Embodiments of the invention described herein pertain generally to casino gaming apparatus, or casino games; and more particularly to articles, apparatus and methods for identifying selected components of casino games suitable for use in a gaming establishment.
A portion of the disclosure of this patent document contains material to which the claim of copyright protection is made. The copyright owner has no objection to the facsimile reproduction by any person of the patent document or the patent disclosure, as it appears in the U.S. Patent and Trademark Office file or records, but reserves all other rights whatsoever. Copyright 2006, WMS Gaming, Inc.
The security and reliability of gaming devices is of foremost importance to gaming regulators and to game manufacturers. As such, it is very important that the components of gaming machines and devices be maintained in working order and also that the proper components are used in any particular game.
In the following detailed description of the embodiments of the inventive subject matter disclosed herein, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration specific embodiments in which the inventive subject matter disclosed herein may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the inventive subject matter disclosed herein, and it is to be understood that other embodiments may be utilized and that changes may be made without departing from the scope of the present inventive subject matter. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present inventive subject matter is defined only by the appended claims. Described below are various embodiments of the inventive subject matter disclosed herein hereof that can, among other things, assist in improving the security and reliability of gaming devices.
As used herein, the term casino game encompasses, without limitation, slot machines, video poker machines, roulette tables, poker tables, craps tables and any other game of chance offered by a gaming establishment wherein for example the game qualifies as regulated and/or licensed gaming equipment. The term gaming establishment refers to an establishment that offers casino gaming experiences to its patrons and, in one example embodiment, is licensed by a gaming regulatory authority to provide such gaming experiences.
Radio frequency identification, or RFID, is a term for technologies that use radio waves and radio frequency-responsive elements to automatically identify individual items. One of the most common methods of identifying individual items is to store a serial number that identifies a component, and perhaps other information, on a radio frequency-responsive element. One example of a radio frequency-responsive element is a microchip that is attached to an antenna, described in more detail below with respect to
Radio frequency-responsive elements can be either active or passive. An active tag incorporates an additional energy source, such as a battery, into the tag construction. This energy source permits active radio frequency-responsive elements to create and transmit strong response signals even in regions where the interrogating radio frequency field is weak, and thus an active radio frequency-responsive element is detectable at greater range. However, the relatively short lifetime of the battery limits the useful life of the tag. In addition, the battery adds to the size and cost of the tag. A passive element derives the energy needed to power the element from the interrogating radio frequency field, and uses that energy to transmit response codes by modulating the impedance the antenna presents to the interrogating field, thereby modulating the signal reflected back to the reader antenna. Thus, their range is more limited. Because passive elements are preferred for many applications, the remainder of the discussion will be confined to this class of element. Those skilled in the art, however, will recognize that these two types of elements share many features and that both can be used in the examples of this disclosure.
Additional security is obtained by making the RFID tag tamper-evident, tamper-resistant, or tamper-proof. One way of providing such additional security is to use high strength adhesive to attach the RFID tag to the subcomponents of the machine, for example by adhering the antenna of the radio frequency-responsive element to the component such that removal of the RFID tag would destroy or disable the antenna. In another example, the RFID tag may be permanently, semi-permanently or removably attached to the component using tamper-resistant, tamper-evident or tamper proof fastening, or by other means. Such fastening includes riveting or molding the RFID tag to the subcomponents of the machine. In cases where the RFID tags are readily visible to an observer, additional security measures include other coded or uncoded visual information on the RFID tag.
As shown in
The antenna geometry and properties depend on the desired operating frequency of the radio frequency-responsive portion of the tag. For example, 2.45 GHz (or similar) radio frequency-responsive elements typically include a dipole antenna, such as the linear dipole antennas (not shown), or folded dipole antennas (not shown). A 13.56 MHz (or similar) radio frequency-responsive element would use a spiral or coil antenna 24. In either ease, the antenna 24 intercepts the radio frequency energy radiated by an interrogation source. This signal energy carries both power and commands to the tag. The antenna enables the radio frequency-responsive element to absorb energy sufficient to power the IC chip and thereby provide the response to be detected. Thus, the characteristics of the antenna must be matched to the system in which it is incorporated. In the case of tags operating in the high MHz to GHz range, an important characteristic is the antenna length. Typically, the effective length of a dipole antenna is selected so that it is close to a half wavelength or multiple half wavelength of the interrogation signal. In the case of tags operating in the low to mid MHz region (13.56 MHz, for example) where a half wavelength antenna is impractical due to size limitations, the important characteristics are antenna inductance and the number of turns on the antenna coil. For both antenna types, good electrical conductivity is required. Typically, metals such as copper or aluminum would be used, but other conductors, including magnetic metals such as permalloy, are also acceptable. It is also important that the input impedance of the selected IC chip match the impedance of the antenna for maximum energy transfer.
