Interactive Gaming Systems With Artificial Intelligence

Abstract
A system for interactive gaming among a plurality of players includes a host computer system and a plurality of player terminals communicably coupled to the host computer system or gaming platform via a network. The plurality of player terminals may be located at a plurality of licensed gaming locations. The plurality of player terminals may be configured to engage the plurality of players in a common interactive game operated by the host computer system. The plurality of player terminals can include means for dispensing player winnings from the player terminal.
Description
TECHNICAL FIELD

Various embodiments of the technology relate generally to gaming systems. More specifically, some embodiments of the technology relate to systems and methods for providing interactive gaming among a plurality of players.


BACKGROUND

The popularity of gambling has increased at extraordinary rates. Many casinos are opening or reopening poker rooms and Internet poker sites are popping up regularly. Casinos are also looking for new games and ways to attract players. New players are coming to the casinos daily.


There are, however, several impediments to new players joining the ranks of poker players and other gamblers. First, with respect to Internet poker and other online gambling, the legality has not been tested, despite its ever-increasing popularity. Many people simply do not want to risk the possibility of running afoul of the law. Second, many people are simply not comfortable interacting with off-shore enterprises, which is where Internet poker and other gambling sites are located to avoid the reach of U.S. laws. In order to play at these sites, players must deposit money, which is not immediately accessible by the player. Many people do not trust off-shore sites to hold their money. Third, creating an account at an Internet poker or other gambling site requires a potential player to divulge personal information that many people simply do not wish to share. No one knows the limits of how the information will be used. Further, some people prefer anonymity, which is simply not possible with known Internet poker and other gambling sites. Hence, for at least these reasons, many people are not becoming poker players through Internet poker opportunities who otherwise would.


Casino poker tables can provide impediments to new players. For example, the process of getting on a list to play, getting into a table game, and interacting with the many characters you will find in a poker room often intimidates new players to the point of disinterest.


For at least the foregoing reasons, improved systems and methods are needed for providing interactive gaming opportunities to players.


SUMMARY

Various embodiments of the present technology provide for systems and methods for interactive gaming among a plurality of players. In accordance with some embodiments, an interactive gaming system can include a host computer system and a plurality of player terminals communicably coupled to the host computer system via a network. The plurality of player terminals can be located at a plurality of licensed gaming locations and/or remotely from licensed gaming locations. The plurality of player terminals can be configured to engage the plurality of players in a common interactive game operated by the host computer system. The plurality of player terminals can include various means or mechanisms for dispensing player winnings from the player terminal.


In some embodiments, the interactive game may be a game of skill, a game of chance, or a hybrid game of skill and chance. The host computer system may be located at a location different from any of the plurality of player terminals. Each player terminal may include means for receiving player deposits. The means for receiving player deposits may include a bill accepter. When the interactive game is poker, one or more of the plurality of player terminals may include means for receiving a user input to view hole cards dealt to the user in the course of the interactive game. The hole cards otherwise may not be viewable at the terminal. The host computer system may include means for monitoring actions taken by one or more of the plurality of players to thereby detect collusion among the players. The host computer system may include means for tracking one or more jackpots payable by an operator of one of the plurality of licensed gaming locations. The at least one of the one or more jackpots may include a high hand jackpot for making a specific hand. The at least one of the plurality of player terminals may include means for displaying at least one of the one or more jackpots payable by an operator of the host computer system. The host computer system may include means for tracking one or more jackpots payable by an operator of the host computer system. At least one of the one or more jackpots may include a bad beat jackpot for having a hand with a value at or above a specific value beaten by a hand with a value at or above a different specific value. At least one of the plurality of player terminals may include means for displaying at least one of the one or more jackpots payable by an operator of the host computer system. The host computer system may include means for tracking a player's play to thereby reward the player for player loyalty. The player terminals at a given location may be arranged to thereby inhibit collusion among players using the player terminals at the given location while engaged in a common game.


In other embodiments, a system for interactive gaming among a plurality of players includes a host computer system and a plurality of player terminals communicably coupled to the host computer system via a network. The plurality of player terminals are located at a plurality of licensed gaming locations. The plurality of player terminals are configured to anonymously engage the plurality of players in a common interactive game operated by the host computer system.


In still other embodiments, a method of operating an interactive game among a plurality of players includes initiating a game session at a host computer system. The method also includes joining the plurality of players to the game session via a network. The players are operating player terminals located at a plurality of licensed gaming locations. At least one of the plurality of players is joined to the game without creating a user account relating to the interactive game. The method also includes initiating the game and, from the host computer system, sending signals relating to the state of the game to the player terminals. The method further includes, at a host computer system, iteratively receiving signals from the player terminals. The signals indicate player actions in the game. The method further includes, at the conclusion of the game, awarding value to a winning player.


In some embodiments, the method includes dispensing player winnings to one of the players from the player's player terminal. The interactive game may be poker. The host computer system may be located at a location different from any of the plurality of player terminals. The method may include receiving a deposit from a player at one of the player terminals. Receiving a deposit from a player at one of the player terminals may include receiving a deposit from a player via a bill accepter. The method may further include, at a player terminal, receiving a user input to view hole cards dealt to the user in the course of the interactive game. The hole cards otherwise may not be viewable at the terminal. The method also may include monitoring actions taken by one or more of the plurality of players to thereby detect collusion among the players. The method also may include tracking one or more jackpots payable by an operator of one of the plurality of licensed gaming locations. At least one of the one or more jackpots may be a high hand jackpot for making a specific hand. The method may include, at a player terminal, displaying at least one of the one or more jackpots payable by an operator of the host computer system. The method may include tracking one or more jackpots payable by an operator of the host computer system. At least one of the one or more jackpots may be a bad beat jackpot for having a hand with a value at or above a specific value beaten by a hand with a value at or above a different specific value. The method also may include, at a player terminal, displaying at least one of the one or more jackpots payable by an operator of the host computer system. The method may include tracking a player's play to thereby reward the player for player loyalty. The method may include arranging terminals at a given location to thereby inhibit collusion among players using the player terminals at the given location while engaged in a common game. The method may include inhibiting collusion among players using the player terminals at the given location while engaged in a common game by prohibiting a player from joining a specific game session at a terminal proximate a player terminal of another player engaged in the specific game session.





BRIEF DESCRIPTION OF THE DRAWINGS

A further understanding of the nature and advantages of the present technology may be realized by reference to the remaining portions of the specification and the drawings wherein like reference numerals are used throughout the several drawings to refer to similar components. Further, various components of the same type may be distinguished by following the reference label with a dash and a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.


Embodiments of the present technology will be described and explained through the use of the accompanying drawings as follows.



FIG. 1 illustrates an exemplary interactive gaming system according to some embodiments of the present technology.



FIG. 2 illustrates graphically one example of how funds flow in an interactive gaming system, such as the system of FIG. 1, according to various embodiments of the present technology.



FIG. 3 illustrates an exemplary processing environment for an interactive gaming system according to one or more embodiments of the present technology.



FIG. 4 illustrates an example of various components that may be used within a player terminal in accordance with some embodiments of the present technology.



FIG. 5 illustrates an example of a set of operations for enforcing a collusion avoidance policy on a player terminal in accordance with various embodiments of the present technology.



FIG. 6 illustrates an example of a set of operations for detecting automated play on a player terminal in accordance with one or more embodiments of the present technology.



FIG. 7 illustrates an example of a set of operations for setting and updating a gaming session payout on a player terminal in accordance with some embodiments of the present technology.



FIG. 8 illustrates an example of a set of operations for determining if network connection is sufficient for allowing a gaming session according to various embodiments of the present technology.



FIG. 9 illustrates an example of a player terminal according to one or more embodiments of the present technology.



FIG. 10 illustrates an example of a player terminal according to some embodiments of the present technology.



FIG. 11 illustrates an example of a set of operations for selecting game play within a gaming session according to various embodiments of the present technology.



FIG. 12 illustrates an example of a set of operations for operating an interactive game according to one or more embodiments of the present technology.



FIG. 13 illustrates an example of a computing platform that may be used in accordance with some embodiments of the present technology.





The drawings have not necessarily been drawn to scale. Similarly, some components and/or operations may be separated into different blocks or combined into a single block for the purposes of discussion of some of the embodiments of the present technology. Moreover, while the technology is amenable to various modifications and alternative forms, specific embodiments have been shown by way of example in the drawings and are described in detail below. The intention, however, is not to limit the technology to the particular embodiments described. On the contrary, the technology is intended to cover all modifications, equivalents, and alternatives falling within the scope of the technology as defined by the appended claims.


DETAILED DESCRIPTION

Various embodiments of the present technology provide networked, interactive gaming. According to some embodiments of the technology, players may engage in interactive games that require at least one player decision after the game has begun. Interactive games can include games of skill, games of chance and/or hybrid games that mix games of chance and games of skill. Examples of interactive games include, but are not limited to, poker, blackjack, video and arcade games, virtual reality games, eSports, live dealer, pinball, games of chance with bonus rounds that include games of skill, and others. The interactive games can include head-to-head games where one player or team of players compete directly against another player or team of players. In some embodiments, the interactive game may be a single player game where the player is trying to meet various objectives (e.g., score a desired number of points, reach a certain level, complete a screen within a limited time frame, beat a computerized player, and the like).


With respect to poker, for example, a player must decide whether to bet, raise, call, or fold after having seen his cards and the action of other players. With respect to blackjack, a player must decide whether to hit, stand, split, double down, or surrender after having seen his cards and the dealer's up card. With respect to video games, player interactions are needed throughout the game to make decisions to navigate obstacles, fire weapons, and the like depending on the particular video game. Other games can have similar actions during the progress of the game. These types of player decisions are in direct contrast with slot machines in which players merely decide to initiate a game, after which no player decision is made until the conclusion of the game. In other words, no intermediate decisions are made in non-interactive games.


“Networked” gaming allows players to participate from different locations, although in some embodiments, players may play from a common location via a local network. The game, however, is typically administered by a processor separate from a player's terminal. By allowing participation from a large number of locations simultaneously, the quality and variety of the gaming opportunity is enhanced through increased demand. “Interactive games,” unlike, for example, slots, require at least one player decision after the game has begun.


Some embodiments of the technology also provide players the opportunity to participate in networked gaming anonymously. Unlike, for example, Internet poker, in which a player must disclose at least some personal information to create a player account, embodiments of the present technology allow players to enter a game without disclosing any personal information. While some embodiments provide loyalty programs to encourage longer sessions, return customers, and the like, players are not required to participate in loyalty programs. Players may simply deposit funds into a player terminal and enter a game. Hence, no disclosure of personal information is required to participate in games according to some embodiments of the present technology.


