Language selection

Search

Patent 2669836 Summary

Third-party information liability

Some of the information on this Web page has been provided by external sources. The Government of Canada is not responsible for the accuracy, reliability or currency of the information supplied by external sources. Users wishing to rely upon this information should consult directly with the source of the information. Content provided by external sources is not subject to official languages, privacy and accessibility requirements.

Claims and Abstract availability

Any discrepancies in the text and image of the Claims and Abstract are due to differing posting times. Text of the Claims and Abstract are posted:

  • At the time the application is open to public inspection;
  • At the time of issue of the patent (grant).
(12) Patent: (11) CA 2669836
(54) English Title: BIOMETRIC ACCESS SENSITIVITY
(54) French Title: SYSTEME D'ACCES BIOMETRIQUE SENSIBLE
Status: Granted
Bibliographic Data
(51) International Patent Classification (IPC):
  • G07F 17/32 (2006.01)
  • G07C 11/00 (2006.01)
(72) Inventors :
  • ALDERUCCI, DEAN P. (United States of America)
  • PAPAGEORGIOU, ANTONIO (United States of America)
  • ASHER, JOSEPH M. (United States of America)
(73) Owners :
  • CFPH, LLC (United States of America)
(71) Applicants :
  • CFPH, LLC (United States of America)
(74) Agent: DICKINSON WRIGHT LLP
(74) Associate agent:
(45) Issued: 2016-07-12
(86) PCT Filing Date: 2007-11-14
(87) Open to Public Inspection: 2008-05-22
Examination requested: 2009-05-14
Availability of licence: N/A
(25) Language of filing: English

Patent Cooperation Treaty (PCT): Yes
(86) PCT Filing Number: PCT/US2007/084669
(87) International Publication Number: WO2008/061138
(85) National Entry: 2009-05-14

(30) Application Priority Data:
Application No. Country/Territory Date
11/559,829 United States of America 2006-11-14
11/559,484 United States of America 2006-11-14
11/559,933 United States of America 2006-11-15

Abstracts

English Abstract

The present application provides methods and corresponding systems for accessing services on a gaming device which, in certain embodiments, include the step or steps of receiving at least one item of identity verification data from a user of a gaming device; enabling at least one service, such as a wager-type game, on the gaming device based on a match between the at least one item of identity verification data received and at least one item of identity verification data obtained previously; displaying an interface screen comprising graphic objects associated with the wager-type game and at least one selectable element for the user to submit a gaming command and a wagering command during game play; obtaining at least one item of user change data from a user during game play; and prompting the user for identity verification data when a user change is suspected based on the at least one item of user change data.


French Abstract

La présente invention concerne des procédés et des systèmes correspondants destinés à accéder à des services sur un dispositif de jeu. Dans certains modes de réalisation, lesdits procédés comprennent une ou plusieurs étapes consistant à recevoir au moins un élément de données de vérification d'identité en provenance d'un utilisateur d'un dispositif de jeu, à activer au moins un service, tel qu'un jeu de type pari, sur le dispositif de jeu sur la base d'une correspondance entre le ou les éléments de données de vérification d'identité et au moins un élément de données de vérification d'identité précédemment obtenu, à afficher un écran d'interface comprenant des objets graphiques associés au jeu de type pari et au moins un élément sélectionnable permettant à l'utilisateur de soumettre une commande de jeu et une commande de pari pendant le jeu, à obtenir au moins un élément de données de changement d'utilisateur en provenance d'un utilisateur pendant le jeu, et à inviter l'utilisateur à fournir des données de vérification d'identité lorsqu'un changement d'utilisateur est suspecté sur la base du ou des éléments de données de changement d'utilisateur.

Claims

Note: Claims are shown in the official language in which they were submitted.



What is claimed is:

1. A method comprising:
receiving at least one item of identity verification data from a user of a
device;
enabling by at least one processor at least one service on the device based on
a match
between the at least one item of identity verification data received and at
least one item of
identity verification data obtained previously;
while the at least one service is enabled, obtaining by the at least one
processor at least
one item of data from a user of the device, the at least one item of data
comprising at least one
of: blood pressure, heart rate, pulse rate, body temperature, speech,
handwriting, keystrokes,
wager amount, menu navigation rate, and body movement of the user;
comparing by the at least one processor the at least one item of obtained data
with a set of
data;
determining by the at least one processor that there is a difference between
the at least
one item of obtained data and the set of data;
based at least in part on determining that there is a difference between the
at least one
item of obtained data and the set of data, prompting by the at least one
processor the user for
identity verification data;
in response to prompting the user for identity verification data, determining
by the at least
one processor that there is a positive user identity verification; and
in response to determining there is a positive user identity verification, the
at least one
processor at least one of (i) increasing the size of the set of data and (ii)
increasing the difference
between the data that triggers the prompting of the user for identity
verification data.
2. The method of claim 1, wherein the identity verification data comprises
physical
biometric data.
3. The method of claim 2, wherein the physical biometric data comprises at
least one of a
fingerprint scan, an iris scan, a retina scan, a vascular pattern scan, and a
facial image of the user.

39


4. The method of claim 1, further comprising prompting the user for
identity verification
data if there is a break in consecutive readings of data from a user.
5. The method of claim 1, further comprising obtaining a plurality of data
readings from a
user to form the set of data.
6. The method of claim 5, wherein set of data is obtained subsequent to
enabling the at least
one service.
7. The method of claim 1, further comprising prompting the user for
identity verification
data based on multiple determinations that there is a difference between
obtained data and the set
of data.
8. The method of claim 5, further comprising filtering by use of a filter
noise from the set of
data.
9. The method of claim 8, further comprising: in response to determining a
positive
verification of the user's identity, adjusting a variable associated with the
filter.
10. An apparatus comprising:
at least one processor; and
a non-transitory tangible computer readable storage medium storing
instructions that,
when executed by the at least one processor, cause the at least one processor
to:
receive at least one item of identity verification data from a user of a
device;
enable at least one service on the device based on a match between the at
least one
item of identity verification data received and at least one item of identity
verification
data obtained previously, the at least one service comprising a wager-type
game;
while the at least one service is enabled, obtain at least one item of data
from a
user of the device, the at least one item of data comprising at least one of:
blood pressure,
heart rate, pulse rate, body temperature, speech, handwriting, keystrokes,
wager amount,
menu navigation rate, and body movement of the user;



compare the at least one item of obtained data with a set of data;
determine that there is a difference between the at least one item of obtained
data
and the set of data;
based at least in part on determining that there is a difference between the
at least
one item of obtained data and the set of data, prompt the user for identity
verification
data;
in response to prompting the user for identity verification data, determine
that
there is a positive user identity verification; and
in response to determining that there is a positive user identity
verification, at
least one of (i) increase the size of the set of data and (ii) increase the
difference between
the data that triggers the prompting of the user for identity verification
data.
11. The apparatus of claim 10, wherein the identity verification data
comprises physical
biometric data.
12. The apparatus of claim 11, wherein the physical biometric data
comprises at least one of
a fingerprint scan, an iris scan, a retina scan, a vascular pattern scan, and
a facial image of the
user.
13. The apparatus of claim 10, wherein the instructions, when executed by
the at least one
processor, further cause the at least one processor to prompt the user for
identity verification data
if there is a break in consecutive readings of data from a user.
14. The apparatus of claim 10, wherein the instructions, when executed by
the at least one
processor, further cause the at least one processor to obtain a plurality of
data readings from a
user to form the set of data.
15. The apparatus of claim 14, wherein set of data is obtained subsequent
to enabling the at
least one service.

41


16. The apparatus of claim 10, wherein the instructions, when executed by
the at least one
processor, further cause the at least one processor to prompt the user for
identity verification data
based on multiple determinations that there is a difference between obtained
data and the set of
data.
17. The apparatus of claim 14, wherein the instructions, when executed by
the at least one
processor, further cause the at least one processor to filter by use of a
filter noise from the set of
data.
18. The apparatus of claim 17, wherein the instructions, when executed by
the at least one
processor, further cause the at least one processor to:
in response to determining a positive verification of the user's identity,
adjust a variable
associated with the filter.
19. A method, comprising:
receiving at least one item of identity verification data from a device;
enabling, by at least one processor, at least one service on the device based
at least in part
on a match between the at least one item of identity verification data
received and at least one
other item of identity verification data obtained previously, wherein the at
least one service
comprises a wager-type game;
while the at least one service is enabled, receiving data obtained by a sensor
of the
device, wherein the data comprises an indication of body movement by a user of
the device;
subsequent to receiving the data and while the at least one service is
enabled, receiving
data obtained by the sensor of the device, wherein the data comprises an
indication of a null
reading by the sensor; and
based at least in part on receiving the data that comprises the indication of
body
movement by a user of the device and the data that comprises an indication of
a null reading by
the sensor, prompting, by the at least one processor, the user of the device
to provide identity
verification data.
20. The method of claim 19, further comprising:

42


subsequent to enabling the at least one service, obtaining at least one item
of user change
data regarding a user of the device, wherein the at least one item of user
change data comprises
at least one of: playing pattern data, keystrokes, speech, blood pressure,
heart rate, body
temperature, and handwriting;
determining that the at least one item of user change data does not match with
at least one
item of user change data obtained previously; and
based on determining that the at least one item of user change data does not
match with
the at least one item of user change data obtained previously, prompting the
user of the device to
provide identity verification data.
21. The method of claim 20, wherein the method further comprises: in
response to
determining that the at least one item of user change data does not match with
the at least one
item of user change data obtained previously, determining a severity of the
mismatch between
the at least one item of user change data and the at least one item of user
change data obtained
previously; and
wherein prompting the user for identity verification data comprises prompting
the user
based on the determined severity of the mismatch between the at least one item
of user change
data and the at least one item of user change data obtained previously.
22. The method of claim 20, wherein the identity verification data is
categorized in at least a
first class and the user change data is characterized in at least a second
class, the first class being
associated with one category of severity of error and the second class being
associated with one
other category of severity of the error.
23. The method of claim 22, wherein the error classification is based on a
severity of the
error in relation to other errors.
24. The method of claim 22, wherein prompting the user to provide identity
verification data
is triggered based on registering a plurality of the second class of errors
exceeding a configured
allowable number of the second class of errors.

