The present invention relates to patron identification processing in a casino environment, such as in association with casino monetary transactions.
Casinos frequently need to validate the identity of a player or patron. For example, a casino might desire to validate the identity of a player when the player seeks to enroll in the casino's player loyalty program. A casino might also desire to validate the player's identity in association with a financial transaction, such as the payment of a jackpot or when providing a player with funds, such as via a marker or by cashing a check, or for other reasons, such to comply with jurisdictional rules as implemented by internal controls.
Existing methods and systems associated with such validation have numerous drawbacks. One problem is that a casino might need to validate a player's identity at a large number of locations, such as at a large number of cage or attendant stations. This generally requires each station to include the necessary hardware and software for this task, such as including a dedicated ID scanner which is used to scan the player's ID, or multiple scanners, such as to support the scanning of different types of IDs (such as those of different sizes, such as driver's licenses vs. passports).
Another problem that exists with ID processing relates to providing the results of validation of the ID. Existing methods often make it difficult for a user to identify or interpret the validation results, which can lead to errors (including approvals of transactions that should be refused, etc.).
Embodiments of the invention comprise methods and systems for patron ID processing in a casino environment.
In one embodiment of the invention, the results of the processing of a patron's ID is indicated by a graphical user interface, the graphical user interface comprising at least a first primary results indicator and a second results indicator. The primary results indicator may comprise a textual indicator, such as PASS or FAIL, and the secondary results indicator may comprise a non-textual indicator, such as a color (red, green, yellow, etc.), a symbol or the like.
In one embodiment, patron ID processing is distributed, such as where users of multiple workstations scan patron IDs via a common ID scanner and access the scanned ID information from a scan pool, thus reducing the number of needed scanners. The scanned ID information may be protected by being deleted when selected by a workstation user or being deleted if not selected in a period of time.
The scanned ID information may be used in an ID authentication process, including where that process may run in the background of another application. A pop-up window may display the result of the authentication process to the user in another application.
In some embodiment, ID authentication may be implemented via a mobile device, such as using an application running on the mobile device.
Further objects, features, and advantages of the present invention over the prior art will become apparent from the detailed description of the drawings which follows, when considered with the attached figures.
In the following description, numerous specific details are set forth in order to provide a more thorough description of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without these specific details. In other instances, well-known features have not been described in detail so as not to obscure the invention.
Embodiments of the invention comprise methods and systems for distributed patron ID processing in a casino environment.
One embodiment of a system 20 of the invention is illustrated in
The system 20 may include one or more casino servers 24 (or similar computing devices). The casino servers 24 may comprise one or more processors or controllers, at least one communication device or interface, a database or other data storage device, and one or more additional memory or data storage devices (such as separate from the database). In one or more embodiments, the processor(s) is configured to execute one or more instructions, such as in the form of machine readable code (i.e. “software”), to allow the server 24 to perform various functionality, such as the functionality described herein. The software is preferably non-transitory, such as by being fixed in a tangible medium. For example, the software may be stored in the one or more memory devices. One or more of the memory devices may be read-only. In addition, the software may be stored on a removable medium in some embodiments. In general, the one or more memory devices are used as temporary storage. For example, the one or more memory devices may be random access memory or cache memory used to temporarily store some user information and/or instructions for execution by the at least one processor.
The software may comprise one or more modules or blocks of machine-readable code. Each module may be configured to implement particular functionality when executed by the one or more processors, and the various modules may work together to provide overall integrated functionality. Of course, in certain embodiments, it is also possible for various of the functionality to be implemented as hardware, i.e. a processor or chip which is particularly designed to implement various of the functionality described herein.
In one embodiment, the casino server 24 may include (or be linked communicatively at one or more times to) one or more input and/or output devices, such as a keyboard, mouse, touchscreen, video display or the like, whereby the processor may receive information from an operator or servicer of the server 24 and/or output information thereto. This allows, for example, an operator of the server 24 to interface with the server 24 to upgrade, maintain, monitor, etc., it. In other embodiments, an operator might interface with the server 24 via a separate workstation or other device.
