Systems and methods for out-of-band gaming machine management

Information

  • Patent Grant
  • 9005034
  • Patent Number
    9,005,034
  • Date Filed
    Wednesday, April 30, 2008
    16 years ago
  • Date Issued
    Tuesday, April 14, 2015
    9 years ago
Abstract
Gaming machines may be remotely accessed by a gaming machine management server. The gaming machine management server may access a respective gaming machine while the respective gaming machine is powered off. The gaming machine management server may access a respective gaming machine while the respective gaming machine is powered on and concurrently while an operating system of the respective gaming machine is being executed.
Description
BACKGROUND

1. Technical Field


This disclosure generally relates to gaming machines and more particularly to management of gaming machines.


2. Description of the Related Art


At a casino, electronic gaming machines may be clustered together in a relatively small geographical region such as a casino floor. Electronic gaming machines may also be distributed over a relatively large geographical region as is the case when electronic gaming machines provide lottery tickets for a state-run lottery.


Electronic gaming machines may be communicatively coupled to a management server. The management server may monitor the electronic gaming machines. The management server may reconfigure electronic gaming machines with which it has an active communication path. However, when the communication path between the management server and a gaming machine is down, the management server cannot monitor or reconfigure the gaming machine. Among other reasons, the communication path between the gaming machine and the management server may be down because the gaming machine is powered off or the gaming machine has crashed, i.e., the gaming machine is powered on but an operating system of the gaming machine is not being executed.


BRIEF SUMMARY

There exists a need for remote monitoring, as well as remote reconfiguration and remote diagnostics and repair, of gaming machines.


In one aspect, the present disclosure is directed to an electronic gaming machine that includes a core processor electrically powered by a power supply when the gaming machine is in a powered on state and electrically isolated from any power supply when the gaming machine is in a powered off state, the core processor executing instructions in the powered on state; a memory in communication with the core processor and having instructions stored therein that cause the processor to execute a game title on an operating system of the gaming machine; a remote management controller electrically powered by the power supply when the gaming machine is in either one of the powered off state or the powered on state, the remote management controller operable to provide remote access to the gaming machine; and an unalterable boot up procedure for the gaming machine. The electronic gaming machine may further include a non-volatile memory electrically powered by the power supply when the gaming machine is in either one of the powered off state or the powered on state. The non-volatile memory may store event logs, wherein the remote management controller is operable to provide the event logs over an out-of-band channel to a remote computing device. The non-volatile memory may store authentication information, wherein the remote management controller is operable to provide the authentication information over an out-of-band channel to a remote computing device. The non-volatile memory may store an indicator of at least one software title stored in the memory, wherein the remote management controller is operable to provide the indicator of at least one software title over an out-of-band channel to a remote computing device.


In another aspect, the present disclosure is directed to a method of managing a plurality of remote gaming machines that includes: configuring each respective gaming machine of the plurality of gaming machines to enable remote access while an operating system of the respective gaming machine is not being executed; configuring each respective gaming machine of the plurality of gaming machines to have a respective unalterable boot up; and accessing a respective first memory of a respective gaming machine while the operating system of the respective gaming machine is not being executed for at least one respective gaming machine of the plurality of gaming machines. In some embodiments, accessing a respective memory of a respective gaming machine may further include retrieving a respective software title indicator of at least one respective software title stored in a respective second memory storing of the respective software title. This may include managing a portfolio of licenses for software titles based at least on software title indicators retrieved from the plurality of gaming machines. Managing a portfolio of licenses for software titles may include determining at total number of the gaming machines which store a respective software title, wherein a respective license for the respective software title is included in the portfolio of software titles. In some embodiments, accessing a respective memory of a respective gaming machine may further include retrieving a respective event log for the respective gaming machine while a core processor for executing the operating system is powered and concurrently while the operating system of the respective gaming machine is not being executed. This may further include providing the respective gaming machine with a repair storage device image and initiating a reboot of the respective gaming machine. In some embodiments, accessing a respective memory of a respective gaming machine may include retrieving a respective diagnostic indicator for the respective gaming machine while a core processor for executing the operating system is powered off. In some embodiments, accessing a respective memory of a respective gaming machine may further include retrieving a respective authentication indicator for the respective gaming machine while a core processor for executing the operating system is powered off. This may further include verifying the authentication indicator for the respective gaming machine. In some embodiments, accessing a respective memory of a respective gaming machine may further include retrieving an asset indicator of at least one respective asset of a respective gaming machine. This may include managing a portfolio of assets based at least on asset indicators retrieved from the plurality of gaming machines. Managing a portfolio of assets may include determining a total number of the gaming machines which include a respective asset, wherein a respective license for the respective asset is included in the portfolio of assets.





BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

In the drawings, identical reference numbers identify similar elements or acts. The sizes and relative positions of elements in the drawings are not necessarily drawn to scale. For example, the shapes of various elements and angles are not drawn to scale, and some of these elements are arbitrarily enlarged and positioned to improve drawing legibility. Further, the particular shapes of the elements as drawn, are not intended to convey any information regarding the actual shape of the particular elements, and have been solely selected for ease of recognition in the drawings.



FIG. 1 is a schematic diagram of a gaming machine management system according to one non-limiting illustrated embodiment.



FIG. 2 is a schematic diagram of the gaming machine of FIG. 1, according to one non-limiting illustrated embodiment.



FIGS. 3A-3C are a flow diagram of a process to manage a plurality of remote gaming machines.





DETAILED DESCRIPTION

In the following description, certain specific details are set forth in order to provide a thorough understanding of various disclosed embodiments. However, one skilled in the relevant art will recognize that embodiments may be practiced without one or more of these specific details, or with other methods, components, materials, etc. In other instances, well-known structures associated with computing systems, computing devices, communications devices and/or with gaming machines have not been shown or described in detail to avoid unnecessarily obscuring descriptions of the embodiments.


Unless the context requires otherwise, throughout the specification and claims which follow, the word “comprise” and variations thereof, such as, “comprises” and “comprising” are to be construed in an open, inclusive sense, that is as “including, but not limited to.”


Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.


As used in this specification and the appended claims, the singular forms “a,” “an,” and “the” include plural referents unless the content clearly dictates otherwise. It should also be noted that the term “or” is generally employed in its sense including “and/or” unless the content clearly dictates otherwise.


The headings and Abstract of the Disclosure provided herein are for convenience only and do not interpret the scope or meaning of the embodiments.


Any process descriptions or blocks in flowcharts described below may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions. In alternative embodiments, various logical functions, or acts may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, and/or manually, depending on the functionality involved, as would be understood by those reasonably skilled in the art.



FIG. 1 shows a schematic diagram of a gaming machine management system 100 according to one non-limiting illustrated embodiment. The gaming machine management system 100 has a gaming machine management server 102 that is in remote communication with at least one gaming machine. While FIG. 1 shows three gaming machines, individually referenced as 104a-104c and collectively referenced as 104, it is to be understood that the gaming machine management system 100 may include more or less gaming machines 104. The illustrated embodiment is provided merely for the sake of clarity and the number of gaming machines is not limited thereto.


In the embodiment shown in FIG. 1, the gaming machine 104a is in a powered on state with an executing operating system. The gaming machine 104a is communicatively coupled to the game management server 102 by an in-band communication channel 106a. Communications carried by the in-band communication channel 106a are at an “operating system” level and include communications provided by an operating system of the gaming machine 104a and communications provided to the operating system of the gaming machine 104a.


The gaming machines 104b, 104c are configured to communicate with the game management server 102 via in-band communication channels 106b, 106c, respectively, when said communication channels 106b, 106c are “up” or operative. In-band communication channels are collectively referenced as 106.


In the embodiment shown in FIG. 1, the communication channels 106b, 106c between the game management server 102 and the gaming machines 104b, 104c, respectively, are shown as being broken or inoperative such that there is no communication via the respective communication channels 106b, 106c.


