WO2008061138A2 - Système d'accès biométrique sensible - Google Patents

Système d'accès biométrique sensible Download PDF

Info

Publication number
WO2008061138A2
WO2008061138A2 PCT/US2007/084669 US2007084669W WO2008061138A2 WO 2008061138 A2 WO2008061138 A2 WO 2008061138A2 US 2007084669 W US2007084669 W US 2007084669W WO 2008061138 A2 WO2008061138 A2 WO 2008061138A2
Authority
WO
WIPO (PCT)
Prior art keywords
item
data
user
identity verification
gaming device
Prior art date
Application number
PCT/US2007/084669
Other languages
English (en)
Other versions
WO2008061138A3 (fr
Inventor
Dean P. Alderucci
Antonio Papageorgiou
Joseph M. Asher
Original Assignee
Alderucci Dean P
Antonio Papageorgiou
Asher Joseph M
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US11/559,829 external-priority patent/US8645709B2/en
Priority claimed from US11/559,484 external-priority patent/US8510567B2/en
Priority claimed from US11/559,933 external-priority patent/US9411944B2/en
Application filed by Alderucci Dean P, Antonio Papageorgiou, Asher Joseph M filed Critical Alderucci Dean P
Priority to EP07871467A priority Critical patent/EP2092462A4/fr
Priority to AU2007319235A priority patent/AU2007319235A1/en
Priority to NZ577177A priority patent/NZ577177A/xx
Priority to CA2669836A priority patent/CA2669836C/fr
Priority to JP2009537329A priority patent/JP5681844B2/ja
Priority to GB0910202A priority patent/GB2458049B/en
Publication of WO2008061138A2 publication Critical patent/WO2008061138A2/fr
Publication of WO2008061138A3 publication Critical patent/WO2008061138A3/fr

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3202Hardware aspects of a gaming system, e.g. components, construction, architecture thereof
    • G07F17/3204Player-machine interfaces
    • G07F17/3206Player sensing means, e.g. presence detection, biometrics
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/32Coin-freed apparatus for hiring articles; Coin-freed facilities or services for games, toys, sports, or amusements
    • G07F17/3225Data transfer within a gaming system, e.g. data sent between gaming machines and users
    • G07F17/3232Data transfer within a gaming system, e.g. data sent between gaming machines and users wherein the operator is informed
    • G07F17/3237Data transfer within a gaming system, e.g. data sent between gaming machines and users wherein the operator is informed about the players, e.g. profiling, responsible gaming, strategy/behavior of players, location of players