43


25. The method of claim 24, wherein at least one of the error class and the
threshold for the
second class of errors is user defined.
26. The method of claim 22, wherein prompting the user for identity
verification data is
based at least on one of:
determining a severity of the mismatch between the at least one item of user
change data
and the at least one item of user change data obtained previously; and
registering a plurality of the second class of errors exceeding a configured
allowable
number of the second class of errors.
27. The method of claim 20, wherein determining that the at least one item
of user change
data does not match with the at least one item of user change data obtained
previously comprises
comparing playing pattern data obtained from the user with second playing
pattern data obtained
previously.
28. The method of claim 19, further comprising:
subsequent to prompting the user for identity verification data, determining
that a user
change has occurred; and
blocking access to the at least one service on the device based on the
determination.
29. The method of claim 19, further comprising:
displaying an interface screen, wherein the interface screen comprises graphic
objects
associated with the wager-type game and at least one selectable element for
the user to submit at
least one of a gaming command and a wagering command during play of the wager-
type game.
30. An apparatus, comprising:
at least one processor; and
a non-transitory tangible computer readable storage medium storing
instructions that,
when executed by the at least one processor, cause the at least one processor
to:
receive at least one item of identity verification data from a device;

44


enable at least one service on the device based at least in part on a match
between
the at least one item of identity verification data received and at least one
other item of
identity verification data obtained previously, wherein the at least one
service comprises
a wager-type game;
while the at least one service is enabled, receive data obtained by a sensor
of the
device, wherein the data comprises an indication of body movement by a user of
the
device;
subsequent to receiving the data and while the at least one service is
enabled,
receive data obtained by the sensor of the device, wherein the data comprises
an
indication of a null reading by the sensor; and
based at least in part on receiving the data that comprises the indication of
body
movement by a user of the device and the data that comprises an indication of
a null
reading by the sensor , prompt the user of the device to provide identity
verification data.
31. The apparatus of claim 30, wherein the instructions, when executed by
the at least one
processor, further cause the at least one processor to:
subsequent to enabling the at least one service, obtain at least one item of
user change
data regarding a user of the device, wherein the at least one item of user
change data comprises
at least one of: playing pattern data, keystrokes, speech, blood pressure,
heart rate, body
temperature, and handwriting;
determine that the at least one item of user change data does not match with
at least one
item of user change data obtained previously; and
based on determining that the at least one item of user change data does not
match with
the at least one item of user change data obtained previously, prompt the user
of the device to
provide identity verification data;
wherein the identity verification data is categorized in at least a first
class and the user
change data is characterized in at least a second class, the first class being
associated with one
category of severity of error and the second class being associated with one
other category of
severity of the error; and
wherein prompting the user for identity verification data is based at least on
one of:



determining a severity of the mismatch between the at least one item of user
change data
and the at least one item of user change data obtained previously; and
registering a plurality of the second class of errors exceeding a configured
allowable
number of the second class of errors.
32. The apparatus of claim 30, wherein the computer readable storage medium
comprises
flash memory.
33. An article of manufacture, comprising:
a non-transitory tangible computer readable storage medium storing
instructions that,
when executed by at least one processor, cause the at least one processor to:
receive at least one item of identity verification data from a device;
enable at least one service on the device based at least in part on a match
between
the at least one item of identity verification data received and at least one
other item of
identity verification data obtained previously, wherein the at least one
service comprises
a wager-type game;
while the at least one service is enabled, receive data obtained by a sensor
of the
device, wherein the at data comprises an indication of body movement by a user
of the
device;
subsequent to receiving the data and while the at least one service is
enabled,
receive data obtained by the sensor of the device, wherein the data comprises
an
indication of a null reading by the sensor; and
based at least in part on receiving the data that comprises the indication of
body
movement by a user of the device and the data that comprises an indication of
a null
reading by the sensor, prompt the user of the device to provide identity
verification data.
34. The article of manufacture of claim 33, wherein the instructions, when
executed by the at
least one processor, further cause the at least one processor to:
subsequent to enabling the at least one service, obtain at least one item of
user change
data regarding a user of the device, wherein the at least one item of user
change data comprises

46


at least one of: playing pattern data, keystrokes, speech, blood pressure,
heart rate, body
temperature, and handwriting;
determine that the at least one item of user change data does not match with
at least one
item of user change data obtained previously; and
based on determining that the at least one item of user change data does not
match with the at
least one item of user change data obtained previously, prompt the user of the
device to provide
identity verification data;
wherein the identity verification data is categorized in at least a first
class and the user
change data is characterized in at least a second class, the first class being
associated with one
category of severity of error and the second class being associated with one
other category of
severity of the error; and
wherein prompting the user for identity verification data is based at least on
one of:
determining a severity of the mismatch between the at least one item of user
change data
and the at least one item of user change data obtained previously; and
registering a plurality of the second class of errors exceeding a configured
allowable
number of the second class of errors.
35. A method comprising:
receiving at least one item of identity verification data from a device;
enabling, by at least one processor, at least one service on the device based
at least in part
on a match between the at least one item of identity verification data
received and at least one
other item of identity verification data obtained previously, wherein the at
least one service
comprises a wager-type game;
while the at least one service is enabled, obtaining at least one item of user
change data
regarding a user of the device, wherein the at least one item of user change
data comprises at
least one of: blood pressure, heart rate, and body temperature;
determining that the at least one item of user change data does not match with
the at least
one item of user change data obtained previously; and
based on determining that the at least one item of user change data does not
match with
the at least one item of user change data obtained previously , prompting, by
the at least one
processor, the user of the device to provide identity verification data.

47


36. The method of claim 35, wherein prompting the user comprises prompting
the user based
on a level of confidence associated with the determination, the level of
confidence providing an
indication of whether the determination shows a change in user; and
wherein the method further comprises establishing the level of confidence,
wherein
establishing the level of confidence comprises adjusting at least one of: a
difference between the
data that triggers the prompt for identify verification data;
an amount of data in a data set used for comparison of the at least one item
of user
change data with at least one item of user change data obtained previously;
and
one or more filters to filter noise from the date set for the comparison of
the at least one
item of user change data with at least one item of user change data obtained
previously.
37. The method of claim 36, wherein the level of confidence is set by the
at least one
processor prior to the comparison between the at least one item of user change
data with at least
one item of user change data obtained previously.
38. An apparatus, comprising:
at least one processor; and
a non-transitory tangible computer readable storage medium storing
instructions that,
when executed by the at least one processor, cause the at least one processor
to:
receive at least one item of identity verification data from a device;
enable least one service on the device based at least in part on a match
between
the at least one item of identity verification data received and at least one
other item of
identity verification data obtained previously, wherein the at least one
service comprises
a wager-type game;
while the at least one service is enabled, obtain at least one item of user
change
data regarding a user of the device, wherein the at least one item of user
change data
comprises at least one of: blood pressure, heart rate, and body temperature;
determine that the at least one item of user change data does not match with
the at
least one item of user change data obtained previously; and

48


based on determining that the at least one item of user change data does not
match
with the at least one item of user change data obtained previously, prompt the
user of the
device to provide identity verification data.
39. The apparatus of claim 38, wherein prompting the user comprises
prompting the user
based on a level of confidence associated with the determination, the level of
confidence
providing an indication of whether the determination shows a change in user;
and
wherein the instructions, when executed by the at least one processor, further
cause the at
least one processor to establish the level of confidence, wherein establishing
the level of
confidence comprises adjusting at least one of: a difference between the data
that triggers the
prompt for identify verification data;
an amount of data in a data set used for the comparison of the at least one
item of user
change data with at least one item of user change data obtained previously;
and
one or more filters to filter noise from the date set for the comparison of
the at least one
item of user change data with at least one item of user change data obtained
previously.
40. An article of manufacture, comprising:
a non-transitory tangible computer readable storage medium storing
instructions that,
when executed by at least one processor, cause the at least one processor to:
receive at least one item of identity verification data from a device;
enable least one service on the device based at least in part on a match
between the at
least one item of identity verification data received and at least one other
item of identity
verification data obtained previously, wherein the at least one service
comprises a wager-type
game;
while the at least one service is enabled, obtain at least one item of user
change data
regarding a user of the device, wherein the at least one item of user change
data comprises at
least one of: blood pressure, heart rate, and body temperature;
determine that the at least one item of user change data does not match with
the at least
one item of user change data obtained previously; and

49


based on determining that the at least one item of user change data does not
match with
the at least one item of user change data obtained previously, prompt the user
of the device to
provide identity verification data.
41.
The article of manufacture of claim 40, wherein prompting the user comprises
prompting
the user based on a level of confidence associated with the determination, the
level of confidence
providing an indication of whether the determination shows a change in user;
and
wherein the instructions, when executed by the at least one processor, further
cause the at
least one processor to establish the level of confidence, wherein establishing
the level of
confidence comprises adjusting at least one of: a difference between the data
that triggers the
prompt for identify verification data;
an amount of data in a data set used for the comparison of the at least one
item of user
change data with at least one item of user change data obtained previously;
and
one or more filters to filter noise from the date set for the comparison of
the at least one
item of user change data with at least one item of user change data obtained
previously.


Description

Note: Descriptions are shown in the official language in which they were submitted.


CA 02669836 2013-05-22
,
BIOMETRIC ACCESS SENSITIVITY
FIELD OF INVENTION
Some embodiments may relate to accessing services on a device. In particular,
some
embodiments may relate to accessing gaming services on a device.
BACKGROUND OF INVENTION
Devices may be configured to provide gaming services to users. Devices may be
further
configured to provide non-gaming services to users. The Internet allows
communication
to occur among a variety of computing devices.
SUMMARY OF INVENTION
In accordance with aspects of the present invention, there is provided methods
and
apparatuses in accordance with the appended claims.
1

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
BRIEF DESCRIPTION OF THE FIGURES
[0002] FIG. 1 illustrates a gaming system according to at least one
embodiment of the systems disclosed herein;
[0003] FIG. 2 illustrates a gaming system according to at least one
embodiment of the systems disclosed herein;
[0004] FIG. 3 illustrates a gaming system according to at least one
embodiment of the systems disclosed herein; and
[0005] FIG. 4 is a flow chart of a method according to at least one
embodiment of the methods disclosed herein.
DETAILED DESCRIPTION OF THE INVENTION
The following sections I - X provide a guide to interpreting the present
application.
I. Terms
The term "product" means any machine, manufacture and / or composition
of matter, unless expressly specified otherwise.
The term "process" means any process, algorithm, method or the like,
unless expressly specified otherwise.
Each process (whether called a method, algorithm or otherwise) inherently
includes one or more steps, and therefore all references to a "step" or
"steps" of a
process have an inherent antecedent basis in the mere recitation of the term
'process' or a like term. Accordingly, any reference in a claim to a 'step' or
'steps'
of a process has sufficient antecedent basis.
The term "invention" and the like mean "the one or more inventions
disclosed in this application" , unless expressly specified otherwise.
The terms "an embodiment", "embodiment", "embodiments", "the
embodiment", "the embodiments", "one or more embodiments", "some
embodiments", "certain embodiments", "one embodiment", "another embodiment"
and the like mean "one or more (but not all) embodiments of the disclosed
invention(s)", unless expressly specified otherwise.
2

