The present disclosure relates to gaming machines and networks and, more particularly, to games-on-demand systems.
Gaming in the United States is divided into Class I, Class II and Class III games. Class I gaming includes social games played for minimal prizes, or traditional ceremonial games. Class II gaming includes bingo games, pull tab games if played in the same location as bingo games, lotto, punch boards, tip jars, instant bingo, and other games similar to bingo. Class III gaming includes any game that is not a Class I or Class II game, such as a game of chance typically offered in non-Indian, state-regulated casinos. Many games of chance that are played on gaming machines fall into the Class II and Class III categories of games.
Various games, particularly the Class II and Class III categories of games, can be implemented as server-based games in a server-client system. Server-based games are generally those in which the games and capabilities of a gaming terminal depend on a central server. The terminal may download games from the central server or may rely on the central server to run the games.
Game applications are becoming more sophisticated and, hence, larger in size, to use the expanding capabilities of central servers and gaming terminals. In addition, the number of different game applications available for play is always increasing, as game developers attempt to meet player demand for various styles of games. There are so many available games; it is impractical to store all of these games on a gaming machine. Thus, the notion of server-based games is becoming a necessity in some casinos and hotels.
In a games-on-demand system, a player can operate a gaming terminal to request a particular game for playing. In a download configuration, the requested game is downloaded from the central server to the gaming terminal, and then executed on the gaming terminal. In a server-based configuration, on the other hand, the requested game is executed on the server, and the player interacts with the server to play the game. For example, U.S. Pat. No. 5,779,549, “Database Driven Online Distributed Tournament System” and U.S. Pat. No. 6,409,602, “Slim Terminal Gaming System” describe server-based configurations where no processing occurs on the gaming machine. That is, the game is executed on the central server, and the gaming machine operates as an IO device for a player to interact with the central server. The game play, meter tracking, and other game functions are all carried out on the central server.
In implementing a games-on-demand system, both the download configuration and the server-based configuration described above have their respective drawbacks. In a download configuration, the gaming terminal is susceptible to long delays while a requested game is retrieved and downloaded from the central server, and then authenticated, before game play can begin. These delays are often attributable to the large and ever increasing size of game applications, described above. In a server-based configuration, a drawback is that the operability of the gaming terminals is entirely network-dependent. That is, when the central server malfunctions, or other network problems interfere with the connection between the gaming terminals and the central server, all of the gaming terminals are affected. Game play can be hindered on all of the gaming terminals, due to their dependence on the central server to execute the game.
Thus, it is desirable to provide a gaming system which eliminates both the delay associated with download configurations, and the network-dependence associated with server-based configurations.
Disclosed are methods, apparatus, and systems, including computer program products, implementing and using techniques for a method for providing a game on demand over a data network, in a gaming machine. In one aspect of the present invention, the gaming machine sends a request message for a game application over the data network. In a network mode, the gaming machine receives outputted results from an executed game application over a streaming channel of the data network for network-based game play. During the network-based game play, the game application is downloaded over a download channel of the data network. In a local mode, the gaming machine executes the downloaded game application independent of the network-based game play. The gaming machine switches instantaneously from the network mode to the local mode for machine-based game play, including maintaining a status of the network-based game play.
All of the foregoing methods, along with other methods of aspects of the present invention, may be implemented in software, firmware, hardware and combinations thereof. For example, the methods of aspects of the present invention may be implemented by computer programs embodied in machine-readable media and other products.
Aspects of the invention may be implemented by networked gaming machines, game servers and other such devices. These and other features and benefits of aspects of the invention will be described in more detail below with reference to the associated drawings.
Reference will now be made in detail to some specific embodiments of the invention including the best modes contemplated by the inventors for carrying out the invention. Examples of these specific embodiments are illustrated in the accompanying drawings. While the invention is described in conjunction with these specific embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, it is intended to cover alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims. Moreover, numerous specific details are set forth below in order to provide a thorough understanding of the present invention. The present invention may be practiced without some or all of these specific details. In other instances, well known process operations have not been described in detail in order not to obscure the present invention.
In
In
Those skilled in the art should appreciate that the channels 220, 225 and 230, as shown in
In
In
Using the configuration of
In another embodiment, similar to the system 100 of
During network mode, also referred to as server mode, when the requested game application is executing on a game server 105 or gaming machine external to the requesting gaming machine 120a, state information for the executing game application, referred to herein as game settings, are maintained in the processor-readable storage medium 515. These settings will vary, depending on the particular game being played as well as the stage of the game. The configuration of these settings in storage in medium 515 can be structured as desired for the particular implementation, as will be understood by those skilled in the art.
In one example, as shown in
In
In step 605 of
When output data is being generated and streamed from game server 105 to gaming machine 120a, this is referred to herein as a “network mode” or “server mode” of operation. Network mode and server mode generally refer to the execution of the requested game application on game server 105 or any other machine or device external to gaming machine 120a, for network-based or server-based game play on gaming machine 120a. In network mode, gaming machine 120a sends input data and selections, as appropriate for the particular game being executed on game server 105 or another device over the communications channel 230 or another suitable channel of data network 110. As used herein, “server-based game play” refers to execution of a game application external to the gaming machine 120a on a server such as game server 105 or one or more streaming servers 305 as shown in
In step 610 of
In step 615, responsive to receiving the request message from gaming machine 120a, generally at some time around the beginning of network-based game play, or shortly thereafter, the download part 210 of game server 105 begins downloading a downloadable form of the same game application executing on streaming part 205 over download channel 225 of data network 110. Following step 615, step 617 includes authentication of the downloaded game application by gaming machine 120a. The game application can be authenticated using any of a variety of techniques, as will be appreciated by those skilled in the art.
In step 620 of
In
In one embodiment, a lower bandwidth version of the game application is run in network mode. For example, one game application normally outputs video data at 80 frames per second. In step 607 of
Some games of the present invention can be implemented, in part, in a gaming device such as the gaming machines described herein according to game data received from a game server, such as the game servers described herein. The gaming device may receive such game data through data network 110, such as a dedicated gaming network and/or a public data network such as the Internet.
One example of a gaming system, also referred to herein as a gaming network, that may be used to implement methods performed in accordance with embodiments of the invention is depicted in
Here, gaming machine 702, and the other gaming machines 730, 732, 734, and 736, include a main cabinet 706 and a top box 704. The main cabinet 706 houses the main gaming elements and can also house peripheral systems, such as those that utilize dedicated gaming networks. The top box 704 may also be used to house these peripheral systems.
The master gaming controller 708 controls the game play on the gaming machine 702 according to instructions and/or game data from game server 722 or independent game logic module 510 and receives or sends data to various input/output devices 711 on the gaming machine 702. In one embodiment, master gaming controller 708 includes processor 505 and independent game logic module 510 of gaming machine 120a as described above. The master gaming controller 708 may also communicate with a display 710.