Definitions

  • FIG. 1 illustrates a gaming system according to at least one embodiment of the systems disclosed herein;
  • FIG. 2 illustrates a gaming system according to at least one embodiment of the systems disclosed herein;
  • FIG. 3 illustrates a gaming system according to at least one embodiment of the systems disclosed herein.
  • FIG. 4 is a flow chart of a method according to at least one embodiment of the methods disclosed herein.
  • process means any process, algorithm, method or the like, unless expressly specified otherwise.
  • inventions and the like mean “the one or more inventions disclosed in this application” , unless expressly specified otherwise.
  • the terms “an embodiment”, “embodiment”, “embodiments”, “the embodiment”, “the embodiments”, “one or more embodiments”, “some embodiments”, “certain embodiments”, “one embodiment”, “another embodiment” and the like mean “one or more (but not all) embodiments of the disclosed invention(s)", unless expressly specified otherwise.
  • variant of an invention means an embodiment of the invention, unless expressly specified otherwise.
  • the term "herein” means “in the present application, including anything which may be incorporated by reference”, unless expressly specified otherwise.
  • the phrase “at least one of, when such phrase modifies a plurality of things means any combination of one or more of those things, unless expressly specified otherwise.
  • the phrase "at least one of a widget, a car and a wheel” means either (i) a widget, (ii) a car, (iii) a wheel, (iv) a widget and a car, (v) a widget and a wheel, (vi) a car and a wheel, or (vii) a widget, a car and a wheel.
  • the phrase "at least one of, when such phrase modifies a plurality of things does not mean "one of each of the plurality of things.
  • Numerical terms such as “one”, “two”, etc. when used as cardinal numbers to indicate quantity of something mean the quantity indicated by that numerical term, but do not mean at least the quantity indicated by that numerical term.
  • the phrase “one widget” does not mean “at least one widget”, and therefore the phrase “one widget” does not cover, e.g., two widgets.
  • the phrase “based on” does not mean “based only on”, unless expressly specified otherwise. In other words, the phrase “based on” describes both “based only on” and “based at least on”. The phrase “based at least on” is equivalent to the phrase “based at least in part on”.
  • the term “represent” and like terms are not exclusive, unless expressly specified otherwise. For example, the term “represents” do not mean “represents only”, unless expressly specified otherwise. In other words, the phrase “the data represents a credit card number” describes both "the data represents only a credit card number” and “the data represents a credit card number and the data also represents something else".
  • the function of the first machine may or may not be the same as the function of the second machine.
  • any given numerical range shall include whole and fractions of numbers within the range.
  • the range “1 to 10” shall be interpreted to specifically include whole numbers between 1 and 10 (e.g., 1, 2, 3, 4, ... 9) and non-whole numbers (e.g., , 1.1, 1.2, ... 1.9).
  • determining and grammatical variants thereof (e.g., to determine a price, determining a value, determine an object which meets a certain criterion) is used in an extremely broad sense.
  • the term “determining” encompasses a wide variety of actions and therefore “determining” can include calculating, computing, processing, deriving, investigating, looking up (e.g., looking up in a table, a database or another data structure), ascertaining and the like.
  • determining can include receiving (e.g., receiving information), accessing (e.g., accessing data in a memory) and the like.
  • determining can include resolving, selecting, choosing, establishing, and the like.
  • determining does not imply certainty or absolute precision, and therefore “determining” can include estimating, extrapolating, predicting, guessing and the like.
  • a limitation of a first claim would cover one of a feature as well as more than one of a feature (e.g., a limitation such as "at least one widget” covers one widget as well as more than one widget), and where in a second claim that depends on the first claim, the second claim uses a definite article “the” to refer to the limitation (e.g., "the widget"), this does not imply that the first claim covers only one of the feature, and this does not imply that the second claim covers only one of the feature (e.g., "the widget” can cover both one widget and more than one widget).
  • ordinal number such as “first”, “second”, “third” and so on
  • that ordinal number is used (unless expressly specified otherwise) merely to indicate a particular feature, such as to distinguish that particular feature from another feature that is described by the same term or by a similar term.
  • a "first widget” may be so named merely to distinguish it from, e.g., a "second widget”.
  • the mere usage of the ordinal numbers “first” and “second” before the term “widget” does not indicate any other relationship between the two widgets, and likewise does not indicate any other characteristics of either or both widgets.
  • the mere usage of the ordinal numbers “first” and “second” before the term “widget” (1) does not indicate that either widget comes before or after any other in order or location; (2) does not indicate that either widget occurs or acts before or after any other in time; and (3) does not indicate that either widget ranks above or below any other, as in importance or quality.
  • the mere usage of ordinal numbers does not define a numerical limit to the features identified with the ordinal numbers.
  • the mere usage of the ordinal numbers "first” and “second” before the term “widget” does not indicate that there must be no more than two widgets.
  • more than one device / article may alternatively be used in place of the single device / article that is described. Accordingly, the functionality that is described as being possessed by a device may alternatively be possessed by more than one device / article (whether or not they cooperate). Similarly, where more than one device, article or other product is described herein (whether or not they cooperate), a single device / article may alternatively be used in place of the more than one device or article that is described. For example, a plurality of computer-based devices may be substituted with a single computer-based device. Accordingly, the various functionality that is described as being possessed by more than one device or article may alternatively be possessed by a single device / article.
  • Devices that are described as in communication with each other need not be in continuous communication with each other, unless expressly specified otherwise. On the contrary, such devices need only transmit to each other as necessary or desirable, and may actually refrain from exchanging data most of the time. For example, a machine in communication with another machine via the Internet may not transmit data to the other machine for long period of time (e.g. weeks at a time).
  • devices that are in communication with each other may communicate directly or indirectly through one or more intermediaries.
  • process may be described singly or without reference to other products or methods, in an embodiment the process may interact with other products or methods.
  • interaction may include linking one business model to another business model.
  • Such interaction may be provided to enhance the flexibility or desirability of the process.
  • a product may be described as including a plurality of components, aspects, qualities, characteristics and / or features, that does not indicate that any or all of the plurality are preferred, essential or required.
  • Various other embodiments within the scope of the described invention(s) include other products that omit some or all of the described plurality.
  • An enumerated list of items does not imply that any or all of the items are mutually exclusive, unless expressly specified otherwise.
  • an enumerated list of items does not imply that any or all of the items are comprehensive of any category, unless expressly specified otherwise.
  • the enumerated list "a computer, a laptop, a PDA" does not imply that any or all of the three items of that list are mutually exclusive and does not imply that any or all of the three items of that list are comprehensive of any category.
  • V. Computing It will be readily apparent to one of ordinary skill in the art that the various processes described herein may be implemented by, e.g., appropriately programmed general purpose computers, special purpose computers and computing devices. Typically a processor (e.g., one or more microprocessors, one or more microcontrollers, one or more digital signal processors) will receive instructions (e.g., from a memory or like device), and execute those instructions, thereby performing one or more processes defined by those instructions. Instructions may be embodied in, e.g., a computer program.
  • a processor e.g., one or more microprocessors, one or more microcontrollers, one or more digital signal processors
  • Instructions may be embodied in, e.g., a computer program.
  • a “processor” means one or more microprocessors, central processing units (CPUs), computing devices, microcontrollers, digital signal processors, or like devices or any combination thereof.
  • a description of a process is likewise a description of an apparatus for performing the process.
  • the apparatus that performs the process can include, e.g., a processor and those input devices and output devices that are appropriate to perform the process.
  • programs that implement such methods may be stored and transmitted using a variety of media (e.g., computer readable media) in a number of manners.
  • media e.g., computer readable media
  • hard- wired circuitry or custom hardware may be used in place of, or in combination with, some or all of the software instructions that can implement the processes of various embodiments.
  • various combinations of hardware and software may be used instead of software only.
  • Non-volatile media include, for example, optical or magnetic disks and other persistent memory.
  • Volatile media include dynamic random access memory (DRAM), which typically constitutes the main memory.
  • Transmission media include coaxial cables, copper wire and fiber optics, including the wires that comprise a system bus coupled to the processor.
  • Transmission media may include or convey acoustic waves, light waves and electromagnetic emissions, such as those generated during radio frequency (RF) and infrared (IR) data communications.
  • RF radio frequency
  • IR infrared
  • Common forms of computer- readable media include, for example, a floppy disk, a flexible disk, hard disk, magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical medium, punch cards, paper tape, any other physical medium with patterns of holes, a RAM, a PROM, an EPROM, a FLASH-EEPROM, any other memory chip or cartridge, a carrier wave as described hereinafter, or any other medium from which a computer can read.
  • data may be (i) delivered from RAM to a processor; (ii) carried over a wireless transmission medium; (iii) formatted and / or transmitted according to numerous formats, standards or protocols, such as Ethernet (or IEEE 802.3), SAP, ATP, BluetoothTM, and TCP/IP, TDMA, CDMA, and 3G; and / or (iv) encrypted to ensure privacy or prevent fraud in any of a variety of ways well known in the art.
  • a description of a process is likewise a description of a computer- readable medium storing a program for performing the process.
  • the computer- readable medium can store (in any appropriate format) those program elements which are appropriate to perform the method.
  • embodiments of an apparatus include a computer / computing device operable to perform some (but not necessarily all) of the described process.
  • a computer- readable medium storing a program or data structure include a computer-readable medium storing a program that, when executed, can cause a processor to perform some (but not necessarily all) of the described process.
  • databases are described, it will be understood by one of ordinary skill in the art that (i) alternative database structures to those described may be readily employed, and (ii) other memory structures besides databases may be readily employed. Any illustrations or descriptions of any sample databases presented herein are illustrative arrangements for stored representations of information. Any number of other arrangements may be employed besides those suggested by, e.g., tables illustrated in drawings or elsewhere. Similarly, any illustrated entries of the databases represent exemplary information only; one of ordinary skill in the art will understand that the number and content of the entries can be different from those described herein. Further, despite any depiction of the databases as tables, other formats (including relational databases, object-based models and / or distributed databases) could be used to store and manipulate the data types described herein. Likewise, object methods or behaviors of a database can be used to implement various processes, such as the described herein. In addition, the databases may, in a known manner, be stored locally or remotely from a device which accesses data in such a database.
  • Various embodiments can be configured to work in a network environment including a computer that is in communication (e.g., via a communications network) with one or more devices.
  • the computer may communicate with the devices directly or indirectly, via any wired or wireless medium (e.g. the Internet, LAN, WAN or Ethernet, Token Ring, a telephone line, a cable line, a radio channel, an optical communications line, commercial on-line service providers, bulletin board systems, a satellite communications link, a combination of any of the above).
  • Each of the devices may themselves comprise computers or other computing devices, such as those based on the Intel® Pentium® or CentrinoTM processor, that are adapted to communicate with the computer. Any number and type of devices may be in communication with the computer.
  • a server computer or centralized authority may not be necessary or desirable.
  • the present invention may, in an embodiment, be practiced on one or more devices without a central authority.
  • any functions described herein as performed by the server computer or data described as stored on the server computer may instead be performed by or stored on one or more such devices.
  • the process may operate without any user intervention.
  • the process includes some human intervention (e.g., a step is performed by or with the assistance of a human).
  • a limitation of the claim which does not include the phrase “means for” or the phrase “step for” means that 35 U.S. C. ⁇ 112, paragraph 6 does not apply to that limitation, regardless of whether that limitation recites a function without recitation of structure, material or acts for performing that function.
  • the mere use of the phrase "step of or the phrase "steps of in referring to one or more steps of the claim or of another claim does not mean that 35 U.S. C. ⁇ 112, paragraph 6, applies to that step(s).
  • Computers, processors, computing devices and like products are structures that can perform a wide variety of functions. Such products can be operable to perform a specified function by executing one or more programs, such as a program stored in a memory device of that product or in a memory device which that product accesses. Unless expressly specified otherwise, such a program need not be based on any particular algorithm, such as any particular algorithm that might be disclosed in the present application. It is well known to one of ordinary skill in the art that a specified function may be implemented via different algorithms, and any of a number of different algorithms would be a mere design choice for carrying out the specified function.
  • structure corresponding to a specified function includes any product programmed to perform the specified function.
  • Such structure includes programmed products which perform the function, regardless of whether such product is programmed with (i) a disclosed algorithm for performing the function, (ii) an algorithm that is similar to a disclosed algorithm, or (iii) a different algorithm for performing the function.
  • one structure for performing this method includes a computing device (e.g., a general purpose computer) that is programmed and / or configured with appropriate hardware to perform that function.
  • a computing device e.g., a general purpose computer
  • Also includes a computing device e.g., a general purpose computer
  • a computing device e.g., a general purpose computer
  • a computing device that is programmed and / or configured with appropriate hardware to perform that function via other algorithms as would be understood by one of ordinary skill in the art.
  • a gaming system 100 includes at least one computing device, such as a remote computer 118, e.g., a server computer, a gaming device 113, or a combination thereof, which may reside in whole or in part within the domain of a gaming service provider 120.
  • the gaming provider 120 may be the proprietor of a casino and the gaming system 100 may be physically within the geographic boundaries of the casino.
  • the computing device e.g., the remote computer 118 and/or the gaming device 113, may be the remote from the casino.
