JP5681844B2 - Method and apparatus for betting game - Google Patents

Method and apparatus for betting game Download PDF

Info

Publication number
JP5681844B2
JP5681844B2 JP2009537329A JP2009537329A JP5681844B2 JP 5681844 B2 JP5681844 B2 JP 5681844B2 JP 2009537329 A JP2009537329 A JP 2009537329A JP 2009537329 A JP2009537329 A JP 2009537329A JP 5681844 B2 JP5681844 B2 JP 5681844B2
Authority
JP
Japan
Prior art keywords
device
data
user
area
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
JP2009537329A
Other languages
Japanese (ja)
Other versions
JP2010509031A (en
Inventor
オルデルッチ、ディーン、ピー.
アントニオ パパジョルジュ
アントニオ パパジョルジュ
ジョセフ エム. アッシャー
ジョセフ エム. アッシャー
Original Assignee
シーエフピーエイチ, エル.エル.シー.
シーエフピーエイチ, エル.エル.シー.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US11/559,829 priority Critical patent/US8645709B2/en
Priority to US11/559,484 priority patent/US8510567B2/en
Priority to US11/559,829 priority
Priority to US11/559,484 priority
Priority to US11/559,933 priority patent/US9411944B2/en
Priority to US11/559,933 priority
Priority to PCT/US2007/084669 priority patent/WO2008061138A2/en
Application filed by シーエフピーエイチ, エル.エル.シー., シーエフピーエイチ, エル.エル.シー. filed Critical シーエフピーエイチ, エル.エル.シー.
Publication of JP2010509031A publication Critical patent/JP2010509031A/en
Application granted granted Critical
Publication of JP5681844B2 publication Critical patent/JP5681844B2/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3202Hardware aspects of a gaming system, e.g. components, construction, architecture thereof
    • G07F17/3204Player-machine interfaces
    • G07F17/3206Player sensing means, e.g. presence detection, biometrics
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3225Data transfer within a gaming system, e.g. data sent between gaming machines and users
    • G07F17/3232Data transfer within a gaming system, e.g. data sent between gaming machines and users wherein the operator is informed
    • G07F17/3237Data transfer within a gaming system, e.g. data sent between gaming machines and users wherein the operator is informed about the players, e.g. profiling, responsible gaming, strategy/behavior of players, location of players

Description

  This application is believed to be related to the following US patent applications, each of which is hereby incorporated by reference in its entirety for operational and descriptive requirements. 11/4066783 dated April 18, 2006, 11/403722 dated April 12, 2006, 11/395596 dated April 3, 2006, 11/335253 dated January 18, 2006. No. 11/335210 dated January 18, 2006, No. 11/334848 dated January 18, 2006, No. 11/256568 dated October 21, 2005, No. 11 dated August 24, 2005. / 210482, 11/201830 dated 10 August 2005, 11/201812 dated 10 August 2005, 11/199964 dated 9 August 2005, 9 August 2005 No. 11/199835, No. 11/199831 dated August 9, 2005, No. 11/190613 dated July 26, 2005, 11/172018 dated June 29, 2005, 11/171809 dated June 29, 2005, 11/076561 dated March 9, 2005, 11/063311 dated February 21, 2005 No. 11/032724 dated January 10, 2005, No. 11/022394 dated December 22, 2004, No. 11/021848 dated December 22, 2004, No. 11 dated December 21, 2004 No. 018978, No. 10/98279, dated November 5, 2004, No. 10/963399 dated October 12, 2004, No. 10/879972 dated June 28, 2004, dated April 29, 2004. No. 10/83999, April 29, 2004 No. 10/83975, April 29, 2004 No. 10/83 No. 958, No. 10/836077 dated April 29, 2004, No. 10/835995 dated April 29, 2004, No. 10/822484 dated April 12, 2004, No. 1 April 2004. 10/816238, 10/798106 dated 10 March 2004, 10/784353 dated 23 February 2004, 10/771221 dated 3 February 2004, 3 February 2004 Dated 10/771076, dated January 15, 2004, number 10 / 759,693, dated October 14, 2003, number 10/687302, dated September 22, 2003, number 10/667923, dated September 2003 10/667755 dated 22nd, 10/654280 dated 3 September 2003, 10/651 dated 29th August 2003 No. 537, No. 10/61679, dated July 10, 2003, No. 10/453769, dated June 3, 2003, No. 10 / 453,761 dated June 3, 2003, No. 10 April 2003. No. 10/410197, No. 10/404403 dated April 2, 2003, No. 10/287332 dated November 1, 2002, No. 10/194358 dated July 12, 2002, July 12, 2002 Dated 10/194186, 10/1294019 dated 12 July 2002, 10/194018 dated 12 July 2002, 10/193980 dated 12 July 2002, July 2002 10/193978 dated 12th, 10/193777 dated 12th July 2002, 10/193 dated 12th July 2002 71, No. 10/193817 dated July 12, 2002, No. 09/846025 dated April 30, 2001, No. 9/378327 dated August 20, 1999, and March 12, 1999. 09/267865.