In the embodiment shown in FIG. 1, the gaming machine 104b is in a powered off state. In the powered off state, the gaming machine 104b uses an amount of electrical current such that the gaming machine 104b may be re-booted faster than it would otherwise re-boot. In the powered off state, an operating system of the gaming machine is not being executed, and consequently, standard communications via the communication channel 106b are “down” or inoperative.


In the embodiment shown in FIG. 1, the gaming machine 104c is in a powered on state, but an operating system of the gaming machine 104c is not executing. In other words, the gaming machine 104c may be a state similar to a “crashed” personal computer. In this case, the operating system of the gaming machine is not being executed, and consequently, standard communications via the communication channel 106c are down.


In some embodiments, the gaming machine 104c is in a powered on state, but standard communications via the communication channel 106c are down. This situation may arise when an application on the gaming machine 104c freezes or crashes in such a way that the communication channel 106c is brought down, even if the operating system is being executed concurrently.


Each one of the gaming machines 104 is communicatively coupled to the game management server 102 by an out-of-band communication channel, individually referenced as 108a-108c and collectively referenced as 108. Among other things, the out-of-band channels 108 enable the game management server 102 to remotely monitor and manage the gaming machines 104. Among other things, communications carried by the out-of-band channels 108 may be at a service level or a device level and may include communications carrying information such as hardware self-test information.


Out-of-band communications from the gaming machine 104a, which is powered on with an executing operating system, may include information related to asset management of the gaming machine, authentication information, background diagnostics, etc. Asset management information may include information indicative of software loaded on the gaming machine 104. Authentication information may include information indicative of a configuration of the gaming machine 104. For example, authentication information may include information related to a core processor speed, capacity of a hard drive, an operating system version, a boot-up procedure version, game titles, peripheral devices, authentication certificates, authentication keys such as private/public key pairs, a hash of some quantity such as a key or software, a signed software image, etc. Background diagnostic information may include information indicative of a memory integrity check, an image of a hard drive, etc.


Similarly, out-of-band communications from the gaming machine 104b, which is powered off, may include information related to asset management of the gaming machine, authentication information, background diagnostics, etc.


Out-of-band communications from the gaming machine 104c, which is powered on without an executing operating system, may include information related to diagnostics such as event logs of the gaming machine 104c, image tests, etc. Out-of-band communications to the gaming machine 104c may include repair information for correcting a crash of the gaming machine 104c such as a hard drive re-image, etc.


In some embodiments, the gaming machines 104 may be geographically distributed over a large region. For example, the gaming machines 104 may be lottery ticket dispensing machines for a state-run lottery. Alternatively, the gaming machines 104 may be distributed over a relatively small geographic region such as a casino, airport, lounge, or gas station. In some embodiments, the gaming management system 100 may include distributed clusters of gaming machines 104, an example of which may be multiple geographically distributed casinos where each casino has a cluster of gaming machines 104. In any case, the game management server 102 may manage, monitor, reconfigure, authenticate, verify, and perform diagnostics and repair of the gaming machines 104. The game management server 102 may remotely access the gaming machines 104, perform remote diagnostics and repairs, provide remote downloads, remotely power on/off, and reboot the gaming machines 104.


An access control device 103 may be coupled to the game management server 102 for limiting access to the game management server 102 to only authorized personnel. The access control device 103 may take a variety of forms such as a biometric identification device, a security card reader, etc.


In some embodiments, communications via one or both of the in-band channel 106 and the out-of-band channel 108 may be encrypted. In that case, unauthorized personnel will not be able to hack into the gaming machines 106 via the encrypted channel(s).


In some embodiments, the game management server 102 generates an activity log. The activity log may include information such an indicator of past operators, past operations, accessed gaming machines 104, time of access, etc. In other words, the activity log may show who performed or attempted to perform what operation on which gaming machine and when.



FIG. 2 shows a schematic diagram of the gaming machine 104a, which is representative of the gaming machines 104b, 104c, according to one non-limiting illustrated embodiment. The gaming machine 104a has a memory controller hub 110 that is communicatively coupled to a core processor 112, a memory 114, and output devices 116 by one or more buses 118.


The core processor 112 may be a device for executing software, particularly that stored in the memory 114. The core processor 112 may be a custom made or commercially available processor, a central processing unit (CPU), a semiconductor based microprocessor (in the form of a microchip or chip set), or generally any device for executing software instructions.


The memory 114 may include any one or combination of volatile memory elements such as a read-only memory (ROM) and a random access memory (RAM). The random access memory (RAM) may include dynamic random-access memory (DRAM), static random-access memory (SRAM), synchronous dynamic random-access memory (SDRAM), flash RAM, etc.


The memory 114 may store one or more logic modules or logic routines, each of which may comprise an ordered listing of executable instructions for implementing logical functions. In particular, the memory 114 stores an operating system 120 and applications 122. The execution of the operating system 120 by the core processor 112 essentially controls the execution of other logic, such as applications 122, and provides scheduling, input-output control, file and data management, memory management, and communication control and related services. The applications 122 include one or more ordered listings of executable instructions for implementing logical functions for a game title, e.g., blackjack, poker, roulette, slot games, etc.


The output devices 116 may include user interface devices such as display devices and/or various output cards such as graphics cards.


The memory controller hub 110 has a microprocessor 124a. Among other things, the microprocessor 124a has a management engine. The management engine may take a variety of forms including firmware. The management engine implements various services on behalf of management applications.


The gaming machine 104a further includes an input/output controller hub 126 that is communicatively coupled to a storage device 128, communications devices 130, a remote management microcontroller 132, and an unalterable media 134 by one or more buses 118. The input/output controller hub 126 has a microprocessor 124b that embodies a management engine. The management engine may take a variety of forms including firmware. The management engine implements various services on behalf of management applications.


The storage device 128 may take a variety of forms such as, but not limited to, a hard drive, a CD-drive, a DVD drive, etc.


The communications devices 130 may include a network interface card and/or wireless communication devices such as, but not limited to, Ethernet devices and/or 802.11 devices that provide a communication link with the gaming machine management server 102. The communication link may be a wireless communication link, a wired communication link or media, an optical fiber, etc., and/or a combination thereof. The communication link may provide both the in-band channel 106 and the out-of-band channel 108. Alternatively, a first communication link may provide the in-band channel 106, and a second communication link may provide the out-of-band channel 108. The communications devices 130 include an in-band module 136 and an out-of-band module 138. The in-band module 136 provides system level communications with the gaming machine management server 102 via the in-band channel 106. The out-of-band module 138 provides out-of-band communications via the out-of-band channel 108.


The remote management microcontroller 132 facilitates remote out-of-band management of the gaming machine 104. The remote management microcontroller 132 may take a variety of forms such as a small microprocessor with firmware. The firmware may be stored in a non-volatile memory 140. The non-volatile memory 140 may take the form of flash memory. The remote management microcontroller 132 may include a built-in web server that is remotely accessible. The non-volatile memory 140 may store, among other things, authentication information and diagnostic information. Additionally, the gaming machine 104 is typically secured from unauthorized access to the physical components of the gaming machine 104 via a door of a cabinet that houses the gaming machine 104. The non-volatile memory 140 may store door access information indicative of when the gaming machine was opened for physical access to components of the gaming machine, who accessed the gaming machine, and what operation, change, and/or modification occurred or was attempted. Additionally, the non-volatile memory 140 may store software title indicators that are indicative of software titles stored in the memory 114.


In some embodiments, the gaming machine management server 102 may configure the gaming machine 104a to store selected information in the non-volatile memory 140. For example, the gaming machine management server 102 may specify components, modules, software, etc. that are considered as an asset. The non-volatile memory 140 may store a respective asset indicator that is indicative of the gaming machine 104a having one of the specified assets.


