MXPA06004011A - Universal key security method and system - Google Patents

Universal key security method and system

Info

Publication number
MXPA06004011A
MXPA06004011A MXPA/A/2006/004011A MXPA06004011A MXPA06004011A MX PA06004011 A MXPA06004011 A MX PA06004011A MX PA06004011 A MXPA06004011 A MX PA06004011A MX PA06004011 A MXPA06004011 A MX PA06004011A
Authority
MX
Mexico
Prior art keywords
key
lock
information
access
user
Prior art date
Application number
MXPA/A/2006/004011A
Other languages
Spanish (es)
Inventor
A Paulsen Craig
T Nguyen Binh
Original Assignee
Igt
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Igt filed Critical Igt
Publication of MXPA06004011A publication Critical patent/MXPA06004011A/en

Links

Abstract

A method and apparatus for providing universal key security in a mechanical key access environment is disclosed. An electromechanical lock is provided for securing an enviromnent, whereby access is permitted through the steps of receiving a key in the lock, reading a first source of indicia from the key, wherein said first source of indicia comprises information or data specific to said lock, reading a second source of indicia, wherein the second source of indicia comprises information specific to the user of the key, and authorizing a use of the key based on both indicia readings. One embodiment involves the use of a biometric device within the key or on or near the lock, with one example of such a device being a fingerprint sensor. Another embodiment involves the use of added information, such as the entry of an individual PIN number by the user of the key.

