player identification in a gaming environ
`ment is becoming increasingly desirable. In Some gaming
`Situations either positive identification or a signature or both
`are required. In the United States, an example is the occur
`rence of a gaming event which requires the filing of an
`income tax report form, currently designated by the IRS
`(U.S. Internal Revenue Service) as form W2G. This is
`currently triggered by any winning event involving more
`than S1200. In many higher-stakes games, this would be
`triggered by every winning event. Other situations where
`positive identification is desirable is any type of automated
`funds accounting or transferS and age verification.
`Currently, events which trigger the use of governmental
`forms are handled manually. When a winning event occurs
`at a gaming machine that triggers the need for a W2C, the
`player will need to wait until an attendant comes over and
`enables the payout and handles any required governmental
`forms. For funds transfers, a player will typically need to go
`to a customer Service counter or Separate kiosk, or, a player
`is dependent on the use of their player tracking card (a
`magnetic strip card), which is easily lost or stolen, which
`could result in the loSS of any funds associated with the
`magnetic strip card (player ID card).
`In the case of high Stakes games, every winning event
`requires a governmental form to be filled out in the U.S. In
`Such cases casinos will typically assign one attendant to each
`high Stakes player, where the attendant takes care of the
`inceSSant governmental forms. Such requirements are bur
`densome to all concerned, from the casino who must provide
`the perSonnel to the players who must endure a "hovering
`Shadow, regardless of how unobtrusive the casino attempts
`to make the attendants.
`For age verification, the currently used method of con
`trolling game use is through physical access. Typically the
`games are in an area that is physically isolated, and an
`attendant checks ID for admission into the areas as a whole.
`Otherwise, each game or Set of games must be constantly
`monitored by an attendant, even when no one is at the
`machines.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,612,928 B1
`
`2
`Biometric identification Systems. Such as fingerprint read
`ers built by AuthenTec, Inc., in Melbourne, Fla. 32902, are
`known. These readers may Supply raw image data to a
`processing unit for Storage and analysis, or as is typically the
`case with commercial products, will record and transmit
`fingerprint characterization data, not an image. In the later
`case, the fingerprint itself (an actual image) will not be
`permanently Stored; only a numeric characterization is kept.
`Prior art numeric characterization of fingerprints makes
`use of a fingerprint’s ridges and furrows on the Surface of the
`finger. The uniqueness of a fingerprint can be determined by
`establishing a center or reference point, and characterizing
`the pattern of ridges, furrows, and/or other characteristics
`Such as ridge bifurcation and/or a ridge ending points
`(Sometimes called minutiae points) in relationship to the
`center point.
`There are well known limitations when using fingerprint
`characterization data. The faster a fingerprint is read, the
`fewer details may be recorded (for example, establishing 40
`correlation points rather than 80). In addition, the ability to
`read fingerprints themselves will vary depending on the
`condition of the Skin on the finger, Sweat, dirt, etc. Thus, it
`may be the case that a fingerprint read having 80 correlation
`points may produce, in a large database (over 100,000
`entries), more than one match. That does not mean that the
`actual fingerprints are the same; rather, it means that the
`recorded characteristics appear to match more than one
`entry. This is typically not an issue in Small populations or
`when using a Small database, but will arise on occasion.
`There are public and proprietary algorithms that attempt
`to use the data to minimize false positives and maximize
`correct rejections. The characterization data is Stored in a
`database where it can be Searched for matches. Typically the
`Searches are Sequential, which can result in long Search
`times for any particular print if there are thousands to check.
`The amount of data kept per fingerprint also determines the
`Search time and uniqueness of the characterization for each
`print.
`Because of the difficulties in collecting, characterizing,
`Storing, Searching, and uniquely identifying fingerprint data
`(i.e., inexpensive readers may collect 40-50 characterizing
`points, which although reasonably good, may still only be
`unique to an approximate range of 1/10,000), fingerprints
`have not been usable as a single Source of identification
`means in a dynamic gaming environment. Many of the
`issues faced by the gaming industry are not faced by other
`industries, which would allow the reasonable implementa
`tion of, as an example, an authentication System based on a
`single fingerprint for a home or office PC where there may
`be 1 to 10 authorized users. Such systems have tiny
`databases, can be relatively slow, and can be reasonably
`fallible (in terms of false positives) and yet meet the authen
`tication needs of the few people and limited environment in
`which Such a System will be used. Such Systems are not
`Suitable for Situations as the gaming industry, which must
`meet the needs of both Speed and a Significantly higher
`degree of assurance in any particular authentication.