A particular gaming entity may desire to provide network gaming services that provide some operational advantage. Thus, dedicated networks may connect gaming machines to host servers that track the performance of gaming machines under the control of the entity, such as for accounting management, electronic fund transfers (EFTs), cashless ticketing, such as EZPay™, marketing management, and data tracking, such as player tracking Therefore, master gaming controller 708 may also communicate with EFT system 712, EZPay™ system 716 (a proprietary cashless ticketing system of the present assignee), and player tracking system 720. The systems of the gaming machine 702 communicate the data onto the network 722 via a communication board 718.
It will be appreciated by those of skill in the art that the present invention could be implemented on a network with more or fewer elements than are depicted in
Moreover, DCU 724 and translator 725 are not required for all gaming establishments 701. However, due to the sensitive nature of much of the information on a gaming network (e.g., electronic fund transfers and player tracking data) the manufacturer of a host system usually employs a particular networking language having proprietary protocols. For instance, 10-20 different companies produce player tracking host systems where each host system may use different protocols. These proprietary protocols are usually considered highly confidential and not released publicly.
Further, in the gaming industry, gaming machines are made by many different manufacturers. The communication protocols on the gaming machine are typically hard-wired into the gaming machine and each gaming machine manufacturer may utilize a different proprietary communication protocol. A gaming machine manufacturer may also produce host systems, in which case their gaming machine are compatible with their own host systems. However, in a heterogeneous gaming environment, gaming machines from different manufacturers, each with its own communication protocol, may be connected to host systems from other manufacturers, each with another communication protocol. Therefore, communication compatibility issues regarding the protocols used by the gaming machines in the system and protocols used by the host systems must be considered.
A network device that links a gaming establishment with another gaming establishment and/or a central system will sometimes be referred to herein as a “site controller.” Here, site controller 742 provides this function for gaming establishment 701. Site controller 742 is connected to a central system and/or other gaming establishments via one or more networks, which may be public or private networks. Among other things, site controller 742 communicates with game server 722 to obtain game data, such as ball drop data, bingo card data, etc.
In the present illustration, gaming machines 702, 730, 732, 734 and 736 are connected to a dedicated gaming network 722. In general, the DCU 724 functions as an intermediary between the different gaming machines on the network 722 and the site controller 742. In general, the DCU 724 receives data transmitted from the gaming machines and sends the data to the site controller 742 over a transmission path 726. In some instances, when the hardware interface used by the gaming machine is not compatible with site controller 742, a translator 725 may be used to convert serial data from the DCU 724 to a format accepted by site controller 742. The translator may provide this conversion service to a plurality of DCUs.
Further, in some dedicated gaming networks, the DCU 724 can receive data transmitted from site controller 742 for communication to the gaming machines on the gaming network. The received data may be, for example, communicated synchronously to the gaming machines on the gaming network.
Here, CVT 752 provides cashless and cashout gaming services to the gaming machines in gaming establishment 701. Broadly speaking, CVT 752 authorizes and validates cashless gaming machine instruments (also referred to herein as “tickets” or “vouchers”), including but not limited to tickets for causing a gaming machine to display a game result and cashout tickets. Moreover, CVT 752 authorizes the exchange of a cashout ticket for cash. These processes will be described in detail below. In one example, when a player attempts to redeem a cashout ticket for cash at cashout kiosk 744, cash out kiosk 744 reads validation data from the cashout ticket and transmits the validation data to CVT 752 for validation. The tickets may be printed by gaming machines, by cashout kiosk 744, by a stand-alone printer, by CVT 752, etc. Some gaming establishments will not have a cashout kiosk 744. Instead, a cashout ticket could be redeemed for cash by a cashier (e.g. of a convenience store), by a gaming machine or by a specially configured CVT.
Turning to
The gaming machine 702 includes a top box 6, which sits on top of the main cabinet 4. The top box 6 houses a number of devices, which may be used to add features to a game being played on the gaming machine 702, including speakers 10, 12, 14, a ticket printer 18 which may print bar-coded tickets 20 used as cashless instruments. The player tracking unit mounted within the top box 6 includes a key pad 22 for entering player tracking information, a florescent display 16 for displaying player tracking information, a card reader 24 for entering a magnetic striped card containing player tracking information, a microphone 43 for inputting voice data, a speaker 42 for projecting sounds and a light panel 44 for display various light patterns used to convey gaming information. In other embodiments, the player tracking unit and associated player tracking interface devices, such as 16, 22, 24, 42, 43 and 44, may be mounted within the main cabinet 4 of the gaming machine, on top of the gaming machine, or on the side of the main cabinet of the gaming machine.
Understand that gaming machine 702 is but one example from a wide range of gaming machine designs on which the present invention may be implemented. For example, not all suitable gaming machines have top boxes or player tracking features. Further, some gaming machines have two or more game displays—mechanical and/or video. Some gaming machines are designed for bar tables and have displays that face upwards. Still further, some machines may be designed entirely for cashless systems. Such machines may not include such features as bill validators, coin acceptors and coin trays. Instead, they may have only ticket readers, card readers and ticket dispensers. Those of skill in the art will understand that the present can be deployed on most gaming machines now available or hereafter developed. Moreover, some aspects of the invention may be implemented on devices which lack some of the features of the gaming machines described herein, e.g., workstation, desktop computer, a portable computing device such as a personal digital assistant or similar handheld device, a cellular telephone, etc. U.S. patent application Ser. No. 09/967,326, filed Sep. 28, 2001 and entitled “Wireless Game Player,” is hereby incorporated by reference for all purposes.
Returning to the example of
During the course of a game, a player may be required to make a number of decisions. For example, a player may vary his or her wager on a particular game, select a prize for a particular game, or make game decisions regarding gaming criteria that affect the outcome of a particular game (e.g., which cards to hold). The player may make these choices using the player-input switches 32, the video display screen 34 or using some other hardware and/or software that enables a player to input information into the gaming machine (e.g. a GUI displayed on display 16).
During certain game functions and events, the gaming machine 702 may display visual and auditory effects that can be perceived by the player. These effects add to the excitement of a game, which makes a player more likely to continue playing. Auditory effects include various sounds that are projected by the speakers 10, 12, 14. Visual effects include flashing lights, strobing lights or other patterns displayed from lights on the gaming machine 702, from lights behind the belly glass 40 or the light panel on the player tracking unit 44.
After the player has completed a game, the player may receive game tokens from the coin tray 38 or the ticket 20 from the printer 18, which may be used for further games or to redeem a prize. Further, the player may receive a ticket 20 for food, merchandise, or games from the printer 18. The type of ticket 20 may be related to past game playing recorded by the player tracking software within the gaming machine 702. In some embodiments, these tickets may be used by a game player to obtain game services.