The unalterable media 134 may take the form of a read-only memory. The unalterable media 134 may store firmware for booting up the gaming machine 104a similar to Basic Input/Output System (BIOS) firmware of many personal computers. When the gaming machine 104a is first powered on, the boot-up firmware stored in the unalterable media 134 identifies and initiates various hardware components of the gaming machine 104a. Obviously, the firmware for booting up the gaming machine 104a cannot be updated if the firmware is stored in the unalterable media 134. However, by storing the firmware in the unalterable media 134, the firmware cannot be tampered with by either authorized or unauthorized personnel. Consequently, the gaming machine 104a is more secure with the boot-up firmware stored in the unalterable media 134 than stored in a writeable media.


The gaming machine 104a further includes a power supply 142 that is electrically coupled to various components of the gaming machine 104a via an electrically conductive medium 142. The gaming machine 104a is configured such that various components of the gaming machine 104a are electrically powered by the power supply 142 even when the gaming machine 104a is “powered off.” The input/output controller hub 126, the storage device 128, communications devices 130, the remote management microcontroller 132, unalterable media 134 and non-volatile memory 140 may receive a small amount of electrical current from the power supply 142 when the gaming machine 104a is powered off. The amount of electrical current supplied to various components of the gaming machine 104a is sufficient for the operation of the remote management microcontroller 132 and for out-of-band communication with the gaming machine management server 102.


In some embodiments, various components and/or functions of the gaming machine 104a such as the remote management microcontroller 132 and the management engine may be embodied in Intel® Active Management Technology.


Method of Asset Management



FIGS. 3A-3C show a flow chart of an exemplary process 300 to manage managing a plurality of remote gaming machines according to one non-limiting illustrated embodiment. Certain acts in the processes or process flow described in all of the logic flow diagrams referred to below must naturally precede others to function as described. However, the various embodiments are not limited to the order of the acts described if such order or sequence does not alter the functionality of one or more of the embodiments. That is, it is recognized that some acts may be performed before, after, or in parallel with other acts. Further, some embodiments may include additional acts and/or omit other acts.


At 302, each respective gaming machine of the plurality of gaming machines is configured to enable remote access while an operating system of the respective gaming machine is not being executed.


At 304, each respective gaming machine of the plurality of gaming machines is configured to have a respective unalterable boot up sequence. The unalterable boot up initializes and identifies various hardware components of the gaming machine when the gaming machine is powered on.


At 306, a respective first memory of a respective gaming machine is accessed while the operating system of the respective gaming machine is not being executed for at least one respective gaming machine of the plurality of gaming machines.


At 308, which may be optional in some embodiments, a respective software title indicator of at least one respective software title stored in a respective second memory storing of the respective software title is retrieved.


At 310, which may be optional in some embodiments, a portfolio of licenses for software titles is managed based at least on software title indicators retrieved from the plurality of gaming machines.


At 312, which may be optional in some embodiments, a total number of the gaming machines which store a respective software title is determined wherein a respective license for the respective software title is included in the portfolio of software titles.


At 314, which may be optional in some embodiments, a respective event log for the respective gaming machine is retrieved while a core processor for executing the operating system is powered and concurrently while the operating system of the respective gaming machine is not being executed.


At 316, which may be optional in some embodiments, the respective gaming machine is provided with a repair storage device image. The repair storage device image may be an image of a memory or a portion of a memory, such as memory 114, and/or may be an image of a hard drive.


At 318, which may be optional in some embodiments, a reboot of the respective gaming machine is initiated.


At 320, which may be optional in some embodiments, a respective diagnostic indicator for the respective gaming machine is retrieved while a core processor for executing the operating system is powered off.


At 322, which may be optional in some embodiments, a respective authentication indicator for the respective gaming machine is retrieved while a core processor for executing the operating system is powered off.


At 324, which may be optional in some embodiments, the authentication indicator for the respective gaming machine is verified.


At 326, which may be optional in some embodiments, a respective asset indicator of at least one respective asset of a respective gaming machine is retrieved.


At 328, which may be optional in some embodiments, a portfolio of assets is managed based at least on asset indicators retrieved from the plurality of gaming machines.


At 330, which may be optional in some embodiments, at total number of the gaming machines which include a respective asset is determined, wherein a respective license for the respective asset is included in the portfolio of assets.


The above description of illustrated embodiments, including what is described in the Abstract, is not intended to be exhaustive or to limit the embodiments to the precise forms disclosed. Although specific embodiments and examples are described herein for illustrative purposes, various equivalent modifications can be made without departing from the spirit and scope of the disclosure, as will be recognized by those skilled in the relevant art.


For instance, the foregoing detailed description has set forth various embodiments of the devices and/or processes via the use of block diagrams, schematics, and examples. Insofar as such block diagrams, schematics, and examples contain one or more functions and/or operations, it will be understood by those skilled in the art that each function and/or operation within such block diagrams, flowcharts, or examples can be implemented, individually and/or collectively, by a wide range of hardware, software, firmware, or virtually any combination thereof. In one embodiment, the present subject matter may be implemented via Application Specific Integrated Circuits (ASICs). However, those skilled in the art will recognize that the embodiments disclosed herein, in whole or in part, can be equivalently implemented in standard integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more controllers (e.g., microcontrollers), as one or more programs running on one or more processors (e.g., microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of ordinary skill in the art in light of this disclosure.


The various embodiments described above can be combined to provide further embodiments. To the extent that they are not inconsistent with the specific teachings and definitions herein, all of the U.S. patents, U.S. patent application publications, U.S. patent applications, foreign patents, foreign patent applications and non-patent publications referred to in this specification and/or listed in the Application Data Sheet are incorporated herein by reference, in their entirety. Aspects of the embodiments can be modified, if necessary, to employ systems, circuits and concepts of the various patents, applications and publications to provide yet further embodiments.


These and other changes can be made to the embodiments in light of the above-detailed description. In general, in the following claims, the terms used should not be construed to limit the claims to the specific embodiments disclosed in the specification and the claims, but should be construed to include all possible embodiments along with the full scope of equivalents to which such claims are entitled. Accordingly, the claims are not limited by the disclosure.