A capacitor 26 is often included to increase the performance of the marker. The capacitor 26, when present, tunes the operating frequency of the tag to a particular value. This is desirable for obtaining maximum operating range and insuring compliance with regulatory requirements. The capacitor may either be a discrete component, or integrated into the antenna as described below. In some tag designs, particularly tags designed to operate at very high frequencies, such as 2.45 GHz, a tuning capacitor is not required. The capacitor is selected so that, when coupled to the inductance provided by the antenna, the resonant frequency of the composite structure, given by:
where C=capacitance (in Farads) and L=inductance (in Henries), closely matches the desired operating frequency of the RFID system. The capacitor may also be a distributed capacitor as described in U.S. Pat. Nos. 4,598,276 to Tait et al. and 4,578,654 to Tait et al. Distributed capacitance is desirable to reduce tag size, particularly thickness, and to minimize manual assembly.
In operation, as shown in
The interrogation source 32 transmits an interrogation signal 37A, which may be selected within certain known frequency bands that are preferred because they do not interfere with other applications, and because they comply with applicable government regulations. When the radio frequency-responsive element receives an interrogation signal it transmits its own response code signal 37B that is received by the antenna 34 and transmitted to detector 36. The detector decodes the response, identifies the tag (typically based on information stored in a computer and/or other memory device 38), and takes action based on the code signal detected. Various modifications of the illustrated system are known to those of skill in the art including, for example, using separate antennas for the interrogation source 32 and the detector 36 in place of the single antenna 34 that is illustrated.
A computer system 31 is further provided in one example embodiment in order to store and analyze machine inventory data. System 31 may be located proximate the gaming machines 12, or may be located remotely from the machines, or may be portable, for example carried by maintenance or security worker. System 31, in one embodiment, may store an inventory of subcomponents for each machine. Such inventory may be input in the system 18 manually, or may be input automatically for example by scanning a machine after it has been assembled and automatically gathering the inventory information from the results of the scan. System 31, in one embodiment, includes software 33 capable of assembling and maintaining the inventory, retrieving inventory data and modifying inventory data representing the subcomponents of a machine. In one embodiment, system 31 is a server that is accessible to personnel responsible for assembling and shipping machines 12. System 31 may also be accessible to maintenance or security personnel working in a casino environment in which the machines 12 are positioned. Such as server may be an Internet-based server, for example a web server, or any other type of server or method for wide area network access, for example using wireless communications.
Further, some software 33 embodiments are capable of storing and retrieving warranty information in association with each subcomponents and an associated RF tag. Such software permits a technician working on or checking a machine 12 to look up pertinent warranty or repair information, based on the identification of the component using the RFID tag.
Radio frequency identification of the subcomponents does not require line of sight (LOS). Radio frequency-responsive elements 14 are readable as long as they are within range of a reader. Radio waves travel through most non-metallic materials, allowing radio frequency-responsive elements or the readers to be embedded in packaging or encased in protective plastic for weather-proofing and greater durability. Reading an RFID through a metallic barrier can be often difficult, and many elements tend to detune when placed proximate to metallic devices. The casino game can be provided with a removable panel 19, or the like, that can create an opening to make the elements 14A-14N more readable. The panel 19 can be removed and the reader inserted into or placed proximate the opening in order to better read radio-obscured elements. Also, elements that are attached to metallic components or components containing metallic parts can be spaced apart from the metal. Many elements are prone to detune unless spaced apart from metal by at least about one-quarter of an inch (6.4 mm). The elements can be strategically placed to be at least one-quarter inch from metallic parts. In the case of elements attached to metallic components, the elements can be spaced apart from the component by including a spacer, such as a polyurethane foam pad, between the surface of the component and the element.
Additionally, most radio frequency identification technologies permit readers to interrogate several elements at once. Elements within the range of a reader can be interrogated with a single interrogation signal. Tag collision occurs when more than one element reflects back a signal at the same time, confusing the reader. Different vendors of RFID technology have developed different systems for having the tags respond to the reader one at a time. Because they can be read in milliseconds, it appears that all the tags are being read simultaneously. The reader can receive information from several elements based on this interrogation signal, and the reader can distinguish information received from each of the elements. Readers can be constructed such that an entire casino game is within an interrogation zone so as to receive response code signals from each of the elements with a single interrogation signal.
Information provided to the reader with each received response code signal can be processed in one or more of several ways. For example, a handheld reader may be completely self-contained in that it can store and process the received signals and provide an output for a user. Other types of readers can provide a signal to another system that would then create an output for the user. For example, information received from a reader can be uploaded into a computer network that can then store and process the uploaded information and provide a usable output.