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
The term "variation" of an invention means an embodiment of the
invention, unless expressly specified otherwise.
A reference to "another embodiment" in describing an embodiment does
not imply that the referenced embodiment is mutually exclusive with another
embodiment (e.g., an embodiment described before the referenced embodiment),
unless expressly specified otherwise.
The terms "including", "comprising" and variations thereof mean
"including but not limited to", unless expressly specified otherwise.
The terms "a", "an" and "the" mean "one or more", unless expressly
specified otherwise.
The term "plurality" means "two or more", unless expressly specified
otherwise.
The term "herein" means "in the present application, including anything
which may be incorporated by reference", unless expressly specified otherwise.
The phrase "at least one of', when such phrase modifies a plurality of
things (such as an enumerated list of things) means any combination of one or
more of those things, unless expressly specified otherwise. For example, the
phrase "at least one of a widget, a car and a wheel" means either (i) a
widget, (ii) a
car, (iii) a wheel, (iv) a widget and a car, (v) a widget and a wheel, (vi) a
car and a
wheel, or (vii) a widget, a car and a wheel. The phrase "at least one of',
when such
phrase modifies a plurality of things does not mean "one of each of' the
plurality
of things.
Numerical terms such as "one", "two", etc. when used as cardinal numbers
to indicate quantity of something (e.g., one widget, two widgets), mean the
quantity indicated by that numerical term, but do not mean at least the
quantity
indicated by that numerical term. For example, the phrase "one widget" does
not
mean "at least one widget", and therefore the phrase "one widget" does not
cover,
e.g., two widgets.
The phrase "based on" does not mean "based only on", unless expressly
specified otherwise. In other words, the phrase "based on" describes both
"based
only on" and "based at least on". The phrase "based at least on" is equivalent
to
the phrase "based at least in part on".
3

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
The term "represent" and like terms are not exclusive, unless expressly
specified otherwise. For example, the term "represents" do not mean
"represents
only", unless expressly specified otherwise. In other words, the phrase "the
data
represents a credit card number" describes both "the data represents only a
credit
card number" and "the data represents a credit card number and the data also
represents something else".
The term "whereby" is used herein only to precede a clause or other set of
words that express only the intended result, objective or consequence of
something
that is previously and explicitly recited. Thus, when the term "whereby" is
used in
a claim, the clause or other words that the term "whereby" modifies do not
establish specific further limitations of the claim or otherwise restricts the
meaning
or scope of the claim.
The term "e.g." and like terms mean "for example", and thus does not limit
the term or phrase it explains. For example, in the sentence "the computer
sends
data (e.g., instructions, a data structure) over the Internet", the term
"e.g." explains
that "instructions" are an example of "data" that the computer may send over
the
Internet, and also explains that "a data structure" is an example of "data"
that the
computer may send over the Internet. However, both "instructions" and "a data
structure" are merely examples of "data", and other things besides
"instructions"
and "a data structure" can be "data".
The term "respective" and like terms mean "taken individually". Thus if
two or more things have "respective" characteristics, then each such thing has
its
own characteristic, and these characteristics can be different from each other
but
need not be. For example, the phrase "each of two machines has a respective
function" means that the first such machine has a function and the second such
machine has a function as well. The function of the first machine may or may
not
be the same as the function of the second machine.
The term "i.e." and like terms mean "that is", and thus limits the term or
phrase it explains. For example, in the sentence "the computer sends data
(i.e.,
instructions) over the Internet", the term "i.e." explains that "instructions"
are the
"data" that the computer sends over the Internet.
4

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
Any given numerical range shall include whole and fractions of numbers
within the range. For example, the range "1 to 10" shall be interpreted to
specifically include whole numbers between 1 and 10 (e.g., 1, 2, 3, 4, ... 9)
and
non-whole numbers (e.g.õ 1.1, 1.2, ... 1.9).
Where two or more terms or phrases are synonymous (e.g., because of an
explicit statement that the terms or phrases are synonymous), instances of one
such
term / phrase does not mean instances of another such term / phrase must have
a
different meaning. For example, where a statement renders the meaning of
"including" to be synonymous with "including but not limited to", the mere
usage
of the phrase "including but not limited to" does not mean that the term
"including"
means something other than "including but not limited to".
II. Determining
The term "determining" and grammatical variants thereof (e.g., to
determine a price, determining a value, determine an object which meets a
certain
criterion) is used in an extremely broad sense. The term "determining"
encompasses a wide variety of actions and therefore "determining" can include
calculating, computing, processing, deriving, investigating, looking up (e.g.,

looking up in a table, a database or another data structure), ascertaining and
the
like. Also, "determining" can include receiving (e.g., receiving information),
accessing (e.g., accessing data in a memory) and the like. Also, "determining"
can
include resolving, selecting, choosing, establishing, and the like.
The term "determining" does not imply certainty or absolute precision, and
therefore "determining" can include estimating, extrapolating, predicting,
guessing
and the like.
The term "determining" does not imply that mathematical processing must
be performed, and does not imply that numerical methods must be used, and does

not imply that an algorithm or process is used.
The term "determining" does not imply that any particular device must be
used. For example, a computer need not necessarily perform the determining.
5

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
III. Forms of Sentences
Where a limitation of a first claim would cover one of a feature as well as
more than one of a feature (e.g., a limitation such as "at least one widget"
covers
one widget as well as more than one widget), and where in a second claim that
depends on the first claim, the second claim uses a definite article "the" to
refer to
the limitation (e.g., "the widget"), this does not imply that the first claim
covers
only one of the feature, and this does not imply that the second claim covers
only
one of the feature (e.g., "the widget" can cover both one widget and more than
one
widget).
When an ordinal number (such as "first", "second", "third" and so on) is
used as an adjective before a term, that ordinal number is used (unless
expressly
specified otherwise) merely to indicate a particular feature, such as to
distinguish
that particular feature from another feature that is described by the same
term or by
a similar term. For example, a "first widget" may be so named merely to
distinguish it from, e.g., a "second widget". Thus, the mere usage of the
ordinal
numbers "first" and "second" before the term "widget" does not indicate any
other
relationship between the two widgets, and likewise does not indicate any other

characteristics of either or both widgets. For example, the mere usage of the
ordinal numbers "first" and "second" before the term "widget" (1) does not
indicate
that either widget comes before or after any other in order or location; (2)
does not
indicate that either widget occurs or acts before or after any other in time;
and (3)
does not indicate that either widget ranks above or below any other, as in
importance or quality. In addition, the mere usage of ordinal numbers does not

define a numerical limit to the features identified with the ordinal numbers.
For
example, the mere usage of the ordinal numbers "first" and "second" before the
term "widget" does not indicate that there must be no more than two widgets.
When a single device, article or other product is described herein, more
than one device / article (whether or not they cooperate) may alternatively be
used
in place of the single device / article that is described. Accordingly, the
functionality that is described as being possessed by a device may
alternatively be
possessed by more than one device / article (whether or not they cooperate).
6

CA 02669836 2013-05-22
WO 2008/061138
PCT/US2007/084669
Similarly, where more than one device, article or other product is described
herein (whether or not they cooperate), a single device / article may
alternatively
be used in place of the more than one device or article that is described. For

example, a plurality of computer-based devices may be substituted with a
single
computer-based device. Accordingly, the various functionality that is
described as
being possessed by more than one device or article may alternatively be
possessed
by a single device / article.
The functionality and / or the features of a single device that is described
may bc alternatively embodied by one or more othcr devices which arc described
but arc not explicitly dcscribcd as having such functionality / features.
Thus, othcr
embodiments need not include the described device itself, but rather can
include
the one or more othcr devices which would, in those other embodiments, have
such
functionality / features.
IV. Disclosed Examples and Terminology Are Not Limiting
Neither the Title (set forth at the beginning of the first page of the present

application) nor the Abstract (set forth at the end of the present
application) is to be
taken as limiting in any way as the scope of the disclosed invention(s).
The title of the present application and headings of sections provided in the
present application are for convenience only, and are not to be taken as
limiting the
disclosure in any way.
Numerous embodiments are described in the present application, and are
presented for illustrative purposes only. The described embodiments are not,
and
are not intended to be, limiting in any sense. The presently disclosed
invention(s)
are widely applicable to numerous embodiments, as is readily apparent from the
disclosure. One of ordinary skill in the art will recognize that the disclosed

invention(s) may be practiced with various modifications and alterations, such
as
structural, logical, software, and electrical modifications. Although
particular
features of the disclosed invention(s) may be described with reference to one
or
more particular embodiments and / or drawings, it should be understood that
such
7

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
features are not limited to usage in the one or more particular embodiments or

drawings with reference to which they are described, unless expressly
specified
otherwise.
No embodiment of method steps or product elements described in the
present application constitutes the invention claimed herein, or is essential
to the
invention claimed herein, or is coextensive with the invention claimed herein,

except where it is either expressly stated to be so in this specification or
expressly
recited in a claim.
All words in every claim have the broadest scope of meaning they would
have been given by a person of ordinary skill in the art as of the priority
date. No
term used in any claim is specially defined or limited by this application
except
where expressly so stated either in this specification or in a claim.
The preambles of the claims that follow recite purposes, benefits and
possible uses of the claimed invention only and do not limit the claimed
invention.
The present disclosure is not a literal description of all embodiments of the
invention(s). Also, the present disclosure is not a listing of features of the

invention(s) which must be present in all embodiments.
Devices that are described as in communication with each other need not be
in continuous communication with each other, unless expressly specified
otherwise. On the contrary, such devices need only transmit to each other as
necessary or desirable, and may actually refrain from exchanging data most of
the
time. For example, a machine in communication with another machine via the
Internet may not transmit data to the other machine for long period of time
(e.g.
weeks at a time). In addition, devices that are in communication with each
other
may communicate directly or indirectly through one or more intermediaries.
A description of an embodiment with several components or features does
not imply that all or even any of such components / features are required. On
the
contrary, a variety of optional components are described to illustrate the
wide
variety of possible embodiments of the present invention(s). Unless otherwise
specified explicitly, no component / feature is essential or required.
Although process steps, algorithms or the like may be described or claimed
in a particular sequential order, such processes may be configured to work in
8

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
different orders. In other words, any sequence or order of steps that may be
explicitly described or claimed does not necessarily indicate a requirement
that the
steps be performed in that order. The steps of processes described herein may
be
performed in any order possible. Further, some steps may be performed
simultaneously despite being described or implied as occurring non-
simultaneously
(e.g., because one step is described after the other step). Moreover, the
illustration
of a process by its depiction in a drawing does not imply that the illustrated
process
is exclusive of other variations and modifications thereto, does not imply
that the
illustrated process or any of its steps are necessary to the invention(s), and
does not
imply that the illustrated process is preferred.
Although a process may be described as including a plurality of steps, that
does not imply that all or any of the steps are preferred, essential or
required.
Various other embodiments within the scope of the described invention(s)
include
other processes that omit some or all of the described steps. Unless otherwise
specified explicitly, no step is essential or required.
Although a process may be described singly or without reference to other
products or methods, in an embodiment the process may interact with other
products or methods. For example, such interaction may include linking one
business model to another business model. Such interaction may be provided to
enhance the flexibility or desirability of the process.
Although a product may be described as including a plurality of
components, aspects, qualities, characteristics and / or features, that does
not
indicate that any or all of the plurality are preferred, essential or
required. Various
other embodiments within the scope of the described invention(s) include other
products that omit some or all of the described plurality.
An enumerated list of items (which may or may not be numbered) does not
imply that any or all of the items are mutually exclusive, unless expressly
specified
otherwise. Likewise, an enumerated list of items (which may or may not be
numbered) does not imply that any or all of the items are comprehensive of any
category, unless expressly specified otherwise. For example, the enumerated
list
"a computer, a laptop, a PDA" does not imply that any or all of the three
items of
9

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
that list are mutually exclusive and does not imply that any or all of the
three items
of that list are comprehensive of any category.
An enumerated list of items (which may or may not be numbered) does not
imply that any or all of the items are equivalent to each other or readily
substituted
for each other.
All embodiments are illustrative, and do not imply that the invention or any
embodiments were made or performed, as the case may be.
V. Computing
It will be readily apparent to one of ordinary skill in the art that the
various
processes described herein may be implemented by, e.g., appropriately
programmed general purpose computers, special purpose computers and
computing devices. Typically a processor (e.g., one or more microprocessors,
one
or more microcontrollers, one or more digital signal processors) will receive
instructions (e.g., from a memory or like device), and execute those
instructions,
thereby performing one or more processes defined by those instructions.
Instructions may be embodied in, e.g., a computer program.
A "processor" means one or more microprocessors, central processing units
(CPUs), computing devices, microcontrollers, digital signal processors, or
like
devices or any combination thereof.
Thus a description of a process is likewise a description of an apparatus for
performing the process. The apparatus that performs the process can include,
e.g.,
a processor and those input devices and output devices that are appropriate to

perform the process.
Further, programs that implement such methods (as well as other types of
data) may be stored and transmitted using a variety of media (e.g., computer
readable media) in a number of manners. In some embodiments, hard-wired
circuitry or custom hardware may be used in place of, or in combination with,
some or all of the software instructions that can implement the processes of
various
embodiments. Thus, various combinations of hardware and software may be used
instead of software only.