Further, according to various embodiments, player terminals can be located at licensed gaming locations. Licensed gaming locations can include any state or, in the future, federal land whereby a player can play on a personal computing device through a network with a licensed operator. Licensing may be governed by the Nevada Gaming Control, tribal council, and/or a regulatory agency setup within a state. In the future, the federal government may permit federal licenses for certain operators. For example, if Caesars Entertainment is licensed in Nevada and someone is playing on their system/networked servers that would be permitted and considered a licensed jurisdiction. Some states, jurisdictions or specific areas (e.g., schools, churches, etc.) may still have bans on gambling in those locations. As such, some embodiments of the present technology may use various location deriving techniques (e.g., geolocation, GPS signals, IP addresses, geofencing, indoor positioning, and others) to determine if the player terminals that are mobile are in a banned location or in a location where gambling would be permitted.


This also contrasts with traditional Internet poker and the like, wherein player terminals (e.g., personal computers, table tops, laptops, tablets, smartphones, and the like) may be located anywhere. Hence, according to some embodiments of the technology, a player may engage in these games without fear of running afoul of gambling laws. While locations may include casinos, restaurants, bars, race tracks, hotels (including individual hotel rooms), and the like, players are secure in the fact that the location is authorized to provide the gaming opportunity.


Further still, in some embodiments, efforts are made to protect players from unsavory activities that have prevented the emergence of such gaming opportunities heretofore. For example, collusion and other forms of cheating are addressed through player terminal placement, privacy features, electronic monitoring, and/or the like. Hence, players are provided an enhanced gaming opportunity, even with respect to “live” games in which cheating is often hard to detect, since a casino does not see every player's hole cards, players are able to “mark” cards since the cards are physically handled, and colluding players can use sophisticated forms of signaling that go unnoticed by the dealer, floor personnel, or the “eye in the sky.” In some embodiments, payouts may be withheld for a period of time (e.g., 24 or 48 hours) to allow for a review of the game play by various hardware and/or software systems that can be used to detect colluding players or other types of cheating.


In some embodiments, the player terminals will need to display various information about the gaming session the player is about to enter. This information can include various rules, limitations and payouts. Since some player terminals may be able to support different games, variable payback, varying skill levels, and multiple profit models (e.g., rake, fixed fee, etc.), the player terminal can display this type of information clearly to the user.


Players also may compete for enhanced prizes over and above the current “pot.” For example, in poker, players may be given bonus jackpots for hitting a certain, usually rare, hand (e.g., a Royal Flush). Also, players may receive a “consolation prize” in the form of a “bad beat” jackpot (e.g., having an aces full house beaten by four of a kind or better). These jackpots may be progressive and could grow to be much more valuable than the contested pot. In blackjack, players can receive bonuses for hitting, for example, an ace and jack of spades blackjack. In some embodiments, bonus rounds may be added with different interactive games (e.g., a game of skill or a game of chance). The bonus round games may be selected by the player before or after the main gaming session. In other embodiments, the bonus round may be randomly selected by the player terminal, the host computing system, or a gaming platform. Still yet, the bonus round may only be presented to players that win the main gaming session or the bonus round may be randomly presented. These and other features and enhancements will be described more fully in the ensuing detailed description.


In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of embodiments of the present technology. It will be apparent, however, to one skilled in the art that embodiments of the present technology may be practiced without some of these specific details. While, for convenience, embodiments of the present technology are described with reference to interactive gaming on various devices, embodiments of the present technology are equally applicable to various other cloud-based gaming technologies.


The techniques introduced here can be embodied as special-purpose hardware (e.g., circuitry), as programmable circuitry appropriately programmed with software and/or firmware, or as a combination of special-purpose and programmable circuitry. Hence, embodiments may include a machine-readable medium having stored thereon instructions which may be used to program a computer (or other electronic devices) to perform a process. The machine-readable medium may include, but is not limited to, floppy diskettes, optical discs, compact disc read-only memories (CD-ROMs), magneto-optical discs, ROMs, random access memories (RAMs), erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing electronic instructions.


The phrases “in some embodiments,” “according to some embodiments,” “in the embodiments shown,” “in other embodiments,” and the like generally mean the particular feature, structure, or characteristic following the phrase is included in at least one implementation of the present technology, and may be included in more than one implementation. In addition, such phrases do not necessarily refer to the same embodiments or different embodiments.


Attention is directed to FIG. 1, which illustrates an exemplary gaming network 100 according to embodiments of the technology. The gaming network 100 includes a host computer system 102 and a communications network 104 through which a plurality of gaming locations 106 communicate with the host computer system 102. It should be appreciated that the gaming network 100 is merely exemplary of a number of possible gaming network configurations according to embodiments of the present technology. Further, although the ensuing description will relate to a poker gaming network, this is not a requirement. Embodiments of the present technology may relate to many other types and varieties of games.


This exemplary host computer system 102 includes an internal network 108, a web server 110, a game server 112, a game storage arrangement 114, a player storage arrangement 116, and an administrator computing device 118. In this specific embodiment, the various components of the host computer system 102 are co-located; in other embodiments, the components may be distributed geographically. As those skilled in the art will appreciate, other exemplary host computer systems according to embodiments of the technology may include different components than those illustrated and described herein.


Each gaming location 106 may include a local server 120 and one or more player terminals 122. In some embodiments, the local server 120 may simply facilitate communication between the player terminals 122 and the host computer system 102. In other embodiments, the local server 120 administers the games, tracks players for loyalty purposes, manages player deposits, and/or the like. In some embodiments, there may be more than 1 server at these locations handling different aspects of the gaming system. For example, there may be servers dedicated to accounting and money management, servers dedicated for detecting collusion and/or other types of cheating (e.g., automated play), servers managing the loyalty/rewards systems, and the like.


The various servers, networks, computing devices, and storage arrangements may be any of a variety of well-known devices. For example, in some embodiments, the communications network 104 is the Internet, the servers 110, 112, 120 are standard products offered, for example, by Dell Corp., the storage arrangements 114, 116 are typical optical, magnetic, solid state, or similar mass storage devices, and the administrator computing device 118 is a typical desktop computer. The player terminals 122 will be described in greater detail below.


According to embodiments of the technology, the gaming locations 106 are licensed gaming locations, such as casinos, race tracks, licensed networks that comply with state or federal regulations, or the like. In some embodiments, the gaming locations 106 are gas stations, hotels, stores, airports, or other locations at which gaming is legal. The gaming locations 106 specifically exclude locations where gaming is not legal. In accordance with various embodiments, gaming locations need not be attended. As such, players may be able to enter and exit games, deposit and receive money, interact with the player's terminal, and the like, without the assistance of an attendant at the gaming location.


The player terminals 122 at the gaming locations 106 may be in wired or wireless communication with the local server 120. In accordance with various embodiments, player terminals 122 can include customized electronic devices built for interactive game play. In some embodiments, the player terminals 122 can include personal computing devices running customized software (e.g., a gaming application running on a mobile device such as a mobile phone or tablet). It should be appreciated that the terminals may be wirelessly connected directly to the host computer system 102 via the communications network 104. Other examples are possible. In some embodiments, hotel guests at casino/hotels may “check out” player terminals 122 and engage in gaming from their hotel rooms. In other embodiments, player terminals 122 are in every room in a hotel and players may engage in gaming using the terminals without ever leaving their rooms.


As will be described in greater detail below, in some embodiments, players can anonymously engage in games via the gaming network 100. That is, a player may insert cash into a terminal or otherwise deposit monetary value (e.g., via a credit card, PayPal®, digital currency transfer, etc.), select a game, and begin playing without creating a user account. This is a significant difference between embodiments of the present technology and previously-known gaming networks, such as Internet poker in which players must create user accounts.


As will be described in greater detail hereinafter, players may engage in interactive games from any location. For example, players at terminal 122-21 and 122-25 from gaming location 106-2 may be involved in the same poker game as players using terminals 122-53 and 122-56 from the gaming location 106-5. The host computer system 102 administers the game and distributes information about the action of the game to appropriate player terminals. Cards are dealt to players in the game, although players are only able to view their own cards and any community cards. Betting proceeds from one player to the next, and the host computer system 102 informs each player of the action prior to his turn.


Of course, all players in a particular game may be playing from the same location. The players may be playing next to one another at a common bank of machines or they may be distributed throughout the gaming location (e.g., some in their hotel rooms, some on one floor of a casino, and the remainder on another floor of the casino). Still yet, some players may be remotely located and playing via a network connection with players in a fixed gaming location. Other player may be playing from their homes, parks, restaurants, bars, and other locations. Many examples are possible.


It is important to note, however, that gaming locations and the gaming network operator may take special steps to ensure players are not the victim of collusion or other forms of cheating. For example, if two players playing from the same location are within eyesight of each other's terminals, then they may be able to see each other's hole cards or signal each other their holding. This form of collusion provides these players with a significant advantage over other players in the game. Similarly, an individual player may be the innocent victim of another player who can see his hole cards or other position within a game without his knowledge. Hence, the gaming location may employ any of a number of measures to prevent such cheating.


In some embodiments, when a player enters a game from a specific terminal at a gaming location, other terminals within proximity (e.g., three rows of machines, 100 feet, the same floor of the casino, etc.) of the player's terminal may be locked out of the game the player entered. Of course, nothing would prevent two players seated at terminals next to one another from playing in different games. Similarly, wireless terminals may have features that allow them to know when they are in proximity of one another and perform similar lockouts. For example, these features can include, in some embodiments, one or more of proximity sensors (e.g., integrated into the device, attached via a dongle, externally located around the casino or other location, etc.), IP address monitoring and tracing, reporting of GPS locations, beacon-based technology, video-based tracking, and the like. As another example, player terminals may be distributed and fixed within a gaming location. Various mapping technology can be used to create location maps that can be used as part of the proximity detection.


In some embodiments, gaming software may be downloaded onto a mobile, electronic device. The software may require that various components of the device are active. For example, the software may require that the GPS system is active, Bluetooth is active, cellular antennas are active, a dongle is present or the like. When the software determines that the device components are not active, the software may automatically activate the components (e.g., GPS, Bluetooth, etc.) or request that they be activated before allowing game play. As another option, some embodiments may only allow game play for non-monetary value. Similarly, if a dongle is required software may confirm its presence and only allow game play or connection to a host server when the dongle is present and has been successfully validated. The dongle may have components which help validate user identities, help location scanning systems, generate beacons, respond to beacons, provide visual cues for external tracking systems, and the like. Some embodiments of the software may disable cellular and data communications to prevent a play from being interrupted or colluding with other players.


With respect to an individual player who has another player looking over his shoulder to see his hole cards, player terminals may have a “hole card reveal” button or the like that allows players to quickly view their hole cards, whereas the cards are otherwise “face down” on the terminal display. While not a guarantee that other players cannot see his cards, a player using such a feature is better able to protect his hand. Shielding on the terminal and/or smaller displays or other features may be used to enhance a player's ability to protect his hand.


Despite all efforts to minimize cheating through visual means, players may nevertheless collude by communicating with one another via phone calls, texting, or the like. Such collusion may be dealt with in any of a variety of ways by various embodiments of the present technology. For example, player terminals or the gaming location in general may employ electronic countermeasures that disrupt cell phone signals. As one example, when the player terminals are personal computing devices (e.g., a smartphone or a tablet), the application running the gaming software may completely deactivate one or more features of the smartphone or tablet such as cellular service, texting, Internet, etc. Still yet, some embodiments of the gaming software may identify the mobile number associated with the mobile device. As such, any incoming call when a game is in session may use the caller ID to block (or securely withhold) calls or text messages from other players in the common gaming session.