In one embodiment, the processor and other elements of the server 24 may be linked and thus communicate over one or more communication buses. In this manner, for example, the processor may read/receive software from the memory for execution, receive inputs and provide outputs to the various I/O devices, receive information from or output information to external devices via the communication interface, etc. The one or more communication devices or interfaces permit the server 24 to communicate with the gaming machines 22 or other gaming devices, and preferably external devices, networks, systems and the like.
The casino server 24 may be configured to implement a variety of functionality (and/or there may be a plurality of different servers which each implement different functionality). In one embodiment, the server 24 may implement accounting functionality. The accounting functionality might include tracking of wagers made and winnings paid at the gaming machines 22 and, as described in more detail below, tracking monetary transactions at a cashier cage, such as tracking the amounts of casino chips issued and redeemed, checks cashed, etc. In the case of a gaming system which includes the issuance of monetary value tickets or the like, the server 24 may also generate monetary value ticket data, validate tickets and the like.
The cashier cage of the system 20 may include a plurality of cashier workstations 26, at least one monetary value dispensing mechanism 36, and at least one ID reader 38. The cashier workstations 26 may comprise, for example, a computing type device which comprises a processor, a memory, software stored in the memory for execution by the processor, one or more cashier input devices (such as a keyboard or keypad, mouse, etc.), a communication interface and at least one video display.
In one embodiment, a plurality of cashier workstations 26 are configured to communicate with a single ID reader 38 (e.g., a dedicated ID reader 38 is not provided for each cashier workstation 26). The ID reader 38 may comprise a wide variety of reading devices, such as one or more of a white light, IR and UV light scanner or reader, a magnetic stripe reader or the like. The reader 38 might be particularly configured to scan or read information associated with an ID, such as a state driver's license, passport or the like.
In one embodiment, each cashier workstation 26 may be configured to communicate with the monetary value dispensing mechanism 36, either directly or indirectly (such as through a cash system server, as detailed below). This mechanism 36 preferably comprise a secure monetary value storage and dispensing mechanism. The mechanism 36 may be configured to store or house monetary value, such as paper currency and/or coins and, at one or more times, dispense monetary value to the cashier. One such device is sold under the name CageConnect™ by Everi Payments Inc. of Las Vegas, NV.
As illustrated, the system 20 may include or communicate with other systems or features, such as a customer or player identification, loyalty and tracking system (a “customer” system). The customer system may comprise a customer server, such as a computing device with a processor, a memory, data storage, communication interface and the like, machine-readable code for execution by the processor. The system may be configured to identify customers, gain and maintain customer interest in game play, and share data regarding customers. For example, the customer system may collect information from the gaming machines 22 regarding player game play and reward players for that play, such as by awarding promotional award to them. The player loyalty system might, for example, be implemented by the one or more casino servers 24.
The system 20 may further comprise a processing system 40. This system 40 may be configured to aid in the processing of monetary transactions at the casino, such as via the cashier workstations 26. In one embodiment, the processing system 40 comprises one or more servers. Each of those servers may be similar to the casino server(s) 24 noted above (such as including a processor, memory, communication interface, etc.) but include software for implementing the functionality described herein. The processing system 40 might be operated by a vendor of the casino or might be part of the casino system itself.
In one embodiment, the processing system 40 may implement, or be communicate with, an anti-money laundering (AML) System. Such a system may comprise a floor monitor system that allows floor staff to view real-time information from devices in the casino, including information regarding transactions performed at those devices (such as gaming machines 22, cashier workstations 26, kiosks and other devices), such as in the form of a digital money transaction log (MTL) and a non-monetary instrument log (NIL) that support transaction entry, unknown patron handling, quick alerts, and more. The AML system may also include a back office system that enables a compliance team to review floor data, generate currency transactions reports (CTR) and/or suspicious activity reports (SAR) batches, and electronically file with regulators, providing a full audit log and flexible reporting of data. The AML system may further comprise a connector library system that allows importation of transactional data from casino management systems without manual entry, and/or a tax forms system for completing and managing tax forms required by the IRS or other governmental agencies.
As illustrated in
The server of the processing system 40 might also communicate with other devices or systems. Such systems might comprise a banking system, such as for clearing or processing checks (such as for clearing a check presented by a casino customer by transferring funds from the customer's bank account to an account of the casino).
As described above, one aspect of the invention is a system in which one or more workstations or similar devices, such as cashier workstations 26, commonly communicate with and/or utilize, a common ID reader 38. An aspect of this feature of the invention is that it reduces the number of ID readers 38 which the casino needs in order to perform ID validation.