The casino game 12 is usable in one or more interrogation strategies. A basic interrogation strategy is illustrated in
Many applications of the interrogation strategies are contemplated. Among these applications is the ability to determine whether a casino game has missing or improperly swapped or replaced parts. For example, the casino game includes subcomponents with matching RFID tags. The tags can be interrogated and read. The relevant information from the response code signals is processed to determine whether the detected RFID tags match those stored in the inventory database for the machine. If so, it can be inferred that the subcomponents have not been replaced. Additional information can be included in the response code signal to identify which component corresponds with the tag. This information from the response code signals can be processed to determine whether all of the subcomponents included during manufacture are still in the machine. This interrogation can also determine if certain other components (with attached RFID tags) are included in addition to those included in manufacture. In another example embodiment as referred to above with respect to system 18, the tags of each game may be read at manufacture and the information stored in an electronic file so that serial numbers or other identification codes can be associated with a particular casino game. Later, the tags can be interrogated and the information in the response code signals compared to the electronic file. If there are no discrepancies, it can be inferred that the subcomponents of the casino game have not been replaced or removed. Many algorithms and processes can be developed to implement these and similar interrogation strategies, including algorithms and processes to verify that part removal or part replacement has been authorized, and are intended to be included within the scope of the inventive subject matter disclosed herein.
The interrogation strategies can be used to verify the authenticity of a casino game or to determine whether the game has been tampered with. Examples of these are described here briefly. An agent of the manufacturer or gaming establishment may want to verify that parts have not been removed or replaced during shipment of the game between intended destinations. Also, the gaming establishments or gaming regulators might want to verify that certain critical components have not been removed or tampered with. Through the application and use of the inventive subject matter disclosed herein
Another example involves warranty issues. Casino games in gaming establishments often are sold with a manufacturer's limited warranty. The warranty often expires after a predetermined period of time. The gaming establishment may own or otherwise possess several of the same games, some of which may include expired warranties. In one example, a specific component fails in one game no longer covered by warranty. Some repair technicians have been known to swap the failed component and replace it with a like component obtained from an otherwise working game that is still covered by warranty. The failed part may then be presented for warranty repair contrary to the interests of the manufacturer.
Applications of the inventive subject matter disclosed herein can also include tracking individual subcomponents, or tracking several similar subcomponents. RFID tags on subcomponents may also be used to track the selected component through manufacturing, for example. RFID tags can also be used to track inventories of subcomponents. One example is that an entire palette of a particular selected component can be interrogated at once to determine, based on the received response code signals, the exact number of subcomponents on that pallet. Other applications can be readily imagined. In addition, in another embodiment, RF interrogation is used to track the movement of casino gaming components in a manufacturing or warehouse facility in order to prevent unauthorized removal of such components and/or potential tampering with such components.
According to still another example embodiment according to the inventive subject matter herein, there is provided a method for ensuring regulatory compliance of casino games by tagging casino game components with RF tags, and using RF tag interrogation to collect data on the components in the games in operation in a casino, and to verify that such components are consistent with components expected to be in such games. Using this method, regulators may assure themselves that bona-fide, authentic casino game equipment is being used by a casino or other gaming operator.
According to still another example embodiment schematically illustrate in
In some embodiments, the casino game 72 further includes software that executes on a processor and stores data in a memory device. The data stored in the memory device can include data identifying parts the card reader identifies and/or should identify in casino game 72. The data stored in the memory device can be used to compare received RFID signals against to determine if the casino game has been tampered with. In some embodiments, if the software determines a game appears to have been tampered with, or otherwise determines a difference when performing the comparison, the software can disable the casino game 72.
In yet another embodiment, the casino game 72 includes a connection to a network, such as a secure network within a gaming establishment. The reader unit 74 can transmit received RFID tags over the network connection to an inventory server along with a casino game 72 identifier.
In one embodiment, any of the components of casino games 12 or 72 can include hardware, firmware, and/or software for performing the operations described herein. The embodiments may also include machine-readable media. Machine-readable media includes any mechanism that provides (i.e., stores and/or transmits) information in a form readable by a machine (e.g., a casino game, computer, etc.). For example, tangible machine-readable media includes read only memory (ROM), random access memory (RAM), magnetic disk storage media, optical storage media, flash memory machines, etc. Machine-readable media also includes any media suitable for transmitting software over a network.
There is described above a number of embodiments of inventive subject matter wherein RFID tags are used to identify subcomponents of a casino game. The terminology used in this application is meant to include all of these environments. It is to be understood that the above description is intended to be illustrative, and not restrictive. Many other embodiments will be apparent to those of skill in the art upon reviewing the above description. Therefore, it is manifestly intended that this invention be limited only by the following claims and equivalents thereof.
The Abstract is provided to comply with 37 C.F.R. § 1.72(b) to allow the reader to quickly ascertain the nature and gist of the technical disclosure. The Abstract is submitted with the understanding that it will not be used to limit the scope of the claims.
This application is a Continuation-in-Part under 35 U.S.C. 111(a) of International Application No. PCT/US2005/013514, filed Apr. 19, 2005, which claims priority under 35 U.S.C. 119(e) from U.S. Provisional Application Ser. No. 60/564,321, filed Apr. 22, 2004. This application also claims priority under 35 U.S.C. 119(e) from U.S. Provisional Application Ser. No. 60/683,564 filed May 23, 2005. The contents of these applications are incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
60564321 | Apr 2004 | US | |
60683564 | May 2005 | US |
Number | Date | Country | |
---|---|---|---|
Parent | PCT/US05/13514 | Apr 2005 | US |
Child | 11419870 | May 2006 | US |