In some embodiments, the gaming network operator may employ collusion detection software that monitors player action. Since the host computer system 102 knows all players' cards or activity within the gaming session, unusual action by a player may trigger a flag, after which the player's action is given higher scrutiny. Players suspected of colluding or other cheating activity may be immediately barred from a game and their deposits held pending resolution. In some embodiments, the system may automatically initiate a resolution workflow which can include additional automated reviews, manual reviews, third-party reviews, and the like. Upon completion of the resolution workflow, a decision can be made to give the winnings to the player, notify the player that their winnings will be forfeited and kept by the casino or given to another player. In some cases, the winnings may need to be turned over to a third party.


Some embodiments may use artificial intelligence techniques to identify cheating or collusion. For example, some embodiments may use various types of supervised or unsupervised learning to identify abnormal player behavior, colluding players, or other types of cheating. More specifically, various classifiers, statistical learning based systems, neural networks, deep learning tools, support vector machines, and the like may be used. Some embodiments may receive multiple signals and other types of information about a player terminal, gaming actions, game being played, location, historical patterns, and the like. Some embodiments may use one system to monitor in real-time for suspicious activity that is indicative of cheating (e.g., chip dumping, collusion, automated game play, etc.) and a second system that can analyze recorded game play as part of a workflow. The second system may analyze the recorded game play and signals from the gaming session in question, all gaming sessions of that player, and/or a gaming session within a specified time period (e.g., within one day, one week, one month, etc.).


Sometimes cheating is done ahead of game play (e.g., tampering with player terminal). As such, some embodiments, can also pull and analyze different video feeds and other available information. This additional data may be analyzed automatically or in response to one or more triggers (e.g., large wins or loses, profile ranking, etc.) Some embodiments of the present technology can utilize multiple systems to track individuals from the time they enter the location to the time the individuals leave and this information can be used by the collusion detection modules and artificial intelligence systems as additional data. For example, video (e.g., from surveillance cameras or CCTVs) from the time a player parks a car may be used in some embodiments. Room key cards, loyalty numbers or cards, financial transaction systems, and other access or transaction systems often create the access or transaction logs may be used as additional data points for the monitoring and collusion systems.


Various other systems may be integrated into the real-time monitoring system. These systems can include, but are not limited to, license plate readers, facial recognition systems, movement tracking systems, and the like. Some embodiments may also use big data analytics systems or other analytic systems to analyze game play on the player that can predict whether the player is playing in an abnormal manner, showing different characteristics, or suspicious patterns to normal game play. Logging a person's behavior and how they play can be done via software or hardware. Some software-based systems may include the use of hypervisor-based components, API-based components, form grabbing based components, java script based components, memory injection based components, kernel base components, and the like. Some hardware components for logging and tracking individuals and/or game play may include sensors, sniffers, USB connected, chip connected, port connected, electromagnetic emissions, optical surveillance or the like. The captured information can be reviewed after game play or can be done with a system in real time and report information back. Rules can be set with the software which can flag and report play that appears suspicious where a human can review either post game or in some instances in real time.


Some embodiments of the big data analytics systems may ingest data to look into backgrounds of individuals via databases, social media, influencer analysis, social scoring, real time third party content or chats, harvested information to looking into relationships regarding potential players playing together in the same game. For example, some embodiments may also check if someone is a criminal, has known ties to people who know criminals. To this end, some embodiments may search various via databases and other public information (e.g., social media accounts, news stories, etc.) and develop a reputational profile for the player. This reputational profile may be used in some embodiments as a security function which would enable human interaction from analyst or security personnel to take at a player. For example, if an esports team were to be caught cheating and this cheating event was documented in social media or a corresponding article, the monitoring system could diagnose a person via KYC on the player or even review of a video of game play and build a data base based on gestures, biometrics, knowledge engineering/AI etc. which would flag human interaction needed to look into a particular situation or game play. Some embodiments may also monitor the environment for signal jamming technologies or battery operated EMP generators or similar tools used to cheat.


The collusion detection and real-time monitoring systems used in some embodiments may monitor for a variety of cheating activities. For example, some may use signal traffic and/or other information to find flaws or vulnerabilities in systems to either credit accounts with money or manipulates games to win. Some embodiments of the present technology may try to identify the injections of code, scripts, algorithms or other electronic measures that may be introduced by cheating player. For online play, some embodiments may monitor for the use of bots that are controlled by more than one user in a game or viruses, targeted malware or infection vectors. Some embodiments can track IP addresses or mobile phones to identify distances between players to see if collusion occurs base off of game play. Technology tracking all computers or phones and proximity via GPS, triangulation or IP addresses may also be used.


Analytic solutions can be used in some embodiments to identify fake profiles and tie them to the real user based on movement, stats, game play and use of ephemeral communication as well as Virtual Private Networks for online/mobile play. Some embodiments can track player game play from an IP address or GPS location and compare prior game play from a similar location to see if more than one person is colluding in a multi person game like poker. For example, if a player's location is showing up as IP address 66.87.64.54 which has a GPS location of 34º 4′ 25.0320″ N and 118° 24′ 1.2672″ W and another player is playing from a similar IP address in close proximity, the system should be able to monitor if these players have prior game play in the same game.


Additionally, the logging of player characteristics may be used to identify if a person's style or manner of play is who they say they are. Alternatively, if a player's manner or style of play is another person, the technology will be able to monitor and report who the person potentially might be based on a set of rules. In some cases, friends may innocently enough like to play together or want to play against each other and are not colluding. The systems mentioned above would be able to log play to sense unusual behavior and flag this information or if none occurs not do anything.


Having generally described a gaming network 100 according to embodiments of the technology, attention is directed to FIG. 2, which provides greater detail relating to the flow of funds in such a network. According to this example, players 202 engage in gaming using player terminals 204. The players 202 may insert value (e.g., cash, points, credits, etc.) into the terminals 204 to thereby engage in the games offered by the terminals. When a player 202-1 is ready to cash out of a game, the terminal 204-1 is configured to dispense value back to the player 202-1.


Excess value travels from the player terminals 204 to a local depository 206 and/or vice versa. In some cases, the value moves electronically, for example, if the value is measured in points or credits. In other cases, for example, if the value is in the form of paper currency and/or coin, value is physically moved from the local depository 206 to the player terminals 204 (“terminal fills”) and vice versa. Occasionally, player cash outs are handled from the local depository 206 directly to the player. In one such example, a player 202-5 is due a higher cash out than the terminal 204-5 can provide. The player 202-5 may have experienced an exceptional winning session, the gaming location may require the player 202-5 to complete tax forms for IRS reporting, the player 202-5 may have won a specialty jackpot that is paid from the local depository 206, the player terminal 204-5 may be configured to only print “tickets” which players 202 redeem for cash at a cashier's cage, credit a player's loyalty card or bank card, and/or the like. Many other such examples exist.


In some examples, value is paid from a local depository 206 to a central depository 208 and vice versa. As in the immediately-previous discussion, the central depository 208 may occasionally pay value directly to a player 202-1.


In a specific embodiment, the local depository 206 is a licensed gaming location and the central depository 208 is the operator of the gaming network 100. The operator enlists the gaming location to house terminals in return for a portion of the revenue generated by the network. The compensation to the gaming location may be in proportion to the revenues generated at the gaming location. For example, if the gaming network operator provides interactive poker, each contested pot may be “raked” a certain percentage (e.g., 3% to a maximum of $4). Hence, the winning player's pot may be light a $4 rake. The gaming locations from which the players are engaged in the game may keep $2 of the $4, while the remainder is remitted to the operator. Because players may engage in the same poker game from different locations, occasional revenue balancing may be required to compensate gaming locations at which players have winnings in excess of deposits. Likewise, locations at which players lose more over a period of time provide the excess to the operator for distribution to the locations with the higher wins. In some embodiments, large payouts may be made by the manufacturer, the casino, or some other third party. For example, mega jackpots/progressives that are pooled can get paid by the manufactures in many instances.


Individual gaming locations and/or the operator of the gaming network may offer promotions to increase player interest. For example, as will be described in greater detail hereinafter, gaming locations may offer “high hand” jackpots. Such jackpots are paid to players for making particular high hands such as four aces, a royal flush, or the like. The jackpot may be reset to a starting value (e.g., $100 for four aces) and increase in proportion to revenues at the gaming locations until the high hand is again hit. Different gaming locations may have different high hand jackpot amounts. In fact, the high hand may be game specific, i.e., there may be one high hand jackpot for four aces in all Texas Hold'em games and a different four aces high hand jackpot for 7-card Stud games. Jackpots also may be specific to various game limits. High hand jackpots may be paid to players directly from the local depository 206.


The gaming network operator also may offer specialty jackpots, such as “bad beat” jackpots, in which players who have a high value hand beaten may share (e.g., four-of-a-kind beaten by a higher hand). As with the high hand jackpots, bad beat jackpots may reset to a nominal value after being hit and increase as a function of revenue. The revenue base for a bad beat jackpot offered by the gaming network operator may be substantially larger than the revenue base for locally-offered high hand jackpots, in which case, the bad beat jackpot may grow at a faster rate. As with the high hand jackpots, bad beat jackpots may be game and limit specific.


Of course, the preceding discussion should not be understood to limit bad beat jackpots to being offered by the gaming network operator or high hand jackpots to being offered by the local gaming location. Further, other types and varieties of jackpots may be offered at any level of the network.


Attention is directed to FIG. 3, which illustrates an exemplary functional diagram 300 of the host computer system 102. The functional diagram 300 depicts several program modules as well as basic computer functions. For example, the I/O module 302 handles input to and output from a processing environment and/or the communications network 104. The graphics module 304 provides control over the graphics displayed on player terminals and/or administrative computers. The terminal control module 306 provides the capability of the host computer system 102 to interact with and/or control a player terminal 122. The game storage arrangement 308 houses software or other computer-executable code that controls the games offered.


A number of processing environments are also included in some embodiments. For example, a game processor 310 controls one or more interactive games using the computer executable code from the game storage arrangement 308. A tournament processor 312 performs a similar function for player tournaments. A loyalty tracker 314 keeps up with the play of registered players to thereby reward players for the amount of time they spend playing. An accounting processor 316 controls the flow of money and/or other forms of value within the network. A collusion detection processor 318 monitors such things as unusual action taken by a specific player, frequent occurrences of the same players playing together in the same games, and the like. A software test environment 320 allows new games and/or processes to be tested in an environment that does not affect ongoing operations. A waiting list queue 322 allows players to wait in line for a specific game or table. An evaluation module 324 allows for the monitoring of the communication latency between the plurality of player terminals and the host computer system.