In the following, sections I to X provide guidance to the interpretation of this application.
I. The term “product” means any machine, manufacture and / or combination of things, unless otherwise indicated.
The term “process” means any process, algorithm, method or the like, unless otherwise specified.
Each process (even method, algorithm or other designations) inherently includes one or more steps, so all references to “steps” or “steps” of a process are “ The mere enumeration of “process” or similar terms has an essentially preceding description. Thus, any reference to a “step” or “steps” of a process has a sufficiently preceding description.
Terms such as “invention” mean “one or more inventions disclosed herein” unless specifically stated otherwise.
“One embodiment”, “embodiment”, “embodiment (s)”, “the embodiment”, “the embodiment (s)”, “one or more embodiments”, “some embodiments” , "An embodiment,""oneembodiment,""anotherembodiment," etc., unless stated otherwise, "one or more (but not all) implementations of the disclosed invention. Means "form".
The term “variation” of the present invention means an embodiment of the present invention, unless otherwise specified.
Reference to “another embodiment” in the description of an embodiment refers to an embodiment in which the referenced embodiment is different from another embodiment (eg, an embodiment described before the referenced embodiment, unless otherwise specified). ) And the meaning of being mutually exclusive.
“Contains”, “includes” and variations thereof mean “including but not limited to”, unless expressly specified otherwise.
The terms “a”, “an” and “the” mean “one or more” unless specifically stated otherwise.
The term “plurality” means “two or more” unless specifically stated otherwise. The term “herein” means “including in this application all that may be incorporated by reference” unless specifically stated otherwise.
The phrase “at least one” means any combination of one or more of such phrases when the phrase modifies more than one (such as a list of listed items) unless specifically stated otherwise. For example, the phrase “at least one of a widget, a car and a wheel” includes (i) a part, (ii) a car, (iii) a wheel, (iv) a part and a car, (v) a part and a wheel, ( vi) Means either car and wheel, or (vii) part, car and wheel. The phrase “at least one” does not mean “one of each” of the plurality when the phrase modifies more than one.
When “one”, “two” or other numerical terms are used as a radix to indicate the quantity of something (eg, one part, two parts), the quantity indicated by the numerical term Meaning, but not at least the amount indicated by the numerical term. For example, since the term “one part” does not mean “at least one part”, the term “one part” does not correspond to “two parts”, for example.
The phrase “based on” does not mean “based only on,” unless expressly specified otherwise. The phrase “based on” describes both “based only on” and “based at least on”. The phrase “based at least on” is equivalent to the phrase “based at least in part on”.
The terms “represent” and like terms are not exclusive unless specifically stated otherwise. For example, the term “represents” does not mean “represents only”, unless expressly specified otherwise. In other words, the phrase “the data represents a credit card number” means “the data represents only a credit card number” and “the data represents a credit card number, and the data also represents something else. "And both.
The term “where” is used herein only to precede a clause or other set of words that express only the intended result, purpose, or consequences of those explicitly listed previously. Used for. The term “where” is used in the claims to mean that a clause or other term that is modified by the term “where” means that the claim may be further limited in any other way. Means that no term meaning or scope constraints are established.
“Example” (eg) and like terms mean “for example” and thus do not limit the term or phrase it explains. For example, in the sentence “a computer sends data (eg, instructions, data structure) via the Internet”, the term “example” may mean that the “command” is sent by the computer via the Internet. It describes that it is an example of “data”, and “data structure” also describes that it is an example of “data” that a computer may transmit via the Internet. However, both “instructions” and “data structures” are merely examples of “data”, and anything other than “instructions” and “data structures” can be “data”.
“Each” and like terms mean “taken independently”. Thus, if two or more things have “respective” characteristics, any such thing has its own characteristics, which may be different from each other, but need not be. . For example, the phrase “both machines have their respective functions” means that the first machine has a function and the second machine has a function as well. The function of the first machine may or may not be the same as the function of the second machine.
"I.e." and like terms mean "that is" and thus limit the term or phrase it explains. For example, in the sentence “a computer sends data (ie, instructions) over the Internet”, the term “ie” describes that “instructions” are “data” that the computer sends over the Internet. To do.
Any given numerical range shall include all or part of the numbers in the range. For example, the range “1 to 10” is an integer from 1 to 10 (eg, 1, 2, 3, 4,... 9) and a non-integer (eg, 1.1, 1.2,...). 1.9) is specifically interpreted.
Where two or more terms or phrases are synonymous (eg, for explicit description that the term or phrase is synonymous), one example of that term / phrase is another relevant term / phrase Does not mean that the examples must have different meanings. For example, if a description expresses the meaning of "including" as a synonym for "including but not limited to", simply using the phrase "including but not limiting" means that the term "including" It does not mean to mean anything other than "no limitation".
II. Determination The term “determine” and this grammatical variation (eg, determine price, determine value, determine an object that meets a certain norm, etc.) are used in a very broad sense. The term “determining” assumes a wide range of behavior, so “determining” is calculating, computing, processing, deriving, examining, examining (eg, a table, database or another data structure) Search), confirm, etc. Similarly, “determining” can include receiving (eg, receiving information), accessing (eg, accessing data in a memory) and the like. Similarly, “determining” can include resolving, selecting, choosing, establishing and the like.
Since the term “determining” does not include certainty or absolute accuracy, “determining” can include meanings such as estimating, estimating, predicting, inferring, and the like.
The term “determining” does not include that a mathematical process must be performed, does not include that a numerical method must be used, and does not imply that an algorithm or process is used.
The term “determining” does not imply that any particular device must be used. For example, a computer does not necessarily have to make a decision.
III. Style If the limitation of the first claim extends to one feature and one or more features (eg, a limitation such as “at least one part” extends to one part and one or more parts), and In a second claim subordinate to one claim, if the second claim uses the definite article “the” (eg, “the part”) to refer to this limitation, One claim does not include only one feature, and this does not mean that the second claim covers only one feature (eg, “the part” means one part and Can span more than one part).
Ordinal numbers (eg, “first”, “second”, “third”, etc.) are used as adjectives before terms, and this ordinal number (unless stated otherwise) For illustrative purposes only, for example, that particular feature is used to distinguish it from another feature described by the same or similar term. For example, the “first part” may be named only for distinction from the “second part”, for example. Thus, simply using the ordinal numbers “first” and “second” before the term “part” does not indicate any other relationship between the two parts, and similarly It does not show any features of either or both. For example, simply using the ordinal numbers “first” and “second” before the term “part” means that (1) any part is in front of any other in order or place. Does not indicate that it will come later, (2) does not indicate that any part will operate before or after any other, and (3) any part in importance or quality Does not show that it ranks more than any other. In addition, the mere use of ordinal numbers does not define numerical limits on features identified using ordinal numbers. For example, simply using the ordinal numbers “first” and “second” before the term “part” does not indicate that there should be no more than two parts.
When a single device, article or other product is described herein, one or more devices / articles (whether or not they work together) May be used in place of the device / article. Thus, the functionality described as having a device may have one or more devices / articles (regardless of whether they cooperate).
Similarly, when one or more devices, articles or other products are described herein (whether or not they cooperate), a single device / article is described. One or more devices or articles may be substituted and used alternatively. For example, a plurality of computer system devices may be replaced with a single computer device. Thus, a single device / article may alternatively have various functionalities described as having one or more devices or articles.
The functionality and / or characteristics of a single device being described are described by one or more other devices that are described but not explicitly described as having such functionality and / or features. Alternatively, it may be embodied. Accordingly, other embodiments need not include the described device itself, but rather comprise one or more other devices that would have the functionality / features in those other embodiments. be able to.
IV. The disclosed examples and terminology are not limiting.
Neither the title of the invention (explained at the beginning of page 1 of this application) nor the abstract (explained at the end of this application) shall be construed as limiting the scope of the invention of this disclosure in any way. . The abstract is included herein simply because an abstract not exceeding 150 words is a requirement of 37 CFR 1.72 (b).
The titles of the invention and chapter headings provided in this application are for convenience only and should not be construed as limiting the present disclosure in any way.
Numerous embodiments are described in this application and are presented for illustrative purposes only. The described embodiments are not limiting in any way and are not intended. The invention of this disclosure applies broadly to numerous embodiments, as will be readily apparent from the disclosure. Those skilled in the art will recognize that the disclosed invention may be practiced with various modifications, changes, such as structure, logic, software, and electrical modifications. Certain features of the disclosed invention may be described with reference to one or more particular embodiments and / or drawings, but such features may relate to what is described, unless stated otherwise. It should be understood that the invention is not limited to use in one or more embodiments or drawings.
No embodiment of the method steps or product elements described in this application constitutes the invention claimed herein, unless stated otherwise in this specification or otherwise recited in the claims. It is not essential to the invention claimed in the present specification and is not in the same scope as the invention claimed in the present specification.
All words in the claims have the broadest scope of meaning that one of ordinary skill in the art would have on the priority date. The terms used in any claim are specifically defined and limited by this specification, unless stated otherwise in this specification or in the claims.
The following claims are merely an enumeration of the objects, benefits and possible uses of the claimed invention and do not limit the claimed invention.
This disclosure does not describe every embodiment of the present invention verbatim. Likewise, this disclosure does not enumerate features of the present invention that must be present in all embodiments.
Devices that are described to communicate with each other need not continually communicate with each other, unless otherwise noted. Conversely, such devices only need to transmit to each other as needed or desired, and may actually cease to exchange data for most of the time. For example, a machine that communicates with another machine via the Internet may not send data to another machine for an extended period of time (eg, weeks at a time). In addition, devices that communicate with each other may communicate directly or indirectly through one or more intermediate means.
The description of an embodiment having various components or features does not imply that all or even all of the components or features are required. On the contrary, a variety of optional components are described to illustrate the wide variety of possible embodiments of the present invention. Unless otherwise stated, no component / feature is essential or required.
Although method steps, algorithms, and the like may be described or claimed in a particular order, such methods may be configured to operate in a different order. In other words, any order or sequence of steps that may be explicitly described or claimed does not necessarily indicate a requirement that the steps be performed in that order. The method steps described herein may be performed in any order possible. Moreover, some steps may be performed simultaneously, even though they are described or implied as not occurring simultaneously (eg, one step is described after another). Moreover, the illustration of the method by drawing does not imply that the illustrated method is exclusive to other variations and changes thereto, and the illustrated method or any of its steps is Does not mean that it is necessary, and does not imply that the illustrated method is suitable.
Although a method may be described as including a plurality of steps, it does not imply that all or any of those steps are preferred, essential or necessary. Various other embodiments within the scope of the described invention (s) include other methods that exclude some or all of the described steps. Unless otherwise stated, no step is essential or necessary.
Although a method may be described alone or without reference to other products or methods, in one embodiment, the method may interact with other products or methods. For example, such an interaction may include linking one business model to another business model. Such interactions may be provided to enhance the flexibility or desirability of the method.
A product may be described as including a plurality of components, aspects, qualities, characteristics and / or features, but does not imply that all or any of the plurality is preferred, indispensable or necessary. Various other embodiments within the scope of the described invention (s) include other products except some or all of the described plurality.
An enumerated list of items (which may or may not be numbered) does not imply that all or any of those items are mutually exclusive, unless stated otherwise. Similarly, an enumerated list of items (which may or may not be numbered) does not include the meaning that all or any of those items encompass any classification, unless stated otherwise. For example, an enumerated list of “computer, laptop, PDA” does not imply that all or any of the three items of the list are mutually exclusive, and all or any of the three items of the list are Any classification is not meant to be comprehensive.
An enumerated list of items (which may or may not be numbered) does not imply that all or any of those items are equivalent to each other or are immediately replaced with each other.
All embodiments are illustrative and do not imply that the present invention or any embodiment was made or implemented in some cases.
V. Computing It will be readily apparent to those skilled in the art that the various methods described herein may be implemented, for example, on appropriately programmed general purpose computers, special purpose computers and computer computing devices. . Typically, a processor (eg, one or more microprocessors, one or more microcontrollers, one or more digital signal processors) receives instructions (eg, from a memory or similar device), executes those instructions, This implements one or more methods defined in the instruction. The instructions may be embodied in a computer program, for example.
“Processor” means one or more microprocessors, central processing units (CPUs), computer computing devices, microcontrollers, digital signal processors, or similar devices or any combination thereof.
Accordingly, the description of the method is similar to the description of the apparatus for carrying out the method. An apparatus for performing the method can include, for example, suitable processors and their input and output devices for performing the method.
Further, programs that implement such methods (as well as other types of data) may be stored and sent on various media (eg, computer readable media) in a number of ways. In some embodiments, hardware implemented circuitry or custom hardware is used in place of or in combination with some or all software instructions that can implement the methods of the various embodiments. May be. Accordingly, various combinations of software and hardware may be used in place of the software alone.
The term “computer-readable medium” refers to any medium, multiple identical, or combination of different media that together provide data (eg, instructions, data structures) that may be read by a computer, processor, or similar device. Point to. Such a medium may take many forms, including but not limited to, non-volatile media, volatile media, and transmission media. Non-volatile media includes, for example, optical or magnetic disks and other persistent memories. Volatile media include dynamic random access memory (DRAM), which typically constitutes main memory. Transmission media includes coaxial cable, copper wire, and optical fiber, and includes wire that includes a system bus connected to the processor. Transmission media may include or transmit acoustic, light and electromagnetic radiation, such as those generated during radio frequency (RF) and infrared (IR) data communications. Common formats of computer-readable media include, for example, floppy disk (trademark), flexible disk, hard disk, magnetic tape, any other magnetic medium, CD-ROM, DVD, any other optical medium, punch card, paper tape, Any other physical medium with a pattern or hole, RAM, PROM, EPROM, flash EEPROM, any other memory chip or cartridge, carrier wave as described herein, or any other medium that can be read by a computer Is mentioned.
Various forms of computer readable media may be involved in transmitting data (eg, a sequence of instructions, etc.) to a processor. For example, data may be (i) carried from RAM to a processor, (ii) transmitted over a wireless transmission medium, (iii) Ethernet (or IEEE 802.3), SAP, ATP, Bluetooth (registration) Trademark) and / or may be formatted and / or transmitted according to a number of formats, standards or protocols such as TCP / IP, TDMA, CDMA, and 3G, and / or (iv) various ways known in the art May be encrypted for privacy protection or fraud prevention.
Accordingly, the description of the method is similar to the description of the computer-readable medium that stores a program for performing the method. The computer readable medium can store program elements suitable for performing the method (in any suitable format).
Just as a description of the various steps in a method does not indicate that all described steps are required, an embodiment of the apparatus may (but need not necessarily be all) some of the described methods. Including a computer / computer computing device operable to implement.
Similarly, embodiments of computer-readable media that store programs or data structures are described at runtime, just as the description of the various steps in the method does not indicate that all described steps are required. Including a computer readable medium storing a program that can cause a processor to implement some (but not necessarily all) of the methods.
When a database is described, one of ordinary skill in the art will recognize that (i) an alternative database to that described may be used immediately, and (ii) other memory structures other than the database may be used immediately. to understand. Any illustration or description of any example database presented herein is an illustrative arrangement for expressing that information has been stored. For example, any number of other configurations may be used in place of those presented in the drawings or in tables shown elsewhere. Similarly, any illustrated entry in the database represents exemplary information only, and those skilled in the art will understand that the number and content of entries may differ from those described herein. Furthermore, despite any representation of the database as a table, other formats (including relational databases, object-based models and / or distributed databases) can be used to store and manipulate the types of data described herein. It may be used. Similarly, an objective method or operation of the database can be used to implement various methods, such as those described herein. In addition, the database may be stored locally or remotely from devices that access data in the database in a known manner.
Various embodiments may be configured to operate in a network environment including a computer in communication with one or more devices (eg, via a communication network). The computer may be any wired or wireless medium (eg, Internet, LAN, WAN or Ethernet, token ring, telephone line, cable line, radio channel, optical communication line, commercial online service provider, electronic bulletin board system, satellite communication link, as described above. May communicate with the device either directly or indirectly via any combination of Each device may itself include a computer or other computer computing device, such as an Intel® Pentium® or Centrino® processor, connected to communicate with the computer. Any number and type of devices may communicate with the computer.
In one embodiment, a server computer or centralized basis may not be necessary or desirable. For example, the present invention may be implemented on one or more devices without a central engine in one embodiment. In such embodiments, any functionality described herein when implemented by a server computer, or data described as being stored on a server computer, may instead be by one or more such devices. It may be implemented or stored in it.
Where a method is described, in one embodiment, the method may operate without any user intervention. In another embodiment, the method includes some human intervention (eg, the steps are performed with or with human assistance).
VI. Continuation Application This disclosure provides those skilled in the art with a description that allows various embodiments and / or inventions to be practiced. Some of these embodiments and / or inventions may not be claimed in this application, but may nevertheless be claimed in one or more continuing applications claiming the benefit of priority of this application. .
Applicants are willing to file additional specifications to continue patenting on subject matter that meets the disclosure and enablement requirements but is not claimed in this application.
VII. 35 USC 112, sixth paragraph In a claim, a claim limitation that includes the phrase "means to do" or "step to do" is intended to limit such limitation to 35 USC 112, sixth paragraph. Means to apply.
In the claims, a claim limitation that does not include the phrase “means to do” or “step to do” means that the limitation enumerates functions without action to perform the structure, material, or function thereof. Regardless, this means that US Patent Act 112, sixth paragraph does not apply to that limitation. For example, in the claims, referring to one or more steps in a claim or another claim, and simply using the phrase “steps of” or the phrase “steps of” is not It does not imply that Article 112, sixth paragraph applies to this step.
With respect to means or steps for performing a particular function under 35 USC 112, sixth paragraph, the corresponding structure, material or operation described in the specification, and equivalents thereof, shall Similarly, additional functions may be implemented.
Computers, processors, computer computing devices, and similar products are structures that can perform a wide variety of functions. Such a product operates to perform a specific function by executing one or more programs, such as a program stored in a memory device of the product or a memory device accessed by the product. Can do. Unless stated otherwise, such a program need not be based on any particular algorithm, such as a particular program that may be disclosed in the present application. It is well known to those skilled in the art that a particular function may be implemented through different algorithms, and that any number of different algorithms may be just a design choice for the execution of a particular function. .
Thus, with respect to means or steps for performing a particular function according to 35 USC 112, sixth paragraph, the structure corresponding to the particular function may be any program programmed to perform that particular function. Including products. Such structures include programmed products that perform the function, where the product is (i) a disclosed algorithm for performing the function, (ii) a disclosed algorithm. It does not matter whether it is programmed with a similar algorithm or (iii) a different algorithm to perform the function.
When means for performing a function that is a method are listed, one structure for performing the method is programmed and / or configured with appropriate hardware to perform the function. A computer device (for example, a general-purpose computer). Similarly, a computer device (e.g., a general purpose computer) programmed and / or configured with appropriate hardware to perform its functions via other algorithms as would be understood by one of ordinary skill in the art. Computer).
VIII. Disclaimers Numerous references to a particular embodiment do not indicate a disclaimer or negation of the additional different embodiments, and similarly, references to descriptions of embodiments that include all particular features are It does not indicate a disclaimer or negation of an embodiment that does not include the feature. Any express disclaimer or negation in this application shall be prefixed by the phrase “does not include” or the phrase “does not implement”.
IX. INCORPORATION BY REFERENCE Any patent or other document referenced herein is hereby incorporated by reference into this patent application as part of this disclosure, but is a description requirement under 35 USC 112, first paragraph. And for the purposes of enablement requirements under 35 U.S.C. 112, first paragraph, this application does not provide a clarifiable meaning without such reference, Rather, it allows for a clarifiable meaning to the term provided, but in no way should any term in this application be limited, defined, or otherwise interpreted. Accordingly, the skilled artisan need not be limited in any way by any embodiment presented in the reference.
Incorporation by reference does not include the meaning of approval, approval, or toleration of any declaration, opinion, discussion or feature contained in any patent, patent application, or other document incorporated, unless stated otherwise.
X. Application History In interpreting this application (including claims), there are other patent applications that share priority claims with this application, regardless of whether there are other patent applications that may be relevant to this application. Regardless, those skilled in the art should refer to the filing history of this application, not the filing history of any other application or patent application.

