throbber
(12) United States Patent
`Bradford et al.
`
`USOO6612928B1
`US 6,612,928 B1
`*Sep. 2, 2003
`
`(10) Patent No.:
`(45) Date of Patent:
`
`(54) PLAYER IDENTIFICATION USING
`BIOMETRIC DATA IN AGAMING
`ENVIRONMENT
`(75) Inventors: Russel Tower Bradford, Incline
`Village, NV (US); Robert Anthony
`Luciano, Jr., Reno, NV (US); Russ
`Frederick Marsden, Gardnerville, NV
`(US)
`(73) Assignee: Sierra Design Group, Reno, NV (US)
`
`(*) Notice:
`
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 0 days.
`This patent is Subject to a terminal dis
`claimer.
`
`(21) Appl. No.: 09/908,878
`(22) Filed:
`Jul. 17, 2001
`e -- is
`(51) Int. Cl." ................................................. A63F 13/00
`(52) U.S. Cl. ......................................................... 463/29
`(58) Field of Search .............................. 463/29, 22, 16,
`463/42
`
`(56)
`
`References Cited
`U.S. PATENT DOCUMENTS
`5,326,104 A
`5,473,144 A
`5,613,912 A
`
`7/1994 Pease
`12/1995 Mathurin, Jr.
`3/1997 Slater
`
`5,802,199 A * 9/1998 Pare, Jr. et al. ............. 382/115
`5.991431. A 11/1999 Borza
`5,995,630 A 11/1999 Borza
`6,026,166 A 2/2000 LeBourgeois
`g
`A s: Shir
`6,149,055. A 11/2000
`it."
`6,154,131. A 11/2000 Jones, II
`6,234,900 B1
`5/2001 Cumbers
`6.264,557 B1
`7/2001 Schneier
`6,296,101 B1 10/2001 Hasegawa
`6,307.956 B1 10/2001 Black
`6,363,485 B1
`3/2002 Adams et al. .............. 713/186
`* cited b
`cited by examiner
`Primary Examiner Melvin Jones
`(74) Attorney, Agent, or Firm-Russ F. Marsden
`(57)
`ABSTRACT
`A System and method for using two authenticators to iden
`tify a player in a gaming environment is disclosed, where the
`Second authenticator is based on biometric data. The two
`authenticators allow a two-level authorization process,
`where the Second authenticator, being based on biometric
`data, allow a player to quickly and easily authenticate
`documents while remaining at game machines, authenticate
`electronically based transferS into and out of accounts at
`game machines, and further allow casinos and other estab
`lishments having age requirements and operating in an open
`environment to confirm that an underage perSon is not
`enabling the game play button (making use of the game
`machine thereby).
`
`68 Claims, 16 Drawing Sheets
`
`General Game Device Having A Fingerprint (Or Other Biometric) Reader Coupled
`To An Independent Embedded System With Needed I/O Device(s)
`416
`
`A
`
`
`
`
`
`
`
`4.08
`
`
`
`418
`
`Biometric Device
`Information
`Manager
`
`Serial Protocol
`Interface
`
`FP Reader (Or Other
`Biometric Device)
`Coupled To
`Independent
`Fmbedded System
`
`
`
`Other iO
`Devices
`
`410
`
`FP Reader (Or Othe
`Biometric Device)
`Coupled To
`Independent
`Embedded System
`
`Devices
`Directly
`oupled
`Reader
`
`
`
`
`
`
`
`
`
`414
`
`IPR2022-00602
`Apple EX1010 Page 1
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 1 of 16
`
`US 6,612,928 B1
`
`0 || ||
`
`
`
`
`
`[ GHRI[C]OIH
`
`00 I
`
`IPR2022-00602
`Apple EX1010 Page 2
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 2 of 16
`
`US 6,612,928 B1
`
`() IZ
`
`<!-- - - - - - - - - -
`
`
`
`Z ETRIQ OIH
`
`IPR2022-00602
`Apple EX1010 Page 3
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 3 of 16
`
`US 6,612,928 B1
`
`oig º?^
`
`pueOI puy
`
`3seg
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 4
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 4 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`
`
`
`
`
`
`?7 (ETRIQ OIH
`
`IPR2022-00602
`Apple EX1010 Page 5
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet S of 16
`
`US 6,612,928 B1
`
`
`
`ZOS
`
`
`
`sa
`
`| H |
`
`Ç ETRIQ OIH
`
`
`
`
`
`
`
`|-0 IS
`
`IPR2022-00602
`Apple EX1010 Page 6
`
`