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
The term "computer-readable medium" refers to any medium, a plurality of
the same, or a combination of different media, that participate in providing
data
(e.g., instructions, data structures) which may be read by a computer, a
processor
or a like device. Such a medium may take many forms, including but not limited
to, non-volatile media, volatile media, and transmission media. Non-volatile
media include, for example, optical or magnetic disks and other persistent
memory.
Volatile media include dynamic random access memory (DRAM), which typically
constitutes the main memory. Transmission media include coaxial cables, copper

wire and fiber optics, including the wires that comprise a system bus coupled
to the
processor. Transmission media may include or convey acoustic waves, light
waves
and electromagnetic emissions, such as those generated during radio frequency
(RF) and infrared (IR) data communications. Common forms of computer-
readable media include, for example, a floppy disk, a flexible disk, hard
disk,
magnetic tape, any other magnetic medium, a CD-ROM, DVD, any other optical
medium, punch cards, paper tape, any other physical medium with patterns of
holes, a RAM, a PROM, an EPROM, a FLASH-EEPROM, any other memory chip
or cartridge, a carrier wave as described hereinafter, or any other medium
from
which a computer can read.
Various forms of computer readable media may be involved in carrying
data (e.g. sequences of instructions) to a processor. For example, data may be
(i)
delivered from RAM to a processor; (ii) carried over a wireless transmission
medium; (iii) formatted and / or transmitted according to numerous formats,
standards or protocols, such as Ethernet (or IEEE 802.3), SAP, ATP,
BluetoothTM,
and TCP/IP, TDMA, CDMA, and 3G; and / or (iv) encrypted to ensure privacy or
prevent fraud in any of a variety of ways well known in the art.
Thus a description of a process is likewise a description of a computer-
readable medium storing a program for performing the process. The computer-
readable medium can store (in any appropriate format) those program elements
which are appropriate to perform the method.
Just as the description of various steps in a process does not indicate that
all
the described steps are required, embodiments of an apparatus include a
computer /
11

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
computing device operable to perform some (but not necessarily all) of the
described process.
Likewise, just as the description of various steps in a process does not
indicate that all the described steps are required, embodiments of a computer-
readable medium storing a program or data structure include a computer-
readable
medium storing a program that, when executed, can cause a processor to perform

some (but not necessarily all) of the described process.
Where databases are described, it will be understood by one of ordinary
skill in the art that (i) alternative database structures to those described
may be
readily employed, and (ii) other memory structures besides databases may be
readily employed. Any illustrations or descriptions of any sample databases
presented herein are illustrative arrangements for stored representations of
information. Any number of other arrangements may be employed besides those
suggested by, e.g., tables illustrated in drawings or elsewhere. Similarly,
any
illustrated entries of the databases represent exemplary information only; one
of
ordinary skill in the art will understand that the number and content of the
entries
can be different from those described herein. Further, despite any depiction
of the
databases as tables, other formats (including relational databases, object-
based
models and / or distributed databases) could be used to store and manipulate
the
data types described herein. Likewise, object methods or behaviors of a
database
can be used to implement various processes, such as the described herein. In
addition, the databases may, in a known manner, be stored locally or remotely
from a device which accesses data in such a database.
Various embodiments can be configured to work in a network environment
including a computer that is in communication (e.g., via a communications
network) with one or more devices. The computer may communicate with the
devices directly or indirectly, via any wired or wireless medium (e.g. the
Internet,
LAN, WAN or Ethernet, Token Ring, a telephone line, a cable line, a radio
channel, an optical communications line, commercial on-line service providers,
bulletin board systems, a satellite communications link, a combination of any
of
the above). Each of the devices may themselves comprise computers or other
computing devices, such as those based on the Intel Pentium or CentrinoTM
12

CA 02669836 2013-05-22
WO 2008/061138
PCT/US2007/084669
processor, that are adapted to communicate with the computer. Any number and
type of devices may be in communication with the computer.
In an embodiment, a server computer or centralized authority may not be
necessary or desirable. For example, the present invention may, in an
embodiment, be practiced on one or more devices without a central authority.
In
such an embodiment, any functions described herein as performed by the server
computer or data described as stored on the server computer may instead be
performed by or stored on one or more such devices.
Whcrc a process is described, in an embodiment the process may operate
without any user intervention. In another embodiment, the process includes
some
human intervention (e.g., a step is performcd by or with the assistance of a
human).
VI. Continuing Applications
The present disclosure provides, to one of ordinary skill in the art, an
enabling description of several embodiments and / or inventions. Some of these
embodiments and / or inventions may not be claimed in the present application,
but
may nevertheless be claimed in one or more continuing applications that claim
the
benefit of priority of the present application.
Applicants intend to file additional applications to pursue patents for
subject matter that has been disclosed and enabled but not claimed in the
present
application.
VII. "Means" or "Steps"
30
13

CA 02669836 2013-05-22
WO 2008/061138
PCT/US2007/084669
With respect to a means or a step for performing a specified function, the
corresponding structure, material or acts described in the specification, and
equivalents thereof, may perform additional functions as well as the specified

function.
Computers, processors, computing devices and like products are structures
that can perform a wide variety of functions. Such products can be operable to

perform a specified function by executing one or more programs, such as a
program
stored in a memory device of that product or in a memory device which that
product accesses. Unless expressly specified otherwise, such a program need
not be
based on any particular algorithm, such as any particular algorithm that might
be
disclosed in the present application. It is well known to one of ordinary
skill in the
art that a specified function may be implemented via different algorithms, and
any
of a number of different algorithms would be a mere design choice for carrying
out
=the specified function.
Therefore, with respect to a means or a step for performing a specified
function, structure corresponding to a specified function includes any product

programmed to perform the specified function. Such structure includes
programmed products which perform the function, regardless of whether such
product is programmed with (i) a disclosed algorithm for performing the
function,
(ii) an algorithm that is similar to a disclosed algorithm, or (iii) a
different
algorithm for performing the function.
Where there is recited a means for performing a function hat is a method,
one structure for performing this method includes a computing device (e.g., a
general purpose computer) that is programmed and / or configured with
appropriate
hardware to perform that function.
Also includes a computing device (e.g., a general purpose computer) that is
programmed and / or configured with appropriate hardware to perform that
function
via other algorithms as would be understood by one of ordinary skill in the
art.
14

CA 02669836 2013-05-22
WO 2008/061138
PCT/US2007/084669
VIII. Disclaimer
Numerous references to a particular embodiment does not indicate a
disclaimer or disavowal of additional, different embodiments, and similarly
references to the description of embodiments which all include a particular
feature
does not indicate a disclaimer or disavowal of embodiments which do not
include
that particular feature. A clear disclaimer or disavowal in the present
application
shall be prefaced by the phrase "does not include" or by the phrase "cannot
perform".
X. Prosecution History
In interpreting the present application (which includes the claims), one of
ordinary skill in the art shall refer to the prosecution history of the
present
application, but not to the prosecution history of any other patent or patent
application, regardless of whether there are other patent applications that
are
20
30

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
considered related to the present application, and regardless of whether there
are
other patent applications that share a claim of priority with the present
application.
XI. Overview of Various Embodiments
[0006] Referring to FIG. 1, a gaming system 100 according to at least
one
embodiment of the systems disclosed herein includes at least one computing
device, such as a remote computer 118, e.g., a server computer, a gaming
device
113, or a combination thereof, which may reside in whole or in part within the
domain of a gaming service provider 120. The gaming provider 120 may be the
proprietor of a casino and the gaming system 100 may be physically within the
geographic boundaries of the casino. Alternatively, the computing device,
e.g.,
the remote computer 118 and/or the gaming device 113, may be the remote from
the casino. As such, the gaming system 100 may allow users to engage in gaming
services and access the other services disclosed herein from remote and/or
mobile
locations relative to the gaming service provider 120 or relative to the
casino.
[0007] The computing device generally includes at least one processor
102,
and a memory 104, such as ROM, RAM, FLASH, etc., or any computer readable
medium 106, such as a hard drive, a flash-drive, an optical or magnetic disk,
etc.
The memory 104 or computer readable medium 106 preferably includes software
stored thereon that when executed performs one or more steps of the methods
disclosed herein, including communicating data back and forth between devices,

displaying interface screens, etc. The computing device may also be associated

with or have access to one or more databases for retrieving and storing the
various
types of data discussed herein, including identity verification data, such as
an ID
and password, physical biometric data, etc., user continuity data, such as
behavioral biometric data, proficiency data, player pattern data, etc., and
user
profile data, such as the user's names, identification number, address, credit
or
debit card data, account balances, user preferences, device preferences, etc.
[0008] In one embodiment, the system 100 includes a plurality of
computing device, such as a remote computer 118 coupled to at least one gaming
16

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
device 113 over a communication network 116, which are generally configured or

otherwise capable of transmitting and/or receiving communications to and/or
from
each other. The term remote in this context merely means that the remote
computer 118 and the gaming device are separate from each other. Thus, the
devices may be remote even if the devices are located within the same room. As
such, the gaming device 113 is preferably configured or otherwise capable of
transmitting and/or receiving communications to and/or from the remote
computer
118. This may be accomplished with a communication element 124, such as a
modem, an Ethernet interface, a transmitter/receiver, etc., that enables
communication with a similarly equipped remote computer 118, wirelessly,
wired, or a combination thereof It is understood that the relative
functionality
described herein may be provided by the remote computer 118, by the gaming
device 113, or both, and is thus not limited to any one implementation
discussed
herein.
[0009] The gaming devices 113 may include, without limitation, a mobile
phone, PDA, pocket PC, personal computer, as well as any special or general
purpose gaming device, such as a slot machine, a video poker machine, video or

computer-based versions of table games, e.g., roulette, blackjack, etc. As
such,
the gaming device 113 preferably includes a processor 122, a memory 123, a
display 125, such as a CRT or an LCD monitor, for displaying information
and/or
graphics associated with the services provided by the gaming system 100, and
at
least one input device, such as a mouse, a touch-sensitive pad, a pointer, a
stylus,
a trackball, a button, e.g., alphanumeric, a scroll wheel, a touch-sensitive
monitor,
etc., or a combination thereof, for users to enter commands and/or information
relevant to the gaming system services. With the general purpose type gaming
devices 113, such as the PC or PDA, users may access the services provided by
the gaming system 100, e.g., the remote computer 118, with a browser or any
other generic application, or with special purpose software designed
specifically
for accessing and providing the services disclosed herein.
[0010] In at least one embodiment, the gaming device 113 includes or is
otherwise associated with at least one biometric sensor 120. The biometric
sensor
120 is any device that is used to determine directly from the user at least
one item
17