`Thus, there is a need to provide an alternative means for
`player authentication having reasonably high reliability and
`assurance, coupled with very high authentication Speed.
`BRIEF DESCRIPTION OF THE INVENTION
`The present invention enables a new and exciting way of
`allowing players to make use of electronic funds accounts,
`automate the generation of certain required forms, and to
`Verify their age in a manner that is fast, inconspicuous, can
`
`IPR2022-00602
`Apple EX1010 Page 18
`
`
`
`3
`be implemented to insure privacy, and provides very high
`assurance to the casino or other establishment using it.
`The invention uses at least two authenticators for each
`player, with the most common implementation using exactly
`two. A common use of a third authenticator is as a “back-up”
`to the Second authenticator. The first authenticator may be
`one of many types, with a typical first authenticator being a
`player ID card, a Voucher with a unique, encoded, and
`preferably encrypted numerical ID on it, a unique alphanu
`meric Sequence, or an RFID tag. Each first authenticator that
`is not data itself (i.e., a PIN) has the ability to have data read
`from it (i.e., the data on the magnetic strip of a typical player
`ID card). “First authenticator data” refers to the data that can
`be read from a physical first authenticator card, if Such is
`used. To Simplify word usage in this disclosure, “first
`authenticator” and “first authenticator data” refer to the same
`thing, that is, the information or data that is read from a
`physical item, where that physical item may be used to carry
`the data, or, in the case of an alpha-numeric Sequence, is the
`data. Context makes clear if the discussion of a first authen
`ticator is referring to a physical carrier or the data in the
`physical carrier or both. The second authenticator will be
`based on a biometric reading. The present invention may use
`any biometric reading, although those providing reasonably
`high degrees of uniqueness are clearly preferred. It is
`expected that at the present time, the predominant biometric
`used will be based on fingerprints.
`A player identification database is also used, where an
`entry corresponding to a player comprises at least one record
`(typically, exactly one record), and the record has fields
`containing data, information, or pointers. The records have
`fields corresponding to a first authenticator and a Second
`authenticator, providing authenticator data therein or point
`ers to authenticator data. The Second authenticator will
`always have data that correspond to a biometric measure
`ment. It is not required that a player release any personal
`information to the casino or establishment to make use of the
`present invention; that is one of its benefits. In many cases
`a player can derive even greater benefits by providing
`certain data to a casino or establishment, as explained below,
`but it is fully expected that a significant number of players
`and a large number of Small gambling halls or locations will
`use anonymous identifiers (identifiers having no names
`associated with them). Another user of anonymous identi
`fiers will remote gambling establishments, which allows
`them to carry out age confirmation without keeping a
`permanent record of each player. Again, there are advan
`tages to a player providing Some personal data, but it is not
`necessary to make use of the present invention.
`A player and a casino or establishment uses the present
`invention in Several Steps. The first is to create an entry in the
`player identification database, which associates a first
`authenticator and a Second authenticator. The player then
`goes and uses a game device. While playing or using a game
`device, the player will eventually take an action that will
`require confirmation that they are who they say they are. The
`player presents their first authenticator to the game device,
`which is used to get the associated Second authenticator. The
`player indicates they are ready to authorize an action (an
`EFT transfer, a game play, to authorize a form); then, to
`authorize the action the player presents their Second authen
`ticator.
`Remembering that the Second authenticator is always
`biometric data, all the player has to do is use the biometric
`reader. In the case of fingerprints, a quick touch of a
`fingerprint reader does the job. The Second authenticator is
`checked, and if the fingerprint data just read matches the
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,612,928 B1
`
`4
`fingerprint data in the Second authenticator, the action is
`authorized and carried out. Now, as long as the player is at
`this game device any further authorizations will only require
`that the player touch a fingerprint reader. This is extremely
`fast and very non-obtrusive, while providing both the player
`and establishment a very high degree of assurance that the
`correct person is carrying out the actions. In one
`embodiment, this enables very fast and efficient W2G
`generation-currently a very annoying aspect of any higher
`Stakes games.
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a functional block diagram of an example System
`having a fingerprint reader in conjunction with at least one
`other player identification means accordance with the
`present invention.
`FIG. 2 is a functional block diagram of another example
`System having a fingerprint reader in conjunction with at
`least one other player identification means accordance with
`the present invention.