`

`U.S. Patent
`U.S. Patent
`
`Sep. 2, 2003
`Sep. 2, 2003
`
`Sheet 6 of 16
`Sheet 6 of 16
`
`US 6,612,928 B1
`US 6,612,928 B1
`
`peoydi[ena]
`
`JOpepesnsy‘SqJogjwduy
`
`posisoq]
`
`
`
`adurexyMoys‘10Ae[gOLosqurepdxg
`
`
`
`
`
`Anuy(gqMONYA,UonoRsuely
`
`
`
`
`
`
`
`Burjqeus]use19gposo]lAugSxOAuy
`
`UWddINEIOeSpasopAug
`
`JOARTI
`
`
`
`
`
`
`
`paseq-gJjpayusw3nyJojpoqeuq
`
`SUOTIOVSUBITCG]puyUoVezopNy
`
`
`
`
`
`
`
`
`
`
`
`SIIXJUosI9gOUIse>pezLioyjNy
`
`ploseyposeg-juudiasuryysuesJOpouley|
`
`oseqelec]VUl](ploseySLNOWOT19410IO)
`
`
`
`9AaNoOlIoMo}snyOLP9990Ig|gggJJUNODSdIAIVg
`WaIsksdAWIMsueyOo]0D019
`
`JOAR]OLJOWONUSYINGISI]VOPAC
`
`Z19XOGIO909XOUTMD90Ae)—*|E09
`
`
`WONPULIOFUTOptaorg‘Gyjwssa1g09
`
`yuuidiesulysue1sea]TVpeey909
`
`(UoUTanseay]OSWIOIgV8]
`
`
`uosiagOUISeDpezOYINyOL
`
`
`‘eyepyulidiesul,yssoo01g809
`
`AUoseqeieqoe915
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`JoyeonuampNyISI]FT
`
`v09
`
`
`
`IPR2022-00602
`Apple EX1010 Page 7
`
`IPR2022-00602
`Apple EX1010 Page 7
`
`
`
`
`
`
`
`
`
`

`

`JWUdIesuLyYSUISAJOPOWVL4aNDImedINIUIOIgJoyIOJO)
`
`
`
`
`
`SUIZOgJOS]PoJojsIsoy
`
`SINDOOWATOTA
`
`so1AaqSumuenyyArid
`
`I19Ae]gqysenboy
`
`
`
`JapesyjuLidiosuryySulaey
`
`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 7 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`
`
`
`
`
`
`SSODOIGUONBONUDYINY[PAd]-OM|,VU](WUOWWOINSKOPy
`
`
`
`BUISSODOIgOZAMBoUBINSSYUSIP‘poyemoynySUIPIAoIg
`
`
`
`
`
`UY[AOLJoe]gqMOTTY
`
`woneuojuyOZ.
`
` Sok
`
`EOEM
`
`
`
`
`
`poystur.]JoAeygUoUM
`
`
`
`quudiesutyysonbsy
`
`
`
`UOTOZMpareiduoyairaig
`
`
`
`gsequyeqWOLUoNeUIOjUySus.)
`
`
`
`
`
`C1]TENT]TIAAPAtOI§
`
`68[Qe[PeAV
`
`O/I
`
`UYTTOL
`
`O/98)OLAPT
`
`OlL
`
`
`
`62192[RAY
`
`
`
`Ayuaseqeyeq
`
`
`
`ysnougureyu07;
`
`UT[TdOL
`
`EDTM
`
`O/l989OLArq
`Sjo[duio>ofuoneunoju
`
`80L
`
`
`
`asequiedUlploosySuipuodsauo0;
`
`WOYeINUSDHOZAIspapmouyoy
`
`
`
`
`
`juridia3utyysonboypuy19Ae][OL
`
`ILMByeWUdINsULyposssd0ig
`
`
`yooyD“wieqwudroesuryssoo01g
`
`
`ssoo0lgOTM[enue
`
`PpoYOAuy
`
`CI[eniuyuy
`
`£PdzZIUs009yY
`
`puypojusssig
`
`90L
`
`IPR2022-00602
`Apple EX1010 Page 8
`
`IPR2022-00602
`Apple EX1010 Page 8
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 8 of 16
`
`US 6,612,928 B1
`
`8 OETRIQ OIH
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`sunoo.O quæA?I OZAWAI W08
`
`
`
`
`
`008
`
`908
`
`IPR2022-00602
`Apple EX1010 Page 9
`
`