  • the gaming system 100 may allow users to engage in gaming services and access the other services disclosed herein from remote and/or mobile locations relative to the gaming service provider 120 or relative to the casino.
  • the computing device generally includes at least one processor 102, and a memory 104, such as ROM, RAM, FLASH, etc., or any computer readable medium 106, such as a hard drive, a flash-drive, an optical or magnetic disk, etc.
  • the memory 104 or computer readable medium 106 preferably includes software stored thereon that when executed performs one or more steps of the methods disclosed herein, including communicating data back and forth between devices, displaying interface screens, etc.
  • the computing device may also be associated with or have access to one or more databases for retrieving and storing the various types of data discussed herein, including identity verification data, such as an ID and password, physical biometric data, etc., user continuity data, such as behavioral biometric data, proficiency data, player pattern data, etc., and user profile data, such as the user's names, identification number, address, credit or debit card data, account balances, user preferences, device preferences, etc.
  • identity verification data such as an ID and password
  • physical biometric data such as physical biometric data, etc.
  • user continuity data such as behavioral biometric data, proficiency data, player pattern data, etc.
  • user profile data such as the user's names, identification number, address, credit or debit card data, account balances, user preferences, device preferences, etc.
  • the system 100 includes a plurality of computing device, such as a remote computer 118 coupled to at least one gaming device 113 over a communication network 116, which are generally configured or otherwise capable of transmitting and/or receiving communications to and/or from each other.
  • the term remote in this context merely means that the remote computer 118 and the gaming device are separate from each other. Thus, the devices may be remote even if the devices are located within the same room.
  • the gaming device 113 is preferably configured or otherwise capable of transmitting and/or receiving communications to and/or from the remote computer 118. This may be accomplished with a communication element 124, such as a modem, an Ethernet interface, a transmitter/receiver, etc., that enables communication with a similarly equipped remote computer 118, wirelessly, wired, or a combination thereof. It is understood that the relative functionality described herein may be provided by the remote computer 118, by the gaming device 113, or both, and is thus not limited to any one implementation discussed herein.
  • the gaming devices 113 may include, without limitation, a mobile phone, PDA, pocket PC, personal computer, as well as any special or general purpose gaming device, such as a slot machine, a video poker machine, video or computer-based versions of table games, e.g., roulette, blackjack, etc.
  • the gaming device 113 preferably includes a processor 122, a memory 123, a display 125, such as a CRT or an LCD monitor, for displaying information and/or graphics associated with the services provided by the gaming system 100, and at least one input device, such as a mouse, a touch-sensitive pad, a pointer, a stylus, a trackball, a button, e.g., alphanumeric, a scroll wheel, a touch-sensitive monitor, etc., or a combination thereof, for users to enter commands and/or information relevant to the gaming system services.
  • a processor 122 a memory 123
  • a display 125 such as a CRT or an LCD monitor
  • at least one input device such as a mouse, a touch-sensitive pad, a pointer, a stylus, a trackball, a button, e.g., alphanumeric, a scroll wheel, a touch-sensitive monitor, etc., or a combination thereof, for users to enter commands and/or information relevant to
  • the gaming device 113 includes or is otherwise associated with at least one biometric sensor 120.
  • the biometric sensor 120 is any device that is used to determine directly from the user at least one item of biometric data associated with a user, such as a fingerprint reader, an iris scanner, a retinal scanner, a vascular pattern reader, a facial recognition camera, etc.
  • the biometric sensor 120 may be embodied in hardware, software, or a combination thereof.
  • the biometric sensor 120 may further share resources with other components of the gaming device 113, such as the processor 122, memory 123, a camera, a microphone, a speaker, etc.
  • a single biometric sensor 120 may be used for reading more than one type of biometric data.
  • a digital camera may be used to obtain an image of the user's eye for iris scanning and an image of the user's face for facial recognition.
  • a single image capture of the user's face may provide the data for facial recognition as well as data for iris or retinal comparisons.
  • the biometric data is generally obtained with the biometric sensor 120 and used at least to verify the identity of the user as a gateway for allowing the user to access the services provided with the gaming device 113 and/or the remote computer 118.
  • biometric data may be compared with previously obtained/stored physical biometric data that has preferably been authenticated as being associated with a particular authorized user, and access to the gaming system's services may be provided based on a positive match thereof.
  • the biometric sensor 120 may also obtain behavioral biometric data, such as blood pressure, heart or pulse rate, body temperature data, speech, handwriting, keystrokes, body movements, etc.
  • the behavioral biometric data may be analyzed to determine whether there has been a user change or otherwise verify that there has not been a break in user continuity at any time following verification of a user's identify following initial validation with, e.g., the physical biometric data, or ID and password.
  • a user's identity may be verified with a fingerprint reader and access may be provided thereafter to the services provided by the gaming system 100, e.g., for a predetermined period of time or until some predetermined event, such as the gaming device 113 being turned off, the device 113 being moved outside an approved gaming area, etc.
  • the gaming system 100 may thereafter monitor behavioral biometric data with the device and prompt the user for physical biometric data or other identity verification data if it is determined from the behavioral data collected following identity verification that there may have been a change in the users of the device.
  • the user's heart rate or body temperature may be monitored following initial verification to determine if there are any changes in the data stream, e.g., in consecutive data readings, that may be attributed to a change in users, such as a sudden change in heart rate or temperature (either lower or higher) in a relatively short amount of time, e.g., in 5 seconds or less, or a break in the data, e.g., a null reading for one or more consecutive data readings, or a combination thereof.
  • a sudden change in heart rate or temperature either lower or higher
  • a relatively short amount of time e.g., in 5 seconds or less
  • a break in the data e.g., a null reading for one or more consecutive data readings, or a combination thereof.
  • the behavioral biometric data collected may be analyzed for any recognizable pattern that may indicate a user change.
  • the data collected may be analyzed without reference to data collected previously, e.g. prior to the initial or an immediately preceding identity verification, or based on historic biometric data, e.g., data collected prior to the initial or the immediately preceding identity verification, for particular individuals or for a group of individuals.
  • a heart rate reading either above or below an average heart rate computed based on historic data for an authorized user may trigger the system 100 to prompt the user for identity verification data, such as for a user ID and password, or physical biometric data.
  • a heart rate reading following a null reading in the data stream that is either below or above a heart rate reading before the break in the data stream may also trigger the prompt for identity verification data.
  • different peak heart rates in general or keyed to specific gaming events such as at the time the user places a bet, wins or loses a wager, etc., may also trigger the prompt for identity verification data in order for the user to continue using the services of the system 100.
  • the biometric data for establishing the data stream may be obtained repeatedly, such as continuously, cyclically, periodically, e.g., every second, minute, etc.
  • Pattern recognition may be applied to user continuity data other than behavioral biometric data, including data indicative of a user's proficiency with the system and/or the services provided by the system.
  • the system may track the keystroke rate of a user in general or for particular services, e.g., games, and determine if the keystroke rate of a user following identity verification differs from the keystroke data obtained within the betting session following verification or from data obtained prior to the verification.
  • Other proficiency data may be tracked to determine if there may have been a change in the user of the system 100, such as the rate at which the user navigates through the menus, false selections of menus or menu items, etc.
  • Keystroke data may be mapped or certain events, such as wins or losses, as a measure for reducing false positives as a result of different keystroke rates that may be attributed to user nervousness.
  • a prompt for identity verification data may also be triggered based on a determination that there may have been a change in the user based on the proficiency data collected.
  • the gaming system 100 may also verify user continuity by tracking the playing pattern of a user and prompting the user for identity verification data based on gaming commands or requests that deviate or are inconsistent from the playing pattern associated with the user.
  • the system 100 may prompt the user for verification data, such as physical biometric data, if the user makes a wager of $500 or any appreciable amount above the highest wager, such as 5% or greater than the highest wager.
  • the system 100 may track the user's response to wins or losses and prompt the user for identity verification data on any deviation therefrom. For example, a user may establish a pattern of placing a higher wager on every win and lowering the wager on a loss.
  • the system 100 may, upon comparing playing pattern data obtained previously and current playing pattern data and determining therefrom that a wager deviates from the pattern of wagers for the particular authorized user, prompt the user for identity verification data before the user is allowed to continue accessing the services provided by the system 100. Continuity may also be tracked with an authentication device as discussed below.
  • the system 100 may track the user continuity data, e.g., behavioral biometric, proficiency, playing pattern, as well as any other variable type data obtained from users for a sufficient amount of time to collect a data set for the comparisons discussed above.
  • the amount of data in the data set for the comparison will generally vary based on the type of data and the desired sample set for the comparison. For example, in determining whether there may have been a user change based on a change in consecutive data readings, such as when there is a break in the data stream, the amount of data necessary for the comparison generally includes two consecutive readings: a first reading followed by a second reading having an appreciable value, e.g., 5% or greater, above or below the first reading.
  • the amount of data necessary for the comparison includes at least two non-consecutive readings: a first reading at a time to classify the data as historic data, e.g., prior to the then current physical biometric identity verification, and a second more recent reading, e.g., after the then current physical biometric identity verification, having an appreciable value above or below the first reading.
  • a larger data set in certain instances, may yield greater accuracy or less false prompts for additional data (false positives).
  • comparison of a current reading with, e.g., the average of 5 prior readings may result in less false positives in that the average value will tend to diminish the impact of noise in the data set for the comparison.
  • the system 100 may filter noise from the data set for the comparison.
  • the system 100 may, for example, filter improbable data, such as temperature readings less 90 degrees F and greater than 110 degrees F, heart rates less than 40 bpm and greater than 180 bpm, etc.
  • the system 100 triggers the prompt for identity verification data based at least on a configurable level of confidence associated with the comparison.
  • the level of confidence may be set, e.g., by a system administrator or by the user.
  • the level of confidence may be set in any manner including by adjusting variables that factor into the confidence or the probability of a false positive or negative, as the case may be, such as the difference between the data that will trigger the prompt for identity verification data, the amount of data in the data set used for the comparison, the filters used to filter noise from the data set for the comparison, etc.
  • the system 100 tracks data indicative of a false positive, which may be used as a basis for adjusting variables associated with the data set, the data set filters, the difference between the data that triggers the prompt, etc., and/or algorithms used to trigger the prompt for identity verification data.
  • False positive data generally includes a positive verification of the user's identity in response to a prompt for identity verification data following a trigger.
  • the data indicative of the false positive may further include the amount of time between the prompt and the positive verification, or any other data which may indicate that the positive verification of the user's identity is attributed to a user change back to the authorized user, including the data believed to be suspect.
  • the data resulting in a false positive, prompting the user for identity verification data may further be input into a neural network which adjusts the variables associated with the data set, the data set filter, algorithms, etc. accordingly.
  • data indicative of true positives may also be input into the neural network.
  • the neural network may be trained using supervised, unsupervised learning, and reinforced learning techniques, or a combination thereof. With supervised techniques, the neural network is supplied sets of example pairs, e.g., data reading(s) and an indication of the data reading(s) is/are false or true positive, and the neural network infers a mapping implied by the data.
  • the neural network is supplied with data and the neural network derives therefrom a mapping without the aid of the false or true positive indications, such as based on statistical modeling, filtering, blind source separation, clustering, etc.
  • the data is derived generally from interactions within the system and observations made therefrom.
  • any of the data discussed herein may be supplied to the neural network to adjust the size of the data set, vary the data set filter values, the difference between the readings that trigger the prompt, etc., as the case may be, to achieve a desired confidence, such as greater than 85% or greater accuracy.
  • the data resulting in a false positive maybe fed into a support vector machine, which classifies the data using a supervised machine learning technique.
  • Image type data may further be preprocessed prior to being introduced into the neural network or the support vector machine to create an abstract representation of the image that is dimensionally smaller than the image data. Preprocessing may be performed using statistical techniques, such linear discriminant analysis techniques.
  • the system 100 may detect various types of errors and may further categorize the types of errors in one of a plurality of categories, such as a type I error, a type II error, etc. The categories may be derived based on the severity of the error or any other characterization scheme.
  • a false identity verification with physical biometric data may be classified as a type I error which has greater weight than a false identity verification with behavioral biometric data classified as a type II error.
  • the manner in which the system 100 responds to errors may be class dependent.
  • the system 100 may favor certain classes of errors and respond, e.g., aggressively or favorably, based on the class of the error.
  • the system may block all access with type I errors while providing continued access for type II errors until a configurable tolerance has been crossed. For instance, continued access may be provided until a certain number of type II errors have been registered, e.g., 3 or more type II errors.
  • type II errors favor permitting rather than excluding game play in comparison to type I errors.
  • the classification and the threshold maybe be either administrator or user configurable. Additionally, users may be limited to only configuring the classification of certain errors and thresholds more restrictively . For example, users may be limited to only adding default type II errors into type I error class with a more aggressive response that type II errors. Similarly, the user configuration with regard to the threshold may be limited to only reducing the threshold, e.g., to 2 instead of 3 type II errors, before accesses is blocked. All user configurations may be stored in a user profile in one or more databases associated with the gaming system 100. The thresholds and/or classifications may be location specific. For example, the thresholds for certain types of errors while in a hotel restaurant may be relaxed to account for the user engaging in other activity, such as eating.