1 is a diagram illustrating a game system according to at least one embodiment of a system disclosed herein. FIG. 1 is a diagram illustrating a game system according to at least one embodiment of a system disclosed herein. FIG. 1 is a diagram illustrating a game system according to at least one embodiment of a system disclosed herein. FIG. 1 is a diagram illustrating a game system according to at least one embodiment of a system disclosed herein. FIG.

XI. Overview of Various Embodiments Referring to FIG. 1, a game system 100 according to at least one embodiment of the system disclosed herein includes a remote computer 118 such as a server computer, a game device 113, or a combination thereof. , Comprising at least one computer computing device, which may be wholly or partially in the area of the game service provider 120. The game provider 120 may be a casino owner and the gaming system 100 may be physically within the casino's geographical boundaries. Alternatively, the computer computer such as remote computer 118 and / or game device 113 may be remote from the casino. Thus, the gaming system 100 allows a user to participate in the game service and access other services described herein from a remote and / or mobile location relative to the gaming system 100 or to the casino. You may do it.

  A computer computing device generally comprises at least one processor 102 and memory 104 such as ROM, RAM, flash, or any computer readable medium 106 such as a hard drive, flash drive, optical or magnetic disk. The memory 104 or computer readable medium 106 preferably includes software that includes data that communicates back and forth between devices, display interface screens, etc., and that performs one or more steps of the methods described herein at runtime. This is stored and included. Computer computing device includes ID and password, personal authentication data such as physical biometric data, user continuity data such as behavioral biometric data, proficiency data such as player pattern data, and user name and identification One for searching and storing various types of data described herein, including user profile data such as number, address, credit or debit card data, account balance, user preferences, device preferences, etc. You may accompany the above database and have access to it.

  In one embodiment, the system 100 comprises a plurality of computer computing devices, such as a remote computer 118 connected to at least one gaming device 113 via a communication network 116, which are generally relative to each other. Configured or otherwise performed so that communications can be sent and / or received from / to each other. The term remote in this context simply means that the remote computer 118 and the gaming device are separated from each other. Therefore, these devices may be remote even if they are installed in the same room. Thus, the gaming device 113 is preferably configured or otherwise implemented so that it can send and / or receive communications to and / or from the remote computer 118. This may be accomplished using a communication element 124 such as a modem, Ethernet interface, transmitter / receiver, etc. that allows communication with a similarly equipped remote computer 118, wirelessly, wired, or a combination thereof. Good. It is understood that each functionality described herein may be provided by remote computer 118, game device 113, or both, and thus is not limited to any one implementation described herein. I want to be.

  The game device 113 may be any specific or mobile phone, PDA, pocket PC, personal computer, and slot machine, video poker machine, such as table games such as video or computer roulette, blackjack, etc. A general-purpose game device may be provided. As such, the gaming device 113 preferably includes a processor 122, a memory 123, a display 125 such as a CRT or LCD monitor for displaying information and / or images associated with services provided by the gaming system 100, and A mouse, touch-sensitive pad, pointer, stylus, trackball, alphanumeric buttons, scroll wheel, touch-sensitive monitor, etc., or these for the user to enter commands and / or information regarding game system services At least one input device such as a combination is provided. A general purpose gaming device 113, such as a PC or PDA, allows a user to access and provide services, eg, using a browser or any other general purpose application, or described herein. Specially designed special purpose software may be used to access services provided by gaming system 100, such as remote computer 118.

  In at least one embodiment, gaming device 113 includes or is otherwise associated with at least one biometric sensor 120. The biometric sensor 120 is used to directly determine at least one item of biometric data related to the user, such as a fingerprint reader, an iris scanner, a retina scanner, a blood vessel pattern reader, and a face recognition camera, from the user. Any device. The biometric sensor 120 may be embodied in hardware, software, or a combination thereof. The biometric sensor 120 may further share resources with other components of the game device 113 such as the processor 122, the memory 123, a camera, a microphone, and a speaker. A single biometric sensor 120 may be used to read one or more types of biometric data. For example, a digital camera may be used to acquire a user's eye image for iris scanning and a user's face image for face recognition. In this example, a single image capture of the user's face may provide data for face recognition as well as data for iris or retina comparison. The biometric data is generally acquired using the biometric sensor 120 and at least the user as an entrance to allow the user access to services provided using the game device 113 and / or the remote computer 118. Used to verify identity. In this regard, the biometric data may be compared to previously acquired / stored physical biometric data, preferably authenticated as associated with a particular authorized user. Access to the game system may be provided based on a specific match.