`

`U.S. Patent
`
`US 6,612,928 B1
`
`6 GHRIQ OIH
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 10
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 10 of 16
`
`US 6,612,928 B1
`
`OlHANOI
`
`dUOII,YUYSUNIIDJOpoy]
`
`
`
`ysea]IV3uUIsy(V4q)JUNODSYspun]
`
`
`
`
`
`
`
`JoyeonuayynypuosasVsy(quaulaInseoy]
`
`peoyddTenia]
`
`poised
`
`SIOWOTYJ9yIOIO)wUdIsul]uOFoHIMODGO1AIAGJMOOLPosed|
`
`
`
`
`
`ssoo01gry2OcOl|Lagpowaw8ny-q4JoyporquugJoxeygaxLu&QUaeIosIQaIe1g
`
`
`SIXYWosiegOUIseDpozLioyny<xpaBapiaugyuudsaButy2u0seaTyPeay8001o8101
`
`
`
`
`
`rIOlJOPepeenSW‘Sq.jJoqqmduyI[entrooloptacig“(Ww4a)
`
`
`
`
`
`9101ajdurexymous‘10Ae]gOLasp,urejdxgq9001
`
`
`
`
`
`
`ZIOISUI[QeUYWadIDgpasa[IAllgaxOAU]UosiodOUISE)pezZzoyNyOL,
`
`
`cz01VaalWIAApareroossyNo
`
`wasXKSdjWASwRDoO]0DUOHeULOJU]splacid‘q]wasargcoor
`ayeasyO1OToO2‘Nsuonoesues],elepJULIGIOSUL.Anuysseqeieq
`CNAae
`
`
`
`
`
`
`AQUAWgMONUIA,UOKORsURLL
`
`Sok
`
`
`
`2D
`NoS-
`
`
`
`
`
`
`
`yUNOOYspunsUONSaTAa1w919
`
`IPR2022-00602
`Apple EX1010 Page 11
`
`
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 11 of 16
`
`US 6,612,928 B1
`
`NUOIIITYPoyewmlonySUIplAcIgSS901gUOTOTUIYINY[OA2]-OM|,VUl
`
`
`
`
`
`
`
`
`(UOWOINSROPYDUJOUIOTYJONIOIO)JuUdIosulyyBuIs~y
`
`
`
`
`
`Jopesyjudiesur.yySuarezo0taaq
`
`
`
`IT4anoloot!
`
`
`
`
`
`TVAe]gsulsogJosp)polsisiZ0y
`
`
`
`JoueINSSYIUSIWIAA(S144)sioysueryspuncorr
`
`sinsoQjsenbsyTIA
`
`
`
`
`
`
`
`
`
`
`
`‘plosayUOTORsURI],payersossyUY
`
`
`
`LOWPUYpatqeugeLAITIDJTHOTY195
`
`
`
`‘VAepdy‘rojsuesyajo[duiogaqqissodLAON}SILJ
`
`
`
`
`
`
`
`
`
`
`
`poyelsossyUyUlUONnoRsUBITp1ooaywonoesuely]puqJoyeonuUsyIny
`
`
`
`priooayUoroesuesy,puypoyussolg
`
`901]
`
`poziusoossy
`
`quudiesurysonbeypuyJoke]gOLjsonboy
`
`
`espaymouyoy
`
`
`
`UlUoResuRILpodmanyplody
`
`
`
`
`
`vIIT
`
`JsIL]8,JOAC]Jsonboy
`
`JoyeoyusynyvOrt
`
`WIMBegyuLdsaZulypossoso01g
`
`
`
`yooyD‘eyeqwudiesutr,]ssooo1g8011
`
`
`
`
`
`
`
`
`
`
`
`aseqeieqUlpiosaySurpuodsau07
`
`
`
`ad1AaqO/TsAloRIO}U]as7)
`
`
`
`
`
`
`
`QjsuelyJOJAe[gAJVONSs9yJsuesIgJsuelylOL
`
`SpunWSOINsU]IO
`
`
`Bedyuidiesuryssao01gpuyysanbay
`
`yunouryJojsuelyVYaeoIpuyof
`
`
`
`BAS]O/]SANOBIO]Sas)aXe]J
`
`
`
`OLWhowypeuruajapargos~)junouryss004)OLIATMONTYOL
`
`
`
`
`
`
`
`
`
`
`
`
`
`“spunJOAupiqepeayyooyDJO/pUYspune[qeTeayIoAe]gMOYSOL
`
`
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 12
`
`IPR2022-00602
`Apple EX1010 Page 12
`
`
`
`
`
`
`
`
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 12 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`
`
`
`
`
`
`() IZI
`
`80ZI
`
`IPR2022-00602
`Apple EX1010 Page 13
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 13 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`BECJoAe]gJONIJOFVATSUISJOPoe
`
`elHaNOM
`
`VadUSqeisy
`
`00eT
`
`
`
`OI€ICyAresroduray,ayer
`
`
`
`VadWIMParweroossyspr092y
`
`UyWonoesueL],
`
`
`
`paieroossyeieqAegpuyAvy309[09
`
`vOCl
`
`
`
`
`
`
`
`je1oueuryyokedpioosyAyjenunuo7cOel
`
`
`
`
`
`credspioseyUyeyeAepgsueys10\¢WICSuspsorasgSuenyoegWIM,
`
`
`
`
`
`
`
`
`
`vielO]SONSLINeT{asc,
`
`AvgJOpugeutuiajaq]
`
`qy]Alesodms[tApareroossy
`
`8IEl
`
`
`
`SOPIAOLgJade
`
`CIsisonboy19
`
`
`
`sprlodayUleleAeTgeueNa101¢
`
`
`
`GIAseiodwoyiMpoyelossy
`
`C]JARIgqOL
`
`MONBIEAtlWWDUdIssy
`HUQ)AI19AeTqWIMporeroossy
`
`
`
`poaoulayCy]1aAeTg
`
`IPR2022-00602
`Apple EX1010 Page 14
`
`IPR2022-00602
`Apple EX1010 Page 14
`
`
`
`
`
`