`FIG. 3 is a functional block diagram showing another
`example System having a fingerprint reader in conjunction
`with at least one other player identification means accor
`dance with the present invention.
`FIG. 4 is a functional block diagram of yet another
`example System having a fingerprint reader in conjunction
`with at least one other player identification means accor
`dance with the present invention.
`FIG. 5 is a functional block diagram of System configu
`rations for implementing authentication using biometrics in
`accordance with the present invention.
`FIG. 6 is a flow diagram for creating an initial database
`entry to be used with biometrically augmented authentica
`tion in accordance with the present invention.
`FIG. 7 is a flow diagram showing a use of biometrically
`augmented authentication with automated W2G generation
`according to the present invention.
`FIG. 8 is flow diagram showing another example of the
`use of biometrically augmented authentication with auto
`mated W2G generation according to the present invention.
`FIG. 9 is a flow diagram showing yet another example of
`the use of biometrically augmented authentication with
`automated W2G generation according to the present inven
`tion.
`FIG. 10 is a flow diagram showing a method of creating
`an electronic funds account according to the present inven
`tion.
`FIG. 11 is flow diagram showing electronic funds trans
`fers using biometrically augmented authentication according
`to the present invention.
`FIG. 12 is a flow diagram showing another method of
`electronic funds transferS using biometrically enhanced
`authentication according to the present invention.
`FIG. 13 is a flow diagram showing the use of biometri
`cally enhanced authentication with electronic funds
`accounts keeping additional player data in accordance with
`the present invention.
`FIG. 14 is a flow diagram showing the use of a biometri
`cally enhanced authentication electronic funds account with
`promotional game credits according to the present invention.
`FIG. 15 is a flow diagram showing the use of biometri
`cally enhanced authenticator for age Verification according
`to the present invention.
`FIG. 16 is a block diagram showing the functional com
`ponents of a combined play and authorize button according
`to the present invention.
`
`IPR2022-00602
`Apple EX1010 Page 19
`
`
`
`S
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`Persons of ordinary skill in the art will realize that the
`following description of the present invention is illustrative
`only and not in any way limiting. Other embodiments of the
`invention will readily Suggest themselves to Such skilled
`perSons having the benefit of this disclosure.
`Referring to the drawings, for illustrative purposes the
`present invention is shown embodied in FIG. 1 through FIG.
`16. It will be appreciated that the apparatus may vary as to
`configuration and as to details of the parts, and that the
`method may vary as to details, partitioning, and the order of
`the acts, without departing from the inventive concepts
`disclosed herein.
`The present invention provides new methods and appa
`ratus having Superior authentication of players than avail
`able in the prior art, while further providing for a player's
`ease of use of the enhanced authentication. It does this by
`combining at least two authenticators per player in an
`easy-to-use and manage System. A player first presents. Some
`form of initial identification to the gaming device, then (not
`always right away) provides a second means of authentica
`tion based on a biometric measure Such as a fingerprint
`(defined below). The combination of the two identification
`StepS provides two critical properties in a casino environ
`ment. First, because of the combinatoricS involved, a Sig
`nificantly higher degree of assurance is achieved when the
`two authentication events, using a first and Second
`authenticator, are used in combination than is possible using
`a single authenticator. Second, recurring authentication is
`made significantly easier for both the player and the casino,
`for example during an extended period of game play, while
`Still retaining the higher degree of assurance provided by the
`two-step authorization method.
`The first level of identification used by a player is called
`the first authenticator, and is defined as whatever a player
`first presents to the system to identify themselves. The first
`authenticator may be one amongst many choices, where the
`chosen form will depend on the needs and desires of the
`individual and the System implementation. A non-exhaustive
`list of first authenticators that are expected to be in use now
`or in the near future include: Voucher IDs, a first fingerprint;
`a biometric other than a fingerprint Such as hand geometry,
`face geometry, iris Scan, or retinal Scan, an alpha-numeric
`sequence (this includes PINs, but further includes any
`Sequence of numbers and letters, case Sensitive or not, that
`may be usable to identify a player); magnetic-strip cards
`(usually in the form a traditional player ID card); embedded
`RFID tags (may be in a key fob, a wallet-sized card, a lapel
`pin, and numerous other forms which are easy to for a perSon
`to carry and use); Smart cards; magnetic diskettes, optical
`disks and/or mini-disks; or handheld devices with an IR or
`RF interface (i.e., a PDA such as a Palm Pilot'TM).