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
of biometric data associated with a user, such as a fingerprint reader, an
iris
scanner, a retinal scanner, a vascular pattern reader, a facial recognition
camera,
etc. The biometric sensor 120 may be embodied in hardware, software, or a
combination thereof The biometric sensor 120 may further share resources with
other components of the gaming device 113, such as the processor 122, memory
123, a camera, a microphone, a speaker, etc. A single biometric sensor 120 may

be used for reading more than one type of biometric data. For example, a
digital
camera may be used to obtain an image of the user's eye for iris scanning and
an
image of the user's face for facial recognition. In this instance, a single
image
capture of the user's face may provide the data for facial recognition as well
as
data for iris or retinal comparisons. The biometric data is generally obtained
with
the biometric sensor 120 and used at least to verify the identity of the user
as a
gateway for allowing the user to access the services provided with the gaming
device 113 and/or the remote computer 118. In this regard, biometric data may
be
compared with previously obtained/stored physical biometric data that has
preferably been authenticated as being associated with a particular authorized

user, and access to the gaming system's services may be provided based on a
positive match thereof
[0011] In addition to the physical biometrics discussed above, the
biometric sensor 120 may also obtain behavioral biometric data, such as blood
pressure, heart or pulse rate, body temperature data, speech, handwriting,
keystrokes, body movements, etc. The behavioral biometric data may be analyzed

to determine whether there has been a user change or otherwise verify that
there
has not been a break in user continuity at any time following verification of
a
user's identify following initial validation with, e.g., the physical
biometric data,
or ID and password. For example, a user's identity may be verified with a
fingerprint reader and access may be provided thereafter to the services
provided
by the gaming system 100, e.g., for a predetermined period of time or until
some
predetermined event, such as the gaming device 113 being turned off, the
device
113 being moved outside an approved gaming area, etc. The gaming system 100
may thereafter monitor behavioral biometric data with the device and prompt
the
user for physical biometric data or other identity verification data if it is
18

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
determined from the behavioral data collected following identity verification
that
there may have been a change in the users of the device. For example, the
user's
heart rate or body temperature may be monitored following initial verification
to
determine if there are any changes in the data stream, e.g., in consecutive
data
readings, that may be attributed to a change in users, such as a sudden change
in
heart rate or temperature (either lower or higher) in a relatively short
amount of
time, e.g., in 5 seconds or less, or a break in the data, e.g., a null reading
for one or
more consecutive data readings, or a combination thereof
[0012] The behavioral biometric data collected may be analyzed for
any
recognizable pattern that may indicate a user change. The data collected may
be
analyzed without reference to data collected previously, e.g. prior to the
initial or
an immediately preceding identity verification, or based on historic biometric

data, e.g., data collected prior to the initial or the immediately preceding
identity
verification, for particular individuals or for a group of individuals. For
example,
a heart rate reading either above or below an average heart rate computed
based
on historic data for an authorized user may trigger the system 100 to prompt
the
user for identity verification data, such as for a user ID and password, or
physical
biometric data. A heart rate reading following a null reading in the data
stream
that is either below or above a heart rate reading before the break in the
data
stream may also trigger the prompt for identity verification data. Similarly,
different peak heart rates in general or keyed to specific gaming events, such
as at
the time the user places a bet, wins or loses a wager, etc., may also trigger
the
prompt for identity verification data in order for the user to continue using
the
services of the system 100. The biometric data for establishing the data
stream
may be obtained repeatedly, such as continuously, cyclically, periodically,
e.g.,
every second, minute, etc.
[0013] Pattern recognition may be applied to user continuity data
other
than behavioral biometric data, including data indicative of a user's
proficiency
with the system and/or the services provided by the system. For example the
system may track the keystroke rate of a user in general or for particular
services,
e.g., games, and determine if the keystroke rate of a user following identity
verification differs from the keystroke data obtained within the betting
session
19

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
following verification or from data obtained prior to the verification. Other
proficiency data may be tracked to determine if there may have been a change
in
the user of the system 100, such as the rate at which the user navigates
through the
menus, false selections of menus or menu items, etc. Keystroke data may be
mapped or certain events, such as wins or losses, as a measure for reducing
false
positives as a result of different keystroke rates that may be attributed to
user
nervousness. In any event, a prompt for identity verification data may also be

triggered based on a determination that there may have been a change in the
user
based on the proficiency data collected.
[0014] The gaming system 100 may also verify user continuity by tracking
the playing pattern of a user and prompting the user for identity verification
data
based on gaming commands or requests that deviate or are inconsistent from the

playing pattern associated with the user. For example, if the user has a
pattern of
never having wagered more than $100 on any particular game, the system 100
may prompt the user for verification data, such as physical biometric data, if
the
user makes a wager of $500 or any appreciable amount above the highest wager,
such as 5% or greater than the highest wager. Similarly, the system 100 may
track the user's response to wins or losses and prompt the user for identity
verification data on any deviation therefrom. For example, a user may
establish a
pattern of placing a higher wager on every win and lowering the wager on a
loss.
The system 100 may, upon comparing playing pattern data obtained previously
and current playing pattern data and determining therefrom that a wager
deviates
from the pattern of wagers for the particular authorized user, prompt the user
for
identity verification data before the user is allowed to continue accessing
the
services provided by the system 100. Continuity may also be tracked with an
authentication device as discussed below.
[0015] The system 100 may track the user continuity data, e.g.,
behavioral
biometric, proficiency, playing pattern, as well as any other variable type
data
obtained from users for a sufficient amount of time to collect a data set for
the
comparisons discussed above. The amount of data in the data set for the
comparison will generally vary based on the type of data and the desired
sample
set for the comparison. For example, in determining whether there may have
been

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
a user change based on a change in consecutive data readings, such as when
there
is a break in the data stream, the amount of data necessary for the comparison

generally includes two consecutive readings: a first reading followed by a
second
reading having an appreciable value, e.g., 5% or greater, above or below the
first
reading. Similarly, when the comparison is based on historic data, the amount
of
data necessary for the comparison includes at least two non-consecutive
readings:
a first reading at a time to classify the data as historic data, e.g., prior
to the then
current physical biometric identity verification, and a second more recent
reading,
e.g., after the then current physical biometric identity verification, having
an
appreciable value above or below the first reading. It can be appreciated that
a
larger data set, in certain instances, may yield greater accuracy or less
false
prompts for additional data (false positives). For example, comparison of a
current reading with, e.g., the average of 5 prior readings, may result in
less false
positives in that the average value will tend to diminish the impact of noise
in the
data set for the comparison. Alternatively or additionally, the system 100 may
filter noise from the data set for the comparison. The system 100 may, for
example, filter improbable data, such as temperature readings less 90 degrees
F
and greater than 110 degrees F, heart rates less than 40 bpm and greater than
180
bpm, etc.
[0016] In one embodiment, the system 100 triggers the prompt for identity
verification data based at least on a configurable level of confidence
associated
with the comparison. The level of confidence may be set, e.g., by a system
administrator or by the user. The level of confidence may be set in any manner

including by adjusting variables that factor into the confidence or the
probability
of a false positive or negative, as the case may be, such as the difference
between
the data that will trigger the prompt for identity verification data, the
amount of
data in the data set used for the comparison, the filters used to filter noise
from the
data set for the comparison, etc.
[0017] In one embodiment, the system 100 tracks data indicative of a
false
positive, which may be used as a basis for adjusting variables associated with
the
data set, the data set filters, the difference between the data that triggers
the
prompt, etc., and/or algorithms used to trigger the prompt for identity
verification
21

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
data. False positive data generally includes a positive verification of the
user's
identity in response to a prompt for identity verification data following a
trigger.
The data indicative of the false positive may further include the amount of
time
between the prompt and the positive verification, or any other data which may
indicate that the positive verification of the user's identity is attributed
to a user
change back to the authorized user, including the data believed to be suspect.
[0018] The data resulting in a false positive, prompting the user for
identity
verification data, may further be input into a neural network which adjusts
the
variables associated with the data set, the data set filter, algorithms, etc.
accordingly. Similarly, data indicative of true positives may also be input
into the
neural network. The neural network may be trained using supervised,
unsupervised learning, and reinforced learning techniques, or a combination
thereof. With supervised techniques, the neural network is supplied sets of
example pairs, e.g., data reading(s) and an indication of the data reading(s)
is/are
false or true positive, and the neural network infers a mapping implied by the
data.
With unsupervised techniques, the neural network is supplied with data and the

neural network derives therefrom a mapping without the aid of the false or
true
positive indications, such as based on statistical modeling, filtering, blind
source
separation, clustering, etc. With reinforcement learning, the data is derived
generally from interactions within the system and observations made therefrom.
In addition to the data resulting in a false positive, any of the data
discussed
herein may be supplied to the neural network to adjust the size of the data
set,
vary the data set filter values, the difference between the readings that
trigger the
prompt, etc., as the case may be, to achieve a desired confidence, such as
greater
than 85% or greater accuracy. Alternatively or additionally, the data
resulting in a
false positive maybe fed into a support vector machine, which classifies the
data
using a supervised machine learning technique. Image type data may further be
preprocessed prior to being introduced into the neural network or the support
vector machine to create an abstract representation of the image that is
dimensionally smaller than the image data. Preprocessing may be performed
using statistical techniques, such linear discriminant analysis techniques.
22