  In addition to the physical biometrics described above, the biometric sensor 120 similarly acquires behavioral biometric data such as blood pressure, heart rate or pulse rate, body temperature data, speech, handwritten characters, keystrokes, body movements, etc. May be. To determine whether there has been a change in the user's proficiency at any point in time after identification of the user, after initial verification of physical biometric data, or ID and password, etc. The behavioral biometric data may be analyzed to prove whether there was an interruption. For example, the user may be identified using a fingerprint reader. For example, a predetermined time period, or the game device 113 is disconnected, the game device 113 is moved outside the approved game area, etc. Until some predetermined event, subsequent access to services provided by the gaming system 100 may be provided. If it is determined from the behavioral data collected following the personal authentication data that there may have been a change in the user of the device, the game system 100 will then use the device to The biometric data may be monitored and the user may be instructed to enter physical biometric data or other personal authentication data. For example, to determine whether there is any change in the data flow, such as in continuous data reading, the user's heart rate or body temperature may be monitored following the initial personal identification, eg 5 seconds Sudden changes in heart rate or body temperature (either decrease or increase) in a relatively short period of time, such as: interruption of data such as invalid reading for one or more consecutive data readings, or combinations thereof, etc. It may be caused by a change in the user.

  The collected behavioral biometric data may be analyzed for any recognizable pattern that may indicate a user change. For a particular individual or group of individuals, for example, historical data such as data collected prior to the initial or previous personal authentication data, or data prior to the initial or previous personal authentication data, for example. Based on the biometric data, the collected data may be analyzed without reference to previously collected data. For example, the system 100 may be triggered to read a heart rate that is either higher or lower than the average heart rate calculated based on historical data for authorized users, and the user ID, password, or physical It is good also as an opportunity to instruct the authenticated user to input personal authentication data such as biometric data. The heart rate following an invalid reading in the data flow, which is either higher or lower than a certain heart rate before the interruption in the data flow, is also an opportunity to input personal authentication data. Also good. Similarly, different peak heart rates that are excited for a general or specific gaming system, such as when a user places a bet, wins or loses a bet, also use the services of the system 100 by the user. In order to continue the process, it may be an opportunity to input personal authentication data. For example, biometric data for establishing a data flow may be repeatedly acquired continuously, cyclically, periodically, such as every second or every minute.

  Pattern recognition may be applied to user proficiency other than behavioral biometric data, including data indicating the user's proficiency with the system and / or services provided by the system. For example, the system tracks a user's keystroke speed for a specific service, such as a general or game, and the keystroke speed of the user after personal authentication is obtained in a betting session after certification, Alternatively, it may be determined whether it differs from the data acquired prior to the proof. Other proficiency data may be tracked to determine whether there is a change in the user of the system 100, such as the speed at which the user operates through the menu, the wrong selection of menus or menu items. Keystroke data, or events such as wins or losses, may be mapped as a measure to reduce false positives as a result of different keystroke speeds, which may be due to user tension. In any case, based on the collected proficiency data, an input instruction for personal authentication data may be similarly triggered based on a determination that the user may have changed.

  Similarly, the game system 100 tracks a user's play pattern and directs the user to enter personal authentication data based on a game command or request that deviates or does not match the play pattern associated with the user. The proficiency level of the user may be proved. For example, if a user has a pattern that has never bet more than $ 100 in any particular game, that user will be more than $ 500, or more than 5% of the highest bet, etc. In the case of placing a bet exceeding a bet, the system 100 may instruct the user to input personal authentication data such as physical biometric data. Similarly, the system 100 may track the user's response to wins or losses and prompt the user for personal authentication data for any deviations therefrom. For example, a user may establish a pattern of placing a bet higher for each win and lowering a bet for a loss. When the system 100 compares previously acquired play pattern data with currently playing pattern data and makes a determination that the betting pattern deviates for a particular authenticated user, the system 100 The user may be prompted to input personal authentication data before continuing to permit access to the service provided by. Continuity may also be tracked using an authentication device described below.

  The system 100 can collect behavioral biometrics, proficiency levels, play patterns, and any other type of data that can be acquired from the user in a sufficient amount of time to collect the comparative data set described above. User continuity data may be tracked. The amount of data in the comparison data set generally varies based on the type of data and the desired sample for comparison. The data required for comparison in determining whether there may have been a user change based on changes during the continuous reading of data, for example when there was an interruption in the data flow The quantity generally includes two consecutive readings, i.e. the second reading after the first reading needs to have a substantial value, for example an increase or decrease of more than 5%. To do. Similarly, when this comparison is based on historical data, the amount of data required for the comparison is the first amount at the time when the data is classified as historical data, for example, before the current physical biometric personal authentication at that time. Includes at least two non-consecutive readings, a reading and a second, more recent reading with a significant increase or decrease from the first reading, such as after the current physical biometric personal authentication at that time . It should be noted that in some examples, the larger the data set, the more accurate the input indication for additional data (false positives) may be, or the error may be reduced. For example, comparing the current reading with five previous readings may result in fewer false positives in that the average value tends to reduce the effects of noise in the comparison data set. . Alternatively or additionally, the system 100 may filter noise from the comparison data set. The system 100 has, for example, temperature readings below 32.2 ° C. (90 degrees Fahrenheit) and above 43.3 ° C. (110 degrees Fahrenheit), heart rate below 40 times per minute and above 180 times per minute, etc. Missing data may be filtered.

  In one embodiment, the system 100 may prompt the user for personal authentication data based at least on a configurable level of confidence associated with the comparison. The level of reliability may be set by a system administrator or a user, for example. The level of reliability can be adjusted by adjusting variables that are factors of reliability or the probability of false positives or false negatives, and in some cases, for comparisons such as differences between data that trigger input instructions for personal authentication data. It may be set in any manner, including the amount of data in the data set used for, the filter used to filter noise from the data set for comparison, and the like.

  In one embodiment, the system 100 tracks data indicating false positives and uses this to adjust variables associated with the data set, data set filters, differences between data that trigger input, etc., And / or it may be used as an algorithm used as a trigger for an input instruction for personal authentication data. The false positive data generally includes a positive proof of the identity of the user in response to an input instruction for personal authentication data after an opportunity. Data indicating false positives further includes the amount of time between the input prompt and the positive proof, or data that the positive proof of the user's identity is considered suspicious and returns to the authenticated user Any other data indicating that it belongs to a change in may be included.

  As a result, the data that becomes false positives causes the user to input the personal authentication data, and further adjusts variables associated with the data set, data set filter, algorithm, etc. according to this, and becomes an input to the neural network. Also good. Similarly, data indicating true positives may also be input to the neural network. Neural networks may be trained using supervised, unsupervised learning, and reinforcement learning techniques or combinations thereof. With supervised techniques, a neural network is provided with a set of example pairs, such as data readings, reading the data is shown as false positives or true positives, and the neural network maps the mapping that the data contains meaning to. Infer. When data is supplied to the neural network by an unsupervised technique, the neural network maps from the data without the aid of false positive or true positive indications based on statistical models, filtering, blind source separation, clustering, etc. To derive. With reinforcement learning, data is generally derived from the interaction between the system and the observations made thereby. In addition to the data that results in false positives, in some cases, to achieve the desired reliability, such as accuracy of 85% or higher, the size of the data set is adjusted, the value of the data set filter, Any data described herein may be supplied to the neural network to change the difference between readings. Alternatively or in addition, the resulting false positive data may be input to a support vector machine, which classifies the data using supervised learning techniques. The image type data may further be preprocessed prior to introduction into a neural network or support vector machine to generate an abstract representation of the image that is smaller in size than the image data. The preprocessing may be performed using a statistical technique such as a linear discriminant analysis method.

  The system 100 may detect various types of errors, and may further classify the error types into one of a plurality of categories such as type I errors and type II errors. This classification may be derived based on the severity of the error or any other feature framework. For example, incorrect personal authentication with physical biometric data may be classified as a type I error with a higher specific gravity than behavioral biometric data classified as a type II error. The manner in which system 100 reacts to errors may depend on the class. In this regard, the system 100 may operate in favor of a class of errors and may react positively or expediently based on the error classification. For example, the system may block all access with type I errors while continuing to provide access for type II errors until an acceptable range is reached. For example, continuous access may be provided until a certain number of Type II errors are registered, such as three or more Type II errors. In this regard, it is advantageous for Type II errors to allow rather than eliminate game play compared to Type I errors. The classification and threshold may be configurable by an administrator or user. In addition, the user may be limited only to configuring certain error classifications and thresholds to be more stringent. For example, the user may be limited to only adding a default type II error to a class of type I errors with a more aggressive response than type II errors. Similarly, the user setting regarding the threshold value may be limited to, for example, only reducing the threshold value to two or the like in place of three type II errors until access is blocked. All user settings may be stored in user profiles in one or more databases associated with gaming system 100. The threshold and / or classification may be location specific. For example, certain types of error thresholds during periods in a hotel restaurant may ease accounting for users involved in other activities, such as, for example, a meal.

  The game system 100 is, for example, a card game; a slot machine type game; a craps; another casino type game; a table game such as poker, craps, roulette, blackjack, baccarat, etc .; a the wheel of fortune game; Access to a variety of hosted services, including one or more of several different types of games, such as sports betting; horse racing, dog or car competition; hirai; lottery games including video versions of scratch lots May be provided to the user. System 100 includes sports events and athletics, including football, basketball, baseball, golf, and certain financial market movements, stock indices or real estate-backed securities, political elections, entertainment industry awards, film market research, weather Game play may be provided based on results from any type of event, such as a non-sport event such as an event. The supply of these games may or may not be accompanied by a bet and may involve a simulated bet using points that may be traded as a prize. The gaming system 100 may similarly provide non-game services on the gaming device 113, such as audio and video entertainment, news, messaging, phone calls, IP phone calls, and the like.