In general, in accordance with one aspect of the invention, multiple users may scan patron IDs using the common ID reader 38. The scanned information may be placed into a “scan pool.” This pool effectively comprises a temporary repository of scanned ID information for use by all of the linked devices, such as cashier workstations 26. As detailed below, different users may then access the scanned ID information from the pool, such as to complete a transaction. As further described below, in one embodiment, scanned ID information which is associated with the pool is removed from the pool when it is either claimed by an authorized user, or if it is not properly claimed in a designated period of time. As detailed, this removal aids in protecting the scanned ID information from unauthorized use or access.
In one embodiment, each cashier workstation 26 preferably includes machine-readable code (e.g., software or an “application”) which, when executed by the processor of the workstation 26, facilitates the implementation of the features herein. Other machine-readable code may be associated with the processing system 40, such as a server thereof. In one embodiment, a memory of the ID reader 38 may temporarily store information associated with the pool, or one or more other elements of the system may maintain the pool, such as the processing system 40 and an associated memory 52 thereof, whereby the pool is essentially maintained in a network buffer for shared access by multiple elements of the system. Further, in some embodiments, the workstations 52 might comprise thin clients which essentially simply act as display devices for remotely generated information, such as information generated by the processing system 40.
Additional aspects of the invention will be described with reference to
As illustrated in
In one embodiment, each user may be assigned to a group and each group may have permission to access certain ID readers 38, and the scanned data associated therewith. This functionality may be implemented by assigning each workstation 26 to a scanning engine (such as implemented by software associated with the ID reader 38 and/or the workstation 26) which implements the permissions. As one example, users of cashier workstations 26 may be associated with a “cashier” group which has access to two ID readers 38 and the scanned ID information associated therewith. However, users of a compliance group may not have permission relative to those ID readers, and may thus not be permitted to access the scanned ID information associated therewith.
As illustrated in
As illustrated in
As indicated herein, in a preferred embodiment, once the ID scanned ID information is provided, it is removed or deleted from the pool (such as the network buffer) and may be provided to the workstation 26. As also described above, if scanned ID information is not claimed by a user of one of the linked workstations in a predetermined period of time, such as a few minutes, the scanned ID information may also be deleted from the scan pool.
Upon such a selection by the user, the scanned ID information may be analyzed, such as to determine its authenticity. As indicated above, such may comprise sending the scanned ID information to an outside vendor for authentication, such as via the processing system 40. It will be appreciated that various types of authentication may be performed relative to the scanned ID information in order to authenticate the ID, as is well known (and in some embodiments, initial analysis of the ID information may be performed by an outside vendor, but secondary or additional analysis may be performed by the processing system 40—for example, such as where the ID information is first checked to determine if is valid, such as by an outside vendor, and where the patron's ID information is then used in a second internal check, such as to determine if the patron is on a watch list, the ID or patron was previously flagged during a prior ID authentication, or otherwise complies with other criteria/checks).
Once the scanned ID information has been analyzed, a result is preferably provided to the user. In one embodiment, information obtained from the ID scan analysis and/or secondary information, it used to indicate the result. In a preferred embodiment, the result is indicated by one or more outcome indicators, and preferably two or more outcome indicators. One of the indicators may comprise a primary textual indicator, such as “PASS”, “ATTENTION” or “FAIL”. In addition, however, at least one secondary indicator, preferably comprising a non-textual indicator, such as colors or symbols, is utilized. For example, the color green may be applied to passing results, yellow to results which require attention, yellow with red text to results which require high attention, and red to failing results. Of course other indicators might be utilized, such as symbols (e.g. a thumbs-up or thumbs-down symbol, smiley face symbol or frowning symbol, the colors may be applied to backgrounds or other areas, to text or other elements, etc.).
Examples of combinations of analysis factors that may be considered, and their relationship to different scan results indicators are provided below in Tables 1 and 2.
