Game access device with privileges

ABSTRACT

Systems and methods for verifying the eligibility of players attempting to participate in gaming events are disclosed. Communication objects having RFID tags and closed electrical circuits are individually assigned to and worn by players within a gaming player verification system. These RFID tags may communicate with associated player tracking units attached to gaming machines and other devices via radio frequency waves, and each communication object may alter its communication pattern in response to any break of its closed electrical circuit. In some embodiments, a communications object may emit a signal that conveys a privilege of the player wearing the communications object. Bracelets, wristwatches or collars can be used as communication objects, such that the removal of such an object from a player cannot be accomplished without breaking the closed electrical circuit contained therein, thereby disabling or de-authenticating the device.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.14/076,433 filed Nov. 11, 2013, which is a continuation of U.S. patentapplication Ser. No. 11/683,508 filed Mar. 8, 2007 (now U.S. Pat. No.8,581,721), the disclosures of which are hereby incorporated byreference herein in their entireties.

TECHNICAL FIELD

The present invention relates generally to providing authentication in agaming environment, and more specifically to systems and methods forverifying the eligibility of a player at a remote gaming location.

BACKGROUND

Radio Frequency Identification (“RFID”) tags and systems have beenwidely adopted in recent years for the traceability and tracking of awide variety of products and objects. Although these wireless systemsare similar to UPC bar code type systems in that they allow for thenon-contact reading of various products, items and devices, they are aneffective improvement over UPC bar code systems in a variety of ways. Infact, RFID tags and systems can be vastly superior to bar code systemsin many manufacturing and other hostile environments where bar codelabels are inconvenient or wholly impractical. One advantage of RFIDtags and systems is the non-line-of-sight nature of the technology,whereby tags can be read through a variety of substances such as snow,fog, clothing, paint, packaging materials or other conditions where UPCbar codes or other such technologies would be useless.

In most applications, an ordinary RFID system comprises three primarycomponents: 1) a transceiver for transmitting and receiving radiofrequency signals, 2) a transponder electronically programmed with data,preferably comprising unique information, and 3) at least one antenna.The transceiver is generally analogous to a bar code scanner, andcontrols communication within the system by restricting when and wheredata is written, stored and acquired. The transponder is analogous to abar code label, and typically comprises at least a small integratedcircuit chip, with this chip often being referred to as an RFIDIntegrated Circuit (“RFIDIC”). Antennae function as conduits betweenRFIDICs and transceivers, as RFIDICs are frequently too small to act astheir own antennae and collect a sufficient level of emitted radiosignals standing alone. Antennae can be attached to the transceiver,transponder, or both, and are generally used to emit and/or collectradio signals to activate an RFIDIC, read data from the RFIDIC and/orwrite data to it.

In general, the term “RFID tag” refers to the combination of the RFIDICand any antennae attached thereto. An RFID tag is essentially amicrochip with antennae that listens for a radio query and responds bytransmitting an identification code that is usually unique to that RFIDtag. In operation, the transceiver emits radio waves that usually rangefrom a fraction of an inch to 100 feet or more, depending upon the poweroutput and radio frequency utilized. When an individual RFID tag passesthrough an electromagnetic zone covered by the transceiver, it detectsthe activation signal of the transceiver and responds by emitting itsindividual recorded code. The “reader” or transceiver then collects thisemitted code and passes this data along to a host computer or other likedevice for processing. Standard apparatuses and methods formanufacturing RFID tags are well known, and instances of suchapparatuses and methods can be found, for example, in U.S. Pat. Nos.6,100,804 and 6,509,217, both of which are incorporated herein byreference in their entirety.

RFID tags come in a wide variety of shapes and sizes, and are usuallynoted for their particularly small and unobtrusive nature. Large RFIDtags include, for example, the hard plastic anti-theft devices attachedto merchandise in stores, credit-card shaped tags for use in accessapplications, and screw shaped tags for use with trees or wooden items.In smaller versions, animal tracking tags inserted beneath the skin canbe as small as a pencil lead in diameter and one-half inch in length.Applications and venues utilizing some form of RFID tags and systemsvary, and can include, for example, package delivery, luggage handling,highway toll monitoring, livestock identification, and automated vehicleidentification systems, among others. Other applications are thought tobe possible as RFID tag and system technologies become further developedand refined.

It has become popular in recent years for many gaming (i.e., gambling)operators, such as casinos, Internet-based groups and other gamingestablishments, to provide various ways of allowing players to engage inbetting and wager type games from remote locations. In such instances, aplayer can generally participate in gaming activities from a remotegaming terminal that is at some location other than an establishedcasino floor or other authorized and regulated gaming location. Variousmediums that can be used for providing a remote gaming terminal include,for example, interactive television (iTV), personal computers, andestablished kiosks with customized controls and displays, among others.In addition, remote gaming can take place, for example, over a closednetwork, whereby patrons can engage in gaming activities fromestablished kiosks or their private hotel rooms, as well as online,whereby players can participate in gaming activities on various Internetwebsites at virtually any location.

A number of problems have emerged, however, with respect to the adventof remote gaming Many forms of gaming are highly regulated, albeit withwide variations in the rules and regulations existing from jurisdictionto jurisdiction, and it is particularly significant that the location ofthe player typically governs which set of laws apply. While many gamingoperators are generally responsible in providing and running theirclosed gaming networks and/or Internet gaming websites from locationswhere gaming is legal, remote access to the gaming activities providedtherein can sometimes problematically be had from locations where gamingis illegal, particularly in the case of Internet websites. Furthermore,virtually all jurisdictions that allow some form of gaming have strictlaws and regulations with respect to the minimum age of any player thatcan participate in such games. While age verification and playerrestrictions can be easily and reliably made on a casino floor or at anyother authorized and regulated gaming location, such measures tend to bemore difficult and less reliable at remote gaming terminals. In fact,the control of underage gaming at environments such as hotel rooms,personal computers and other remote locations is a continuing problemthat limits the growth of legitimate mobile or Internet-based gamingworldwide. The verification of who is trying to place bets from a remotegaming terminal and if such a person is underage is a well-knownproblem.

As a result of these and other related problems, many gaming operatorsand regulators have considered the impact of remote gaming and havestarted to implement various rules and procedures specific to remotegaming activities. In general, these added rules and procedures addresssome of the problems associated with the enforcement of existing lawsand regulations, such as age limits, as well as issues related to thenew potential availability of gaming activities to players located injurisdictions where gaming is illegal. One example of such an addedprocedure is for the gaming system to require the verification oflegitimate players whose identities have been previously confirmedbefore any remote gaming activities can commence. In some instances,players must enter individualized identification codes, such as PINnumbers, into the remote gaming terminal to identify themselves beforegaming may begin. Other possible procedures involve the reading of afingerprint or some other biometric indicator by a connected device atthe remote gaming terminal to verify the identity of a player beforegaming can begin.

Such verification procedures and systems can be readily defrauded orcircumvented in many cases, however, as an underage child could learnthe access code of a parent or other adult and then engage in gamingactivities illegally. In addition, a legitimate player might properlylog in to such a gaming system at a remote gaming terminal and thencompletely hand off control to another user or otherwise permit anotherplayer to play. Another disadvantage of such verification procedures andsystems is that they are all a “one-time” process, such that gamingactivities at the remote gaming terminal are allowed to continue onindefinitely after an initial verification procedure, despite thepotential for changes that would result in the termination of gamingactivities in a more closely monitored environment. Such changes couldinvolve a significant reduction in the capacity in the legitimateplayer, a criminal interception or interference of a gaming session byunscrupulous third parties, or simply a handing off of the remote gamingterminal from the legitimate player to an underage or otherwiseunauthorized user.

While existing systems and methods for providing player verification inremote gaming terminals may grant some protection against unauthorizedor improper gaming activity, improvements and better systems and methodsare usually welcomed and encouraged. In particular, there exists a needfor such systems and methods to be more reliable in verifying playerscorrectly and not allowing unauthorized players access to various gamingevents.

SUMMARY

It is an advantage of the present invention to provide improved and morereliable systems and methods for verifying actual players at remotegaming terminals. This can be accomplished by providing securedcommunication objects having RFID tags to players within a gaming playerverification system, with such a system also having a plurality ofplayer tracking devices adapted to communicate with these secured RFIDcommunication objects.

According to a particular embodiment of the present invention, theprovided system can involve one or more communication objects adapted tobe securely worn by players within a gaming player verification system,wherein each such communication object comprises an RFID tag and isadapted to communicate via radio frequency waves. Security for thesecommunication objects can result from establishing a closed electricalcircuit associated with the RFID tag within the object when it isassigned to and worn by a player, with the object becoming disabled orotherwise de-authorized upon any break in this closed electricalcircuit. The object is thus adapted to alter its communication patternin response to any break of its closed electrical circuit. Goodcandidates for such player assigned and securely worn RFIDcommunications objects can include necklaces, collars, wrist bracelets,wristwatches, belts, ankle bracelets, and the like.

In various embodiments, the separation of a communication object from aplayer can be determined in other ways besides the breaking of anelectrical circuit. In various embodiments, a communication objectincludes a temperature sensor. The temperature sensor may be used todetect the body heat from the player. If the communication objectbecomes separated from the player, the temperature sensor may register atemperature other than a normal human body temperature. E.g., thetemperature sensor may register an ambient room temperature. In variousembodiments, a communication object may include a pressure sensor. Thepressure sensor may register the pressure from the contact with theplayer's body. E.g., the pressure sensor may register pressure as theweight of the communications object presses the pressure sensor into theplayer's body. When the communications object is separated from theplayer's body, the pressure sensor may register a reduced pressure. Itmay thereby be determined that the communications object has beenseparated from the player's body. In various embodiments, acommunications object may include a moisture detector for detectingmoisture from a player's body, such as player sweat. In variousembodiments, a communications object may include a salinity detector fordetecting salt on a player's body. In various embodiments, acommunications object may include a pH detector for detecting the pH ofe.g., moisture on the player's body. Each of these sensors may becapable of registering different input levels depending on whether ornot the sensors are in contact with a player's body. It may thereby bedetermined whether or not the communications device has been separatedfrom the player's body.

The provided system can also involve one or more player tracking devicesadapted to obtain information regarding a specific player from such acommunication object worn by that player, as well as at least onecomputer server having a player verification program adapted to verifywhether obtained information regarding a specific player is adequate oracceptable according to one or more set criteria for verifying a player.Such criteria can include the presence of an unbroken electrical circuitwithin a registered and assigned player communication object. Thiscomputer server can be adapted to deny the initiation or continuation ofa particular gaming event when its player verification programdetermines that any information obtained from a prospective player isinadequate or unacceptable, or when an insufficient amount ofinformation has been obtained. This player verification program can alsobe adapted to verify multiple submissions of information regarding aspecific player during the progress of or between one or more gamingevents. The provided system can also involve a database containingspecific informational data with respect to a plurality of playerswithin the system, as well as communication links or paths betweenvarious system items, such as a communication path between a playertracking device and a computer server.

According to another embodiment of the present invention, a method ofproviding automated player verification within a gaming environment caninclude the steps of providing one or more gaming events involving theplacement of a wager, the presentation of a game, and the grant of amonetary award based upon the outcome of the game, receiving a requestby a specific player to participate in a particular gaming event,obtaining information regarding that player from a communication objectworn by the player, verifying that the obtained information isacceptable according to one or more set criteria, and permitting thegaming event to commence or continue. This method can include situationswhere the pertinent information becomes unacceptable when thecommunication object is no longer worn by said player. This method canalso include the use of communication objects adapted to communicate viaradio frequency waves, such as RFID tags associated with a closedelectrical circuits within the worn communication objects. The methodcan thus also include steps of detecting breaks in these circuits, aswell as denying gaming events to commence or continue.