IGT gaming machines are implemented with special features and/or additional circuitry that differentiate them from general-purpose computers (e.g., desktop PC's and laptops). Gaming machines are highly regulated to ensure fairness and, in many cases, gaming machines are operable to dispense monetary awards of multiple millions of dollars. Therefore, to satisfy security and regulatory requirements in a gaming environment, hardware and software architectures may be implemented in gaming machines that differ significantly from those of general-purpose computers. A description of gaming machines relative to general-purpose computing machines and some examples of the additional (or different) components and features found in gaming machines are described below.
At first glance, one might think that adapting PC technologies to the gaming industry would be a simple proposition because both PCs and gaming machines employ microprocessors that control a variety of devices. However, because of such reasons as 1) the regulatory requirements that are placed upon gaming machines, 2) the harsh environment in which gaming machines operate, 3) security requirements and 4) fault tolerance requirements, adapting PC technologies to a gaming machine can be quite difficult. Further, techniques and methods for solving a problem in the PC industry, such as device compatibility and connectivity issues, might not be adequate in the gaming environment. For instance, a fault or a weakness tolerated in a PC, such as security holes in software or frequent crashes, may not be tolerated in a gaming machine because in a gaming machine these faults can lead to a direct loss of funds from the gaming machine, such as stolen cash or loss of revenue when the gaming machine is not operating properly.
For the purposes of illustration, a few differences between PC systems and gaming systems will be described. A first difference between gaming machines and common PC based computers systems is that gaming machines are designed to be state-based systems. In a state-based system, the system stores and maintains its current state in a non-volatile memory, such that, in the event of a power failure or other malfunction the gaming machine will return to its current state when the power is restored. For instance, if a player was shown an award for a game of chance and, before the award could be provided to the player the power failed, the gaming machine, upon the restoration of power, would return to the state where the award is indicated. As anyone who has used a PC, knows, PCs are not state machines and a majority of data is usually lost when a malfunction occurs. This requirement affects the software and hardware design on a gaming machine.
A second important difference between gaming machines and common PC based computer systems is that for regulation purposes, the software on the gaming machine used to generate the game of chance and operate the gaming machine has been designed to be static and monolithic to prevent cheating by the operator of gaming machine. For instance, one solution that has been employed in the gaming industry to prevent cheating and satisfy regulatory requirements has been to manufacture a gaming machine that can use a proprietary processor running instructions to generate the game of chance from an EPROM or other form of non-volatile memory. The coding instructions on the EPROM are static (non-changeable) and must be approved by a gaming regulators in a particular jurisdiction and installed in the presence of a person representing the gaming jurisdiction. Any changes to any part of the software required to generate the game of chance, such as adding a new device driver used by the master gaming controller to operate a device during generation of the game of chance can require a new EPROM to be burnt, approved by the gaming jurisdiction and reinstalled on the gaming machine in the presence of a gaming regulator. Regardless of whether the EPROM solution is used, to gain approval in most gaming jurisdictions, a gaming machine must demonstrate sufficient safeguards that prevent an operator of a gaming machine from manipulating hardware and software in a manner that gives them an unfair and some cases an illegal advantage. The code validation requirements in the gaming industry affect both hardware and software designs on gaming machines.
A third important difference between gaming machines and common PC based computer systems is the number and kinds of peripheral devices used on a gaming machine are not as great as on PC based computer systems. Traditionally, in the gaming industry, gaming machines have been relatively simple in the sense that the number of peripheral devices and the number of functions the gaming machine has been limited. Further, in operation, the functionality of gaming machines were relatively constant once the gaming machine was deployed, i.e., new peripherals devices and new gaming software were infrequently added to the gaming machine. This differs from a PC where users will go out and buy different combinations of devices and software from different manufacturers and connect them to a PC to suit their needs depending on a desired application. Therefore, the types of devices connected to a PC may vary greatly from user to user depending in their individual requirements and may vary significantly over time.
Although the variety of devices available for a PC may be greater than on a gaming machine, gaming machines still have unique device requirements that differ from a PC, such as device security requirements not usually addressed by PCs. For instance, monetary devices, such as coin dispensers, bill validators and ticket printers and computing devices that are used to govern the input and output of cash to a gaming machine have security requirements that are not typically addressed in PCs. Therefore, many PC techniques and methods developed to facilitate device connectivity and device compatibility do not address the emphasis placed on security in the gaming industry.
To address some of the issues described above, a number of hardware components, software components and architectures are utilized in gaming machines that are not typically found in general purpose computing devices, such as PCs. These hardware/software components and architectures, as described below in more detail, include but are not limited to watchdog timers, voltage monitoring systems, state-based software architecture and supporting hardware, specialized communication interfaces, security monitoring and trusted memory.
A watchdog timer is normally used in IGT gaming machines to provide a software failure detection mechanism. In a normally operating system, the operating software periodically accesses control registers in the watchdog timer subsystem to “re-trigger” the watchdog. Should the operating software fail to access the control registers within a preset timeframe, the watchdog timer will timeout and generate a system reset. Typical watchdog timer circuits contain a loadable timeout counter register to allow the operating software to set the timeout interval within a certain range of time. A differentiating feature of the some preferred circuits is that the operating software cannot completely disable the function of the watchdog timer. In other words, the watchdog timer always functions from the time power is applied to the board.
IGT gaming computer platforms preferably use several power supply voltages to operate portions of the computer circuitry. These can be generated in a central power supply or locally on the computer board. If any of these voltages falls out of the tolerance limits of the circuitry they power, unpredictable operation of the computer may result. Though most modern general-purpose computers include voltage monitoring circuitry, these types of circuits only report voltage status to the operating software. Out of tolerance voltages can cause software malfunction, creating a potential uncontrolled condition in the gaming computer. Gaming machines of the present assignee typically have power supplies with tighter voltage margins than that required by the operating circuitry. In addition, the voltage monitoring circuitry implemented in IGT gaming computers typically has two thresholds of control. The first threshold generates a software event that can be detected by the operating software and an error condition generated. This threshold is triggered when a power supply voltage falls out of the tolerance range of the power supply, but is still within the operating range of the circuitry. The second threshold is set when a power supply voltage falls out of the operating tolerance of the circuitry. In this case, the circuitry generates a reset, halting operation of the computer.
The standard method of operation for IGT slot machine game software is to use a state machine. Each function of the game (bet, play, result, etc.) is defined as a state. When a game moves from one state to another, critical data regarding the game software is stored in a custom non-volatile memory subsystem. In addition, game history information regarding previous games played, amounts wagered, and so forth also should be stored in a non-volatile memory device. This feature allows the game to recover operation to the current state of play in the event of a malfunction, loss of power, etc. This is critical to ensure the player's wager and credits are preserved. Typically, battery backed RAM devices are used to preserve this critical data. These memory devices are not used in typical general-purpose computers.