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
[0019] The system 100 may detect various types of errors and may
further
categorize the types of errors in one of a plurality of categories, such as a
type I
error, a type II error, etc. The categories may be derived based on the
severity of
the error or any other characterization scheme. For example, a false identity
verification with physical biometric data may be classified as a type I error
which
has greater weight than a false identity verification with behavioral
biometric data
classified as a type II error. The manner in which the system 100 responds to
errors may be class dependent. In this respect, the system 100 may favor
certain
classes of errors and respond, e.g., aggressively or favorably, based on the
class of
the error. For example, the system may block all access with type I errors
while
providing continued access for type II errors until a configurable tolerance
has
been crossed. For instance, continued access may be provided until a certain
number of type II errors have been registered, e.g., 3 or more type II errors.
In
this respect, type II errors favor permitting rather than excluding game play
in
comparison to type I errors. The classification and the threshold maybe be
either
administrator or user configurable. Additionally, users may be limited to only

configuring the classification of certain errors and thresholds more
restrictively.
For example, users may be limited to only adding default type II errors into
type I
error class with a more aggressive response that type II errors. Similarly,
the user
configuration with regard to the threshold may be limited to only reducing the
threshold, e.g., to 2 instead of 3 type II errors, before accesses is blocked.
All user
configurations may be stored in a user profile in one or more databases
associated
with the gaming system 100. The thresholds and/or classifications may be
location specific. For example, the thresholds for certain types of errors
while in a
hotel restaurant may be relaxed to account for the user engaging in other
activity,
such as eating.
[0020] The gaming system 100 may provide users with access to various
types of services including one or more of a plurality of different types of
games,
e.g., card games; slot-machine style games; craps; other casino-style games;
table
games, such as poker, craps, roulette, blackjack, baccarat, etc.; the wheel of
fortune game; keno; sports betting; horse, dog, or auto racing; jai alai;
lottery-type
games, including video versions of scratch off lotteries. The system 100 may
23

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
provide game play based on the outcome of any type of event, such as sporting
events and athletic competitions, including football, basketball, baseball,
golf,
etc., and non-sporting events, such as on the movement in particular financial

markets, indexes, or securities, political elections, entertainment industry
awards,
box office performance of movies, weather events, etc. The games may be
provided both with and without wagering, or with simulated wagering using
points that may be traded in for prizes. The gaming system 100 may also
provide
non-gaming services, e.g., on the gaming device 113, such as audio and video
entertainment, news, messaging, telephone, IP telephony, etc.
[0021] The gaming system 100 may be implemented over any type of
communications network 116, such as a local area network (LAN), a wide area
network (WAN), the Internet, a telephone network (POTS), a wireless network,
including cellular, WiFi, and WiMax networks, or a combination of wired and/or

wireless networks. The communications network 116 may be entirely
independent of the Internet. The system 100 may alternatively limit the
information transmitted over the Internet to that with little or no security
risk, or
that which has been encrypted.
[0022] As noted above, the gaming system 100 may, in certain
embodiments, allow users to access services provided by the system from one or
more of a plurality of remote locations. The system 100 may also allow users
to
access the services of the system 100 with the device 113 while mobile or
transient. For example, the gaming system 100 may allow users to access
services
in any location within a service area 148, such as within the vicinity of a
hotel.
Service area 148 may further be broken down into a plurality of sub-areas 140,
146, such as the casino of a hotel vs. general occupancy areas, e.g., the
lobby, the
pool, the gym, etc. The service area 148, in the broadest sense, includes any
location within the communication capability of the system 100. Thus, service
area 148 for services provided over the Internet includes any location with
access
to the Internet. Similarly, service area 148 for services provided by wireless
communication includes any locations within the transmission range of the
transmitter and/or reception range of the receiver. The service area 148 may
be
limited artificially by the system provider and/or the user within certain
24

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
geographic boundaries. For example, the system provider may limit the service
area to within one or more states, cities, municipalities, hotels in a city or

municipality, areas within the hotel, such as the casino area, etc., or a
combination
thereof. Thus, the system 100 may provide services to users in a disjointed
area
140, as shown in FIG. 1, where the service provider provides services in one
state,
such as Nevada, and one or more cities in another state, such as in Atlantic
City,
NJ, or in any one or more hotels within a city. User defined location access
limits
may be stored in a user profile in a database associated with the system 100.
[0023] Accordingly, in one embodiment, the system 100 has a location
verification feature, which is discussed below in greater detail. The location
verification feature may be used to permit or block users from accessing the
services provided by the system 100 based on the particular location of, e.g.,
the
gaming device 113. For example, services may be enabled when it is determined
that the location of the gaming device 113 is within a pre-defined area 140,
such
as within the area of a hotel that provides the services disclosed herein, or
disabled when the device 113 is moved to a location outside of the area 140.
The
location verification feature may also be used to disable fewer than all of
the
services of the gaming system 100 based on the location of the device 113. For

example, the system 100 may limit wager-type gaming to areas where such
gaming is permitted by law, such as to the casino area of a hotel, whereas non-

wagering services, such as messaging, may be enabled irrespective of the
location
of the device 113. Particular services may also be enabled or disabled by the
provider and/or the user based on the location of the device. For example, the

user may be allowed to disable non-wagering services, such as messaging, when
the user is within the wagering area, such as the casino, and/or during
certain
events, such as when the user is engaged in game play. As with the
classification
and threshold limitations discussed above, the user may only be allowed to
specify more restrictive service limitations and thus may not be able to
override
certain limitations imposed by the service provider. For example, the user may
not be allowed to enable wager-type gaming in areas where that type of gaming
is
has been disabled by the service provider. The user defined service
limitations
may be stored in a user profile in a database associated with the system 100.

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
[0024] In one embodiment, the gaming system 100 provides services in
at
least two areas 140, 146 each of the areas having a different level of
surveillance
than the other. The level of surveillance may be quantified based on any
scheme
indicative of the effectiveness with regard to determining whether an
authorized
user is in fact using the gaming system 100 or that the gaming system 100 is
being
used properly. The level may be established based on the number of measures
implemented in this regard. For example, the level of surveillance for an area

using face recognition and human surveillance may be deemed greater than an
area with only fingerprint scanning. Alternatively or additionally, certain
measures may be given greater weight, e.g., based on the reliability of the
measure. For example, a fingerprint scan may have a greater reliability or
accuracy in verifying the identity of a user than an iris scan. The weight of
a
particular measure may be independent of its reliability and may simply be
based
on a subjective confidence in the measure, e.g. of the user or the service
provider,
relative to other measures. The surveillance level may have nominal
designations
indicative of overall effectiveness and/or confidence. For example, the level
of an
area may be classified as being A, B, C, ... , Z; low, medium, high, or as a
Type I,
II, III, ... The surveillance level may also be distinguished using finer
nominal
designations, such as 0 % to 100 % in increments of 1, 0.1, 0.01, ...
[0025] In one embodiment, the system 100 provides access based on the
surveillance level of the area the gaming system 100 is being accessed from,
e.g.,
the location of the gaming device 113. That is, surveillance based access may
allow access to one or more services if there is a sufficient level of
surveillance,
defined by either the system provider and/or the user. In this respect,
surveillance
based access may be implemented in any one of a number of ways. The system
may, for instance, provide wager-type gaming services only if the level of
security
associated with the access area satisfies a minimum level. For example, a user

may limit wager-type gaming with system 100 to areas having no less that a
type I
surveillance level, such as a casino. Thus, wager-type gaming will be disabled
in
type II surveillance level or less areas, such as hotel common areas, e.g.,
the pool,
the hotel lobby, and non-common areas, such as hotel rooms.
26

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
[0026] In one embodiment, the system 100 supplements the surveillance
of
the area with surveillance measures available with the system 100 to achieve
the
desired surveillance level. Further to the previous example, the system 100
may
increase the surveillance level of type II areas to type I for wager-type
gaming by
prompting the user for identity verification data and/or collect user
continuity data
thereby adding to the surveillance level of type II areas sufficient to
classify the
area with the combined area and device surveillance measures as a type I or
better. Thus, the system 100 may allow the user to access services in higher
surveillance areas, such as casinos, without biometric data while requiring
biometric data with the device in areas with lesser surveillance, such as the
hotel
courtyard. Surveillance based access limitations may be stored in a user
profile in
a database associated with the system 100.
[0027] As can be appreciated from the present disclosure, the system
100
may maintain a plurality of different types of data, such as physical
biometric
data, behavioral biometric data, proficiency data, playing pattern data, etc.,
for
identity verification purposes for each authorized user. The system 100
preferably
verifies the identity of a user before allowing the user to access at least
one of the
services provided therewith. In this respect, the system may require that the
user
submit at least one item of identity verification data, such as an ID and
password
combination, or any one of the physical biometric data items discussed herein,
etc.
The system may further require from the user at least one additional item of
identity verification data for system access. In this respect, the system
maintains
at least one item of redundant verification data. The requirement for
additional
verification data may be implemented in certain but not all instances. For
example, additional verification data may be required in certain areas of a
hotel,
such as those with lesser surveillance or reliability as discussed above. In
these
areas, the system 100 may prompt the user for a first and a second item of
verification data, such as at least two of: a facial image, an iris scan, a
retinal scan,
a fingerprint scan, a vascular pattern scan, etc., before allowing the user to
access
the system services. The surveillance level or reliability associated with
each of
the measures may be added to achieve a desired surveillance level or
reliability as
indicated above.
27

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
[0028] The user may generally customize any of the aspects of the
services
provided by the system 100 or any other customizable aspect of the system 100,

including classification and threshold configurations, and service, location,
and
surveillance based access limits. In certain instances, customization
generally
allows users to vary the level of security, e.g., above a minimum set by a
service
provider, to a level based on the user's comfort level and/or the location
where
services are being accessed. For example, if the user only intends to access
the
system 100, e.g., the gaming device 113, at a particular casino, the user may
configure the system 100 to require biometric data at any time the gaming
device
is used at a off the premises of the particular casino, e.g., at another
casino. This
feature may be used to prevent a situation where a thief steals the gaming
device
113 and attempts to access services at another casino. The services may be
customized for each device 113 individually or for groups of devices.
[0029] The system 100 may further be configured to encrypt data, such
as
the physical biometric data, before it is communicated from the gaming device
113 to the remote computer 118 over network 116 for authentication. In one
embodiment, this is accomplished with a one-way encryption algorithm that
encrypts, e.g., the identity verification data, to produce a string of
alphanumeric
characters having a length, such as 100 or greater, from, in certain
instances,
image data. The string may then be communicated to the remote computer 118
for verification, which is compared with data in the user's profile. The
remote
computer 118 preferably does not store any identity verification data in the
raw
form, i.e., unencrypted. Rather, the remote computer stores the post
encryption
string of characters for the validation. Thus, a match between the string of
characters communicated from the device for identity verification and the
stored
string, within a configurable tolerance, will result in enabling the user to
access
one or more of the services provided by the system 100. The gaming device 113
may also be configured so that the raw and/or the encrypted identity
verification
data is not stored permanently and/or to purged periodically, following
validation,
when the data is transmitted successfully to the remote computer 113, or at
any
other time the data is no longer needed for the immediate validation.
Therefore,
28

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
in this instance, the gaming device 113 will be required to obtain and/or
encrypt
identity verification data anew each time there is a prompt for such data.
[0030] The system 100 may also disable access thereto with a hard
check
mechanism. That is, device 113 may include a reader 150 that obtains
information from a corresponding authentication device 155. The authentication
device 155 may be any item for storing information thereon, such as a card
which
bears a magnetic strip, such as a credit card, a key that includes an RFID
transponder, a limited-distance signal emitter or other transponder, a smart
card, a
bracelet or wristband which includes a signal transmitter, such as an RFID
signal
transmitter, or which includes a magnetically encoded signal, a substrate that
bears a bar code or other optically readable identifier, or any combination
thereof
The reader 150 may be a magnetic strip reader, an RF or infrared receiver, an
optical scanner, etc.
[0031] The gaming device 113 may therefore be capable of detecting a
signal from the authentication device 155 and the system 100 may enable system
access based on the signal from the authentication device 155. Continued
access
may also be conditioned on the gaming device 113 receiving continuing to
detect
the signal from the authentication device 155. The signal produced by
authentication device 155 may additionally or alternatively include
information
stored on the device 155, such as identity verification data, or any other
data that
may be used as a key for system access. In one embodiment, the authentication
device 155 includes a token that is derived from the authorized user's
biometric
data, such as the string of alphanumeric characters derived from the user's
biometrics. The system 100 may then provide access based on a comparison of
the string of characters derived from the biometric sensor reading and the
string
stored on the authentication device. Alternatively or additionally, the data
stored
on the authentication device 155 may be used to authenticate the user without
other identity verification data. That is, the authentication device data may
be
given greater weight and may thus be used as the primary data for identity
verification.
29