Other potential method steps can include associating the player requestto play a game with a specific player account associated with thatplayer, and determining whether that player is authorized to participatein the requested gaming event. In order to provide further playerverification, various method steps can also be repeated as desired, withsuch repeated steps including the steps of obtaining information fromthe communication object, verifying that this obtained information isacceptable according to one or more criteria, and permitting a gamingevent to commence or continue. These repeated steps may be continuouslyperformed, or can be performed at set or random intervals.

Other variations can also be practiced, such as those involving allsystem components within a single gaming machine or device, theincorporated use of one or more master gaming controllers in connectionwith the system, and/or the integration of the system with a new orpre-existing player tracking system and player tracking host. Otherdevices and functions beyond gaming machines and remote gaming terminalscan also be included, such as the use of RFID readers in associationwith opening hotel room door locks, paying for retail purchases andpaying for restaurant tabs in associated with the provided system andmethod. In addition, the provided systems and methods may also be usedfor securely and reliably identifying users in contexts outside of acasino or gaming context.

Other methods, features and advantages of the invention will be or willbecome apparent to one with skill in the art upon examination of thefollowing figures and detailed description. It is intended that all suchadditional methods, features and advantages be included within thisdescription, be within the scope of the invention, and be protected bythe accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The included drawings are for illustrative purposes and serve only toprovide examples of possible structures and process steps for thedisclosed inventive systems and methods for providing playerverification in remote gaming terminals and other associated locations.These drawings in no way limit any changes in form and detail that maybe made to the invention by one skilled in the art without departingfrom the spirit and scope of the invention.

FIG. 1 illustrates in perspective view an exemplary gaming machineaccording to one embodiment of the present invention.

FIGS. 2A through 2C illustrate in perspective view several stages ofapplication of a player worn RFID bracelet for use in association withthe gaming machine of FIG. 1 according to one embodiment of the presentinvention.

FIGS. 3A and 3B illustrate in perspective view several alternativeexamples of player worn RFID communication items for use in associationwith the gaming machine of FIG. 1 according to one embodiment of thepresent invention.

FIG. 4 illustrates a block diagram of an exemplary networkinfrastructure for providing remote player verification within a remotegaming system of gaming machines and other items according to oneembodiment of the present invention.

FIG. 5 illustrates an exemplary database containing associated dataidentifiers of various registered active and inactive players accordingto one embodiment of the present invention.

FIG. 6 illustrates a flowchart of one method of providing remote gamingand remote player verification according to one embodiment of thepresent invention.

DETAILED DESCRIPTION

Exemplary applications of systems and methods according to the presentinvention are described in this section. These examples are beingprovided solely to add context and aid in the understanding of theinvention. It will thus be apparent to one skilled in the art that thepresent invention may be practiced without some or all of these specificdetails. In other instances, well known process steps have not beendescribed in detail in order to avoid unnecessarily obscuring thepresent invention. Other applications are possible, such that thefollowing example should not be taken as definitive or limiting eitherin scope or setting.

In the following detailed description, references are made to theaccompanying drawings, which form a part of the description and in whichare shown, by way of illustration, specific embodiments of the presentinvention. Although these embodiments are described in sufficient detailto enable one skilled in the art to practice the invention, it isunderstood that these examples are not limiting; such that otherembodiments may be used, and changes may be made without departing fromthe spirit and scope of the invention.

One advantage of the present invention is the provision of a morereliable system and method for initially verifying players at remotegaming terminals, such that a higher level of confidence can be had thatany person engaging in a gaming event at a remote gaming terminal is anappropriate person for that gaming event. In one embodiment, informationspecific to a given player is obtained after or during the process ofreceiving a request from that player to participate in a specific gamingevent, such that unauthorized access to that gaming event can beminimized or prevented altogether despite the presence of an adequatecoin, bill or ticket input, or a correct command, game play request orother such input.

Another advantage of the disclosed system and method is the ability toverify a player repeatedly during the progress of the gaming event orsession at the remote gaming terminal. This advantageously hinders theability of players to log in to the system properly and then hand offcontrol of the remote gaming terminal to an underage or otherwiseunauthorized player. This is accomplished through the subsequentrepetition during the gaming event or session of the steps of obtaininginformation specific to the given player, verifying that the obtainedinformation is adequate, and permitting the requested gaming event tocommence or continue.

Yet another advantage of the disclosed system and method is the abilityto incorporate the system and method into other items and ventures thatextend beyond the play and administration of wager based games andgaming Accordingly, it should be noted that while the inventive playerverification system and method disclosed herein is being describedprimarily with references to and illustrations of remote gamingterminals, gaming establishments, gaming machines and wager based gamesof chance in general, this verification system is readily adaptable foruse in other types of businesses and environments, such that its use isnot restricted exclusively to remote gaming terminals, gamingestablishments, gaming machines or games of chance. Examples of suchother items and ventures can include individual identifications andpayments with respect to hotel and transportation reservations andcheck-ins, restaurant visits, retail outlet registrations and purchasesand the like. Such uses can be in conjunction with a gaming basedsystem, or separately altogether.

As an introduction to the various embodiments described herein, a veryspecific example under a particular implementation according to thepresent invention will now be provided. It will be readily appreciatedthat the following example is picked from a potentially infinite numberof possibilities that may occur under the present invention, such thatthis example is not limiting in any way. According to this example, aspecific Player A checks in at an established hotel having a gamingcasino on the premises. Upon check in, the identity of Player A isaffirmatively verified by a hotel desk clerk, using various items suchas a drivers license, credit card, specific player tracking and rewardscard, and the like, or any combination thereof, any or all of which bearthe name and/or a likeness of Player A.

During the check in process, Player A indicates that he would like to beable to play in one or more gaming events at a remote terminal duringthe stay at the hotel and casino. Upon such a request, the player isthen fitted with a temporary ID bracelet containing a closed circuit andRFID tag therein. Upon this fitting, the unique RFID tag containedtherein has its contents recorded, such that all associated remoteterminals will recognize that Player A is at that location when thebracelet is active and on this player. After settling into his room, theplayer decides to play at a remote gaming kiosk near the hotel pool.Because he continues to wear his unique RFID bracelet, the gaming kioskaccepts Player A as a legitimate player, opens his account locally onthe kiosk, and permits game play to commence. After playing at the kioskfor some time, Player A concludes his session, is appropriately creditedto or debited from his player account electronically, and then proceedsto a lounge chair at the pool. A few minutes later, he orders a drinkand is able to have the drink paid or accounted for by placing hisbracelet in proximity to a different “remote terminal” (i.e., a portableRFID tag reader) carried by the drink attendant.

Later that afternoon, Player A stops in at an associated boutique storewithin the hotel and purchases a few personal items. Rather than pay bycash, check or credit card, however, he merely positions his uniquelyidentifying bracelet in close proximity to a stationary RFID tag readerat the store register, at which point his personal account at the hotelis again debited for the purchased items. Upon returning to his hotelroom, Player A positions his bracelet in close proximity to the doorlock on his hotel room door, whereupon another RFID tag reader builtinto the door lock reads the unique tag in his bracelet and unlocks thedoor. During a brief respite in his hotel room, Player A checks in andplays a few games of video poker at the gaming station on his hotel roomtelevision and accompanying set top box and hardware, in much the samemanner as the earlier session at the pool kiosk. At dinner at a hotelrestaurant that night, Player A pays or accounts for the cost of themeal by placing his bracelet near another portable RFID tag readercarried by the waiter or cashier, similar to the way that his retailpurchases were made at the boutique store earlier.

Later that night, in a cafe within the hotel, Player A is able to playat a bank of remotely located slot machines by using his bracelet as ameans for identifying himself and verifying that he is authorized toparticipate in remote gaming.

Although he can use cash to play at this bank of gaming machines, heagain uses his ID bracelet to access his personal account such that anywinnings are credited and any losses are debited to this personalaccount. Prior to a brief break from game play, Player A temporarilycloses, stays or otherwise suspends his session at a particular gamingmachine. While washing up during this break, he accidentally bangs theID bracelet fairly hard, such that the bracelet considers the hit to bea tampering attempt. The bracelet accordingly breaks the active circuittherein or otherwise disables itself, such that it is no longer activelyoperating as an affirmative remote identifier for Player A. The playeris then unable to be verified at the bank of gaming machines in thecafe, and thus cannot resume play after his break. After a set length oftime, his temporarily closed or suspended gaming session terminates andhis account is credited or debited accordingly. Player A can no longerparticipate in any activity requiring the use of his RFID bracelet untilhe goes to have this bracelet reset by the hotel front desk or someother appropriate administering agent authorized within the system.

Again, this specifically detailed example represents only one of themyriad possible outcomes and arrangements of remote playeridentification, game play and other identifying events and interactionsunder an RFID tag system and method for remote player verification. Thefollowing detailed description will now provide for other possibilitiesand implementations of these and other such systems and methods atvarying levels. Again, it should be remembered that not allimplementations of the inventive systems and methods disclosed hereinmust be associated with a gaming system or establishment, and thatdetails under such systems and establishments are provided only forpurposes of illustration. While any such similarly identifying use isthus possible, uses within a gaming environment are thought to beparticularly useful, such that further examples will provided within agaming context. In particular, an especially useful application can behad with respect to gaming machines and other stand alone gamingdevices, where supervision and manual interaction with casino or gamingoperator personnel can be relatively low with respect to other gamingevents.

Referring first to FIG. 1, an exemplary gaming machine according to oneembodiment of the present invention is illustrated in perspective view.Gaming machine 10 includes a top box 11 and a main cabinet 12, whichgenerally surrounds the machine interior (not shown) and is viewable byusers. Main cabinet 12 includes a main door 20 on the front of themachine, which opens to provide access to the interior of the machine.Attached to the main door are typically one or more player-inputswitches or buttons 21, one or more money or credit acceptors, such as acoin acceptor 22, and a bill or ticket validator 23, a coin tray 24, anda belly glass 25. Viewable through main door 20 is a primary videodisplay monitor 26 and one or more information panels 27. The primaryvideo display monitor 26 will typically be a cathode ray tube, highresolution flat-panel LCD, plasma/LED display or other conventionalelectronically controlled video monitor. Top box 11, which typicallyrests atop of the main cabinet 12, may also contain a bill or ticketvalidator 28, a key pad 29, one or more additional displays 30, a cardreader 31, one or more speakers 32, one or more cameras 33, and asecondary video display monitor 34, which may also be a cathode raytube, high resolution flat-panel LCD, plasma/LED display or otherconventional electronically controlled video monitor.

It will be readily understood that gaming machine 10 can be adapted forpresenting and playing any of a number of gaming events, particularlygames of chance involving a player wager and potential monetary payout,such as, for example, a wager on a sporting event or general play as aslot machine game, a keno game, a video poker game, a video blackjackgame, and/or any other video table game, among others. While gamingmachine 10 can typically be adapted for live game play with a physicallypresent player, it is also contemplated that such a gaming machine mayalso be adapted for game play with a player at a remote gaming terminal.Such an adaptation preferably involves the implementation of one or moretypes or modes of communication from the gaming machine to at least oneoutside location, such as a remote gaming terminal itself, as well asthe incorporation of a gaming network that is capable of supporting asystem of remote gaming with multiple gaming machines and/or multipleremote gaming terminals.