  • the gaming system 100 may provide users with access to various types of services including one or more of a plurality of different types of games, e.g., card games; slot-machine style games; craps; other casino-style games; table games, such as poker, craps, roulette, blackjack, baccarat, etc.; the wheel of fortune game; keno; sports betting; horse, dog, or auto racing; jai alai; lottery-type games, including video versions of scratch off lotteries.
  • a plurality of different types of games e.g., card games; slot-machine style games; craps; other casino-style games; table games, such as poker, craps, roulette, blackjack, baccarat, etc.; the wheel of fortune game; keno; sports betting; horse, dog, or auto racing; jai alai; lottery-type games, including video versions of scratch off lotteries.
  • games e.g., card games; slot-machine style games; craps; other casino-style games; table games, such as poker, crap
  • the system 100 may provide game play based on the outcome of any type of event, such as sporting events and athletic competitions, including football, basketball, baseball, golf, etc., and non-sporting events, such as on the movement in particular financial markets, indexes, or securities, political elections, entertainment industry awards, box office performance of movies, weather events, etc.
  • the games may be provided both with and without wagering, or with simulated wagering using points that may be traded in for prizes.
  • the gaming system 100 may also provide non-gaming services, e.g., on the gaming device 113, such as audio and video entertainment, news, messaging, telephone, IP telephony, etc.
  • the gaming system 100 may be implemented over any type of communications network 116, such as a local area network (LAN), a wide area network (WAN), the Internet, a telephone network (POTS), a wireless network, including cellular, WiFi, and WiM ax networks, or a combination of wired and/or wireless networks.
  • the communications network 116 may be entirely independent of the Internet.
  • the system 100 may alternatively limit the information transmitted over the Internet to that with little or no security risk, or that which has been encrypted.
  • the gaming system 100 may, in certain embodiments, allow users to access services provided by the system from one or more of a plurality of remote locations.
  • the system 100 may also allow users to access the services of the system 100 with the device 113 while mobile or transient.
  • the gaming system 100 may allow users to access services in any location within a service area 148, such as within the vicinity of a hotel.
  • Service area 148 may further be broken down into a plurality of sub-areas 140, 146, such as the casino of a hotel vs. general occupancy areas, e.g., the lobby, the pool, the gym, etc.
  • the service area 148 in the broadest sense, includes any location within the communication capability of the system 100.
  • service area 148 for services provided over the Internet includes any location with access to the Internet.
  • service area 148 for services provided by wireless communication includes any locations within the transmission range of the transmitter and/or reception range of the receiver.
  • the service area 148 may be limited artificially by the system provider and/or the user within certain geographic boundaries.
  • the system provider may limit the service area to within one or more states, cities, municipalities, hotels in a city or municipality, areas within the hotel, such as the casino area, etc., or a combination thereof.
  • the system 100 may provide services to users in a disjointed area 140, as shown in FIG.
  • the service provider provides services in one state, such as Nevada, and one or more cities in another state, such as in Atlantic City, NJ, or in any one or more hotels within a city.
  • User defined location access limits may be stored in a user profile in a database associated with the system 100.
  • the system 100 has a location verification feature, which is discussed below in greater detail.
  • the location verification feature may be used to permit or block users from accessing the services provided by the system 100 based on the particular location of, e.g., the gaming device 113.
  • services may be enabled when it is determined that the location of the gaming device 113 is within a pre-defined area 140, such as within the area of a hotel that provides the services disclosed herein, or disabled when the device 113 is moved to a location outside of the area 140.
  • the location verification feature may also be used to disable fewer than all of the services of the gaming system 100 based on the location of the device 113.
  • the system 100 may limit wager-type gaming to areas where such gaming is permitted by law, such as to the casino area of a hotel, whereas non- wagering services, such as messaging, may be enabled irrespective of the location of the device 113. Particular services may also be enabled or disabled by the provider and/or the user based on the location of the device. For example, the user may be allowed to disable non- wagering services, such as messaging, when the user is within the wagering area, such as the casino, and/or during certain events, such as when the user is engaged in game play. As with the classification and threshold limitations discussed above, the user may only be allowed to specify more restrictive service limitations and thus may not be able to override certain limitations imposed by the service provider.
  • the user may not be allowed to enable wager-type gaming in areas where that type of gaming is has been disabled by the service provider.
  • the user defined service limitations may be stored in a user profile in a database associated with the system 100.
  • the gaming system 100 provides services in at least two areas 140, 146 each of the areas having a different level of surveillance than the other.
  • the level of surveillance may be quantified based on any scheme indicative of the effectiveness with regard to determining whether an authorized user is in fact using the gaming system 100 or that the gaming system 100 is being used properly.
  • the level may be established based on the number of measures implemented in this regard. For example, the level of surveillance for an area using face recognition and human surveillance may be deemed greater than an area with only fingerprint scanning.
  • certain measures may be given greater weight, e.g., based on the reliability of the measure.
  • a fingerprint scan may have a greater reliability or accuracy in verifying the identity of a user than an iris scan.
  • the weight of a particular measure may be independent of its reliability and may simply be based on a subjective confidence in the measure, e.g. of the user or the service provider, relative to other measures.
  • the surveillance level may have nominal designations indicative of overall effectiveness and/or confidence. For example, the level of an area may be classified as being A, B, C, ..., Z; low, medium, high, or as a Type I, II, III, ...
  • the surveillance level may also be distinguished using finer nominal designations, such as 0 % to 100 % in increments of 1, 0.1, 0.01, ...
  • the system 100 provides access based on the surveillance level of the area the gaming system 100 is being accessed from, e.g., the location of the gaming device 113. That is, surveillance based access may allow access to one or more services if there is a sufficient level of surveillance, defined by either the system provider and/or the user. In this respect, surveillance based access may be implemented in any one of a number of ways. The system may, for instance, provide wager-type gaming services only if the level of security associated with the access area satisfies a minimum level.
  • a user may limit wager-type gaming with system 100 to areas having no less that a type I surveillance level, such as a casino.
  • wager-type gaming will be disabled in type II surveillance level or less areas, such as hotel common areas, e.g., the pool, the hotel lobby, and non-common areas, such as hotel rooms.
  • the system 100 supplements the surveillance of the area with surveillance measures available with the system 100 to achieve the desired surveillance level.
  • the system 100 may increase the surveillance level of type II areas to type I for wager-type gaming by prompting the user for identity verification data and/or collect user continuity data thereby adding to the surveillance level of type II areas sufficient to classify the area with the combined area and device surveillance measures as a type I or better.
  • the system 100 may allow the user to access services in higher surveillance areas, such as casinos, without biometric data while requiring biometric data with the device in areas with lesser surveillance, such as the hotel courtyard.
  • surveillance based access limitations may be stored in a user profile in a database associated with the system 100.
  • the system 100 may maintain a plurality of different types of data, such as physical biometric data, behavioral biometric data, proficiency data, playing pattern data, etc., for identity verification purposes for each authorized user.
  • the system 100 preferably verifies the identity of a user before allowing the user to access at least one of the services provided therewith.
  • the system may require that the user submit at least one item of identity verification data, such as an ID and password combination, or any one of the physical biometric data items discussed herein, etc.
  • the system may further require from the user at least one additional item of identity verification data for system access.
  • the system maintains at least one item of redundant verification data. The requirement for additional verification data may be implemented in certain but not all instances.
  • additional verification data may be required in certain areas of a hotel, such as those with lesser surveillance or reliability as discussed above.
  • the system 100 may prompt the user for a first and a second item of verification data, such as at least two of: a facial image, an iris scan, a retinal scan, a fingerprint scan, a vascular pattern scan, etc., before allowing the user to access the system services.
  • the surveillance level or reliability associated with each of the measures may be added to achieve a desired surveillance level or reliability as indicated above.
  • the user may generally customize any of the aspects of the services provided by the system 100 or any other customizable aspect of the system 100, including classification and threshold configurations, and service, location, and surveillance based access limits.
  • customization generally allows users to vary the level of security, e.g., above a minimum set by a service provider, to a level based on the user's comfort level and/or the location where services are being accessed. For example, if the user only intends to access the system 100, e.g., the gaming device 113, at a particular casino, the user may configure the system 100 to require biometric data at any time the gaming device is used at a off the premises of the particular casino, e.g., at another casino. This feature may be used to prevent a situation where a thief steals the gaming device 113 and attempts to access services at another casino.
  • the services may be customized for each device 113 individually or for groups of devices.
  • the system 100 may further be configured to encrypt data, such as the physical biometric data, before it is communicated from the gaming device 113 to the remote computer 118 over network 116 for authentication.
  • data such as the physical biometric data
  • this is accomplished with a one-way encryption algorithm that encrypts, e.g., the identity verification data, to produce a string of alphanumeric characters having a length, such as 100 or greater, from, in certain instances, image data.
  • the string may then be communicated to the remote computer 118 for verification, which is compared with data in the user's profile.
  • the remote computer 118 preferably does not store any identity verification data in the raw form, i.e., unencrypted. Rather, the remote computer stores the post encryption string of characters for the validation.
  • the gaming device 113 may also be configured so that the raw and/or the encrypted identity verification data is not stored permanently and/or to purged periodically, following validation, when the data is transmitted successfully to the remote computer 113, or at any other time the data is no longer needed for the immediate validation. Therefore, in this instance, the gaming device 113 will be required to obtain and/or encrypt identity verification data anew each time there is a prompt for such data.
  • the system 100 may also disable access thereto with a hard check mechanism. That is, device 113 may include a reader 150 that obtains information from a corresponding authentication device 155.
  • the authentication device 155 may be any item for storing information thereon, such as a card which bears a magnetic strip, such as a credit card, a key that includes an RFID transponder, a limited-distance signal emitter or other transponder, a smart card, a bracelet or wristband which includes a signal transmitter, such as an RFID signal transmitter, or which includes a magnetically encoded signal, a substrate that bears a bar code or other optically readable identifier, or any combination thereof.
  • the reader 150 may be a magnetic strip reader, an RF or infrared receiver, an optical scanner, etc.
  • the gaming device 113 may therefore be capable of detecting a signal from the authentication device 155 and the system 100 may enable system access based on the signal from the authentication device 155. Continued access may also be conditioned on the gaming device 113 receiving continuing to detect the signal from the authentication device 155.
  • the signal produced by authentication device 155 may additionally or alternatively include information stored on the device 155, such as identity verification data, or any other data that may be used as a key for system access.
  • the authentication device 155 includes a token that is derived from the authorized user's biometric data, such as the string of alphanumeric characters derived from the user's biometrics.
  • the system 100 may then provide access based on a comparison of the string of characters derived from the biometric sensor reading and the string stored on the authentication device.
  • the data stored on the authentication device 155 may be used to authenticate the user without other identity verification data. That is, the authentication device data may be given greater weight and may thus be used as the primary data for identity verification.
  • all or some of the data discussed herein may be stored on the authentication device 155 and used as a basis for the comparison with data obtained for identity verification.
  • the device 155 may include physical biometric data, such as fingerprint data, that is compared with fingerprint data received for immediate identity verification.
  • the data used for the comparison may also be limited to being stored to areas only within the user's control, such as areas other than the authentication device 155 and/or the gaming device 113. Validation may therefore be accomplished locally between the gaming device 113 and the authentication device 155; without the transfer of identity verification data to the remote computer 118 for this purpose.
  • the validation may be accomplished between the remote computer 118 and the authentication device 155.
  • the functionality disclosed herein may be provided with software that resides on both the gaming communication device 113 and the remote computer 118.
  • Software resident on gaming communication device 113 is preferably operable to present information corresponding to the system services, including wagering and non- wagering type gaming to the user.
  • the information includes, without limitation, graphical and/or textual representations of objects associated with the services, e.g., in one or more interface screens, windows, and/or message boxes, with the presentation of selectable options related to the services, such as menus, icons, buttons, selectable areas, hyperlinks, etc.
  • the gaming device software is also preferably operable to receive data from the remote computer 118 and data input by the user.
  • Software resident on the remote computer 118 is preferably able to exchange data with the gaming device 118, access additional computers, and data storage devices, and perform all of the functions described herein, including providing the backend functionality for the services discussed herein as well those common to gaming systems.
  • the data discussed herein as being transmitted or used by the various devices of the gaming system 100 may be in any format, which is necessary or desirable for the services provided for the user.
  • the information may be transmitted in whole or in fractional portions thereof, in any format including digital or analog, text or voice, and according to any transport technology, which may include wired or wireless technologies.