`

`U.S. Patent
`U.S. Patent
`
`Sep. 2, 2003
`Sep. 2, 2003
`
`Sheet 14 of 16
`Sheet 14 of 16
`
`US 6,612,928 B1
`US 6,612,928 B1
`
`blaanoldversa
`
`
`
`BUIS(]JOPOIs
`
`
`
`jeuoyowolgJoyyAquy
`
`Sponsuey
`
`
`
`
`
`
`
`
`
`
`
`OO+T
`
`[euorjowo1gjetoodssanss]OUISEDcOvlJuowaSeuRlAy
`VadSLLWIAAporeroossysitpazDauren
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`posueyD1ONsupolg[euOHOWoLyOWOIgISf)URDpuy
`
`
`
`
`
`80r1queJokeJ
`
`
`
`
`
`saniiqedesAejdsiq]seybol
`
`ciPl
`
`
` TpaepeojumogSiperJeuonoulolg[TVOly
`pode]ogITVISN‘owedoO
`
`
`
`
`
`éSHpst)
`
`IPR2022-00602
`Apple EX1010 Page 15
`
`
`
`
`
`JEU],OOIADG]SUTURED)YJO2S()SURISJ9AL{
`
`
`
`
`
`IPR2022-00602
`Apple EX1010 Page 15
`
`
`
`
`
`

`

`U.S. Patent
`
`US 6,612,928 B1
`
`
`
`[BuLION SV SÁBIA QUIBO
`
`Z09 I
`
`
`
`
`
`
`
`
`
`SI HRIQ OIH
`
`IPR2022-00602
`Apple EX1010 Page 16
`
`

`

`U.S. Patent
`
`Sep. 2, 2003
`
`Sheet 16 of 16
`
`US 6,612,928 B1
`
`
`
`
`
`9 I ETRIQ OIH9 [9]
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`8 [9]
`
`009||
`
`909 I
`
`0 I 9 I
`
`IPR2022-00602
`Apple EX1010 Page 17
`
`