IGT gaming computers normally contain additional interfaces, including serial interfaces, to connect to specific subsystems internal and external to the slot machine. As noted above, some preferred embodiments of the present invention include parallel, digital interfaces for high-speed data transfer. However, even the serial devices may have electrical interface requirements that differ from the “standard” EIA RS232 serial interfaces provided by general-purpose computers. These interfaces may include EIA RS485, EIA RS422, Fiber Optic Serial, Optically Coupled Serial Interfaces, current loop style serial interfaces, etc. In addition, to conserve serial interfaces internally in the slot machine, serial devices may be connected in a shared, daisy-chain fashion where multiple peripheral devices are connected to a single serial channel.
IGT gaming machines may alternatively be treated as peripheral devices to a casino communication controller and connected in a shared daisy chain fashion to a single serial interface. In both cases, the peripheral devices are preferably assigned device addresses. If so, the serial controller circuitry must implement a method to generate or detect unique device addresses. General-purpose computer serial ports are not able to do this.
Security monitoring circuits detect intrusion into an IGT gaming machine by monitoring security switches attached to access doors in the slot machine cabinet. Preferably, access violations result in suspension of game play and can trigger additional security operations to preserve the current state of game play. These circuits also function when power is off by use of a battery backup. In power-off operation, these circuits continue to monitor the access doors of the slot machine. When power is restored, the gaming machine can determine whether any security violations occurred while power was off, e.g., via software for reading status registers. This can trigger event log entries and further data authentication operations by the slot machine software.
Trusted memory devices are preferably included in an IGT gaming machine computer to ensure the authenticity of the software that may be stored on less secure memory subsystems, such as mass storage devices. Trusted memory devices and controlling circuitry are typically designed to not allow modification of the code and data stored in the memory device while the memory device is installed in the slot machine. The code and data stored in these devices may include authentication algorithms, random number generators, authentication keys, operating system kernels, etc. The purpose of these trusted memory devices is to provide gaming regulatory authorities a root trusted authority within the computing environment of the slot machine that can be tracked and verified as original. This may be accomplished via removal of the trusted memory device from the slot machine computer and verification of the trusted memory device contents in a separate third party verification device. Once the trusted memory device is verified as authentic, and based on the approval of the verification algorithms contained in the trusted device, the gaming machine is allowed to verify the authenticity of additional code and data that may be located in the gaming computer assembly, such as code and data stored on hard disk drives.
Mass storage devices used in a general-purpose computer typically allow code and data to be read from and written to the mass storage device. In a gaming machine environment, modification of the gaming code stored on a mass storage device is strictly controlled and would only be allowed under specific maintenance type events with electronic and physical enablers required. Though this level of security could be provided by software, IGT gaming computers that include mass storage devices preferably include hardware level mass storage data protection circuitry that operates at the circuit level to monitor attempts to modify data on the mass storage device and will generate both software and hardware error triggers should a data modification be attempted without the proper electronic and physical enablers being present.
Gaming machines used for Class III games generally include software and/or hardware for generating random numbers. However, gaming machines used for Class II games may or may not have RNG capabilities. In some machines used for Class II games, RNG capability may be disabled.
The interfaces 968 are typically provided as interface cards (sometimes referred to as “linecards”). Generally, interfaces 968 control the sending and receiving of data packets over the network and sometimes support other peripherals used with the network device 960. Among the interfaces that may be provided are FC interfaces, Ethernet interfaces, frame relay interfaces, cable interfaces, DSL interfaces, token ring interfaces, and the like. In addition, various very high-speed interfaces may be provided, such as fast Ethernet interfaces, Gigabit Ethernet interfaces, ATM interfaces, HSSI interfaces, POS interfaces, FDDI interfaces, ASI interfaces, DHEI interfaces and the like.
When acting under the control of appropriate software or firmware, in some implementations of the invention CPU 962 may be responsible for implementing specific functions associated with the functions of a desired network device. According to some embodiments, CPU 962 accomplishes all these functions under the control of software including an operating system and any appropriate applications software.
CPU 962 may include one or more processors 963 such as a processor from the Motorola family of microprocessors or the MIPS family of microprocessors. In an alternative embodiment, processor 963 is specially designed hardware for controlling the operations of network device 960. In a specific embodiment, a memory 961 (such as non-volatile RAM and/or ROM) also forms part of CPU 962. However, there are many different ways in which memory could be coupled to the system. Memory block 961 may be used for a variety of purposes such as, for example, caching and/or storing data, programming instructions, etc.
Regardless of network device's configuration, it may employ one or more memories or memory modules (such as, for example, memory block 965) configured to store data, program instructions for the general-purpose network operations and/or other information relating to the functionality of the techniques described herein. The program instructions may control the operation of an operating system and/or one or more applications, for example.
Because such information and program instructions may be employed to implement the systems/methods described herein, the present invention relates to machine-readable media that include program instructions, state information, etc. for performing various operations described herein. Examples of machine-readable media include, but are not limited to, magnetic media such as hard disks, floppy disks, and magnetic tape; optical media such as CD-ROM disks; magneto-optical media; and hardware devices that are specially configured to store and perform program instructions, such as read-only memory devices (ROM) and random access memory (RAM). The invention may also be embodied in a carrier wave traveling over an appropriate medium such as airwaves, optical lines, electric lines, etc. Examples of program instructions include both machine code, such as produced by a compiler, and files containing higher-level code that may be executed by the computer using an interpreter.
Although the system shown in
The above-described devices and materials will be familiar to those of skill in the computer hardware and software arts. Although many of the components and processes are described above in the singular for convenience, it will be appreciated by one of skill in the art that multiple components and repeated processes can also be used to practice the techniques of the present invention.
Although the foregoing invention has been described in some detail for purposes of clarity of understanding, it will be apparent that certain changes and modifications may be practiced within the scope of the appended claims.