Additional components and devices that can be used to permit gamingmachine 10 to be used in a remote gaming environment will now bepresented in greater detail. One such item can be a player tracking,authorizing and/or identifying device 35. Although shown as an auxiliarydevice attached to the lower left side of main door 20 in FIG. 1, itwill be readily appreciated that such a device can be placed anywhereabout, on or within gaming machine 10, and can in fact be integratedwithin the gaming machine so as to be less conspicuous, as desired. Infact, it is specifically contemplated that the size, shape, location andactual presence of any and all of the items shown on gaming machine 10can vary, and that any and all gaming machines can be readily adaptedfor use with the present invention. With respect to player identifyingdevice 35, this device can be, for example, an RFID transceiver adaptedto interact with one or more RFID tags outside of the gaming machine,and in particular those worn, carried or otherwise controlled by variousregistered players. In a preferred embodiment, player identifying device35 is adapted to act as a conduit between such outside RFID tags and aplayer tracking system/network, a player accounting system/network, oneor more processors at the gaming machine itself, or any combinationthereof. Such an RFID transceiver can be, for example, an RI-R00-321Amodel Series 6000 Reader Module S6110 transceiver manufactured by TexasInstruments of Dallas, Tex., although many other off-the-shelf andcustomized brands and types of RFID transceivers can also be effectivelyutilized for such a purpose. Besides acting as an RFID transceiver,player identifying device 35 can also act as or be coupled with astandard player tracking device used for player loyalty and rewardsprograms, with such devices and programs being well known in the art. Infact, it is specifically contemplated that the RFID transceivers of thepresent invention be incorporated into existing player tracking systems

A wide variety of types, styles, sizes and shapes of RFID tags andobjects can be used in conjunction with player identifying device orRFID transceiver 35, and such RFID tags can also be off-the-shelf orcustomized as desired for any particular application. Of particularimportance is that such RFID tags be administered or managed in asufficient manner by a casino, gaming operator, gaming regulator, orother competent authority, such that some degree of confidence can behad with respect to the correlation between an RFID tag being read andthe player or person who is wearing, carrying, or otherwise controllingthe tag. Although a virtually endless number of possible models, typesand brands of RFID tags and be used for such purposes, several specificexamples are given here for purposes of illustration. One example of anoff-the-shelf RFID tag can be an RFID card, with such cards being issuedor checked out to players to use at various remote gaming terminals.Such cards could include, for example, the RI-TH1-CBIA model 13.56 MHzVicinity Card Transponder, also manufactured by Texas Instruments. Othercard examples can include the RI-TRP-R4FF read-only model and theRI-TRP-W4FF read-write model Card Transponders, also manufactured byTexas Instruments.

Other RFID devices beyond cards could include tokens, objects or simplyRFID tags themselves that can be inserted or attached to other devices,such as, for example, the RI-TRP-R9QL read-only model and theRI-TRP-W9QL read-write model 30 mm Disk Transponders, as well as theRI-TRP-R9UR read-only model and the RI-TRP-W9UR read-write model 85 mmDisk Transponders, all of which are also manufactured by TexasInstruments. Other off-the-shelf examples can include a key ring orkeychain with an embedded RFID tag, such as the RI-TRP-RFOB-01 read-onlymodel and the RI-TRP-WFOB-01 read-write model Keyring Tags, alsomanufactured by Texas Instruments. Of course, many other models andbrands of RFID tags can also be used in conjunction with the inventivesystems and methods described herein, and such systems and methods areby no means limited to the foregoing relatively small listing ofpossible examples.

One problem with utilizing RFID cards, tokens, charms or other suchobjects that are merely loosely checked out to players is that there isalways the potential for such objects to be freely transferred amongplayers or other individuals. While the majority of players may not wishfor others to use such devices registered in their name and will thustake appropriate safeguards against improper transfers, there is a highpotential for theft, fraud and unauthorized uses in a system utilizingsuch freely transferable devices. In addition, many casinos, gamingoperators and other similar establishments would also prefer the optionof having a system whereby such identifying devices are not so freelytransferable, for many obvious reasons. Accordingly, it is desirablethat some forms of these devices be more secure, and that there be ahigh likelihood that only the registered player or person for a givendevice can be using that device in an authorized manner One way ofachieving such an objective is to include one or more RFID tags in aworn device, such as a collar, wristwatch, wrist bracelet, anklebracelet or the like, in a manner such that the device is disabled orotherwise deactivated when removed from the legitimate wearer.

Turning now to FIGS. 2A through 2C, several stages of application of oneexample of a player worn RFID bracelet for use in association with thegaming machine of FIG. 1 are illustrated in perspective view. As firstshown in FIG. 2A, disposable RFID bracelet 100 resembles in many aspectsa disposable hospital type bracelet, in that it is a one-use disposableitem, can be relatively cheaply mass-produced, is intended to be appliedto a wearer by one or more authorized persons of an operating entity,can be applied to most individuals regardless of size, is adapted to aidin identifying the wearer, and is adapted such that it becomes readilyapparent when the bracelet has been removed from the original wearer.Such disposable bracelets can be readily mass produced, shipped andstored in a flat format with multiple holes, slots or other devices foradjusting the size to fit a given wearer, and can be made of a pliableplastic, rubber or other suitable material, as desired.

As also shown in FIG. 2A, disposable bracelet 100 contains an embeddedRFID tag 140 and an embedded circuit strip 141, which is designed toform a closed circuit when applied to and worn by a user. Circuit strip141 also forms a convenient antenna for the RFID tag 140. A flat battery142 may also be included, and is preferably also embedded. Although notnecessary for many passive and simpler RFID tags, such a battery may beneeded where a relatively powerful RFID tag is used. In addition, such abattery may also be necessary to power and accurately monitor any closedcircuit formed by circuit strip 141. Disposable bracelet 100 alsocomprises an end knob 143 and plurality of holes 144 adapted forsecurely applying the bracelet to a user, with the combination of endknob 143 and any of holes 144 comprising a one-way, one-time fastener,as will be readily appreciated by one skilled in the art. End knob 143is preferably metal or otherwise adapted as an electrical conductor, andis electrically connected to circuit strip 141. Each hole 144 preferablyincludes a metal eyelet or other conductive device, and is alsoelectrically connected to circuit strip 141, such that a closedelectrical circuit is formed when end knob 143 is placed through anygiven hole 144 and securely fastened within or atop that hole. Aplurality of grooves 145, perforations, markings or other band removalfacilitating devices are also preferably contained on disposablebracelet 100, such that any excess bracelet band beyond a utilized hole144 can be readily removed.

Continuing on to FIG. 2B, the disposable bracelet I 00 of FIG. 2A isshown in a permutation 101 as it is first being applied to the wrist(not shown) of a player or wearer. With the bracelet wrapped around thewrist of a player, end knob 143 has been placed through a given hole, asshown. The remainder of the bracelet beyond the used hole can be cut ordetached at marking or groove 145A, and the end knob can then beclamped, pressed or otherwise distorted such that it cannot be pulledback through the used hole without doing irreparable damage to thebracelet. Moving on to FIG. 2C, permutation 102 of the bracelet showsthat the excess band beyond the used hole has been removed, that the endknob 143A has been deformed or clamped in place such that it cannot bereadily undone without tearing at the band, and that a solid contact hasbeen formed between the clamped end knob 143A and the eyelet of itsmating hole, such that a closed electrical circuit along the embeddedcircuit strip has been formed. The top of clamped end knob 1 43A (andpossibly pre-clamped end knob 143 as well) may comprise a plastic,rubber or other electrically insulating cap, both to render the braceletas more aesthetically pleasing and to hinder fraudulent attempts tocreate alternate closed electrical circuits. Alternatively, such a coveror cap may be pasted, glued or otherwise attached atop end knob 143Aafter it is deformed. The bracelet is now securely worn and ready foruse by the player.

It is specifically contemplated that the application of an RFID braceletto a player be accomplished or at least supervised by one or moreauthorized personnel of the gaming operator or other entity managing theplayer tracking system using such RFID bracelets. Not only can controland distribution of such bracelets be important, but the time ofapplication is an ideal opportunity to check player ID, verify that aplayer is of age and otherwise eligible for gaming, apply the braceletcorrectly, and program or issue code to the RFID tag within thebracelet, if necessary. It should also be appreciated that such adisposable bracelet can be readily removed by a player at virtually anytime due to the pliable nature of its material of construction. However,consequence of such a removal is that the embedded closed electricalcircuit will most likely be broken. In this manner, fairly reliableregulation of bracelet wearers or players can be had, since the embeddedRFID tag can be adapted to become disabled or to communicate anappropriate signal when this closed circuit has been broken, such thatplayer verification through the compromised bracelet is no longerpossible.

To this end, the closed electrical circuit formed by circuit strip 141can be used to power the RFID tag itself, such that the RFID tag becomesdisabled when the circuit is broken. To ensure that any subsequentreconnection of the circuit strip into a full circuit does not thenre-enable the bracelet, any convenient feature such as flash memory,erasable RAM or a simple validation register can be used.

Alternatively, the RFID tag can be a “smart” tag powered by the batteryat all times, with the closed electrical circuit formed by circuit strip141 merely acting as a monitored circuit, with appropriate action takenwithin the RFID when it detects that this circuit has been broken. Suchaction can be a simple “NO” signal or register to any potentialverification or other authorization request, with information on thepurportedly prospective user still being communicated from the nowcompromised bracelet. In this manner, information that might be relevantto any fraud or misuse can be communicated, tracked, recorded and/oracted upon more readily.

In addition to this closed electrical circuit, other features that canbe added to such a bracelet to further discourage or prevent misuse orfraud can include a pulse sensor adapted to detect and monitor a pulse,and to send a signal to the RFID tag when the detected pulse disappears,as well as one or more strain gauges adapted to sense when the pliablematerial of the bracelet is being unduly stretched or torn, and tosimilarly send a signal to the RFID tag if such an event is detected.Such added devices may also be connected to the battery for power, ifneeded, and may also be connected to the closed electrical circuit orsome other circuit in communication with the RFID tag. Various otherspecifics regarding various RFID bracelet features, applications, uses,monitoring and disablement are discussed in greater detail below.

Turning now to FIGS. 3A and 3B, several alternative examples of playerworn RFID communication items for use in association with the gamingmachine of FIG. 1 are similarly illustrated in perspective view. Unlikethe exemplary disposable RFID bracelet of FIGS. 2A through 2C, bracelet103 of FIG. 3A and wristwatch 104 of FIG. 3B are preferably reusableitems that can be worn and used by different users within a given playerverification system. Because these items can be reused many times over,it becomes practical for the item cost to be substantially higher.Hence, more “fashionable” items such as a hard plastic stylish braceletor a nice wristwatch can be used, with such items having more appeal toplayers who might not wish to wear an unusual looking “hospital-style”bracelet. A wide variety of types, colors and styles can be used forsuch items, with each variation preferably coming in a number ofdifferent sizes, such that any given user may have a choice of RFIDobjects to wear. Various varieties, themes and charms can be used on orwith such reusable worn communication items, and more desirable higherend items, such as a very nice wristwatch, for example, may be assignedto MVP players, or those who pay extra monies or player rewards pointsfor the privilege, if desired.