`

`1
`PLAYER DENTIFICATION USING
`BIOMETRIC DATA IN AGAMING
`ENVIRONMENT
`RELATED APPLICATIONS
`This application claims priority from provisional appli
`cation entitled “Augmented Player Identification Using Fin
`gerprints In A Gaming Environment”, filed on Jun. 20, 2001,
`serial No. 60/300,029.
`Incorporated herein, in full by explicit reference, is
`co-pending application Ser. No. 09/788,168 entitled
`“Method And Apparatus For Maintaining Game State',
`co-pending application Ser. No. 09/838,457 entitled “Data
`Entry System And Method For Gaming Devices”, and
`co-pending application Ser. No. 09/819,112 entitled
`“Anonymous Player Identifiers. In A Gaming Environment',
`these three referenced applications being owned in their
`entirety by the same entity as this application.
`BACKGROUND OF THE INVENTION
`1. Field of the Invention
`This invention pertains generally to gaming Systems.
`More particularly, the present invention relates to a method
`and apparatus for providing addition assurance that a player
`is who they claim to be by using biometric identifiers,
`particularly fingerprints, for player identification at gaming
`devices.
`2. The Prior Art
`High reliability player identification in a gaming environ
`ment is becoming increasingly desirable. In Some gaming
`Situations either positive identification or a signature or both
`are required. In the United States, an example is the occur
`rence of a gaming event which requires the filing of an
`income tax report form, currently designated by the IRS
`(U.S. Internal Revenue Service) as form W2G. This is
`currently triggered by any winning event involving more
`than S1200. In many higher-stakes games, this would be
`triggered by every winning event. Other situations where
`positive identification is desirable is any type of automated
`funds accounting or transferS and age verification.
`Currently, events which trigger the use of governmental
`forms are handled manually. When a winning event occurs
`at a gaming machine that triggers the need for a W2C, the
`player will need to wait until an attendant comes over and
`enables the payout and handles any required governmental
`forms. For funds transfers, a player will typically need to go
`to a customer Service counter or Separate kiosk, or, a player
`is dependent on the use of their player tracking card (a
`magnetic strip card), which is easily lost or stolen, which
`could result in the loSS of any funds associated with the
`magnetic strip card (player ID card).
`In the case of high Stakes games, every winning event
`requires a governmental form to be filled out in the U.S. In
`Such cases casinos will typically assign one attendant to each
`high Stakes player, where the attendant takes care of the
`inceSSant governmental forms. Such requirements are bur
`densome to all concerned, from the casino who must provide
`the perSonnel to the players who must endure a "hovering
`Shadow, regardless of how unobtrusive the casino attempts
`to make the attendants.
`For age verification, the currently used method of con
`trolling game use is through physical access. Typically the
`games are in an area that is physically isolated, and an
`attendant checks ID for admission into the areas as a whole.
`Otherwise, each game or Set of games must be constantly
`monitored by an attendant, even when no one is at the
`machines.
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,612,928 B1
`
`2
`Biometric identification Systems. Such as fingerprint read
`ers built by AuthenTec, Inc., in Melbourne, Fla. 32902, are
`known. These readers may Supply raw image data to a
`processing unit for Storage and analysis, or as is typically the
`case with commercial products, will record and transmit
`fingerprint characterization data, not an image. In the later
`case, the fingerprint itself (an actual image) will not be
`permanently Stored; only a numeric characterization is kept.
`Prior art numeric characterization of fingerprints makes
`use of a fingerprint’s ridges and furrows on the Surface of the
`finger. The uniqueness of a fingerprint can be determined by
`establishing a center or reference point, and characterizing
`the pattern of ridges, furrows, and/or other characteristics
`Such as ridge bifurcation and/or a ridge ending points
`(Sometimes called minutiae points) in relationship to the
`center point.
`There are well known limitations when using fingerprint
`characterization data. The faster a fingerprint is read, the
`fewer details may be recorded (for example, establishing 40
`correlation points rather than 80). In addition, the ability to
`read fingerprints themselves will vary depending on the
`condition of the Skin on the finger, Sweat, dirt, etc. Thus, it
`may be the case that a fingerprint read having 80 correlation
`points may produce, in a large database (over 100,000
`entries), more than one match. That does not mean that the
`actual fingerprints are the same; rather, it means that the
`recorded characteristics appear to match more than one
`entry. This is typically not an issue in Small populations or
`when using a Small database, but will arise on occasion.
`There are public and proprietary algorithms that attempt
`to use the data to minimize false positives and maximize
`correct rejections. The characterization data is Stored in a
`database where it can be Searched for matches. Typically the
`Searches are Sequential, which can result in long Search
`times for any particular print if there are thousands to check.
`The amount of data kept per fingerprint also determines the
`Search time and uniqueness of the characterization for each
`print.
`Because of the difficulties in collecting, characterizing,
`Storing, Searching, and uniquely identifying fingerprint data
`(i.e., inexpensive readers may collect 40-50 characterizing
`points, which although reasonably good, may still only be
`unique to an approximate range of 1/10,000), fingerprints
`have not been usable as a single Source of identification
`means in a dynamic gaming environment. Many of the
`issues faced by the gaming industry are not faced by other
`industries, which would allow the reasonable implementa
`tion of, as an example, an authentication System based on a
`single fingerprint for a home or office PC where there may
`be 1 to 10 authorized users. Such systems have tiny
`databases, can be relatively slow, and can be reasonably
`fallible (in terms of false positives) and yet meet the authen
`tication needs of the few people and limited environment in
`which Such a System will be used. Such Systems are not
`Suitable for Situations as the gaming industry, which must
`meet the needs of both Speed and a Significantly higher
`degree of assurance in any particular authentication.
`Thus, there is a need to provide an alternative means for
`player authentication having reasonably high reliability and
`assurance, coupled with very high authentication Speed.
`BRIEF DESCRIPTION OF THE INVENTION
`The present invention enables a new and exciting way of
`allowing players to make use of electronic funds accounts,
`automate the generation of certain required forms, and to
`Verify their age in a manner that is fast, inconspicuous, can
`
`IPR2022-00602
`Apple EX1010 Page 18
`
`