  The gaming system 100 can be any local area network (LAN), wide area network (WAN), Internet, telephone line network (POTS), mobile, wireless network including WiFi and WiMax, or a combination of wired and / or wireless networks. May be implemented via any type of communication network 116. The communication network 116 may be entirely independent of the Internet. System 100 may alternatively limit information sent over the Internet to those that have little or no security risk or are encrypted.

  As described above, the gaming system 100 may allow a user to access services provided by the system from one or more of a plurality of remote locations in some embodiments. The system 100 may similarly allow a user to access the system 100 services by the device 113 during a travel or temporary stay. For example, the game system 100 may allow the user to provide a service at an arbitrary location in the service area 148 such as in the vicinity of a hotel. The service area 148 may be further divided into a plurality of sub-areas 140, 146, such as hotel casinos for general occupied areas such as lobby, pool, gym, etc. In a broad sense, the service area 148 includes any place within the communication capability range of the system. Accordingly, the service area 148 for services provided over the Internet includes any location that has access to the Internet. Similarly, the service area 148 for services provided by wireless communication includes any location within the transmitter's transmission range and / or the receiver's reception range. Service area 148 may be artificially limited by system providers and / or users within certain geographic boundaries. For example, a system provider may limit service areas within one or more states, cities, municipalities, hotels within a city or municipality, areas within a hotel such as a casino area, or a combination thereof. Accordingly, the system 100 may provide a user with services in a disjointed area 140, as shown in FIG. 1, where the service provider is a state such as Nevada, USA, and Atlantic City, NJ, USA. Provide services in one or more cities, or in any one or more hotels in the city. User-defined location access restrictions may be stored in a user profile in a database associated with the system 100.

  Accordingly, in one embodiment, the system 100 has a location verification feature, further details of which are described below. The location verification feature is used to allow or block a user from accessing a service provided by system 100 based on a particular location, such as gaming device 113. For example, when it is determined that the location of the game device 113 is within a predetermined area 140, such as within a hotel area disclosed herein, the service may be enabled, or the device 113 may be in the area 140. When moving to a location outside of, it may be invalid. The location proof feature may similarly be used to disable less than all of the services of the gaming system 100 based on the location of the device 113. For example, the system 100 may limit betting-type games to areas where the game is legally permitted, such as hotel casinos, while non-wagering services such as messaging, It may be valid regardless of the location of the device 113. Similarly, certain services may be enabled or disabled by the provider and / or user based on the location of the device. For example, a user may be able to disable non-betting services such as messaging when in a betting area such as a casino and / or during a certain event such as the user is playing a game. Good. As the above classification and threshold restrictions, the user may be able to specify only more severe service restrictions, thereby overriding certain restrictions imposed by the service provider. For example, a user may not allow a betting-type game to be activated in an area where this type of game is disabled by the service provider. User-defined service limits may be stored in a user profile in a database associated with the system 100.

  In one embodiment, the gaming system 100 provides services in at least two areas 140, 146, each area having a different monitoring level. The monitoring level may be quantified based on whether the authenticated user is actually using the game system 100 or any scheme that indicates effectiveness in determining that the game system 100 is being used properly. . A level may be established based on the number of measurements implemented in this regard. For example, the monitoring level for an area using face recognition and person monitoring may be considered higher than an area using only a fingerprint scan. Alternatively or in addition, certain measurements may be given a higher specific gravity, for example based on the reliability of the measurements. For example, a fingerprint scan may have a higher reliability or accuracy in user identity than an iris scan. Specific gravity in a particular measurement may be independent of its reliability, or simply based on subjective confidence in that measurement relative to other measurements, such as a user or service provider. The monitoring level may have a designation that indicates overall effectiveness and / or reliability. For example, the level of the area may be classified into A, B, C,..., Z; low, medium, high, or I type, II type, III type,. Similarly, the monitoring level may be distinguished by using a finer designation such as 0% to 100% in increments of 1, 0.1, and 0.01.

  In one embodiment, the system 100 provides access based on the monitoring level of the area where the game system 100 is accessed, such as from the location of the game device 113. That is, monitoring-based access may allow access to one or more services if there is a sufficient level of monitoring defined by either the system provider and / or the user. In this regard, monitoring-based access may be implemented in any one of a number of ways. The system may provide a betting-type game service only if, for example, the level of security associated with the access area meets a minimum level. For example, the user may use the system 100 to limit betting-type games to areas such as casinos that do not fall below Type I monitoring levels. Therefore, betting type games are invalidated in areas of type II monitoring level or below, such as pools, hotel shared areas such as hotel lobbies, and non-shared areas such as hotel rooms.

  In one embodiment, the system 100 supplements the monitoring level with monitoring measurements available using the system 100 to achieve the desired monitoring level. Further to the previous example, system 100 may increase the type II area monitoring level to type I for betting type games by prompting the user for personal authentication data and / or Add proficiency level data for this area by adding a monitoring level for the area with mixed area and type II area sufficient to classify the monitoring measurement of the area and equipment as type I or higher. May be. Therefore, the system 100 requests biometric data from the device in an area with a low monitoring level such as a hotel courtyard, while providing a service to an area with a higher monitoring level such as a casino without biometric data. Access may be granted to the user. Monitoring based on access restrictions may be stored in a user profile in a database associated with the system 100.

  As can be considered from the present disclosure, the system 100 is capable of different types of physical biometric data, behavioral biometric data, proficiency data, play pattern data, etc. for personal authentication for each authenticated user. A plurality of data may be held. The system 100 preferably identifies the user before granting the user access to at least one of the services provided using it. In this regard, the system allows the user to submit at least one item of personal authentication data, such as an ID and password combination or any one of the physical biometric data items described herein. May be requested. The system may further request from the user at least one additional item of personal authentication data for system access. In this respect, the system holds at least one redundant proof data item. Requests for additional proof data may be implemented in some examples, but are not limited to all. For example, additional certification data may be requested in certain areas of the hotel, such as monitoring or unreliable locations as described above. In these areas, the system 100 may include the first and second proof data, such as facial images, iris scans, retinal scans, fingerprint scans, blood vessel pattern scans, etc., before granting user access to system services. The second item may be input to the user. A monitoring level or reliability associated with each of the measurements may be added to achieve the desired monitoring level or reliability as described above.

  A user may generally restrict access based on any aspect of the service provided by the system 100, or any other customizable aspect of the system 100, including classification and threshold settings, and service, location, and monitoring. May be customized. In one example, customization generally allows the user to change the security level to a level based on the user's level of comfort and / or where the service is accessed, such as higher than the minimum set by the service provider. To give permission. For example, if the user intends only to access the game system 100 such as the game device 113 in a specific casino, the user uses the game device outside the site of the specific casino such as another casino. The system 100 may be configured to request biometric data whenever it is available. This feature may be used to prevent situations where a thief steals game device 113 and attempts to access another casino. Services may be customized independently for each device 113 or for a group of devices.

  The system 100 may be further configured to encrypt data such as physical biometric data before communicating from the gaming device 113 to the remote computer 118 via the network 116 for authentication. In one embodiment, this may be accomplished, for example, using a one-way encryption algorithm that encrypts personal authentication data, and in one example, has a length such as 100 or more from the image data. Generate an alphanumeric string. The string may then be communicated to the authenticating remote computer 118, which is compared to the data in the user's profile. The remote computer 118 preferably does not store any personal authentication data in its raw or unencrypted form, but rather stores the encrypted string for verification. Accordingly, the matching of the character string communicated from the device for personal authentication with the stored character string is within a configurable tolerance, and the user's access to one or more of the services provided by the system 100 Is effective. Similarly, gaming device 113 may not store the raw and / or encrypted personal authentication data permanently and / or when the data is successfully transmitted to remote computer 118 after verification, Alternatively, it may be periodically deleted at any time when the data is no longer needed for immediate certification. Therefore, in this example, the game apparatus 113 is requested to acquire and / or encrypt the personal authentication data every time an input instruction for the data is changed.

  The system 100 may similarly disable access to it using a hardware check mechanism. That is, the device 113 may include a reader 150 that acquires information from the corresponding authentication device 155. Authentication device 155 is a smart card, bracelet or wristband comprising a card with a magnetic strip such as a credit card, an RFID transponder, a key with a finite distance signal transmitter or other transponder, a signal transmitter such as an RFID signal transmitter Or any article for storing information, such as those containing magnetically encoded signals, substrates having barcodes or other optically readable identifiers, or any combination thereof. . The reader 150 may be a magnetic strip reader, an RF or infrared receiver, an optical scanner, or the like.

  Accordingly, the game device 113 may be able to detect a signal from the authentication device 155, and the system 100 may validate the system access based on the signal from the authentication device 155. Similarly, in order to continuously detect signal detection from the authentication device 155, the game device 113 to receive may be conditioned for continued access. The signal generated by the authentication device 155 may additionally or alternatively include information stored in the device 155, such as personal authentication data or any other data that may be used as a key for system access. Good. In one embodiment, the authentication device 155 comprises a token derived from authenticated user biometric data, such as an alphanumeric string derived from the user's biometric. The system 100 may then provide access based on a comparison of the alphanumeric characters derived from the reading of the biometric sensor and a string stored in the authentication device. Alternatively or in addition, the character string stored in the authentication device 155 may be used to authenticate the user without using other personal authentication data. That is, high specific gravity may be given to the data of the authentication device, and it may be used as primary data for personal authentication.