  • Wireless technologies may include licensed or license-exempt technologies.
  • Some specific technologies which may be used include, without limitation, Code Division Multiple Access (CDMA), Global System for Mobile Communication (GSM), General Packet Radio Service (GPRS), WiFi (802.1 Ix), WiMax (802.16x), Public Switched Telephone Network (PSTN), Digital Subscriber Line (DSL), Integrated Services Digital Network (ISDN), or cable modem technologies.
  • CDMA Code Division Multiple Access
  • GSM Global System for Mobile Communication
  • GPRS General Packet Radio Service
  • WiFi 802.1 Ix
  • WiMax 802.16x
  • PSTN Public Switched Telephone Network
  • DSL Digital Subscriber Line
  • ISDN Integrated Services Digital Network
  • additional components may be used in the communication of information between the users and the gaming server.
  • additional components may include, without limitation, physical communication lines, trunks, antennas, switches, cables, transmitters, receivers, computers, routers, servers, fiber optical transmission equipment, repeaters, amplifiers, etc.
  • some or all of the data communication may take place through the Internet or without involvement of the Internet.
  • a portion of the information may be transmitted over the Internet while another portion of the information is communicated over a more secure network.
  • graphic files depicting a roulette table such as files in .gif or .jpg formats
  • gaming information such as the results from roulette wheel spin
  • gaming information may be communicated in a parallel network and assembled at the gaming device 113 for display together in a single interface screen.
  • the choice of which of the plurality of networks handle the split data may be based on the bandwidth of the network.
  • larger graphics files may be transmitted to device 113 over a WiMax network while smaller data files are transmitted over a cellular network.
  • the communication network 116 may be a cellular network 222.
  • Cellular network 222 comprises a plurality of base stations 223, each of which has a corresponding coverage area 225. Base stations may have coverage areas that overlap. Further, the coverage areas may be sectorized or non-sectorized.
  • the gaming device 113 is generally a mobile station 224, such as a cell phone, that may be transient within the network.
  • the mobile stations 224 communicate with the base stations 223 wirelessly via radio signals.
  • the base stations 223 generally communicate with, e.g., the remote computer 118, over landlines, such as POTS, T1-T3, ISDN, etc.
  • Each base station is preferably programmed to send and receive voice and/or data transmissions to and from mobile station.
  • the gaming device 113 may be coupled to the remote computer 118 with a private label cellular carrier.
  • the mobile stations 224 are preferably preprogrammed with the carrier's authentication software to establish a connection to the cellular network.
  • the location verification feature for determining the location of the gaming device 113 does so in relation to the location of at least one of the base stations of the cellular network. That is, the system 100 determines the location of the gaming device 113 based on the location of one or more base stations and the distance and/or the direction (azimuth) of the device 113 from at least one base station.
  • the distance may be determined based on the strength of the transmit signal received from gaming device 113. That is, the gaming system device's transmitter communicates at a fixed transmit power output.
  • the attenuation of the transmit signal is generally a function of the distance between the transmitter and the receiver.
  • the power of the signal received from the device 113 may be measured at the base station and the distance determined there from, e.g., calculated, or looked up in a database or table that maps distance to signal strength.
  • the direction may be determined based on the azimuth of the antenna receiving the signal from the device 113.
  • the direction may be determined based on the distance of the device 113 from a plurality of the base stations 223, such as two or three, using techniques, such as triangulation, multilateration, etc., as shown in FIG. 3.
  • Determining the location of the gaming device 113 based on the power level of the signal received form the gaming device is not limited to cellular network. Rather, the process is generally applicable to all types of wireless networks, including satellite, WiFi, GPS, LORAN, RFID, etc., where the location of the base stations are known and the location of the device 113 may be derived based on the distance from the base station.
  • the location verification feature is implemented using geo-fencing. That is, the location based access features disclosed herein are enforced based on the communication range of base stations in the wireless communication network.
  • the gaming system 100 may communicate with a plurality of gaming devices 354, 355, and 356.
  • Device 354 is shown located outside the gaming jurisdiction or area 358. Devices 355 and 356 are both located inside gaming area 58. However, only device 356 is located within sub-area or geo-fence 357, which is defined by the perimeter of the coverage areas of the plurality of base stations 353. Thus, geo-fencing may be used to enable access for device 356 but disable services for devices 354 and 355. Even though some gaming devices may be within the area 358, such as device 355, those devices may not be allowed to access the gaming system 100 based on its location in relation to geo-fence 357.
  • the base stations may be cellular base stations as discussed above or base stations having a relatively short range, such as WiFi or RFID transmitters/receivers, located within the premises of a hotel.
  • the short-range base stations may, for example, be set up within the service area in a grid pattern, e.g., in the ceiling of a facility, with sufficient separation to determine the location of the device.
  • Geo-fence 361 may be defined by the range of fewer than all of the base stations in the network, such as base station 360, which includes all of the base stations in a casino.
  • Geo- fence 360 may be a subset of the area of geo-fence 357 or excluded from area 357, which may include all of the base stations in a hotel.
  • location based access features such as classifications, thresholds, services, surveillance, etc., may be geo-fence specific.
  • Geo-fencing may further be combined with triangulation and/or other location verification techniques to determine the specific location of the device within the geo-fence. For example, the location of device 356 may be determined based on triangulation between three of the base stations 353.
  • the device 113 may include a global positioning satellite (GPS) chip that determines the location of the device based on signals received from GPS satellites.
  • GPS global positioning satellite
  • the GPS chip may stand alone, in which instance the GPS chip sends the GPS location data to other components of the device, such as the processor 122 and/or communication element 124, or part of a single computer chip that combines the function of the GPS chip with the other element.
  • the location verification feature may generally be implemented with an element, i.e., a location verification element, which is a component of the gaming device 113, the remote computer 118, any intermediary component there between, such as the base station or stations, or a combination thereof.
  • the location verification element may be implemented in hardware, software, or a combination thereof, and generally determines the location of the gaming device 113.
  • the gaming system 100 may periodically update the location determination information. This may be done, for example, during a gaming session, at predefined time intervals to ensure that movement of the gaming device 113 to an unauthorized area is detected during play, and not just upon login or initial access.
  • a method begins at 402 with initiating the gaming device 113. Initiation is dependent on the type of the gaming device 113. For example, initiation may simply be turning the device 113 or running an application, such as a browser application or special purpose software. In one embodiment, initiation includes communicating an initiation message from the device 113 to the system 100, e.g., the remote computer 118. The initiation message is generally interpreted by the system 100 as a first request for access. The initiation message may include information therein identifying the device and/or the user, such as a unique device identification number, e.g., for an initial access determination.
  • the unique device identification number may be serial number, a cell-phone number, an IP address, etc.
  • the system 100 displays at 404 a first interface screen in response to initiation, such as in response to the initiation message.
  • the first interface screen may be stored locally on the device 113 or communicate over the network 116 to the device 113 for display.
  • the nature of the first interface screen will vary depending on the circumstances. For instance, if the device 113 cannot establish link to the remote computer 113, the first interface screen may contain a message indicating as such.
  • the first interface screen may include at least one form element therein, such as a text box, for the user to enter an ID, a password, or a combination thereof to log into the system 100.
  • the ID and/or password may generally be used as a first level of identity verification and for providing users with user specific customized services.
  • the customized services may be device specific in which instance the device identification number may be used distinguish the particular device 113 from all other devices in the system.
  • the user and the device may at 140 be registered and activated for service, respectively.
  • the user is registered by receiving at 412 identity verification data, such as a user ID and password, name(s), identification number, address, credit card number(s), physical biometric data, e.g., a fingerprint scan, an iris scan, a retinal scan, a vascular pattern scan, a facial image, etc.
  • identity verification data may be authenticated with a third party provider, such as the relevant department of motor vehicles, a credit rating agency, etc.
  • User preference information may also be received at 414, such as preference information relating to error classifications and thresholds, location access limits, service limits, surveillance limits, etc.
  • the identity verification data may be encrypted and stored at 416 either with the remote computer 118 or the authentication device 155, as discussed above, and the device 113 may at 417 be activated for service. Once all the requisite and/or desired information is obtained, an appropriate service-type interface screen is displayed at 430.
  • the system 100 determines at 406 the location of the device 113.
  • the location of the device 113 may be determined in a variety of ways, as discussed above. In one embodiment, the location of the device 113 is determined based on the location of at least one base station with which the device 113 is in communication with wirelessly.
  • the base station may be a base station in a cellular network, a local WiFi router, an RFID transponder, etc.
  • the location of the device 113 may simply be an acknowledgement that the device 113 is communicating with at least one base station having a known location.
  • the location of the device 113 may be determined based further on the distance and direction of the device 113 from one or more base stations, e.g., based on the received signal power from the device transmitter.
  • the determination of the device location may also be accomplished with GPS technology.
  • the location of the device 113 may be communicated and/or received by the system 10 for use in providing services as discussed herein.
  • the location may be specified in terms of the coordinates, e.g., latitude and longitude, the base station communicating with the device, the class of base station the device is communicating with, e.g., base stations in the casino vs. those in the hotel, base stations in a wagering vs. non-wagering geo-fence areas, etc.
  • the system 100 determines at 418 the surveillance level associated with the location of the device 113. This may be accomplished, for instance by looking up the surveillance level in a table that includes surveillance level data mapped to the locations within the service area of the system 100. Alternatively or additionally, the surveillance level may be computed in real-time based on surveillance measures in place at that time. [0048] In one embodiment, the system 100 prompts the user for identity verification data, e.g. physical biometric data, based on the location and/or the surveillance level associated with the location of the device 113. In this instance, the system 100 implements a verification scheme based thereon.
  • identity verification data e.g. physical biometric data
  • the particular type and quantity of identity verification data required to access the services of the system 100 is based on the location and/or surveillance level associated with the location. For example, in a casino area the system 100 may not require any physical biometric verification for access whereas non-casino areas may require physical biometric verification with at least one item of physical biometric data. Similarly, certain common areas outside of the casino, identity verification may require further a second, redundant item of physical biometric data. In the context of the surveillance levels, areas with a type I surveillance may not require physical biometric verification whereas areas with type II surveillance may require at least one item of physical biometric data and areas with type III surveillance may further require at least one redundant item of physical biometric data. As noted above, the system 100 may implement a verification scheme to achieve a target surveillance level.
  • the system 100 may determine the surveillance level of the device location and require identity verification to the extent necessary to meet or exceed the target level. For example, at least one item of redundant verification data may be required to raise type II areas to a target type I. Similarly, at least two items of redundant verification data may be required to raise type III areas to target type I. [0049] Identity verification data may then be compared at 422 with the data stored previously, such as with the remote computer 118 and/or the authentication device 155. If identity verification fails at 424, the system 100 may prompt the user for reentry or additional data. If verification passes, the system 100 may at 426 determine if there are any location based service limits and at 428 determine any applicable user preferences related thereto.
  • the system 100 may determine which of the plurality of available services the user will be provided access to based on the location of the device and/or the surveillance level associated with the location. For example, the system 100 may provide access to all services, such as wagering, entertainment, news, messaging, telephone, IP telephony etc., in the casino, when the device 113 is located within the casino.
  • all services such as wagering, entertainment, news, messaging, telephone, IP telephony etc.
  • the system 100 blocks access to wagering services in certain areas, such as areas outside of the casino.
  • a service appropriate interface screen may be displayed for the user at the device 113. That is, the interface screen displayed for the user includes therein selectable options for accessing the enabled services. Non-enabled services will preferably be blacked out.
  • the interface screen may include menu items, icons, hyperlinks, selectable text and graphics, etc., for each of the enabled services that when selected causes a related interface screen to be displayed.
  • the system 100 may provide users with access to, e.g., video versions of table games, such as poker.
  • a related interface screen may include graphics for video poker, including playing card graphics, betting selections, etc.
  • the interface screens preferably include selectable elements for navigating through the service environment, e.g., for access to other services, and/or selectable elements for submitting gaming and wagering commands, such as hit, stay, hold, draw, bet, bet up, bet down, double down, etc.
  • the system 100 obtains data for determining whether or not there has been a user change following the prior identity verification.
  • a user change may be determined based on various types of data, such as behavioral biometric data, e.g., blood pressure, heart or pulse rate, body temperature data, speech, handwriting, keystrokes, body movements, etc., proficiency data, such as keystroke rate, menu item or icon selection rate, player pattern data, e.g., the magnitude and rate of gaming commands, wagering commands, etc.
  • behavioral biometric data e.g., blood pressure, heart or pulse rate, body temperature data, speech, handwriting, keystrokes, body movements, etc.
  • proficiency data such as keystroke rate, menu item or icon selection rate
  • player pattern data e.g., the magnitude and rate of gaming commands, wagering commands, etc.
  • the system 100 preferably determines if there is a change in the location of the device 113 at 438 and adjusts/enables the services accordingly.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Social Psychology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)