Referring first to FIG. 3A, hard plastic jewelry style bracelet 103contains an embedded RFID tag 140, an embedded circuit strip 141designed to form a closed circuit when applied to and worn by a user,and an embedded battery 142, similar to the foregoing disposablebracelet 100. A hinge 146 connects two halves of the bracelet tofacilitate its application and removal, and one or more buttons orreleases 147 are adapted to disengage an internal locking mechanism (notshown) such that the bracelet can be opened and removed. As in theforegoing example, it is preferable that such a removal be readilyaccomplished by a wearer, albeit with the consequence that the embeddedclosed electrical circuit is broken thereby, disabling the bracelet.Although only one knob or button 147 might be necessary, it is thoughtthat including more than one such device and requiring mutual activationfor removal might lessen the chances of accidental removal and theresulting inconveniences attaching thereto. Also, it will be readilyapparent that each bracelet may likely include mating face plates orother internal devices located at the end of each bracelet half andadapted to facilitate the formation of the embedded closed electricalcircuit when the bracelet is applied to a wearer and closed.

Referring next to FIG. 3B, jewelry style wristwatch 104 similarlycontains an embedded RFID tag 140, an embedded circuit strip 141designed to form a closed circuit when applied to and worn by a user,and an embedded battery 142. A flexible watch band 148 connects thewatch face with a standard fold over safety clasp 149, which comprisesthree sections connected by hinges 150 and pins 151. As will be readilyunderstood by those skilled in the art, the fold over safety clasp 149folds up on itself as the wristwatch 104 is being applied to a wearer,with end knob 152 protruding through hole 153 and into a receivingsocket 154, where it is held in place. A sliding mechanism within socket154 then allows the end knob 152 to be pulled out when release 155 ispressed, with a similar release preferably located on the opposing endof the socket 154 and sliding mechanism. As in the disposable bracelet100, end knob 152 is preferably made of an electrically conductingmaterial, and preferably comprises one end of embedded circuit strip141. Socket 154 preferably comprises the other end of embedded circuitstrip 141, such that a closed electrical circuit is formed when end knob152 mates with socket 154 upon application of the wristwatch 104 to awearer. Although watchband 148 may be metallic or otherwise electricallyconductive, it is preferably that at least one section of the threesections comprising fold over safety clasp 149 be of a plastic or othersuitable non-conducting material, such that a permanent closed circuitis not formed.

Similar to the foregoing embodiment, reusable RFID bracelet 103 andwristwatch 104 may also include additional devices such as pulse sensorsor strain gauges adapted to detect tampering efforts more readily. Otherfeatures of both disposable and reusable bracelets, wristwatches,collars, ankle bracelets and the like can include an embedded GPSlocating device, waterproof or water resistant abilities, and the use ofvarious encryption items and techniques, such as a random encryption keyassociated with each unique communication bracelet item, to betterdistinguish each unique RFID device where many may be in the samegeneral region. Further, it may also be preferable to require that aspecial machine or application device be used to apply each worn RFIDdevice, such that players and other purported users are even less likelyto be able to freely transfer these devices amongst each other.

Other items and features that can be used to provide better security andreliability in a system using such communication items can include awearable dongle or other insertable that can be inserted into a playertracking device, as well as an optical scanner or reader on the playertracking device adapted to read one or more optical patterns on theplayer worn bracelet or communication item. Such an optical pattern cancomprise, for example, a simple bar code, a two-dimensional bar code,and/or a rewritable bar code, such as what might be implemented usingelectronic paper or another like device or system. In this manner,readings can be made based on two separate forms of communication, suchas a radio frequency signal from an embedded RFID tag and an opticalscan of a bar code, with acceptable readings from two different sourcesbeing required before a proper player validation or authorization isgranted by the reading device, gaming machine or other associateddevice.

While the three examples illustrated above refer only to bracelets orwristwatches, it will be understood that many more types of devices canbe used, and that such devices can be worn securely in other placesbeyond the wrist of the player or user. For example, a collar orrelatively tight necklace around the neck, an ankle bracelet or likedevice, and a belt or other like device about the waist may all bepractical applications of a securely worn communication object thatcannot be readily removed by a wearer without breaking a closed andmonitored circuit. It will also be readily appreciated that othercommunication means can also be used in lieu or in conjunction with anRFID means or system, with such alternative means including the bar codeor electronic paper examples given above, for example. Of course, otherimplementations are also possible, although many may not come with thesame safeguards afforded by such a securely worn device with an internalclosed circuit.

In addition, while the foregoing communication items, readers and anysystem encompassing these devices can involve establishing playeraccounts with known and identified players or users, it is alsospecifically contemplated that such a system can be established foranonymous verified gaming Under such a system embodiment, it might onlybe necessary to verify that a player or user be eligible to participatein gaming events, which may be apparent merely upon a visual review ofmany individuals by authorized device applying personnel. In suchinstances, the worn bracelet or communication item would notdefinitively identify the player or user, but would merely provide aconfirming communication to an inquiring reading device that a correctlyverified wearer is authorized to participate in gaming events or otherevents of interest. If desired, anonymous player accounts may also beused in conjunction with such an anonymous system, where a namelessaccount is established and associated with a given bracelet orcommunication device upon the application of the device to the anonymousplayer or user. A checkout station or printer having a reader adapted tocommunicate with the anonymously worn communication object may then beused to allow the user to cash out from his or her anonymous account,and direct interaction with a cashier utilizing a reader may also bepossible.

In yet another embodiment, it is contemplated that the inventive RFIDdevice may also include one or more added mechanisms for providinginformation to the wearer. For example, a small display or speaker couldalert the wearer of possible tournaments, shows, events, and openings orlast calls of restaurants, lounges, stores or other areas of interestwithin a casino or establishment. Such a display or speaker could alsoprovide player tracking information to the wearer, as well as tournamentor event results or updates, and might also provide news, weather,sports updates and other informational items of interest, for example. Adisplay may be a simple LED or dot matrix display adapted to providetext messages, or the display could be a small video screen or panel inthe event that a more sophisticated and expensive unit is used.Similarly, a speaker could be a special speaker adapted for a full rangeof sounds and voice messages, or a simple speaker adapted for emitting arange of alert beeps or noises, as desired.

Although it is contemplated that any form of RFID device disclosedherein could be used with any kind of speaker or visual display, oneparticular form could be an “info watch,” where the display of thewristwatch 104 shown in FIG. 3B is adapted for such aninformational-display. Of course, this RFID wristwatch may also show thetime on this display, which can overlay any information provided, suchas on a small video display, or which can be preempted whenever otherinformation is to be provided or shown. Such an informational watch candisplay content that might be pre-programmed into it at appropriatetimes or intervals, such as tournament notes, show times and restaurantopening times, as well as content that might be transmitted to it whilea wearer is on the premises. Overall, it is thought that such an infowatch would have greater functionality, and thus be more attractive topotential users, such that players would be more receptive to the ideaof wearing this RFID device.

Turning now to FIG. 4, a block diagram of an exemplary networkinfrastructure for providing remote player verification within a remotegaming system of gaming machines and other items according to oneembodiment of the present invention is illustrated. Remote gaming system200 comprises one or more remote gaming terminals, a variety of othercommunication items, and a number of host-side components and devicesadapted for use with gaming terminals, remote gaming environments andthe inventive remote player verification methods and systems disclosedherein. One or more gaming machines 1 adapted for use in conjunctionwith remote gaming system 200 and at least one specifically adaptedremote gaming terminal 10 can be in a plurality of locations, such as inbanks on a casino floor, standing alone at a smaller non-gamingestablishment, in isolation and not generally exposed to live in-personplay, or in isolation in regions such as individual player hotel rooms(i.e., an iTV system). In addition, one or more other game play devices,retail connections, electronic door locks, game servers, databases,administration tools, and other player and host-side items may alsoreside within remote gaming system 200, as described in greater detailbelow.

Remote gaming terminal 10 can be located remotely from a primary casinofloor or other monitored gaming environment, and preferably contains atleast one player tracking unit, verifier or reader, such as the RFID tagreader described in greater detail above. Such a player verifier canalso be any of a number of different devices not shown here, such as,for example, biometric identification devices such as a fingerprintsensor, a retinal scanner, an image taking or recording device, or avoice recognition hardware device, among others. Various examples ofplayer verification using a biometric identifier are disclosed incommonly assigned and co-pending U.S. patent application Ser. No.10/244,156, by Rowe, et al., filed Sep. 12, 2002, and entitled “Methodand System for Verifying Entitlement to Play a Game Using a BiometricIdentifier,” which application is incorporated herein in its entiretyand for all purposes. Another example of biometric information beingused in conjunction with gaming machines and systems is described incommonly assigned and co-pending U.S. patent application Ser. No.09/491,899, by Wells, et al. filed on Jan. 27, 2000, and entitled“Gaming Terminal and System with Biometric Identification,” whichapplication is also incorporated herein in its entirety and for allpurposes.

The actual game providing device itself can be any of a number ofdifferent devices, such as, for example, a standard or modified gamingmachine, a proprietary kiosk, an iTV system, a home or personalcomputer, or a personal desk assistant (PDA), among others. Such a gameproviding device can include any number of components, similar to astandard gaming machine, such as, for example, a display unit, one ormore speakers or other output unit, a keyboard or other input unit orunits, one or more communication units, one or more processors, and/orother electronics and circuitry, as desired. Other associated playeraccessible items within remote gaming system 200 can include, forexample, various retail or restaurant establishments 202, as well ashotel room door locks 203 and other such devices. In the case of aretail or restaurant establishment, an RFID tag reader can be adapted atsuch a location to read the unique code or identifier carried on an RFIDtag securely worn by a registered player, and then credit or debit amonetary or other amount to an account of that player or user asappropriate. For hotel door locks, a simple read and unlocking of thedoor can be accomplished when the worn RFID tag comes in close proximityto the lock, such as when the player reaches for the doorknob, forexample.

Modes of communication between one or more gaming machines 1, remotegaming terminals 10, various retail or restaurant establishments 202,various door or other locks 203 and/or a player verification network caninvolve, for example, a standard bus, token ring, hard-wired connectiondirectly to the gaming machine or network, direct dial-up connectionsthat can involve CDMA, GSM or other like connections, wireless systemssuch as a Bluetooth®, Wi-Fi or other type of wireless network, or anyform of Internet connection, although other types and forms ofcommunication are also contemplated. As illustrated here, communicationline 201 is a standard bus that connects multiple gaming machines,remote gaming terminals and other player usable devices with severalhost-side player verification network items.

One way to transmit data from the device used as a player identifier tothe host-side of the remote gaming system 200 is along a mode ofcommunication that is separate from any mode of communication that mightbe used to transmit a game or other game play information between thehost-side gaming machine or servers and the game-providing device. Inthe event that such game play information is indeed transmitted from aremote location to a display used by a player, transmitting suchinformation on a communication line separate from any communication linethat transmits player verification information is thought to add anadditional layer of security to the process. Provisions of separatecommunication lines or networks can be made through any of the abovelisted means or methods, or any other suitable communication, as will bereadily appreciated by those skilled in the art. While one way ofaccomplishing this would be to provide separate network addresses andchannels for each player verification hardware item, for example, it isthought that the implementation of a separate player verificationnetwork would result in a system that is even more foolproof.