`

`3
`be implemented to insure privacy, and provides very high
`assurance to the casino or other establishment using it.
`The invention uses at least two authenticators for each
`player, with the most common implementation using exactly
`two. A common use of a third authenticator is as a “back-up”
`to the Second authenticator. The first authenticator may be
`one of many types, with a typical first authenticator being a
`player ID card, a Voucher with a unique, encoded, and
`preferably encrypted numerical ID on it, a unique alphanu
`meric Sequence, or an RFID tag. Each first authenticator that
`is not data itself (i.e., a PIN) has the ability to have data read
`from it (i.e., the data on the magnetic strip of a typical player
`ID card). “First authenticator data” refers to the data that can
`be read from a physical first authenticator card, if Such is
`used. To Simplify word usage in this disclosure, “first
`authenticator” and “first authenticator data” refer to the same
`thing, that is, the information or data that is read from a
`physical item, where that physical item may be used to carry
`the data, or, in the case of an alpha-numeric Sequence, is the
`data. Context makes clear if the discussion of a first authen
`ticator is referring to a physical carrier or the data in the
`physical carrier or both. The second authenticator will be
`based on a biometric reading. The present invention may use
`any biometric reading, although those providing reasonably
`high degrees of uniqueness are clearly preferred. It is
`expected that at the present time, the predominant biometric
`used will be based on fingerprints.
`A player identification database is also used, where an
`entry corresponding to a player comprises at least one record
`(typically, exactly one record), and the record has fields
`containing data, information, or pointers. The records have
`fields corresponding to a first authenticator and a Second
`authenticator, providing authenticator data therein or point
`ers to authenticator data. The Second authenticator will
`always have data that correspond to a biometric measure
`ment. It is not required that a player release any personal
`information to the casino or establishment to make use of the
`present invention; that is one of its benefits. In many cases
`a player can derive even greater benefits by providing
`certain data to a casino or establishment, as explained below,
`but it is fully expected that a significant number of players
`and a large number of Small gambling halls or locations will
`use anonymous identifiers (identifiers having no names
`associated with them). Another user of anonymous identi
`fiers will remote gambling establishments, which allows
`them to carry out age confirmation without keeping a
`permanent record of each player. Again, there are advan
`tages to a player providing Some personal data, but it is not
`necessary to make use of the present invention.
`A player and a casino or establishment uses the present
`invention in Several Steps. The first is to create an entry in the
`player identification database, which associates a first
`authenticator and a Second authenticator. The player then
`goes and uses a game device. While playing or using a game
`device, the player will eventually take an action that will
`require confirmation that they are who they say they are. The
`player presents their first authenticator to the game device,
`which is used to get the associated Second authenticator. The
`player indicates they are ready to authorize an action (an
`EFT transfer, a game play, to authorize a form); then, to
`authorize the action the player presents their Second authen
`ticator.
`Remembering that the Second authenticator is always
`biometric data, all the player has to do is use the biometric
`reader. In the case of fingerprints, a quick touch of a
`fingerprint reader does the job. The Second authenticator is
`checked, and if the fingerprint data just read matches the
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,612,928 B1
`
`4
`fingerprint data in the Second authenticator, the action is
`authorized and carried out. Now, as long as the player is at
`this game device any further authorizations will only require
`that the player touch a fingerprint reader. This is extremely
`fast and very non-obtrusive, while providing both the player
`and establishment a very high degree of assurance that the
`correct person is carrying out the actions. In one
`embodiment, this enables very fast and efficient W2G
`generation-currently a very annoying aspect of any higher
`Stakes games.
`BRIEF DESCRIPTION OF THE DRAWINGS
`FIG. 1 is a functional block diagram of an example System
`having a fingerprint reader in conjunction with at least one
`other player identification means accordance with the
`present invention.
`FIG. 2 is a functional block diagram of another example
`System having a fingerprint reader in conjunction with at
`least one other player identification means accordance with
`the present invention.
`FIG. 3 is a functional block diagram showing another
`example System having a fingerprint reader in conjunction
`with at least one other player identification means accor
`dance with the present invention.
`FIG. 4 is a functional block diagram of yet another
`example System having a fingerprint reader in conjunction
`with at least one other player identification means accor
`dance with the present invention.
`FIG. 5 is a functional block diagram of System configu
`rations for implementing authentication using biometrics in
`accordance with the present invention.
`FIG. 6 is a flow diagram for creating an initial database
`entry to be used with biometrically augmented authentica
`tion in accordance with the present invention.
`FIG. 7 is a flow diagram showing a use of biometrically
`augmented authentication with automated W2G generation
`according to the present invention.
`FIG. 8 is flow diagram showing another example of the
`use of biometrically augmented authentication with auto
`mated W2G generation according to the present invention.
`FIG. 9 is a flow diagram showing yet another example of
`the use of biometrically augmented authentication with
`automated W2G generation according to the present inven
`tion.
`FIG. 10 is a flow diagram showing a method of creating
`an electronic funds account according to the present inven
`tion.
`FIG. 11 is flow diagram showing electronic funds trans
`fers using biometrically augmented authentication according
`to the present invention.
`FIG. 12 is a flow diagram showing another method of
`electronic funds transferS using biometrically enhanced
`authentication according to the present invention.
`FIG. 13 is a flow diagram showing the use of biometri
`cally enhanced authentication with electronic funds
`accounts keeping additional player data in accordance with
`the present invention.
`FIG. 14 is a flow diagram showing the use of a biometri
`cally enhanced authentication electronic funds account with
`promotional game credits according to the present invention.
`FIG. 15 is a flow diagram showing the use of biometri
`cally enhanced authenticator for age Verification according
`to the present invention.
`FIG. 16 is a block diagram showing the functional com
`ponents of a combined play and authorize button according
`to the present invention.
`
`IPR2022-00602
`Apple EX1010 Page 19
`
`

