Gaming Machines Having Portable Device Docking Station

ABSTRACT

In one embodiment, an intermediary gaming trusted electronic device for use with an untrusted PED may operate to securely communicate with a gaming apparatus and securely communicate with the associated untrusted PED. The intermediary gaming trusted device is able to support interaction between the gaming apparatus and the associated untrusted PED. In another embodiment, a system to authorize a mobile electronic device to play games of chance may include a gaming system manager and a docking station. The docking station can be configured to: detect whether the mobile electronic device is connected to the docking station; and determine whether the mobile electronic device, or its user, is authorized to play a game of chance on the mobile electronic device.

RELATED APPLICATION(S)

The present application is a continuation of and claims priority to U.S.patent application Ser. No. 16/886,617, filed May 28, 2020, and entitled“Gaming Machines Having Portable Device Docking Station” which is acontinuation of and claims priority to U.S. patent application Ser. No.16/214,123, filed Dec. 9, 2018, and entitled “Portable IntermediaryTrusted Device,” which issued on Jul. 7, 2020, as U.S. Pat. No.10,706,678, which is a continuation of and claims priority to U.S.patent application Ser. No. 15/876,095, filed Jan. 19, 2018, andentitled “Portable Intermediary Trusted Device,” which issued on Jan.22, 2019, as U.S. Pat. No. 10,186,113, which is a continuation of andclaims priority to U.S. patent application Ser. No. 15,400,840, filedJan. 6, 2017, and entitled “Portable Intermediary Trusted Device,” whichissued on Jan. 23, 2018, as U.S. Pat. No. 9,875,609, which is acontinuation of and claims priority to U.S. patent application Ser. No.13/833,116, filed Mar. 15, 2013, and entitled “Portable IntermediaryTrusted Device,” which issued on Feb. 21, 2017, as U.S. Pat. No.9,576,425, all of which are hereby incorporated by reference in theirentireties.

This application is also related to U.S. application Ser. No.13/833,953, filed Mar. 15, 2013, and entitled “Gaming Device DockingStation,” which is hereby incorporated by reference herein in itsentirety for all purposes.

BACKGROUND

Gaming establishments continually try new methods to keep patrons in itsestablishment in order to increase profits. With more and more patronsusing PEDs, mobile gaming is one way to increase profits. However, gamesof chance may not be played on unknown and untrusted PEDs.

It is often the case that people go with friends to gamingestablishments for the purpose of being social and enjoying playinggames of chance in one another's company. However, more than likely, atleast one person in the group will disagree in which activities toengage in. In gaming establishments, one person may want to play videopoker while another would want to play a game of craps. Several otherpeople in the group may even want to play different slot machines. Thiscan be particularly troublesome when the purpose of the excursion is tobe social, yet the people separate in order to engage in theirrespective preferred activities.

There may be times when at least one person in the group is disappointedwith the activity in which the group is engaged in, and it is likelythat significant compromises must be made in order to accommodate allmembers of a group. This can lead to people spending less money in agaming establishment by reducing the desire to engage in the currentactivity for at least one person in the group and/or by quickly taxingthe overall patience of the group which would otherwise be willing toengage in gaming activities for longer periods of time. It may bepreferable to allow at least one or more of the group members to playtheir preferred game of chance on a mobile or portable gaming device inorder to prevent such issues.

SUMMARY

The present invention relates generally to gaming systems. Moreparticularly, the present disclosure relates to use of a portableelectronic device (PED) in a gaming system.

Some embodiments pertain to a network-based gaming system that maysupport interaction between intermediary gaming trusted devices and PEDsand/or gaming machines so that games of chance are able to be securelypresented to the user(s). The intermediary gaming trusted device is ableto support a secure and controlled interaction between a gamingapparatus and an associated unknown, untrusted PED so that theassociated untrusted PED, when coupled to the intermediary gamingtrusted device, becomes a trusted PED and can execute gaming software.

In one embodiment, an intermediary gaming trusted electronic device foruse with an associated untrusted PED may include a position sensorconfigured to acquire position information of the untrusted PED, amemory configured to store at least game session data, a wirelesstransceiver, and a processor configured to at least: (i) securelycommunicate with a gaming apparatus via the wireless transceiver; (ii)securely communicate with the associated untrusted PED; (iii) determinewhether a gaming session is permitted based on the position information;(iv) receive gaming data from the gaming apparatus if it is determinedthat the gaming session is permitted; and (v) transmit presentation datato the associated untrusted PED for presentation on a display of theassociated PED, the presentation data associated with the receivedgaming data, wherein the intermediary gaming trusted device is able tosupport interaction between the gaming apparatus and the associateduntrusted PED so that the associated untrusted PED, when coupled to theintermediary gaming trusted device, can execute a gaming software.

