Networked gaming system and method

Information

  • Patent Grant
  • 9646454
  • Patent Number
    9,646,454
  • Date Filed
    Tuesday, February 25, 2014
    10 years ago
  • Date Issued
    Tuesday, May 9, 2017
    7 years ago
Abstract
A networked gaming system and method is described. The networked gaming system and method include a user identification, a transactional component, a networked gaming module, and at least one network access device. The user identification is received by the network access device. The received user identification is compared with registration data in a registration database. A player is provided access to a game when the received user identification matches the registered player data. The transactional component charges the registered player at least one credit for a game outcome. The networked gaming module performs the game operations and generates at least one random game output by random generation at the networked gaming module. The networked gaming module then associates the at least one random game output with an image ID. The networked gaming module then communicates the one or more images corresponding to the image ID to the network access device.
Description
FIELD

The present invention relates to a networked gaming system and method. More particularly, the present invention relates to a networked gaming system and method that includes a networked gaming module that generates at least one random game output by random generation at the networked gaming module.


BACKGROUND

The related art includes gaming devices, online gaming, networked interactive gaming, and biometrics.


Gaming Devices


For purposes of this patent, the term “gaming” shall refer to either gambling and/or gaming applications. Gaming devices include games of skill and games of chance. Games of chance include many casino-type gaming devices in which the outcome of the game depends, at least in part, on a randomly generated event. For example, a game of chance may use a random number generator to generate a random or pseudo-random number. The random number may then be compared to a predefined table to determine the outcome of the event. If the random number falls within a certain range of numbers on the table, the player may win a predefined prize. The table may also contain display information that allows the gaming device to generate a display that corresponds to the outcome of the game. The gaming device may present the outcome of the game on a large variety of display devices, such as mechanical spinning reels or video screens.


Games of skill comprise a skill component in which a player combines letters or words (word puzzles), answers questions (trivia), overcomes challenges (video games), competes with other players (networked video games), and the like. Generally, a game of skill is a game requiring a level of skill which does not rely solely on chance. Some games of skill require a high degree of expertise and knowledge and other games of skill require very limited expertise or knowledge.


Online Gaming


In June 2001, Nevada signed a bill that could result in Nevada being the first state to offer legalized gambling over the Internet. The new law authorizes state gaming regulators to set up an infrastructure to license and oversee online gaming in Nevada when such gaming becomes legal. Online gaming is a federal issue whose legality is unclear at present.


A variety of technological limitations have been asserted as preventing Congress's endorsement of online gaming. These technological limitations are related to the prevention of underage gambling, controlling of gambling addiction, and ensuring the security and reliability of online gaming.


To prevent underage gambling, prior art systems and methods use passwords, user IDs, credit cards, and “click-through” agreements that ask the player to agree to being of legal gambling age by clicking on a button. Presently, there are no systems and methods to control online gambling addiction. With respect to ensuring that online gaming is secure and reliable, prior art systems and methods use various cryptographic techniques such as RSA encryption, digital certificates, or other similar well known cryptographic methods. These cryptographic methods are helpful in ensuring secure communications; however, these cryptographic methods do not ensure that the individual accessing the online game is a valid user.


In view of the prior art systems, a minor or other unauthorized individual simply needs a user ID and a corresponding password to access a gaming site. The obtaining of a user ID and password is a relatively simple task as this information is generally not modified. Commonly the user ID information is acquired by identifying the web site's naming convention for the player. The player password can be easily determined by remembering the pattern of keys typed by the player during the log-on procedures or by simply requesting the password from the player as part of a diagnostic procedure. The latter is a trick commonly used by hackers to access a system. The password problem may be overcome by modifying the password on a regular basis, however the player must then remember the modified password. Should the player forget the password a new password is emailed. During the emailing process it is common for email to be easily intercepted in cyberspace. Additionally, it is common for unauthorized users to simulate being at a certain location by submitting an IP address that identifies an authorized user.


Therefore, a better system and method for identifying a valid user is needed. Additionally, it would be beneficial to provide a gaming system and method that would prevent underage gambling, be simple to implement, prevent gambling addiction, and provide a higher degree of security and reliability from unauthorized users.


Networked Interactive Gaming


Networked interactive gaming in an open networked environment such as the Internet is well known. However, interactive gaming in an open network such as the Internet is confined to communicating with other devices using the same TCP/IP protocols. Currently, networked interactive gaming systems using the TCP/IP protocol are not configured to communicate with interactive set-top boxes using MPEG protocols.


Networked interactive gaming in an open networked environment using traditional security methods such as secure socket layers and digital certificates is well known. However, networked interactive gaming in an open networked environment using traditional security methods does not prevent gambling from a minor having acquired a parent's user ID and password without the parent's consent.


Networked interactive gaming using LANs and WANs for progressive slot machines having large jackpots is also well known. However, networked interactive systems using LANs and WANs for progressive slot machines generally exist in a highly secure proprietary network environment. Thus, the creation of a progressive slot machine with a large jackpot in an open network environment is not well known.


Biometrics


A biometric is a measurable psychological and/or behavioral trait that can be captured and subsequently compared with another instance at the time of verification. This definition includes the matching of fingerprints, voice patterns, hand geometry, iris and retina scans, vein patterns, and other such methodologies. For purposes of the disclosure described heretofore, the definition of biometrics also includes signature verification, keystroke patterns, and other methodologies weighted towards individual behavior.


Biometric applications for games of skill and games of chance are limited. For example biometric gaming applications are taught in U.S. Pat. No. 6,010,404 granted to Walker et al. teaches a method and apparatus for using player input codes (e.g., numeric, biometric or physical) to affect the outcomes of electronic gambling devices, such as slot machines. Additionally, U.S. Pat. No. 6,142,876 granted to Cumbers teaches a system and method for passively tracking the play of players playing gaming devices such as slot machines. Players provide identification information and facial recognition data is acquired by a digital or video camera. For each player an account file and a file of the facial image data is stored. When the player plays the slot machine, a camera scans the player and acquires facial image data which is compared to stored data to identify the player. Furthermore, U.S. Pat. No. 5,902,983 granted to Crevelt et al. teaches a gaming machine configured to perform EFT transactions which are limited to preset amounts. The patent teaches the use of a fingerprint imaging device and retinal scans for verifying a player's identity.


Although biometric applications for gaming applications are known, biometric applications for online gaming systems are not known. Furthermore, the managing of biometric information and gaming information in an open network environment is not known. Additionally, the use of biometrics in a gaming system and method to prevent underage gambling and prevent gambling addiction is not known.


SUMMARY

A networked gaming system and method is described. The networked gaming system and method includes a user identification, a transactional component, a networked gaming module, and at least one network access device. The user identification is received by the network access device. The received user identification is compared with registration data in a registration database. A player is provided access to a game when the received user identification matches the registered player data. The transactional component charges the registered player at least one credit for a game outcome. The networked gaming module performs the game operations and generates at least one random game output by random generation at the networked gaming module. The networked gaming module then associates the at least one random game output with an image ID. The networked gaming module then communicates the one or more images corresponding to the image ID to the network access device.


In one illustrative embodiment, the registration database includes a registered player biometric. Additionally, an input player biometric is received by the network access device and the player is provided access to the game when the input player biometric matches the registered player biometric.


In another illustrative embodiment, the networked gaming system and method includes a countdown timer that provides a window of time for other players to join the game.