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
[0032] It is understood that all or some of the data discussed herein
may be
stored on the authentication device 155 and used as a basis for the comparison

with data obtained for identity verification. For example, the device 155 may
include physical biometric data, such as fingerprint data, that is compared
with
fingerprint data received for immediate identity verification. The data used
for
the comparison may also be limited to being stored to areas only within the
user's
control, such as areas other than the authentication device 155 and/or the
gaming
device 113. Validation may therefore be accomplished locally between the
gaming device 113 and the authentication device 155; without the transfer of
identity verification data to the remote computer 118 for this purpose.
Alternatively or additionally, the validation may be accomplished between the
remote computer 118 and the authentication device 155.
[0033] The functionality disclosed herein may be provided with
software
that resides on both the gaming communication device 113 and the remote
computer 118. Software resident on gaming communication device 113 is
preferably operable to present information corresponding to the system
services,
including wagering and non-wagering type gaming to the user. The information
includes, without limitation, graphical and/or textual representations of
objects
associated with the services, e.g., in one or more interface screens, windows,
and/or message boxes, with the presentation of selectable options related to
the
services, such as menus, icons, buttons, selectable areas, hyperlinks, etc.
The
gaming device software is also preferably operable to receive data from the
remote computer 118 and data input by the user. Software resident on the
remote
computer 118 is preferably able to exchange data with the gaming device 118,
access additional computers, and data storage devices, and perform all of the
functions described herein, including providing the backend functionality for
the
services discussed herein as well those common to gaming systems.
[0034] The data discussed herein as being transmitted or used by the
various devices of the gaming system 100 may be in any format, which is
necessary or desirable for the services provided for the user. The information
may
be transmitted in whole or in fractional portions thereof, in any format
including
digital or analog, text or voice, and according to any transport technology,
which

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
may include wired or wireless technologies. Wireless technologies may include
licensed or license-exempt technologies. Some specific technologies which may
be used include, without limitation, Code Division Multiple Access (CDMA),
Global System for Mobile Communication (GSM), General Packet Radio Service
(GPRS), WiFi (802.11x), WiMax (802.16x), Public Switched Telephone Network
(PSTN), Digital Subscriber Line (DSL), Integrated Services Digital Network
(ISDN), or cable modem technologies. These are examples only and one of
ordinary skill will understand that other types of communication techniques
are
within the scope of the present invention. Further, it will be understood that
additional components may be used in the communication of information between
the users and the gaming server. Such additional components may include,
without limitation, physical communication lines, trunks, antennas, switches,
cables, transmitters, receivers, computers, routers, servers, fiber optical
transmission equipment, repeaters, amplifiers, etc.
[0035] In at least one embodiment, some or all of the data communication
may take place through the Internet or without involvement of the Internet. In

certain embodiments, a portion of the information may be transmitted over the
Internet while another portion of the information is communicated over a more
secure network. For instance, graphic files depicting a roulette table, such
as files
in .gif or jpg formats, may be communicated over the Internet while gaming
information, such as the results from roulette wheel spin, may be communicated

in a parallel network and assembled at the gaming device 113 for display
together
in a single interface screen. In addition to security considerations, the
choice of
which of the plurality of networks handle the split data may be based on the
bandwidth of the network. Thus, larger graphics files may be transmitted to
device 113 over a WiMax network while smaller data files are transmitted over
a
cellular network.
[0036] Referring to FIG. 2, the communication network 116 may be a
cellular network 222. Cellular network 222 comprises a plurality of base
stations
223, each of which has a corresponding coverage area 225. Base stations may
have coverage areas that overlap. Further, the coverage areas may be
sectorized
or non-sectorized. In the cellular network, the gaming device 113 is generally
a
31

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
mobile station 224, such as a cell phone, that may be transient within the
network.
The mobile stations 224 communicate with the base stations 223 wirelessly via
radio signals. The base stations 223 generally communicate with, e.g., the
remote
computer 118, over landlines, such as POTS, T1-T3, ISDN, etc. Each base
station
is preferably programmed to send and receive voice and/or data transmissions
to
and from mobile station. The gaming device 113 may be coupled to the remote
computer 118 with a private label cellular carrier. The mobile stations 224
are
preferably preprogrammed with the carrier's authentication software to
establish a
connection to the cellular network.
[0037] In one embodiment, the location verification feature for determining
the location of the gaming device 113 does so in relation to the location of
at least
one of the base stations of the cellular network. That is, the system 100
determines the location of the gaming device 113 based on the location of one
or
more base stations and the distance and/or the direction (azimuth) of the
device
113 from at least one base station. The distance may be determined based on
the
strength of the transmit signal received from gaming device 113. That is, the
gaming system device's transmitter communicates at a fixed transmit power
output. The attenuation of the transmit signal is generally a function of the
distance between the transmitter and the receiver. Thus, the power of the
signal
received from the device 113 may be measured at the base station and the
distance
determined there from, e.g., calculated, or looked up in a database or table
that
maps distance to signal strength. The direction may be determined based on the

azimuth of the antenna receiving the signal from the device 113. Alternatively
or
additionally, the direction may be determined based on the distance of the
device
113 from a plurality of the base stations 223, such as two or three, using
techniques, such as triangulation, multilateration, etc., as shown in FIG. 3.
Determining the location of the gaming device 113 based on the power level of
the signal received form the gaming device is not limited to cellular network.

Rather, the process is generally applicable to all types of wireless networks,
including satellite, WiFi, GPS, LORAN, RFID, etc., where the location of the
base stations are known and the location of the device 113 may be derived
based
on the distance from the base station.
32

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
[0038] Referring to FIG. 3, in one embodiment, the location
verification
feature is implemented using geo-fencing. That is, the location based access
features disclosed herein are enforced based on the communication range of
base
stations in the wireless communication network. For example, the gaming system
100 may communicate with a plurality of gaming devices 354, 355, and 356.
Device 354 is shown located outside the gaming jurisdiction or area 358.
Devices
355 and 356 are both located inside gaming area 58. However, only device 356
is
located within sub-area or geo-fence 357, which is defined by the perimeter of
the
coverage areas of the plurality of base stations 353. Thus, geo-fencing may be
used to enable access for device 356 but disable services for devices 354 and
355.
Even though some gaming devices may be within the area 358, such as device
355, those devices may not be allowed to access the gaming system 100 based on

its location in relation to geo-fence 357. The base stations may be cellular
base
stations as discussed above or base stations having a relatively short range,
such
as WiFi or RFID transmitters/receivers, located within the premises of a
hotel.
The short-range base stations may, for example, be set up within the service
area
in a grid pattern, e.g., in the ceiling of a facility, with sufficient
separation to
determine the location of the device.
[0039] Location verification may be implemented with multiple
overlapping as well as non-overlapping geo-fences. For example, geo-fence 361
may be defined by the range of fewer than all of the base stations in the
network,
such as base station 360, which includes all of the base stations in a casino.
Geo-
fence 360 may be a subset of the area of geo-fence 357 or excluded from area
357, which may include all of the base stations in a hotel. In either event,
location
based access features, such as classifications, thresholds, services,
surveillance,
etc., may be geo-fence specific. Geo-fencing may further be combined with
triangulation and/or other location verification techniques to determine the
specific location of the device within the geo-fence. For example, the
location of
device 356 may be determined based on triangulation between three of the base
stations 353.
[0040] Alternatively or additionally, the device 113 may include a
global
positioning satellite (GPS) chip that determines the location of the device
based
33

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
on signals received from GPS satellites. The GPS chip may stand alone, in
which
instance the GPS chip sends the GPS location data to other components of the
device, such as the processor 122 and/or communication element 124, or part of
a
single computer chip that combines the function of the GPS chip with the other
element.
[0041] The location verification feature may generally be
implemented
with an element, i.e., a location verification element, which is a component
of the
gaming device 113, the remote computer 118, any intermediary component there
between, such as the base station or stations, or a combination thereof The
location verification element may be implemented in hardware, software, or a
combination thereof, and generally determines the location of the gaming
device
113.
[0042] In connection with any of the location determination methods,
the
gaming system 100 may periodically update the location determination
information. This may be done, for example, during a gaming session, at pre-
defined time intervals to ensure that movement of the gaming device 113 to an
unauthorized area is detected during play, and not just upon login or initial
access.
[0043] Referring to FIG. 4, a method according to at least one
embodiment
of the methods disclosed herein begins at 402 with initiating the gaming
device
113. Initiation is dependent on the type of the gaming device 113. For
example,
initiation may simply be turning the device 113 or running an application,
such as
a browser application or special purpose software. In one embodiment,
initiation
includes communicating an initiation message from the device 113 to the system

100, e.g., the remote computer 118. The initiation message is generally
interpreted by the system 100 as a first request for access. The initiation
message
may include information therein identifying the device and/or the user, such
as a
unique device identification number, e.g., for an initial access
determination. The
unique device identification number may be serial number, a cell-phone number,

an IP address, etc.
[0044] In one embodiment, the system 100 displays at 404 a first interface
screen in response to initiation, such as in response to the initiation
message. The
34

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
first interface screen may be stored locally on the device 113 or communicate
over the network 116 to the device 113 for display. The nature of the first
interface screen will vary depending on the circumstances. For instance, if
the
device 113 cannot establish liffl( to the remote computer 113, the first
interface
screen may contain a message indicating as such. Alternatively, upon
successfully establishing the necessary connection, the first interface screen
may
include at least one form element therein, such as a text box, for the user to
enter
an ID, a password, or a combination thereof to log into the system 100. The ID

and/or password may generally be used as a first level of identity
verification and
for providing users with user specific customized services. Alternatively or
additionally, the customized services may be device specific in which instance
the
device identification number may be used distinguish the particular device 113

from all other devices in the system.
[0045] If at 408 it is determined that the user is new and/or the
device has
not been activated, the user and the device may at 140 be registered and
activated
for service, respectively. In one embodiment, the user is registered by
receiving at
412 identity verification data, such as a user ID and password, name(s),
identification number, address, credit card number(s), physical biometric
data,
e.g., a fingerprint scan, an iris scan, a retinal scan, a vascular pattern
scan, a facial
image, etc. The identity verification data may be authenticated with a third
party
provider, such as the relevant department of motor vehicles, a credit rating
agency, etc. User preference information may also be received at 414, such as
preference information relating to error classifications and thresholds,
location
access limits, service limits, surveillance limits, etc. The identity
verification data
may be encrypted and stored at 416 either with the remote computer 118 or the
authentication device 155, as discussed above, and the device 113 may at 417
be
activated for service. Once all the requisite and/or desired information is
obtained, an appropriate service-type interface screen is displayed at 430.
[0046] If at 408 it is determined that the user and/or the device 113
are not
new and activated, respectively, the system 100, in one embodiment, determines
at 406 the location of the device 113. The location of the device 113 may be
determined in a variety of ways, as discussed above. In one embodiment, the