Abstract

La présente invention concerne des procédés et des systèmes correspondants destinés à accéder à des services sur un dispositif de jeu. Dans certains modes de réalisation, lesdits procédés comprennent une ou plusieurs étapes consistant à recevoir au moins un élément de données de vérification d'identité en provenance d'un utilisateur d'un dispositif de jeu, à activer au moins un service, tel qu'un jeu de type pari, sur le dispositif de jeu sur la base d'une correspondance entre le ou les éléments de données de vérification d'identité et au moins un élément de données de vérification d'identité précédemment obtenu, à afficher un écran d'interface comprenant des objets graphiques associés au jeu de type pari et au moins un élément sélectionnable permettant à l'utilisateur de soumettre une commande de jeu et une commande de pari pendant le jeu, à obtenir au moins un élément de données de changement d'utilisateur en provenance d'un utilisateur pendant le jeu, et à inviter l'utilisateur à fournir des données de vérification d'identité lorsqu'un changement d'utilisateur est suspecté sur la base du ou des éléments de données de changement d'utilisateur.
PCT/US2007/084669 2006-11-14 2007-11-14 Système d'accès biométrique sensible WO2008061138A2 (fr)

Priority Applications (6)

Application Number Priority Date Filing Date Title
EP07871467A EP2092462A4 (fr) 2006-11-14 2007-11-14 Système d'accès biométrique sensible
AU2007319235A AU2007319235A1 (en) 2006-11-14 2007-11-14 Biometric access sensitivity
NZ577177A NZ577177A (en) 2006-11-14 2007-11-14 A computer implemented method of detecting change of user during a wager type game using identity verification data and behavioural data
CA2669836A CA2669836C (fr) 2006-11-14 2007-11-14 Systeme d'acces biometrique sensible
JP2009537329A JP5681844B2 (ja) 2006-11-14 2007-11-14 賭け型ゲームのための方法及び装置
GB0910202A GB2458049B (en) 2006-11-14 2007-11-14 Biometric access sensitivity