Claims
  • 1. An electronic gaming machine, comprising: a core processor electrically powered by a power supply when the electronic gaming machine is in a powered on state and electrically unpowered when the electronic gaming machine is in a powered off state, the core processor executes an operating system while in the powered on state;a first writeable memory in communication with the core processor and having instructions stored therein that cause the core processor to execute a game title on the operating system of the electronic gaming machine;a remote management controller electrically powered by the power supply when the electronic gaming machine is in the powered off state or the powered on state, wherein the remote management controller provides a gaming machine management server remote access via an input/output (I/O) controller to the first writeable memory, a storage device, and a non-volatile second writeable memory in the electronic gaming machine using an in-band channel and an out-of-band channel when the electronic gaming machine is in the powered on state, and provides the gaming machine management server remote access via the I/O controller to read and write data to the storage device or the non-volatile memory in the electronic gaming machine using only the out-of-band channel when the electronic gaming machine is in the powered off state or when the core processor of the electronic gaming machine is unable to execute the operating system; andan unalterable memory storing a boot up procedure that is executable by the electronic gaming machine.
  • 2. The electronic gaming machine of claim 1: wherein the non-volatile second writeable memory stores data indicative of a number of event logs; andwherein the remote management controller provides, via the I/O controller, the data indicative of the number of event logs over the out-of-band channel to the gaming machine management server.
  • 3. The electronic gaming machine of claim 1: wherein the non-volatile second writeable memory stores data indicative of authentication information; andwherein the remote management controller provides, via the I/O controller, the data indicative of the authentication information over the out-of-band channel to the gaming machine management server.
  • 4. The electronic gaming machine of claim 1: wherein the non-volatile second writeable memory stores data indicative of an indicator of at least one software title stored in the first writeable memory; andwherein the remote management controller provides, via the I/O controller, the data indicative of the indicator of the at least one software title over the out-of-band channel to the gaming machine management server.
  • 5. A method of managing a plurality of remote gaming machines, comprising: configuring, by a respective remote management controller in each of the plurality of remote gaming machines, read and write access to a non-volatile writeable memory, a storage device, and a non-volatile second writeable memory in the respective remote gaming machine using both an in-band channel and an out-of-band channel when power is provided by a power supply to the core processor in the respective remote gaming machine;configuring, by the respective remote management controller in each of the plurality of remote gaming machines, read and write access to the storage device and the non-volatile second writeable memory in the respective remote gaming machine using only an out-of-band channel when power provided by the power supply is interrupted to the core processor in the respective gaming machine or the core processor in the respective gaming machine does not execute any operating system;configuring each respective remote gaming machine of the plurality of gaming machines to have a respective unalterable boot up; andcommunicating to a remote gaming management server via the respective remote management controller in each of the plurality of gaming machines at least one of: asset management data, authentication data and diagnostic data using the out-of-band channel regardless of whether the core processor in each of the respective gaming machines is powered or executes an operating system;providing, via the respective remote management controller in the remote gaming machine, read and write access to the non-volatile second writeable memory of the respective remote gaming machine using the out-of-band channel at least while power to the core processor in the respective remote gaming machine is interrupted or the core processor in the respective gaming machine does not execute any operating system.
  • 6. The method of claim 5 wherein providing, via the respective remote management controller in a remote gaming machine, read and write access to the respective non-volatile second writeable memory of the respective remote gaming machine further includes: reading data indicative of an asset indicator of at least one respective asset that is stored in the non-volatile second writeable memory of the respective remote gaming machine.
  • 7. The method of claim 6, further comprising: managing a portfolio of assets based at least on asset indicators read from each of the plurality of remote gaming machines.
  • 8. The method of claim 7 wherein managing a portfolio of assets further includes: determining a total number of the plurality of remote gaming machines which include a respective asset, wherein a respective license for the respective asset is included in the portfolio of assets.
  • 9. The method of claim 5 wherein providing, via the respective remote management controller in a remote gaming machine, read and write access to the respective non-volatile second writeable memory of the remote gaming machine further includes: reading data indicative of a software title indicator of at least one respective software title stored in the respective non-volatile second writeable memory of the respective remote gaming machine.
  • 10. The method of claim 9, further comprising: managing a portfolio of licenses for software titles based at least on software title indicators read from each of the plurality of remote gaming machines.
  • 11. The method of claim 10 wherein managing a portfolio of licenses for software titles further includes: determining a total number of the plurality of remote gaming machines which store a respective software title, wherein a respective license for the respective software title is included in the portfolio of software titles.