This application is a continuation of and claims priority to U.S. patent application Ser. No. 12/986,861 titled “METHOD AND SYSTEM FOR INSTANT-ON GAME DOWNLOAD,” filed on Jan. 7, 2011, which is a continuation of and claims priority to U.S. patent application Ser. No. 11/224,814, titled “METHOD AND SYSTEM FOR INSTANT-ON GAME DOWNLOAD,” filed on Sep. 12, 2005, both of which are hereby incorporated by reference in their entireties and for all purposes. This application related to commonly assigned, co-pending U.S. patent application Ser. No. 11/225,337, filed Sep. 12, 2005 and titled “DISTRIBUTED GAME SERVICES,” which issued as U.S. Pat. No. 8,287,379, which is hereby incorporated by reference in its entirety and for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
3931504 | Jacoby | Jan 1976 | A |
4072930 | Lucero et al. | Feb 1978 | A |
4335809 | Wain | Jun 1982 | A |
4430728 | Beitel et al. | Feb 1984 | A |
4454594 | Heffron et al. | Jun 1984 | A |
4468750 | Chamoff et al. | Aug 1984 | A |
4532416 | Berstein | Jul 1985 | A |
4572509 | Sitrick | Feb 1986 | A |
4582324 | Koza et al. | Apr 1986 | A |
4607844 | Fullerton | Aug 1986 | A |
4652998 | Koza et al. | Mar 1987 | A |
4689742 | Seymour et al. | Apr 1987 | A |
4856787 | Itkis | Aug 1989 | A |
4868900 | McGuire | Sep 1989 | A |
5103079 | Barakai et al. | Apr 1992 | A |
5136644 | Audebert et al. | Aug 1992 | A |
5149945 | Johnson et al. | Sep 1992 | A |
5155837 | Liu et al. | Oct 1992 | A |
5265874 | Dickinson et al. | Nov 1993 | A |
5286062 | Greenwood et al. | Feb 1994 | A |
5290033 | Bittner et al. | Mar 1994 | A |
5342047 | Heidel et al. | Aug 1994 | A |
5348299 | Clapper, Jr. | Sep 1994 | A |
5397125 | Adams | Mar 1995 | A |
5410703 | Nilsson et al. | Apr 1995 | A |
5421009 | Platt | May 1995 | A |
5421017 | Scholz et al. | May 1995 | A |
5466920 | Nair et al. | Nov 1995 | A |
5473772 | Halliwell et al. | Dec 1995 | A |
5487544 | Clapper, Jr. | Jan 1996 | A |
5489096 | Aron | Feb 1996 | A |
5491812 | Pisello et al. | Feb 1996 | A |
5555418 | Nilsson et al. | Sep 1996 | A |
5609337 | Clapper, Jr. | Mar 1997 | A |
5611730 | Weiss | Mar 1997 | A |
5643086 | Alcorn et al. | Jul 1997 | A |
5645485 | Clapper, Jr. | Jul 1997 | A |
5647592 | Gerow | Jul 1997 | A |
5654746 | McMullan et al. | Aug 1997 | A |
5655961 | Acres et al. | Aug 1997 | A |
5671412 | Christiano | Sep 1997 | A |
5682533 | Siljestroemer | Oct 1997 | A |
5684750 | Kondoh et al. | Nov 1997 | A |
5688174 | Kennedy | Nov 1997 | A |
5702304 | Acres et al. | Dec 1997 | A |
5715403 | Stefik | Feb 1998 | A |
5715462 | Iwamoto et al. | Feb 1998 | A |
5741183 | Acres et al. | Apr 1998 | A |
5749784 | Clapper, Jr. | May 1998 | A |
5752882 | Acres et al. | May 1998 | A |
5759102 | Pease et al. | Jun 1998 | A |
5761647 | Boushy | Jun 1998 | A |
5762552 | Vuong et al. | Jun 1998 | A |
5766076 | Pease et al. | Jun 1998 | A |
5768382 | Schneier et al. | Jun 1998 | A |
5779545 | Berg et al. | Jul 1998 | A |
5779549 | Walker et al. | Jul 1998 | A |
5797795 | Takemoto et al. | Aug 1998 | A |
5800269 | Holch et al. | Sep 1998 | A |
5819107 | Lichtman et al. | Oct 1998 | A |
5820459 | Acres et al. | Oct 1998 | A |
5828843 | Grimm et al. | Oct 1998 | A |
5833540 | Miodunski et al. | Nov 1998 | A |
5836817 | Acres et al. | Nov 1998 | A |
5845077 | Fawcett | Dec 1998 | A |
5845090 | Collins et al. | Dec 1998 | A |
5845902 | Takemoto | Dec 1998 | A |
5848064 | Cowan | Dec 1998 | A |
5851149 | Xidos et al. | Dec 1998 | A |
5855515 | Pease et al. | Jan 1999 | A |
5870723 | Pare et al. | Feb 1999 | A |
5871400 | Yfantis | Feb 1999 | A |
5876284 | Acres et al. | Mar 1999 | A |
5885158 | Torango et al. | Mar 1999 | A |
5896566 | Averbuch et al. | Apr 1999 | A |
5902983 | Crevelt et al. | May 1999 | A |
5905523 | Woodfield et al. | May 1999 | A |
5925127 | Ahmad | Jul 1999 | A |
5935000 | Sanchez et al. | Aug 1999 | A |
5941771 | Haste, III | Aug 1999 | A |
5943241 | Nichols et al. | Aug 1999 | A |
5949042 | Dietz et al. | Sep 1999 | A |
5970143 | Schneier et al. | Oct 1999 | A |
5971855 | Ng | Oct 1999 | A |
5980384 | Barrie | Nov 1999 | A |
5980385 | Clapper, Jr. | Nov 1999 | A |
5987376 | Olson et al. | Nov 1999 | A |
5999808 | Ladue | Dec 1999 | A |
6001016 | Walker et al. | Dec 1999 | A |
6002772 | Saito | Dec 1999 | A |
6003013 | Boushy et al. | Dec 1999 | A |
6006034 | Heath et al. | Dec 1999 | A |
6009458 | Hawkins | Dec 1999 | A |
6029046 | Khan et al. | Feb 2000 | A |
6038666 | Hsu et al. | Mar 2000 | A |
6047128 | Zander | Apr 2000 | A |
6047324 | Ford et al. | Apr 2000 | A |
6048269 | Burns et al. | Apr 2000 | A |
6052512 | Peterson et al. | Apr 2000 | A |
6071190 | Weiss et al. | Jun 2000 | A |
6098837 | Izawa et al. | Aug 2000 | A |
6099408 | Schneier et al. | Aug 2000 | A |
6104815 | Alcorn et al. | Aug 2000 | A |
6106396 | Alcorn et al. | Aug 2000 | A |