In addition to player accessible items such as gaming machines, remotegaming terminals, retail establishments, hotel door locks, and othercommunication devices, common bus 201 can also connect a number of othernetworked devices, such as, for example, a general-purpose server 210,one or more special-purpose servers 220, a sub-network of peripheraldevices 230, and/or a database 240. Such a general-purpose server 210may be already present within an establishment for one or more otherpurposes in lieu of or in addition to remote game playing and playerverification. Functions for such a general-purpose server can include,for example, both general and game specific accounting functions,payroll functions, general Internet and e-mail capabilities, switchboardcommunications, and reservations and other hotel and restaurantoperations, as well as other assorted general establishment recordkeeping and operations. In some instances, remote game play and remoteplayer verification functions may also be associated with or performedby such a general-purpose server. For example, such a server may containvarious programs related to general game play operations, remote gameplay administration and remote game player verification, and may also belinked to one or more gaming machines adapted for remote game playwithin an establishment, in some cases forming a network that includesall or substantially all of the remote game play capable machines withinthat establishment.

Communications can then be exchanged from each adapted gaming machine toone or more player verification related programs or modules on thegeneral-purpose server.

In a preferred embodiment, remote gaming system 200 comprises one ormore special-purpose servers that can be used for various functionsrelating to the provision of remotely played games and remote playerverification. Such special-purpose servers can include, for example, aplayer verification server 220, a general game server (not shown), a GPSserver (not shown), and/or a specialized accounting server (not shown),among others. Such added special-purpose servers are desirable for avariety of reasons, such as, for example, to lessen the burden on anexisting general-purpose server or to isolate or wall off some or allremote player verification information from the general-purpose serverand thereby limit the possible modes of access to such remote playerverification information. Alternatively, remote gaming system 200 can beisolated from any other network within the establishment, such that ageneral-purpose server 210 is essentially impractical and unnecessary.Under either embodiment of an isolated or shared network, one or more ofthe special-purpose servers are preferably connected to sub-network 230of devices. Peripheral devices in this sub-network may include, forexample, one or more video displays 231, one or more user terminals 232,one or more printers 233, and one or more other digital input devices234, such as a card reader or other security identifier, among others.Similarly, under either embodiment of an isolated or shared network, atleast the player verification server 220 or another similar componentwithin a general-purpose server 210 also preferably includes aconnection to a remote player database or other suitable storage medium,240.

Database 240 is preferably adapted to store many or all files containingpertinent data or information for players registered with the remotegaming system, with this data or information being particularly relevantto player verification at a remote gaming terminal. Player files andother information on database 240 can be stored for backup purposes, andare preferably accessible to one or more system components, such as aspecially adapted gaming machine 10 or remote gaming terminal, ageneral-purpose server 21 0, and/or a player verification server 220, asdesired. Database 240 is also preferably accessible by one or more ofthe peripheral devices on sub-network 230 connected to remote playerverification server 220, such that information or data specific to givenplayers or transactions that are recorded on the database may be readilyretrieved and reviewed at one or more of the peripheral devices, asdesired. Although not shown as directly connected to common bus 201, itis also contemplated that such a direct connection can be added ifdesired. Additional features and characteristics specific to database150 and the player files therein are provided in greater detail below.

With a preferred remote gaming system, such as the remote gaming system200 illustrated in FIG. 4 and discussed herein, it is thus possible toprovide one or more gaming events at a remote gaming terminal, receive arequest by a specific player at the remote gaming terminal toparticipate in a particular gaming event, obtain information regardingthat player, verify that the obtained information is acceptable,according to one or more acceptable criteria, and permit the requestedgaming event to commence or continue. In such instances, the remotegaming terminal can be a secondary gaming machine that providesdownloadable games or communicates with a primary gaming machine thatactually runs gaming events from a central location for various remotegaming terminals. It is also worth noting that while the game beingpresented at the remote gaming terminal may originate from a singlegaming machine, as shown in FIG. 4, it is also possible that such gamesbe run from a game server, such that a wider variety and number of gamesand options be available at a plurality of remote gaming terminalssimultaneously.

In one embodiment, it is specifically contemplated that the obtaining ofinformation from a prospective player occurs either after that playerattempts or makes a request to participate in a particular gaming eventor during the process of making the specific request. This presumablyresults in information that is either live or at least very current,such that the use of less reliable or potentially fraudulent olderinformation or data identifiers is reduced. In addition, it ispreferable that an authentication or other preliminary identifying stepfirst occur, such that the system is alerted as to which presumablyregistered player is attempting to access the remote gaming system. Inthis regard, a player can first enter a player name or handle and anassociated password, after which the player verification can be madeaccording to the personal information obtained. Hence, the request toplay a specific gaming event can first be associated with a particularregistered player and player account before a player verification ismade.

It is also preferable that other factors beyond a personalidentification also be available for determining whether a given playeris authorized to participate in the requested gaming event. For example,it may be desirable to allow some players to play a general slate ofslots and table games, but to forbid them from playing high stakesgames, such as baccarat. It may also be desirable to set limits on someor all players. For example, a given player may have a gaming loss limitof $1000 per day on the remote gaming system, with an ultimate accountbalance of $5000 for gaming, restaurant and retail purchases combined,whereupon the realization of either limit results in further play orpurchases for that player being terminated or restricted until anappropriate payment or other resolution is made. Such limits may be sentas part of a loss prevention program to protect the interests of acasino or gaming operator, as part of a gaming harm minimization orother similar type program to protect individual players, or acombination of both. Other issues may involve security problems or arecorded history of a given individual engaging in problematic activity,such as attempting to defraud the system or hand off control to anunderage or otherwise unauthorized player. Such acts may result in thedesire to further limit or ban an otherwise positively identifiedregistered player.

In another embodiment of the present invention, the information obtainedfrom the prospective or current player being verified can also beinformation regarding the actual current geographic location of thatspecific player. This can be determined by, for example, a globalpositioning system that is adapted to determine player position andcommunicate that information independently on a separate mode ofcommunication. Inclusion of this type of personal information can assistgreatly in the prevention or reduction of remote gaming sessions fromjurisdictions where gaming is illegal or restricted. In such aninstance, the worn communication item may also comprises a small GPSdevice, and a GPS server or other similar hardware item can bespecifically adapted to note the geographic location of a purportedplayer, and then either permit that player to play all games, restrictthat player from all games, or permit certain games and/or bettinglimits or actions, as allowed by the jurisdiction where that player iscurrently located.

Although many types of GPS units are possible for use with the presentsystem, it is specifically contemplated that the GPS units capable ofbeing adapted to work in association with RFID tags and their uses beused with the inventive methods and systems provided herein. Byutilizing the GPS features present in an RFID tag system, thecombination of verifying both a player identity and specific locationcan be accomplished. In this manner, both this and the previouspreferred embodiment can be practiced at the same time, with theadvantages inherent to each embodiment being simultaneously realized.This can be particularly useful in the event of mobile gaming terminalsor devices, such as PDAs or home computers. Other uses of such acombination system will be readily apparent to those skilled in the art.

In yet another embodiment of the present invention, it is specificallycontemplated that the steps of obtaining and verifying playerinformation, and permitting a given remote gaming event or session tocontinue are repeated even after the gaming event or session has alreadybeen allowed to commence for a given player. Of course, such a preferredembodiment may be used in combination with one or more of the previouslydiscussed preferred embodiments, resulting in an even better method orsystem. The repetition of these steps is particularly useful inpreventing or at least limiting the ability of a legitimate player tohand off control of the remote gaming terminal to an underage orotherwise unauthorized player. The repetition of these steps can resultin a particular gaming event or session being terminated if it isdetermined that an inappropriate use or activity has occurred or is inthe process of taking place. In this manner, it can be said that ongoingmonitoring of the remote gaming terminal is essentially taking place.

While the repeated verification of a player can take place at regularlytimed intervals, such as every 5 to 10 minutes, for example, it isthought that re-verification at random intervals can result in stricteradherence to proper play by the registered player, as it would then beunknown as to when a re-verification might occur next or is presentlyoccurring. Alternatively, it is possible that the repetition ofobtaining personal information and verifying the player can becontinuous. For example, it can be required that a player simply keephis or her securely worn communication object or device within readingrange of the player tracking device adapted to read player specificinformation. In the event that such a device is a relativelyhigh-powered RFID reading unit, then such a requirement will not tend tobe an issue. Of course, requiring the player to place his or her RFIDdevice in close proximity to the reader on occasion for verificationpurposes may also be desirable, in addition to the use of securelyencrypted verification keys for devices and readers.

Continuing on to FIG. 5, an exemplary database containing associateddata identifiers of various registered active and inactive playersaccording to one embodiment of the present invention is illustrated. Assimilarly illustrated in FIG. 4, database 240 is accessible to one ormore servers, preferably including at least remote player verificationserver 220. Database 240 also preferably has a connection to asub-network 230 of one or more peripheral devices. Contained withindatabase 240 are numerous files or data sets with respect to manydifferent past and present active and inactive players within the remotegaming system, and preferably files for all such players are containedwithin database 240 or a collection of related databases. Such files ordata sets can be classified according to presently active player files241 and presently inactive files 242, with such inactive player filespossibly including files for unregistered players, banned players, knownor suspected cheats or thieves, and/or otherwise unauthorized oruntrustworthy players. Although not necessary, the existence andmaintenance of banned player files can help to track improper or illegalattempts by unauthorized, underage or other undesirable players to playat a remote gaming terminal, and thus aid in the denial of gamingactivities to such individuals and/or reporting of such attempts. It isalso possible that inactive player files include the files of playerswho are not currently active within the remote player verificationsystem, such that any attempt to circumvent the check in process and useplayer data or a player identifier can be more readily detected by thesystem.

Each file or data set 241, 242 preferably contains information regardingthe identity, status and any pertinent restrictions with respect to pastand present active and inactive players, with database 240 preferablybeing adapted to store updated player information for each player overtime as such information changes and/or as players access the remotegaming system in the future. Parameters for storing player informationcan vary widely, and are left up to the discretion of the systemadministrators. As shown in the illustrated example for establishedplayer file 241A, such information can include information for theplayer such as, for example, a player name, account number, paymentmethod, payment identifier, registration date, last check in date,checked in status, permitted game types, banned game types, daily gamingloss limit, cumulative balance limit, activations for associated doorkeys, hotel room number, activations for associated restaurants,activations for associated retail units or establishments, securityhistory, permitted remote locations, and one or more player verificationtypes, files, and established dates among others. Of course, otherpossible player informational items can be stored, and not everyexemplary item listed here is necessary. In addition to containing dataon any unique RFID bracelet currently worn by a given player, theseplayer verification files can also include one or more forms ofbiometric information for the player, such as fingerprint or retinaldata, a voice recording, a visual image or a short movie clip, amongothers.

Such information is preferably stored within a player file within thedatabase, and can be retrieved and utilized by a remote playerverification server 220 and/or a player verification program on anothersystem server or actual gaming machine, if applicable, in order todetermine not only whether the identity of a potential player is correctas claimed, but also whether that player is established and authorizedat a particular remote location, for the requested game, and/or at therequested betting levels, among other factors. In the event that anestablished player defaults on a payment, accesses the remote gamingsystem from an improper location, attempts to aid in the access of anunderage or otherwise unauthorized player, or acts in other ways deemedto be improper, then the file for such a player be appropriately updatedby a system administrator to reflect such information, add restrictions,or alternatively reclassify the file as a banned player file. In suchcases, RFID identifiers, player information and biometric or otherverification file types can be maintained within the database in orderto utilize such information in the event that unauthorized access may beattempted at some point in the future by that individual.