  • 12. The method of claim 5 wherein providing, via the respective remote management controller in a remote gaming machine, read and write access to the respective non-volatile second writeable memory of the remote gaming machine further includes: reading data indicative of an event log for the respective gaming machine that is stored in the non-volatile second writeable memory while the core processor of the respective gaming machine receives power provided by the power supply and concurrently while the core processor of the respective remote gaming machine is not executing any operating system.
  • 13. The method of claim 12, further comprising: loading, from the remote gaming management server via the remote management controller in the respective remote gaming machine, a repair image to the non-volatile writeable memory to the respective remote gaming machine; andinitiating a reboot of the core processor in the respective gaming machine.
  • 14. The method of claim 5 wherein providing, via the respective remote management controller in a remote gaming machine, read and write access to the respective non-volatile second writeable memory of the remote gaming machine further includes: reading data indicative of diagnostic indicator stored in the non-volatile second writeable memory of the respective remote gaming machine while power to the core processor of the respective remote gaming machine is interrupted.
  • 15. The method of claim 5 wherein providing, via the respective remote management controller in a remote gaming machine, read and write access to the respective non-volatile second writeable memory of the remote gaming machine further includes: reading data indicative of an authentication indicator for the respective remote gaming machine while power to the core processor of the remote gaming machine is interrupted.
  • 16. The method of claim 15, further comprising: verifying the authentication indicator for the respective gaming machine.
US Referenced Citations (560)
Number Name Date Kind
3766452 Burpee et al. Oct 1973 A
4339798 Hedges et al. Jul 1982 A
4373726 Churchill et al. Feb 1983 A
4531187 Uhland Jul 1985 A
4586712 Lorber et al. May 1986 A
4659082 Greenberg Apr 1987 A
4693480 Smith Sep 1987 A
4725079 Koza et al. Feb 1988 A
4814589 Storch et al. Mar 1989 A
4832341 Muller et al. May 1989 A
4995615 Cheng Feb 1991 A
5007649 Richardson Apr 1991 A
5083800 Lockton Jan 1992 A
5179517 Sarbin et al. Jan 1993 A
5275400 Weingardt et al. Jan 1994 A
5283422 Storch et al. Feb 1994 A
5321241 Craine Jun 1994 A
5324035 Morris et al. Jun 1994 A
5326104 Pease et al. Jul 1994 A
5398932 Eberhardt et al. Mar 1995 A
5472194 Breeding et al. Dec 1995 A
5505449 Eberhardt et al. Apr 1996 A
5562284 Stevens Oct 1996 A
5605334 McCrea, Jr. Feb 1997 A
5605506 Hoorn et al. Feb 1997 A
5613912 Slater Mar 1997 A
5643086 Alcorn et al. Jul 1997 A
5651548 French et al. Jul 1997 A
5655961 Acres et al. Aug 1997 A
5707287 McCrea, Jr. Jan 1998 A
5741183 Acres et al. Apr 1998 A
5745110 Ertemalp Apr 1998 A
5759102 Pease et al. Jun 1998 A
5766074 Cannon et al. Jun 1998 A
5769458 Carides et al. Jun 1998 A
5770533 Franchi Jun 1998 A
5779545 Berg et al. Jul 1998 A
5800268 Molnick Sep 1998 A
5803808 Strisower Sep 1998 A
5813912 Shultz Sep 1998 A
5823879 Goldberg et al. Oct 1998 A
5830064 Bradish et al. Nov 1998 A
5830067 Graves et al. Nov 1998 A
5830068 Brenner et al. Nov 1998 A
5831669 Adrain Nov 1998 A
5851149 Xidos et al. Dec 1998 A
5855515 Pease et al. Jan 1999 A
5890963 Yen Apr 1999 A
5895048 Smith, Jr. Apr 1999 A
5895451 Yamade et al. Apr 1999 A
5905847 Kobayashi et al. May 1999 A
5911626 McCrea, Jr. Jun 1999 A
5941769 Order Aug 1999 A
5957776 Hoehne Sep 1999 A
5971851 Pascal et al. Oct 1999 A
5974135 Breneman et al. Oct 1999 A
5999808 LaDue Dec 1999 A
6001016 Walker et al. Dec 1999 A
6021949 Boiron Feb 2000 A
6039650 Hill Mar 2000 A
6047322 Vaid et al. Apr 2000 A
6068553 Parker May 2000 A
6077161 Wisler Jun 2000 A
6080063 Khosla Jun 2000 A
6089980 Gauselmann Jul 2000 A
6093103 McCrea, Jr. Jul 2000 A
6102799 Stupak Aug 2000 A
6110041 Walker et al. Aug 2000 A
6110043 Olsen Aug 2000 A
6117012 McCrea, Jr. Sep 2000 A
6135887 Pease et al. Oct 2000 A
6142876 Cumbers Nov 2000 A
6146273 Olsen Nov 2000 A
6149522 Alcorn et al. Nov 2000 A
6152824 Rothschild et al. Nov 2000 A
6154131 Jones, II et al. Nov 2000 A
6168513 Souza et al. Jan 2001 B1
6168523 Piechowiak et al. Jan 2001 B1
6183366 Goldberg et al. Feb 2001 B1
6185184 Mattaway et al. Feb 2001 B1
6186892 Frank et al. Feb 2001 B1
6210277 Stefan Apr 2001 B1
6213877 Walker et al. Apr 2001 B1
6217447 Lofink et al. Apr 2001 B1
6219836 Wells et al. Apr 2001 B1
6244958 Acres Jun 2001 B1
6251014 Stockdale et al. Jun 2001 B1
6254483 Acres Jul 2001 B1
6254484 McCrea, Jr. Jul 2001 B1
6256651 Tuli Jul 2001 B1
6264561 Saffari et al. Jul 2001 B1
6267669 Luciano, Jr. et al. Jul 2001 B1
6267671 Hogan Jul 2001 B1
6287202 Pascal et al. Sep 2001 B1
6299536 Hill Oct 2001 B1
6302790 Brossard Oct 2001 B1
6302793 Fertitta, III et al. Oct 2001 B1
6312332 Walker et al. Nov 2001 B1
6346044 McCrea, Jr. Feb 2002 B1
6350199 Williams et al. Feb 2002 B1
6362836 Shaw et al. Mar 2002 B1
6380953 Mizuno Apr 2002 B1
6383076 Tiedeken May 2002 B1
6389126 Bjornberg et al. May 2002 B1
6394900 McGlone et al. May 2002 B1
6400272 Holtzman et al. Jun 2002 B1
6401099 Koppolu et al. Jun 2002 B1
6409602 Wiltshire et al. Jun 2002 B1
6422670 Hedrick et al. Jul 2002 B1
6443839 Stockdale et al. Sep 2002 B2
6446864 Kim et al. Sep 2002 B1
6459882 Palermo et al. Oct 2002 B1
6460848 Soltys et al. Oct 2002 B1
6464584 Oliver Oct 2002 B2
6490285 Lee et al. Dec 2002 B2
6503147 Stockdale et al. Jan 2003 B1
6505772 Mollett et al. Jan 2003 B1
6508710 Paravia et al. Jan 2003 B1
6514140 Storch Feb 2003 B1
6516350 Lumelsky et al. Feb 2003 B1
6517435 Soltys et al. Feb 2003 B2
6517436 Soltys et al. Feb 2003 B2
6520857 Soltys et al. Feb 2003 B2
6527271 Soltys et al. Mar 2003 B2
6527638 Walker et al. Mar 2003 B1
6530836 Soltys et al. Mar 2003 B2
6530837 Soltys et al. Mar 2003 B2
6533276 Soltys et al. Mar 2003 B2
6533662 Soltys et al. Mar 2003 B2
6579180 Soltys et al. Jun 2003 B2
6579181 Soltys et al. Jun 2003 B2
6595857 Soltys et al. Jul 2003 B2
6607441 Acres Aug 2003 B1
6609978 Paulsen Aug 2003 B1
6629184 Berg et al. Sep 2003 B1
6629591 Griswold et al. Oct 2003 B1
6638161 Soltys et al. Oct 2003 B2
6638170 Crumby Oct 2003 B1
6645077 Rowe Nov 2003 B2
6652378 Cannon et al. Nov 2003 B2
6656048 Olsen Dec 2003 B2