6113098 | Adams | Sep 2000 | A |
6113492 | Walker et al. | Sep 2000 | A |
6113495 | Walker et al. | Sep 2000 | A |
6125185 | Boesch | Sep 2000 | A |
6135884 | Hedrick et al. | Oct 2000 | A |
6135887 | Pease et al. | Oct 2000 | A |
6146277 | Ikeda | Nov 2000 | A |
6149522 | Alcorn et al. | Nov 2000 | A |
6154878 | Saboff | Nov 2000 | A |
6159098 | Slomiany et al. | Dec 2000 | A |
6165072 | Davis et al. | Dec 2000 | A |
6169976 | Colosso | Jan 2001 | B1 |
6178510 | O'Connor et al. | Jan 2001 | B1 |
6183362 | Boushy | Feb 2001 | B1 |
6190256 | Walker et al. | Feb 2001 | B1 |
6193152 | Fernando et al. | Feb 2001 | B1 |
6193608 | Walker et al. | Feb 2001 | B1 |
6199107 | Dujari | Mar 2001 | B1 |
6219836 | Wells et al. | Apr 2001 | B1 |
6253374 | Dresevic et al. | Jun 2001 | B1 |
6254483 | Acres | Jul 2001 | B1 |
6264561 | Saffari et al. | Jul 2001 | B1 |
6270410 | Demar et al. | Aug 2001 | B1 |
6280328 | Holch et al. | Aug 2001 | B1 |
6285868 | Ladue | Sep 2001 | B1 |
6285886 | Kamel et al. | Sep 2001 | B1 |
6293865 | Kelly et al. | Sep 2001 | B1 |
6302793 | Fertitta et al. | Oct 2001 | B1 |
6306035 | Kelly et al. | Oct 2001 | B1 |
6310873 | Rainis et al. | Oct 2001 | B1 |
6315663 | Sakamoto | Nov 2001 | B1 |
6317827 | Cooper | Nov 2001 | B1 |
6328648 | Walker et al. | Dec 2001 | B1 |
6340331 | Saunders et al. | Jan 2002 | B1 |
6343990 | Rasmussen et al. | Feb 2002 | B1 |
6347996 | Gilmore et al. | Feb 2002 | B1 |
6351688 | Nichols et al. | Feb 2002 | B1 |
6364769 | Weiss et al. | Apr 2002 | B1 |
6368216 | Hedrick et al. | Apr 2002 | B1 |
6368219 | Szrek et al. | Apr 2002 | B1 |
6371852 | Acres | Apr 2002 | B1 |
6402618 | Reed et al. | Jun 2002 | B1 |
6409602 | Wiltshire | Jun 2002 | B1 |
6446257 | Pradhan et al. | Sep 2002 | B1 |
6449687 | Moriya | Sep 2002 | B1 |
6453319 | Mattis et al. | Sep 2002 | B1 |
6454648 | Kelly et al. | Sep 2002 | B1 |
6488585 | Wells et al. | Dec 2002 | B1 |
6508709 | Karmarkar | Jan 2003 | B1 |
6508710 | Paravia et al. | Jan 2003 | B1 |
6554705 | Cumbers | Apr 2003 | B1 |
6575829 | Coleman et al. | Jun 2003 | B2 |
6607439 | Schneier et al. | Aug 2003 | B2 |
6625661 | Baldwin, Jr. | Sep 2003 | B1 |
6638170 | Crumby | Oct 2003 | B1 |
6645077 | Rowe | Nov 2003 | B2 |
6645078 | Mattice | Nov 2003 | B1 |
6652378 | Cannon et al. | Nov 2003 | B2 |
6666765 | Vancura | Dec 2003 | B2 |
6682423 | Brosnan et al. | Jan 2004 | B2 |
6684195 | Deaton et al. | Jan 2004 | B1 |
6739973 | Lucchesi et al. | May 2004 | B1 |
6745236 | Hawkins et al. | Jun 2004 | B1 |
6749502 | Baerlocher | Jun 2004 | B2 |
6749510 | Giobbi | Jun 2004 | B2 |
6785291 | Cao et al. | Aug 2004 | B1 |
6805634 | Wells et al. | Oct 2004 | B1 |
6853973 | Mathews et al. | Feb 2005 | B2 |
6866586 | Oberberger et al. | Mar 2005 | B2 |
6875110 | Crumby | Apr 2005 | B1 |
6896618 | Benoy et al. | May 2005 | B2 |
6908387 | Hedrick et al. | Jun 2005 | B2 |
6910079 | Zimmermann et al. | Jun 2005 | B2 |
6913531 | Yoseloff | Jul 2005 | B1 |
6935946 | Yoseloff et al. | Aug 2005 | B2 |
6962530 | Jackson | Nov 2005 | B2 |
6988267 | Harris et al. | Jan 2006 | B2 |
6997803 | Lemay et al. | Feb 2006 | B2 |
7127069 | Nguyen | Oct 2006 | B2 |
7168089 | Nguyen et al. | Jan 2007 | B2 |
7318775 | Brosnan et al. | Jan 2008 | B2 |
7399229 | Rowe | Jul 2008 | B2 |
7438643 | Brosnan et al. | Oct 2008 | B2 |
7455591 | Nguyen | Nov 2008 | B2 |
7470182 | Martinek et al. | Dec 2008 | B2 |
7480857 | Benbrahim et al. | Jan 2009 | B2 |
7515718 | Nguyen et al. | Apr 2009 | B2 |
7618317 | Jackson | Nov 2009 | B2 |
7636859 | Little et al. | Dec 2009 | B2 |
7780526 | Nguyen et al. | Aug 2010 | B2 |
7785204 | Wells et al. | Aug 2010 | B2 |
7801303 | Dulac | Sep 2010 | B2 |
7828654 | Carter, Sr. | Nov 2010 | B2 |
7887420 | Nguyen et al. | Feb 2011 | B2 |
7951002 | Brosnan | May 2011 | B1 |
7972214 | Kinsley et al. | Jul 2011 | B2 |
7988559 | Yoseloff et al. | Aug 2011 | B2 |
8057298 | Nguyen et al. | Nov 2011 | B2 |
8287379 | Nguyen et al. | Oct 2012 | B2 |
8556709 | Nguyen et al. | Oct 2013 | B2 |
8597127 | Nguyen et al. | Dec 2013 | B2 |
8651956 | Nguyen et al. | Feb 2014 | B2 |
20010021666 | Yoshida et al. | Sep 2001 | A1 |
20010031663 | Johnson | Oct 2001 | A1 |
20010036854 | Okuniewicz | Nov 2001 | A1 |
20010036855 | Defrees-Parrott et al. | Nov 2001 | A1 |
20010039210 | St-Denis | Nov 2001 | A1 |
20010044337 | Rowe et al. | Nov 2001 | A1 |
20010044339 | Cordero | Nov 2001 | A1 |
20010053712 | Yoseloff et al. | Dec 2001 | A1 |
20020002075 | Rowe | Jan 2002 | A1 |
20020016202 | Fertitta et al. | Feb 2002 | A1 |
20020022516 | Forden | Feb 2002 | A1 |
20020028706 | Barnard et al. | Mar 2002 | A1 |
20020034980 | Lemmons et al. | Mar 2002 | A1 |
20020045477 | Dabrowski | Apr 2002 | A1 |
20020049909 | Jackson et al. | Apr 2002 | A1 |
20020050683 | Hirota | May 2002 | A1 |
20020071557 | Nguyen | Jun 2002 | A1 |