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
location of the device 113 is determined based on the location of at least one
base
station with which the device 113 is in communication with wirelessly. The
base
station may be a base station in a cellular network, a local WiFi router, an
RFID
transponder, etc. The location of the device 113 may simply be an
acknowledgement that the device 113 is communicating with at least one base
station having a known location. Thus, it can be determined therefrom that the

device is within an area defined by the communication range of the at least
one
base station. Additionally or alternatively, the location of the device 113
may be
determined based further on the distance and direction of the device 113 from
one
or more base stations, e.g., based on the received signal power from the
device
transmitter. The determination of the device location may also be accomplished

with GPS technology. In either instance, the location of the device 113 may be

communicated and/or received by the system 10 for use in providing services as

discussed herein. The location may be specified in terms of the coordinates,
e.g.,
latitude and longitude, the base station communicating with the device, the
class
of base station the device is communicating with, e.g., base stations in the
casino
vs. those in the hotel, base stations in a wagering vs. non-wagering geo-fence

areas, etc.
[0047] In one embodiment, the system 100 determines at 418 the
surveillance level associated with the location of the device 113. This may be
accomplished, for instance by looking up the surveillance level in a table
that
includes surveillance level data mapped to the locations within the service
area of
the system 100. Alternatively or additionally, the surveillance level may be
computed in real-time based on surveillance measures in place at that time.
[0048] In one embodiment, the system 100 prompts the user for identity
verification data, e.g. physical biometric data, based on the location and/or
the
surveillance level associated with the location of the device 113. In this
instance,
the system 100 implements a verification scheme based thereon. That is, the
particular type and quantity of identity verification data required to access
the
services of the system 100 is based on the location and/or surveillance level
associated with the location. For example, in a casino area the system 100 may

not require any physical biometric verification for access whereas non-casino
36

CA 02669836 2009-05-14
WO 2008/061138
PCT/US2007/084669
areas may require physical biometric verification with at least one item of
physical biometric data. Similarly, certain common areas outside of the
casino,
identity verification may require further a second, redundant item of physical

biometric data. In the context of the surveillance levels, areas with a type I
surveillance may not require physical biometric verification whereas areas
with
type II surveillance may require at least one item of physical biometric data
and
areas with type III surveillance may further require at least one redundant
item of
physical biometric data. As noted above, the system 100 may implement a
verification scheme to achieve a target surveillance level. That is, the
system 100
__ may determine the surveillance level of the device location and require
identity
verification to the extent necessary to meet or exceed the target level. For
example, at least one item of redundant verification data may be required to
raise
type II areas to a target type I. Similarly, at least two items of redundant
verification data may be required to raise type III areas to target type I.
[0049] Identity verification data may then be compared at 422 with the data
stored previously, such as with the remote computer 118 and/or the
authentication
device 155. If identity verification fails at 424, the system 100 may prompt
the
user for reentry or additional data. If verification passes, the system 100
may at
426 determine if there are any location based service limits and at 428
determine
__ any applicable user preferences related thereto. That is, the system 100
may
determine which of the plurality of available services the user will be
provided
access to based on the location of the device and/or the surveillance level
associated with the location. For example, the system 100 may provide access
to
all services, such as wagering, entertainment, news, messaging, telephone, IP
__ telephony etc., in the casino, when the device 113 is located within the
casino.
Similarly, access to all services other than wagering may be provided in all
areas.
In this respect, the system 100 blocks access to wagering services in certain
areas,
such as areas outside of the casino.
[0050] Following identity verification, a service appropriate
interface
__ screen may be displayed for the user at the device 113. That is, the
interface
screen displayed for the user includes therein selectable options for
accessing the
enabled services. Non-enabled services will preferably be blacked out. For
37

CA 02669836 2013-05-22
WO 2008/061138
PCT/US2007/084669
example, the interface screen may include menu items, icons, hyperlinks,
selectable text and graphics, etc., for each of the enabled services that when

selected causes a related interface screen to be displayed. As noted above,
the
system 100 may provide users with access to, e.g., video versions of table
games,
such as poker. In this instance, a related interface screen may include
graphics for
video poker, including playing card graphics, betting selections, etc. The
interface screens preferably include selectable elements for navigating
through the
service environment, e.g., for access to other services, and/or selectable
elements
for submitting gaming and wagering commands, such as hit, stay, hold, draw,
bet,
bet up, bct down, double down, etc.
[0051] In one embodiment, the system 100 obtains data for determining
whether or not there has been a user change following the prior identity
verification. As discussed above, a user change may be determined based on
various types of data, such as behavioral biometric data, e.g., blood
pressure, heart
or pulse rate, body temperature data, speech, handwriting, keystrokes, body
movements, etc., proficiency data, such as keystroke rate, menu item or icon
selection rate, player pattern data, e.g., the magnitude and rate of gaming
commands, wagering commands, etc. If it is determined at 434 that there may
have been a user change since the previous identity verification, the system
100
may prompt the user for identity verification data at 436 or respond based on
error
classification and thresholds, and repeat identity verification. The system
100
preferably determines if there is a change in the location of the device 113
at 438
and adjusts/enables the services accordingly.
[0052] While the foregoing invention has been described in some detail
for
purposes of clarity and understanding, it will be appreciated by one skilled
in the
art, from a reading of the disclosure, that various changes in form and detail
can
be made. Accordingly, such changes are intended to be included in the
invention,
the scope of which is defined by the claims.
38

Representative Drawing

Sorry, the representative drawing for patent document number 2669836 was not found.

Administrative Status

For a clearer understanding of the status of the application/patent presented on this page, the site Disclaimer , as well as the definitions for Patent , Administrative Status , Maintenance Fee  and Payment History  should be consulted.

Administrative Status

Title Date
Forecasted Issue Date 2016-07-12
(86) PCT Filing Date 2007-11-14
(87) PCT Publication Date 2008-05-22
(85) National Entry 2009-05-14
Examination Requested 2009-05-14
(45) Issued 2016-07-12

Abandonment History

Abandonment Date Reason Reinstatement Date
2012-05-22 R30(2) - Failure to Respond 2013-05-22

Maintenance Fee

Last Payment of $473.65 was received on 2023-11-10


 Upcoming maintenance fee amounts

Description Date Amount
Next Payment if standard fee 2024-11-14 $624.00
Next Payment if small entity fee 2024-11-14 $253.00

Note : If the full payment has not been received on or before the date indicated, a further fee may be required which may be one of the following

  • the reinstatement fee;
  • the late payment fee; or
  • additional fee to reverse deemed expiry.

Patent fees are adjusted on the 1st of January every year. The amounts above are the current amounts if received by December 31 of the current year.
Please refer to the CIPO Patent Fees web page to see all current fee amounts.

Payment History

Fee Type Anniversary Year Due Date Amount Paid Paid Date
Request for Examination $800.00 2009-05-14
Registration of a document - section 124 $100.00 2009-05-14
Registration of a document - section 124 $100.00 2009-05-14
Registration of a document - section 124 $100.00 2009-05-14
Application Fee $400.00 2009-05-14
Maintenance Fee - Application - New Act 2 2009-11-16 $100.00 2009-05-14
Maintenance Fee - Application - New Act 3 2010-11-15 $100.00 2010-10-20
Maintenance Fee - Application - New Act 4 2011-11-14 $100.00 2011-10-19
Maintenance Fee - Application - New Act 5 2012-11-14 $200.00 2012-10-18
Reinstatement - failure to respond to examiners report $200.00 2013-05-22
Maintenance Fee - Application - New Act 6 2013-11-14 $200.00 2013-10-21
Maintenance Fee - Application - New Act 7 2014-11-14 $200.00 2014-10-30
Maintenance Fee - Application - New Act 8 2015-11-16 $200.00 2015-10-19
Final Fee $300.00 2016-04-29
Maintenance Fee - Patent - New Act 9 2016-11-14 $200.00 2016-11-07
Maintenance Fee - Patent - New Act 10 2017-11-14 $250.00 2017-11-13
Maintenance Fee - Patent - New Act 11 2018-11-14 $250.00 2018-11-12
Maintenance Fee - Patent - New Act 12 2019-11-14 $250.00 2019-11-08
Maintenance Fee - Patent - New Act 13 2020-11-16 $250.00 2020-11-06
Maintenance Fee - Patent - New Act 14 2021-11-15 $255.00 2021-11-05
Maintenance Fee - Patent - New Act 15 2022-11-14 $458.08 2022-11-04
Maintenance Fee - Patent - New Act 16 2023-11-14 $473.65 2023-11-10
Owners on Record

Note: Records showing the ownership history in alphabetical order.

Current Owners on Record
CFPH, LLC
Past Owners on Record
ALDERUCCI, DEAN P.
ASHER, JOSEPH M.
PAPAGEORGIOU, ANTONIO
Past Owners that do not appear in the "Owners on Record" listing will appear in other documentation within the application.
Documents

To view selected files, please enter reCAPTCHA code :



To view images, click a link in the Document Description column. To download the documents, select one or more checkboxes in the first column and then click the "Download Selected in PDF format (Zip Archive)" or the "Download Selected as Single PDF" button.

List of published and non-published patent-specific documents on the CPD .

If you have any difficulty accessing content, you can call the Client Service Centre at 1-866-997-1936 or send them an e-mail at CIPO Client Service Centre.


Document
Description 
Date
(yyyy-mm-dd) 
Number of pages   Size of Image (KB) 
Abstract 2009-05-14 1 63
Claims 2009-05-14 16 560
Drawings 2009-05-14 3 81
Description 2009-05-14 38 2,024
Claims 2009-05-15 5 200
Cover Page 2009-08-25 1 39
Description 2013-05-22 38 1,939
Claims 2013-05-22 21 821
Claims 2014-08-25 8 273
Claims 2015-09-11 12 522
Cover Page 2016-05-12 1 39
PCT 2009-05-14 1 59
Assignment 2009-05-14 18 842
Prosecution-Amendment 2009-05-14 7 270
Correspondence 2009-08-20 1 27
Prosecution-Amendment 2011-11-22 6 230
Prosecution-Amendment 2013-05-22 33 1,453
Prosecution-Amendment 2014-02-24 2 64
Prosecution-Amendment 2014-08-25 13 434
Correspondence 2014-08-25 5 161
Correspondence 2014-10-01 1 22
Correspondence 2014-10-01 1 25
Fees 2014-10-30 1 33
Prosecution-Amendment 2015-03-13 4 267
Correspondence 2015-05-25 5 249
Amendment 2015-09-11 14 617
Final Fee 2016-04-29 1 45