Applications Claiming Priority (6)

Application Number Priority Date Filing Date Title
US11/559,829 US8645709B2 (en) 2006-11-14 2006-11-14 Biometric access data encryption
US11/559,829 2006-11-14
US11/559,484 2006-11-14
US11/559,484 US8510567B2 (en) 2006-11-14 2006-11-14 Conditional biometric access in a gaming environment
US11/559,933 US9411944B2 (en) 2006-11-15 2006-11-15 Biometric access sensitivity
US11/559,933 2006-11-15

Publications (2)

Publication Number Publication Date
WO2008061138A2 true WO2008061138A2 (fr) 2008-05-22
WO2008061138A3 WO2008061138A3 (fr) 2008-07-24

Family

ID=39402656

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2007/084669 WO2008061138A2 (fr) 2006-11-14 2007-11-14 Système d'accès biométrique sensible

Country Status (7)

Country Link
EP (1) EP2092462A4 (fr)
JP (6) JP5681844B2 (fr)
AU (1) AU2007319235A1 (fr)
CA (3) CA2928614C (fr)
GB (1) GB2458049B (fr)
NZ (2) NZ577177A (fr)
WO (1) WO2008061138A2 (fr)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012505717A (ja) * 2008-10-14 2012-03-08 プロテウス バイオメディカル インコーポレイテッド ゲーム環境に生理学的データを組み込む方法およびシステム
JP2012519894A (ja) * 2009-03-06 2012-08-30 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 少なくとも1の生物体の画像の処理
US8649765B1 (en) 2012-08-08 2014-02-11 Telefonaktiebolaget L M Ericsson (Publ) Communication apparatus using biometrics
US8847766B2 (en) 2005-04-28 2014-09-30 Proteus Digital Health, Inc. Pharma-informatics system
US8868453B2 (en) 2009-11-04 2014-10-21 Proteus Digital Health, Inc. System for supply chain management
US8932221B2 (en) 2007-03-09 2015-01-13 Proteus Digital Health, Inc. In-body device having a multi-directional transmitter
US8945005B2 (en) 2006-10-25 2015-02-03 Proteus Digital Health, Inc. Controlled activation ingestible identifier
US8956288B2 (en) 2007-02-14 2015-02-17 Proteus Digital Health, Inc. In-body power source having high surface area electrode
US8961412B2 (en) 2007-09-25 2015-02-24 Proteus Digital Health, Inc. In-body device with virtual dipole signal amplification
US9060708B2 (en) 2008-03-05 2015-06-23 Proteus Digital Health, Inc. Multi-mode communication ingestible event markers and systems, and methods of using the same
US9083589B2 (en) 2006-11-20 2015-07-14 Proteus Digital Health, Inc. Active signal processing personal health signal receivers
US9235683B2 (en) 2011-11-09 2016-01-12 Proteus Digital Health, Inc. Apparatus, system, and method for managing adherence to a regimen
US9603550B2 (en) 2008-07-08 2017-03-28 Proteus Digital Health, Inc. State characterization based on multi-variate data fusion techniques
US9756874B2 (en) 2011-07-11 2017-09-12 Proteus Digital Health, Inc. Masticable ingestible product and communication system therefor
US9883819B2 (en) 2009-01-06 2018-02-06 Proteus Digital Health, Inc. Ingestion-related biofeedback and personalized medical therapy method and system
US10084880B2 (en) 2013-11-04 2018-09-25 Proteus Digital Health, Inc. Social media networking based on physiologic information
US10096207B2 (en) 2013-03-15 2018-10-09 Cfph, Llc Kiosk for gaming
US10187121B2 (en) 2016-07-22 2019-01-22 Proteus Digital Health, Inc. Electromagnetic sensing and detection of ingestible event markers
US10223905B2 (en) 2011-07-21 2019-03-05 Proteus Digital Health, Inc. Mobile device and system for detection and communication of information received from an ingestible device
US10398161B2 (en) 2014-01-21 2019-09-03 Proteus Digital Heal Th, Inc. Masticable ingestible product and communication system therefor
US10441194B2 (en) 2007-02-01 2019-10-15 Proteus Digital Heal Th, Inc. Ingestible event marker systems
US10517506B2 (en) 2007-05-24 2019-12-31 Proteus Digital Health, Inc. Low profile antenna for in body device
US10529044B2 (en) 2010-05-19 2020-01-07 Proteus Digital Health, Inc. Tracking and delivery confirmation of pharmaceutical products
US10553073B2 (en) 2013-03-11 2020-02-04 Cg Technology Development, Llc Devices for gaming
US10668387B2 (en) 2013-03-11 2020-06-02 Cfph, Llc User registration
US11744481B2 (en) 2013-03-15 2023-09-05 Otsuka Pharmaceutical Co., Ltd. System, apparatus and methods for data collection and assessing outcomes
US11928614B2 (en) 2006-05-02 2024-03-12 Otsuka Pharmaceutical Co., Ltd. Patient customized therapeutic regimens

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9198608B2 (en) 2005-04-28 2015-12-01 Proteus Digital Health, Inc. Communication system incorporated in a container
US8296684B2 (en) * 2008-05-23 2012-10-23 Hewlett-Packard Development Company, L.P. Navigating among activities in a computing device
CA2928614C (fr) * 2006-11-14 2024-05-14 Cfph, Llc Systeme d'acces biometrique sensible
EP2973453A4 (fr) * 2013-03-11 2016-11-16 Cfph Llc Dispositifs de jeu
US20170236375A1 (en) * 2014-10-26 2017-08-17 Caesars Entertainment Operating Company, Inc. In-casino mobile gaming
CN109144221B (zh) * 2018-07-17 2021-08-24 Oppo广东移动通信有限公司 信息提示方法、存储介质及电子设备

Family Cites Families (40)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030177347A1 (en) * 1995-11-22 2003-09-18 Bruce Schneier Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
JPH09285454A (ja) * 1996-04-19 1997-11-04 Ikyo Kk 生体的信号の収集評価方法と健康管理通信網
US5977957A (en) * 1997-05-22 1999-11-02 Ericsson Inc. Adaptive sampling of touch screen input
US6783459B2 (en) * 1997-08-22 2004-08-31 Blake Cumbers Passive biometric customer identification and tracking system
JP2000137555A (ja) * 1998-11-02 2000-05-16 Sony Corp 情報処理装置及び方法並びに記録媒体
US6460848B1 (en) * 1999-04-21 2002-10-08 Mindplay Llc Method and apparatus for monitoring casinos and gaming
GB2356961A (en) * 1999-12-02 2001-06-06 Ibm Biometrics system
JP2001216270A (ja) * 2000-01-31 2001-08-10 Netmarks Inc 認証局、認証システム及び認証方法
JP2001212363A (ja) * 2000-02-03 2001-08-07 Oki Electric Ind Co Ltd ゲームセンタの決済方法及び決済システム
JP2001337928A (ja) * 2000-05-25 2001-12-07 Oki Electric Ind Co Ltd データ保存・呼び出しシステム
JP2002149611A (ja) * 2000-08-30 2002-05-24 Matsushita Electric Ind Co Ltd 認証システム,認証請求装置,検証装置及びサービス媒体
US7510474B2 (en) * 2001-04-10 2009-03-31 Carter Sr Russell Location based mobile wagering system
US8087988B2 (en) * 2001-06-15 2012-01-03 Igt Personal gaming device and method of presenting a game
US8282475B2 (en) * 2001-06-15 2012-10-09 Igt Virtual leash for personal gaming device
US7918728B2 (en) * 2001-06-15 2011-04-05 Igt Personal gaming device and method of presenting a game
US7360689B2 (en) * 2001-07-10 2008-04-22 American Express Travel Related Services Company, Inc. Method and system for proffering multiple biometrics for use with a FOB
JP3846572B2 (ja) * 2001-09-20 2006-11-15 ソニー株式会社 固体撮像装置
US8337296B2 (en) * 2001-09-28 2012-12-25 SHFL entertaiment, Inc. Method and apparatus for using upstream communication in a card shuffler
US8597116B2 (en) * 2002-03-12 2013-12-03 Igt Virtual player tracking and related services
US8360838B2 (en) * 2006-07-03 2013-01-29 Igt Detecting and preventing bots and cheating in online gaming
JP2004038911A (ja) * 2002-07-05 2004-02-05 Kenichi Nishimoto アミューズメント又は、有料施設に於ける入退場管理システム
JP2004086441A (ja) * 2002-08-26 2004-03-18 Ntt Data Corp コンテンツ管理システム
US8123616B2 (en) * 2003-03-25 2012-02-28 Igt Methods and apparatus for limiting access to games using biometric data
JP2004334788A (ja) * 2003-05-12 2004-11-25 Minoru Ikeda 個人認証システム、認証装置、個人認証方法、プログラム、および、記録媒体
US20050049049A1 (en) * 2003-08-26 2005-03-03 Igt Cocktail table
CA2530696C (fr) * 2003-08-27 2014-10-21 John Thomas Flanagan Systeme et procede destines a faciliter un comportement responsable
DE10351317B4 (de) * 2003-10-31 2009-08-27 Siemens Ag Zugriffsverfahren für ein Bildretrievalsystem in einem nach dem Client/Server-Prinzip organisierten Datenübertragungsnetz, sowie Bildretrievalsystem
US8616967B2 (en) * 2004-02-25 2013-12-31 Cfph, Llc System and method for convenience gaming
NZ551140A (en) * 2004-04-07 2009-08-28 Phillip James Ryan Player controls
US7272728B2 (en) * 2004-06-14 2007-09-18 Iovation, Inc. Network security and fraud detection system and method
US7492925B2 (en) * 2004-06-25 2009-02-17 Intel Corporation Biometric identification data protection
JP2006039728A (ja) * 2004-07-23 2006-02-09 Nec Corp 認証システム及び認証方法
US8190907B2 (en) * 2004-08-11 2012-05-29 Sony Computer Entertainment Inc. Process and apparatus for automatically identifying user of consumer electronics
US7413513B2 (en) * 2004-09-10 2008-08-19 Igt Apparatus and methods for wireless gaming communications
US20060236395A1 (en) * 2004-09-30 2006-10-19 David Barker System and method for conducting surveillance on a distributed network
JP2006201839A (ja) * 2005-01-18 2006-08-03 Tokyo Denki Univ カメラ付き携帯電話を利用した電子投票システム
AU2006216723B2 (en) * 2005-02-21 2012-03-29 Cfph, Llc System and method for convenience gaming
JP4706317B2 (ja) * 2005-04-19 2011-06-22 ソニー株式会社 通信システム,通信方法および通信端末
JP2006302199A (ja) * 2005-04-25 2006-11-02 Hitachi Ltd 部分的にウィンドウをロックする情報処理装置およびこの情報処理装置を動作させるプログラム
CA2928614C (fr) * 2006-11-14 2024-05-14 Cfph, Llc Systeme d'acces biometrique sensible