20020082065 | Fogel | Jun 2002 | A1 |
20020093136 | Moody | Jul 2002 | A1 |
20020107065 | Rowe | Aug 2002 | A1 |
20020107072 | Giobbi | Aug 2002 | A1 |
20020111205 | Beavers | Aug 2002 | A1 |
20020116615 | Nguyen et al. | Aug 2002 | A1 |
20020132662 | Sharp et al. | Sep 2002 | A1 |
20020137217 | Rowe | Sep 2002 | A1 |
20020142844 | Kerr | Oct 2002 | A1 |
20020151359 | Rowe | Oct 2002 | A1 |
20020155887 | Criss-Puszkiewicz et al. | Oct 2002 | A1 |
20030032485 | Cockerille et al. | Feb 2003 | A1 |
20030036425 | Kaminkow et al. | Feb 2003 | A1 |
20030045356 | Thomas | Mar 2003 | A1 |
20030054878 | Benoy et al. | Mar 2003 | A1 |
20030064771 | Morrow et al. | Apr 2003 | A1 |
20030064805 | Wells | Apr 2003 | A1 |
20030069074 | Jackson | Apr 2003 | A1 |
20030074323 | Catan | Apr 2003 | A1 |
20030095791 | Barton et al. | May 2003 | A1 |
20030100371 | Gatto et al. | May 2003 | A1 |
20030009542 | Alpay et al. | Jun 2003 | A1 |
20030149721 | Alfonso-Nogueiro | Aug 2003 | A1 |
20030157979 | Cannon et al. | Aug 2003 | A1 |
20030162594 | Rowe | Aug 2003 | A1 |
20030176213 | Lemay et al. | Sep 2003 | A1 |
20030181242 | Lee | Sep 2003 | A1 |
20030186734 | Lemay et al. | Oct 2003 | A1 |
20030187853 | Hensley et al. | Oct 2003 | A1 |
20030188306 | Harris et al. | Oct 2003 | A1 |
20030232648 | Prindle | Dec 2003 | A1 |
20040002385 | Nguyen | Jan 2004 | A1 |
20040048671 | Rowe | Mar 2004 | A1 |
20040063498 | Oakes | Apr 2004 | A1 |
20040067794 | Coetzee | Apr 2004 | A1 |
20040087373 | Choi | May 2004 | A1 |
20040092310 | Brosnan et al. | May 2004 | A1 |
20040143586 | Chung | Jul 2004 | A1 |
20040147314 | Lemay et al. | Jul 2004 | A1 |
20040152517 | Hardisty et al. | Aug 2004 | A1 |
20040166931 | Criss-Puszkiewicz et al. | Aug 2004 | A1 |
20040180722 | Giobbi | Sep 2004 | A1 |
20040248651 | Gagner | Dec 2004 | A1 |
20040259640 | Gentles et al. | Dec 2004 | A1 |
20050054446 | Kammler et al. | Mar 2005 | A1 |
20050059470 | Cannon | Mar 2005 | A1 |
20050108519 | Barton et al. | May 2005 | A1 |
20050108769 | Arnold et al. | May 2005 | A1 |
20050120040 | Williams et al. | Jun 2005 | A1 |
20050137016 | Enzminger et al. | Jun 2005 | A1 |
20050153778 | Nelson et al. | Jul 2005 | A1 |
20050192099 | Nguyen et al. | Sep 2005 | A1 |
20050216942 | Barton | Sep 2005 | A1 |
20050221898 | Gatto et al. | Oct 2005 | A1 |
20050282636 | O'Brien | Dec 2005 | A1 |
20050288080 | Lockton et al. | Dec 2005 | A1 |
20060019749 | Merati et al. | Jan 2006 | A1 |
20060046855 | Nguyen et al. | Mar 2006 | A1 |
20060058103 | Danieli | Mar 2006 | A1 |
20060068871 | Crawford et al. | Mar 2006 | A1 |
20060069796 | Lucas | Mar 2006 | A1 |
20060073869 | Lemay et al. | Apr 2006 | A1 |
20060160621 | Rowe et al. | Jul 2006 | A1 |
20060247028 | Brosnan et al. | Nov 2006 | A1 |
20060258428 | Blackburn et al. | Nov 2006 | A1 |
20060264256 | Gagner et al. | Nov 2006 | A1 |
20060281541 | Nguyen et al. | Dec 2006 | A1 |
20070004506 | Kinsley et al. | Jan 2007 | A1 |
20070026935 | Wolf et al. | Feb 2007 | A1 |
20070032301 | Acres et al. | Feb 2007 | A1 |
20070060361 | Nguyen et al. | Mar 2007 | A1 |
20070060363 | Nguyen et al. | Mar 2007 | A1 |
20070178970 | Lemay et al. | Aug 2007 | A1 |
20070207852 | Nelson et al. | Sep 2007 | A1 |
20070243925 | Lemay et al. | Oct 2007 | A1 |
20070270213 | Nguyen et al. | Nov 2007 | A1 |
20090209332 | Soukup et al. | Aug 2009 | A1 |
20090275407 | Singh et al. | Nov 2009 | A1 |
20100099491 | Little et al. | Apr 2010 | A1 |
20110218038 | Kinsley et al. | Sep 2011 | A1 |
20110281655 | Nguyen et al. | Nov 2011 | A1 |
Number | Date | Country |
---|---|---|
199650576 | Apr 1997 | AU |
197 30 002 | Jan 1999 | DE |
0 689 325 | Dec 1995 | EP |
0 706 275 | Apr 1996 | EP |
0 715 245 | Jun 1996 | EP |
0 744 786 | Nov 1996 | EP |
0 769 769 | Apr 1997 | EP |
0 841 615 | May 1998 | EP |
0 905 614 | Mar 1999 | EP |
1 004 970 | May 2000 | EP |
1 061 430 | Dec 2000 | EP |
1 199 690 | Apr 2002 | EP |
1 255 234 | Jun 2002 | EP |
1 231 577 | Aug 2002 | EP |
1 291 048 | Mar 2003 | EP |
1 074 955 | Oct 2003 | EP |
1 391 226 | Feb 2004 | EP |
1 396 829 | Mar 2004 | EP |
1 414 534 | May 2004 | EP |
1 473 682 | Nov 2004 | EP |
1 895 483 | Mar 2008 | EP |
1920415 | May 2008 | EP |
1 920 415 | Nov 2009 | EP |
2 151 054 | Jul 1985 | GB |
2 251 112 | Jun 1992 | GB |
2 392 276 | Feb 2004 | GB |
10-277243 | Oct 1998 | JP |
2002-197332 | Dec 2000 | JP |
2124230 | Dec 1998 | RU |
17678 | Apr 2001 | RU |
WO-9524689 | Sep 1995 | WO |
WO-9600950 | Jan 1996 | WO |
WO-9730549 | Aug 1997 | WO |
WO-9840141 | Sep 1998 | WO |
WO-9900164 | Jan 1999 | WO |
WO-0067424 | Nov 2000 | WO |
WO-0120424 | Mar 2001 | WO |
WO-9901188 | Dec 2001 | WO |
WO-0201350 | Jan 2002 | WO |
WO 0201350 | Jan 2002 | WO |
WO0201350 | Jan 2002 | WO |
WO-0221468 | Mar 2002 | WO |
WO-0199067 | May 2002 | WO |
WO-02073501 | Sep 2002 | WO |