  It should be understood that all or some of the data described herein may be stored in the authenticator 155 and used as a basis for comparison with data obtained for personal authentication. is there. For example, the device 155 may include physical biometric data, such as fingerprint data, which is compared to the received fingerprint data for immediate personal authentication. Similarly, the data used for the comparison may be limited to be stored in an area only within the user's control, such as an area other than the authentication device 155 and / or the game device 113. Therefore, for this purpose, verification may be locally performed between the game device 113 and the authentication device 155 without using transfer of personal authentication data to the remote computer 118. Alternatively or additionally, verification may be performed between the remote computer 118 and the authentication device 155.

  The functionality disclosed herein may be provided using software provided on both the game communication device 113 and the remote computer 118. The software included in the game communication device 113 is preferably operable to provide information corresponding to system services, including betting and games to other types of users. This information is associated with services such as menus, icons, buttons, selectable areas, hyperlinks, for example, having one or more interface screens, windows and / or message boxes, representations of selectable options associated with the service. Including, but not limited to, an image and / or textual representation of the object. The gaming device software is also preferably operable to receive data from the remote computer 118 and data input by the user. The software provided by the remote computer 118 preferably exchanges data with the game device 118, accesses additional computers and data storage devices, and provides general backend functionality for the services described herein, as well as game systems. All functions can be implemented, including typical ones.

  Data described herein for transfer or use to various devices of gaming system 100 may be in any format that is necessary or suitable for services provided to a user. This information may be transmitted in whole or in fragments thereof according to any format including digital or analog, text or voice, and any transfer technology including wired or wireless technology. Wireless technology may include licensing or technology from which a license is exempt. Some specific methods that may be used include code division multiple access (CDMA), pan-European digital mobile telephone system (GSM), general packet radio system (GPRS), WiFi (802.11x), WiMax (802). .16x), public switched telephone network (PSTN), digital subscriber line (DSL), integrated digital network service (ISDN), or cable modem technology. These are exemplary only and one of ordinary skill in the art will appreciate that other types of communication technologies are within the scope of the present invention. It is further understood that additional components may be used for information communication between the user and the game server. Such additional components include physical communication lines, wireless communication paths, antennas, switches, cables, transmitters, receivers, computers, routers, servers, fiber optic transmitters, repeaters, amplifiers, and the like. Not limited.

  In at least one embodiment, some or all of the data communication may occur over the Internet or without Internet involvement. In some embodiments, some of the information may be transmitted over the Internet, while another portion of this information is communicated over a more secure network. For example, an image file depicting a roulette table such as a gif or jpg format file may be communicated via the Internet, while game information such as the rotation result of the roulette wheel is communicated in a parallel network, The game devices 113 are grouped together for display together in a single interface screen. In addition to safety considerations, which of the multiple networks handles the split data may be based on the network bandwidth. Accordingly, larger image files may be transmitted to device 113 via the WiMax network, while small data files are transmitted via the cellular network.

  With reference to FIG. 2, the communication network 116 may be a cellular telephone network 222. The mobile phone network 222 includes a plurality of base stations 223, each having a corresponding coverage area 225. The base station may have overlapping service areas. Furthermore, the service area may or may not be sectored. In a mobile phone network, the game device 113 is generally a mobile station 224 such as a mobile phone that may be temporary in the network. The mobile station 224 communicates with the base station 223 wirelessly via a high frequency signal. The base station 223 generally communicates with, for example, the remote computer 118 via POTS, T1-T3, ISDN, or other terrestrial lines. Each base station is preferably programmed to send and receive speech and / or to transfer data back and forth with the mobile station. The game apparatus 113 may be connected to the remote computer 118 by a carrier of a mobile phone of its own brand. The mobile station 224 is preferably pre-programmed with the operator's authentication software to establish a connection with the cellular network.

  In one embodiment, the location verification feature for determining the location of the gaming device 113 does this in relation to the location of at least one base station in the cellular network. That is, the system 100 determines the location of the game device 113 based on the location of one or more base stations and the distance and / or direction (azimuth) of the device 113 from at least one base station. The distance may be determined based on the strength of the transmission signal received from game device 113. That is, the transmitter of the game system device communicates with a fixed transmission power output. The attenuation of the transmitted signal is generally a function of the distance between the transmitter and the receiver. Thus, the power of the signal received from the device 113 may be measured by the base station and determined, for example, by calculation or by reference to a database or table that maps distance to signal strength. The direction may be determined based on the azimuth angle of the antenna that receives the signal from the device 113. Alternatively or in addition, as shown in FIG. 3, the direction may be determined by triangulation, multilateration, etc. based on the distance of the device 113 from multiple base stations 223, such as two or three. And may be determined. The determination of the location of the game device 113 based on the power level of the signal received from the game device is not limited to the mobile phone network. Rather, this method is generally applicable to all types of wireless networks, including satellite, WiFi, GPS, LORAN, RFID etc., and if the location of the base station is known, the base station The location of the device 113 may be derived based on the distance from the device.

  Referring to FIG. 3, in one embodiment, the location proof feature may be implemented using geo-fencing. That is, the location-based access disclosed herein is based on the communication range of the base station in the wireless communication network. For example, the game system 100 may communicate with a plurality of game devices 354, 355, and 356. Device 354 is shown located outside of game jurisdiction or area 358. Devices 355 and 356 are both located inside game area 58. However, only device 356 is located within a sub-area or geofence 357, defined by the perimeter of the service area of multiple base stations 353. Thus, the geofence enables access to device 356, but may be used to disable services for devices 354 and 355. Some gaming devices, such as device 355, may be in area 358 and these devices should not be allowed access to gaming system 100 based on their location with respect to geofence 357. The base station may be a mobile phone base station as described above or a base station having a relatively short range, such as a WiFi or RFID transmitter / receiver located within a hotel premises. The short-range base station may be set in a grid-like service area such as, for example, in the ceiling of a facility, using a sufficient interval for determining the location of the apparatus.

  Location verification may be implemented using multiple overlapping and non-overlapping geofences. For example, the geofence 361 may be defined to be less than all the base stations in the network, such as the base station 360 including all the base stations in the casino. Geofence 360 may be a subset of geofence 357 and may be exclusive from area 357, which may include all base stations in the hotel. In any case, location-based access such as classification, thresholds, services, monitoring, etc. may be specific to the geofence. The geofence may further be combined with triangulation and / or location verification techniques to determine the specific location of the device within the geofence. For example, the location of the device 356 may be determined based on triangulation of the three base stations 353.

  Alternatively or additionally, device 113 may comprise a global positioning satellite (GPS) chip that determines the location of the device based on signals received from GPS satellites. The GPS chip may operate alone, and in this example, the GPS chip is a single computer that combines the GPS position data with the processor 122 and / or communication element 124, or other elements, with the functionality of the GPS chip. Transmit to other components of the device, such as part of the chip.

  The location verification feature may generally be implemented using a certain element, a location verification element, which may be any of these, such as game device 113, remote computer 118, base station or multiple base stations. Relay parts, or a combination thereof. The location verification element may be implemented in hardware, software, or a combination thereof, and generally determines the location of game device 113.

  In connection with any method of location determination, the game system 100 may periodically update the location determination information. This is, for example, during a game session, during a game session, not immediately after login or at the initial access, at a predetermined time interval for confirming that the movement of the game device 113 to an unauthenticated area is detected. May be done.

  Referring to FIG. 4, a method according to at least one embodiment of the method disclosed herein begins at 402 by initializing game device 113. Initialization depends on the type of game device 113. For example, initialization may be simply turning on the device 113 or executing a browser application or special purpose software. In one embodiment, initialization includes communicating an initialization message from device 113 to system 100, such as remote computer 118, for example. The initialization message is generally interpreted by the system 100 as an initial request for access. The initialization message may include information therein that identifies the device and / or user, such as, for example, a unique device identification number for an initial access decision. The unique device identification number may be a serial number, a mobile phone number, an IP address, or the like.

  In one embodiment, the system 100 displays a first interface screen in response to initialization at 404, such as in response to an initialization message. The first interface screen may be stored locally on the device 113 or may be communicated to the device 113 via the network 116 for display. The nature of the first interface screen changes depending on the situation. For example, if the device 113 cannot establish a link with the remote computer 118, the first interface screen may include a message indicating so. Alternatively, when successfully establishing the necessary connection, the first interface screen may include at least a text box or the like to enter an ID, password, or combination thereof for the user to log into the system 100. It may contain a single formal element. The ID and / or password may generally be used as a first level personal authentication to provide a user with a particular customized service. Alternatively or additionally, the customized service may be device specific, and in this example the device identification number is used to distinguish a particular device 113 from all other devices in the system. May be.

  If it is determined at 408 that the user is new and / or the device is not activated, then the user and system are each registered at 140 and activated for service. In one embodiment, the user, at 412, physical biometric data such as ID and password, name, identification number address, credit card number, fingerprint scan, iris scan, retinal scan, blood vessel pattern scan, facial image, etc. It is registered by receiving personal authentication data. The personal authentication data may be authenticated by a third party provider, such as a related department of a car or a credit rating agency. At 414, user preference information, such as preference information related to error classification and thresholds, location access restrictions, service restrictions, monitoring restrictions, etc., may be received as well. At 416, the personal authentication data may be encrypted and stored by remote computer 118 or authentication device 155 as described above, and at 417, device 113 may be activated for service. Once all requirements and / or all desired information has been acquired, at 430, the appropriate service type interface screen is displayed.