In yet another illustrative embodiment, the networked gaming system and method includes an encryption module that encrypts the plurality of images communicated to each network access device.


In a further illustrative embodiment, the images communicated to the network access device by the networked gaming system are viewable on a browser.


In a still further illustrative embodiment, the one or more images communicated to the network access device game include a slot machine game outcome, and the networked gaming module generates the random game output with a lottery game.





DRAWINGS

Illustrative embodiments are shown in the accompanying drawings wherein:



FIG. 1a through FIG. 1d show diagrams of a plurality of illustrative network access devices.



FIG. 2 shows a high level diagram of a gaming system networked to a plurality of network access devices.



FIG. 3 shows a block diagram of an illustrative biometric input module.



FIG. 4 shows a block diagram of a gaming system configured to receive a biometric input from a network access device.



FIG. 5 shows a table of the data fields in a verification system.



FIG. 6 shows a table of the data fields in a broadband gaming system and in a transactional system.



FIG. 7 shows a block diagram of a broadband gaming system.



FIG. 8 shows a flowchart of the registration method for the gaming system.



FIG. 9 shows a flowchart of the verification method for the gaming system.



FIG. 10 shows a flowchart of the information processed by the gaming system.



FIG. 11 is a continuation of the flowchart of the information processed by the gaming system in FIG. 10.





DESCRIPTION

A networked gaming system that comprises a verification system, a broadband gaming system, and a transactional system is described. The verification system operations include ensuring that a user is a registered player by using a biometric input. The broadband gaming system operations include managing and performing at least one game. The transactional system operations include providing oversight for each transaction conducted by the verification system and the broadband gaming system.


A verification system for playing the networked gaming system is described. The networked games include games of chance and games of skill. The verification system communicates with a biometric input module and a network access device to generate a user identification information. The user identification information is compared to information in a registration database. If an acceptable match is made between the user identification information and the information in the registration database, the user is designated as a player. The player then has access to both the broadband gaming system and the transactional system.


A broadband gaming system which is in communication with the verification system is described. The broadband gaming system includes a buffer which stores information about players who desire to play a game. The buffer is operatively coupled to a random number generator that generates a random number for each player in the buffer. A paytable module in communication with the random number generator determines the outcome associated with the random number generator. The paytable also determines which images are associated with the outcome for each player. Preferably, the images are stored on a mini video server and then cached in a memory module. The images are intelligently buffered for downstream communications. In its preferred embodiment, a plurality of encoders are operatively coupled to the memory module caching the broadcast video streams. The plurality of encoders encode the broadcast downstream images according the requirements for each network access device. Each encoder is operatively coupled to an encryption module that encrypts the broadcast. A modulation module is operatively coupled to the encryption module and modulates encrypted images for downstream transmission. Each network access device includes a tuner, a demodulation module, and a decryption module that permits an image to be viewed by the network access device.


A transactional system and method that ensures secure communications occur in the verification system and the broadband gaming system is described. The transactional system also performs accounting, bonusing, tracking, and other such functions. Preferably, the transactional system is capable of receiving a plurality of funds from a financial account and converting them to credits that are used in the broadband gaming system.


The above description sets forth, rather broadly, the more important features of the present disclosure so that the detailed description of the preferred embodiment that follows may be better understood and contributions of the present disclosure to the art may be better appreciated. There are, of course, additional features of the disclosure that will be described below and will form the subject matter of claims. In this respect, before explaining at least one preferred embodiment of the disclosure in detail, it is to be understood that the disclosure is not limited in its application to the details of the construction and to the arrangement of the components set forth in the following description or as illustrated in the drawings. The disclosure is capable of other embodiments and of being practiced and carried out in various ways. Also, it is to be understood that the phraseology and terminology employed herein are for the purpose of description and should not be regarded as limiting.


In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings, which form a part of this application. The drawings show, by way of illustration, specific embodiments in which the disclosure may be practiced. It is to be understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the present disclosure.


Network Access Devices


Referring to FIG. 1a through FIG. 1d, there is shown a plurality of illustrative network access devices. Each of the network access devices is configured to be capable of running a gaming application. For illustrative purposes the gaming application shown simulates the spinning reels of a slot machine.


The network access device in FIG. 1a is a personal computer 10 having a network interface card (not shown) that may be operatively coupled to a modem (not shown). Another network access device shown in FIG. 1b includes a television 12 operatively coupled to an interactive set-top box 14 that is operatively coupled to a cable network (not shown). The other network access device shown in FIG. 1c is a wireless device 16 such as a digital phone or personal digital system (PDA) or other such wireless device which is configured to communicate with a network using wireless networking protocols. Yet another network access device is shown in FIG. 1d and includes a gaming terminal 18 such as a slot machine on a casino floor that is operatively coupled to a plurality of other gaming terminals. It shall be appreciated by those skilled in the art of networking that the distinguishing feature between each of these network access devices is the type of communications protocols used by each device to enable communications between similar network access devices.


Each of the network access devices either includes a biometric input module operatively coupled to the network access device or includes a biometric input module communicatively coupled to the network access device. A biometric is a measurable psychological and/or behavioral trait that can be captured and subsequently compared with another instance at the time of verification. This definition includes the matching of fingerprints, voice patterns, hand geometry, iris and retina scans, vein patterns, and other such methodologies. For purposes of the disclosure described heretofore, the definition of biometrics also includes signature verification, keystroke patterns, and other methodologies weighted towards individual behavior.


In one illustrative embodiment, the biometric input module is a fingerprint scanner 20 resident on the gaming terminal 18 wherein the biometric input is a fingerprint. In another illustrative embodiment, the biometric input module is the screen 22 of wireless device 16 wherein the screen is configured to receive a biometric input such as a user signature. In yet another illustrative embodiment, the biometric input module is a telephone 24 that is configured to receive a voice pattern from a user prior to engaging communications with the interactive set-top box 14. In yet another illustrative embodiment the biometric input module is a keyboard 26 operatively coupled to computer 10 wherein the user is requested to input a keystroke pattern. An illustrative example of a biometric input module operatively coupled to the network access device is shown in FIG. 1d having the fingerprint scanner 20 on the gaming terminal 18. An illustrative example of a biometric input module, e.g. the telephone 24, communicatively coupled to the network access device, e.g. the interactive set-top box 14, is shown in FIG. 1b.


The biometric input is used to prevent unauthorized gaming activity and efficiently store credits on the user's behalf. By way of example and not of limitation, unauthorized gaming activity includes preventing underage gaming and prohibiting players with histories of gambling addiction. Additionally, player credits may be stored on a network so that the player does not need to carry coins, paper currency, coupons, credit cards, or debits cards to play a game. It shall be appreciated by those skilled in the art having the benefit of this disclosure that different biometric input modules may be used in conjunction with different network access devices.


Gaming System


Referring to FIG. 2 there is shown a high level block diagram of a gaming system 30 in communication with a plurality of network access devices coupled to a network 32. The gaming system includes a verification system 34, a broadband gaming system 36, and a transactional system 38. The verification system 34 verifies that a user operating a network access device is a registered player. The broadband gaming system 36 performs the function of generating a game and broadcasting the game results to each of the network access devices. The transactional system 38 performs a plurality of functions including tracking each transaction performed by both the verification system and the broadband gaming system and conducting electronic fund transfers.