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
None
See also references of EP2092462A4

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8847766B2 (en) 2005-04-28 2014-09-30 Proteus Digital Health, Inc. Pharma-informatics system
US11928614B2 (en) 2006-05-02 2024-03-12 Otsuka Pharmaceutical Co., Ltd. Patient customized therapeutic regimens
US10238604B2 (en) 2006-10-25 2019-03-26 Proteus Digital Health, Inc. Controlled activation ingestible identifier
US11357730B2 (en) 2006-10-25 2022-06-14 Otsuka Pharmaceutical Co., Ltd. Controlled activation ingestible identifier
US8945005B2 (en) 2006-10-25 2015-02-03 Proteus Digital Health, Inc. Controlled activation ingestible identifier
US9083589B2 (en) 2006-11-20 2015-07-14 Proteus Digital Health, Inc. Active signal processing personal health signal receivers
US10441194B2 (en) 2007-02-01 2019-10-15 Proteus Digital Heal Th, Inc. Ingestible event marker systems
US11464423B2 (en) 2007-02-14 2022-10-11 Otsuka Pharmaceutical Co., Ltd. In-body power source having high surface area electrode
US8956288B2 (en) 2007-02-14 2015-02-17 Proteus Digital Health, Inc. In-body power source having high surface area electrode
US8932221B2 (en) 2007-03-09 2015-01-13 Proteus Digital Health, Inc. In-body device having a multi-directional transmitter
US10517506B2 (en) 2007-05-24 2019-12-31 Proteus Digital Health, Inc. Low profile antenna for in body device
US8961412B2 (en) 2007-09-25 2015-02-24 Proteus Digital Health, Inc. In-body device with virtual dipole signal amplification
US9060708B2 (en) 2008-03-05 2015-06-23 Proteus Digital Health, Inc. Multi-mode communication ingestible event markers and systems, and methods of using the same
US9603550B2 (en) 2008-07-08 2017-03-28 Proteus Digital Health, Inc. State characterization based on multi-variate data fusion techniques
US11217342B2 (en) 2008-07-08 2022-01-04 Otsuka Pharmaceutical Co., Ltd. Ingestible event marker data framework
US10682071B2 (en) 2008-07-08 2020-06-16 Proteus Digital Health, Inc. State characterization based on multi-variate data fusion techniques
JP2012505717A (ja) * 2008-10-14 2012-03-08 プロテウス バイオメディカル インコーポレイテッド ゲーム環境に生理学的データを組み込む方法およびシステム
US9883819B2 (en) 2009-01-06 2018-02-06 Proteus Digital Health, Inc. Ingestion-related biofeedback and personalized medical therapy method and system
JP2012519894A (ja) * 2009-03-06 2012-08-30 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ 少なくとも1の生物体の画像の処理
US9941931B2 (en) 2009-11-04 2018-04-10 Proteus Digital Health, Inc. System for supply chain management
US10305544B2 (en) 2009-11-04 2019-05-28 Proteus Digital Health, Inc. System for supply chain management
US8868453B2 (en) 2009-11-04 2014-10-21 Proteus Digital Health, Inc. System for supply chain management
US10529044B2 (en) 2010-05-19 2020-01-07 Proteus Digital Health, Inc. Tracking and delivery confirmation of pharmaceutical products
US9756874B2 (en) 2011-07-11 2017-09-12 Proteus Digital Health, Inc. Masticable ingestible product and communication system therefor
US10223905B2 (en) 2011-07-21 2019-03-05 Proteus Digital Health, Inc. Mobile device and system for detection and communication of information received from an ingestible device
US9235683B2 (en) 2011-11-09 2016-01-12 Proteus Digital Health, Inc. Apparatus, system, and method for managing adherence to a regimen
US8649765B1 (en) 2012-08-08 2014-02-11 Telefonaktiebolaget L M Ericsson (Publ) Communication apparatus using biometrics
WO2014025299A1 (fr) * 2012-08-08 2014-02-13 Telefonaktiebolaget L M Ericsson (Publ) Appareil de communication utilisant la biométrie
US10553073B2 (en) 2013-03-11 2020-02-04 Cg Technology Development, Llc Devices for gaming
US10668387B2 (en) 2013-03-11 2020-06-02 Cfph, Llc User registration
US10688398B2 (en) 2013-03-11 2020-06-23 Cfph, Llc User registration
US11455862B2 (en) 2013-03-11 2022-09-27 Cg Technology Development, Llc Devices for gaming
US11389731B2 (en) 2013-03-11 2022-07-19 Cfph, Llc User registration
US10096207B2 (en) 2013-03-15 2018-10-09 Cfph, Llc Kiosk for gaming
US10964162B2 (en) 2013-03-15 2021-03-30 Cg Technology Development, Llc Kiosk for gaming
US11744481B2 (en) 2013-03-15 2023-09-05 Otsuka Pharmaceutical Co., Ltd. System, apparatus and methods for data collection and assessing outcomes
US10084880B2 (en) 2013-11-04 2018-09-25 Proteus Digital Health, Inc. Social media networking based on physiologic information
US10398161B2 (en) 2014-01-21 2019-09-03 Proteus Digital Heal Th, Inc. Masticable ingestible product and communication system therefor
US11950615B2 (en) 2014-01-21 2024-04-09 Otsuka Pharmaceutical Co., Ltd. Masticable ingestible product and communication system therefor
US10797758B2 (en) 2016-07-22 2020-10-06 Proteus Digital Health, Inc. Electromagnetic sensing and detection of ingestible event markers
US10187121B2 (en) 2016-07-22 2019-01-22 Proteus Digital Health, Inc. Electromagnetic sensing and detection of ingestible event markers

Also Published As

Publication number Publication date
EP2092462A2 (fr) 2009-08-26
GB2458049B (en) 2011-11-30
JP6678126B2 (ja) 2020-04-08
EP2092462A4 (fr) 2012-03-07
JP2017148537A (ja) 2017-08-31
AU2007319235A1 (en) 2008-05-22
JP2022179489A (ja) 2022-12-02
CA2928614A1 (fr) 2008-05-22
JP2010509031A (ja) 2010-03-25
JP5681844B2 (ja) 2015-03-11
JP7139370B2 (ja) 2022-09-20
CA2669836A1 (fr) 2008-05-22
NZ706217A (en) 2016-01-29
CA2669836C (fr) 2016-07-12
JP2020138029A (ja) 2020-09-03
CA3234218A1 (fr) 2008-05-22
GB2458049A (en) 2009-09-09
WO2008061138A3 (fr) 2008-07-24
JP6126044B2 (ja) 2017-05-10
JP2022106750A (ja) 2022-07-20
NZ577177A (en) 2012-11-30
JP2015042246A (ja) 2015-03-05
GB0910202D0 (en) 2009-07-29
CA2928614C (fr) 2024-05-14

Similar Documents

Publication Publication Date Title
US11947646B2 (en) Biometric access sensitivity
US9280648B2 (en) Conditional biometric access in a gaming environment
CA2928614C (fr) Systeme d'acces biometrique sensible
US11430293B2 (en) Biometric access data encryption
AU2015203832B2 (en) Biometric access sensitivity
AU2020280989B2 (en) Biometric access sensitivity
AU2022287682A1 (en) Biometric access sensitivity

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07871467

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: 2009537329

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2669836

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 577177

Country of ref document: NZ

Ref document number: 2007319235

Country of ref document: AU

ENP Entry into the national phase

Ref document number: 0910202

Country of ref document: GB

Kind code of ref document: A

Free format text: PCT FILING DATE = 20071114

WWE Wipo information: entry into national phase

Ref document number: 0910202.1

Country of ref document: GB

Ref document number: 2007871467

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2007319235

Country of ref document: AU

Date of ref document: 20071114

Kind code of ref document: A