  If it is determined at 408 that the user and / or device 113 are each not new and not activated, in one embodiment, the system 100 determines the location of the device 113 at 406. The location of the device 113 is determined in various ways, as described above. In one embodiment, the location of the device 113 is determined based on the location of at least one base station with which the device 113 communicates wirelessly. The base station may be a base station in a mobile phone network, a WiFi router, an RFID transponder, or the like. The location of the device 113 may simply be a confirmation that the device 113 is communicating with at least one base station whose location is known. In this way, it can be determined from here that the device is within an area defined by the communication range of at least one base station. Additionally or alternatively, the location of the device 113 may be determined further based on the distance and direction of the device 113 from one or more base stations, eg, based on signal power received from the device transmitter. The determination of the device location may also be accomplished using GPS technology. In any example, the location of the device 113 may be communicated and / or received by the system 10 for use in providing services, as described herein. The location is, for example, coordinates such as latitude and longitude, base stations that communicate with the device, for example, a base station in a casino, a hotel in a hotel, a geofence area where there is no bet for a bet base station, etc. May be specified from the viewpoint of the classification of base stations with which they communicate.

  In one embodiment, the system 100 determines at 418 the monitoring level associated with the location of the device 113. This may be accomplished, for example, by referring to a monitoring level in a table that includes monitoring level data that is mapped to a location within the service area of the system 100. Alternatively or additionally, the monitoring level may be calculated in real time based on the monitoring monitoring of the location at that time.

  In one embodiment, the system 100 may prompt the user for personal authentication data, such as physical biometric data, based on the monitoring level associated with the location and / or location of the device 113. In this example, the system 100 implements a monitoring scheme based on this. That is, the particular type and quality of personal authentication data required to access the services of the system 100 is based on the location and / or monitoring level associated with the location. For example, in a casino area, the system 100 may not require any physical biometric credentials for access, while a non-casino area is at least one item of physical biometric data. A physical biometric certificate may be required. Similarly, personal authentication of some common area outside the casino may further require a second redundant item of physical biometric data. In the context of the monitoring level, an area with type I monitoring may not require physical biometric verification, whereas an area with type II monitoring may contain at least one of the physical biometric data. An item may be requested, and an area with type III monitoring may require at least one redundant item of physical biometric data. As described above, the system 100 may implement a proof scheme to achieve the targeted monitoring level. That is, the system 100 may determine the monitoring level of the device location and may require personal authentication to the extent necessary to meet or exceed the target level. For example, at least one item of redundant proof data needs to be raised from type II to target type I. Similarly, at least two items of redundant proof data need to be raised from type III to target type I.

  The personal authentication data may then be compared at 422 with previously stored data, such as remote computer 118 and / or authentication device 155. If the personal authentication fails at 424, the system 100 may prompt the user to re-enter or add additional data. If the certificate is passed, the system 100 determines at 426 whether there is a location-based service restriction and at 428 determines the applicable user preferences associated therewith. That is, the system 100 determines which of a plurality of available services the user is provided with access based on the location of the device and / or the monitoring level associated with the location. For example, the system 100 may provide access to all services in the casino, such as betting, entertainment, news, messaging, telephone, IP phone, etc. when the device 113 is in the casino. Similarly, access to all services other than betting may be provided in all areas. In this regard, the system 100 blocks access to betting services in certain areas, such as areas outside the casino.

  After personal authentication, an interface screen appropriate for a service may be displayed for the user at device 113. That is, the interface screen displayed to the user includes selectable options internally for accessing the enabled services. Services that are not activated are preferably blacked out. For example, the interface screen includes menu items, icons, hyperlinks, selectable text and images, etc. for each enabled service that, when selected, the associated interface screen is displayed. As described above, the system 100 may provide a user with access to, for example, a video version of a table game such as poker. In this example, the associated interface screen may include images for video poker, including game card images, betting selections, and the like. The interface screen is preferably selected to enter other services and / or games and betting commands, such as hit, stay, hold, draw, bet, bet up, bet down, double down, etc. Includes selectable elements for operation through the service environment, such as access to possible elements.

  In one embodiment, the system 100 obtains data to determine if there has been a user change since the previous personal authentication. As described above, user changes include, for example, blood pressure, heart rate or pulse rate, body temperature data, speech, handwritten characters, keystrokes, body movements, etc. behavioral biometric data, keystroke speed, menu items or The selection speed may be determined based on various types of data such as player pattern data such as game command, betting command scale and speed, and other proficiency data. If it is determined at 434 that there may have been a user change from previous personal authentication, the system 100 may prompt the user for personal authentication data at 436 based on the error classification and threshold. Response may be repeated. The system 100 preferably determines at 438 whether there is a change in the location of the device 113 and adjusts / enables the service accordingly.

  Although the foregoing invention has been described in several details for purposes of clarity and understanding, those skilled in the art will recognize upon reading this disclosure that departs from the true scope of the invention in the appended claims. It will be appreciated that various changes in form and detail are possible.

Claims (6)

  1. At least one processor determining that a device having a display and a biometric sensor is installed in a first area of the plurality of service areas;
    The device installed in the first area, wherein the at least one processor does not instruct a user of the device to input physical biometric data based on the device installed in the first area. Enabling a service at said step, said service comprising a betting game;
    Said at least one processor determining that said device is installed in a second area of a plurality of service areas;
    The at least one processor directing the user of the device to input a first item of physical biometric data based on the device installed in the second area;
    Said at least one processor receiving said first item of physical biometric data;
    In the apparatus, wherein the at least one processor is installed in the second area based on a comparison between the first item of physical biometric data and another item of physical biometric data. Activating the service, wherein the other one item of physical biometric data relates to the user and is less than receiving the first item of physical biometric data. Previously acquired steps,
    Including methods.
  2. The first item of physical biometric data includes at least one of the user's fingerprint scan, iris scan, retinal scan, blood vessel pattern scan, and facial image;
    The method of claim 1.
  3. Said at least one processor determining that said device is installed in a third area of a plurality of service areas;
    The at least one processor prohibiting access to the service based on the device installed in the third area;
    The method according to claim 1 or 2 , comprising :
  4. The at least one processor determining a first monitoring level associated with the first area after determining that the device is installed in the first area;
    The at least one processor determines based on the first monitoring level that physical biometric data need not be input to a user of the device;
    The method according to claim 1, comprising :
  5. The at least one processor determining a second monitoring level associated with the second area after determining that the device is installed in the second area;
    Determining that the at least one processor should instruct a user of the device to input the first item of physical biometric data based on the second monitoring level;
    The method of claim 4 comprising :
  6. At least one processor;
    A computer-readable recording medium storing instructions for execution by the processor,
    The instructions are instructions that cause the processor to perform the method according to any one of claims 1 to 5.
    apparatus.
JP2009537329A 2006-11-14 2007-11-14 Method and apparatus for betting game Active JP5681844B2 (en)

Priority Applications (7)

Application Number Priority Date Filing Date Title
US11/559,829 US8645709B2 (en) 2006-11-14 2006-11-14 Biometric access data encryption
US11/559,484 US8510567B2 (en) 2006-11-14 2006-11-14 Conditional biometric access in a gaming environment
US11/559,829 2006-11-14
US11/559,484 2006-11-14
US11/559,933 2006-11-15
US11/559,933 US9411944B2 (en) 2006-11-15 2006-11-15 Biometric access sensitivity
PCT/US2007/084669 WO2008061138A2 (en) 2006-11-14 2007-11-14 Biometric access sensitivity

Publications (2)

Publication Number Publication Date
JP2010509031A JP2010509031A (en) 2010-03-25
JP5681844B2 true JP5681844B2 (en) 2015-03-11

Family

ID=39402656

Family Applications (3)

Application Number Title Priority Date Filing Date
JP2009537329A Active JP5681844B2 (en) 2006-11-14 2007-11-14 Method and apparatus for betting game
JP2014100471A Active JP6126044B2 (en) 2006-11-14 2014-05-14 Method and apparatus for betting game
JP2017075936A Active JP6678126B2 (en) 2006-11-14 2017-04-06 Method and apparatus for betting games

Family Applications After (2)

Application Number Title Priority Date Filing Date
JP2014100471A Active JP6126044B2 (en) 2006-11-14 2014-05-14 Method and apparatus for betting game
JP2017075936A Active JP6678126B2 (en) 2006-11-14 2017-04-06 Method and apparatus for betting games

Country Status (7)