Verification System


The verification system 34 verifies that a user desiring to play the game is a registered player. The verification system 34 communicates with the biometric input module and a network access device to generate user identification information. The user identification information includes information such as cryptographic keys that are necessary to securely identify the network access device. The user identification information also includes media access control (MAC) identification and confirmation of the user Internet Protocol (IP) address. The user identification information is compared to information in a registration database 40 by a verification server 42. If an acceptable match is made between the user identification information and the information in the registration database, the user is designated as a player. The player then has access to either the broadband gaming system 36 or the transactional system 38.


In an alternative embodiment the user identification information is housed in a smart card (not shown) that is in communication with the verification system 34. The smart card includes a stored biometric which is used to identify the user as a player. Cryptographic keys are then exchanged between the verification system 34 and the smart card to provide the player access to either the broadband gaming system or the transactional system 38.


Referring to FIG. 3 there is shown an illustrative biometric input module 50. By way of example, the illustrative biometric input module 50 is a fingerprint scanner. It shall be appreciated by those skilled in the art having the benefit of this disclosure that the use of the fingerprint scanner as the illustrative biometric input module is not restrictive. A scanned fingerprint image is collected by the biometric input 52. After the scanned fingerprint image is collected, the fingerprint image is compressed by the compression module 54. A memory module 56 provides fast memory resources for the compression of the fingerprint image. After compression, the fingerprint image is encrypted by the encryption module 58 for downstream transmission. The encryption module 58 also includes a memory module 60 that provides fast memory resources for the encryption of the compressed fingerprint image. An encrypted compressed fingerprint image is then communicated to network 32 (see FIG. 2) using the network interface module 62.


Referring to FIG. 4 there is shown a block diagram of the verification system 34. The verification system is operatively coupled to network 32 with network interface module 64. The network interface module 64 is configured to receive user identification information generated by the network access devices and from the biometric input module. Preferably, the biometric and other user identification information received by the verification system is an encrypted biometric that is decrypted by decryption module 66. A memory module 68 is preferably a fast memory that expedites the decryption process. After decryption the biometric and remaining user identification information is processed by the verification server. It shall be appreciated by those skilled in the art that the verification server 42 may house the network interface module 64, decryption module 66 and the memory module 68. The verification server 42 is also in operative communication with a registration database 40. The verification server 42 performs the function of matching the user identification information collected from the network access device with the player information in the registration database 40. Additionally, the verification server 42 performs the caching functions needed to ensure that once a player has been identified during an initial game, subsequent usage by the same player proceeds quickly.


Preferably, the verification server 42 identifies registered players using a biometric template of the registered player residing on the registration database 40. The registered players are referenced with personal ID numbers. When a transaction is undertaken, the user firstly calls up the particular template from the registration database 40 by inputting a personal ID. The personal ID includes a particular number, user ID, password, or other such identification techniques. The inputting of the personal ID is accomplished with a familiar numeric keypad, keyboard, magstripe card, or smart card. The correct template is called and held in memory ready for comparison with the biometric sample provided by the user. A comparison takes place that results in a binary true or false condition as to the identity of the user. The user is in effect claiming an identity by inputting the personal ID and the system is subsequently verifying that the claim is genuine according to the matching criteria setup within the system.


Referring to FIG. 5 there is shown the registration data fields 70 and user submitted data fields 72. The registration data fields 70 include data fields that comprise the user identification information. The registration data fields include user identification information such as player name, address, user name, password, credit card information, and the date and time of the registration. The player biometric and personal ID also comprises the user identification information and provides unique information about the player. The personal ID may be the same as the user name or password. It shall be appreciated by those skilled in the art that some biometric information may be compressed. Furthermore, the user identification information includes data about the network access device and the network connection such as MAC ID, IP addresses, browser type, any cookies resident on the network access device, etc. Finally, the user identification system includes cryptographic keys which are used to encrypt and decrypt the communications between the verification system and each of the network access devices.


The user submitted data fields 72 mirror the registration data fields 70. The user submitted data fields receive data generated by a user that is attempting to access the broadband gaming system 36. The user submitted information is carefully analyzed to ensure that a valid user is being identified. It is well known that the connection of one network access device to another network access device generates security concerns. Preferably, the present verification system operates using a fast hardware-type firewall that performs a stateful multilayer inspection. In its preferred embodiment the firewall provides packet filtering using a secure protocol such as IPSec. This protocol provides encryption of the data at the packet level as well as at the source address level. Without access to the encryption keys, a potential intruder would have difficulty penetrating the firewall. Additionally, it would be preferable to provide a circuit level gateway and an application level gateway. The circuit level gateway works on the session layer of the OSI model or the TCP layer of the TCP/IP model, and monitors TCP handshaking between packets to determine whether a requested session is legitimate. The application level gateway filters data packets at the application layer of the OSI model. A stateful multilayer inspection firewall offers a high level of security, good performance, and transparency to end users.


Referring to FIG. 6 there is shown the player data fields 74 that are generated by the broadband gaming system and the transactional system after the user has been verified to be a registered player. The player data fields 74 are used to generate a player matrix which is used as an additional internal security measure. The player data fields 74 include a player ID that identifies the player, and a timestamp that provides the date, time in, and time out by the player during the game. Additionally, the type of game, credits played, and credits remaining are monitored. Based on the level of player activity a bonus is provided to the player. Further still the session time for each type of game and the amount played during the session is monitored to better define the type of games the player likes. Transactional information is also monitored and updated, preferably, by the transactional system 38. The transactional information includes credit card information, transaction requests, transaction approval, conversion of monetary funds to credits for playing the game, any transfers of credits for playing the game, and conversions from credits to monetary funds that are credited to the player's financial account. Preferably, communications between the transactional system and the broadband gaming system are conducted in a secure environment using cryptographic keys. Although the use of cryptography within the private network may appear excessive, one of the greatest security threats within a private network comes from its own employees. Therefore, it is preferable to use internal firewalls for communications between the broadband gaming system, the transactional system and the verification system.


Broadband Gaming System


A more detailed drawing of the broadband gaming system is provided in FIG. 7. The dashed boundary in FIG. 7 defines the broadband gaming system 36. After player verification is completed at the verification system 36, the broadband gaming system 36 is engaged. The broadband gaming system 34 includes a player buffer 80 configured to receive the players who will be playing the game. The player buffer 80 generates an initial player matrix with player data fields 74 (shown on FIG. 6).


A countdown timer 82 is coupled to the player buffer 80. Preferably, the countdown timer 82 is also displayed to the player. The countdown timer 82 provides a window of time within which players may join the game. The players that have joined the game before the end of the timing period are stored in the buffer. When the timing period reaches zero the initial player matrix is communicated to the transactional system 38 and to the gaming module 84.


The gaming module 84 provides a game that is played by the plurality of players. The game may include a plurality of different games and the type of game is not restrictive to this disclosure. Preferably, the gaming module 84 includes at least one random number generator 86 and a paytable module 88.


The random number generator 86 is operatively coupled to the player buffer. The random number generator 86 generates at least one random number that is stored in the player matrix. In one embodiment, at least one random number is generated for the plurality of players playing the game. In an alternative embodiment, at least one random number is generated for each player. In yet another embodiment, a plurality of random numbers are generated that are applied to the plurality of players playing the game. Preferably, the random number generator 86 is a fast hardware module.


A paytable module 88 is operatively coupled to the random number generator 86. The paytable module 88 is a programmable module that determines the type of prize awarded to the player based on the random number generated by the random number generator 86. In one embodiment, the paytable module 88 is a field programmable gate array. Preferably, the paytable module 88 also includes an image ID that is associated with the outcome determined by the paytable module 88.