According to one embodiment of the present invention, the providedmethod or system, which preferably includes a network or like structure,involves the ongoing recordation of data or information as playersrepeatedly access the remote gaming system for ordinary remote gameplay. Such live data capture can be used immediately in the event thatan alarm or alert needs to be triggered due to an improper accessattempt or gaming behavior, and can also be stored in one or moredatabases, such as the database described above. In the event that oneor more alarms or alerts are to be triggered in conjunction with use ofthe present remote player verification system, it is preferable thatthis system be at least somewhat intertwined with one or more elementsof a security system or general law enforcement, such that action mightbe taken at the remote gaming terminal, if possible, with therecordation of data advantageously providing evidence of the illegal orimproper activity.

Referring now to FIG. 6, a flowchart of one method of providing remotegaming and remote player verification according to one embodiment of thepresent invention is presented. After a start step 300, a first processstep 302 involves a player registering with the remote gaming service.This can involve, for example, an added procedure upon making a hotelreservation or checking in at a hotel, or may simply involve a playersigning up at a front desk or cashier window of a casino, among otherprocesses. Such a registration step preferably includes establishing aplayer account for a specific player, which might include a manual checkby system administration personnel of an item of player identification,such as a driver's license, and the establishment on a file record of apayment slip or method, such as a credit card number or cancelled bankcheck. A check-in under a previously established player account mightalso be considered as registering with the remote gaming service. Aftera successful registration at process step 302, a subsequent step ofapplying a unique communication object takes place at a process step304. Such an object is preferably an object with an embedded orotherwise associated RFID tag, such as any of the specific examplesdisclosed in greater detail above. This object can be unique in manydifferent ways, and is preferably unique at least with respect to aunique code or identifier contained within the embedded RFID tag. Asdiscussed previously, such an application step preferably involves averified placement of the communication object on the player as a wornarticle, along with an activation of a closed electrical circuit withinthe object and associated with the RFID tag. It is preferable thatactivation or initialization of such an RFID device only be possibleonce the device is in place and worn by the user, such that theft andmisuse of pre-configured or easily activated devices is minimized orrendered impossible. Further, it is preferable that only authorizedpersonnel at an appropriate issuance and activation location canadminister, configure and activate a worn RFID device, to similarlyreduce or eliminate the chances for fraud or misuse.

Once the unique communication object is securely worn by the assignedplayer and its embedded RFID tag and circuit have been activated, theplayer is then free to utilize the worn object in conjunction with someor all of the items within a provided remote gaming system. As discussedabove, such items can include hotel door locks, registers atrestaurants, retail outlets, cafes, and bars, as well as other similaritems, but in any event preferably includes the use of one or moregaming terminals, and in particular remote gaming terminals. Such remotegaming terminals can include, for example, regulated kiosks, isolatedgaming machines away from a casino floor, personal computers, and hotelroom gaming systems, among others. Of course, use of the disclosed RFIDsystem in connection with gaming machines on a casino floor is alsocontemplated, particularly where functions beyond a simple supervisoryverification of player eligibility to participate in a gaming event areutilized. At a subsequent process step 306, the player requests orattempts to play in a gaming event at a particular gaming terminal.Again, such a gaming terminal can be any gaming location at or remotefrom a casino floor or location. For remote gaming terminals, such arequest or attempt can involve, for example, accessing or turning on aremote gaming device in a hotel iTV unit, requesting a remotelydownloadable game at a secondary gaming machine or kiosk, or accessing aremote gaming program from a personal computer or PDA, among others.

A subsequent decision step 308 then involves a decision as to whether anattempted or requested gaming event or channel is restricted. Whilerestricted gaming events or channels can generally include all gamesinvolving a player wager, non-restricted events and channels caninclude, for example, those involving suitable recreational video games,such as in the instance of a hotel room iTV unit. If such an attemptedor requested gaming event or channel is deemed to be restricted, thenthe player verification method proceeds to a process step 310. Shouldthe gaming event or channel be non-restricted, however, then the chartedmethod becomes relatively simple, as the method proceeds to a processstep 320, where the requested gaming event or channel can be accessed,with the requested gaming event commencing as requested. Results couldthen be forwarded to the gaming network at a process step 322, ifnecessary or desired, and presumably no further verification would beneeded or desired at decision step 324. The process would then end atend step 326.

Should the requested channel or gaming event be restricted, then playerverification is necessary, such that a player identifier is obtainedfrom the player worn communication object at a process step 310. Theplayer can thus be prompted or otherwise required to authenticatehimself or herself via the unique RFID tag worn in close proximity tothe player, preferably in a securely worn bracelet, wristwatch or othersecured device, as described above. In one embodiment, such a dataobtaining step can happen in an automated fashion, as a player trackingunit in or connected to the gaming terminal can read the RFID tagembedded within the communication object worn by the player without anyaction required on behalf of the player. In other embodiments, theplayer may be prompted to place the worn communication object in closeproximity to the player tracking device adapted to read the RFID tagtherein, such as by placing a wristwatch, for example, next to thereader. Other player prompts may include a manual input or otherverification regarding the identity of the player, particularly where anindividual player account is accessed.

At a subsequent process step 312, this obtained data is then transmittedto a player verification program at a remote gaming service, remotehost, or within the remote terminal itself, depending upon theparticular application. At the next process step 314, the obtainedinformation or data is then evaluated by the player verificationprogram, which evaluation can involve the reading and interpretation ofpart or all of the code or data identifier submitted by the RFID tagembedded in the device worn by the player. Based upon this reading andinterpretation of information communicated by the RFID device, anassociation with a particular proper player account can be made at afollowing process step 316. A file for this player account can reside onan associated system database, and information from this player accountcan then be used by the evaluating program or programs as part of thefollowing decision step. In simplified embodiments where only minimalplayer eligibility verification is desired, then this associationprocess step 316 may be eliminated.

At the following decision step 318 it is determined whether the dataobtained from the prospective player is verified as acceptable. Such averification may be relatively crude, in that only underage gaming istargeted, or may be refined, in that a determination is made as to theactual identity of the prospective player.

Such an identity determination is desirable in the event that access toplayer accounts is a feature of an implemented method and system. Inparticular, decision step 318 should involve a decision or determinationas to whether the integrity of the closed circuit associated with theRFID communication object has been compromised. In the event that thiscircuit has been broken, such as during the removal of a bracelet orwristwatch, then either no data will be sent, or data indicating that adenial or “NO” decision is in order should be communicated from the RFIDtag. Should the decision be that the data collected from this person isacceptable, then the gaming event is permitted to commence at asubsequent process step 320. In such a case, results of the gaming eventare then subsequently forwarded to the appropriate network server, suchas an accounting server at the next process step 322, and a decisionstep as to whether further player verification is desired is arrived ata subsequent decision step 324. Should further player verification bedesired, then process steps 310 through 324 are repeated as necessary,with the method terminating at an end step 326 if further playerverification is not desired.

In the event that the evaluation of data obtained from the player orprospective player results in an unacceptable player verification atdecision step 318, however, then the method proceeds to a process step319, where a denial of the requested gaming event from commencing orcontinuing occurs. As discussed above, such a decision is especiallyappropriate where the integrity of the communication object has beencompromised, such as by any break of the closed electrical circuitcontained therein. At a subsequent process step 321 an appropriate alertsequence can be initiated, whereby an alarm may sound and the automateddenial and any pertinent information or data can be forwarded, dependingupon the nature and severity of the infraction. Appropriate gamingoperator, security and/or law enforcement personnel can also be notifiedat this stage, if desired. The method then returns to the primaryprocess branch at process step 322, where such results are thenforwarded to the appropriate network server for recording and/oradditional processing.

It is worth noting that additional factors beyond the verification ofRFID information can be involved at the “acceptable?” decision step 318.Such additional factors can include, for example, whether the player isbanned or restricted from playing certain games or denominations,whether the player has exceeded a daily loss limit or maximum balancelimit, or whether the player is the subject of any security inquiries orother potential problems. Additional factors may likewise be added hereas desired for any particular remote gaming operator. In any such case,it may be possible that the response to the decision step 318 is a “NO,”even where the integrity of the communication device is not indicated tohave been compromised, and/or the identity of the player has beenotherwise properly verified.

Of course, one or more of the foregoing steps may be similarlyundertaken in the event that the system is used for a non-gaming event,such as to pay for a retail purchase or restaurant tab, or to open ahotel room door. In such cases it can also be important to be able toobtain identifying code or data from an RFID tag embedded in acommunication object applied to (i.e., worn by) a registered player, toevaluate this obtained data, associate it with a proper player account,make a decision as to whether the data is acceptable, and permit anevent or check out to occur. Other similarly convenient applications ofthe foregoing system may also be implemented as desired by a gamingoperator or other operating entity with an interest in securely andconveniently identifying individuals within a given system in a reliablemanner

Of course, it is also possible that a network not be implemented in thecase of a worn RFID device player authentication system. In fact, even aserver or set of servers need not be used, as a simple system with oneor more device issuing locations and one or more device reading andauthentication units at appropriate gaming or other authenticationlocations can be used. In such simplified systems, the process ofverifying player identities and issuing worn RFID devices would likelybe similar to the process used in a networked system. However, theactual reading and authenticating units at the authentication locationswould simply read worn devices and authenticate use or nonuse of agaming device or other such item without using a network, server orother centralized device to assist in the process. Such simpler systemsmight be implemented where overall cost is a concern, yet anestablishment still would like to be able to authenticate players orusers for particular gaming machines or other items automatically. Forexample, where remote and unsupervised banks of gaming machines mightattract underage users, only users wearing an RFID device would be ableto play such machines.

Although the foregoing invention has been described in detail by way ofillustration and example for purposes of clarity and understanding, itwill be recognized that the above described invention may be embodied innumerous other specific variations and embodiments without departingfrom the spirit or essential characteristics of the invention. Certainchanges and modifications may be practiced, and it is understood thatthe invention is not to be limited by the foregoing details, but ratheris to be defined by the scope of the appended claims.

The Point of Patterns

In various embodiments, a bracelet with an RFID tag, such as bracelet100, or 103, may also feature various patterns, designs, logos, colorschemes, or other visual schemes. Patterns may serve a number offunctions, in various embodiments. A pattern may be ornamental. Thus,for example, patterns on a bracelet may be designed for visual appeal sothat a player will be willing or eager to wear a bracelet.

A pattern may indicate a player status. For example, a bracelet of firstcolor may indicate that a player is a high-roller, while a bracelet of asecond color may indicate that a player is not a high-roller. A statusof a player may also include privileges held by the player. For example,a player of a first status may be granted access to areas that areoff-limits to other players. In various embodiments, the color of abracelet may indicate the age of a player, or an age range of theplayer. For example, the bracelet may allow a determination to be madeas to whether a player is of age to play gambling games, to entercertain clubs, to obtain senior citizen discounts, or to engage in anyother age-dependent activity.

In various embodiments, the color of a bracelet may indicate therelationship of the player with a casino. A bracelet color may indicatethat a player has been a long-time patron of a casino. For example, abracelet of a first color may indicate that a player has made more than20 visits to a casino over a two-year period. A bracelet of a secondcolor may indicate that a player has not made that many visits over thesame period.