Skill level determination module 326 can determine the skill level of a player. In some embodiments, the skill level identified by skill level determination module 326 may be based on specific skill sets and abilities. In other embodiments, the skill level identified may be with respect to (or relative to) other players. Skill level determination module 326 may have define specific games or tests to measure an individual's skill set. The specific games or tests may start out simple and progressively get harder to more accurately measure a player's skill. For racing games, for example, the speed may start slow and then increase, the number of obstacles may be few and then increase, the track dynamics and trajectories (e.g., curves) may start simple and grow to be more complex, the difficultly level may increase, and the like. Some embodiments may also record player behavior, response times, and other game play characteristics. Using this information various statistics, analytics, and rankings may be used to characterize a skill level.


Some embodiments of the present technology may only allow betting above a specific threshold (e.g., above $5, $10, $20, etc.) when an estimate of the player's skill level is known either via an evaluation mode or from live game play. In other embodiments, in an attempt to measure a player's skill level, the game may offer an initial bonus game or other free play which is really being used to measure a player's skill. For example, a player may desire to bet $100 on a game of skill. Suppose the game is a video game (e.g., a racing game). The system may set an initial payback for meeting different objectives (e.g., $110 for completing the first level, $140 for completing the second level, $200 for completing the third level). The initial bonus game may be used as a way to evaluate the player's skill level. In response to the evaluation, the game may offer increased or decreasing paybacks, as set by variable payout module 328, depending on the skill level identified by skill level determination module 326 or other factor (e.g., location, current sporting events, etc.).


In some embodiments, each casino or owner may be able to set customized policies on how variable payout may occur. These policies can be stored in policies/rules database 330 illustrated in FIG. 3 and accessed by variable payout module 328. For example, a casino may increase payouts for particular games on a player's birthday or anniversary or a new player in casino. Similarly, various records such as player profiles, player skill levels, recorded games, and the like may be stored in records database 332. Those skilled in the art will appreciate that this is but one of many possible exemplary functional diagrams for a gaming network according to embodiments of the technology.



FIG. 4 illustrates an example of various components that may be used within a player terminal in accordance with some embodiments of the present technology. As shown in FIG. 4, player terminals 122 may include memory 402 (e.g., volatile memory and/or nonvolatile memory), processor(s) 404, power supply 406 (e.g., battery), for executing processing instructions, and operating system 408. Additional components may include data storage component 410 (e.g., hard drive, flash memory, memory card, etc.), one or more network interfaces (e.g., Bluetooth® Interface 412; and Network Communication Interface 414, which enables the player terminal to communicate by transmitting and receiving wireless signals using licensed, semi-licensed or unlicensed spectrums over a telecommunications network), audio interface 416, microphone 418, display 420, keypad or keyboard 422, SIM card 424, other input and/or output interfaces 426, and gaming module 428. The various components of a mobile device may be interconnected via a bus.


Memory 402 can be any device, mechanism, or populated data structure used for storing information. In accordance with some embodiments of the present technology, memory 402 can encompass any type of, but is not limited to, volatile memory, nonvolatile memory and dynamic memory. For example, memory 402 can be random access memory, memory storage devices, optical memory devices, media magnetic media, floppy disks, magnetic tapes, hard drives, SDRAM, RDRAM, DDR RAM, erasable programmable read-only memories (EPROMs), electrically erasable programmable read-only memories (EEPROMs), compact disks, DVDs, and/or the like. In accordance with some embodiments, memory 402 may include one or more disk drives, flash drives, one or more databases, one or more tables, one or more files, local cache memories, processor cache memories, relational databases, flat databases, and/or the like. In addition, those of ordinary skill in the art will appreciate many additional devices and techniques for storing information which can be used as memory 402.


Memory 402 may be used to store instructions for running one or more applications or modules on processor(s) 404. For example, memory 402 could be used in one or more embodiments to house all or some of the instructions needed to execute the functionality of the various system components and/or modules. Processor(s) 404 are the main processors of player terminal 122 which may include application processors, baseband processors, various coprocessors, and other dedicated processors for operating player terminal 122. For example, an application processor can provide the processing power to support software applications, memory management, graphics processing, and multimedia. An application processor may be communicably coupled with memory 402 and configured to run the operating system 408, the user interface, and the applications stored on memory 402 or data storage component 410. A baseband processor may be configured to perform signal processing and implement/manage real-time radio transmission operations of a player terminal (e.g., a mobile device). These processors, along with the other components, may be powered by power supply 406. The volatile and nonvolatile memories found in various embodiments may include storage media for storing information such as processor-readable instructions, data structures, program modules, or other data. Some examples of information that may be stored include basic input/output systems (BIOS), operating systems, and applications.


Operating system 408 can also provide common services for software applications running on processor(s) 404. According to the embodiments shown in FIG. 4, gaming module 428 can include identification module 430, policy enforcement module 432, payout adjustment module 434, skill level adjustment module 436, accounting module 438, and state recordation module 440. Each of these modules can be embodied as special-purpose hardware (e.g., one or more ASICS, PLDs, FPGAs, or the like), or as programmable circuitry (e.g., one or more microprocessors, microcontrollers, or the like) appropriately programmed with software and/or firmware, or as a combination of special purpose hardware and programmable circuitry. Other embodiments of the present technology may include some, all, or none of these modules and components along with other modules, applications, and/or components. Still yet, some embodiments may incorporate two or more of these modules and components into a single module and/or associate a portion of the functionality of one or more of these modules with a different module. For example, in one embodiment, identification module 430 and policy enforcement module 432 can be combined into a single module for identifying and enforcing various policies on a player terminal.


Identification module 430 can be used to gather information about the player terminal, current and/or past gaming sessions, player information, specific hardware and software configurations of the player terminal, GPS coordinates, associated telephone numbers, IP addresses, e-mail addresses, user identifiers, international mobile station equipment identity (IMEI), mobile equipment identifiers (MEID), integrated circuit card identifiers (ICCID), part identifiers, software identifiers, current gaming session identifiers, identification of any nearby player terminals, and the like. This information can be used in a variety of ways, including by policy enforcement module 432 which can set customized collusion avoidance policies that can, in some embodiments, be dynamically set (e.g., based on location, current gaming session, etc.).


Payout adjustment module 434 can be used to dynamically adjust the payout of a gaming session. For example, there may be minimum payout requirements (e.g., between 85% and 98%) that are required to be met over a period of time (e.g., daily, weekly, monthly, yearly, life of the machine or game). As such, the payout module can ensure those minimum requirements are met.


Payout adjustment module 434 may also be able to adjust the payout based on the profit model being used for a particular gaming session. For example, some games may take a fee or percentage off the top, a rake (e.g., 1% to 15%, fifty cents, one dollar, etc.) of the money at play. As another example, the games may use a pooled liquidity model for jackpots where the money is derived from multiple sources (e.g., multiple casinos). As such, the percentage may be different depending on the game play location or other factor. Still yet, payout adjustment module 434 may be connected to a casino or other rewards system and grant higher payouts based on various reward models (e.g., number of visits, average bet, total money bet, holiday/birthday month, gift, etc.).


Some embodiments allow for games that are designed to be a computer competing against a player. After a game is played, some embodiments rank the player based on level of ability/performance. The system may vary the payout based on the skill level in future games or offer different playing levels for different payouts. For example, when the player performs above a specific level the system may lower the payout in future games for that player and/or require harder gameplay to receive the same payout. To illustrate the idea, suppose a game has ten different levels of difficulty. Initially, the player terminal or game may return a payback of $30 on a $20 bet for beating the level. The player's wins and losses can be tracked. Now suppose the player consistently wins on the first level of difficulty. The system can increase the game play to a higher difficulty level and/or reduce the payout (e.g., $25 on a $20 bet) in future games being played by that player. In other embodiments, the system will not rank player skill at all and the baseline would be zero for skill. As a result, some players may be really good and some players may be bad and the game would always play the same (e.g., be at a constant skill level).


Some embodiments facilitate one human player against another human player. Some embodiments can track statistics on each player and develop a player profile that includes a skill level that would be learned over time. Using the player profile, some embodiments could pair players based on level of ability. Players may also have the option of signing up for higher or lower skill. Once the skill is learned or chosen, some embodiments of the system (depending on how it is set up) will return a percentage (e.g., 80%-98%) amount based on regulations, casino policy, etc. If a player is ranked at a particular level and the system then finds the player is playing below that level, some embodiments of the system may re-categorize the player to a lower level. For example, the levels may be based on a percentile ranges (e.g., 0-20 beginner, 20-40 between beginner and medium, 40-60 between medium and expert, 70-90 expert, 90-100 professional). Some locations (e.g., states) may not allow certain games to be legally played. In some embodiments, a matching engine may not only match players based on skill, but may refuse to pair players when one is located in a location where the game play, betting amounts, or other characteristic would be illegal.


Some embodiments provide multiple types of payables for a win, partial win, meeting of certain objectives. As a result, if people are not matched at equal level than they could fall into a payable that pays everyone the same whereas if a matching occurs at equal levels than a higher payable would be achieved based on performance. This configuration option may be used in some embodiments of a computer against a human player and bonus games of skill.


The variable payback may be based on factors other than skill. For example, in some embodiments, gaming location regulations might allow for a higher payback percentage. As a result, a player playing the same game on a mobile device may receive one payback a first location and a second payback at a second location. Similarly, the paybacks may vary based on location within the casino. For example, games played on a mobile device pool side or in a hotel room may have a lower payout than the same game played on the casino floor. As another example, various promotions may be the basis for different payouts. For example, on a player's birthday the payout may be higher. Similarly, on busy weekends (e.g., during big sporting events) the payout may be lowered.


In some embodiments, the payables on games are fixed but the element of skill in the games can obviously sway the payback percentage. Some embodiments use more than one payable based on factors (e.g., skill level, amount bet, continuous betting, levels reached, consecutive days played, amounts bet within time periods such as hours, days, weeks, months, years, etc.). For example, for some games, the payback may be adjusted higher as the number of continuous games increases or the amount bet within specified time periods are met. The following two tables illustrate examples:


















Number of Games/Bets Continuously Played
Payout







Less than five
80%



Five to ten
85%



Ten to twenty
90%



More than twenty
95%







Amount Bet Within an Hour
Payout







Less than $100
80%



$101 to $500
85%



$501 to $1000
90%



More than $1000
95%










Skill level adjustment module 436 can be used to adjust playing parameters within the game. Playing parameters refer to the conditions present within the game during the game play. Examples of playing parameters can include, but are not limited to, number of lives, amount of time to complete an objective or level, game speed, amount of ammo, firing rates, items caught, items chosen, number of automated opponents, difficulty of terrain, available weapons, less predictability, automated opponent strengths, and the like. As an example, suppose a player is playing Pac-Man. Skill level adjustment module can adjust the speed of the game play, number of ghosts, number of lives, speed of the player versus speed of the ghosts, invincibility time, and the like. The higher the skill level set by skill level adjustment module 436, the higher the payout.