`

`S
`DETAILED DESCRIPTION OF THE
`PREFERRED EMBODIMENTS
`Persons of ordinary skill in the art will realize that the
`following description of the present invention is illustrative
`only and not in any way limiting. Other embodiments of the
`invention will readily Suggest themselves to Such skilled
`perSons having the benefit of this disclosure.
`Referring to the drawings, for illustrative purposes the
`present invention is shown embodied in FIG. 1 through FIG.
`16. It will be appreciated that the apparatus may vary as to
`configuration and as to details of the parts, and that the
`method may vary as to details, partitioning, and the order of
`the acts, without departing from the inventive concepts
`disclosed herein.
`The present invention provides new methods and appa
`ratus having Superior authentication of players than avail
`able in the prior art, while further providing for a player's
`ease of use of the enhanced authentication. It does this by
`combining at least two authenticators per player in an
`easy-to-use and manage System. A player first presents. Some
`form of initial identification to the gaming device, then (not
`always right away) provides a second means of authentica
`tion based on a biometric measure Such as a fingerprint
`(defined below). The combination of the two identification
`StepS provides two critical properties in a casino environ
`ment. First, because of the combinatoricS involved, a Sig
`nificantly higher degree of assurance is achieved when the
`two authentication events, using a first and Second
`authenticator, are used in combination than is possible using
`a single authenticator. Second, recurring authentication is
`made significantly easier for both the player and the casino,
`for example during an extended period of game play, while
`Still retaining the higher degree of assurance provided by the
`two-step authorization method.
`The first level of identification used by a player is called
`the first authenticator, and is defined as whatever a player
`first presents to the system to identify themselves. The first
`authenticator may be one amongst many choices, where the
`chosen form will depend on the needs and desires of the
`individual and the System implementation. A non-exhaustive
`list of first authenticators that are expected to be in use now
`or in the near future include: Voucher IDs, a first fingerprint;
`a biometric other than a fingerprint Such as hand geometry,
`face geometry, iris Scan, or retinal Scan, an alpha-numeric
`sequence (this includes PINs, but further includes any
`Sequence of numbers and letters, case Sensitive or not, that
`may be usable to identify a player); magnetic-strip cards
`(usually in the form a traditional player ID card); embedded
`RFID tags (may be in a key fob, a wallet-sized card, a lapel
`pin, and numerous other forms which are easy to for a perSon
`to carry and use); Smart cards; magnetic diskettes, optical
`disks and/or mini-disks; or handheld devices with an IR or
`RF interface (i.e., a PDA such as a Palm Pilot'TM).
`In addition, a preferred embodiment will allow a player to
`use one of their preexisting cards or forms of identification.
`This will include allowing a player to use a credit card,
`check card, debit card, and the like. In addition, when
`current driver's licenses are replaced in the near future with
`those having a common read means throughout the U.S.
`(expected to be either a form of Smart card or having
`machine readable symbols on one Surface of the card), those
`driver's licenses could be used as well. It is important to note
`that the use of these cards is for data matching only. It will
`not be used to acceSS or record anything having to do with
`the meaning of card when used as a first authenticator. Thus,
`a player who wants to use a debit card they already have as
`
`15
`
`25
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`US 6,612,928 B1
`
`6
`a first authenticator would allow the information on the
`magnetic Strip of the card to be read and kept as first
`authenticator data. When the player then goes to a game
`device, the player presents their card to the reader. The data
`that is read off of the card is used to find matching first
`authenticator data in the player ID database. That is the
`extent of its use. Thus, the actual meaning of the data on the