A bracelet color may indicate certain privileges of a player. A braceletcolor may indicate that a player has the privilege to enter a certainclub, visit a certain restaurant, visit a certain lounge, visit acertain gaming room (e.g., a high-roller room), or visiting any otherarea. A privilege of a player may include preferential access to arestaurant, theater, or other location. A privilege may include enteringa restaurant before others waiting in line, getting special seating at atheater (e.g., getting front row seating), sitting at a special table ina restaurant, or any other privilege.

A bracelet color may indicate a disability status of a player. Forexample, a player with a certain color bracelet may be granted priorityseating at a gaming device with wheel chair access.

According to various embodiments, a first player may be given a braceletof a first color to indicate a first status of the first player, and asecond player may be given a second bracelet of a second color toindicate a second status of the second player, where the first color isdifferent from the second color, and where the first status is differentfrom the second status.

As will be appreciated, status may be conveyed through differentpatterns printed on a bracelet, through different designs, throughdifferent materials, through different weaving patterns, or through anyother visually distinct schemes.

Advertisements

In various embodiments, advertisements may be printed on a bracelet. Invarious embodiments, any promotion may be printed on a bracelet, such asan indication of 20% off on some product, a political campaign slogan,or any other promotion. In various embodiments, a marketer may pay forthe privilege of placing promotions on bracelets. A marketer may payaccording to various protocols. A marketer may pay a fixed price perbracelet, per hundred bracelets, or per any other quantity of bracelets.In various embodiments, a marketer may pay per time that a bracelet withhis promotion is handed to a player. Thus, for example, a marketer maypay SX per bracelet. In various embodiments, a marketer may payaccording to how long a bracelet was in the possession of a player orplayers. For example, a marketer may pay SX per hour in which a braceletis in the possession of a player. Presumably, the longer a bracelet isin the possession of a player, the more exposure the marketer'spromotion receives.

In various embodiments, a marketer may pay according to the way gamingproceeds while a bracelet is worn. A marketer may pay SX per Y amountwagered while a bracelet is worn. A marketer may pay SX per Y amountwon, SX per Y amount lost, SX per Y gross amount won, SX per Y grossamount lost, SX per Y games played, or according to any other measure.Using one or more of the above schemes, a marketer may tend to pay moreas more amounts are wagered when a bracelet is worn. The marketer maythus pay a premium for promoting to wealthy players or to players with alot of money to spend.

In various embodiments, a marketer may pay based on where bracelets aregiven out. A marketer may pay SX per bracelet for bracelets given out ina first casino, but SY per bracelet for bracelets given out in a secondcasino. For example, a marketer may be willing to pay more to have hispromotions on bracelets in a casino with typically wealthy clientelethan in casinos with typical clientele of average income.

In various embodiments, as described herein, an electrical circuit maybe tripped or broken and may thereby indicate when a bracelet is nolonger being worn, and/or when a bracelet is no longer active. Thetripping or breaking of an electrical circuit may thus mark a time whichmay be used to determine how much a marketer should pay to have hispromotion on a bracelet. For example, a marketer may pay $0.50 per hourthat a bracelet is worn and that the bracelet permits gaming by thewearer. When the bracelet is taken off and the electrical circuit isbroken, the marketer may stop paying. In various embodiments, the timewhen a the circuit is broken is marked. A charge for a marketer is thencomputed based on the time the bracelet was broken, based on the timethe bracelet was first put on, and based on the hourly rate for wearingthe bracelet.

In various embodiments, a marketer may pay to have promotions on abracelet based on the gaming history of the player wearing the bracelet.For example, the greater the lifetime amount wagered by the playerwearing the bracelet, the more a marketer might pay. In variousembodiments, the marketer may pay for putting promotions on braceletsbased on any demographic characteristic of a player. For example, amarketer may pay based on an age, occupation, place of residence, incomelevel, or any other demographic.

In various embodiments a player may be offered a bracelet with apromotion printed on it. The player may decline to wear the bracelet.The player may then receive a bracelet without a promotion. In variousembodiments, the player may be offered a bracelet with a new promotion.

In various embodiments, a player may be paid to wear a bracelet with apromotion on it. The payment may come directly or indirectly from amarketer. For example, marketer may pay the casino $1.00 per hour thebracelet is worn. The player may receive from the casino $0.50 per hourthe bracelet is worn.

In various embodiments, bracelets with certain printed promotions maygrant the player certain privileges. A bracelet with a logo or colorscheme of a restaurant may gain priority entry for a player into therestaurant (e.g., the player may be able to enter without reservations;e.g., the player may be able to get in before others who came first).

Bracelets that Match Clothes

In various embodiments, a player may be offered a bracelet based on thecolor, design, or other feature of an item of clothing the player iswearing. For example, if a player is wearing an orange blouse, theplayer may be offered an orange bracelet. In various embodiments, aplayer may be asked what bracelet he/she wants. The player may be giventhe bracelet with the color, pattern, or other scheme that the playerhas asked for.

Bracelet with Identifier

A bracelet may include a printed identifier, such as a printed numericalidentifier, bar code, or a printed name of a player. The printedidentifier may be used by a restaurant or other merchant to grant theplayer special privileges, such as priority entry. In variousembodiments, a player may use the identifier printed on his bracelet topay. For example, the identifier may be linked to a financial account(e.g., to a room bill; e.g., to a credit card account). In variousembodiments, the player need only show the bracelet to a merchant inorder to pay for an item. The merchant need not necessarily use an RFIDreader to read the RFID tag in the bracelet. In various embodiments, theidentifier may be representative of a player status.

Logos on a Bracelet

In various embodiments, a bracelet may have printed on it one or morelogos. In various embodiments, a bracelet has a logo of a casino printedon it. The logo may be a logo of the casino which is giving out thebracelet. In various embodiments, the bracelet may have printed the logoof a technology provider for a gaming system. For example, if a braceletis used to enable access to a mobile gaming device (e.g., a portable orhandheld gaming device), the bracelet may have printed on it the logo ofthe manufacturer of the mobile gaming device. In addition to, or insteadof logos, names of companies may be printed, in various embodiments. Forexample, a bracelet may have printed on it the name of a casino ortechnology provider.

Battery Iindicator

In various embodiments, a bracelet may include a battery indicatory. Theindicator may show when the battery or other power source of thebracelet is near depletion. In various embodiments, bracelets may not begiven out if their batteries are in a certain state of depletion or more(e.g., if there is less than two hours battery life left on thebracelet's battery). In various embodiments, when a player returns abracelet, the battery in the bracelet may be recharged before thebracelet is given out again to another player.

Sterilization

In various embodiments, a bracelet may be sterilized or otherwisecleansed between when it is returned by one player and when it is givenout to another player. For example, a bracelet may be heated or treatedwith alcohol in order to disinfect the bracelet. In various embodiments,a sterilization process may alleviate concerns about wearing somethingthat someone else has already worn.

How to Make the Designs

In various embodiments, images, logos, colors, patterns, or otherdesigns may be placed on a bracelet using screenprinting, serigraphy,and silkscreening technologies. In various embodiments, designs may beprinted onto a bracelet using any other technology. In variousembodiments, designs may be created by fashioning the bracelet out ofmaterials with particular colors. For example, a black bracelet may becreated using a black material. In various embodiments, designs may bewoven into a bracelet (e.g., if the bracelet is s cloth material). Invarious embodiments, designs may be etched or burnt into a bracelet(e.g., if a bracelet is a plastic material).

Other Things that Happen Continuously Until the Bracelet is Taken Off

In various embodiments, a player may continue to receive entries into adrawing so long as he is wearing a bracelet. For example, a drawing fora $1 million prize may be held at the end of each day. The drawing mayconsist of 6 randomly chosen numbers. To win the prize, a player with anentry must match the 6 randomly chosen numbers with his own entry of 6numbers. In various embodiments, a player may receive an additionalslate of 6 numbers as an entry into the drawing for each minute that hewears a bracelet with an RFID tag. This may encourage the player tocontinue to wear the bracelet. It may also encourage the player tocontinue gaming since gaming may be permissible for the player when heis wearing the bracelet.

In various embodiments, a player may receive comp points just forwearing a bracelet. For example, the player may receive one comp pointper minute in which he is wearing his bracelet.

Instructions for Giving Out the Bracelet

In some embodiments, a casino may put in place processes for giving outcommunications objects. Processes may include processes for determiningwhich of two or more types of communications objects a customer willreceive. Processes may include processes for determining which of two ormore patterns, colors, or designs will appear on a communicationsobject. Processes may include processes for determining a hardwarecomponent that will be included in the communication object given to aplayer. For example, in some cases, an RFID tag may be included, whilein other cases, another type of signaling device may be included.Processes may include processes for determining a signal that should beemitted from a communications object. For example, a first signal maygrant a player with the communications object a first set of privileges,while a second signal may grand the player a second set of privileges.

A decision to give out a particular communications object, or acommunications object under a particular configuration, may be made invarious ways. In various embodiments, the decision may be made by aprogram. The program may reside on a casino device, such as on a casinoserver or such as on a computer terminal at a location wherecommunications objects are given out to players. In some embodiments, adecision may be made by a casino employee. A casino employee may actaccording to predetermined instructions. Thus, the casino employee'sactions may be in accordance with a well defined process for giving outbracelets.

The decision maker, be it a human, program, or other entity, may haveaccess to various information. Such information may include informationabout a player's gaming history, information about which communicationsobjects are currently available to be given out, which communicationsobjects have been given out, how given out communications objects havebeen programmed or configured (e.g., what signals such communicationsobjects have given out), information about what privileges are availableto be conferred by giving out communications objects (e.g., whatrestaurants have special tables that can be reserved for players withparticular communications objects), information about whatcommunications objects have been discarded or destroyed, and any othertype of information.

Which of Two or More Types of Communications Objects

In various embodiments, a communications object may be given out basedon a player status. A player's status may be based on the profitabilityof the player to the casino giving out communications objects. Thus, theplayer's status may be linked to direct or indirect measures of aplayer's profitability, such as how frequently the player has visited acasino, how much the player has gambled at the casino, how much moneythe player has spent at the casino, how many total nights the player hasspent at the casino, how many friends the player has brought to thecasino, how much the player has lost at the casino, and so on. A playerwith high profitability may be given a communications object signifyinga first status. A player with lower profitability may be given acommunications object signifying a second status. For example, a giventhreshold, designated in terms of profitability per unit time, maydivide players of a first status from players of a second status. Theremay be many status levels or tiers. For example, there may be statuslevels corresponding to very profitable players (i.e., profitable forthe casino), status levels corresponding to moderately profitableplayers, and status levels corresponding to minimally profitableplayers.

A player's status may be conveyed visually. The design, structure, orpattern of the communications object may correspond to a player'sstatus, and thus may convey the player's status. For example, an RFIDbracelet colored blue may correspond to a first status, while an RFIDbracelet colored red may correspond to a second status. Status may alsobe conveyed through patterns. For example, a striped wristband on abracelet may correspond to one status, while a solid color wristband ona bracelet may correspond to another status.

Thus, in various embodiments, depending on a player's status, a firstpatterned communications object may be given to the player, or a secondpatterned communications object may be given to the player. For example,the player may receive either a blue bracelet or a red braceletdepending on his status.