Description

METHOD AND UNIVERSAL KEY SAFETY SYSTEM TECHNICAL FIELD The present invention relates generally to a method and apparatus for providing security and more specifically to a method and apparatus for providing secured access to a device such as a gaming machine. BACKGROUND In response to advances in modern technology and the varying needs to protect property, combat crime and prevent unwanted or unauthorized intrusions, interlocking devices and increasingly sophisticated insurance are now common in many homes and businesses, such as banks. , department stores, jewelry stores, shopping centers, schools, casinos and other gambling establishments. These locks and interlocks can prevent unwanted access to a wide variety of areas and devices, especially when used in conjunction with additional security measures. While insured access may be desired with respect to persons or things physically entering a particular site, such as a building or room, secured access may also be convenient with respect to access to the contents of various devices such as, for example, boxes strong or safe, lockable lockers, display cabinets, file cabinets, electronic or computer equipment and a variety of different secured devices. In some cases, this secured device can have numerous secured regions with varying levels of security and the corresponding requirements for access to each region. An example of this secured multi-tiered device can be a gaming machine (ie a slot machine). Because casinos and other forms of gambling comprise a growing multi-billion dollar industry where large sums of money can quickly change hands during many types of fast games, casinos and other gaming establishments are a basic target to cheat and steal, and thus a prime candidate for more innovative and complex security systems and devices, which may include the newest locks or interlocking devices and locks. Because casinos and other gaming establishments in particular frequently use sophisticated security devices and techniques, casinos and gaming machines in general comprise an ideal illustrative example of the types of lock devices and in particular the methods and universal key security systems described here. Accordingly, the following illustrative examples and discussion are directed primarily to security devices and systems of casinos and gaming machines for reasons of convenience, although it should be kept in mind that these security systems and devices are easily applicable to other types of security systems. establishments, places and items. There are a variety of devices associated with a gaming machine that may require varying levels of security. Examples of devices for which security measures can be separated and independent include bill acceptors, coin hoppers or receivers, a game EEPROM or Central Processing Unit ("UPC", CPU = Central Processing Unit), and communications, among others. Many of these devices are built into the gaming machine, although it is possible that one or more exist outside the machine itself. Traditionally, security has been provided with respect to a main door of a gaming machine by an ordinary mechanical key and lock apparatus. Additional internal devices within a gaming machine such as those mentioned above, are also frequently secured with a key and lock apparatus identical or similar ordinary mechanics. Apparatus and methods for providing key access to an area or device, such as for gaming machines within a casino, are generally well known, and instances of these apparatuses and methods can be found for example in U.S. Patents. Numbers 4,677,834; 6,125,673 and 6,604,394, all of which are hereby incorporated by reference in their entirety and for all purposes. It has also recently become popular for many gaming establishments to add additional access features where key access to a gaming machine or gaming machine component is preferably accompanied by the use of an identification card such as an employee tracking card. This card is read upon access to the machine, such that employee information and other transaction details can be logged and / or tracked locally or remotely. The use of this card is primarily an information tool, however, such that access to a gaming machine and any of its internal compartments can be achieved provided that the person seeking access has the appropriate mechanical key (s). The use of this card is also disadvantageous since it introduces a additional stage in the process of secured access, which can be problematic and inconvenient. Regardless of whether a card is used, unauthorized access to a gaming machine may be possible for an experienced thief, in certain cases. This access can also be quite easy when a key or set of keys fall into the wrong hands. While theft of keys, the use of a lost key or unauthorized key duplication, are some examples of keys that fall into the wrong hands, other instances include occasions where casino staff have a certain level of security access they are dismissed or otherwise leave their position and do not return their keys, as is typically required. Although it is expensive, it has been heard of complete banks or floors of gaming machines that are retrofitted with new insurances where a particular set of keys is lost or stolen, or where a group of machines has been the target repeated by those who have Inadequate access to one or more keys. Accordingly, there is a need for improved methods and systems to provide secure access to an area or device by mechanical keys and locks and in particular for these methods and systems to eliminate the need for a card. tracking, while providing better ways to secure against unauthorized access to a gaming machine, despite the presence of a correct mechanical key for that machine. COMPENDIUM It is an advantage of the present invention to provide a method and apparatus for universal key security, which have a superior level of security that can be achieved with respect to an environment or secured object. According to one embodiment of the present invention, the method and apparatus provided involve the use of one or more locks and / or special design keys in a gaming machine, thereby unauthorized access to the gaming machine. it is prevented despite the presence of a correct key for that particular machine. This is achieved by designing the lock, so that one or more additional criteria in addition to a physical key are required in order to open the lock. These additional criteria may include the use of biometric information or a PIN of an authorized user or other factors beyond the form of a designed key. In a particular embodiment, a mechanical key is used in conjunction with an electromechanical lock where the lock requires both insertion as operation of the mechanical key and a separate authorization electric signal, in order to open. This separate electrical signal can be the result of a correct reading of a biometric parameter for an authorized user such as a fingerprint. In one instance, the fingerprint of an authorized user can be read and approved by a device built into the mechanical key itself, whereby a positive authorization signal can be sent to the electromechanical lock to allow access. Alternatively, the fingerprint can be simply detected by said device inside the key, with the data that is sent to an approval mechanism, either within the gaming machine itself or at some remote site, thereby Positive authorization signal may be retransmitted to the lock if the user of the key is an authorized individual. According to another embodiment of the present invention, the method and apparatus provided involve the use of one or more alternate personal identifiers in addition to a mechanical key. These personal identifiers may include a numeric keypad that requires the use of a personal identification number or PIN (Personal Identification Number), where the keypad may be on or near the device or item that is going to be accessed, or in the key itself. In this way, a mechanical key can be designed to contain one or more signals that reflect in the particular lock to open, such as the shape and profile of the particular key for correct manipulation of the mechanical pins or levers within the lock, as well as one or more signals reflecting the particular authorized user, such as a fingerprint. Other methods, features and advantages of the invention will be apparent to a person skilled in the art upon examination of the following Figures and detailed description. It is intended that all of these additional methods, features and advantages be included within this description, are within the scope of the invention and protected by the appended claims. BRIEF DESCRIPTION OF THE DRAWINGS The included drawings are for illustrative purposes and only serve to provide examples of structures and possible process steps for the method and security apparatus with universal key of the invention, described. These drawings in no way limit changes in form and detail that can be made to the invention by a person skilled in the art, without departing from the spirit and scope of the invention.
FIG. 1 illustrates in perspective view, an exemplary gaming machine according to one embodiment of the present invention. FIG. 2 illustrates in perspective view, the game machine of FIG. 1, which has an open main door according to one embodiment of the present invention. FIG. 3 illustrates in perspective side view, an exemplary electromechanical lock according to one embodiment of the present invention. FIG. 4 illustrates in side elevation view an exemplary mechanical key having a biometric device embedded in accordance with one embodiment of the present invention. FIG. 5 illustrates in view in magnified side elevation the electrical contacts of the mechanical key of FIG. 4 according to one embodiment of the present invention. FIG. 6 illustrates in perspective side view an alternate exemplary electromechanical lock, according to one embodiment of the present invention. FIG. 7 illustrates in side elevation view an exemplary alternating mechanical key having an embedded biometric device, in accordance with one embodiment of the present invention.
FIG. 8 illustrates a block diagram of a security reading system for a universal key "not controlled by a system" in accordance with an embodiment of the present invention. FIG. 9 illustrates a block diagram of an alternate "system-controlled" universal key safety reading system, according to another embodiment of the present invention. FIG. 10 illustrates a block diagram of a particular network infrastructure to provide a universal key security method and system according to one embodiment of the present invention. FIG. 11 illustrates an exemplary database containing associated data identifiers of various individuals authorized and canceled in accordance with one embodiment of the present invention. FIG. 12 illustrates a flow chart of a method, to provide a universal key security method and system according to an embodiment of the present invention. DETAILED DESCRIPTION An exemplary application of a method and system in accordance with the present invention is described in this section. This example is provided only to add context and help in understanding the invention. In this way it will be apparent to a person skilled in the art that the present invention can be practiced without some or all of these specific details. In other instances, well-known process steps have not been described in detail in order to avoid unnecessarily obscuring the present invention. Other applications are possible, such that the following example will not be considered as definitive or limiting either in scope or configuration. In the following detailed description, reference is made to the accompanying drawings which form a part of the description and in which specific embodiments of the present invention are shown by way of illustration. Although these embodiments are described in sufficient detail to enable a person skilled in the art to practice the invention, it is understood that these examples are not limiting; such that other modalities may be employed and changes may be made without departing from the spirit and scope of the invention. An advantage of the present invention is to provide a method and apparatus for universal key security such that a higher level of security can be achieved with respect to an environment or secured object. In one embodiment, one or more locks and / or locks are provided specially designed keys, with which unauthorized access to an area or device is prevented despite the presence of a correct key for that particular area or device. This is achieved by designing a lock such that one or more additional criteria are required in addition to a physical key, in order to open the lock. These additional criteria may include the use of biometric information or a PIN number for an authorized user or other factors beyond the form of a designed key. As discussed previously, while the universal key security method and system of the invention described herein, are primarily described with references and illustrations to game establishments and gaming machines, this system is easily adaptable for use in other types of businesses and environments, such that its use is not restricted exclusively to gaming machines or within a gaming establishment. Now continuing with the illustrative example of a universal key security method and system within a casino or other gambling establishment, it is common knowledge that these establishments are the primary targets for thieves, crooks and other diverse criminal actors both abroad