A gaming output module 90 revises the player matrix to include the outcome for each player. Additionally, the gaming output module 90 groups the players according to the image ID. Based on the results generated by the gaming module 84, the gaming output module 90 generates a final player matrix that is communicated to the transactional server 38 and to a memory module 92.


Preferably, the memory module 92 has stored a plurality of images in a fast memory by the time the final player matrix is communicated to the memory module 92. In operation, the memory module 92 is enabled before the final matrix is communicated to the memory module 92. By way of example, when the game is engaged the memory module 92 begins the process of finding the applicable images associated with the image IDs in the mini-video server 94 and transfers the images to the fast memory module 92. Thus, when the gaming output is received by the memory, the images are stored in the fast memory module 92. In one embodiment, the memory module 92 then broadcasts the images to encoders 96 and 98. In an alternative embodiment, the memory module 92 is operatively coupled to an intelligent router (not shown) that routes the images to the appropriate encoders 96 and 98.


The appropriate encoder then receives the images and converts them to a format which meets the requirements for the appropriate network access device. By way of example, an IP encoder 96 encodes a plurality of JPEG images for viewing on a conventional web browser, and an MPEG encoder 98 encodes the plurality of JPEG images into an MPEG stream that is viewed on a television via an interactive set-top box.


Encryption modules 100a and 100b are operatively coupled to encoders 96 and 98, respectively, and receive the encoded images and encrypt the encoded images in manner well known to those skilled in the art. Modulation modules 102a and 102b are operatively coupled to encryption modules 100a and 100b, respectively, and modulate encrypted encoded images for downstream transmission in a manner well known to those skilled in the art.


Preferably, the broadband gaming system occupies one downstream band, i.e. one 6 or 8 MHz band, in the interactive set-top-box environment. In the web-based broadcast environment, the broadband gaming system occupies a downstream channel much like a standard streaming media website.


It shall be appreciated by those skilled in the art having the benefit of this disclosure that the broadband gaming system can play more than one game at a time. The system may be designed to operate in a multi-tasking mode where more than one game is played at a time. Additionally, the system may be designed to operate in a fast serial mode in which a game is played while the countdown timer is waiting for the next queue to be filled.


Transactional System


Referring back to FIG. 2, there is shown the transactional system 38 which comprises a transactional server 110 and a transactional database 112. The transactional system 38 performs a plurality of functions including tracking each transaction performed by both the verification system and the broadband gaming system. Additionally, the transactional system 38 is configured to authorize and conduct electronic fund transfers. Furthermore, the transactional system 38 performs such operations as player tracking, managing loyalty programs, engaging bonus games, determining bonus prizes and interfacing with accounting programs.


Method for Registering a Player


Referring to FIG. 8 there is shown a flowchart of the registration method for the gaming system 30. The registration method 150 begins when a prospective player first accesses a website, channel, kiosk or other such registration terminals as described in block 152. The method then proceeds to block 153.


At block 153, the registration process is initiated. By way of example and not of limitation, a registration terminal may provide a hyperlink to a registration window that prompts the prospective player for information. The method then proceeds to block 154.


At block 154, the prospective player provides registration identification information such as name, address, credit card number, and other information necessary to create a registration file for the prospective player. The method then proceeds to block 156.


At block 156, the prospective player is prompted for a personal ID. The personal ID may be a user ID, a password, a numeric combination, or any other such identification information. The personal ID is used during the verification process to identify a biometric template for the prospective player. The method then proceeds to block 158.


At block 158, the prospective player submits a biometric to the registration terminal. By way of example and not of limitation the biometric is a fingerprint. Any other biometric may also be used. The method then proceeds to block 160 or 162.


At block 160, the biometric input is compressed and encrypted. It is preferable for certain biometric inputs to be compressed such as fingerprint scans, retinal scans, and other such scanning techniques. Other biometric inputs such as voice patterns and signatures do not have to be compressed. The process of encrypting biometric inputs is necessary in an open network environment. The process of encrypting may not be necessary on a private proprietary network. Therefore, it shall be appreciated by those skilled in the art having the benefit of this disclosure that the compression and encryption processes in block 160 may not be necessary for every biometric input.


At block 162, the prospective player information is stored in the verification system and a player profile is updated accordingly. Alternatively, the prospective player information is stored on a smart card. The method then proceeds to block 164.


At block 164, security information about the registration terminal is collected. The registration information identifies the registration terminal as being a secure terminal. The registration terminal provides information such as the MAC ID for the biometric input module, the IP address for the server communicating with the registration terminal, and the cryptographic keys associated with the registration terminal. The registration terminal includes the network access devices described in FIG. 1a through FIG. 1d, as well as kiosks and other such registration terminals.


At block 166, the prospective player is identified as a registered player and the registration database 40 is updated accordingly. The registration process is broken out into separate components for security purposes. Once a validly registered player is identified by the verification system, the registration process is completed.


Method for Player Verification


Referring to FIG. 9 there is shown a method 170 for player verification used by the verification system 34. The player verification process includes receiving user identification information from a network access device. The method is initiated at block 174 when a user accesses a website or channel displaying the game. The method then proceeds to block 176.


At block 176, the personal ID is provided by the user. The personal ID is used by the verification system to find a biometric template for determining whether the user is a registered player. The method then proceeds to block 178.


At block 178, the biometric input module of the network access device receives a biometric from the user. As previously described the biometric input module can be one of plurality of biometric inputs. Depending on the type of biometric, the biometric may be compressed as described by block 180 and encrypted as described by block 182. At block 184, the biometric and the personal ID is then communicated through a network 32 to the verification system 34. Alternatively, the biometric and personal ID are communicated to a smart card for verification.


At block 186, the verification system 34 requests security information from the network access devices. The security information identifies the network access devices as being a valid network access device. The method then proceeds to block 188.


At block 188, the verification system 34 processes the security information to ensure that the security information is generated by the appropriate network access device, and to ensure that the security information has not been compromised. Preferably, the verification system 34 performs a stateful multilayer inspection as described above. The method then proceeds to block 190.


At block 190, the user submitted player information is compared to the registered player information. If a determination is made at decision diamond 192 that the submitted player information is not a valid, registered player the method proceeds to block 194. At block 194, the user is requested to re-input the biometric. If the biometric is input more than three times, as provided by decision diamond 196, the user is requested to contact customer service.


If a match is found at decision diamond 192 between the user submitted information and the registered player information, the user is identified as a valid player then the player proceeds to the broadband gaming system 36.


Method for Operation of Broadband Gaming System


Referring to FIG. 10 and FIG. 11, there is shown a flowchart 200 of the information processed by the broadband gaming system 36. The process is engaged by performing the verification process in which the verification system identifies a player as in block 201. After the verification process has been completed the method proceeds to block 202.


At block 202, the players who desire to play a particular game are stored in a buffer until the particular game is engaged. The method then proceeds to decision diamond 204.


At decision diamond 204, the countdown timer 82 determines if the period during which the game is open has been closed. If the game remains open, additional players may be received by the broadband gaming system. If the game is closed because the period during which the game is open has expired, then the method proceeds to block 206.


At block 206, the initial player matrix described above is generated. The initial player matrix includes information about the player, the type of game, and other such information about the game as described by the player data fields 74 shown in FIG. 6. The initial player matrix is then communicated to block 208 which transmits initial player matrix to the transactional system for validation. Additionally, the initial player matrix is communicated to the next block 210 in the broadband gaming system which starts the gaming module.