WO-0205229 | Oct 2002 | WO |
WO-03006129 | Jan 2003 | WO |
WO-03019486 | Jun 2003 | WO |
WO-0217251 | Aug 2003 | WO |
WO-03085613 | Oct 2003 | WO |
WO-02077935 | Feb 2004 | WO |
WO-2004021290 | Mar 2004 | WO |
WO-2007005290 | Jan 2007 | WO |
WO-2007032879 | Mar 2007 | WO |
WO-2007032888 | Mar 2007 | WO |
WO-2007044175 | Jun 2007 | WO |
WO-2007120450 | Oct 2007 | WO |
WO-2008016610 | Feb 2008 | WO |
WO-2010045004 | Jun 2010 | WO |
Entry |
---|
Canadian Office Action dated Mar. 12, 2015 for Canadian Application No. 2,621,567. |
U.S. Appl. No. 09/642,192, filed Aug. 8, 2000, Le May et al. |
“1,001 Windows 95 Tips, Operating System Shortcuts” (1995) SynapseAdaptive.com, Access and Productivity Tools, webpage retrieved from the Internet at http://www.synapseadaptive.com/tools/Win95%20keyboard%20shortcuts.html, on Dec. 8, 2009, 3 pages. |
“Noble Poker: Security & Integrity” (2005) advertisement from NoblePoker.com retrieved from the Internet at http://web.archive.org/web/20050512081751/http://www.noblepoker.com on May 12, 2005, XP-002465543, 2 pages. |
Adamec, Justene, (Sep. 9, 2005) “Checkraise: The Bots”, Blogcritics.org News, [downloaded from http://blogcritics.orgiarchives/2005/09/09/093200.php on Jun. 30, 2006], 3 pages. |
CS Guard, Dec. 19, 2001, Half-Life www.olo.counter.com, webpage retrieved from the Internet at http://www.olo.counter-strike.pl/index.php?p.=archive on Jun. 3, 2010, p. 3 of 5 pages. |
Gaming Standards Association (2007) (author unknown), “S2S Message Protocol v1.2 with Errata Sheet 1,” Chapter 13, pp. 289-308.[online] retrieved from Internet at http://www.gamingstandards.com/index.php?p.=standards/free_downloads_standards on Sep. 23, 2008. |
Gaming Standards Association (2007), “G25 Basics,” webpage retrieved from Internet at http://www.gamingstandards.com/pdfs/G2S_Sheet_final.pdf, on Sep. 5, 2008, 2 pages. |
Golle, Philippe et al., “Preventing Bots from Playing Online Games” ACM Computers in Entertainment, [Online] vol. 3, No. 3, Jul. 2005, pp. 1-10, XP002465544 Retrieved from the Internet: http://portal.acm.orgicitation.cfm?doid=1077246.1077255. |
Hauptmann, Steffen et al. (1996) “On-line Maintenance With On-The-Fly-Software Replacement,” 1996 IEEE Proceedings, Third International Conference on Configurable Distributed Systems, No. 0-8 186-7395-8/96, (pp. 70-80) 11 pages. |
HBP-10 Bill Dispenser, Multi-Country Platform (2001) JCM American, retrieved from the Internet at http://www.jcm-american.com/bill_dispensers.html on Sep. 20, 2001, 1 page. |
HBP-5 Note Hopper (2001) JCM American, retrieved from the Internet at http://www.jcm-american.com/sub-note-hoppers.html on Sep. 20, 2001, 1 page. |
Hiroaki Higaki, 8 page document entitled “Group Communication Algorithm for Dynamically Updating in Distributed Systems” Copyright 1994 IEEE International Conference on Parallel and Distributed Systems (pp. 56-62) 08-8 186-655-6/94, higaki@sdesun.slab.ntt.jp. |
Hiroaki Higaki, 9 page document entitled “Extended Group Communication Algorithm for Updating Distributed Programs” Copyright 1996, IEEE, International Conference on Parallel and Distributed Systems, 0-81 86/7267- 6196, hig@takilab.k.dendai.as.jp. |
Oracle8™ Enterprise Edition Partitioning Option (1999), Features Overview Feb. 1999, webpage for Oracle Corporation, retrieved from the Internet at www.oracle.com/collateral/ent_partitioning_fo_pdf on Feb. 1, 1999, 8 pages. |
PcToolsTM Guides, “Manage the CPU Task Priority,” www.pctools.com, webpage retrieved from the Internet at http://www.pctools.com/guides/registry/detail.1179 on Sep. 16, 2002, 2 pages. |
Spielo Gaming International (2000) webpage advertisements entitled “Visions of Tomorrow” and “PowerStation5” retrieved from the Internet at http://www.spielo.com, dated Dec. 6, 2000, 7 pages. |
Wang et al., “Casino technology player tracking and slot accounting systems,” Database Inspec [Online] The Institution of Electrical Engineers, Stevenage, GB; Database accession No. 7228747; XP002231402; abstract. 1 page. |
Webster's 1913 Dictionary, Definition of “Continuous” as shown in Webster's Online Dictionary, retrieved from the Internet at http://www.webster-dictionary.org/definition/ continuous on Mar. 2, 2009, 2 pages. |
Webster's 1913 Dictionary, Definition of “Regular” as shown in Webster's Online Dictionary, retrieved from the Internat at http://www.webster-dictionary.org-/definition/regular on Mar. 2, 2009, 3 pages. |
Windows 3.1 Resource Kit, Jul. 30, 2001, Microsoft.com, retrieved from the Internet at http://support.microsoft.com/kb/83433 on Feb. 8, 2009 and on Aug. 27, 2010, 47 pages. |
Number | Date | Country | |
---|---|---|---|
20140162792 A1 | Jun 2014 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 12986861 | Jan 2011 | US |
Child | 14183221 | US | |
Parent | 11224814 | Sep 2005 | US |
Child | 12986861 | US |