and "internal". In particular, slot machines and Other gaming machines are a favored brand for many types of thefts and scams attempted for a variety of reasons. In this way, gaming machines are particularly relevant devices to illustrate the functions and capabilities of the method and system of the invention described herein. Turning now to FIG. 1, an exemplary gaming machine according to one embodiment of the present invention is illustrated in perspective view. The game machine 10 includes an upper case 11, and a main case 12, which generally surrounds the interior of the machine (not shown) and is visible to users. The main cabinet 12 includes a main door 20 on the front of the machine, which opens to provide access to the interior of the machine. Connected to the main door are typically one or more switches or power buttons by the player 21, one or more coin or credit acceptors, such as a coin acceptor 22 and a bill or ticket validator 23, a coin tray 24 and a lower screen 25. Through the main door 20 a monitor for primary video display 26 and one or more information panels 27 is visible. The primary video display monitor 26, will typically be a cathode ray tube, LCD high flat panel resolution, plasma / LED display or other conventional electronically controlled video monitor. The upper case 11, which is typically located or supported on the upper part of the main case 12, may contain a ticket printer 28, a keypad 29, one or more additional displays 30, a card reader 31, one or more speakers 32, one or more cameras 33 and a monitor for secondary video display 34, which may also be a cathode ray tube, high resolution flat panel LCD, plasma / LED display or other conventional electronically controlled video monitor. Other components and combinations are also possible, as is the ability of the decoder to contain one or more traditionally reserved for main cabinet locations and vice versa. The gaming machine 10 also includes one or more interlocking devices designed to restrict access to the gaming machine. These devices can include mechanical or electromechanical safeguards that require the use of one or more keys, preferably with at least one insurance that is accessed by a key somewhere on the outside of the machine. These insurances may include, for example, lock with guard, with a bit, with a barrel, with cylinder, with pin tumbler, with disk tumbler, with side bar and disc, tubular, vending machine and services, as well as any other lock style, as desired. Similarly, these keys may include, for example, bit, barrel, flat, tubular, cylinder and tubular style keys, as well as any other key style, as desired. As illustrated in Fig. 1, a main door lock comprises at least one key access on the exterior surface of the machine, such as for example the access for key 41, through which a key can be used for unlocking and opening the main door 20. In addition, one or more internal components of the machine can be accessed directly from the outside of the machine, with an example of this access being the lower door 50, comprising a lock with a access for key 51 on the outside surface of the machine. Although not illustrated, additional machine components can also be accessed directly from the outside of the machine in a similar way. Alternatively, one or more internal components of the machine may require more than one level of access, with one example being the need to release and open the main door 20 before releasing and having access to an internal component of the machine.
With reference to Fig. 2, the gaming machine of Fig. 1 having a main door open, illustrated in perspective view. In addition to the outer items described above, such as the upper case 11, the main case 12 and the primary video display monitor 26, the game machine 10 also comprises a variety of internal components. These components include, for example, a coin acceptor 35, main door lock mechanisms 42 and 43, the reverse side of the bottom door 50 and a number of other items not cited here for convenience. The lock mechanisms for the main door 42 and 43 comprise a mechanical lock system of receptacle groove and bar with standard hook, wherein the hooked bar 42 is driven up and down to lock or release the main door 20 to through a successful access operation for key 41. Although this mechanical lock system has been introduced for purposes of illustration, it will be understood that any other interlocking system or standard lock is interchangeable with that illustrated, since other of these systems The interlocking devices will also be sufficient to achieve the objectives and purposes of the universal key security methods of the invention described herein.
As seen in Fig. 2, a number of additional secured areas having locks with key accesses for the same are also included within the internal regions of the gaming machine 10. For example, the internal bill acceptor 60 it comprises a secured bill storage area having key access 61. Similarly, a region of secured electronic components 70, comprises a box secured to contain the machine's UPC and / or other critical electronic components, with the lock having access to key 71. Other internal components not shown, such as piggy bank, coin hopper or electronic communications board, for example can also be similarly secured. In this way, not only the main door 20 of the gaming machine must be opened, but additional measures or means of security must also be overcome to have access to one or more of these internal regions, with each internal region having preferably different access requirements to the main door and any other internal region respectively. Alternatively, as stated previously, one or more internal components may have direct access without need to open the main gate 20. This example involves accessing the internal bill acceptor 60, which can be achieved through the opening of the external lower door 50 by key access 51 and the internal bill acceptor 60 by key access 61, while the main door remains closed. Turning now to Fig. 3, an exemplary electromechanical lock according to one embodiment of the present invention is illustrated in side perspective view. The electromechanical lock 40 comprises a cylinder-style mechanical lock having a key access 41, one or more associated locking mechanisms 42, an external housing 44 and one or more electrical connections 45. As stated above, a favorable control and movement of the locking mechanism 42 is achieved as a result of a successful operation of the lock, preferably by access key 41 through the use of a key authorized by an authorized user. In a preferred embodiment, the lock 40 can not be successfully operated both without the use of an appropriate mechanical key and the inclusion of an electrical authorization signal in the lock. This electrical authorization signal can be sent to the lock of an external source via the connection 45 or it can be generated entirely from the interior of the lock, key access and / or the key itself. Alternately, any type of communications wireless such as "wireless fidelity" ("i-Fi") a wireless system BluetootlT ™ * using an IEEE802.1X network technology or other similar standard, can be used to transmit the authorization signal. In the event that both a mechanical key and an electrical authorization signal are present, one or more solenoids or other actuating devices within the electromechanical lock are activated in such a way that the locking mechanism 42 can be favorably manipulated. having both a correct key and an electrical authorization signal, can result in the key access capability 41 to be rotatable, whereby the rotation of the key within the key access will control the locking or latching mechanism. Alternatively, the lock 40 can be designed such that an appropriate mechanical key can always be rotated within the key access, except that the appropriate solenoid or other drive mechanism within the lock will not be activated in fact without an electrical signal of appropriate authorization present. Methods and devices for - using solenoids or other drive mechanisms within an electromechanical lock, are well known in the art and are specifically contemplated that this appropriate method or apparatus can be used in conjunction with the universal key security methods and systems of the invention described herein. An example of an advanced electromechanical lock and system usable in conjunction with gaming machines and in particular with the present invention, is described in the US patent application. commonly assigned and co-pending Series No. 09 / 824,621, by Mattice, et al. presented on April 2, 2001, and entitled "Method and Apparatus for Controlling Access to Gaming Machines," this application is hereby incorporated fully and for all purposes. Another exemplary use of a mechanical key and other information in conjunction with machines and game systems is described in U.S. Pat. of common cession No. 6,439,996, granted to LeMay, et al. on August 27, 2002, and with title "Key for a Gaming Machine and Method of Use Thereof", this patent here is also fully incorporated and for all purposes. As discussed herein, the use of the described electromechanical system and lock is preferably achieved within a gaming system or machine through the use of data or user-specific information such as biometric information. Another example of biometric information that is used in conjunction with machines and game systems is described in the patent application of the US. co-pending and commonly assigned Serial No. 09 / 491,899, by Wells et al., filed on January 27, 2000, and entitled "Gaming Terminal and System with Biometric Dentification", this application here is also incorporated in full and for all purposes Now with reference to Fig. 4, an exemplary mechanical key having a biometric device embedded in accordance with one embodiment of the present invention is illustrated in side elevational view. The mechanical key 100 comprises a cylinder key having a profile component 110 and a handle 120. The profile component 110 is preferably constructed from hard metal or plastic such that its shape and profile are substantially maintained over time. For purposes of discussion herein, it will be understood that this component is made of metal, in particular steel, although they are possible and a variety of other suitable materials are also contemplated. This metal region of the key includes one or more signals that can be "read" by a lock, to determine whether or not the key is correct for that lock. These signals may include a number of features such as arrangement of slots, a side profile, one or more edge profiles and / or the total physical form of the key.
The specific key form 111, which is essentially a combination of the slot arrangement and side profile for the profiled component 110, is commonly employed in many types of metal keys. This slot and side profile arrangement essentially allows the key to be physically received in certain types of locks, including the type for which the key is intended, while being blocked from being received in most other types of locks. The side profile may include a variety of grooves formed on the side of the profile component 111, as well as any number of large-scale turns and turns, often between 3 and 7. Each groove or turn of the groove and each profile may function as an index separated to distinguish the 100 key from many other keys. Accordingly, the side profile or specific shape 111 is a source of signals comprising specific information or data for a lock, whereby the key 100 can be read. The metal component or profile 110 also includes at least one and in sometimes two edge profiles 112, which are used to manipulate pins and / or levers inside the tumbler or lock lock or other internal locking structure. Each ascent, fall, tooth, valley and plane on an edge profile can function as an index separate for the key 100, such that the edge profile 112 is another signal source comprising specific information for a lock with which the key 100 can be read. If the key 100 is undoubtedly the correct key for a certain lock, then its specific shape 111 will allow it to fit in the lock while its edge profile 112 will push all the pins and / or levers needed inside the lock to their correct access positions, in such a way that the lock "reads" the key as correct and will be easily understood by those skilled in the art. The handle or handle of the key 120 can be constructed of the same material as the rest of the key, but is preferably made of plastic, resin or other electrically insulating or hardened material. According to one embodiment of the present invention, the handle 120 includes at least one biometric device 121 that is preferably embedded within the handle, and preferably a fingerprint sensor. This fingerprint sensor may be an MBF300 Fingerprint Sweepsensor ™ manufactured by Fujitsu, Ltd. of Tokyo, Japan, or either the EntrePad AES3400 or AES2500 sensors manufactured by AuthenTec, Inc. of Melbourne, Florida, for example, although they may also be employed effectively other brands and types of fingerprint sensors fingerprints This fingerprint sensor is preferably designed to detect one or more critical portions of a fingerprint, so that a decision can be made whether or not a user of the key is an authorized user. Techniques for electronic reading, analysis and determination of fingerprints are well known in the art and any of these techniques is contemplated as being useful in conjunction with the present invention. Accordingly, a fingerprint or other form of biometric data is a signal source comprising information or data specific to a particular use of the key 100. A decision can be made as to whether a detected fingerprint is undoubtedly authorized, in any number of ways, such as through an intelligent chip or other processor within the fingerprint detector itself or embedded elsewhere in the handle or paddle of the key, or by a remote processor to which the fingerprint sensor communicates information regarding the detected fingerprint. This decision and remote analysis may be convenient for a number of reasons. For example, the expense involved in inserting a microprocessor into a key handle can be considerable, and may tend to result in a more fragile key. In addition, the ability of a truant or thief to defrauding a system, can be improved when a signal design processed in a key, allows to intercept and / or imitate an appropriate authorization signal emanating from the key itself. On the contrary, a design that only has a fingerprint sensor on the key with the analysis and authorization that is performed remotely, is likely to have more safeguards against tampering and fraud. In any case, one or more electrical signals are preferably sent and / or received from the key 100 as a way of communicating data and / or authorization status with respect to the fingerprint detected on the handle of the key, and these electrical signals they can communicate through an electrical contact region 130 of the key, a Wi-Fi or other wireless system or other means of communication, as desired. In addition, any data and / or signal or authorization status communicated, preferably are encrypted through any number of easily available programs or encryption systems. Although the above illustrative example has been made with respect to the biometric example of a fingerprint, it will be readily understood that other forms of biometric information may be used instead of or in conjunction with a fingerprint. Examples of these additional biometric features include facial features, for which face recognition programs, tones and oral characteristics are available, for which speech recognition programs and retinal features are available, for which retinal scanning devices are available. Any of these or a variety of other biometric indicators may be used in conjunction with the universal key security method and system provided to result in an application with which some particular biometric feature of an authorized key user is stored and used to compare with a biometric characteristic read subsequently from a intended key user to verify if the intended key user is legitimate. Alternatively, a non-biometric information source can be used to provide specific signals to one or more authorized key users. This non-biometric information source may comprise, for example, a numerical, alphabetical and / or symbolic manual keypad adapted to accept a personal identification number ("PIN") or a similar access code. In one embodiment, this keypad may comprise an ordinary 10-key numerical keypad, where the PIN for an individual it can be any numeric code having a convenient series of numbers, preferably from 4 to 10 digits in length, although shorter and longer digit lengths are also contemplated. Preferably, an authorized PIN is known only to a particular user or a restricted group of users, such that the feeding of an authorized PIN appropriately reflects signals that are specific to one or more authorized key users. An operable keypad can be miniaturized and built into the mechanical key itself, or alternatively it can be installed in a location on or near the electromechanical latch to open. This location can be in the object to be accessed, such as a gaming machine, or in some other easily accessible nearby device, wall or other structure. Readers for other signals such as a fingerprint sensor, voice detection system or retinal scanner can also be located similarly on or near the electromechanical latch to be opened. Another item that can be used to provide specific signals for use in the universal key security methods and systems described herein is a radio frequency identification ("RFID") tag. An RFID tag generally comprises a small circuit chip integrated program to contain particular information, with which this information can be transmitted upon receipt of an appropriate radio frequency ("RF") signal. One or more antennas are typically connected to the RFID tag, to aid in the reception and transmission of RF signals, and the total size of a typical RFID tag may be in the order of a peppercorn. The use of RFID tags has been compared to the use of standard UPC scanners and barcodes, although most RFID tags can store an exponentially larger amount of information than a barcode, and do not require a direct line of sight and other physical factors that are satisfied to be activated and read by a label reading device that emits and receives RF signals. In the present invention, one or more RFID tags can be used in order to provide a source of identification signals with respect to the mechanical key that is used. These preferably identifying signals are in addition to one or more other signal sources as discussed above. In this modality that uses the RFID tag, an RFID tag can be programmed to have a defined code, with this tag that is preferably embedded within a tag. associated mechanical key 100. An RFID tag reader can be located inside or on a gaming machine of interest, such that the tag reader will emit an RF signal at least when a mechanical key is inserted in a lock of the gaming machine. If the RFID tag embedded within the mechanical key that is used emits an appropriate code when activated, and that code is read by the tag reader, then an authorization signal can be sent from the reader to the electromechanical lock. Preferably, the lock is designed so that it does not open unless and until it receives this authorization signal. This adaptation is useful in instances where, for example, an individual has attempted to create unauthorized copies of the mechanical key, these copies allegedly will not work properly without an embedded RFID tag containing a correctly programmed code. Similarly, an electromechanical lock using any biometric or non-biometric sources associated with specific user signals, preferably also will not be operable until an authorization signal is sent to the lock of any device or devices that measure or analyze said specific signals. user to confirm the presence of an authorized user. These devices Analyzes may be in the form of an intelligent chip or processor within the key itself, or they may be in the form of separate units within the lock or located remote from the lock. These separate units can take the form, for example, of numerical keypads with an inter-built microprocessor, an analytical unit within the electromechanical lock itself or a remote unit in communication with the lock. This remote unit can be part of a network, whereby a centralized general purpose server or specialized security server is used to regulate and monitor a variety of security items, including access to a number of gaming machines. Further discussion of this system, as well as means for implementing electrical communications between a mechanical key and a lock and / or corresponding system, are provided in greater detail at a glance. In this way, a much higher level of control over locking systems and their respective distributed keys can be achieved by a management entity, such as a casino operator. In case one or more keys are lost or stolen, these keys are not supposed to be used by anyone, despite the ability of the key to enter physically in the designated locks or locks. Because an unauthorized user will not supposedly be able to satisfy an interrogation associated with the lock if the user is an authorized user, simple possession of the key will typically be insufficient to grant access to the secured interest environment. Consequently, to casino establishments and other business owners, it will not be necessary to retroactively modify many machines with new locks and issue new keys if a problem has occurred with respect to one or more mechanical keys. The resulting time and money saved in the long term by not requiring these practices are considered to be substantial. Turning now to FIG. 5, the electrical contact region 130 of the mechanical key of FIG. 4 is illustrated in an amplified side elevation view. This region of the mechanical key, at least is an example of a way to provide electrical communication between the key and an electromechanical lock and / or safety net. As detailed above, the profiled component 110 of the key preferably comprises a metal or other hard plastic material suitable for forming typical shapes, side profiles and edge profiles in mechanical keys. The insert 131 of Preferably, it is connected to the remainder of the key within a recess or other designated area of the profile component 110 that abuts the handle of the key. Such connection can be achieved by a press fit design, glue, solder, epoxy or other convenient connection means. On the insert 131 are one or more electrical contacts 132-135 with this one or more contacts that are used to transmit power and / or one or more electrical signals to and from the key. Due to the need for multiple electrical terminals within a small space, the insert 131 preferably comprises an electrically insulating material, such as plastic, resin, quartz or glass, for example with at least one wire or internal electrical terminal (not shown) which runs from each electrical contact through the insert and to an electrical contact (not shown) on the edge of the handle or handle that confines the insert. Electrical contacts 132-135 are arranged in such a way that each will make contact with a designated electrical contact within the tumbler or sear or other internal component of the electromechanical lock when the key is fully inserted in the lock. Terminals or separate wires connected to each internal contact inside the lock then connect to one or more appropriate electronic distribution and / or analytical units, capable of processing electrical signals that are sent from the key. While exactly 4 electrical contacts 132-135 are illustrated in the present exemplary embodiment, it will be readily appreciated that a greater or lesser amount of contacts arranged in any of a variety of arrays and locations can also be used as desired. While USB-type electrical contacts are preferable, other types of standard or custom-made contacts are also contemplated. In this particular embodiment, contacts 132 and 133 can be designed for data transmission from (and possibly also to) the key, while contacts 134 and 135 are "energy" contacts so that electrical energy can be fed to the key to operate the fingerprint sensor and microprocessor, if applicable. Alternatively, the key can contain a battery, which transmits energy from the key to the lock through the energy contacts in the key. In this case, it may be possible that the lock has no power source different to that provided by the key. In one embodiment, the mechanical key is not energized until it receives power from electrical contacts 132 and 133, from a mechanical lock in the which is inserted. At that time, an embedded fingerprint sensor reads the fingerprint of the person holding the handle of the key outside the lock, and already processes and analyzes this information by itself, possibly through the use of a processor or chip intelligent, also located in the handle of the key or sends data related to the fingerprint through data contacts 134 and 135 to be processed by the lock or remotely. If the finger data is processed and analyzed locally within the key's own handle, then it is said that the data authentication is "not controlled by the system". In these cases, a control file that has data regarding the correct fingerprint is preferably stored in one or more memory units inside the handle of the key so that the local microprocessor or smart chip in the handle of the key the key can have easy access to this control file on demand, compare data regarding the current fingerprint on the sensor, confirm if there has been a correspondence, and send an authorization signal to the lock through data contacts 134 and 135. This authorization signal can be a simple on or off signal, in which case only one data contact to send an on or off signal is will require, or may be something encoded in pulses over one, two or more data contacts, so that it is readable by the lock, so attempts to tamper with or defraud the system are less likely to succeed. Alternatively, the lock can comprise its own energy source, while the mechanical key comprises an internal battery, so that the energy contacts are not required. As another alternative, data contacts can also be avoided in favor of a key and lock system that fully communicates via RF signals. This mode can use a relatively complex RFID tag, or an intelligent chip or microprocessor in conjunction with an RF transceiver. This mode can include any type of Wi-Fi, Bluetooth "11 or other wireless communications, as previously discussed.In the case of a mechanical key that has an internal battery and uses RF technology for all data communications, it can In fact, if the authentication analysis of a fingerprint offered is not achieved internally in the mechanical key itself, then it is said that the authentication of user data is "system controlled". these cases, a or more analysis or authentication steps may be carried out in or around the current electromechanical lock, or at some remote site such as in a server-based network, as described in more detail below. With reference to Figure 6, an exemplary electromechanical lock alternates according to one embodiment of the present invention, illustrated in side perspective view. The electromechanical lock 40A is substantially similar to the electromechanical lock 40 of Figure 3, except that the lock 40A comprises a tubular style mechanical lock having a tubular key access 41A in addition to one or more associated locking mechanisms 42, an external housing 44 and one or more electrical connections 45. As in the previous example, favorable control and movement of the interlocking mechanism 42 is achieved as a result of successful operation of the lock, preferably by the access key 41A through the use of a key authorized by an authorized user. Similarly, an electrical authorization signal may be sent to the lock from an external source via the connection 45 or may be generated entirely within the lock, key access and / or the key itself with alternate types of wireless communication such as systems BluetoothMR and other Wi-Fi also available for these communications. With reference corresponding to Figure 7, an exemplary alternating mechanical key having an embedded biometric device according to one embodiment of the present invention is illustrated in side elevational view. The mechanical key 150 comprises a tubular key having a profile component 160 and a handle 170. As in the previous example, the profile component 160 is preferably constructed of hard metal or plastic, such that its shape and profile are substantially maintained time. This profiled component 160, which is typically cylindrical and hollow, includes one or more physical features such as individual cuts or slots 161 and / or teeth or guides 162, of which the combination can be physically "read" by a lock, to determine if a particular tubular key is correct for that lock. Similarly, the handle of the key 170 can be constructed of the same material as the rest of the key, but is preferably made of plastic, resin or other electrically insulating and hardened material. According to one embodiment of the present invention, the handle 170 includes at least one biometric device 171 that is preferably embedded in the handle, and preferably a fingerprint sensor, examples and functionality of which are provided above. As in the previous example, a fingerprint or other form of biometric data in this manner is a signal source comprising information or data specific to a particular user of the key 150. Also similar to the previous example, one or more electrical signals of preference is sent and / or received from the key 150 as a way of communicating data and / or authorization status with respect to the fingerprint detected in the handle of the key. These electrical signals may be communicated through an electrical contact region 180 of the key, a Wi-Fi or other wireless system or other means of communication as desired, with any of these data and / or signal or authorization status communicated. which are preferably encrypted through any of a number of easily available programs or encryption systems. The electrical contact region 180 can be substantially similar to the electrical contact region 130 of the previous example, or it can be modified as desired to adjust to the particular physical parameters of the various tubular key systems and locks that are employed. Alternate locations for this region they may be, for example, on or near the lip or the front end of the key, or within the interior profile component in the recessed region 160, if applicable. Although the above discussion and illustrations have been made with respect to cylinder and tubular keys and locks, it will be readily understood that other types of keys and locks can also be easily adapted for use with the universal key safety system and method of the invention herein. described, so that additional examples may be cumulative and are not necessary. Turning now to FIGS. 8-10, several block diagrams of particular embodiments incorporating the universal key security method and system according to the present invention are illustrated. As seen in Figure 8, a universal key security reading system without system control 200 comprises at least three basic components, an I / O input / output device ("l / 0" = Input / Ouput) 201 , a power source 202 and at least one memory unit 203. In this basic system, an I / O device (I / O) may comprise for example a fingerprint reader, a voice recognition system, a retinal scanner, a numerical keypad or any other convenient device for reading associated data with one or more particular users. This I / O (201) device will typically require power, which is provided by the power source 202, which may comprise for example a battery embedded in the handle of the key, an external battery or a C / A power source, supplied by one or more energy contacts, or in some cases, a sufficient level of RF energy emitted from a reading device and remote RF energized. The I / O device (1/0) 201 will also typically require access to one or more control files stored in at least one memory unit 203, for comparison with a user's specific power, each time an access is attempted. This memory unit may comprise non-volatile storage memory that can be erased and re-programmed (Flash), RAM, or any of a wide variety of memory types, but preferably comprises some form of ROM or some other memory medium. relatively stable As previously established, this uncontrolled modality with system operates to read signals from a user of the key and analyzes and authenticates this data completely within the key itself, in such a way that an authentication signal is sent from the key itself to the lock before confirmation of information related to the appropriate user. As seen in Figure 9, a universal key security reading system controlled by alternate system 210, not only comprises an I / O (I / O) device 211, a power source 212 and at least one memory unit 213, but also at least three additional basic components equally. Central to this system-controlled embodiment is the presence of a UPC (CPU) 214, an independently controlled sensor or other device within an electromechanical lock 215 and a network 216. As detailed in the preceding system, the I / O device ( I / O) 211 may comprise for example a fingerprint reader, a voice recognition system, a retinal scanner, a numerical keypad or any other convenient device for reading data associated with one or more particular users. While this I / O device (1/0) 211 may require power, that energy may be supplied from a battery (not shown) located within the I / O device (I / O) itself or alternatively by a power source external 212 either directly or through another component such as the UPC (CPU) 214. At least one memory unit 213 is also present for comparison with the user-specific power each time an access is attempted, although this unit or memory units will typically be accessed by the UPC (CPU) 214 or alternatively by the network 216 in this system-controlled mode. As in the previous case, the memory unit 213 may comprise non-volatile storage memory that can be erased and re-programmed (Flash), RAM or any of the wide variety of memory types but preferably comprises some form of ROM or another relatively stable memory device. In the system-controlled mode, data is sent from an I / O device (I / O) 211, which for example can be a fingerprint sensor or a numerical keypad, to the UPC (CPU) 214 and / or network 216 for evaluation and / or registration. The UPC (CPU) 214, which may be within the electromechanical lock itself or elsewhere within the gaming machine, or alternatively in a remote location receives data from the I / O device (1/0) 211 and progress to compare this data offered from a current user to one or more files stored within one or more memory units 213. This stored file may for example comprise a plurality of signals for a particular fingerprint of an authorized user. If not a correspondence can be confirmed, then no authorization signal is sent to the electromechanical lock, such that the lock does not open. If a match is confirmed, then the UPC (CPU) 214 can be set to autonomously send an authorization signal to allow the lock to open or it may be required to confirm additional information from the network 216 before doing so. This additional information may include data about whether a particular user is still currently authorized within the network, or whether a given user has restricted access limited to certain machines or certain dates or times. This additional network information can be requested by the UPC (CPU) either before, during or after it receives and analyzes data from the I / O device.
(I / O), although the UPC (CPU) will preferably not send an authorization signal to the lock until it obtains additional positive information from the network that allows it to proceed. In addition to potentially assisting with the determination of the system whether or not to allow the opening of the lock, the network 216 is also preferably used for the tasks of recording and organizing specific objective details with respect to one or more users, machines and / or transactions. .
Considering that a correct correspondence is made of the current user data with those stored within one or more files, and that approval of the network has been granted if necessary, then the UPC (CPU) 214 sends an authorization signal to the independent control sensor or other device within an electromechanical lock 215, such that the lock can be opened , preferably provided that the mechanical key remains inside the lock to physically turn the lock when opening. In this way the electrically controlled stop in all the locks must be satisfied through separate mechanisms either inside the secured environment or remotely, making it significantly more difficult to defraud or otherwise cheat the system, simply because you have The mechanical key that adapts to physically fit inside and operate the lock. Figure 10 illustrates a block diagram of a particular network infrastructure, to provide a system method for universal key security according to one embodiment of the present invention. The network 300, which may be substantially similar to the network 216 discussed above, comprises a number of components for effectively administering the methods and universal key security systems of the invention described herein, in a number of machines or even in every establishment or establishment network. One or more gaming machines 10 in a plurality of locations, either in banks or stand-alone, or connected to the network by desired operable connection means, such as by wiring to a common bus 301 that can be connected to at least one general purpose server 310. This general purpose server 310 may be one that is already present within an establishment for one or more other purposes instead of or in addition to security. Other functions for this general-purpose network server include, for example, accounting and payroll functions, Internet and e-mail capabilities, switch communications, reservations and other hotel and restaurant operations, and other, generally diverse, establishment operations. In some cases, security features can also be associated with or performed by this general-purpose server. For example, this server may be linked to one or more gaming machines within an establishment and in some cases form a network that includes all or substantially all of the machines within the establishment. The Communications can then be exchanged from each machine with one or more security-related programs on the general-purpose server. For example, the server can be programmed to poll each machine for affirmative security authorization on a regular basis, to determine if everything is fine within that machine. In addition, the server can be programmed to monitor each potential access within any of the gaming machines under its domain, such that any successful or unsuccessful attempt to access a gaming machine under universal key security devices described here, can be monitored and / or registered. In a particularly preferred embodiment, however, the network 300 also comprises at least one additional security or special purpose server 320, which is used for various security-related functions within the security network. This additional security server is convenient for a variety of reasons, such as to reduce the overhead on the server for general purposes or to isolate or separate some or all of the general server's security information and thus limit the modes of possible access to that security information. In addition, the security server 320 can be used as the exclusive control entity for any network needs with respect to any universal key security methods and systems that are used by an establishment. Alternatively, the network 300 may be isolated from any other network within the establishment, such that a general purpose server 310 is totally impractical, such that a special purpose server 320 dedicated solely to universal key security measures is implemented. . Under any form of an isolated or shared network, the universal key security server 120 also preferably includes connections to a network 330 of one or more peripheral devices, as well as a database or other convenient storage means 340. Peripheral devices may include, but are not limited to, one or more video monitors 331, one or more user terminals 332, one or more printers 333, and one or more other digital power devices 334, such as a card reader or other security identifier, as desired. The database 340 is preferably adapted to