`magnetic Stripe is not important; it is simply being used as
`a unique data Sequence to find a matching data Sequence in
`the player ID database. Thus, as used in this disclosure
`"player ID is any authenticator, designated as a first
`authenticator, that has the property of having data useable as
`first authenticator data in a player ID database. “Presents” is
`defined in this disclosure to mean any action needed by the
`user of an authenticator to have the authenticator read by a
`reader designed to read that authenticator. The exact actions
`will, of course, vary depending on what type of authenticator
`a player is using. In the case of a magnetic Strip card, the
`presenting action would be to insert the card into a magnetic
`Strip card reader (like an ATM and a bank card). In the case
`of an RFID tag, the presenting action would be to hold the
`RFID tag momentarily in front of the reader. Each type of
`authenticator and its associated input device would have a
`corresponding meaning of "presents', where in each case the
`net result is that the needed data on or in the authenticator
`to be read, is read by the reader corresponding to that type
`of authenticator.
`The concept of a database, being well established, is not
`explained in this disclosure. It should be noted, however,
`that as the word is being used in this disclosure it is intended
`to cover a complete range of databases, the size, complexity,
`and expense being determined by the application and loca
`tion (where the database being referenced resides). For
`example, at the low end of the database Scale there may be
`a database located on an embedded System in a game device
`cabinet implemented as a flat file, comma-delimited data
`base held entirely in RAM, where entries or records could be
`delimited by a nonprinting character Such as a carriage
`return, and fields would refer to alpha-numeric Strings
`between commas. At the high end would be a fully relational
`database implementing extremely complex records and hav
`ing the capability to hold hundreds of thousands of entries,
`coupled with the ability to handle large amounts of Second
`ary Storage and requiring a dedicated platform for best
`performance. Thus, there is no implied restriction as to any
`particular type, kind, or complexity of database. Any data
`base implementation that works in a particular System using
`the present invention is included in this disclosure.
`The Second level or Second means of identifying oneself
`to a System is through the use of a Second authenticator. The
`Second authenticator is a biometrically-based authentication
`means. A biometric authentication means may include
`fingerprints, hand geometry Scans, retinal Scans, iris Scans,
`facial feature Scans, or other biologically-based measure
`ment means which are readily available to be used in a
`casino environment. In the description of this invention, one
`embodiment is based on the use of a fingerprint as the
`Second authenticator. However, the inventive concept is
`broader than the use of a fingerprint alone, encompassing
`any Second authenticator that is based on a biometric mea
`Surement that can be measured (Scanned, read-in) from a
`human who is sitting or Standing at or near the gaming
`device which has just been presented with a first authenti
`cator. For example, it is fully contemplated that as very high
`frequency, low energy electromagnetic emitters/readers
`become available at reduced prices, a Scan of Some of the
`bodies natural emissions using a passive or resonant reader
`
`IPR2022-00602
`Apple EX1010 Page 20
`
`

`

`7
`may be used, as well as other forms of evolving technology
`Such as iris readerS/Scanners.
`Fingerprint data is used in a preferred embodiment of the
`present invention. The word "fingerprint” can be used, in the
`common Vernacular, to mean both the image left when a
`fingertip is pressed onto material that will allow Some type
`of imprint to be left or body oils and skin that leave a
`distinguishable mark having a unique Set of ridges, etc., as
`well as meaning the unique pattern on the fingertip itself,
`even if not transferred to another Surface. To avoid confusion
`with nuances of the word "fingerprint” when used

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket