WO2004018806A1 - 施錠システム、遊技機及び装置管理システム - Google Patents
施錠システム、遊技機及び装置管理システム Download PDFInfo
- Publication number
- WO2004018806A1 WO2004018806A1 PCT/JP2003/010678 JP0310678W WO2004018806A1 WO 2004018806 A1 WO2004018806 A1 WO 2004018806A1 JP 0310678 W JP0310678 W JP 0310678W WO 2004018806 A1 WO2004018806 A1 WO 2004018806A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tag
- key
- monitoring
- opening
- locking
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3202—Hardware aspects of a gaming system, e.g. components, construction, architecture thereof
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/32—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
- G07F17/3202—Hardware aspects of a gaming system, e.g. components, construction, architecture thereof
- G07F17/3216—Construction aspects of a gaming system, e.g. housing, seats, ergonomic aspects
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
- G07C2009/00769—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
- G07C2009/00777—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means by induction
Definitions
- the present invention relates to a locking system, a gaming machine, and a device management system for monitoring the state of a game machine, for example, a pachinko machine, and locking and unlocking the device based on the monitoring result. is there .
- Background art a pachinko machine
- pachinko machines various precautionary measures have been taken for pachinko machines, in which illegal acts of illegally acquiring game balls have been continued.
- an abnormality occurs in a pachinko machine
- the player notifies a staff at the game hall by pressing a call button or the like.
- the staff member who received the call unlocks the pachinko machine using the key and takes action against the abnormality.
- the pachinko machine is composed of a wooden frame fixed to the gaming machine installation island, a main body frame holding the gaming board, and a glass frame holding a glass plate for protecting the gaming board surface. Opens and closes the wooden frame, and the glass frame opens and closes the main frame.
- Such a well-known pachinko machine uses a single key to open and close the main frame and the glass frame.
- a player called a goto master illegally obtains the key, uses it to open the glass frame when the clerk is not looking at it, and places game balls in various winning holes on the board of the game board. By doing so, a large number of game balls may be obtained, or the main body frame may be opened and exchanged for illegal ROM may be performed.
- an electric lock is installed on a pachinko machine, or an unauthorized ROM is opened when the main unit frame is opened.
- an electric lock is installed on a pachinko machine, or an unauthorized ROM is opened when the main unit frame is opened.
- it is necessary to fix it with a wire, etc. (Also, it is visually monitored by a monitoring monitor in the amusement arcade. When the key is removed from the key storage box, It also manages when items are returned and returned.
- surveillance by a surveillance monitor is something that humans judge by checking images for fraudulent activity, and there is a high possibility of oversight.
- the possibility of oversight is even stronger. It takes a long time to check the recorded monitor image.
- the present invention has been made to solve the above-mentioned problems, and a locking system for monitoring the state of a device such as opening and closing in real time, and performing locking and unlocking based on the monitoring result.
- the purpose is to provide a gaming machine and equipment management system.
- the locking system includes a locking IC tag, an IC tag monitoring device that communicates with the locking Ic tag, and a device based on the monitoring result of the IC tag monitoring device.
- a locking device that locks and unlocks the Ic tag, wherein the locking Ic tag stores identification data for distinguishing the Ic tag from other Ic tags.
- the tag monitoring device includes: a first transmitting unit that transmits a paging wave that calls the locking Ic tag; a first receiving unit that receives a reflected wave returned from the locking ic tag; A transmitting means and an application antenna connected to the first receiving means, the first transmitting means; Key determining means for determining normal if the first receiving means receives a reflected wave including the same identification data as the previously registered data within a predetermined time after the step transmits the ringing wave; and A first output unit that outputs a key determination result by the key determination means to the outside, the locking device includes: a key including the locking IC tag; and a key antenna; And a lock into which is inserted.
- the first transmitting means provided in the IC tag monitoring device calls the locking IC tag incorporated in the key via the key antenna provided in the lock into which the key is inserted. Transmits waves and calls IC tags. Then, the locking IC tag returns a reflected wave including the stored identification data such as the ID code, and the first receiving means provided in the IC tag monitoring device receives the reflected wave via the key antenna. I believe. Then, if the first transmitting means receives a reflected wave including the same identification data as the previously registered data within a predetermined time after transmitting the ringing wave, it is determined that the regular key has been inserted. And the key determination means determines that it is normal. Further, the first output means outputs the determination result to the outside.
- the IC tag is also called RFID (Radio Frequency Identifier), and the built-in IC chip is similar to a non-contact type IC card. Communicate.
- the ID code unique to the IC tag in addition to the ID code unique to the IC tag, the ID of the installed device (maker ID) and the management code It is possible to add and record the hall ID).
- Each of these IDs is composed of about 64 bits of unique (uniquely identifiable) information.
- the ID can be duplicated and used fraudulently by configuring it twice or three times. Is non It always gets difficult. Since the reflected wave transmitted in response to the ringing wave contains such identification data, it is more difficult to perform “fake” or so-called “spoofing” than with light or electricity.
- the locking device may include a second receiving unit that receives the key determination result output from the first output unit, and the key determination result received by the second receiving unit is normal. And an unlocking means for unlocking when.
- the second receiving means receives the key determination result, and if normal, the unlocking means unlocks. Therefore, when a duplicated key is used, it cannot be unlocked, and illegal actuation after unlocking can be prevented.
- the key use time determination means for determining whether the link is used during a pre-registered time zone is provided. The lock may be opened only when it is determined that the use is performed in a regular time zone.
- the first output means can receive the reflected wave from the key determination result or from a communication disabled state where the first receiving means cannot receive the reflected wave.
- the key insertion time which is the time when the communication enabled state is reached, and the identification data included in the received reflected wave
- the key withdrawal time which is the time when the communication is disabled from the communication enabled state.
- at least one of the key ID abnormal time which is the time when the identification data different from the pre-registered registration data is received, and the identification data included in the received reflected wave Key monitoring history data may be output.
- the first output means outputs the key determination result or the key monitoring history data.
- the key monitoring history data includes a time (key insertion time) at which the first receiving means changes from a communication disabled state where the reflected wave cannot be received to a communication enabled state where the reflected wave can be received, and identification data at that time.
- the time when the communication was changed from the communication enabled state to the communication disabled state key removal time
- the time when the identification data different from the pre-registered registration data was received (key ID abnormal time) Contains any of the data. Therefore, it is possible to refer to the key monitoring history from outside and alert the user with light or sound if it is determined that the key monitoring history is abnormal.
- the identification data for distinguishing the IC tag from other IC tags is stored, and an opening / closing member for opening / closing the device or an opening / closing monitoring IC tag provided on the device body near the opening / closing member is provided.
- the IC tag monitoring device comprises: a second transmitting unit that transmits a paging wave that calls the switching monitoring IC tag; and a reflected wave that is returned from the switching monitoring IC tag.
- the second transmitting means provided in the IC tag monitoring device transmits a paging wave via the monitoring antenna to the opening / closing monitoring IC tag having the built-in IC chip, and calls it. Then, the opening / closing monitoring IC tag returns a reflected wave including the identification data such as the ID code stored therein, and the third receiving means provided in the IC tag monitoring device transmits the reflected wave via the monitoring antenna. To receive. If the third receiving means receives a reflected wave including the same identification data as the registered data registered in advance within a predetermined time after the second transmitting means transmits the ringing wave, the open / close determining means Is determined to be normal. Further, the second output means outputs the determination result to the outside.
- the opening / closing monitoring IC tag is always installed at a position where communication from the antenna is possible, the member to which the opening / closing monitoring IC tag is fixed may move out of the communication range. In this case, the reflected wave cannot be received, and communication becomes impossible. Also, when the communication is returned to the position within the communicable range again from the communicable state, the reflected wave can be received. For this reason, it is possible to detect a change in the state of the device, such as the opening or movement of a member, without visual inspection. If such communication failures and recoveries are memorized and recorded in the history, it is possible to distinguish between normal and incorrect cases, and effective monitoring can be performed. .
- the IC tag monitoring device includes: A notification unit may be provided for notifying when both the key determination result and the opening / closing determination result are abnormal.
- the notifying unit notifies when both the key determination result and the opening / closing determination result are abnormal. Therefore, if the device is opened without using a legitimate key such as a duplicate key, or if the device is opened without using a key, it will be notified by various methods such as light and sound, You can call attention.
- the monitoring antenna when the opening / closing monitoring Ic tag is provided on the opening / closing member, the monitoring antenna includes the opening / closing monitoring Ic.
- the tag When a tag is provided on the main body of the device, the tag is provided on the opening / closing member in the vicinity thereof, and the monitoring antenna and the I / O tag for opening / closing monitoring are provided when the opening / closing member is closed. May be communicable, and may be disabled when the opening and closing member is in the open state.
- the opening / closing monitoring IC tag and the monitoring antenna are separately provided on the opening / closing member and the device body near the opening / closing member, and communication is possible when the opening / closing member is in the closed state.
- the opening / closing member is opened, communication becomes impossible.
- the opening / closing monitoring history data is a time when the third receiving unit changes from a communication enabled state where the reflected wave can be received to a communication disabled state where the reflected wave cannot be received.
- Time, the recovery time which is the time when the communication becomes possible from the communication disabled state, or registered in advance. The time when the identification data different from the registration data was received
- the open / close monitoring history data output by the second output means includes a state in which the third receiving means can receive the reflected wave and a state in which the reflected wave cannot be received.
- Time time of disappearance
- time at which data can be received again recovery time
- identification data different from registered data due to switching of IC tags etc.
- ID abnormal time One of the times at which the message was received (ID abnormal time) is included.
- the output opening / closing monitoring history data can be reported by an external device, or stored on the external device side, and the monitoring history of the opening / closing monitoring 1C tag can be referenced later.
- the surveillance camera will be able to know the exact time at which the fraud occurred. By comparing this with the shooting time, it is also possible to identify the person who committed the wrongdoing.
- the locking system according to the second invention of the present application communicates with a locking IC tag, an opening / closing monitoring IC tag, the locking IC tag and the opening / closing monitoring IC tag. And a locking device that locks and unlocks the device based on the monitoring result of the IC tag monitoring device, and the locking Ic tag is And storing identification data for distinguishing from other IC tags, and the opening / closing monitoring IC tag stores identification data for distinguishing from other IC tags, and an opening / closing member for opening / closing the device.
- the Ic tag monitoring device is provided near the opening / closing member, and the Ic tag monitoring device includes: a transmitting unit that transmits a paging wave that calls the locking IC tag or the opening / closing monitoring IC tag; I c tag or opening and closing Receiving means for receiving the reflected wave returned from the monitoring IC tag, an antenna connected to the transmitting means and the receiving means, and transmitting the ringing wave to the opening / closing monitoring IC tag from the transmitting means.
- the receiving means does not receive the reflected wave including the same identification data as the pre-registered registration data within a predetermined time, and the transmitting means transmits the ringing wave to the locking IC tag.
- Output means for outputting to the outside, the locking device includes: a key including the locking IC tag; a lock including the antenna; and a lock into which the key is inserted.
- the IC tag for the locking built in the key and the opening / closing member for opening / closing the device or the IC tag for opening / closing monitoring provided on the device body near the opening / closing member are attached to the IC tag.
- monitoring equipment transmitting means these IC data call a grayed to c and Padlock I c tags and closing monitoring IC tag by transmitting the a call wave, the identification data such as ID code stored therein Is returned, and the receiving means receives the reflected wave. Then, the receiving means did not receive a reflected wave containing the same identification data as the registered data registered in advance within a predetermined time after the transmitting means transmitted the ringing wave from either Ic tag.
- the judging means judges that it is abnormal. Further, the output means outputs the determination result to the outside. Therefore, if the Ic tag is built in the legitimate key, it will be normal if the device is opened using the legitimate key, but it will be normal if the duplicate key is used or the key is not used. If opened, an error will occur, so an unauthorized release can be detected and recorded in the history.
- register ID codes for multiple keys 0678
- a key use time judgment means for judging whether or not use is performed in a pre-registered time zone when the key judgment means determines that the time is normal is provided. You may.
- the gaming machine according to the third invention of the present application includes the locking system according to the first invention or the locking system according to the second invention.
- the operation and effect of the first invention or the second invention can be exhibited.
- the device management system is a device in which the device provided with the locking system of the first invention and a management machine that manages the device are connected via a network.
- the device management system wherein the management device is configured to control the key determination result or the key monitoring history data output from the first output unit or the open / close monitoring output from the second output unit.
- a monitoring history data receiving means for receiving history data is provided.
- the monitoring history data receiving means of the management device outputs the key judgment result and the key monitoring history data output from the first output means of the IC tag monitoring apparatus, and the output from the second output means. Received opening / closing monitoring history data. Therefore, monitoring history data of each device can be grasped on the management device side and can be dealt with at an early stage.o
- the management machine is A monitoring history data storage means for storing the key determination result received by the monitoring history data receiving means or the key monitoring history data or the opening / closing monitoring history data may be provided.
- the received key determination result, key monitoring history data, and opening / closing monitoring history data are stored in the monitoring history data storage means of the management device. Therefore, the monitoring history data of each device is stored collectively on the management device side, and the storage contents of the Ic monitoring device can be cleared, and the monitoring history of multiple devices can be compared. Response is possible.
- the management device may be configured to output the key determination result received by the monitoring history data receiving unit or the key monitoring history data or the opening / closing monitoring history data.
- a viewing history data output unit may be provided.
- the received key determination result, key monitoring history data, and opening / closing monitoring history data are output by the monitoring history data output means of the management device. Therefore, the monitoring histories of a plurality of devices can be displayed together at one place, or a warning lamp, sound, or the like can be issued to respond to fraudulent activities efficiently.
- FIG. 1 is a system configuration diagram of the management system 200
- FIG. 2 is a front view of the pachinko machine 1
- FIG. 3 is a front view of the game board 2 of the pachinko machine 1.
- FIG. 4 is a rear view of the pachinko machine 1.
- FIG. 5 is an exploded perspective view of the R / W unit 56.
- FIG. 6 is a perspective view of the pachinko machine 1 with the glass frame 111 and the main frame 110 opened.
- FIG. FIG. 2 is a perspective view showing a state in which 11 and a main body frame 110 are opened.
- FIG. 8 is a plan view of the IC tags 86 and 186.
- FIG. FIG. 9 is a partial perspective view of the lower part of the main body frame 110.
- FIG. 10 is a plan view of the key 12 1.
- FIG. 11 is a front view of the management device 100.
- FIG. 12 is a block diagram showing an electric circuit configuration of the pachinko machine 1
- FIG. 13 is a block diagram showing an electric circuit configuration of the RZW unit 56.
- FIG. 14 is a block diagram showing the electrical circuit configuration of the 1 ⁇ tag 86
- FIG. 15 is a block diagram showing the electrical circuit configuration of the management device 100.
- FIG. FIG. 16 is a flowchart of a monitoring process for monitoring the state of the key 12 1
- FIG. 17 is a diagram illustrating the open / close state of the glass frame 1 1 1 // main frame 1 110.
- FIG. 18 is the first half of a flowchart showing an outline of the processing of the management device 100
- FIG. 19 is a flowchart of the monitoring process of the management device 100. This is the second half of the flowchart showing the outline of the processing.
- FIG. 20 is a schematic diagram of a history database
- FIG. 1 is a configuration diagram of a gaming machine management system 200 in a game arcade according to the present embodiment.
- the management system 200 is provided with a management machine 100 on each of the gaming machine installation islands in which a plurality of pachinko machines 1 in a game arcade are arranged in a back-to-back arrangement in two rows.
- the pachinko machine (game machine) 1 on the installation island is connected to the management machine 100 via the attached reader / writer unit (hereinafter referred to as “R / W-unit”) 56.
- R / W-unit attached reader / writer unit
- the pachinko machine 1 has a glass frame 111 and a main frame 110, and a main frame 110 and a wooden frame 112 (see Fig. 6).
- An open / close monitoring IC tag that stores an ID code (identification data) is installed, a ringing wave is transmitted to the open / close monitoring IC tag, a reflected wave is received, and the ID code included in the reflected wave is read.
- the opening of the installation location is detected, the detection result is transmitted to the management device 100, and the management device 100 notifies the user, so that the response can be made in the amusement arcade.
- the key for opening and closing the glass frame 111 and the body frame 110 has a built-in key IC tag, and the ID code of this chained IC tag is included.
- the key is read only when the authentic ID code is read and unlocked, and the key insertion / withdrawal history is transmitted to the management machine 100.
- the management system 2 0 0 connects the respective RZW unit 5 6 and management apparatus 1 0 0 a communication cable 1 5 0 such as a LAN cable.
- Each pachinko machine 1 has an independent R / W cut 56 (1C tag) for calling the IC tag and reading the identification data. Monitoring device) is attached.
- the management machine 100 is further connected to a hall management hall computer 300 that manages the entire game arcade, and the hall management hall computer 300 is connected to each of the halls.
- the management machine 100 is managed collectively.
- FIG. 2 is a front view of the pachinko machine 1
- FIG. 3 is a front view of the gaming board 2 of the pachinko machine 1.
- a substantially square game board 2 is provided in the upper half of the front of the pachinko machine 1, and the game board 2 has a substantially rectangular shape surrounded by guide rails 3.
- a circular game area 4 is provided.
- the game board 2 has a game area 4 at the front center and is covered by a glass frame 111 holding a transparent glass plate.
- Below the game board 2 of the pachinko machine 1 there is provided an upper plate 5 for supplying game balls to a launcher (not shown) and receiving a prize ball, and directly below the upper plate 5, a prize ball is received.
- a lower plate 6 is provided, a firing handle 7 is provided on the right side of the lower plate 6, and a speaker 48 is provided between the upper plate 5 and the lower plate 6. .
- a keyhole 120 for inserting a key for opening the glass frame 111 and the main frame 110 (see FIG. 6) is provided above the firing handpiece 7.
- a special symbol display device 8 having a liquid crystal screen is provided substantially at the center of the game area 4.
- This special symbol display device 8 is provided with a first symbol stop Ll, a second symbol stop L2, a third symbol stop L3, and a normal symbol display 8a, and a normal symbol display is provided.
- the part 8a is designed to be able to display one-digit numbers, one-letter alphabets, or symbols, marks, and other designs.
- An illuminated windmill 9 is provided at the upper right of the special symbol display device 8, and at the upper left. 2003/010678
- the game board 2 is provided with various illumination lamps, windmills, a large number of obstacle nails, and the like.
- FIG. 4 is a rear view of the pachinko machine 1.
- a board box 80 accommodating a main control board 41 for controlling the main control of the pachinko machine 1 is provided on the back of the lower left of the pachinko machine 1, and is provided on the right side of the board box 80.
- a sound board 4 3 a power board 42 is located above and to the right of the sound board 43, and a dispensing control board 45 is placed in a transparent resin box below the power board 42. I have.
- a center cover 90 that protects the back of the game board and covers various wiring is placed above the board box 80, and an IC tag is placed outside the center canopy 90.
- An R / W unit 56 for calling and reading the ID code is provided.
- FIG. 5 is an exploded perspective view of the RZW unit 56.
- the 17 1 ⁇ unit 56 is mounted above the board box 80 and outside the center cover 90 with screws (see Fig. 4). It is configured as a unit independent of pachinko machine 1, and is supplied with power from island facilities.
- the scale / unit 56 has a CPU 56a, a RAM 56b, a ROM 56c, an EEPRRM 56d, an RF circuit 56g, and a LAN card 5 6 h, an input port 56 i is provided, and the RF circuit 56 g is connected to the monitoring antennas 68, 168 (described later) by a coaxial cable 56 k, and the LAN card 56 h However, they are connected to the management device 100 via a LAN cable. Also, it receives a signal from the main control board 41 of the pachinko machine 1 via the input port 56 i.
- the R / W unit 56 wirelessly communicates with the opening / closing monitoring IC tags 86 and 186 via the monitoring antennas 68 and 168, and transmits the key via the key antenna 128. Wireless communication is performed with the key IC tag 1 26 (see Fig. 10) built in the 12 1. . In addition, the R / W unit 56 lights when there is an error in communication with the open / close monitoring IC tags 86 and 186 and the key IC tag 126.
- a segment display 69 is provided. The 7-segment display 69 is inserted when the open / close monitoring IC tag becomes unidentifiable or an ID error is detected, and if an abnormality such as open / close is determined at the installation location. If the key 1 2 1 has an ID error, the abnormal location is specified (for example, using symbols such as A and B), and the total number of abnormal (open / close) times is displayed.
- FIGS. 6 and 7 are perspective views of the pachinko machine 1 with the glass frame 111 and the main frame 110 opened.
- the pachinko machine 1 has a wooden frame 112 fixed to the game machine installation island, a main body frame 110 serving as the main body of the game machine, and a glass frame 1 1 protecting the game board 2. It is composed of one and one. Opening and closing the wooden frame 1 1 2 and the main frame 1 110, and opening and closing the main frame 1 1 0 and the glass frame 1 1 1 1 1 Insert the key 1 2 1 into the hole 1 2 0 and rotate.
- a small, rectangular opening / closing monitoring IC tag 86 is attached to the back of the upper right upper part of the glass frame 1 1 1 with an adhesive or the like.
- a small, rectangular monitoring antenna 68 is bonded to the upper right portion of the frame 110 in a front view with an adhesive or the like.
- a small rectangular opening / closing monitoring IC tag 186 is glued with adhesive or the like to the center of the inside of the right side frame of the wooden frame 1 12 when viewed from the front.
- a small rectangular monitoring antenna 168 is adhered to the right side of the front view with an adhesive or the like.
- a small and rectangular key antenna 128 is embedded above the keyhole 120.
- FIG. 8 is a plan view of the opening / closing monitoring IC tags 86 and 186.
- the IC tags 86 and 186 for opening / closing monitoring consist of an RF circuit 86a and EE on a thin flexible printed circuit board.
- the monitoring antennas 68 and 168 are IC tags 86 and 186 for opening / closing monitoring, and the key antenna 128 is a key IC tag 12
- the opening / closing monitoring IC tags 86 and 18 6 and the monitoring antennas 68 and 16 are used.
- Communication is performed in the short-wave band of 56 MHz.
- Monitoring antenna 68 and opening / closing monitoring IC tag 86 and monitoring antenna 168 and switching monitoring The distance between the visual IC tag 186 and the glass frame 111 and the main frame 110, and the main frame 110 and the wooden frame 112 are closed and locked, and the distance will be about 3 mm. It is arranged as follows. RF transmission / reception is possible between these distances, and the opening / closing monitoring IC tag 86, 1 is called when the R / W unit 56 is called via the monitoring antennas 68, 168. When the distance between the monitoring antennas 68, 168 and the opening / closing monitoring IC tags 86, 186 exceeds about 5 mm, communication becomes impossible. Is set.
- This communicable distance can be adjusted by the number of turns of the coil of the monitoring antenna 68 and the reactance value. By setting the communicable distance in this way, it is possible to detect even the opening of a slight gap between the glass frame 111 and the main frame 110, and it is also possible to detect vibration and the like. Adjustments are made so that communication is not disabled due to such slight shaking. Also, the key I c tag 1 26 and the key antenna 1 2 8 can communicate with each other when the key 1 2 1 is inserted into the key hole 1 2 0, and the key 1 2 1 is connected to the key hole 1 2 It is configured so that communication is not possible if 0 is pulled out.
- the communication between the monitoring antennas 68, 168 and the opening / closing monitoring IC tags 86, 186, and the key antenna 128 and the key IC tag 126 uses electromagnetic waves.
- the IC tags 86 and 186 for opening / closing monitoring, antennas 68 and 168 for monitoring, and antennas for key 1 2 8 is a prize dispensing device using a solenoid 49 and a launch motor 67
- FIG. 9 is a partial perspective view of the lower part of the main body frame 110, and FIG. JP2003 / 010678
- the glass frame 1 1 1 and the main frame 1 1 10 are engaged with the projection 1 3 1 a of the locking member 1 3 1 with the engaging portion 1 3 1 of the glass frame 1 1 1
- the protruding portion 132a of the locking member 132 engages with the engaging portion 1332b of the glass frame 111 to be locked.
- the locking members 13 1 and 13 2 are constantly urged upward by the panel.
- the end 13 1 c of the locking member 13 1 opposite to the projection 13 1 a is located above the monitoring antenna 16 8.
- the lower end of the plunger 135a provided at the lower end is in contact with the lower end.
- the plunger 135a which is the movable iron core of the locking solenoid 135 (see Fig. 12), is turned on when current flows through the locking solenoid 135. And is not in contact with the projection 13a.
- the main frame 110 and the wooden frame 1 12 are formed such that the projections 13 3 a of the locking member 13 3 are engaged with the engaging portions 13 3 of the wooden frame 11 2. b, and the projections 134a of the locking members 134 engage the engaging portions 134b of the wooden frame 112 to be locked.
- the locking members 133 and 134 are constantly urged upward by the panel.
- the projection 1333a of the locking member 133 is provided with a plunger 1336a provided below the monitoring antenna 168. And the lower end are in contact.
- the plunger 1336a which is the movable iron core of the locking solenoid 1336 (see Fig. 10), is turned on when current flows through the locking solenoid 1336. And is no longer in contact with the protruding part 1 33 a.
- FIG. 10 is a plan view of the key 1 2 1.
- Fig. 10 PT / JP2003 / 010678
- the key 1 21 has a key IC tag 126 embedded inside the cover of the gripper 121 a.
- the key IC tag 126 is formed in a thin cylindrical shape (stick type) and, like the open / close monitoring IC tag 86, is an IC in which the RF circuit and EEPROM are integrated. It consists of a chip and an antenna circuit.
- the ID code of the key IC tag 126 is read. If this matches the pre-registered ID code, the R / W unit 56 passes a current through the locking solenoid 135 to the plunger 135. Pull a so that the locking member 13 1 can move downward. As a result, the lock is unlocked, and the glass frame 111 is opened toward the user. When locking, the key 1 21 is unnecessary, and the projections 13 1 a and 13 2 a are engaged by pushing the glass frame 1 11 into the main frame 1 10.
- R / W unit 56 is a glass frame
- the body frame 110 To unlock the body frame 110, insert the key 121 into the keyhole 120 and rotate it clockwise. As a result, the locking members 1 3 3 and 1 3 4 are lowered, and the protrusion 13 3 a and the engagement portion 13 3 b, and the protrusion 13 4 a and the engagement portion 13 4 b The engagement is released, and the body frame 110 can be opened to the front.
- the locking member 13 3 is formed by the key 13 because the plunger 13 36 a comes into contact with the lower force. Even when 1 is rotated, the locking member 13 3 cannot be moved downward by being blocked by the plunger 13 36 a.
- the R / Wet 56 always calls the key IC tag 126 of the key 121 via the key antenna 126, when the key 121 is inserted, the key The ID code of IC tag 1 26 is read. If this matches the pre-registered ID code, the RZW unit 56 sends a current to the locking solenoid 1336, pulls the plunger 1336a and locks the locking member 13 So that 3 can move down. As a result, the lock is unlocked, and the main body frame 110 is opened toward the user. When locking, the key 1 21 is not required, and the projections 1 3 3 a and 1 3 4 a are brought into contact with the engagement section 1 by pushing the main body frame 1 10 into the wooden frame 1 1 2.
- FIG. 11 is a front view of the management device 100.
- the control unit 100 has a warning lamp 1 08 at the top and a tag for clearing the display 107 and the display 107 on the front. It has a tan 110.
- the upper part of the warning lamp 108 is a red lamp 108a that notifies the opening of the main frame 110, and the lower part is the blue lamp 108 that notifies the illegal opening of the glass frame 111. b.
- Unauthorized release in which the main unit frame 110 or the glass frame 1 1 1 is opened without using the regular key 1 2 1 is detected on one of the pachinko machines 1 connected to the control unit 1 0 0
- the warning lamps 108a and 1 ⁇ 8b are lit to call attention of the staff at the amusement arcade.
- the display device 107 displays which pachinko machine 1 has detected where the pachinko machine 1 has been opened.
- the display unit 107 indicates that the main unit frame 110 of the 104th unit has been illegally opened, and the red lamp 108a is lit.
- the warning lamp 108 turns off in about 5 seconds, and the display on the display unit 107 shows that the staff inputs the administrator authority using a password, etc., and the clear button 1 It can be erased by pressing 10. 4. Configuration of the hard part inside the device
- FIG. 12 is a block diagram showing an electric circuit configuration of the pachinko machine 1.
- the control unit 40 of the pachinko machine 1 is provided on the back side of the pachinko machine 1, and the control unit 40 includes a main control board 41, a power supply board 42, a sound board 43, a symbol display board 44, and a payout board. It is composed of a control board 45, an illumination board 46, a relay board 47 and a launch board 66, and the main control board 41 is provided with an LSI 50 for performing various processes according to programs. You.
- the LSI 50 includes a CPU 51 for performing various arithmetic processing, a RAM 52 for storing flags, counter values, data programs, etc., and a control program and various initial values for various values.
- a ROM 53 storing data and data of display contents on the special symbol display device 8 and the like are provided, and these are integrally molded as one LSI.
- the main control board 41 includes a sound board 43, a symbol display board 44, a payout control board 45, an illumination board 46, and a relay board 47 for transmitting and receiving data signals.
- An interface 54 is provided.
- An R / W unit 56 is also connected to the I / O interface 54, and transmits and receives data signals to and from the main control board 41.
- an output port 55 for outputting various kinds of game information of the pachinko machine 1 is connected to the game interface management hall computer 300 to the 1 no interface 54.
- the sound board 43, the symbol display board 44, the payout control board 45, the illumination board 46, and the firing board 66 also include a CPU (not shown), a RAM (not shown), and a ROM (not shown). ) And an IZO interface (not shown).
- the main control board 41 controls the main control of the pachinko machine 1
- the power supply board 42 converts the AC current (24 V) supplied from the island side into a DC current and supplies the DC current to each board.
- the sound board 43 controls the generation of sound effects of the pachinko machine 1
- the symbol display board 44 controls the special symbol display device 8
- the payout control board 45 controls the prize ball payout device 49
- the illumination board 46 controls the light emission state of each illumination of the pachinko machine 1
- the relay board 47 relays the wiring of each sensor.
- the launch board 66 controls a launch motor 67 that launches a game ball.
- the LED 62 and the illumination lamp 63 are connected to the illumination board 46.
- a special symbol display device 8 is connected to the symbol display substrate 44, a speaker 48 is connected to the sound substrate 43, and a prize ball dispensing device 49 is connected to the dispensing control substrate 45.
- the relay board 47 has a special winning opening opening solenoid 70 that opens the opening and closing door of the special winning opening 16, and a special design starting electric accessory opening solenoid 7 1, a starting symbol switch that detects the game ball that has won the special symbol starting electric accessory 15 2, a normal symbol operating switch 7 that detects a game ball that has passed the ordinary symbol starting gate 11, 12.
- V switch 74 which detects the game ball which has won the V zone in the special winning opening 16 ⁇
- Count switch 75 which counts the number of playing ball which has won the special winning opening 16 ⁇ Winning prize balls collected in the prize sphere gathering section through a guideway (not shown) after winning normal prize holes 19, 20, etc.
- Input Award drainage pitch 7 6 and is connected to is that, Ru.
- the RZW unit 56 has a locking solenoid 135 for pushing and pulling the plunger 13a, and a locking solenoid for pushing and pulling the plunger 1336a. Leads 1 36 are connected.
- the power supply board 42 is connected to the main control board 41, the sound board 43, the symbol display board 44, the payout control board 45, the illumination board 46, and the relay board 47, respectively. Power is supplied. It's getting up.
- the power supply board 42 is supplied with 24 V AC.
- the power supply board 42 is provided with a rectifier composed of a silicon diode bridge (not shown), a smoothing circuit composed of an electrolytic capacitor, a stabilization circuit composed of a regulator IC, and the like (not shown). 12 V and 5 V of the supplied direct current can be supplied.
- the main control board 41, the power board 42, the sound board 43, the symbol display board 44, the payout control board 45, the illumination board 46, and the relay board 4 are not shown. All 7 are connected by ground lines.
- FIG. 13 is a block diagram showing an electric circuit configuration of the RZW unit 56.
- the R / V unit 56 includes a CPU 56a that performs various arithmetic processing, a RAM 56b that temporarily stores flag data, etc., control programs and data of various initial values, etc.
- ROM 56 c storing the opening / closing monitoring IC tags 86 and 186, and the communication history with the key IC tag 126 and an EEPROM 56 d storing the communication history with the I / O interface 5 6 e, timer 5 6 f, monitoring antenna 6 8, 1 6 8, key antenna 12 8, and open / close monitoring IC tag 8 6, 18 6, key RF circuit 56 g, which emits a ringing wave to IC tag 126 and receives reflected waves from IC tags 86 and 186 for opening / closing monitoring and IC tag 126 for key, and management device 10 0 Communication circuit 1 0 6 LAN card 56 h, Pachinko machine main control board 41 Input port 56 i, 7-segment display 69 Have been.
- the CPU 56a is connected to the opening / closing monitoring IC tags 86,186 via the RF circuit 56g power monitoring antennas 68,168 via the key antenna 128, respectively.
- a ringing wave is transmitted to the key IC tag 126, and the presence / absence of the reflected wave from the opening / closing monitoring IC tag 86, 186 and the key IC tag 126 changes. If there is, the IC tag ID code and time are stored in EEPROM 56d. When the reflected wave returns, the next call is made again immediately. When the reflected wave does not return, the time is stored and the next call is made again.
- the RZW unit 56 confirms the status by communicating with the IC tags 86 and 186 for almost always opening and closing monitoring and the IC tag 126 for the key.
- the IZO interface 56 e is connected to a communication circuit 106 (described later) of the management machine 100 via a LAN card 56 h, and the I / O interface 56 e
- the monitoring history data such as the ID code ⁇ disappearance time and recovery time is transmitted from the e-power to the communication circuit 106.
- FIG. 14 is a block diagram showing an electric circuit configuration of the opening / closing monitoring IC tag 86.
- the open / close monitoring IC tag 86 has an RF circuit 86a that emits a reflected wave in response to a ringing wave from the R / W unit 56, a coil antenna 86b, and an EEPROM 86c. Is installed.
- identification data such as an ID code, a manufacturer ID, and a hall ID for identifying the opening / closing monitoring IC tag 86 from other IC tags are stored in the overwriting erasure prohibited area. Have been.
- a ringing wave is sent from the RZW unit 56 via the antenna 68, the coil The antenna 86b receives the signal, and this ringing wave contains a carrier component, which is received and rectified by the RF circuit 86a to obtain a DC voltage. Therefore, the opening / closing monitoring IC tag 86 can transmit data whenever necessary without using a battery or an external power supply.
- the identification data such as the ID code is read out from the EEPROM 86C and put on the reflected wave, and transmitted from the RF circuit 86a to the antenna 68.
- monitoring history data such as the disappearance time / recovery time stored in the RAM 56 b of the R / W unit 56 should be received later and stored in the EEPROM 86 c. You can do it.
- FIG. 15 is a block diagram showing the electrical configuration of the management machine 100.
- the management device 100 includes a CPU 101 that performs various operations, a RAMI 02 that temporarily stores flags, data, and the like, a control program and various types of control data.
- I / O interface for transmitting and receiving data to and from ROM 103 storing initial value data, EEPROM 104 storing administrator authority database and history database, and RZW unit 56
- An interface 105 a communication circuit 106, a display unit 107 for displaying the received monitoring history data, a warning lamp 108 illuminated based on the received monitoring history data, It consists of a clear button 110 for clearing the display on the display unit 107 and a key.
- the management program is stored in the ROM 103, which is called and the CPU 101 executes the management process.
- the communication circuit 106 is composed of a communication cable 150 such as a LAN cable from the I / O interface 56 e of the R / W unit 56 via a LAN card 56 h. 10678
- FIG. Figure 16 is a flowchart of the monitoring process that monitors the state of the key 122.
- the monitoring process of the key 121 it is determined whether the key 121 is inserted into the keyhole 120, and whether the inserted key is a legitimate key having a pre-registered ID code. Monitor and leave the key insertion history as monitoring history data. Furthermore, if it is confirmed that the key is a legitimate key, pull out the plungers 135a and 135a to unlock.
- the R / W unit 56 constantly monitors the keys 121 while the game arcade is open and at night. In the present embodiment, the R / W unit 56 receives power from an island power supply, and the island power remains on even at night.
- the CPU 56a in the RZW unit 56 transmits a ringing wave from the RF circuit 56g to the key IC tag 126 via the key antenna 128 to perform polling. (S1), and waits for the key IC tag 126 to return with the ID code (identification data) on the reflected wave. If the key 1 2 1 is inserted and the key has a built-in IC tag, the reflected wave should return in response to the ringing wave. Thereupon, it is determined whether or not a reflected wave has returned from the key IC tag 126 within the set time (S3). In the present embodiment, the waiting time is set to 50 milliseconds. 10678
- the ID error flag is set to ⁇ N and the force to determine the level is determined (S23).
- the ID error flag checks whether the correct ID has been returned from the previous time. If the ID error flag is ON and the status is displayed (S23: YES), it indicates that the ID code has returned to the correct ID code this time, so the ID error flag is turned OFF (S25) . If the ID error flag is OFF (S23: N ⁇ ), or after the end of S25, the next question is whether the key 121 has been inserted at the time of this polling. In order to confirm that the key flag has been inserted before, it is determined whether or not the key flag has been turned off (S27).
- the key flag is set to ON if there is a response from the key IC tag 126, and OFF if there is no response. If the key flag is ON (S27: NO), the ID code from the key IC tag 126 was returned within the set time last time. Therefore, the key 1 21 was not inserted for the first time this time, but the key 1 2 1 was already inserted and remains unlocked, so no storage is performed and the management device 10 1 No data is sent to 0. Continue to S35.
- the key flag is turned off and turned on (S27: YES), it indicates that the key that was not responded last time has responded this time, so it is determined that key 1 2 1 has been inserted. Then, the current response time is stored in the EEPROM 56 d together with the ID code as the key insertion time. (S29). Then, the key flag is set to ⁇ N (S31), a code for identifying the pachinko machine 1 is added to the ID code and the key insertion time, and a communication cable such as a LAN cable is connected to the management machine 100. Transmit via 150 (S33). As a result, the management machine 100 can know which pachinko machine has inserted the key.
- the ID error flag is OFF (S15: YES), this indicates that the ID code has become incorrect for the first time. It is stored in the EEPROM 56d as the insertion time (S17). Then, the ID error flag is set to ON (S19). Then, a code for identifying the pachinko machine 1 is added to the ID code and the unauthorized key input time, and the I / I interface 56 e and the LAN card 56 h are connected to the management machine 100 from the LAN. Transmission is performed via a communication cable 150 such as a cable (S21). Then, proceed to S35.
- a communication cable 150 such as a cable (S21).
- this time It indicates that the response has stopped for the first time, so it is determined that the key has been removed, and the time of polling the IC tag is used as the key removal time in EEPR0M56d. Remember (S7). Then, the key flag is turned off (S9). Next, a code for identifying the pachinko machine 1 is added to the ID code and the key removal time, so that the I-noise interface 56 e and the LAN card 56 h can be added to the management machine 100. Transmission is performed via a communication cable 150 such as a LAN cable (S11). Then, proceed to S35.
- a communication cable 150 such as a LAN cable (S11).
- the key when the key is inserted and when the key is removed, the history is stored by the time and the ID code, and the data is transmitted to the management device 100. If an ID code for the key IC tag 1 26 built into the key 1 2 1 is prepared for each key, it is recorded which key unlocked the pachinko machine 1 and when, and the key was illegally used. It helps to detect misconduct that has been committed.
- FIG. Figure 17 shows the glass frame 1
- the processing is performed separately for the glass frame 111 and the main frame 110, but the contents of the processing are the same.
- the CPU 56 a in the R / W unit 56 is connected to the RF circuit 5
- the waiting time is set to 50 milliseconds. Is set to.
- the glass frame 1 1 1 / body frame 1 1 0 Can be determined not to be released. Specifically, this determination is performed as follows. If a response is returned within the set time (S103: YES), it is determined whether the returned ID code is correct (S113), and the ID code is determined. If the ID is correct (S113: YES), it is determined whether the ID error flag is ON (S123). The ID error flag is used to check whether the correct ID has been returned since the last time.
- the ID error flag turns ON and returns (S123: YES), this indicates that the ID code has returned to the correct ID code, so the ID error flag is turned OFF ( S125). If the ID error flag is OFF (S123: NO), or after S125 is completed, it is determined whether or not the force of the disappearance flag is ON (S127) ). The disappearance flag is used to check whether a response has been received from the IC tag 86, 186 for opening / closing monitoring within the previously set time. If the disappearance flag is OFF (S127: NO), the ID code for the open / close monitoring IC tag 86, 186, etc. was returned within the set time last time. .
- the disappearance flag is set to SOFF (S105: YES)
- z It is determined that the body frame 11 has been released, and the time when the IC tag was polled is set to the disappearance time (release time). Is stored in the EEPRQM 56d (S107). Then, the erase flag is turned ON (S109). Next, a communication cable such as a LAN cable is connected to the management machine 100 by combining the ID code and the disappearance time.
- the transmission is performed via 150 (S111). Then, the process proceeds to S135. In this way, when an error occurs, the history is stored and the management
- the data is sent to 1000, and a notification is made on the management machine 1000 side.
- this time indicates that the ID code has become incorrect for the first time, so the polling time is stored in the EEPROM 56d as the ID error occurrence time (SI 1 7). Then, the ID error flag is set to ⁇ N (S119). Then, the ID code and the time when the ID error occurred are paired, and the I / O interface 56 e is connected to the management device 100 via the communication cable 150 such as a LAN cable. And send it (S122). Then, the process proceeds to S135.
- the returned ID code is also correct (S113: YES), and if the disappearance flag is turned on and it is reported (S127: YES), it indicates that the last response was the one that responded this time, that is, the open glass frame 111 / main body frame 110 was closed. For this reason, the current response time is stored in EEPROM 56 d as the return time (closing time) (S129). When the response stops, the disappearance time is stored, and the recovery time is also stored this time, so that the time that the glass frame 1 1 1 z body frame 1 1 0 has been open can be calculated. You.
- the projections 13 1 a, 13 2 a and the engagement portions 13 1 b, 13 2 b, and the projections 13 3 a, 13A and the engagement portions 13B, 13B are engaged and locked.
- the current flowing through the locking solenoids 1335 and 1336 is cut off and turned off (S130), and the plungers 1335a and 1336a protrude. So that the locking members 13 1 and 13 3 cannot move downward.
- a key without a correct ID is prevented by the plungers 135a and 1336a, so that an unauthorized key is subsequently detected. Even if it is inserted, it can be prevented from being unlocked.
- the disappearance flag is turned off (S1311).
- the ID code and the return time are paired and transmitted to the management device 100 via the communication cable 150 such as a LAN cable (S133).
- the communication cable 150 such as a LAN cable
- S133 it is determined whether or not the opening / closing monitoring processing has been completed (S135), and if the processing has been completed (S135: YES), the processing is terminated; if not, the processing has not been completed (S135: NO).
- the process returns to S101 and continues. By performing the processing as described above, if the genuine ID code is returned within the set time following the previous call, it is determined that it is normal and the ID code is called again. Return to the start (S101).
- the glass frame 1 1 1 z It is determined that there is an abnormality in 10; in any case, the user checks whether the state has continued from the previous time, and stores the time only when a state change has occurred for the first time. In addition, if the genuine ID code is returned within the set time, but the previous time was not a normal release by the key but there was no response, the status changed even if it was normal. Then, the time is memorized. Then, data is transmitted to the management machine 100 in addition to the storage processing.
- FIG. 18 and FIG. 19 are flowcharts showing the outline of the processing of the management machine 100
- FIG. 20 is a schematic diagram of the history database stored in the EEPROM 104 of the management machine 100.
- FIG. 311 When the amusement arcade is opened and the power of the management machine 100 is turned on, the processing for opening S301 to S311 is performed. First, an input from a staff member is received, and it is determined whether or not the administrator authority such as a password ID card has been confirmed (S301).
- the administrator authority database is stored in the EEPROM 104 of the management machine 100, and the entered password ID is checked against the password and ID stored in the database. To judge. If there is no administrator authority (S301: NO), the processing ends. If the user has administrator authority (S301: YES), the R / W unit 56 attached to each pachinko machine 1 is polled via a LAN cable (S303). Then, the monitoring history during the store closing time is received (S305), and the history is stored in the history database of EPROM 104 (S307). If the received history includes an error history (S309: YES), the content of the error is displayed on the display unit 107 (S311).
- the display on the display unit 107 is not performed.
- the stored history can be used for purposes such as checking the person in charge of opening and closing when another error such as a large supply of illegal game balls is found.
- ID error data (S327: YES)
- ID code strength the serial number of the pachinko machine 1 and the installation location (type) of the ID error IC tag are determined, and the information is obtained.
- ID error time are stored in the history database of the EEPROM 104 (S329).
- the history database contains ID code, pachinko machine 1 serial number, IC tag installation location (type), key insertion time, key removal time, and key insertion time to key removal time. It stores about one week of key retention time, loss time, recovery time, unidentifiable time from loss time to recovery time, and ID error time. Then, as shown in Fig. 11, an error message such as "No.
- main frame ID error is displayed on the display unit 107 (S335), and the corresponding warning lamp is lit. (S333). The warning lamp is lit and an error is displayed on the display 107, so that staff at the patrol arcade can know the status of the glass frame 111 and the main frame 110. Yes You can go to the corresponding pachinko machine 1 to check the status.
- the received data is not the ID error data of the opening / closing monitoring history (S327: NO)
- lost data S331: YES
- the ID code sent since the IC tag that was once in a communication-disabled state is return data that can be re-transmitted. Is retrieved from the history database, the recovery time is stored in the corresponding record (S339), and the indistinguishable time from the disappearance time to the recovery time is calculated and stored. Then, the process proceeds to S 3 4 1.
- the data is not the open / close monitoring history data (S3226: NO)
- it is the key monitoring history data obtained as a result of monitoring the key 121 so it is first determined whether or not the data is ID error data (S32). 3 4 3).
- ID error data S344: YES
- the ID code and ID error time are stored in the history database of the EEPROM 104 (S345), and the display unit 107 displays " ⁇ -numbers".
- An error message such as "Incorrect key entry” is displayed (S335), and the corresponding warning lamp is lit (S337).
- the warning lamp is lit and an error is displayed on the display unit 107, a staff member of the amusement arcade during the patrol can know that an invalid key has been used. Then, the process proceeds to S 3 4 1.
- ID error data S3343: NO
- the key is the key input data that is the history data when the regular key was inserted (S347).
- the ID code In the case of the key input data (S347: YES), the ID code, the serial number of the pachinko machine 1, and the key input time are stored (S349). Then, the process proceeds to S 3 4 1. If it is not key insertion data (S347: NO), the key extraction data at the time the key was extracted, the ID code and the key extraction time are stored, and the same ID code was used to insert or delete the key. If the key entry time is stored, the difference from the key removal time is calculated to calculate the key holding time and stored (S351).
- S 3 41 After the end of S 3 37, S 3 45, S 3 49, and S 3 51, it is determined whether or not the processing of the management machine 100 is to be ended (S 3 41). (S314: YES), terminates the entire process, and if not (S334: NO), returns to S31 and waits for data reception.
- the error display on display 1 ⁇ 7 is erased (S319).
- the display unit 107 of the management machine 100 displays the serial number of the pachinko machine 1 and the glass frame 111 or the body frame 110 when the frame is opened. Otherwise, if the key is an unauthorized key, a message to that effect is displayed.At the same time, the warning lamp 1108b is displayed for the glass frame 111, and the warning lamp 108a is displayed for the body frame 110. It is lit. If a staff at the amusement park responds in the hall in response to such notification, the subsequent display is unnecessary, so The display is erased by the file operation.
- the display is not erased (S317: NO)
- the monitoring history data stored in the open / close monitoring IC tag and the R / W unit 56 is cleared when a clear command is received after a predetermined period, and the new monitoring history It is configured so that data can be stored.
- After transmitting the monitoring history data to the hall computer 300 for game center management it is not necessary to store the history in the IC tag for opening / closing monitoring, the R / W unit 56, and the management machine 100. Since there is no clearing process, it can be configured with a small storage capacity by performing the clearing process periodically.
- the monitoring history data is to be cleared (S321: YES)
- the monitoring stored in the opening / closing monitoring IC tag, the RZW unit 56, and the EEPROM 104 of the management unit 100 will be performed.
- Erase the history data S32) Monitoring. If it is not clearing of the history data (S'321: NO), it polls the R / W unit 56 (S325) and waits for data reception (S31) 2).
- the R / W unit 56 is called by operating the keyboard of the management machine 100. In this way, the staff of the amusement arcade can check the status of the glass frame 111 / main body frame 110 being monitored at any time.
- the opening / closing monitoring IC tag is attached to the glass frame 111 of the pachinko machine 1 connected to the management machine 100.
- a ringing wave is transmitted from the RZW unit 56 to each opening / closing monitoring IC tag almost at all times, and the reflected wave carrying the identification data of the opening / closing monitoring IC tag is transmitted.
- the ID code of the IC tag for opening / closing monitoring, the disappearance time, and the return time are stored in the management unit. It is configured to send to 0.
- the key 1 21 has a built-in key IC tag 1 26, and only when a formal ID code is answered, turns on the locking solenoid and pulls the plunger to unlock. I am trying to make it happen.
- the time of insertion and withdrawal of the ID code unique to the key is stored and sent to the management device 100 together with the identification code of the pachinko machine 1, and the key use history is managed, and the key usage history is managed. It can detect and prevent improper use and improper use due to duplicate keys.
- the management machine 100 which has received such monitoring history data, stores the content and displays it on the display unit 107 so that the attention of the staff etc. can be obtained. And encourage early detection and prevention of wrongdoing. 8.Description of Modification
- the present invention is not limited to the embodiment described in detail above, and various modifications are possible. Hereinafter, modified examples of the embodiment to which the present invention is applied will be described.
- the R / W unit 56 and the management device 100 are connected using the wired communication cable 150, but the same applies to wireless connection such as infrared communication and wireless communication.
- one management machine 100 is installed for each gaming machine installation island. However, one management machine 100 may be installed for a plurality of islands.
- the gaming machine hall computer 300 that manages the entire gaming arcade may be configured to also serve as a management machine.
- various game information of the pachinko machine 1 does not pass through the R / W unit 56 or the management machine 100, If the transmission is directly transmitted to the whole computer 300, the same effect as the above embodiment can be realized.
- the RZW unit 56 may be installed not only outside the center cover 90 but also in other places of the pachinko machine 1 or may be provided on island facilities. Also, instead of preparing one RZW unit 56 for pachinko machine 1, one or more R units 56 are provided on the island, and multiple pachinko units 1 are installed. It may be configured to monitor the placed IC tag. In addition, the R / W unit 56 does not receive power supply from the island facilities, but uses a pachinko machine 1 such as a main control board 41 or a power supply board 42 with backup power supply. The power supply from the pachinko machine 1 may be configured to receive power from the main control board 41 of the pachinko machine 1.
- the power When dropped, the power can be supplied from the backup power supply of the pachinko machine 1, and the monitoring process can be continued. It is also possible to configure the R / W unit 56 to have a knock-up power supply, charge it during business hours, and use the backup power supply after closing. Good.
- the IC tag for the opening / closing monitoring IC tag is not limited to the thin, small rectangular stick type as in the above embodiment, but may be, for example, a coin type or the like.
- the size can be configured freely.
- the present invention is not limited to the electromagnetic induction method as in the above embodiment, and various methods such as an electromagnetic coupling method, a microwave method, and an optical method can be used.
- the mounting positions of the opening / closing monitoring Ic tag and the monitoring antenna are not limited to the positions described in the above embodiment, and the main body frame 110, the glass frame 111, and the wooden frame 1 Any surface may be used as long as it faces 1 and 2.
- communication between the opening / closing monitoring IC tag and the monitoring antenna is possible.
- the working distance is not limited to about 5 mm as in the above embodiment, but can be arbitrarily adjusted depending on the monitoring location of the IC tag.
- the waiting time for waiting for the reflected wave to be returned from the IC tag is set to 50 milliseconds.
- the present invention is not limited to this. It can be changed within the range of several milliseconds to several seconds that can be monitored at any time.
- the key insertion time, key extraction time, ID error time, erasure time, and recovery time are stored in the EEPROM 56 d of the RZW unit 56
- the RZW unit 56 A hard disk may be provided therein for storage, or another storage medium such as an optical medium may be used.
- the RAM 56b may be stored in the RAM 56b and the RAM 56b may be cleared after transmitting the data to the management device. With this configuration, the EEPROM 56d is not required.
- the polling time is temporarily stored in the RAM 56b of the R / Wut 56 as the disappearance time, and the operation returns.
- the opening / closing monitoring IC tags 86 and 186 may be stored in the EEPROM 86c together with the return time.
- a power supply is provided inside the opening / closing monitoring IC tag 86, and it is stored in the EEPROM 56d at the same time as the EEPROM. Alternatively, it may be stored in the EEPROM 86c. In addition, during business hours, it is only necessary to send the result to the management machine 100. Alternatively, the information may be stored only after the store is closed, without being stored in the EEPROM 86c. Also, in the processing of the management machine 100, only the contents of data reception are stored and displayed on the display unit and the warning lamp is lit, but the stored contents are stored in the hall combination for game hall management. The data may be transmitted to the user 300 and stored for about one month, or may be transmitted to an external storage device. The unidentified time is calculated not by the management unit 100 but by the R / W unit 56, and transmitted from the RZW unit 56 to the management unit 100 together with the return data. May be used.
- a usable time zone may be determined and stored in advance in the R / W unit 56 so that the lock is not opened outside of the use time.
- a step of checking the polling time with the usable time and determining whether or not the time is within the usable time may be added.
- the locking system of the present invention is suitable for monitoring the status of unlocking and locking by installing it on a device such as a game machine where an improper operation may be performed.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
- Pinball Game Machines (AREA)
- Credit Cards Or The Like (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/517,337 US7642896B2 (en) | 2002-08-26 | 2003-08-22 | Locking system, game machine, and device management system |
AU2003257676A AU2003257676A1 (en) | 2002-08-26 | 2003-08-22 | Locking system, playing machine, and device management system |
AT03792818T ATE467020T1 (de) | 2002-08-26 | 2003-08-22 | Verriegelungssystem, spielmaschine und vorrichtungsmanagementsystem |
EP03792818A EP1533449B1 (en) | 2002-08-26 | 2003-08-22 | Locking system, playing machine, and device management system |
DE60332462T DE60332462D1 (de) | 2002-08-26 | 2003-08-22 | Verriegelungssystem, spielmaschine und vorrichtungsmanagementsystem |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2002246004A JP2004084258A (ja) | 2002-08-26 | 2002-08-26 | 施錠システム、遊技機及び装置管理システム |
JP2002-246004 | 2002-08-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004018806A1 true WO2004018806A1 (ja) | 2004-03-04 |
Family
ID=31944240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2003/010678 WO2004018806A1 (ja) | 2002-08-26 | 2003-08-22 | 施錠システム、遊技機及び装置管理システム |
Country Status (8)
Country | Link |
---|---|
US (1) | US7642896B2 (ja) |
EP (1) | EP1533449B1 (ja) |
JP (1) | JP2004084258A (ja) |
CN (1) | CN1675441A (ja) |
AT (1) | ATE467020T1 (ja) |
AU (1) | AU2003257676A1 (ja) |
DE (1) | DE60332462D1 (ja) |
WO (1) | WO2004018806A1 (ja) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006075525A (ja) * | 2004-09-13 | 2006-03-23 | Toyomaru Industry Co Ltd | 遊技機監視システム |
JP4594019B2 (ja) * | 2004-09-27 | 2010-12-08 | 豊丸産業株式会社 | 遊技機監視システム |
JP4625902B2 (ja) * | 2004-10-18 | 2011-02-02 | 豊丸産業株式会社 | 遊技機監視システム |
JP4621907B2 (ja) * | 2004-10-25 | 2011-02-02 | 豊丸産業株式会社 | 遊技機監視システム、及び遊技機 |
JP4714933B2 (ja) * | 2004-11-30 | 2011-07-06 | 豊丸産業株式会社 | 遊技場監視システム |
JP2006230525A (ja) * | 2005-02-23 | 2006-09-07 | Aruze Corp | 遊技機 |
JP2009056097A (ja) * | 2007-08-31 | 2009-03-19 | Moriso:Kk | 遊技機の扉の解錠履歴管理システム |
DE102009018042A1 (de) * | 2009-04-18 | 2010-10-21 | Adp Gauselmann Gmbh | Verfahren zum Erfassen einer Öffnung eines Gehäuses einer Spieleinrichtung |
TWI419561B (zh) * | 2009-11-24 | 2013-12-11 | Gigazone Int Co Ltd | 螢幕支撐架模組 |
US8730106B2 (en) | 2011-01-19 | 2014-05-20 | Harris Corporation | Communications device and tracking device with slotted antenna and related methods |
JP6168684B2 (ja) * | 2013-03-01 | 2017-07-26 | 株式会社ユニバーサルエンターテインメント | 遊技機 |
CN110060376A (zh) * | 2018-01-18 | 2019-07-26 | 夏敬懿 | 锁封装置 |
CN110838209A (zh) * | 2018-08-17 | 2020-02-25 | 鈊象电子股份有限公司 | 落球装置与方法 |
CN109801419A (zh) * | 2019-01-23 | 2019-05-24 | 四川虹美智能科技有限公司 | 一种无人售货机关门上锁的方法、装置及无人售卖机 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH1099512A (ja) * | 1996-09-26 | 1998-04-21 | Kobishi Denki Kk | 遊技機の施錠システム |
JPH10169272A (ja) * | 1996-12-12 | 1998-06-23 | Unitec Kk | 錠開閉管理システム |
US5815557A (en) | 1992-01-09 | 1998-09-29 | Slc Technologies, Inc. | Homeowner key for an electronic real estate lockbox system |
JPH10289388A (ja) * | 1997-04-11 | 1998-10-27 | Nittan Co Ltd | 異常検知装置および異常監視システム |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB1512857A (en) * | 1974-09-13 | 1978-06-01 | Bally Mfg Corp | Monitoring system for use with amusement game devices |
JPH0530761Y2 (ja) | 1987-10-01 | 1993-08-06 | ||
US5392049A (en) * | 1990-07-24 | 1995-02-21 | Gunnarsson; Staffan | Device for positioning a first object relative to a second object |
DE4207161A1 (de) * | 1992-03-06 | 1993-09-09 | Winkhaus Fa August | Elektronischer schliesszylinder |
US5776278A (en) * | 1992-06-17 | 1998-07-07 | Micron Communications, Inc. | Method of manufacturing an enclosed transceiver |
US5349345A (en) * | 1992-06-30 | 1994-09-20 | Vindicator Corporation | Electronic lock |
US5434755A (en) * | 1993-08-04 | 1995-07-18 | Allen-Bradley Company, Inc. | Illumination system for a light emitting panel |
US5434775A (en) * | 1993-11-04 | 1995-07-18 | The General Hospital Corporation | Managing an inventory of devices |
US5629981A (en) * | 1994-07-29 | 1997-05-13 | Texas Instruments Incorporated | Information management and security system |
US5659291A (en) * | 1994-11-28 | 1997-08-19 | Ford Motor Company | Key-in-ignition lock reminder system |
JPH09720A (ja) | 1995-06-23 | 1997-01-07 | Calsonic Corp | パチンコ遊技台の施錠装置 |
JP2683228B2 (ja) | 1995-07-21 | 1997-11-26 | 株式会社八剱電子 | 筐体の封印装置 |
JP3367326B2 (ja) * | 1996-04-03 | 2003-01-14 | トヨタ自動車株式会社 | 車両用ロック装置 |
JP3798089B2 (ja) | 1996-11-29 | 2006-07-19 | 小糸工業株式会社 | 研究用植物育成装置 |
JP3937048B2 (ja) | 1997-02-04 | 2007-06-27 | 株式会社大一商会 | パチンコ機の制御基板収納ボックス |
DK0874335T3 (da) | 1997-03-29 | 2005-12-19 | Scheidt & Bachmann Gmbh | Anlæg med en flerhed af salgs- eller serviceautomater med selvbetjent betaling |
JP4183778B2 (ja) | 1997-05-30 | 2008-11-19 | 株式会社三共 | 遊技用装置 |
US6025780A (en) | 1997-07-25 | 2000-02-15 | Checkpoint Systems, Inc. | RFID tags which are virtually activated and/or deactivated and apparatus and methods of using same in an electronic security system |
US6339385B1 (en) * | 1997-08-20 | 2002-01-15 | Micron Technology, Inc. | Electronic communication devices, methods of forming electrical communication devices, and communication methods |
US6249227B1 (en) * | 1998-01-05 | 2001-06-19 | Intermec Ip Corp. | RFID integrated in electronic assets |
JP3017190B1 (ja) | 1998-11-09 | 2000-03-06 | 米沢日本電気株式会社 | 製品容器開封履歴管理手段と管理方法 |
DE19851950A1 (de) * | 1998-11-11 | 2000-05-25 | Bosch Gmbh Robert | Bedienvorrichtung für ein Kraftfahrzeug |
JP2000288218A (ja) | 1999-04-08 | 2000-10-17 | Sankyo Kk | 遊技用装置 |
EP1069265A3 (de) * | 1999-07-01 | 2004-01-21 | Siemens Aktiengesellschaft | Zugangskontrolleinrichtung sowie Zugangskontroll- und Fahrberechtigungseinrichtung |
US6609969B1 (en) * | 1999-09-13 | 2003-08-26 | Sierra Design Group | Apparatus and method for dispensing of awards |
US6681987B1 (en) * | 2000-03-09 | 2004-01-27 | Meritor Heavy Vehicle Systems, Llc | Smart card system for heavy vehicles |
JP3411255B2 (ja) * | 2000-05-29 | 2003-05-26 | 株式会社ユニレック | ゲーム機の景品管理システム |
JP2002175355A (ja) | 2000-12-08 | 2002-06-21 | Hitachi Ltd | Icカード旅客輸送券及びicカード旅客輸送券警報システム |
US7052391B1 (en) * | 2001-01-26 | 2006-05-30 | Edge Technology | Target-based wagering system and method |
US6718235B1 (en) * | 2001-11-19 | 2004-04-06 | Volvo Trucks North America, Inc. | Route control system |
-
2002
- 2002-08-26 JP JP2002246004A patent/JP2004084258A/ja active Pending
-
2003
- 2003-08-22 AT AT03792818T patent/ATE467020T1/de not_active IP Right Cessation
- 2003-08-22 AU AU2003257676A patent/AU2003257676A1/en not_active Abandoned
- 2003-08-22 DE DE60332462T patent/DE60332462D1/de not_active Expired - Lifetime
- 2003-08-22 EP EP03792818A patent/EP1533449B1/en not_active Expired - Lifetime
- 2003-08-22 WO PCT/JP2003/010678 patent/WO2004018806A1/ja active Application Filing
- 2003-08-22 US US10/517,337 patent/US7642896B2/en not_active Expired - Fee Related
- 2003-08-22 CN CNA038197111A patent/CN1675441A/zh active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5815557A (en) | 1992-01-09 | 1998-09-29 | Slc Technologies, Inc. | Homeowner key for an electronic real estate lockbox system |
JPH1099512A (ja) * | 1996-09-26 | 1998-04-21 | Kobishi Denki Kk | 遊技機の施錠システム |
JPH10169272A (ja) * | 1996-12-12 | 1998-06-23 | Unitec Kk | 錠開閉管理システム |
JPH10289388A (ja) * | 1997-04-11 | 1998-10-27 | Nittan Co Ltd | 異常検知装置および異常監視システム |
Also Published As
Publication number | Publication date |
---|---|
EP1533449A4 (en) | 2007-10-17 |
JP2004084258A (ja) | 2004-03-18 |
DE60332462D1 (de) | 2010-06-17 |
EP1533449B1 (en) | 2010-05-05 |
ATE467020T1 (de) | 2010-05-15 |
US7642896B2 (en) | 2010-01-05 |
CN1675441A (zh) | 2005-09-28 |
EP1533449A1 (en) | 2005-05-25 |
AU2003257676A1 (en) | 2004-03-11 |
US20060103502A1 (en) | 2006-05-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2004014504A1 (ja) | 監視システム、遊技機及び装置管理システム | |
WO2004018806A1 (ja) | 施錠システム、遊技機及び装置管理システム | |
JP4055514B2 (ja) | 遊技機、およびその遊技機を用いた不正監視システム | |
JP2000288218A (ja) | 遊技用装置 | |
JP2004081464A (ja) | 遊技機 | |
JP4710073B2 (ja) | 遊技場監視システム及び遊技機 | |
JP3765011B2 (ja) | 監視用icタグを備えた遊技機 | |
JP4496392B2 (ja) | 監視システム、及び遊技機 | |
JP2004081466A (ja) | 監視システム及び遊技機 | |
JP2004110788A (ja) | 監視システム及び遊技機 | |
JP2004084468A (ja) | 施錠システム、遊技機及び装置管理システム | |
JP2004078921A (ja) | 監視システム、遊技機及び装置管理システム | |
JP4178286B2 (ja) | 監視システム及び遊技機 | |
JP4710074B2 (ja) | 遊技場監視システム及び遊技機 | |
JP4211331B2 (ja) | 監視システム、遊技機及び装置管理システム | |
JP3765010B2 (ja) | 監視システム及び管理端末装置 | |
JP4625902B2 (ja) | 遊技機監視システム | |
JP4129974B2 (ja) | 遊技機管理システム、遊技機、管理端末装置、総合管理端末装置、及び、遊技機情報読取装置 | |
JP4359811B2 (ja) | 監視用icタグを備えた所定の動作を行う装置 | |
JP4247826B2 (ja) | 監視システム及び管理端末装置 | |
JP3088978B2 (ja) | 遊技機 | |
JP4211372B2 (ja) | 監視システム及び管理端末装置 | |
JP4285735B2 (ja) | 監視用icタグを備えた遊技機 | |
JP2004086888A (ja) | 監視システム及び遊技機 | |
JP2004229917A (ja) | 遊技機 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2003792818 Country of ref document: EP |
|
ENP | Entry into the national phase |
Ref document number: 2006103502 Country of ref document: US Kind code of ref document: A1 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10517337 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20038197111 Country of ref document: CN |
|
WWP | Wipo information: published in national office |
Ref document number: 2003792818 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10517337 Country of ref document: US |