The primary and secondary indicators may be displayed to the user via one or more of the graphical displays. For example, as illustrated in
As illustrated in
In one embodiment, as illustrated in
As illustrated in
As noted above, the authentication process may be performed in association with various transactions, such as when a customer seeks to initiate a monetary value transaction as the casino. Such a transaction might comprise the customer tendering a check to the casino to be cashed for monetary value which the casino might issue as cash (or in other instances, a monetary value ticket, monetary value chips or the like). In such an event, aside from authenticating the ID in the manner described above, additional authorizations or approvals may be required, such as relating to the specific type of transaction. Additional information regarding such a process is described in U.S. Pat. No. 11,093,918, which is also owned by Everi Payments Inc., and which is incorporated herein by reference in its entirety.
In the event such a transaction is approved, then the transaction may be completed. In the example of a patron cashing a check, this may comprise transmitting an approval to the cashier station 26 (such as from the processing system 40). At that point, the cashier station 26 might display information to the cashier, such as that the transaction has been approved and to validate the transaction by confirming the amount of the transaction (such as by double-checking the amount of the check to an amount displayed on the display of the workstation). If the transaction is approved, the server of the processing system 40 may send instructions to the monetary value dispensing mechanism 36 to dispense monetary value. This may comprise, for example, the mechanism 36 dispending currency in the amount of the approved transaction to the cashier. The cashier may then tender those funds to the customer.
As another aspect of the invention, the ID authentication process may run in the background of the cashier workstation 26 or other device, thus enabling the user to perform other tasks while the authentication process is being performed. For example, the cashier workstation 26 may run the CashClub® application and interface by Everi Payments Inc. of Las Vegas, NV. This application interfaces with a back end (such as implemented by the server of the processing system 40) to facilitate monetary transactions, including credit and debit transactions. In such a configuration, as illustrated in
As indicated above, features of the invention may be implemented via other devices or integrated with such devices. For example, while in one embodiment, aspects of the invention may be implemented at a cashier workstation, it might be implemented at other workstations, kiosks, terminals and the like. Further, aspects of the invention may also be implemented by a mobile device 56 (see
In this example, instead of capturing ID information via a shared scanner, information regarding the ID may be captured by an image capture device associated with the mobile device. Such might comprise, for example, a camera or other image capture device thereof. As illustrated in
In one embodiment, the user might elect, or be required, to obtain an image of the patron (such as their face), such as illustrated in
Once the results of the authentication (and any photo verification, if required) are complete, they may be displayed to the user of the mobile device, such as illustrated in
It will be appreciated that principles of the invention may be applied to physical IDs, such as printed drivers licenses and passports, but also digital IDs. For example, in some embodiments, a mobile device may be configured to receive or read information from or regarding a digital ID, and utilize that information in the authentication process.
As indicated herein, the invention may include other features. For example, in some cases, the ID authentication process might require secondary validation or other steps. As one example, if the authentication process results in a failure, warning or the like, one or more secondary validations might be performed. For example, upon an ID authentication failure, the patron might be instructed to travel to a supervisor and have secondary patron identification performed, such as using information other than the patron's ID.
The system may implement an administration feature, such as to permit an administrator (with admin level access/ID) to customize or modify certain features, to implement audit or other admin level features.
The system and method may support both manual and automated image capture functionality (e.g. such as manual and automated image capture focus input as part of capturing an image of an ID).
In one embodiment, while the scanned ID information may be retrieved from the scan pool and then deleted from the scan pool, or deleted if not retrieved in a designated period of time, the scanned ID information may still be maintained elsewhere, such as in a secure memory (such as a secure storage associated with the processing system 40 or a related system. In such a configuration, the scanned ID information is removed or deleted from the scan pool and can no longer be accessed therefrom, such as by the users of the workstations 26. However, the scanned ID information may be maintained in another location, such as in a secure memory, such as for use by other applications or systems.
It will be appreciated that features of the invention may be utilized independently of one another, with other features or in other combinations; for example, aspects of the invention relating to the presentation of ID scans and scan results might be used independently of other features of the invention, including in other applications.
It will be understood that the above described arrangements of apparatus and the method there from are merely illustrative of applications of the principles of this invention and many other embodiments and modifications may be made without departing from the spirit and scope of the invention as defined in the claims.
This application claims priority to U.S. Provisional Patent Application Ser. No. 63/414,292, filed Oct. 7, 2022, which prior application is incorporated by reference in its entirety herein.
Number | Date | Country | |
---|---|---|---|
63414292 | Oct 2022 | US |