Country Link
EP (1) EP2092462A4 (en)
JP (3) JP5681844B2 (en)
AU (1) AU2007319235A1 (en)
CA (2) CA2928614A1 (en)
GB (1) GB2458049B (en)
NZ (2) NZ706217A (en)
WO (1) WO2008061138A2 (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9756874B2 (en) 2011-07-11 2017-09-12 Proteus Digital Health, Inc. Masticable ingestible product and communication system therefor
US9198608B2 (en) 2005-04-28 2015-12-01 Proteus Digital Health, Inc. Communication system incorporated in a container
CN103259027A (en) 2005-04-28 2013-08-21 普罗透斯数字保健公司 Pharma-informatics system
CN105468895A (en) 2006-05-02 2016-04-06 普罗透斯数字保健公司 Patient customized therapeutic regimens
WO2008052136A2 (en) 2006-10-25 2008-05-02 Proteus Biomedical, Inc. Controlled activation ingestible identifier
WO2008063626A2 (en) 2006-11-20 2008-05-29 Proteus Biomedical, Inc. Active signal processing personal health signal receivers
MY165532A (en) 2007-02-01 2018-04-02 Proteus Digital Health Inc Ingestible event marker systems
WO2008101107A1 (en) 2007-02-14 2008-08-21 Proteus Biomedical, Inc. In-body power source having high surface area electrode
WO2008112577A1 (en) 2007-03-09 2008-09-18 Proteus Biomedical, Inc. In-body device having a multi-directional transmitter
US8540632B2 (en) 2007-05-24 2013-09-24 Proteus Digital Health, Inc. Low profile antenna for in body device
EP2192946A4 (en) 2007-09-25 2013-03-13 Proteus Digital Health Inc In-body device with virtual dipole signal amplification
WO2009111664A2 (en) 2008-03-05 2009-09-11 Proteus Biomedical, Inc. Multi-mode communication ingestible event markers and systems, and methods of using the same
SG10201702853UA (en) 2008-07-08 2017-06-29 Proteus Digital Health Inc Ingestible event marker data framework
AU2009305770A1 (en) * 2008-10-14 2010-04-22 Proteus Digital Health, Inc. Method and system for incorporating physiologic data in a gaming environment
CN102341031A (en) 2009-01-06 2012-02-01 普罗秋斯生物医学公司 Ingestion-related biofeedback and personalized medical therapy method and system
JP5631901B2 (en) * 2009-03-06 2014-11-26 コーニンクレッカ フィリップス エヌ ヴェ Processing an image of at least one organism
TWI517050B (en) 2009-11-04 2016-01-11 普羅托斯數位健康公司 System for supply chain management
TWI557672B (en) 2010-05-19 2016-11-11 波提亞斯數位康健公司 Computer system and computer-implemented method to track medication from manufacturer to a patient, apparatus and method for confirming delivery of medication to a patient, patient interface device
EP2734973A4 (en) 2011-07-21 2015-07-01 Proteus Digital Health Inc Mobile communication device, system, and method
US9235683B2 (en) 2011-11-09 2016-01-12 Proteus Digital Health, Inc. Apparatus, system, and method for managing adherence to a regimen
US8649765B1 (en) * 2012-08-08 2014-02-11 Telefonaktiebolaget L M Ericsson (Publ) Communication apparatus using biometrics
CN110930159A (en) * 2013-03-11 2020-03-27 Cfph 有限责任公司 Device for gaming
US9744444B2 (en) 2013-03-11 2017-08-29 Cfph, Llc User registration
US9269224B2 (en) 2013-03-11 2016-02-23 Cfph, Llc Devices for gaming
US9240098B2 (en) 2013-03-15 2016-01-19 Cfph, Llc Kiosk for gaming
US10084880B2 (en) 2013-11-04 2018-09-25 Proteus Digital Health, Inc. Social media networking based on physiologic information
WO2015112603A1 (en) 2014-01-21 2015-07-30 Proteus Digital Health, Inc. Masticable ingestible product and communication system therefor
TW201808226A (en) 2016-07-22 2018-03-16 美商普羅托斯數位健康公司 Electromagnetic sensing and detection of ingestible event markers
CN109144221A (en) * 2018-07-17 2019-01-04 Oppo广东移动通信有限公司 Information cuing method, storage medium and electronic equipment

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030177347A1 (en) * 1995-11-22 2003-09-18 Bruce Schneier Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US5977957A (en) * 1997-05-22 1999-11-02 Ericsson Inc. Adaptive sampling of touch screen input
US6783459B2 (en) * 1997-08-22 2004-08-31 Blake Cumbers Passive biometric customer identification and tracking system
US6460848B1 (en) * 1999-04-21 2002-10-08 Mindplay Llc Method and apparatus for monitoring casinos and gaming
JP2001216270A (en) * 2000-01-31 2001-08-10 Netmarks Inc Authentication station, authentication system and authentication method
US7510474B2 (en) * 2001-04-10 2009-03-31 Carter Sr Russell Location based mobile wagering system
US8087988B2 (en) * 2001-06-15 2012-01-03 Igt Personal gaming device and method of presenting a game
US8282475B2 (en) * 2001-06-15 2012-10-09 Igt Virtual leash for personal gaming device
US7918728B2 (en) * 2001-06-15 2011-04-05 Igt Personal gaming device and method of presenting a game
US7360689B2 (en) * 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
US8337296B2 (en) * 2001-09-28 2012-12-25 SHFL entertaiment, Inc. Method and apparatus for using upstream communication in a card shuffler
US8597116B2 (en) * 2002-03-12 2013-12-03 Igt Virtual player tracking and related services
JP2004038911A (en) * 2002-07-05 2004-02-05 Kenichi Nishimoto Entrance and exit management system in amusement facilities and other charged facilities
JP2004086441A (en) * 2002-08-26 2004-03-18 Ntt Data Corp Contents management system
US8123616B2 (en) * 2003-03-25 2012-02-28 Igt Methods and apparatus for limiting access to games using biometric data
JP2004334788A (en) * 2003-05-12 2004-11-25 Minoru Ikeda Personal identification system, authentication device, personal identification method, program, and recording medium
US8696358B2 (en) * 2003-08-27 2014-04-15 John Thomas Flanagan System and method for facilitating responsible behaviour
DE10351317B4 (en) * 2003-10-31 2009-08-27 Siemens Ag Access method for a picture retrieval system in a client / server-based data transmission network, and image retrieval system
US8616967B2 (en) * 2004-02-25 2013-12-31 Cfph, Llc System and method for convenience gaming
AU2006216723B2 (en) * 2005-02-21 2012-03-29 Cfph, Llc System and method for convenience gaming
WO2005098650A1 (en) * 2004-04-07 2005-10-20 Phillip Ryan Player controls
US7272728B2 (en) * 2004-06-14 2007-09-18 Iovation, Inc. Network security and fraud detection system and method
US7492925B2 (en) * 2004-06-25 2009-02-17 Intel Corporation Biometric identification data protection
JP2006039728A (en) * 2004-07-23 2006-02-09 Nec Corp Authentication system and method
US8190907B2 (en) * 2004-08-11 2012-05-29 Sony Computer Entertainment Inc. Process and apparatus for automatically identifying user of consumer electronics
US7413513B2 (en) * 2004-09-10 2008-08-19 Igt Apparatus and methods for wireless gaming communications
US20060236395A1 (en) * 2004-09-30 2006-10-19 David Barker System and method for conducting surveillance on a distributed network
JP4706317B2 (en) * 2005-04-19 2011-06-22 ソニー株式会社 Communication system, communication method, and communication terminal
US8360838B2 (en) * 2006-07-03 2013-01-29 Igt Detecting and preventing bots and cheating in online gaming

Also Published As

Publication number Publication date
GB2458049B (en) 2011-11-30
CA2669836C (en) 2016-07-12
CA2928614A1 (en) 2008-05-22
NZ577177A (en) 2012-11-30
JP6126044B2 (en) 2017-05-10
WO2008061138A2 (en) 2008-05-22
GB0910202D0 (en) 2009-07-29
JP6678126B2 (en) 2020-04-08
CA2669836A1 (en) 2008-05-22
NZ706217A (en) 2016-01-29
JP2015042246A (en) 2015-03-05
GB2458049A (en) 2009-09-09
AU2007319235A1 (en) 2008-05-22
WO2008061138A3 (en) 2008-07-24
EP2092462A2 (en) 2009-08-26
JP2010509031A (en) 2010-03-25
JP2017148537A (en) 2017-08-31
EP2092462A4 (en) 2012-03-07

Similar Documents

Publication Publication Date Title
US9811973B2 (en) Gaming device docking station for authorized game play
US20190374854A1 (en) Directional wireless communication
US9798391B2 (en) Control of wager-based game using gesture recognition
JP6392936B2 (en) Game on cash register
US20190295364A1 (en) Network based control of remote system for enabling, disabling, and controlling gaming
US20160247348A1 (en) Attract based on mobile device
AU2013222780B2 (en) Content activation via interaction-based authentication, systems and method
US20190325695A1 (en) Game account access device
US20190318574A1 (en) Game access device with privileges
US9569920B2 (en) Systems and methods for remote gaming
US10332155B2 (en) Systems and methods for determining an amount of time an object is worn
US9992207B2 (en) Scalable authentication process selection based upon sensor inputs
US9483766B2 (en) User authentication based on historical transaction data
US9744455B2 (en) Location and age verification for mobile gaming
US10565819B2 (en) Remote game play in a wireless gaming environment
US9734663B2 (en) Automated money laundering detection, notification, and reporting techniques implemented at casino gaming networks
US10515511B2 (en) Network based control of electronic devices for gaming
US8966602B2 (en) Identity verification and authentication
US20140235332A1 (en) Gaming social communication
JP2017006731A (en) Game with player actuated control structure
DE102013102448A1 (en) Access control method for electronic devices and access control electronic device
US20200098222A1 (en) Systems and methods for providing access to wireless gaming devices
US8795061B2 (en) Automated data collection system for casino table game environments
US7288025B1 (en) Apparatus and method for controlling and preventing compulsive gaming
US8668586B2 (en) Controlling and presenting online wagering games

Legal Events

Date Code Title Description
A621 Written request for application examination

Free format text: JAPANESE INTERMEDIATE CODE: A621

Effective date: 20101112

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20101112

A131 Notification of reasons for refusal

Free format text: JAPANESE INTERMEDIATE CODE: A131

Effective date: 20130226

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20130524

A602 Written permission of extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A602

Effective date: 20130531

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20130626

A602 Written permission of extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A602

Effective date: 20130703

A601 Written request for extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A601

Effective date: 20130726

A602 Written permission of extension of time

Free format text: JAPANESE INTERMEDIATE CODE: A602

Effective date: 20130802

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20130823

TRDD Decision of grant or rejection written
A01 Written decision to grant a patent or to grant a registration (utility model)

Free format text: JAPANESE INTERMEDIATE CODE: A01

Effective date: 20140415

A711 Notification of change in applicant

Free format text: JAPANESE INTERMEDIATE CODE: A711

Effective date: 20140421

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A821

Effective date: 20140421

A61 First payment of annual fees (during grant procedure)

Free format text: JAPANESE INTERMEDIATE CODE: A61

Effective date: 20140514

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20140709

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20140822

A521 Written amendment

Free format text: JAPANESE INTERMEDIATE CODE: A523

Effective date: 20141023

R150 Certificate of patent or registration of utility model

Ref document number: 5681844

Country of ref document: JP

Free format text: JAPANESE INTERMEDIATE CODE: R150

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250

R250 Receipt of annual fees

Free format text: JAPANESE INTERMEDIATE CODE: R250