6675152 Prasad et al. Jan 2004 B1
6676522 Rowe et al. Jan 2004 B2
6682421 Rowe et al. Jan 2004 B1
6682423 Brosnan et al. Jan 2004 B2
6685567 Cockerille et al. Feb 2004 B2
6688979 Soltys et al. Feb 2004 B2
6699128 Beadell et al. Mar 2004 B1
6712695 Mothwurf et al. Mar 2004 B2
6712696 Soltys et al. Mar 2004 B2
6718361 Basani et al. Apr 2004 B1
6722985 Criss-Puszkiewicz et al. Apr 2004 B2
6729961 Millerschone May 2004 B1
6736250 Mattice May 2004 B2
6743102 Fiechter et al. Jun 2004 B1
6745330 Maillot Jun 2004 B1
6746330 Cannon Jun 2004 B2
6755741 Rafaeli Jun 2004 B1
6758751 Soltys et al. Jul 2004 B2
6800029 Rowe et al. Oct 2004 B2
6811488 Paravia et al. Nov 2004 B2
6817948 Pascal et al. Nov 2004 B2
6823419 Berg et al. Nov 2004 B2
6837789 Garahi et al. Jan 2005 B2
6848994 Knust et al. Feb 2005 B1
6866581 Martinek et al. Mar 2005 B2
6884170 Rowe Apr 2005 B2
6884173 Gauselmann Apr 2005 B2
6884174 Lundy et al. Apr 2005 B2
6886581 Harniet May 2005 B2
6896618 Benoy et al. May 2005 B2
6899627 Lam et al. May 2005 B2
6902481 Breckner et al. Jun 2005 B2
6908387 Hedrick et al. Jun 2005 B2
6925701 Eckstein et al. Aug 2005 B2
6971956 Rowe et al. Dec 2005 B2
6993587 Basani et al. Jan 2006 B1
6997803 LeMay et al. Feb 2006 B2
7013469 Smith et al. Mar 2006 B2
7025674 Adams et al. Apr 2006 B2
7027996 Levinson Apr 2006 B2
7050056 Meyringer May 2006 B2
7062470 Prasad et al. Jun 2006 B2
7086947 Walker et al. Aug 2006 B2
7099035 Brooks et al. Aug 2006 B2
7100184 Kahn Aug 2006 B1
7112138 Hedrick et al. Sep 2006 B2
7120879 Gutberlet et al. Oct 2006 B2
7168089 Nguyen et al. Jan 2007 B2
7186181 Rowe Mar 2007 B2
RE39644 Alcorn et al. May 2007 E
7234698 Grauzer et al. Jun 2007 B2
7260834 Carlson Aug 2007 B1
7278923 Grauzer et al. Oct 2007 B2
7291068 Bryant et al. Nov 2007 B2
7297062 Gatto et al. Nov 2007 B2
7300352 Rowe Nov 2007 B2
7303475 Britt et al. Dec 2007 B2
7309065 Yoseloff et al. Dec 2007 B2
7311605 Moser Dec 2007 B2
7329185 Conover et al. Feb 2008 B2
7330822 Robson et al. Feb 2008 B1
7331520 Silva et al. Feb 2008 B2
7337330 Gatto et al. Feb 2008 B2
7346682 Basani et al. Mar 2008 B2
7349920 Feinberg et al. Mar 2008 B1
7351147 Stockdale et al. Apr 2008 B2
7353183 Musso Apr 2008 B1
7356770 Jackson Apr 2008 B1
7363342 Wang et al. Apr 2008 B1
7364510 Walker et al. Apr 2008 B2
7370282 Cary May 2008 B2
7384339 LeMay et al. Jun 2008 B2
7390256 Soltys et al. Jun 2008 B2
7398327 Lee Jul 2008 B2
7419428 Rowe Sep 2008 B2
7422522 Fujimoto et al. Sep 2008 B2
7427236 Kaminkow et al. Sep 2008 B2
7434805 Grauzer et al. Oct 2008 B2
7438643 Brosnan et al. Oct 2008 B2
7455591 Nguyen Nov 2008 B2
7460863 Steelberg et al. Dec 2008 B2
7465231 Lewin et al. Dec 2008 B2
7473178 Boyd et al. Jan 2009 B2
7483394 Chang et al. Jan 2009 B2
7484207 Sato Jan 2009 B2
7515718 Nguyen et al. Apr 2009 B2
7534169 Amaitis et al. May 2009 B2
7537216 Soltys et al. May 2009 B2
7549576 Alderucci et al. Jun 2009 B2
7566274 Johnson et al. Jul 2009 B2
7575234 Soltys Aug 2009 B2
7585217 Lutnick et al. Sep 2009 B2
7594030 Teodosiu et al. Sep 2009 B2
7607976 Baerlocher et al. Oct 2009 B2
7607977 Baerlocher et al. Oct 2009 B2
7610549 Vignet Oct 2009 B2
7611407 Itkis et al. Nov 2009 B1
7611409 Muir et al. Nov 2009 B2
7618317 Jackson Nov 2009 B2
7621809 Baerlocher et al. Nov 2009 B2
7634550 Wolber et al. Dec 2009 B2
7648414 McNutt et al. Jan 2010 B2
7666081 Baerlocher et al. Feb 2010 B2
7674179 Baerlocher et al. Mar 2010 B2
7684882 Baerlocher et al. Mar 2010 B2
7688322 Kapler et al. Mar 2010 B2
7689302 Schlottmann et al. Mar 2010 B2
7699697 Darrah et al. Apr 2010 B2
7699703 Muir et al. Apr 2010 B2
7702719 Betz et al. Apr 2010 B1
7706895 Callaghan Apr 2010 B2
7712050 Gutberlet et al. May 2010 B2
7730198 Ruppert et al. Jun 2010 B2
7747741 Basani et al. Jun 2010 B2
7753790 Nguyen et al. Jul 2010 B2
7769877 McBride et al. Aug 2010 B2
7778635 Crookham et al. Aug 2010 B2
7780526 Nguyen et al. Aug 2010 B2
7780529 Rowe et al. Aug 2010 B2
7785204 Wells et al. Aug 2010 B2
7787972 Schlottmann et al. Aug 2010 B2
7805719 O'Neill Sep 2010 B2
7841946 Walker et al. Nov 2010 B2
7844944 Gutberlet et al. Nov 2010 B2
7846020 Walker et al. Dec 2010 B2
7850528 Wells Dec 2010 B2
7862425 Cavagna Jan 2011 B2
7867081 Schneider et al. Jan 2011 B2
7874920 Hornik et al. Jan 2011 B2
7874921 Baszucki et al. Jan 2011 B2
7886288 Breckner et al. Feb 2011 B2
7892093 Kniesteadt et al. Feb 2011 B2
7898679 Brack et al. Mar 2011 B2
7901294 Walker et al. Mar 2011 B2
7908486 Gatto et al. Mar 2011 B2
7909699 Parrott et al. Mar 2011 B2
7918735 Inamura Apr 2011 B2
7921026 O'Cull et al. Apr 2011 B2
7921405 Gupta et al. Apr 2011 B2
7937464 Ruppert et al. May 2011 B2
7963847 Baerlocher Jun 2011 B2
8025574 Hilbert Sep 2011 B2
8051180 Mazzaferri et al. Nov 2011 B2
8070583 Baerlocher et al. Dec 2011 B2
8073657 Moore, III et al. Dec 2011 B2
8117461 Bigelow, Jr. et al. Feb 2012 B2
8177634 Herrmann et al. May 2012 B2
8182346 Herrmann et al. May 2012 B2
8187101 Herrmann et al. May 2012 B2
8192289 Herrmann et al. Jun 2012 B2
8197344 Rathsack et al. Jun 2012 B2
8201229 Ruppert et al. Jun 2012 B2
8246466 Herrmann et al. Aug 2012 B2
8277324 Herrmann et al. Oct 2012 B2
8280777 Mengerink et al. Oct 2012 B2
8285740 Graham et al. Oct 2012 B2
8308554 Rowe et al. Nov 2012 B2
8360870 Herrmann et al. Jan 2013 B2
8366550 Herrmann et al. Feb 2013 B2
8512150 Herrmann et al. Aug 2013 B2
20010019966 Idaka Sep 2001 A1
20020004824 Cuan et al. Jan 2002 A1
20020111213 McEntee et al. Aug 2002 A1
20020113371 Snow Aug 2002 A1
20020115487 Wells Aug 2002 A1
20020116615 Nguyen et al. Aug 2002 A1
20020142825 Lark et al. Oct 2002 A1
20020142844 Kerr Oct 2002 A1
20020144115 Lemay et al. Oct 2002 A1
20020152120 Howington Oct 2002 A1
20020173354 Winans et al. Nov 2002 A1
20030004871 Rowe Jan 2003 A1
20030006554 Grebler et al. Jan 2003 A1
20030022714 Oliver Jan 2003 A1
20030028480 Rowe Feb 2003 A1
20030032474 Kaminkow Feb 2003 A1
20030042679 Snow Mar 2003 A1
20030045354 Giobbi Mar 2003 A1
20030054881 Hedrick et al. Mar 2003 A1
20030064798 Grauzer et al. Apr 2003 A1
20030075869 Breeding et al. Apr 2003 A1
20030078103 LeMay et al. Apr 2003 A1
20030090064 Hoyt et al. May 2003 A1
20030130024 Darby Jul 2003 A1
20030137968 Lareau et al. Jul 2003 A1
20030182414 O'Neill Sep 2003 A1
20030185229 Shachar et al. Oct 2003 A1
20030195037 Vuong et al. Oct 2003 A1
20030206548 Bannai et al. Nov 2003 A1
20030224858 Yoseloff et al. Dec 2003 A1
20030228912 Wells et al. Dec 2003 A1
20030232651 Huard Dec 2003 A1
20040002386 Wolfe et al. Jan 2004 A1