In some embodiments, a status may be conveyed electronically. Acommunications device may broadcast a signal indicative of a playerstatus. For example, a communications device may broadcast a sequence ofbits that is recognized by a point-of-sale terminal in a restaurant. Thepoint-of-sale terminal may recognize the sequence of bits as entitlingthe wearer of the communications object to be seated before others whohave come before him.

In some embodiments, a first communications object which broadcasts afirst signal may be given out to a first player with a first status,while a second communications object which broadcasts a second signalmay be given out to a second player with a second status.

In some embodiments, a status may be purely symbolic. For example,wearing a bracelet that shows a player to be of high status may make theplayer feel important, however it may otherwise not grant the player anyspecial privileges.

In some embodiments, status may grant a player special privileges. Astatus may grant a player discounts or other promotions at one or moremerchants, priority access to restaurants, access to special tables atrestaurants, access to special menu items, access to special seats for ashow, access to special rooms in a casino, and so on.

In various embodiments, first type of communications object may bechosen to be given to a player over a second type of communicationsobject based on the number of each type remaining in inventory. Forexample, if a casino or casino desk has 100 communication objects withred wristbands remaining, but only 10 communication objects with bluewristbands remaining, the casino may decide (e.g., a program run on acasino server may decide) to give out a communications object with a redwristband to the next player who needs a communications object. If theplayer then specifically requests a communications object with the bluewristband, the requested communications object may be provided instead.However, the red one may be provided initially. Thus, in someembodiments, a type of communications object for which there are agreater number remaining may be given to a player as a default.

Programming the Bracelet

In some embodiments, a communications object may be programmed orconfigured before or after it is applied. A communications object may beconfigured, for example, to emit a first type of signal indicative of afirst player status. A communications object may, for example, bealternatively configured to emit a second type of signal indicative of aplayer status. Thus, before a communications object is applied, it maybe configured to emit a signal corresponding to a player's status. Insome embodiments, a communications object may be configured after it isapplied. A communications object may be configured to emit a signalwhich conveys any desired information. For example, a communicationsobject may be configured to emit a signal indicative of a player's nameor other player identifying information. A communications object may beconfigured to emit a signal indicating that an associated circuit isclosed or that an associated circuit has been broken.

When a player receives a communications object, either before or afterthe communications object is applied, the player may be asked aboutvarious intentions or preferences of the player. The player may beasked: (a) what type of food he likes; (b) what type of restaurants helikes; (c) what restaurants he would like to eat at; (d) whether helikes buffets; (e) whether he likes shows; (f) what types of shows helikes; (g) what type of foods or drinks he likes to have delivered tohim; (h) what types of games he likes; (i) what gaming machines helikes; (j) what areas of a casino he likes; (k) what types of productshe would like to buy; (l) what merchants he plans to spend at; (m) howmany days he is staying; (n) how much he would like to spend on one ormore items or activities; and any other information about intentions orpreferences.

A player may indicate his preferences to a casino. For example, a playermay fill out a survey at a casino terminal, or may verbally indicatepreferences or intentions to a casino representative, who may then fillin a form for the casino. Once a player's preferences or intentions areknown, a player's communications object may be configured so as to makeit easier for the player to fulfill his intentions, so as to provide athe player with a benefit for pursuing his preferences (e.g., forvisiting a preferred restaurant) or for pursuing his intentions. Aplayer's communications object may be configured to emit a signal whichgrants the player a privilege at a preferred location. For example, thesignal may allow a player to bypass a line for a preferred restaurant,to get a discount at a preferred restaurant, to get a discount at apreferred merchant, to get tickets to a preferred sold-out show, toreceive extra comp points at a preferred game, to visit a preferredmerchant after business hours, to receive a preferred drink deliveredhourly at his gaming device, or to receive any other benefit orprivilege. Thus, a player may be motivated to receive and wear abracelet because the bracelet may grant the player privileges. Further,the player may be motivated to disclose intentions so as to receivebenefits for fulfilling the intentions. A merchant may be willing togrant to the player privileges just so that the player may be morelikely to visit the merchant. Thus, a restaurant device (e.g., apoint-of-sale terminal) may readily accept signals from a communicationsobject of a player and thereby allow the player to bypass a line. Insome embodiments, when a player's communications object is configured toemit a particular signal, one or more merchants, casino devices, orother parties may be informed of the particular signal (e.g., the bitsequence of the particular signal), and may be informed of theprivileges the signal is supposed to signify. Upon receiving the signalfrom a communications object of a proximate player, a merchant may thenactually be willing to provide such privileges.

In various embodiments, merchants, retailers, or other parties mayspecify one or more privileges they are willing to give out. Themerchants, retailers, or other parties may further specify a quantity ofsuch benefits that may be given out. The merchants, retailers, or otherparties may further specify characteristics of players that are toreceive such benefits. For example, a merchant may specify that hewishes for ten 2-for-1 specials on all items for sale to be given out toany player who is 70 years of age or over. Where a merchant hasspecified a limited quantity of a benefit to dispense, the casino maytrack how many of such benefits have already been dispensed and/or howmany are still available to be dispensed. The casino may ask players forvarious information in order to determine whether such players areeligible for benefits from a merchant, retailer, or other entity. If aplayer is eligible, then the player's communication object

In some embodiments, a player may provide a security deposit whenreceiving a communications object. The player may lose all or a portionof the security deposit if he fails to return the communications object.The player may lose all or a portion of the security deposit if he failsto return the communications object by a certain specified time, such asby the end of the day on which he received the communications object.The player may lose all or a portion of the security deposit if he failsto return the communications object within a predetermined amount oftime after the circuit in the communications object has been broken(e.g., after the bracelet has been opened). Taking away a securitydeposit or otherwise applying a fee or penalty may discourage playersfrom transferring communications objects to other players, and therebygrant the other players unwarranted benefits.

Which of Two or More Hardware Configuration will be Given Out

In various embodiments, when a player is to be provided with acommunications object, it may be decided which of two or more hardwareconfigurations of communication object the player will be given. Forexample, a first communications object may include an activetransmitter, while a second communications object may include a passiveRFID tag. In some embodiments, communications objects of differentconfigurations may be given out depending on the stated intentions of aplayer. If a player intends to use a mobile gaming device in areas thatare far from RFID detectors (e.g., on a casino golf course), the playermay be provided with a bracelet with an active transmitter so as to beable to broadcast a signal to more distant receivers. If a playerintends to use a mobile gaming device within the vicinity of RFID tagreaders, the player may be provided with a bracelet with an RFID tag. Ifa player intends to go swimming, the player may be given a bracelet witha water resistant coating around the electronics of the bracelet. If theplayer does not intend to go swimming, a bracelet without waterresistant coating may be given to a player.

The gaming history of a player may include outcomes, results, and otherevents that have occurred in a player's games in the past. The gaminghistory of a player may include information about the following:

-   -   The last outcome achieved    -   The last X outcomes achieved    -   Any games, events, results, or outcomes that have occurred in        the last hour    -   Any games, events, results, or outcomes that have occurred in        the X period of time    -   Any games, events, results, or outcomes that have occurred in a        player's trip, including any aggregate results of the player's        trip (e.g., total winnings for the trip)    -   The player's gross winnings    -   The player's net winnings    -   Outcomes, net winnings, gross winnings, or any other statistic        achieved over the player's lifetime    -   An amount of a buy in (e.g., an amount of money initially        brought to a table by a player)    -   An amount of a cash out (e.g., an amount of a money with which a        player leaves a gaming device, gaming table or gaming session)    -   Jackpots won by the player    -   The largest payouts received    -   Current credit balance    -   Amounts wagered per game    -   Which games were played    -   Playing strategies    -   Number of pay-lines    -   Rate of play    -   Number of games played    -   Number of games played in last X period of time    -   Preferred gaming device    -   Gaming device that gave the player the most favorable results    -   Game opponents    -   Dealers played against    -   Comps awarded

1. (canceled)
 2. An apparatus comprising: at least one processorconfigured to control: obtaining from one or more of communicationobjects, each of the communication objects worn by a respective player,information regarding a specific player, wherein at least one of saidone or more communication objects includes an RFID tag and a temperaturesensor and is adapted to alter a communication pattern thereof inresponse to a change in temperature indicative of removal from a player,and in which the one or more communication objects are of a gamingplayer verification system for use in conjunction with one or moregaming machines adapted for accepting wagers, presenting gaming eventsthereupon and granting monetary awards; verifying whether theinformation regarding said specific player is adequate according to oneor more set criteria for verifying a player; denying initiation orcontinuation of a particular gaming event when a determination, from theinformation, is that the information is unacceptable or insufficientinformation has been obtained; determining an amount of time that the atleast one of said one or more communication objects is worn and anamount wagered during the amount of time; and determining a paymentamount due from a sponsor based on the amount of time and amountwagered.
 3. The apparatus of claim 2, wherein said at least onecommunication object further comprises an object selected from the groupconsisting of a necklace, a collar, a wrist bracelet, a wristwatch, abelt, and an ankle bracelet, and wherein the at least one processor isconfigured to control verifying multiple submissions of informationregarding said specific player during progress of or between one or moregaming events.
 4. A method comprising: controlling, by at least oneprocessor: providing one or more gaming events at a first gaminglocation within a gaming environment, wherein at least one of said oneor more gaming events involves placement of a wager, presentation of agame and grant of a monetary award based upon an outcome of the game;receiving a request by a specific player at said first gaming locationto participate in at least one particular gaming event selected fromsaid one or more gaming events; obtaining information regarding saidspecific player from a communication object worn by said specificplayer; verifying that said information regarding said specific playeris acceptable according to one or more set criteria; permitting said atleast one particular gaming event to commence or continue; determiningan amount of time said specific player wears the communication objectand an amount wagered by the specific player during the amount of time;and charging a sponsor based on the amount of time and the amountwagered.
 5. The method of claim 4, wherein at least a portion of saidinformation regarding said specific player becomes unacceptableaccording to at least one set criterion when said communication objectis no longer worn by said specific player.
 6. The method of claim 4,wherein said communication object is adapted to communicate via radiofrequency waves.
 7. The method of claim 6, wherein said communicationobject comprises an RFID tag.
 8. The method of claim 4, wherein saidcommunication object comprises an object selected from the groupconsisting of a necklace, a collar, a wrist bracelet, a wristwatch, abelt, and an ankle bracelet.
 9. The method of claim 8, wherein saidcommunication object further comprises an RFID tag and a closedelectrical circuit associated with said RFID tag, and the method furthercomprises controlling, by the at least one processor: detecting a breakin said closed electrical circuit; and denying one of said one or moregaming events to commence or continue.
 10. The method of claim 4,further comprising controlling, by the at least one processor,associating said request with a specific player account associated withsaid specific player.
 11. The method of claim 4, further comprisingcontrolling, by the at least one processor, determining whether saidspecific player is authorized to participate in said at least oneparticular gaming event.
 12. The method of claim 4, further comprisingcontrolling, by the at least one processor, subsequently repeated stepsof: obtaining information regarding said specific player from thecommunication object worn by said specific player; verifying that saidinformation regarding said specific player is acceptable according toone or more set criteria; and permitting said at least one particulargaming event to commence or continue.
 13. The method of claim 12,wherein said subsequently repeated steps are continuously performed. 14.The method of claim 12, wherein said subsequently repeated steps areperformed at regular periodic intervals.
 15. The method of claim 12,wherein said subsequently repeated steps are performed at randomintervals.
 16. The method of claim 4, wherein said communication objectcomprises a GPS locating component.