store many or all files related to user-specific information, such that these files can be accessed directly by a requesting machine UPC (CPU) or for purposes of backup More information regarding the status of and any relevant restrictions regarding each authorized user, past or present, they can also be kept within this database. In addition, this database can also be adapted to store transaction-related data for each time an access to a gaming machine is even attempted. Parameters for storing these transaction-related items can vary widely and are left to the discretion of system administrators. The database 340 is also preferably directly accessed by one or more of the peripheral devices in the network 330 connected to the universal key security server 320, in such a way that specific data for certain users or transactions that are recorded in the database of data can easily be obtained and reviewed on one or more of the peripheral devices. In addition, it is contemplated that one or more peripheral devices in the network 330 may also be connected directly to the common bus 301, as illustrated, although this arrangement may not be convenient depending on the level of security clearance desired within the network 300. Now with reference to Figure 11, an exemplary database containing associated data identifiers of various authorized and canceled individuals according to one embodiment of the present invention, illustrated. As illustrated similarly in Figure 10, the database 340 is accessible to one or more servers, preferably at least one universal key security server 320, and has a connection to a network 330 of one or more peripheral devices. Database 340 preferably contains information related to a plurality of transactions for prior machine access, as well as information related to a plurality of authorized users past and present within the system. Furthermore, the database 340 can be constructed in such a way that it also contains files with respect to other individuals, such as biometric data files of suspected or known thieves or fraudsters, in such a way that a possibly fraudulent attempt to gain access to a computer Games can be more easily attributed to an unauthorized individual known than to anyone in particular. Contents within the database 340 are numerous files with respect to many users of the different past and present systems, and preferably all of these users are contained within the database 340 or a collection of associated databases. These files can be classified according to currently authorized user files 341 and previous user files but not more authorized 342. Content within each file is a user profile that has numerous information items, restriction requirements, if any, level or levels of access, and preferably at least one authentication file that contains information for that user, which will be used to authenticate the user while using a mechanical key. As shown for user file 341A, this information may include items such as for example a name and employee number, a start date, a specific number for the key or mechanical keys issued to that employee, restriction information regarding that employee and one or more authentication types and files, among others. Restriction information may include the casinos, floors or locations to which that employee is authorized, machine types, machine names, machine numbers, types of security, access levels within each machine, temporary restrictions with respect to time and dates that the machines are accessible by that employee and other similar information. This information can not only be stored within a user file within the database but can also be retrieved and used by universal key server 320 and / or a UPC within a gaming machine in which access is attempted, in order to determine if a user of another authenticated form is authorized for access in the particular location, machine, level within the machine, date and time that access is attempted . As previously discussed, each secure access environment, such as a gaming machine, can have separate levels of security within the machine, with a separate authorization status that is required for each level by each system user. For example, a particular gaming machine may have different access levels for: I) its main gate, II) its primary UPC, III) its bill acceptor and IV) its piggy bank. Although additional internal items may require access such that additional levels may be added, only the four levels cited will be discussed here for purposes of brevity and clarity. Whether a user has access to one of these four levels of preference is independent of whether that same user has access to another, unless of course access to the front door or a similar, wider access level is required for a otherwise authorized access to an internal component that requires an open main door or access at a broader level.
In this example, the access levels for a particular user can be designated as I-II-III-IV, with a "1" or "Y" for yes and a "0" or "N" for no, depending on whether or not not a user is authorized for each given level. For example, Sam the mechanic is only authorized to open the main door of the gaming machine and nothing else. Therefore, user file 341 for Sam will contain a designation of "Access Levels" of 1-0-0-0. Similarly, to Joe, the technician is allowed access to the main gate and to the UPC region of the gaming machine, so that the access level designation for Joe will be read as 1-1-0-0. Continuing further, Bill, the coin collector has an access level designation of 1-0-1-1, while the designation for Ted, the administrator is 1-1-1-1. Of course, more levels can be added and designated for each user, and the access level designations for each user can be altered over time, or adjusted to 0-0-0-0 in some cases. In the event that an authorized user is demoted, terminated or otherwise loses some or all of the access privileges previously granted to that user, then this user file may be updated appropriately by an administrator. system or alternatively reclassified as a file for a user who is no longer authorized in any capacity. In these cases, biometric files and user information can be maintained within a database, in order to use this information in the future in the event that unauthorized access can be attempted at some point. Furthermore, it may be critical for certain systems to rely on this power supply of the security server in the network, instead of isolated and localized files within individual machines or keys, since status updates as to potential "dis-authorizations" in these Localized files will tend to be non-existent or more sporadic than updates on the main and server networks. While an example of a database for storing these valid user files and forbidden or revoked user, may be a property database designed for the specific association and use with the key security method and system of the invention herein described, other databases can be used equally for this purpose. These other databases may include for example other property databases associated with other functions within the casino or establishment, private databases of other entities that may or may not require subscriptions for access and use, and databases shared with various government or regulatory agencies. In accordance with one embodiment of the present invention, a provided apparatus or system, and preferably a network or similar structure, is adapted to record data or information related to a intended access of a gaming machine or device as the transaction occurs. This live data capture can be used immediately in the event that an alarm is triggered and can also be stored indefinitely in one or more databases, such as the database described above. In the event that one or more alarms are to be triggered in conjunction with the use of the present universal key security system, it is preferable that this system be at least interwoven with one or more elements of a larger security system and network within of an establishment or casino, in such a way that any awkward rummage of the keys, a bad oppression of the buttons of the keypad, an inadequate alignment or insufficient exposure of a finger or thumb with respect to a finger sensor or any other common human error, do not automatically trigger an alarm and / or armed response.
Use interspersed with an existing security system may include the use of, for example, alarms and one or more security cameras and / or microphones with these cameras and microphones that are controlled in a possible way from an area or control room, whereby a first alarm simply signals an operator or computer response automated approach to at least one camera in the affected machine to monitor and / or record the potentially problematic transaction. Live data capture can be used for other purposes equally, many of which involve storing this information for use at a later time such as, for example, in the case of a temporary power outage or other interruption of the machine, for provide specific evidence that corroborates the casino operator's version as to how a certain transaction was carried out, or follow up on a pattern of use or misuse with respect to one or more machines or users. Turning now to Figure 12, a flow diagram is outlined which outlines a method for providing a universal key security method and system according to an embodiment of the present invention. After a start step 370, a first step 372 of receiving a key in a lock initiates the process, wherein a subsequent step 374 of providing power to or otherwise allowing the mechanical key to be carried out. In the case that biometric or other data are provided in a different site to the mechanical key itself, then this other specific user data supply is also "energized" or similarly initiated in step 374. In a next step 376, it is carried out the live data capture of authentication information and possibly other information related to a particular access transaction. The live data that can be captured in addition to any stored user-specific files and present live authentication information may include for example the specific machine and its location, the date and time of the access transaction, the duration of access, the different levels that are accessed within the machine and the presence of more than one authorized individual on or near the machine, among others. This live data capture is preferably achieved through data transmission, with the current transmission that involves data encryption in accordance with one or more encryption programs or systems. Once a key user has been collected from a sufficient amount of live data, with data that is finger data, other biometric data, or the provision of a PIN, for example, then the method proceeds to step 378, where the captured live data can be analyzed. This is achieved by a UPC or other similar processor either within the key, the lock, the gaming machine or remotely in a network. Once the captured or collected live data is analyzed, it is compared in step 380 with data in a control file that is stored in one or more memory locations, as described in more detail above. After this comparison is made, a query is made as to whether there is a correspondence between the data captured live and the data on file at a decision stage 382. In the event that there is no doubt correspondence, the process continues to a stage 384 , where the lock is opened and access is allowed to the machine or internal machine component. During or after this access, results and data are then sent to a universal key security server in the network, at a subsequent stage 386 whereby the server can decide to discard some or all of the results and data or store some or all of them in an associated database in a subsequent result recording stage 388, whereby the method reaches a final stage 394. Again, any transmission or communication of data, results or other information, preferably is achieved through the use of one or more encryption programs or systems. In the event that there is no correspondence in response to the query made in decision stage 382, however, then the process continues to step 390, where physical access is denied entirely to the gaming machine or to the component internal interest there content. In a next step 392, an alarm sequence is initiated, whereby a complete alarm and response can be sounded or a warning is given to other security personnel or systems, which requires more attention in the game machine or device involved. . After the alarm sequence stage 392, the process resumes the main process branch in the 386 information sending step, where again the network server may decide to discard some or all of the results and data or store some or all of these in an associated database in a subsequent result recording stage 388, whereby the method reaches a final stage 394. As in the previous process steps, any transmission or communication of data, results commands or other information , preferably it is achieved through the use of one or more encryption programs or systems. Although the above description has been described in detail by way of illustration and example for purposes of clarity and understanding, it will be recognized that the invention described above can be incorporated into numerous other variations and specific embents without departing from the spirit or essential characteristics of the invention. Certain changes and mications may be practiced and it is understood that the invention shall not be limited to the foregoing details but rather shall be defined by the scope of the appended claims.