20040002388 Larsen et al. Jan 2004 A1
20040029635 Giobbi Feb 2004 A1
20040043815 Kaminkow Mar 2004 A1
20040043820 Schlottmann Mar 2004 A1
20040048671 Rowe Mar 2004 A1
20040064817 Shibayama et al. Apr 2004 A1
20040068654 Cockerille et al. Apr 2004 A1
20040082385 Silva et al. Apr 2004 A1
20040087375 Gelinotte May 2004 A1
20040100026 Haggard May 2004 A1
20040106452 Nguyen et al. Jun 2004 A1
20040110119 Riconda et al. Jun 2004 A1
20040127291 George et al. Jul 2004 A1
20040133485 Schoomaker et al. Jul 2004 A1
20040142744 Atkinson et al. Jul 2004 A1
20040166918 Walker et al. Aug 2004 A1
20040166940 Rothschild Aug 2004 A1
20040185936 Block et al. Sep 2004 A1
20040229682 Gelinotte Nov 2004 A1
20040229684 Blackburn et al. Nov 2004 A1
20040254010 Fine Dec 2004 A1
20040254993 Mamas Dec 2004 A1
20050026680 Gururajan Feb 2005 A1
20050043094 Nguyen et al. Feb 2005 A1
20050051965 Gururajan Mar 2005 A1
20050054408 Steil et al. Mar 2005 A1
20050054438 Rothschild et al. Mar 2005 A1
20050054445 Gatto et al. Mar 2005 A1
20050055113 Gauselmann Mar 2005 A1
20050070358 Angell et al. Mar 2005 A1
20050080898 Block Apr 2005 A1
20050098951 Groves May 2005 A1
20050101367 Soltys et al. May 2005 A1
20050116417 Soltys et al. Jun 2005 A1
20050119052 Russell et al. Jun 2005 A1
20050143166 Walker et al. Jun 2005 A1
20050153778 Nelson et al. Jul 2005 A1
20050156318 Douglas Jul 2005 A1
20050164761 Tain Jul 2005 A1
20050171808 Saenz et al. Aug 2005 A1
20050181856 Cannon et al. Aug 2005 A1
20050181864 Britt et al. Aug 2005 A1
20050192099 Nguyen et al. Sep 2005 A1
20050221882 Nguyen et al. Oct 2005 A1
20050222891 Chan et al. Oct 2005 A1
20050239542 Olsen Oct 2005 A1
20050239546 Hedrick et al. Oct 2005 A1
20050282626 Manfredi et al. Dec 2005 A1
20060004618 Brixius Jan 2006 A1
20060009282 George et al. Jan 2006 A1
20060015716 Thornton et al. Jan 2006 A1
20060019745 Benbrahim Jan 2006 A1
20060026499 Weddle Feb 2006 A1
20060035707 Nguyen et al. Feb 2006 A1
20060035713 Cockerille et al. Feb 2006 A1
20060066444 Steeves Mar 2006 A1
20060079310 Friedman et al. Apr 2006 A1
20060116208 Chen et al. Jun 2006 A1
20060121970 Khal Jun 2006 A1
20060183541 Okada et al. Aug 2006 A1
20060195847 Amano et al. Aug 2006 A1
20060196686 Gatto et al. Sep 2006 A1
20060205508 Green Sep 2006 A1
20060211481 Soltys et al. Sep 2006 A1
20060217202 Burke et al. Sep 2006 A1
20060247013 Walker et al. Nov 2006 A1
20060247057 Green et al. Nov 2006 A1
20060248161 O'Brien et al. Nov 2006 A1
20060252530 Oberberger et al. Nov 2006 A1
20060253702 Lowell et al. Nov 2006 A1
20060259604 Kotchavi et al. Nov 2006 A1
20060277487 Poulsen et al. Dec 2006 A1
20060281556 Solomon et al. Dec 2006 A1
20060287077 Grav et al. Dec 2006 A1
20060287098 Morrow et al. Dec 2006 A1
20070004500 Soltys et al. Jan 2007 A1
20070004506 Kinsley et al. Jan 2007 A1
20070006329 Morrow et al. Jan 2007 A1
20070015583 Tran Jan 2007 A1
20070026935 Wolf et al. Feb 2007 A1
20070032288 Nelson et al. Feb 2007 A1
20070033247 Martin Feb 2007 A1
20070045959 Soltys Mar 2007 A1
20070054740 Salls et al. Mar 2007 A1
20070057453 Soltys et al. Mar 2007 A1
20070057466 Soltys et al. Mar 2007 A1
20070057469 Grauzer et al. Mar 2007 A1
20070060259 Pececnik Mar 2007 A1
20070060307 Mathis et al. Mar 2007 A1
20070060320 Kelly et al. Mar 2007 A1
20070060365 Tien et al. Mar 2007 A1
20070077990 Cuddy et al. Apr 2007 A1
20070077995 Oak et al. Apr 2007 A1
20070082737 Morrow et al. Apr 2007 A1
20070093298 Brunet Apr 2007 A1
20070105628 Arbogast et al. May 2007 A1
20070111775 Yoseloff May 2007 A1
20070111791 Arbogast et al. May 2007 A1
20070111794 Hogan et al. May 2007 A1
20070117608 Roper et al. May 2007 A1
20070124483 Marples et al. May 2007 A1
20070129145 Blackburn et al. Jun 2007 A1
20070150329 Brook et al. Jun 2007 A1
20070155490 Phillips et al. Jul 2007 A1
20070167235 Naicker Jul 2007 A1
20070191102 Coliz et al. Aug 2007 A1
20070192748 Martin et al. Aug 2007 A1
20070198418 MacDonald Aug 2007 A1
20070208816 Baldwin et al. Sep 2007 A1
20070214030 Shear et al. Sep 2007 A1
20070216092 Fleckenstein Sep 2007 A1
20070218998 Arbogast et al. Sep 2007 A1
20070235521 Mateen et al. Oct 2007 A1
20070243925 LeMay et al. Oct 2007 A1
20070243927 Soltys Oct 2007 A1
20070243935 Huizinga Oct 2007 A1
20070259709 Kelly et al. Nov 2007 A1
20070259711 Thomas Nov 2007 A1
20070287534 Fleckenstein Dec 2007 A1
20070287535 Soltys Dec 2007 A1
20070298868 Soltys Dec 2007 A1
20080004108 Klinkhammer Jan 2008 A1
20080009344 Graham et al. Jan 2008 A1
20080026832 Stevens et al. Jan 2008 A1
20080026848 Byng Jan 2008 A1
20080038035 Shuldman et al. Feb 2008 A1
20080045341 Englman Feb 2008 A1
20080045342 Crowder et al. Feb 2008 A1
20080045344 Schlottmann et al. Feb 2008 A1
20080058105 Combs et al. Mar 2008 A1
20080064501 Patel Mar 2008 A1
20080065590 Castro et al. Mar 2008 A1
20080076572 Nguyen et al. Mar 2008 A1
20080085772 Iddings et al. Apr 2008 A1
20080090651 Baerlocher Apr 2008 A1
20080096659 Kreloff et al. Apr 2008 A1
20080102919 Rowe et al. May 2008 A1
20080102932 Anderson et al. May 2008 A1
20080108405 Brosnan et al. May 2008 A1
20080108433 DiMichele et al. May 2008 A1
20080113764 Soltys May 2008 A1
20080113773 Johnson et al. May 2008 A1
20080113781 Soltys et al. May 2008 A1
20080119284 Luciano, Jr. et al. May 2008 A1
20080127174 Johnson May 2008 A1
20080138773 Lathrop Jun 2008 A1
20080146337 Halonen et al. Jun 2008 A1
20080153599 Atashband et al. Jun 2008 A1
20080153600 Swarna Jun 2008 A1
20080154916 Atashband Jun 2008 A1
20080155665 Ruppert et al. Jun 2008 A1
20080162729 Ruppert Jul 2008 A1
20080165771 Gainey et al. Jul 2008 A1
20080171588 Atashband Jul 2008 A1
20080171598 Deng Jul 2008 A1
20080200255 Eisele Aug 2008 A1
20080243697 Irving et al. Oct 2008 A1
20080244565 Levidow et al. Oct 2008 A1
20080261699 Topham et al. Oct 2008 A1
20080261701 Lewin et al. Oct 2008 A1
20080287197 Ruppert et al. Nov 2008 A1
20080293494 Adiraju et al. Nov 2008 A1
20080300046 Gagner et al. Dec 2008 A1
20080311971 Dean Dec 2008 A1
20080313282 Warila et al. Dec 2008 A1
20080318655 Davies Dec 2008 A1
20080318685 Oak et al. Dec 2008 A9
20090005176 Morrow et al. Jan 2009 A1
20090005177 Kishi et al. Jan 2009 A1
20090011833 Seelig et al. Jan 2009 A1
20090029775 Ruppert et al. Jan 2009 A1
20090031008 Elliott et al. Jan 2009 A1
20090054139 Anderson Feb 2009 A1
20090063309 Stephens Mar 2009 A1
20090069076 Silvestro Mar 2009 A1
20090115133 Kelly et al. May 2009 A1
20090117994 Kelly et al. May 2009 A1
20090118001 Kelly et al. May 2009 A1
20090118005 Kelly et al. May 2009 A1