`In addition, a preferred embodiment will allow a player to
`use one of their preexisting cards or forms of identification.
`This will include allowing a player to use a credit card,
`check card, debit card, and the like. In addition, when
`current driver's licenses are replaced in the near future with
`those having a common read means throughout the U.S.
`(expected to be either a form of Smart card or having
`machine readable symbols on one Surface of the card), those
`driver's licenses could be used as well. It is important to note
`that the use of these cards is for data matching only. It will
`not be used to acceSS or record anything having to do with
`the meaning of card when used as a first authenticator. Thus,
`a player who wants to use a debit card they already have as
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,612,928 B1
`
`6
`a first authenticator would allow the information on the
`magnetic Strip of the card to be read and kept as first
`authenticator data. When the player then goes to a game
`device, the player presents their card to the reader. The data
`that is read off of the card is used to find matching first
`authenticator data in the player ID database. That is the
`extent of its use. Thus, the actual meaning of the data on the
`magnetic Stripe is not important; it is simply being used as
`a unique data Sequence to find a matching data Sequence in
`the player ID database. Thus, as used in this disclosure
`"player ID is any authenticator, designated as a first
`authenticator, that has the property of having data useable as
`first authenticator data in a player ID database. “Presents” is
`defined in this disclosure to mean any action needed by the
`user of an authenticator to have the authenticator read by a
`reader designed to read that authenticator. The exact actions
`will, of course, vary depending on what type of authenticator
`a player is using. In the case of a magnetic Strip card, the
`presenting action would be to insert the card into a magnetic
`Strip card reader (like an ATM and a bank card). In the case
`of an RFID tag, the presenting action would be to hold the
`RFID tag momentarily in front of the reader. Each type of
`authenticator and its associated input device would have a
`corresponding meaning of "presents', where in each case the
`net result is that the needed data on or in the authenticator
`to be read, is read by the reader corresponding to that type
`of authenticator.
`The concept of a database, being well established, is not
`explained in this disclosure. It should be noted, however,
`that as the word is being used in this disclosure it is intended
`to cover a complete range of databases, the size, complexity,
`and expense being determined by the application and loca
`tion (where the database being referenced resides). For
`example, at the low end of the database Scale there may be
`a database located on an embedded System in a game device
`cabinet implemented as a flat file, comma-delimited data
`base held entirely in RAM, where entries or records could be
`delimited by a nonprinting character Such as a carriage
`return, and fields would refer to alpha-numeric Strings
`between commas. At the high end would be a fully relational
`database implementing extremely complex records and hav
`ing the capability to hold hundreds of thousands of entries,
`coupled with the ability to handle large amounts of Second
`ary Storage and requiring a dedicated platform for best
`performance. Thus, there is no implied restriction as to any
`particular type, kind, or complexity of database. Any data
`base implementation that works in a particular System using
`the present invention is included in this disclosure.
`The Second level or Second means of identifying oneself
`to a System is through the use of a Second authenticator. The
`Second authenticator is a biometrically-based authentication
`means. A biometric authentication means may include
`fingerprints, hand geometry Scans, retinal Scans, iris Scans,
`facial feature Scans, or other biologically-based measure
`ment means which are readily available to be used in a
`casino environment. In the description of this invention, one
`embodiment is based on the use of a fingerprint as the
`Second authenticator. However, the inventive concept is
`broader than the use of a fingerprint alone, encompassing
`any Second authenticator that is based on a biometric mea
`Surement that can be measured (Scanned, read-in) from a
`human who is sitting or Standing at or near the gaming
`device which has just been presented with a first authenti
`cator. For example, it is fully contemplated that as very high
`frequency, low energy electromagnetic emitters/readers
`become available at reduced prices, a Scan of Some of the
`bodies natural emissions using a passive or resonant reader
`
`IPR2022-00602
`Apple EX1010 Page 20
`
`
`
`7
`may be used, as well as other forms of evolving technology
`Such as iris readerS/Scanners.
`Fingerprint data is used in a preferred embodiment of the
`present invention. The word "fingerprint” can be used, in the
`common Vernacular, to mean both the image left when a
`fingertip is pressed onto material that will allow Some type
`of imprint to be left or body oils and skin that leave a
`distinguishable mark having a unique Set of ridges, etc., as
`well as meaning the unique pattern on the fingertip itself,
`even if not transferred to another Surface. To avoid confusion
`with nuances of the word "fingerprint” when used