Accounting module 438 can be used to interface with various existing backend accounting systems and other reporting and record keeping systems (e.g., IRS reporting systems). In some embodiments, accounting module 438 may be used to implement procedures that are designed to detect and prevent transactions that may be associated with money laundering, fraud and other criminal activities and to ensure compliance with all federal laws related to money laundering.


State recordation module 440 can be used to capture the state of the gaming session. This can include a variety of game states including, but not limited to, wager, payout levels, skill level settings, and others. The state of the gaming session can be repeatedly captured so that in the event of a communication failure, terminal fault, or other issue that would prevent the gaming session from being completed a record of the current state can be reconstructed. For example, in some embodiments, the state may be captured at least every second. In other embodiments, the state may be captured more or less quickly depending on game dynamics, user interactions, betting activity, risk assessment, etc. For example, if as described above, the system identifies that the player has a higher risk profile (e.g., associated with known criminals, has a criminal record, detects suspicious activity, or the like), the amount of information captured may be increased (e.g., from snapshots to full recording of gameplay to information from additional systems such as external cameras, logging hardware or software).


The state captured by state recordation module 440 may also be used (possibly with state information from other player terminals of the same gaming session) by a collusion avoidance module to determine if any collusion is occurring. In some embodiments, the state information captured by state recordation module 440 can be used to generate various gaming analytics. In some embodiments, the host computer (or gaming platform) may capture the snapshots of the state information directly. As part of the snapshots, some embodiments may also record the current state of the user's profile and other available information (e.g., news articles, data from social media, criminal records, pictures, casino surveillance video, and the like).


State recordation module 440 may store the state information in database for regulatory compliance, analytics, or other purpose. For example, in some embodiments, all the game play within a period of time (e.g., a five-year period, a two-year period, a year, a month, a week, a day, etc.) could be recorded and stored in the database. In other embodiments, a limited number of gaming sessions could be recorded (e.g., last one hundred, last thirty, etc.). Still yet, some embodiments of state recordation module 440 may only record (or record for longer period of time) games that have betting above a set threshold (e.g., $500, $1000, etc.).


The state information recorded by state recordation module may be a direct copy of the game play or only information sufficient to reproduce the game play. For example, in some embodiments, the state information may include various gaming parameters (e.g., ammo amounts, number of lives, level, etc.), gaming session identifier, date and time the interactive gaming session is opened or terminated, the date and time the interactive gaming session is logged in to or is logged out of by various player terminals, the physical location, by state or foreign jurisdiction, of the authorized player while logged in to the interactive gaming account, and/or other types of information.


In some embodiments, the player terminals can provide for social media, chatting and other communication channels. For example, some embodiments, may have interfaces that allow for third party access through another gateway like Facebook® or other social media. Various embodiments, may cause the game play to be recorded and possibly the environment and/or player. Using one or more of these recording, customized videos can be automatically created. In some cases, the video or recorded game play may be uploaded to the social media account in response to certain conditions being met (e.g., winning, cool tricks, etc.). Some terminals may present the video to the player at the end of the game and ask if they would like a copy. These recordings may be added to player profiles created by the casino or other system owner. Not only can the recording be analyzed for cheating or collusion, but the recordings create a big data set that can be used to generate analytics to help understand and profile games and players. For example, video recordings or pictures of the player may be used to identify gender, jewelry, clothing brands, and other characteristics. This can be used to create customized promotions for that individual. In some embodiments, location managers may use this information to select games that attract player with preferred profiles or desirable social analytics.


Some embodiments of the player terminals may allow for picture in picture or multiple screens. For example, players may be able to play an interactive game via one screen or video channel and in the second screen or video channel being displayed in the picture in picture (PIP) thereby allowing players to play more than one at a time. The additional screens or video channel, for example, could be used to watch sports, fantasy sports betting, ordering drinks or food, and the like. In some embodiments, additional screens may be present to present various promotions such as ticket sells for shows, restaurant deals, future room bookings, room upgrades, and the like.


Some embodiments of the player terminals may also include external video outputs that allow for display of the game by others. For example, in various tournament play (e.g., eSports), the external video outputs may allow others to watch the game play. In various embodiments, the player terminals may support virtual reality interfaces, hologram generation systems, and other visualizations system for the gaming. The player terminals, in some embodiments, can include various sensors to detect gestures that can be interpreted as controls for betting, controlling gaming action, ordering drinks, etc.



FIG. 5 illustrates an example of a set of operations 500 for enforcing a collusion avoidance policy on a player terminal in accordance with various embodiments of the present technology. Various embodiments of the present technology allow for heterogeneous player terminals that can be at either fixed locations or mobile (i.e., able to move to different locations). Since the player terminals may have different capabilities and may even be owned and operated by a player (e.g., a tablet), each player terminal may need different and/or dynamically changing collusion avoidance policies. For example, a player terminal that is mobile may be able to be positioned nearby (e.g., within 25 feet) of a second player terminal that is stationary. As such, the collusion avoidance policies may need to be dynamically updated so that those player terminals may not participate in the same gaming session. As another example, collusion avoidance policy may depend on device type, location, and other factors. For example, a casino may allow games to be played on mobile devices within certain locations. In some instances, for example in various eSports events and other team based gaming session, the collusion avoidance policies may allow multiple players to collude. As such, this type of dynamic policy adjustment can allow, in some embodiments, the collusion detection and enforcement to be appropriately set or even completely disengaged.


As illustrated in FIG. 5, for example, collection operation 510 determines the player terminal information. Player terminal information can include information regarding specific hardware and software configurations of the player terminal. In some embodiments, the player terminal information can include player information collected via the player terminal. In accordance with various embodiments, and depending on the type of player terminal, collecting the player terminal information can be done in a variety of ways. For example, the player terminal information could be automatically collected by accessing various sensors, components, operating systems, and/or software associated with the player terminal. In some embodiments, the player terminal location maybe monitored over long periods of time and predictive analytics or learning algorithms can be used to generate a likely current location for the player based on historical information.


In some embodiments, the player terminal information could include GPS coordinates, telephone numbers, IP addresses, e-mail addresses, user identifiers, international mobile station equipment identity (IMEI), mobile equipment identifiers (MEID), integrated circuit card identifiers (ICCID), part identifiers, software identifiers, current gaming session identifiers, identification of any nearby player terminals, and the like. As another example, management software or gaming software loaded on the player terminal may send out or monitor for beacon signals (e.g., using Bluetooth® or other short-range communication protocols) that can be received or transmitted by monitoring stations located at various physical locations (e.g., at a casino, airport, etc.).


The player terminal information can be reported, during reporting operation 520, to a collusion detection module. The collusion detection module may be part of the player terminal or separate from the player terminal. Reporting operation 520 may stream the information to the collusion detection module or send the information in batches. As the player terminal information changes, the changes can be detected and then sent to the collusion detection module. This may be particularly helpful in reducing traffic between the player terminal and a separate collusion module. The collusion detection module can then process the player terminal information along with other information such as, for example, collusion rules to develop a collusion avoidance policy. Once the player terminal information is received during receiving operation 530, the player terminal can enforce the collusion avoidance policy on the player terminal during enforcement operation 540.



FIG. 6 illustrates an example of a set of operations 600 for detecting automated play on a player terminal in accordance with one or more embodiments of the present technology. As illustrated in FIG. 6, monitoring operation 610 can monitor player action within a gaming session. Using the player action, determination operation 620 determines action variability. For example, the variability in responding to various game play situations, the player's logic in responding to various game play situations, the player's strategy, the player's response time for responding to various game play situations, the player's betting patterns, and/or other information derivable from monitoring player actions. In some embodiments, determination operation 620 may also monitor various biometrics of the player or record the player with a camera.


Using the action variability, determination operation 630 can determine if a player terminal is using automated play during the gaming session. This may be a score, a percentile, confidence level, a range, or other indicator that automated play is likely occurring. If determination operation 630 determines that automated play is occurring (or likely occurring), then determination operation 630 branches to enforcement operation 640. During enforcement operation 640, the collusion avoidance policy can be enforced and may include a variety of actions including, but not limited to holding the game, terminating gaming sessions, holding payouts subject to further review, initiating review of other available data (e.g., from video surveillance systems), creating entries in a user tracking system and the like. The collusion avoidance policy may have variable enforcement depending on the confidence or likelihood of the automated play, the betting amount, the identity of the player, the number of auto play triggers for the identified player, and the like. Such features may be manually engaged or disengaged by the operators or be associated with a set of rules that can allow the system to automatically engage or disengage the feature in some embodiments.


If determination operation 630 determines that automated play is not occurring (or not likely occurring), then determination operation 630 branches to allowance operation 650, which allows the game play to continue and returns to monitoring operation 610 where the player action within a gaming session is monitored. If determination operation 630 flags the play as potentially automated, then determination operation 630 branches to review operation 660 which can allow the game to continue with a heightened level of review or elevate the review to other systems or gaming administrators for review. During this time, the game may be allowed to continue to collect additional evidence with monitoring operation 610 or a collusion avoidance policy may be enforced with enforcement operation 640. The collusion avoidance policy may request that an additional game be played where the gaming action is varied (e.g., speed, difficulty level, etc.) to determine if automated playing is occurring.



FIG. 7 illustrates an example of a set of operations 700 for setting and updating a gaming session payout on a player terminal in accordance with some embodiments of the present technology. As illustrated in FIG. 7, receiving operation 710 receives information regarding a baseline skill distribution for one or more interactive games (e.g., Pac-Man, Tetris, etc.). This baseline may be collected offline or via terminals over a period of time. Using the baseline skill distribution, payout operation 720 sets the initial game payout based on the baseline skill distribution. As players play the interactive games, additional live game play statistics can be received from one or more terminals during playing operation 730. The skill distribution can be updated based on the additional live game play statistics during update operation 740. Using the updated skill distribution, determination operation 750 can determine if a game payout modification is needed. If determination operation 750 determines that a game payout modification is not needed, then determination operation 750 can branch to initiation operation 760 to initiate a gaming session with a set payout. If determination operation 750 determines that a game payout modification is needed, the determination operation 750 can branch to setting operation 770 where a fixed payout for a gaming session is updated and set. Once the payout is set, then the gaming session can be initiated from initiation operation 760.



FIG. 8 illustrates an example of a set of operations 800 for determining if network connection is sufficient for allowing a gaming session according to various embodiments of the present technology. As illustrated in FIG. 8, receiving operation 810 can receive a request for a player terminal to enter a gaming session. Connection operation 820 can determine the connection information between the player terminal and the host server. The connection information may include information such as, but not limited to, upload speeds, download speeds, connection type (e.g., fiber/cat-5, Wi-Fi, cellular, miracast etc.), and other connection information. Using the connection information, determination operation 830 can determine whether the gaming criteria is met. For example, the gaming criteria can include minimum upload speeds, minimum download speeds, and the like. If determination operation 830 determines the gaming criteria has been met, then determination operation 830 can branch to initiation operation 840 where the gaming session can be initiated. If determination operation 830 determines the gaming criteria has not been met, then determination operation 830 can branch to denial operation 850 where a gaming session is not initiated and then suggestion operation 860 can be used to suggest an alternative game based on the connection information.