At block 210, the initial player matrix is received by the gaming module 84 and the gaming module 84 is engaged. At a minimum the gaming module 84 comprises a random number generator 86 and a paytable module 88. The random number generator generates at least one random number that is used during the game. The paytable module 88 is used to determine the prize associated with the at least one random number.


Referring to FIG. 11, a continuation of the broadband gaming system method is shown. By way of example, the gaming module may comprise a plurality of different random number generators. The blocks 214 and 216 describe the processes performed by a random number generator and a paytable module, respectively. The random number generator 86 of block 214 determines the winning combination of numbers for the game. At block 216, the paytable module 88 is used to determine the prize awarded to the player. Preferably, the paytable module 88 is also configured to provide image IDs that identify the images associated with the prize. Preferably, the paytable module 88 is resident in both the broadband gaming system and the transactional system. The purpose for this redundancy is as a security check for output generated by the gaming module. The method then proceeds to block 218.


At block 218 the player outputs with the same image IDs are grouped together. The grouping process is performed to simplify the broadcasting of the images to the plurality of players. By grouping the players according to the same image ID and having identified the network access device used by the player, a dynamic broadcasting method is created which occupies minimal downstream bandwidth. The method then proceeds to block 220.


At block 220 a final player matrix is completed. The final player matrix includes the same data fields as the initial player matrix. Additionally, the final player matrix includes the random number output and the paytable output. The final player matrix is then communicated to the transactional system as described in block 222. The method then proceeds to decision diamond 224.


At decision diamond 224, a validation procedure is conducted. The validation procedure essentially compares the transactional system's reverse calculation of the random numbers with the random numbers generated by the gaming module. If the random numbers in the transactional system are not the same or similar to the random numbers generated by the random number generator, a system failure or security breach is detected. If a security breach or system failure is detected, the method then proceeds to process block 226, which initiates diagnostic procedures. If the random numbers match, then the method proceeds to block 228.


At block 228, the plurality of images are broadcast. The images are preferably broadcast along one downstream channel for each network access device. However, traffic considerations may require the use of a plurality of downstream channels. By way of example, for DOCSIS and DSL type downstream transmissions, the streaming video preferably occupies a portion of the bandwidth available for a cable modem or DSL modem, respectively. In an alternative example, for an interactive set-top box environment, the downstream channel preferably occupies one 6 MHz or 8 MHz band or a portion of the 6 MHz or 8 MHz band. The method then proceeds to the next block 230.


At block 230, the broadcast images are encoded for downstream transmission. It shall be appreciated by those skilled in the art having the benefit of this disclosure that downstream transmission systems are well known and can be easily integrated into the systems and method described in this patent. The method then proceeds to block 232.


At block 232, the broadcast images are encrypted for downstream transmission. The purpose for downstream encryption is to prevent unauthorized access to the downstream signal. It shall be appreciated by those skilled in the art that various secure systems and methods for downstream transmission of images are well known.


It shall be appreciated by those skilled in the art having the benefit of this disclosure that a plurality of games may be played simultaneously. The games may be played in a distributed/parallel manner or in serial manner.


An Illustrative Game


An illustrative game is described to show how the system and method described above operates. The illustrative game described herein is a progressive slot machine. It is well known that in the United States many states have legalized lottery games even though other games of chance, such as progressive slot machines, have not been legalized. It is also well known that in casino gaming floors the most popular games are progressive slot machines. The present illustrative game operates on the system and method described above and provides an output similar to a progressive slot machine with a lottery type input.


The illustrative game includes first having a player provide a plurality of letters or numbers that are either generated by the player or are selected in a random manner. The random number generator of the gaming module is then engaged and a gaming module random number is generated. Preferably, the order that the random numbers were generated is used to determine the prize awarded to the player. A programmed paytable is then used to compare the player selected numbers to the gaming module random numbers according to the rules programmed into the paytable module. Based on the results of this comparison, a prize is awarded to the player. An image ID is associated with the prize awarded. The plurality of players are then grouped according to their respective image IDs. A broadcast stream for the plurality of images associated with each image ID is broadcast to each player.


A more concrete example includes having a player select a plurality of numbers, such as the numbers below:

    • 25 35 8 15 42


The random number generator of the gaming module is then engaged. By way of example the random number results are:

    • 56 2 3 8 42


The paytable module is then programmed to interpret the random numbers generating by the gaming module according to the following illustrative rules:


1. If a match between one number is achieved, then a prize of I× the initial bet credit is awarded and an image ID XQ23-1396 is used. Image ID XQ23-1396 is an animated plurality of images representing three cherries.


2. If a match between one number at the same location is achieved, then a prize of 2× the initial bet credit is awarded and an image ID XQ23-1397 is used. Image ID XQ23-1397 is an animated plurality of images representing four cherries.


3. If a match between a first number is achieved and a match between a second number is achieved, then a prize of 5× the initial credit is awarded and an image ID XQ23-1998 is used. Image ID XQ23-1998 is an animated plurality of images representing 3 oranges.


4. If a match between a first number at the same location is achieved and a match between a second number is achieved, than a prize of 7× the initial credit is awarded and an image ID XQ23-1999 is used. Image ID XQ23-1999 is an animated plurality of images representing 4 oranges.


Thus, for the illustrative example provided above, the player having selected the numbers: 23, 35, 8, 15 and 42 is entitled to a prize of 7× the initial credit for a random number: 56, 2, 3, 8, and 42. The associated images displayed on the network access device are an animated plurality of images representing 4 oranges.


The scope of the invention should be determined by the appended claims and their legal equivalents rather than by the examples given.