20090118006 Kelly et al. May 2009 A1
20090124329 Palmisano May 2009 A1
20090124392 Ruppert et al. May 2009 A1
20090124394 Swarna May 2009 A1
20090125603 Atashband et al. May 2009 A1
20090131144 Allen May 2009 A1
20090131163 Arbogast et al. May 2009 A1
20090132720 Ruppert et al. May 2009 A1
20090170594 Delaney et al. Jul 2009 A1
20090176556 Gagner et al. Jul 2009 A1
20090176578 Herrmann et al. Jul 2009 A1
20090176580 Herrmann et al. Jul 2009 A1
20090181776 Deng Jul 2009 A1
20090239667 Rowe et al. Sep 2009 A1
20090253483 Pacey et al. Oct 2009 A1
20090270170 Patton Oct 2009 A1
20090275394 Young et al. Nov 2009 A1
20090275400 Rehm et al. Nov 2009 A1
20090275401 Allen et al. Nov 2009 A1
20090275402 Backover et al. Nov 2009 A1
20090276341 McMahan et al. Nov 2009 A1
20090298583 Jones Dec 2009 A1
20090307069 Meyerhofer Dec 2009 A1
20100016067 White et al. Jan 2010 A1
20100016068 White et al. Jan 2010 A1
20100029385 Garvey et al. Feb 2010 A1
20100048291 Warkentin Feb 2010 A1
20100058320 Milligan et al. Mar 2010 A1
20100062838 Nguyen et al. Mar 2010 A1
20100093440 Burke Apr 2010 A1
20100093441 Rajaraman et al. Apr 2010 A1
20100124990 Crowder May 2010 A1
20100125851 Singh et al. May 2010 A1
20100130280 Arezina et al. May 2010 A1
20100131772 Atashband et al. May 2010 A1
20100151926 Ruppert et al. Jun 2010 A1
20100161798 Ruppert et al. Jun 2010 A1
20100210353 Gagner et al. Aug 2010 A1
20100234104 Ruppert et al. Sep 2010 A1
20100248842 Ruppert Sep 2010 A1
20110009184 Byng Jan 2011 A1
20110111826 Baerlocher et al. May 2011 A1
20110124417 Baynes et al. May 2011 A1
20110179409 Yoseloff et al. Jul 2011 A1
20110269534 Kelly et al. Nov 2011 A1
20120110649 Murphy May 2012 A1
20120203692 Olliphant et al. Aug 2012 A1
Foreign Referenced Citations (15)
Number Date Country
199 40 954 Mar 2001 DE
1 074 955 Feb 2001 EP
1463008 Sep 2004 EP
2 380 143 Apr 2003 GB
2 382 034 May 2003 GB
8255059 Oct 1996 JP
2001-0084838 Sep 2001 KR
2002-0061793 Jul 2002 KR
2003-0091635 Dec 2003 KR
9636253 Nov 1996 WO
0205914 Jan 2002 WO
03060846 Jul 2003 WO
2005035084 Apr 2005 WO
2006005047 Jan 2006 WO
2007033207 Mar 2007 WO
Non-Patent Literature Citations (35)
Entry
Bally Technologies, Inc., iVIEW, http://ballytech.com/systems/product.cfm?id=9, download date Nov. 6, 2007, 2 pages.
Bally TMS, “MP21—Automated Table Tracking/Features,” 2 pages, Nov. 2005.
Bally TMS, “MPBacc—Specifications/Specifications,” 2 pages, Nov. 2005.
Bally TMS, “MPLite—Table Management System/Features,” 2 pages, Nov. 2005.
Bulaysky, J., “Tracking the Tables,” Casino Journal, May 2004, pp. 44-47, accessed Dec. 21, 2005, URL=http://www.ascendgaming.com/cj/vendors—manufacturers—table/Trackin916200411141AM.htm, 5 pages.
Burke, A., “Tracking the Tables,” reprinted from International Gaming & Wagering Business, Aug. 2003, 4 pages.
Casino Software & Services, LLC., accessed Aug. 25, 2006, URL=http:/casinosoftware.com/home.html, 6 pages.
Griffin, P., The Theory of Blackjack, GBC Press, Las Vegas, Nevada, 1979, 190 pages.
Gros, R., “All You Ever Wanted to Know About Table Games,” reprinted from Global Gaming Business, Aug. 1, 2003, 2 pages.
MagTek, “Port Powered Swipe Reader,” Technical Reference Manual, Manual Part No. 99875094 Rev 12, Jun. 2003, 20 pages.
Mikohn, “Mikohn Tablelink—The Industry's Premier Table Tracking Solution Delivers Improvements Straight to the Bottom Line,” 2 pages, before Jan. 1, 2004.
Mikohn, “Tablelink™, The New Standard in Table Games,” before Jan. 1, 2004, 14 pages.
Pro, L.V., “Book Review—The Card Counter's Guide to Casino Surveillance,” Blackjack Insider Newsletter, May 2003, #40, accessed Aug. 25, 2006, URL—http:/bjinsider.com/newsletter 40 surveillance.shtml, 5 pages.
Shuffle Master, Inc., “Shuffle Master Announces New Products; Intelligent Table System to Be Debuted at G2E,” Sep. 10, 2003, 2 pages.
Shuffle Master, Inc., “Shuffle Master Gaming Presents The Ultimate Player Rating System . . . Bloodhound Sniffs Out the Pros and Cons,” Dec. 31, 1997, 6 pages.
Snyder, A., “The High-Tech Eye,” excerpt from Blackjack Forum, Spring 1997, accessed Dec. 21, 2005, from Casino Software & Services, LLC, URL=http://www.casinosoftware.com/bj—forum.html.
Terdiman, D., “Who's Holding the Aces Now?”, reprinted from Wired News, Aug. 18, 2003, 2 pages.
Ward, K., “BJ Tracking System has Players Down for the Count,” Gaming Today, Mar. 5, 2002, accessed Dec. 21, 2005, from Casino Software & Services, LLC, URL=http://www.casinosoftware.com/gaming—today.html.
Winkler, C., “Product Spotlight: MindPlay,” reprinted from Gaming and Leisure Technology, Fall 2003, 2 pages.
Singh et al., U.S. Appl. No. 12/271,337, filed Nov. 14, 2008, 35 pages.
Crowder, U.S. Appl. No. 12/271,736, filed Nov. 14, 2008, 35 pages.
Rajaraman et al., U.S. Appl. No. 12/500,298, filed Jul. 9, 2009, 50 pages.
Atashband et al., U.S. Appl. No. 12/620,402, filed Nov. 16, 2009, 46 pages.
Ruppert et al., U.S. Appl. No. 12/620,404, filed Nov. 16, 2009, 70 pages.
International Search Report, mailed Nov. 27, 2009, for PCTAN PCT/US2009/042156, 3 pages.
Written Opinion, mailed Nov. 27, 2009, for PCTAN PCT/US2009/042156, 3 pages.
Patent Examination Report No. 1, for corresponding Australian patent application No. 2009243035, dated Oct. 29, 2013, 3 pages.
Office Action, with English translation, for corresponding Chinese Patent Application No. 200980120367.4, dated Dec. 28, 2012, 15 pages.
“BOB and LDAP,” Gaming Standards Association, Fremont, California, 7 pages, Oct. 26, 2003.
“GSA Point-to-Point SOAP/HTTPS Transport and Security Specification v1.0.3,” Gaming Standards Association TRANSPORT Technical Committee, 16 pages, Jun. 5, 2007.
Gwyddion User Guide, “False Color Mapping: Chapter 3. Getting Started,” retrieved from URL=http://sourceforge.net/projects/gwyddion/files/user-guide/2007-06-28/gwyddion-user-guide-xhtm1-2007-06-28.tar.gz/download, retrieved on Nov. 21, 2012, 2 pages.
Hung et al., “Performance Evaluation of the Least Conflict Sharable Spreading Code Assignment Algorithm,” IEEE, 1996, 5 pages.
Olesiejuk, “Discovery Services for Gaming Devices on a Casino Floor,” Gaming Standards Association, 3 pages, Mar. 12, 2007.
Requirements document, “Game Authentication Terminal Program (GAT3),” to Gaming Standards Association, Aug. 2005, 27 pages.
Standards document, “Technical Standards for Gaming Devices and On-Line Slot Systems,” to Nevada Gaming Commission and State Gaming Control Board, Aug. 17, 2005, 15 pages.
Related Publications (1)
Number Date Country
20090275395 A1 Nov 2009 US