FIG. 9 illustrates an exemplary player terminal 900 according to embodiments of the technology. Only the most relevant aspects of the user interface portion of the player terminal 900 are illustrated and described herein. It should be apparent that the user interface may be part of a hand-held player terminal, a free-standing player terminal (e.g., a tabletop gaming console, a dedicated gaming enclosure with electronics supporting the game, etc.), a computing device configured as a player terminal (e.g., a laptop, mobile phone, tablet, e-reader, etc.), a “set-top” gaming console, and/or the like. Further, it is not necessary for all elements of the player terminal illustrated and described herein to be included in the player terminal.


The terminal includes a jackpot payout information area 902, a game display area 904, a player interaction area 906, and a cash and credit interaction area 908. The jackpot payout information area 902 includes information about the status of jackpot accumulations. The amounts associated with the various jackpots may increase with time and may be game specific. For example, if the player terminal provides the possibility to engage in different types of games and limits, then the jackpot amounts displayed in the jackpot information area may change with different player game selections.


The game display area 904 provides a visual depiction of the game in which the player is involved. For example, the game display area 904 may show a poker table 910 and players 912 sitting around the table. As players are dealt cards, the cards may appear in front of each player. As players bet, chips may be displayed in front of the players. At the end of each betting round, the chips from the round may be scooped into the middle of the table to symbolize the pot for which the players are competing. As the action proceeds around the table, the next player to act may be highlighted and that player's terminal may beep, or otherwise alert the player that it is his turn to act. Community cards may appear on the table for all players to see. At the conclusion of the hand, the pot may be pushed to the winning player as the hole cards of all players still in the hand are revealed. Each player's present bankroll may be graphically or numerically displayed so that all players know how much each player has available to wager.


The game display area 904 may be where players look to view their hole cards. A player's hole cards may be continuously displayed. In some embodiments, however, steps are taken to help ensure a player's hole cards remain hidden from other players potentially playing at nearby terminals to thereby prevent cheating. In some embodiments, a button is included (e.g., the enter button 932) that causes the hole cards to be revealed. If the button is not depressed, then the hole cards are simply shown as face down. This way, players can quickly glance at their cards thereby reducing the risk that someone else can view their hole cards. In other embodiments, hole cards may be displayed on a separate display screen. In either case, shielding, glass coatings, polarization screens, and/or the like may be employed to prevent others from viewing a player's hole cards.


The player interaction area 906 includes player buttons, input devices, and the like through which players interact with the game. It should be appreciated that the player interaction area 906 may comprise touch screen buttons on the game display area 904. Hence, it should be understood that this embodiment is merely exemplary of a number of possible embodiments as will be appreciated by those skilled in the art.


The player interaction area 906 in this embodiment includes discard buttons 920 for draw games (e.g., 5-card draw, 2-7 triple draw lowball, etc.). Players use these buttons to identify cards to be discarded in a drawing round. The player interaction area 906 also includes a bet button 922, a raise button 924, a fold button 926, a call button 927, and a check button 928. These buttons are used to take the appropriate action according to each button's name. In some embodiments, additional input buttons and devices are included. For example, a track ball 930 may be included for indicating how much a player wants to bet in unstructured games. It also may be used to select from several choices displayed on the display screen 904. It may be used in combination with the enter button 932 to confirm a selection. A cash out button 934 allows a player to leave a game with the value the player has presently accumulated. Those skilled in the art will appreciate many other possibilities in light of this disclosure. For example, depending on the type of game play contemplated, the player interaction area could include other types of input devices to accept inputs. These input devices can include, but are not limited to voice recognition, actuators, joysticks, 3D-image tracking systems to monitor player motions, and the like.


The cash and credit interaction area 908 provides a loyalty card accepter 940, a bill or ticket accepter/dispenser 942, and a coin dispenser 944. These items work in ways similar to analogous devices on, for example, video poker machines, except that the player terminal sends signals to the host computer system in response to player actions taken with respect to cashing in and out.


Those skilled in the art will appreciate that the foregoing description is merely exemplary of a number of possible player terminal embodiments. For example, other embodiments may include all touch screen controls, may only accept bills and dispense tickets, may not include jackpot values, and the like. Most embodiments, however, minimally include a display area through which the action is depicted and which may include player input buttons that change depending on the state of the game. It should also be appreciated that the display region may show display screens that allow players to select games and limits, enter personal information, if desired, and advertise promotions and the like when the terminal is not in use. Many other possibilities exist and are apparent to those skilled in the art in light of this disclosure.



FIG. 10 illustrates an example of a player terminal 1000 according to some embodiments of the present technology. As illustrated in player terminal 1000, there may be a player interaction area 1010 where the interactive game is presented. The performance area 1020 can show various challenge levels, typical success rates, payouts, and other information. Game selection area 1030 may be used to select the one or more games being played, the skill level, bets, and objectives for winning.


In accordance with various embodiments, the payout amount can vary over time. For example, payouts can occur based on pay tables and hitting certain marks in a game or based off winning. Also, some games may pay less money and give an experience over time whereby the player is paid a little bit of money so he loses slower. Players may still be able to win a lot of money based on pay table or algorithms. Payouts may also be set by local regulations. As such, to ensure that the system is complying with local laws, the payouts may vary.



FIG. 11 illustrates an example of a set of operations 1100 for selecting game play within a gaming session according to various embodiments of the present technology. While some terminals may be fixed and generally available for play, other player terminals may be personal computing devices of the player. As such, receiving operation 1110 can receive a notification that a player terminal has joined the network. Using update operation 1120, the player terminal can be updated with the available games or a list of the available games. The player can be presented with an opportunity to select a plurality of games for play. For example, during selection operation 1130, an indication can be received indicating the main game and the bonus round game that the player would like to combine.


Some embodiments set various rules for how the games may be paired. For example, one rule may require that at least one of the games is an interactive game. As another example, the rules may seek to limit or minimize the average estimated play time. As such, only those games with average game play below a particular threshold may be presented as pairing options once the first game has been selected. Determination operation 1140 can determine if the pairing rules have been satisfied. If determination operation determines that the pair rules have not been satisfied, then determination operation 1140 branches to selection operation 1130 where different selections can be made. If determination operation determines that the pair rules have been satisfied, then determination operation 1140 branches to initiation operation 1150 where the gaming session is initiated.



FIG. 12 illustrates an example of a set of operations 1200 for operating an interactive game according to one or more embodiments of the present technology. The method may be implemented in gaming network 100 of FIG. 1 or other appropriate system. Those skilled in the art will appreciate that other exemplary embodiments may include more, fewer, or different steps than those illustrated and described here. Further, other exemplary embodiments may traverse the steps in different orders than shown herein.


The set of operations 1200 begins at block 1202 at which a host computer system, such as the host computer system 102, initiates a game session. A game session, could be, for example, a poker game among several players. The game session could consist of one or more hands of poker in which players compete against one another for the pot. The game session could be a series of blackjack hands in which one or more players compete against the house as is known in the art. The game session also could be a series of hands of other games such as gin rummy, bridge, and the like. As another example, the game session could be any type of interactive game such as a game of skill, game of chance, or a hybrid game that includes a game of skill and a game of chance as regular game play or in a bonus.


In some embodiments, initiating a game session comprises making a selection available on one or more player terminals. The selection allows players at the player terminals to enter the game session. Any number of game sessions could be available at any given time for players to enter. The games may comprise a variety of games (e.g., Texas Hold'em, 7-Card Stud, Omaha, Draw poker, 2-7 lowball, Blackjack, Bridge, pinball, Grand Theft Auto, Tetris, Minecraft, Hearthstone, Super Mario, Super Mario Kart, Pac-Man, Guitar Hero, Galaga, League of Legends, Frogger, StarCraft, Donkey Kong, words with friends, Sonic the Hedgehog, Counter-Strike, Metroid, Ms. Pac-Man, Space Invaders, Punch-Out, Rainbow Six Seige, Fallout, Final Fantasy, Call of Duty, Street Fighter, Dota, Journey, Dark Souls, role playing games, decision based games, etc.) and a variety of limits ($0.25/$0.50, $11$2, $11$2 Blind No Limit, $10/$20, $500/$1000, etc.). In some embodiments, the players may be able to select the game played in the gaming session and a game of skill to be played in the bonus round. In some embodiments, the game session may be a tournament, which may be a single-table tournament or a multi-table tournament.


At block 1204, players are joined to the game session. This may comprise receiving a signal from a player terminal that the player desires to enter the game and has deposited sufficient funds to enter the game. The player is assigned to a seat (or is allowed to select a seat) at a virtual table, which may be displayed as shown in FIG. 9. The player's bankroll (i.e., the player's stake in the game) may be depicted at the virtual table.


In some embodiments, players may be provided with an option to change their perspective of the virtual table. For example, a player may desire to “sit” at the bottom of the table in the seat identified as 912-5 in FIG. 9. If the player is seated in a different seat, the player may elect to “rotate” the perspective of the table so that the player is depicted in the desired position. This does not change the player's position at the table with respect to the other players; it merely changes the player's perspective for display purposes. This option may be useful in reducing cheating, since the player may relocate his position at the table to a position that obstructs the view of a potential cheater located near the player's terminal. Of course, a player my elect to take a different seat at the table in some embodiments.


In some embodiments, players are randomly assigned to a game session. While a player may identify the game and what limit the player wants to play, the table to which the player is assigned is not up to the player. This minimizes the chance that a group of colluding players are able to sit at the same table. Of course, a player can always request a table change or leave the game entirely.


In some embodiments, players enter a waiting list for certain games and limits. If, for example, all the seats at a desired table are taken, a player may request to be placed on a waiting list for that game. Players may enter waiting lists for specific games and/or limits. When a seat opens in a game session that corresponds to the list in which a player is waiting at the top of the list, the player is given the opportunity to enter the game session.


As described previously, collusion or other forms of cheating may be addressed by prohibiting players from engaging in the same game session from locations proximate one another. For example, if a casino has a plurality of player terminals distributed throughout the casino, then players may be prevented from joining the same game session from neighboring terminals. After a player joins a game session from a specific terminal, nearby terminals are “locked out” of that game session. The same process may be followed at all locations. If players are playing from wireless terminals, the wireless terminals may have proximity detection features that perform a similar function of locking out nearby terminals. Many other possibilities exist. In some embodiments, all or certain players may be permitted to communicate and collude during an interactive gamine session (e.g., in eSports or other team-based gaming). As such, some embodiments allow for the collusion detection to be suspended during certain permitted game types or as selected by an operator.


Once a sufficient number of players are joined to a game session, a game, or hand, is initiated at block 1206. If, for example, the game is Texas Hold'em Poker, two cards are dealt to each player in the hand.