Claims
  • 1. A networked gaming system comprising: a user identification received by at least one network access device that is compared with registration data in a registration database, wherein a player is provided access to a game when the user identification matches the registered player data;a transactional component that charges the registered player at least one credit for a game outcome;a centralized networked gaming module that performs game operations and generates at least one random game output by random generation at the networked gaming module;the networked gaming module associates the at least one random game output with an image ID; andthe networked gaming module communicates one or more images corresponding to the image ID to the network access device.
  • 2. The networked gaming system of claim 1 further comprising a countdown timer that provides a window of time for other players to join the game.
  • 3. The networked gaming system of claim 1 further comprising an encryption module, the encryption module configured to encrypt the plurality of images communicated to each network access device.
  • 4. The networked gaming system of claim 1, wherein the images communicated to the network access device are viewable on a browser.
  • 5. The networked gaming system of claim 1, wherein the network access device includes a gaming terminal.
  • 6. The networked gaming system of claim 1, wherein the network access device includes a wireless device.
  • 7. The networked gaming system of claim 1, wherein the one or more images communicated to the network access device game include a slot machine game outcome.
  • 8. The networked gaming system of claim 7, wherein the networked gaming module generates the random game output with a lottery game.
  • 9. A networked gaming system comprising: a registration database that includes a registered player biometric;an input player biometric that is received by at least one network access device, wherein a player is provided access to a game when the input player biometric matches the registered player biometric;a transactional component that charges the registered player at least one credit for a game outcome;a centralized networked gaming module that performs game operations and generates at least one random game output by random generation at the networked gaming module;the networked gaming module associates the at least one random game output with an image ID; andthe networked gaming module communicates one or more images corresponding to the image ID to the network access device.
  • 10. The networked gaming system of claim 9 further comprising a countdown timer that provides a window of time for other players to join the game.
  • 11. The networked gaming system of claim 9 further comprising an encryption module, the encryption module configured to encrypt the plurality of images communicated to each network access device.
  • 12. The networked gaming system of claim 9, wherein the images communicated to the network access device are viewable on a browser.
  • 13. The networked gaming system of claim 9, wherein the network access device includes a gaming terminal.
  • 14. The networked gaming system of claim 9, wherein the network access device includes a wireless device.
  • 15. The networked gaming system of claim 9, wherein the one or more images communicated to the network access device game include a slot machine outcome.
  • 16. The networked gaming system of claim 15, wherein the networked gaming module generates the random game output with a lottery game.
  • 17. A networked gaming method comprising: receiving a user identification from at least one network access device, wherein the user identification is compared with registration data in a registration database;providing a player with access to a game when the user identification matches the registered player data;charging the registered player at least one credit for a game outcome;enabling a centralized networked gaming module to perform the game operations and generate at least one random game output by random generation at the networked gaming module;enabling the networked gaming module to associate the at east one random game output with an image ID; andenabling the networked gaming module to communicate one or more Images corresponding to the image ID to the network access device.
  • 18. The networked gaming method of claim 17 further comprising: receiving a registered player biometric associated with the player and storing the registered player biometric in the registration database;receiving an input player biometric from the network access device; andproviding access to the game when the input player biometric matches the registered player biometric.
  • 19. The networked gaming method of claim 18 further comprising enabling a countdown timer to provide a window of time for other players to join the game.
  • 20. The networked gaming method of claim 18 further comprising encrypting the plurality of images communicated from the networked gaming module to each network access device.
  • 21. The networked gaming method of claim 18, wherein the images communicated to the network access device are viewable on a browser.
  • 22. The networked gaming method of claim 18, wherein the network access device includes a gaming terminal.
  • 23. The networked gaming method of claim 18, wherein the network access device includes a wireless device.
  • 24. The networked gaming method of claim 18, wherein the one or more images communicated to the network access device game include a slot machine game outcome.
  • 25. The networked gaming system of claim 24, wherein the networked gaming module generates the random game output with a lottery game.
  • 26. The networked gaming system of claim 1, the networked gaming module communicating a plurality of images corresponding to the image ID to the network access device.
  • 27. The networked gaming system of claim 9, the networked gaming module communicating a plurality of images corresponding to the image ID to the network access device.
  • 28. The networked gaming method of claim 18, further comprising enabling the networked gaming module to communicate a plurality of images corresponding to the image ID to the network access device.
CROSS REFERENCE

This patent application is a Continuation of patent application Ser. No. 12/981,403 filed on Dec. 29, 2010 that is entitled GAMING SYSTEM NETWORK AND METHOD FOR DELIVERING GAMING MEDIA, which is a Continuation of patent application Ser. No. 10/681,034 (now U.S. Pat. No. 8,403,755) filed on Oct. 8, 2003 that is entitled WIRELESS BROADBAND GAMING SYSTEM AND METHOD, which is a Continuation of patent application Ser. No. 09/899,559 filed (now abandoned) on Jul. 5, 2001 that is entitled BIOMETRIC BROADBAND GAMING SYSTEM AND METHOD, which claims the benefit of provisional patent application Ser. No. 06/266,956 filed on Feb. 6, 2001. All of the above are herein incorporated by reference.