Claims (47)

  1. CLAIMS 1. A method for providing security in a gaming machine, the method is characterized in that it comprises: receiving a mechanical key in a lock inside the gaming machine; reading a first source of signals from the key, wherein the first signal source comprises specific information or data for the lock; reading a second source of signals, wherein the second source of signals comprises specific information of one or more users of the key; authorize the use of the key, based on the readings of the first and second signal sources; and allow access to the accessible environment of the key. The method according to claim 1, characterized in that the signal source comprises one or more physical characteristics of the key. The method according to claim 2, characterized in that the one or more physical characteristics of the key comprise at least one item selected from the group comprising a physical form of the key, a slot arrangement of the key, and at least a portion of an edge profile of the key. 4. The method according to any of claims 1-3, characterized in that in addition includes the stage of: capturing live data that reflect one or more parameters associated with any other stage. 5. The method according to any of claims 1-4, characterized in that the information specific to one or more users of the key comprises biometric information regarding the one or more users. 6. The method according to claim 5, characterized in that the biometric information comprises information related to fingerprint. The method according to claim 5, characterized in that the biometric information comprises at least one item selected from a group consisting of facial recognition, speech recognition and retinal scanning. 8. The method according to any of claims 1-7, characterized in that the information specific to one or more users of the key is contained within one or more authorized user IDs. The method according to claim 8, characterized in that it also includes the step of revoking a previously authorized user ID. 10. The method according to any of claims 1-9, characterized in that it also includes the step of: restricting access to the accessible environment to the key, selectively based on one or more additional factors. 11. A method for providing security in a key-accessible environment, the method is characterized in that it comprises: receiving a key in a lock, reading a first signal source from the key, wherein the first signal source comprises specific information or data to the lock; reading a second source of signals, wherein the second source of signals comprises specific information to one or more users of the key; authorize a use of the key based on the readings of the first and second signal sources; and allow access to the accessible environment with the key. The method according to claim 11, characterized in that the first signal source comprises one or more physical characteristics of the key. The method according to claim 12, characterized in that one or more physical characteristics of the key comprises at least one item selected from a group comprising a form physical key, a key slot arrangement, and at least a portion of an edge profile of the key. The method according to any of claims 11-13, characterized in that it further includes the step of: capturing live data, which reflect one or more parameters associated with any other stage. The method according to any of claims 11-14, characterized in that the specific information of one or more users of the key comprises biometric information with respect to the one or more users. 16. The method according to claim 15, characterized in that the biometric information comprises information related to fingerprint. 17. The method according to claim 15, characterized in that the biometric information comprises at least one item selected from a group consisting of facial recognition, speech recognition and retinal scanning. The method according to any of claims 11-17, characterized in that the information specific to one or more users of the key is contained within one or more authorized user IDs. 19. The method according to claim 18, characterized in that it also includes the step of: revoking a previously authorized user ID. The method according to any of claims 11-19, characterized in that the information specific to one or more users of the key involves the use of an active PIN authentication. 21. The method according to any of claims 11-20, characterized in that it also includes the step of: restricting access to the accessible environment with the key, based on one or more additional factors. 22. The method according to claim 21, characterized in that an additional factor includes the use of specified time periods. 23. The method according to any of claims 11-22, characterized in that the environment accessible with the key, comprises a gaming machine. 24. An apparatus, characterized in that it comprises: an accessible environment with a key; and an electromechanical lock that ensures the accessible environment with a key, where the electromechanical lock adapts to deny access to the accessible environment with a key, unless a mechanical key having a first correct signal source is inserted in the lock and an authorization signal is provided based on the verification of a second correct signal source with respect to the user of the mechanical key. 25. The apparatus according to claim 24, characterized in that the first signal source comprises at least one item selected from the group consisting of a physical form of the key, a slot arrangement of the key, and at least a portion of the key. an edge profile of the key. 26. The apparatus according to claim 24 or claim 25, characterized in that the second source of signals comprises biometric information regarding the user of the mechanical key. 27. The apparatus according to claim 26, characterized in that the biometric information comprises information related to fingerprint. 28. The apparatus according to any of claims 24-27, characterized in that the second source of signals involves the use of an active PIN authentication. 29. An apparatus, characterized in that it comprises: interlocking means for securing an accessible environment with a key, wherein the interlocking means are adapted to deny access to the accessible environment with a key, unless two separate sources of signals are read and confirmed by the means of interlocking. 30. The apparatus according to claim 29, further characterized in that it includes an opening means for releasing the locking means, the opening means has a first source of signals comprising information or data specific to the interlocking means and a second one. signal source comprising information specific to one or more users of the opening means. 31. A gaming machine, characterized in that it comprises: at least one access region with a key; and an electromechanical lock that secures the key accessible region at least, where the electromechanical lock is adapted to deny access to the keyed access region, unless a mechanical key having a first source of power is inserted into the lock. correct signals and an authorization signal is provided based on the verification of a second correct signal source with respect to the user of the mechanical key. 32. The gaming machine according to claim 31, characterized in that the first signal source comprises at least one item selected from a group comprising a physical form of the key, a slot arrangement of the key and at least a portion of a key edge profile. 33. The gaming machine according to claim 31 or claim 32, characterized in that the second signal source comprises biometric information with respect to the user of the mechanical key. 34. The gaming machine according to claim 33, characterized in that the biometric information comprises information related to fingerprint. 35. The compliance gaming machine of any of claims 31-34, characterized in that the second source of signals involves the use of active PIN authentication. 36. A method for providing security in a gaming machine, the method is characterized in that it comprises: receiving a key in a lock; read a user-based signal source, where the user-based signal source comprises information specific for one or more users of the key; authorize a user of the key based on an affirmative reading of the source of signals based on the user; and allow access to the game machine or a component thereof, in the event that the key is a correct key for the lock. 37. The method according to claim 36, characterized in that it also includes the step of: capturing live data that reflect one or more parameters associated with any other stage. 38. The method according to claim 36 or 37, characterized in that the specific information for one or more users of the key comprises specific biometric information for one or more users. 39. The method according to claim 38, characterized in that the biometric information comprises information related to fingerprint. 40. The method according to claim 38, characterized in that the biometric information comprises at least one type of information selected from the group consisting of fingerprint, facial recognition, speech recognition and retinal scanning. 41. A universal key security system, characterized in that it comprises: at least one computer server; and one or more gaming machines in communication with at least one computer server, wherein at least one or more gaming machines comprises an electromechanical lock that secures at least one region of the gaming machine, wherein the electromechanical lock is adapted to deny access to the region at least of the gaming machine, unless a key having a first correct signal source is inserted into the lock and an authorization signal is provided based at least in part on the verification of a second correct source of signals with respect to the user of the mechanical key. 42. The universal key security system according to claim 41, characterized in that the specific information of one or more users of the key comprises biometric information with respect to the one or more users. 43. The universal key security system according to claim 41 or claim 42, characterized in that it also includes a database in communication with the computer server at least. 44. The universal key security system according to claim 43, characterized in that the database comprises at least one file containing information related to an authorized user of the universal key security system. 45. The universal key security system according to any of claims 41-44, characterized in that at least one computer server is adapted to capture live data associated with an attempt to access at least the region of the machine of games secured by the electromechanical lock. 46. The universal key security system according to any of claims 41-45, characterized in that the authorization signal is provided at least in part through the use of the computer server at least. 47. The universal key security system according to any of claims 41-46, characterized in that the verification of a second correct signal source relative to the user of the mechanical key, is achieved at least in part through the use of the computer server at least.
MXPA/A/2006/004011A 2003-10-09 2006-04-10 Universal key security method and system MXPA06004011A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10605574 2003-10-09