At block 1208, the game proceeds as is known in the art, with the host computer system sending signals to each player terminal indicating the state of the game. The player terminals provide a visual representation of the game state, and a player whose turn it is to act is provided with a set of options. Hence, play continues at block 1210 with the host computer system receiving signals indicating a player's action. The actions of blocks 1208 and 1210 continue with players interactively checking, betting, raising, calling, or folding and the host computer system updating the state of the game by sending signals to the player terminals. If the game limits are fixed, players merely need to indicate their selection for the action to proceed. If, however, the game is “no limit,” “pot limit,” or another non-structured betting limit, then players also indicate the size of each bet.


At block 1212, a winner is determined and the value of the pot is awarded to the winning player. A new game may then be initiated at block 1206. Since players are able to enter and leave game sessions at any time, new players may be joined at block 1204 to replace any players that leave the game session. While the foregoing description focuses on poker being played in the game session, those skilled in the art will appreciate that other forms of poker and other interactive games may be played according to other embodiments of the present technology.


Exemplary Computer System Overview

Aspects and implementations of the interactive gaming system of the disclosure have been described in the general context of various steps and operations. A variety of these steps and operations may be performed by hardware components or may be embodied in computer-executable instructions, which may be used to cause a general-purpose or special-purpose processor (e.g., in a computer, server, cloud-based gaming platform or other computing device) programmed with the instructions to perform the steps or operations. For example, the steps or operations may be performed by a combination of hardware, software, and/or firmware.



FIG. 13 is a block diagram illustrating an example machine representing the computer systemization of the host computer system. The gaming controller 1300 may be in communication with entities including one or more users 1325 client/terminal devices 1320 (e.g., devices 122), user input devices 1305, peripheral devices 1310, optional co-processor device(s) (e.g., cryptographic processor devices) 1315, and networks 1330 (e.g., 104 in FIG. 1). Users may engage with the gaming controller 1300 via terminal devices 1320 over networks 1330. In some embodiments, all or a portion of the communications between terminal devices 1320 and gaming controller 1300 can be encrypted. The law requires cryptography for some things.


Computers may employ central processing units (CPUs) or processors to process information. Processors may include programmable general-purpose or special-purpose microprocessors, programmable controllers, application-specific integrated circuits (ASICs), programmable logic devices (PLDs), embedded components, a combination of such devices and the like. Processors execute program components in response to user and/or system-generated requests. One or more of these components may be implemented in software, hardware or both hardware and software. Processors pass instructions (e.g., operational and data instructions) to enable various operations.


The gaming controller 1300 may include clock 1365, CPU 1370, memory such as read only memory (ROM) 1385 and random access memory (RAM) 1380 and co-processor 1375 among others. These controller components may be connected to a system bus 1360, and through the system bus 1360 to an interface bus 1335. Further, user input devices 1305, peripheral devices 1310, co-processor devices 1315, and the like, may be connected through the interface bus 1335 to the system bus 1360. The interface bus 1335 may be connected to a number of interface adapters such as processor interface 1340, input output interfaces (I/O) 1345, network interfaces 1350, storage interfaces 1355, and the like.


Processor interface 1340 may facilitate communication between co-processor devices 1315 and co-processor 1375. In one implementation, processor interface 1340 may expedite encryption and decryption of requests or data. Input output interfaces (I/O) 1345 facilitate communication between user input devices 1305, peripheral devices 1310, co-processor devices 1315, and/or the like and components of gaming controller 1300 using protocols such as those for handling audio, data, video interface, wireless transceivers, or the like (e.g., Bluetooth®, IEEE 1394a-b, serial, universal serial bus (USB), Digital Visual Interface (DVI), 802.11a/b/g/n/x, cellular, etc.). Network interfaces 1350 may be in communication with the network 1330. Through the network 1330, gaming controller 1300 may be accessible to remote terminal devices 1320 (e.g., player terminals 122 illustrated in FIG. 1). Network interfaces 1350 may use various wired and wireless connection protocols such as, direct connect, Ethernet, wireless connection such as IEEE 802.11a-x, miracast and the like. Some components of the interactive gaming system may include various protocols or comply with various standards or certifications set forth by different associations or regulatory agencies. For example, some embodiments may use the slot accounting system (SAS) protocol or comply with the game to system (G2S) standard.


Examples of network 1330 include the Internet, Local Area Network (LAN), Metropolitan Area Network (MAN), a Wide Area Network (WAN), wireless network (e.g., using Wireless Application Protocol WAP), a secured custom connection, and the like. The network interfaces 1350 can include a firewall which can, in some aspects, govern and/or manage permission to access/proxy data in a computer network, and track varying levels of trust between different machines and/or applications. The firewall can be any number of modules having any combination of hardware and/or software components able to enforce a predetermined set of access rights between a particular set of machines and applications, machines and machines, and/or applications and applications, for example, to regulate the flow of traffic and resource sharing between these varying entities. The firewall may additionally manage and/or have access to an access control list which details permissions including, for example, the access and operation rights of an object by an individual, a machine, and/or an application, and the circumstances under which the permission rights stand. Other network security functions performed or included in the functions of the firewall, can be, for example, but are not limited to, intrusion-prevention, intrusion detection, next-generation firewall, personal firewall, etc., without deviating from the novel art of this disclosure.


Storage interfaces 1355 may be in communication with a number of storage devices such as, storage devices 1390, removable disc devices, and the like. The storage interfaces 1355 may use various connection protocols such as Serial Advanced Technology Attachment (SATA), IEEE 1394, Ethernet, Fiber, Universal Serial Bus (USB), and the like.


User input devices 1305 and peripheral devices 1310 may be connected to I/O interface 1345 and potentially other interfaces, buses and/or components. User input devices 1305 may include card readers, finger print readers, joysticks, keyboards, microphones, mouse, remote controls, retina readers, touch screens, sensors, and/or the like. Peripheral devices 1310 may include antenna, audio devices (e.g., microphone, speakers, etc.), cameras, external processors, communication devices, radio frequency identifiers (RFIDs), scanners, printers, storage devices, transceivers, and/or the like. Co-processor devices 1315 may be connected to the controller 1300 through interface bus 1335, and may include microcontrollers, processors, interfaces or other devices.


Computer executable instructions and data may be stored in memory (e.g., registers, cache memory, random access memory, flash, etc.) which is accessible by processors. These stored instruction codes (e.g., programs) may engage the processor components, motherboard and/or other system components to perform desired operations. The controller 1300 may employ various forms of memory including on-chip CPU memory (e.g., registers), RAM 1380, ROM 1385, and storage devices 1390. Storage devices 1390 may employ any number of tangible, non-transitory storage devices or systems such as fixed or removable magnetic disk drive, an optical drive, solid state memory devices and other processor-readable storage media. Computer-executable instructions stored in the memory may include an interactive gaming platform having one or more program modules such as routines, programs, objects, components, data structures, and so on that perform particular tasks or implement particular abstract data types. For example, the memory may contain operating system (OS) component 1395, modules and other components, database tables, and the like. These modules/components may be stored and accessed from the storage devices, including from external storage devices accessible through an interface bus 1335.


The database components can store programs executed by the processor to process the stored data. The database components may be implemented in the form of a database that is relational, scalable and secure. Examples of such database include DB2, MySQL, Oracle, Sybase, and the like. Alternatively, the database may be implemented using various standard data-structures, such as an array, hash, list, stack, structured text file (e.g., XML), table, and/or the like. Such data-structures may be stored in memory and/or in structured files.


The gaming controller 1300 may be implemented in distributed computing environments, where tasks or modules are performed by remote processing devices, which are linked through a communications network, such as a Local Area Network (“LAN”), Wide Area Network (“WAN”), the Internet, and the like. In a distributed computing environment, program modules or subroutines may be located in both local and remote memory storage devices. Distributed computing may be employed to load balance and/or aggregate resources for processing. Alternatively, aspects of the gaming controller 1300 may be distributed electronically over the Internet or over other networks (including wireless networks). Those skilled in the relevant art(s) will recognize that portions of the interactive gaming system may reside on a server computer, while corresponding portions reside on a client computer. Data structures and transmission of data particular to aspects of the gaming controller 1300 are also encompassed within the scope of the disclosure.


CONCLUSION

Unless the context clearly requires otherwise, throughout the description and the claims, the words “comprise,” “comprising,” and the like are to be construed in an inclusive sense, as opposed to an exclusive or exhaustive sense; that is to say, in the sense of “including, but not limited to.” As used herein, the terms “connected,” “coupled,” or any variant thereof means any connection or coupling, either direct or indirect, between two or more elements; the coupling or connection between the elements can be physical, logical, or a combination thereof. Additionally, the words “herein,” “above,” “below,” and words of similar import, when used in this application, refer to this application as a whole and not to any particular portions of this application. Where the context permits, words in the above Detailed Description using the singular or plural number may also include the plural or singular number respectively. The word “or,” in reference to a list of two or more items, covers all of the following interpretations of the word: any of the items in the list, all of the items in the list, and any combination of the items in the list.


The above Detailed Description of examples of the technology is not intended to be exhaustive or to limit the technology to the precise form disclosed above. While specific examples for the technology are described above for illustrative purposes, various equivalent modifications are possible within the scope of the technology, as those skilled in the relevant art will recognize. For example, while processes or blocks are presented in a given order, alternative implementations may perform routines having steps, or employ systems having blocks, in a different order, and some processes or blocks may be deleted, moved, added, subdivided, combined, and/or modified to provide alternative or subcombinations. Each of these processes or blocks may be implemented in a variety of different ways. Also, while processes or blocks are at times shown as being performed in series, these processes or blocks may instead be performed or implemented in parallel, or may be performed at different times. Further, any specific numbers noted herein are only examples: alternative implementations may employ differing values or ranges.


Having described several embodiments, it will be recognized by those of skill in the art that various modifications, alternative constructions, and equivalents may be used without departing from the spirit of the technology. Additionally, a number of well-known processes and elements have not been described in order to avoid unnecessarily obscuring the present technology. Accordingly, the above description should not be taken as limiting the scope of the technology, which is defined in the following claims.


The teachings of the technology provided herein can be applied to other systems, not necessarily the system described above. The elements and acts of the various examples described above can be combined to provide further implementations of the technology. Some alternative implementations of the technology may include not only additional elements to those implementations noted above, but also may include fewer elements.


These and other changes can be made to the technology in light of the above Detailed Description. While the above description describes certain examples of the technology, and describes the best mode contemplated, no matter how detailed the above appears in text, the technology can be practiced in many ways. Details of the system may vary considerably in its specific implementation, while still being encompassed by the technology disclosed herein. As noted above, particular terminology used when describing certain features or aspects of the technology should not be taken to imply that the terminology is being redefined herein to be restricted to any specific characteristics, features, or aspects of the technology with which that terminology is associated. In general, the terms used in the following claims should not be construed to limit the technology to the specific examples disclosed in the specification, unless the above Detailed Description section explicitly defines such terms. Accordingly, the actual scope of the technology encompasses not only the disclosed examples, but also all equivalent ways of practicing or implementing the technology under the claims.