US Referenced Citations (207)
Number Name Date Kind
4339798 Hedges et al. Jul 1982 A
4856787 Itkis Aug 1989 A
5586937 Menashe Dec 1996 A
5594491 Hodge et al. Jan 1997 A
5630757 Gagin et al. May 1997 A
5643086 Alcorn et al. Jul 1997 A
5738583 Comas et al. Apr 1998 A
5761416 Mandal et al. Jun 1998 A
5761647 Boushy Jun 1998 A
5762552 Vuong et al. Jun 1998 A
5768382 Schneier Jun 1998 A
5779545 Berg et al. Jul 1998 A
5795228 Trumbull Aug 1998 A
5800268 Molnick Sep 1998 A
5851149 Xidos et al. Dec 1998 A
5871398 Schneier et al. Feb 1999 A
5902983 Crevelt et al. May 1999 A
5947821 Stone Sep 1999 A
5970143 Schneier Oct 1999 A
5971849 Falciglia Oct 1999 A
6001016 Walker Dec 1999 A
6010404 Walker Jan 2000 A
6106396 Alcorn et al. Aug 2000 A
6142876 Cumbers Nov 2000 A
6159095 Frohn et al. Dec 2000 A
6178510 O'Connor et al. Jan 2001 B1
6203428 Giobbi et al. Mar 2001 B1
6217447 Lofink Apr 2001 B1
6220961 Keane Apr 2001 B1
6259405 Stewart et al. Jul 2001 B1
6322446 Yacenda Nov 2001 B1
6327535 Evans et al. Dec 2001 B1
6409602 Wiltshire et al. Jun 2002 B1
6500068 Walker et al. Dec 2002 B2
6508709 Karmarker Jan 2003 B1
6508710 Paravia et al. Jan 2003 B1
6527638 Walker et al. Mar 2003 B1
6554705 Cumbers Apr 2003 B1
6575834 Lindo Jun 2003 B1
6606494 Arpee et al. Aug 2003 B1
6612928 Bradford et al. Sep 2003 B1
6628939 Paulsen Sep 2003 B2
6638170 Crumby Oct 2003 B1
6640218 Golding et al. Oct 2003 B1
6676522 Rowe Jan 2004 B2
6682421 Rowe et al. Jan 2004 B1
6702672 Angell et al. Mar 2004 B1
6709333 Bradford et al. Mar 2004 B1
6709631 Mori et al. Mar 2004 B2
6719631 Tulley et al. Apr 2004 B1
6749512 MacGregor et al. Jun 2004 B2
6782253 Shteyn et al. Aug 2004 B1
6834195 Brandenberg et al. Dec 2004 B2
6875110 Crumby Apr 2005 B1
6879838 Rankin et al. Apr 2005 B2
6884162 Raverdy et al. Apr 2005 B2
6942574 LeMay et al. Sep 2005 B1
7035651 Schreiner et al. Apr 2006 B2
7076243 Parupudi et al. Jul 2006 B2
7107245 Kowalick Sep 2006 B1
7136915 Rieger, III Nov 2006 B2
7196662 Misikangas et al. Mar 2007 B2
7209752 Myllymaki et al. Apr 2007 B2
7213048 Parupudi et al. May 2007 B1
7218941 Kubo et al. May 2007 B1
7228136 Myllymaki et al. Jun 2007 B2
7299059 Misikangas et al. Nov 2007 B2
7338372 Morrow et al. Mar 2008 B2
7341522 Yamagishi Mar 2008 B2
7349683 Misikangas Mar 2008 B2
7359714 Parupudi et al. Apr 2008 B2
7397424 Houri Jul 2008 B2
7450954 Randall Nov 2008 B2
7493565 Parupudi et al. Feb 2009 B2
7529639 Kikta et al. May 2009 B2
7534169 Amaitis et al. May 2009 B2
7611407 Itkis Nov 2009 B1
7753772 Walker Jul 2010 B1
8002617 Uskela et al. Aug 2011 B1
8029349 Lind Oct 2011 B2
8172684 Adiraju et al. May 2012 B2
8403755 Kerr Mar 2013 B2
8492995 Maxik et al. Jul 2013 B2
8506406 Kerr Aug 2013 B2
8506407 Kerr Aug 2013 B2
8523679 Kerr Sep 2013 B2
8738024 Kerr et al. May 2014 B1
8747229 Kerr Jun 2014 B2
8942995 Kerr Jan 2015 B1
9043222 Kerr et al. May 2015 B1
20010004768 Hodge et al. Jun 2001 A1
20010005908 Hodge et al. Jun 2001 A1
20010031654 Walker Oct 2001 A1
20010031656 Marshall Oct 2001 A1
20010036224 Demello et al. Nov 2001 A1
20010039210 St-Denis Nov 2001 A1
20010044337 Rowe Nov 2001 A1
20020002073 Montgomery et al. Jan 2002 A1
20020007494 Hodge Jan 2002 A1
20020056125 Hodge et al. May 2002 A1
20020056143 Hodge et al. May 2002 A1
20020061778 Acres May 2002 A1
20020069105 do Rosario Botelho et al. Jun 2002 A1
20020077130 Owensby Jun 2002 A1
20020077167 Merari Jun 2002 A1
20020091568 Kraft et al. Jul 2002 A1
20020103028 Carter et al. Aug 2002 A1
20020111210 Luciano et al. Aug 2002 A1
20020111907 Ling Aug 2002 A1
20020133707 Newcombe Sep 2002 A1
20020142815 Candelore Oct 2002 A1
20020142844 Kerr Oct 2002 A1
20020142846 Paulsen Oct 2002 A1
20020144151 Shell et al. Oct 2002 A1
20020174436 Wu et al. Nov 2002 A1
20020198775 Ryan Dec 2002 A1
20030009385 Tucciarone et al. Jan 2003 A1
20030030666 Najmi et al. Feb 2003 A1
20030032409 Hutcheson et al. Feb 2003 A1
20030064805 Wells Apr 2003 A1
20030119578 Newson Jun 2003 A1
20030144017 Inselberg Jul 2003 A1
20040023721 Giobbi Feb 2004 A1
20040192438 Wells et al. Sep 2004 A1
20040224757 Yamamura et al. Nov 2004 A1
20050046608 Schantz et al. Mar 2005 A1
20050048990 Lauriol Mar 2005 A1
20050085257 Laird Apr 2005 A1
20050114212 Carrez et al. May 2005 A1
20050136949 Barnes, Jr. Jun 2005 A1
20050154646 Chermesino Jul 2005 A1
20050159883 Humphries et al. Jul 2005 A1
20050181804 Misikangas et al. Aug 2005 A1
20050246334 Tao et al. Nov 2005 A1
20050261063 Boyd et al. Nov 2005 A1
20060003830 Walker et al. Jan 2006 A1
20060004627 Baluja Jan 2006 A1
20060058102 Nguyen et al. Mar 2006 A1
20060063575 Gatto et al. Mar 2006 A1
20060125693 Recker Jun 2006 A1
20060181411 Fast et al. Aug 2006 A1
20060189382 Muir et al. Aug 2006 A1
20060194633 Paulsen Aug 2006 A1
20060238382 Kimchi et al. Oct 2006 A1
20060240891 Klinkhammer et al. Oct 2006 A1
20060287810 Sadri et al. Dec 2006 A1
20070024580 Sands et al. Feb 2007 A1
20070025265 Porras et al. Feb 2007 A1
20070060306 Amaitis et al. Mar 2007 A1
20070061229 Ramer et al. Mar 2007 A1
20070087834 Moser et al. Apr 2007 A1
20070100963 Ban et al. May 2007 A1
20070136132 Weiser et al. Jun 2007 A1
20070149215 Misikangas Jun 2007 A1
20070149216 Misikangas Jun 2007 A1
20070167210 Kelly et al. Jul 2007 A1
20070168127 Zaruba et al. Jul 2007 A1
20070184852 Johnson et al. Aug 2007 A1
20070218975 Iddings et al. Sep 2007 A1
20070243925 LeMay et al. Oct 2007 A1
20070244633 Phillips et al. Oct 2007 A1
20070257831 Mathews et al. Nov 2007 A1
20070270212 Cockerille et al. Nov 2007 A1
20070281692 Bucher et al. Dec 2007 A1
20080026844 Wells Jan 2008 A1
20080032705 Patel et al. Feb 2008 A1
20080039192 Laut Feb 2008 A1
20080057894 Aleksic et al. Mar 2008 A1
20080076572 Nguyen et al. Mar 2008 A1
20080085692 Hart et al. Apr 2008 A1
20080096659 Kreloff et al. Apr 2008 A1
20080097858 Vucina et al. Apr 2008 A1
20080102947 Hays et al. May 2008 A1
20080108430 Evans May 2008 A1
20080113785 Alderucci et al. May 2008 A1
20080153515 Mock et al. Jun 2008 A1
20080162037 Mahmoud Jul 2008 A1
20080166973 Hart et al. Jul 2008 A1
20080167106 Lutnick et al. Jul 2008 A1
20080186234 Alles et al. Aug 2008 A1
20080189360 Kiley et al. Aug 2008 A1
20080207296 Lutnick et al. Aug 2008 A1
20080227473 Haney Sep 2008 A1
20080249833 Ali et al. Oct 2008 A1
20080252527 Garcia Oct 2008 A1
20080281668 Nurminen Nov 2008 A1
20090197684 Arezina et al. Aug 2009 A1
20090213771 Celentano et al. Aug 2009 A1
20090325708 Kerr Dec 2009 A9
20100022308 Hartmann et al. Jan 2010 A1
20100027521 Huber et al. Feb 2010 A1
20100039929 Cho et al. Feb 2010 A1
20100048242 Rhoads et al. Feb 2010 A1
20100063854 Purvis et al. Mar 2010 A1
20100121567 Mendelson May 2010 A1
20100167771 Raghothaman et al. Jul 2010 A1
20100287033 Mathur Nov 2010 A1
20100302056 Dutton et al. Dec 2010 A1
20100305855 Dutton et al. Dec 2010 A1
20100331016 Dutton et al. Dec 2010 A1
20110078167 Sundaresan et al. Mar 2011 A1
20110103360 Ku et al. May 2011 A1
20110159953 Kerr Jun 2011 A1
20110165936 Kerr Jul 2011 A1
20120115512 Grainger et al. May 2012 A1
20120122476 Lee et al. May 2012 A1
20130003572 Kim et al. Jan 2013 A1