Publications (1)

Publication Number Publication Date
MXPA06004011A true MXPA06004011A (en) 2006-10-17

Family

ID=

Similar Documents

Publication Publication Date Title
US20050077995A1 (en) Universal key security method and system
US10949849B2 (en) Transmitter for transmitting a secure access signal
US7495543B2 (en) Vending machines with field-programmable electronic locks
EP2172608B1 (en) Method for identifying keys for controlling locks
US20080207335A1 (en) Automated Locking System
US20040021552A1 (en) Method, device, and system for door lock
US8477009B2 (en) Asset security system and associated methods for selectively granting access
US20060088192A1 (en) Identification system
JP7124595B2 (en) Electronic lock unit unlocking system for electrical equipment
KR101104867B1 (en) System for operating safe deposit boxes, and method for operating the same
JP5013690B2 (en) Key control system and key control method
JP2013209821A (en) Electric lock system
MXPA06004011A (en) Universal key security method and system
JP5004458B2 (en) Unlocking control system and unlocking control method for lending processor installed side by side in gaming machine
US20080207314A1 (en) Automated Locking Method
JP2008248651A (en) Locker equipment
US20040190756A1 (en) Biometric enabled mailbox system
JP2004332303A (en) Remote-control unlocking device
JP2007205132A (en) Card lock system
AU2014240323B2 (en) A transmitter for transmitting a secure access signal
JPH0579230A (en) Unlocking method for door
JPH02284291A (en) Lock device for cash transaction device
JP2008043543A (en) Locking/unlocking management system for game machine, and locking/unlocking management program for game machine