To reduce the number of claims, certain aspects of the technology are presented below in certain claim forms, but the applicant contemplates the various aspects of the technology in any number of claim forms. For example, while only one aspect of the technology is recited as a computer-readable medium claim, other aspects may likewise be embodied as a computer-readable medium claim, or in other forms, such as being embodied in a means-plus-function claim. Any claims intended to be treated under 35 U.S.C. § 112 (f) will begin with the words “means for”, but use of the term “for” in any other context is not intended to invoke treatment under 35 U.S.C. § 112 (f). Accordingly, the applicant reserves the right to pursue additional claims after filing this application to pursue such additional claim forms, in either this application or in a continuing application.

Claims
  • 1. An electronic gaming system capable of implementing electronic countermeasures against collusion or cheating during an electronic game, the system comprising: at least one processor;at least one memory device operably coupled to the processor;a communications interface operably coupled to the processor and to a host computer hosting the electronic game, and configured to establish communication via the Internet between the host computer system and a player terminal operable by a player; andan artificial intelligence (AI) system operably coupled to the processor via the communications interface,wherein the AI system is configured to employ supervised or unsupervised learning algorithms directed to identification of abnormal behavior by the player, colluding players, or other types of cheating,wherein the at least one processor is configured to: determine a risk level for the player in the electronic game based on a reputational profile developed using background data about the player ingested via the communications interface from public or private data sources;cause the host computer system to initiate an electronic gaming session for the electronic game on the player terminal in response to a request by the player to play the electronic game, wherein to cause the host computer system to initiate the electronic gaming session, the at least one processor is further configured to cause action from the electronic gaming session being played by the player to be presented on a display device of the player terminal;receive, via the communications interface, signals encoding data representative of: a state of the electronic game being played by the player, and game play information representing player interactions in the electronic game by the player using the player terminal, wherein an amount of the data representative of the state of the electronic game and the game play information captured increases with increasing risk level,wherein the AI system is further configured to: ingest, via the communications interface, at least the data representative of the state of the electronic game and the game play information;evaluate the signals in real-time during play by the player in the electronic game and according to a collusion avoidance policy for the electronic game; anddetermine that the player colluded or cheated during the electronic game based on the signals being evaluated,and wherein the at least one processor is further configured to: in response to it being determined by the AI system that the player colluded or cheated during the electronic game, cause an action to be implemented on the player terminal to enforce the collusion avoidance policy, wherein to cause the action to be implemented on the player terminal to enforce the collusion avoidance policy, the at least one processor is configured to cause payouts to be held subject to further review.
  • 2. The system of claim 1, wherein the player terminal includes a global positioning system (GPS) system, and wherein the at least one processor is further configured to: receive, via the communications interface, GPS coordinates data from the player terminal; anddetermine, based on the GPS coordinates data, a location of the player terminal.
  • 3. The system of claim 2, wherein the at least one processor is further configured to cause the host computer system to initiate the electronic game on the player terminal only when the GPS system is active.
  • 4. The system of claim 2, wherein the at least one processor is further configured to dynamically set a customized collusion avoidance policy according to the location.
  • 5. The system of claim 1, wherein to cause the action to be implemented on the player terminal to enforce the collusion avoidance policy, the at least one processor is further configured to terminate the electronic gaming session for the player.
  • 6. The system of claim 1, wherein to cause the action to be implemented on the player terminal to enforce the collusion avoidance policy, the at least one processor is further configured to initiate review of video surveillance data.
  • 7. The system of claim 1, wherein the at least one processor is further configured to update the risk level of the player in the database further in response to it being determined by the AI system that the player colluded or cheated during the electronic game.
  • 8. One or more non-transitory media having program instructions stored thereon which, when executed by one or more processors, cause at least one machine of an electronic gaming system capable of implementing electronic countermeasures against collusion or cheating during an electronic game to: establish, using a communications interface, communication via the Internet between a host computer hosting the electronic game and a player terminal operable by a player;determine a risk level for the player in the electronic game based on a reputational profile developed using background data about the player ingested via the communications interface from public or private data sources;cause the host computer system hosting the electronic game to initiate an electronic gaming session for the electronic game on the player terminal in response to a request by the player to play the electronic game, wherein, when executed by the one or more processors to initiate the electronic gaming session, the program instructions further cause the at least one machine to cause action from the electronic gaming session being played by the player to be presented on a display device of the player terminal;receive, via the communications interface, signals encoding data representative of: a state of the electronic game being played by the player, and game play information representing player interactions in the electronic game by the player using the player terminal, wherein an amount of the data representative of the state of the electronic game and the game play information captured increases with increasing risk level;cause an artificial intelligence (AI) system to ingest, via the communications interface, at least the data representative of the state of the electronic game and the game play information, wherein the AI system is configured to employ supervised or unsupervised learning algorithms directed to identification of abnormal player behavior, colluding players, or other types of cheating;evaluate the signals in real-time during play by the player in the electronic game and according to a collusion avoidance policy for the electronic game;determine that the player colluded or cheated during the electronic game based on the signals being evaluated; andin response to it being determined that the player colluded or cheated during the electronic game, cause an action to be implemented on the player terminal to enforce the collusion avoidance policy, wherein, when executed by the one or more processors to cause the action to be implemented on the player terminal to enforce the collusion avoidance policy, the program instructions further cause the at least one machine to cause payouts to be held subject to further review.
  • 9. The one or more non-transitory computer readable media of claim 8, wherein the player terminal includes a global positioning system (GPS) system, and wherein, when executed by the one or more processors, the program instructions further cause the at least one machine to: receive, via the communications interface, GPS coordinates data from the player terminal; anddetermine, based on the GPS coordinates data, a location of the player terminal.
  • 10. The one or more non-transitory computer readable media of claim 9, wherein, when executed by the one or more processors, the program instructions further cause the at least one machine to cause the host computer system to initiate the electronic game on the player terminal only when the GPS system is active.
  • 11. The one or more non-transitory computer readable media of claim 9, wherein, when executed by the one or more processors, the program instructions further cause the at least one machine to dynamically set a customized collusion avoidance policy according to the location.
  • 12. The one or more non-transitory computer readable media of claim 8, wherein, when executed by the one or more processors to cause the action to be implemented on the player terminal to enforce the collusion avoidance policy, the program instructions further cause the at least one machine to terminate the electronic gaming session for the player.
  • 13. The one or more non-transitory computer readable media of claim 8, wherein, when executed by the one or more processors to cause the action to be implemented on the player terminal to enforce the collusion avoidance policy, the program instructions further cause the at least one machine to initiate review of video surveillance data.
  • 14. The one or more non-transitory computer readable media of claim 8, wherein, when executed by the one or more processors, the program instructions further cause the at least one machine to update the risk level of the player in the database further in response to it being determined that the player colluded or cheated during the electronic game.
  • 15. A method of operating an electronic gaming system capable of implementing electronic countermeasures against collusion or cheating during an electronic game, the method comprising: establishing, using a communications interface, communication via the Internet between a host computer hosting the electronic game and a player terminal operable by a player;determining, by at least one processor of the electronic gaming system, a risk level for the player in the electronic game based on a reputational profile developed using background data about the player ingested via the communications interface from public or private data sources;causing, by the at least one processor, the host computer system to initiate an electronic gaming session for the electronic game on the player terminal, wherein causing the host computer system to initiate the electronic gaming session comprises causing the host computer system to cause action from the electronic gaming session being played by the player to be presented on a display device of the player terminal;receiving, by the at least one processor via the communications interface, signals encoding data representative of: a state of the electronic game being played by the player, and game play information representing player interactions in the electronic game by the player using the player terminal, wherein an amount of the data representative of the state of the electronic game and the game play information captured increases with increasing risk level;ingesting, by an artificial intelligence (AI) system, at least the data representative of the state of the electronic game and the game play information;employing, by the AI system, supervised or unsupervised learning algorithms directed to identification of abnormal player behavior, colluding players, or other types of cheating;evaluating, by the AI system according to a collusion avoidance policy for the electronic game, the data representative of the state of the electronic game and the game play information in real-time during play by the player in the electronic game; anddetermining, by the AI system, that the player colluded or cheated during the electronic game based on the evaluating; andin response to determining that the player colluded or cheated during the electronic game, causing, by the at least one processor, an action to be implemented on the player terminal to enforce the collusion avoidance policy, wherein causing the action to be implemented on the player terminal to enforce the collusion avoidance policy comprises causing payouts to be held subject to further review.
  • 16. The method of claim 15, wherein the player terminal includes a global positioning system (GPS) system, the method further comprising: receiving, by the at least one processor via the communications interface, GPS coordinates data from the player terminal; anddetermining, by the at least one processor, a location of the player terminal based on the GPS coordinates data.
  • 17. The method of claim 16 further comprising at least one of: causing the host computer system to initiate the electronic game on the player terminal only when the GPS system is active; anddynamically set a customized collusion avoidance policy according to the location.
  • 18. The method of claim 15, wherein causing the action to be implemented on the player terminal to enforce the collusion avoidance policy comprises terminating the gaming session for the player.
  • 19. The method of claim 15, wherein causing the action to be implemented on the player terminal to enforce the collusion avoidance policy further comprises initiating review of video surveillance data.
  • 20. The method of claim 15 further comprising updating the risk level of the player in the database further in response to determining that the player colluded or cheated during the electronic game.
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No. 17/073,959, filed Oct. 19, 2020, and now allowed; which is a continuation of U.S. patent application Ser. No. 15/875,476, filed Jan. 19, 2018, and issued as U.S. Pat. No. 10,810,837 on Oct. 20, 2020; which is a continuation of U.S. patent application Ser. No. 15/632,101, filed Jun. 23, 2017, and issued as U.S. Pat. No. 9,875,610 on Jan. 23, 2018; which is a continuation-in-part of U.S. patent application Ser. No. 15/436,498, filed Feb. 17, 2017, and issued as U.S. Pat. No. 9,697,682 on Jul. 4, 2017; which is a continuation of U.S. patent application Ser. No. 15/192,821, filed Jun. 24, 2016, and issued as U.S. Pat. No. 9,589,417 on Mar. 7, 2017; which is a continuation-in-part of U.S. patent application Ser. No. 14/880,001, filed on Oct. 9, 2015, and issued as U.S. Pat. No. 9,396,611 on Jul. 19, 2016; which is a continuation of U.S. patent application Ser. No. 11/183,247, filed Jul. 14, 2005, and issued as U.S. Pat. No. 9,159,195 on Oct. 13, 2015; each of which is hereby incorporated by reference in its entirety for all purposes.

Continuations (5)
Number Date Country
Parent 17073959 Oct 2020 US
Child 18821174 US
Parent 15875476 Jan 2018 US
Child 17073959 US
Parent 15632101 Jun 2017 US
Child 15875476 US
Parent 15192821 Jun 2016 US
Child 15436498 US
Parent 11183247 Jul 2005 US
Child 14880001 US
Continuation in Parts (2)
Number Date Country
Parent 15436498 Feb 2017 US
Child 15632101 US
Parent 14880001 Oct 2015 US
Child 15192821 US