Foreign Referenced Citations (1)
Number Date Country
2008065257 Jun 2008 WO
Non-Patent Literature Citations (42)
Entry
“Internet Industry Interacting Gambling Code: A Code for Industry Co-Regulation in the Area of Internet Gambling Content Pursuant to the Requirements of the Interactive Gaming Act of 2001.” Internet Industry Association. Dec. 2001.
Wireless Network. “Wikipedia. http://en.wikipedia.org/wiki/Wireless—network.” Nov. 17, 2008.
“Tracking Cookie.” Wikipedia. http://en.wikipedia.org/wiki/Tracking—cookie. May 24, 2009.
“Ekahau Positioning Engine 4.2.” 2008. http://www.nowire.se/images/produktblad/ekahau/datasheet.sub.--epe.sub.-42.sub.--en.sub.--11022008.sub.--lo.pdf. Sep. 29, 2008.
“Internet Industry Interacting Gambling Code: A Code for Industry Co-Regulation in the Area of Internet Gambling Content Pursuant to the Requirements of the Interactive Gaming Act of 2001”. Internet Industry Association. Dec. 2001.
“Location in SIP/IP Core Architecture.” Open Mobile Alliance. Sep. 4, 2008. Accessed Dec. 2008. http://www.openmobilealliance.org/technical/release.sub.--program/locsip.- sub.--archive.aspx.
“The New Normal of Retailing: The Rise of the Mobile Shopper.” Next Generation Retail Summit. 2010. http://www.ngrsummit.com/media/whitepapers/Microsoft.sub.--NGRUS.pdf.
“Wi-Fi Location-Based Services—Design and Deployment Considerations.” 2006 Cisco Systems. Accessed Dec. 2008. https://learningnetwork.cisco.com/docs/DOC-3418.
“Wireless Network.” Wikipedia. http://en.wikipedia.org/wiki/Wireless.sub.--network. Nov. 17, 2008.
Balakrishnan et al. “Lessons from Developing and Deploying the Cricket Indoor Location System.” Nov. 7, 2003. http://www.sds.lcs.mit.edu/projects/cricket/V1Exp.pdf.
Blom et al. “Transmission Power Measurements for Wireless Sensor Nodes and their Relationship to Battery Level.” Symposium on Wireless Communication Systems. pp. 342-345, Sep. 7, 2005.
Borriello et al. “Delivering Real-World Ubiquitous Location Systems.” Communications of the ACM. pp. 36-41, vol. 48, Issue 3, Mar. 2005.
Capkun et al. “Mobility Helps Peer-to-Peer Security.” IEEE Transactions on Mobile Computing. vol. 5, Issue 1, pp. 43-51, Jan. 2006.
Chawathe et al. “A Case Study in Building Layered DHT Applications.” Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications. vol. 35, Issue 4, Oct. 2005.
Chen et al. “Practical Metropolitan-Scale Positioning for GSM Phone.” UbiComp 2006: Ubiquitous Computing Lecture Notes in Computer Science, 2006, vol. 4206/2006, pp. 225-242.
Cheng et al. “Accuracy Characterization for Metropolitan-scale Wi-Fi Localization.” Proceedings of the 3rd international conference on Mobile systems, applications, and services. 2005.
Heidari, Mohannad. “A Testbed for Real-Time Performance Evaluation of RSS-Based Indoor Geolocation Systems in a Laboratory Environment”. Apr. 21, 2005. Accessed Dec. 2008. https://www.wpi.edu/Pubs/ETD/Available/etd-050407-112549/unrestricted/mas- sad.pdf.
Hightower et al. “Practical Lessons from the Place Lab.” IEEE Pervasive Computing. pp. 32-39, vol. 5, Issue 3, Jul.-Sep. 2006.
Hile et al. “Indoor Location Estimation with Placelab.” http://www.cs.washington.edu/education/courses/cse590gb/04wi/projects/hil- e-liu/. Jan. 8, 2004. Accessed on Sep. 25, 2008.
HTTP Cookie, redirected from tracking cookie as downloaded from wikipedia, 41 pages.
Interactive Gambling Industry Code, Dec. 2001, 7 pages.
Kang “Extracting Places from Traces of Locations.” ACM SIGMOBILE Mobile Computing and Communications Review. vol. 9, Issue 3, Jul. 2005.
Kitasuka et al. “Positioning Technique of Wireless LAN Terminal Using RSSI between Terminals”. Jun. 2005. Accessed Dec. 2008. http://www.techrepublic.com/whitepapers/positioning-technique-of-wireless- -lan-terminals-using-rssi-between-terminals/330959.
Ladd et al. “On the Feasibility of Using Wireless Ethernet for Indoor Localization.” IEEE Transactions on Robotics and Automation, pp. 555-559, vol. 20, Issue 3, No. 3, Jun. 2004.
Ladd et al. “Using Wireless Ethernet for Localization.” IEEE/RJS International Conference on Intelligent Robots and Systems. 2002.
Lafargue, Edouard. “Wireless Network Audits using Open Source Tools”. SANS Institute 2003. Accessed Dec. 2008. http://www.sans.org/reading.sub.--room/whitepapers/auditing/wireless-netw- ork-audits-open-source-tools.sub.--1235.
Lamarca et al. “Finding Yourself: Experimental location technology relies on Wi-Fi and cellphone signals instead of orbiting satellites.” Dec. 2004. http://spectrum.ieee.org/computing/networks/finding-yourself.
Lamarca et al. “Place Lab: Positioning Using Radio Beacons in the Wild.” Pervasive 2005, LNCS 3468, pp. 116-133, 2005.
Lamarca et al. “Self-Mapping in 802.11 Location Systems.” UbiComp 2005: Ubiquitous Computing Lecture Notes in Computer Science, 2005, vol. 3660/2005, 903, DOI: 10.1007/11551201.sub.--6.
Letchner et al. “Large-Scale Localization from Wireless Signal Strength.” In Proceedings of the National Conference on Artificial Intelligence (AAAI), 2005.
Li et al. “A New Method for Yielding a Database of Location Fingerprints in WLAN” IEE Communications Proceedings, pp. 580-586, vol. 152, Issue 5, Oct. 7, 2005.
Milojicic et al. “Peer-to-Peer Computing” Jul. 10, 2002. https://www.hpl.hp.com/techreports/2002/HPL-2002-57R1.pdf.
Muthukrishnan, et al. “Sensing motion using spectral and spatial analysis of WLAN RSSI.” Proceedings of the 2nd European conference on Smart sensing and context. 2007. pp. 62-76.
Otsason et al. “Accurate GSM Indoor Localization.” Ubiquitous Computing 2005, LNCS 3660, pp. 141-158, 2005.
Sakata et al. “An efficient algorithm for Kriging approximation and optimization with large-scale sampling data”. Computer Methods in Applied Mechanics and Engineering. vol. 193, Issues 3-5, pp. 385-404, Jan. 23, 2004.
Schilit et al. “Challenge: Ubiquitous Location-Aware Computing and the “Place Lab” Initiative.” WMASH Proceedings of the 1st ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots. 2003.
Varshaysky et al. “Are GSM Phones the Solution for Localization?” 7th IEEE Workshop on Mobile Computing Systems and Applications, 2006. pp. 34-42, Aug. 1, 2005.
Vegni et al. “Local Positioning Services on IEEE 802.11 Networks.” Radio Engineering, pp. 42-47, vol. 17, No. 2, Jun. 2008.
Want et al. “The Active Badge Location System.” ACM Transactions on Office Information Systems (TOIS) vol. 10. No. 1, pp. 91-102, Jan. 1992.
Welbourne et al. “Mobile Context Inference Using Low-Cost Sensors.” Location and Context-Awareness Lecture Notes in Computer Science, 2005, vol. 3479/2005, pp. 95-127.
Wirelss Network. Wikipedia. http://en.wikipedia.org/wiki/Wireless.sub.--network. Nov. 17, 2008.
Youssef et al. “Location-Clustering Techniques for WLAN Location Determination Systems.” 2006. http://wrc.ejust.edu.eg/papers/ijca.pdf.
Provisional Applications (1)
Number Date Country
60266856 Feb 2001 US
Continuations (3)
Number Date Country
Parent 12981403 Dec 2010 US
Child 14189918 US
Parent 10681034 Oct 2003 US
Child 12981403 US
Parent 09899599 Jul 2001 US
Child 10681034 US