In another embodiment, an intermediary gaming trusted device for usewith an associated untrusted portable electronic device (PED), thedevice including a position sensor configured to acquire positioninformation of the PED, a memory configured to store at least gamesession data, a wireless transceiver, and a processor configured to atleast: (i) securely communicate with the gaming apparatus via thewireless transceiver; (ii) securely communicate with the associateduntrusted PED; (iii) determine whether a gaming session is permittedbased on the position information; (iv) receive gaming data from thegaming apparatus if it is determined that the gaming session ispermitted; and (v) transmit presentation data to the associateduntrusted PED for presentation on a display of the associated PED, thepresentation data being associated with the received gaming data,wherein the associated untrusted PED can be trusted to displaypresentation data so long as the intermediary gaming trusted device iscoupled thereto.

In one embodiment, a system for playing a wagering game includes aportable electronic device (PED) having a display to displaypresentation data associated with gaming data, an intermediary gamingtrusted device configured to securely communicate with the PED via aphysical or wireless means, and a gaming apparatus configured tosecurely communicate with the intermediary gaming trusted device totransmit the gaming data to the intermediary gaming trusted device,wherein the intermediary gaming trusted device is configured to transmitthe presentation data to the PED to allow a user of the PED to executegaming software.

The present invention also relates to docking stations, such as dockingstations configured for use in gaming establishments. The dockingstations can be configured to create trusted mobile electronic deviceswhich can be used to play games of chance in gaming establishments.

In one embodiment, a docking station configured to authorize a mobileelectronic device to play games of chance may have a receiver configuredto receive the mobile electronic device, and a processor configured to:(i) detect whether the mobile electronic device has been received by thereceiver; (ii) receive device information from the mobile electronicdevice if it is detected that the mobile electronic device is receivedby the receiver; (iii) determine whether the games of chance can beplayed on the mobile electronic device based on the received deviceinformation; (iv) authorize the mobile electronic device to play thegames of chance; and (v) transmit gaming data to the mobile electronicdevice if it is determined that the games of chance can be played on themobile electronic device and if the mobile electronic device isauthorized.

In one embodiment, a method for authorizing a mobile electronic deviceto play games of chance using a docking station may include detectingthat the mobile electronic device is coupled to the portable dockingstation, receiving device information from the mobile electronic deviceafter it is detected that the mobile electronic device has been coupledto the portable docking station, determining whether the games of chancecan be played on the mobile electronic device based on the receiveddevice information, authorizing the mobile electronic device for playingthe games of chance, and transmitting gaming data to the mobileelectronic device if it is determined that the games of chance can beplayed on the mobile electronic device and if the mobile electronicdevice is authorized.

In another embodiment, a method for converting a mobile electronicdevice to a trusted mobile electronic device using a portable dockingstation may include detecting that the mobile electronic device iscoupled to the portable docking station, receiving device informationfrom the mobile electronic device after it is detected that the mobileelectronic device has been coupled to the portable docking station,determining whether games of chance can be played on the mobileelectronic device based on the received device information, authorizinga user to play the games of chance on the mobile electronic device,converting the mobile electronic device to the trusted mobile electronicdevice if the user is authorized to play the games of chance on themobile electronic device, and transmitting gaming data to the trustedmobile electronic device if the mobile electronic device is converted toa trusted mobile electronic device.

In one embodiment, a system to authorize a mobile electronic device toplay games of chance may include a gaming system manager and a portabledocking station configured to communicate with the gaming system managerand the mobile electronic device, the portable docking station furtherconfigured to: (i) detect whether the mobile electronic device isconnected to a receiver of the portable docking station; (ii) receivedevice information from the mobile electronic device if it is detectedthat the mobile electronic device is connected to the receiver; (iii)determine whether the games of chance can be played on the mobileelectronic device based on the received device information; (iv)authorize the mobile electronic device to play the games of chance; and(v) transmit gaming data to the mobile electronic device if it isdetermined that the games of chance can be played on the mobileelectronic device and if the mobile electronic device is authorized,wherein once the mobile electronic device is authorized to play thegames of chance, the mobile electronic device is deemed a trusted gamingdevice for use within the gaming system manager of a gamingestablishment.

The present invention provides other hardware configured to perform themethods of the invention, as well as software stored in amachine-readable medium (e.g., a tangible storage medium) to controldevices to perform these methods. These and other features will bepresented in more detail in the following detailed description of theinvention and the associated figures.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated into and constitute apart of this specification, illustrate one or more example embodimentsand, together with the description of example embodiments, serve toexplain the principles and implementations.

In the drawings:

FIG. 1 illustrates an example block diagram of a network-based gamingsystem.

FIGS. 2A-2C illustrate example embodiments of an intermediary trustedgaming device.

FIGS. 3A and 3B illustrate example uses of the intermediary trustedgaming device.

FIG. 4 illustrates an example block diagram of an intermediary trustedgaming device.

FIGS. 5A and 5B illustrate example methods for playing games of chanceusing an intermediary gaming trusted device.

FIG. 6 illustrates an example method for playing a game of chance on aportable electronic device.

FIG. 7 illustrates an example method for playing a game of chance on aportable electronic device.

FIG. 8 illustrates a block diagram of an example system to authorize aportable electronic device to play games of chance.

FIG. 9 illustrates a flowchart of an example method for authorizing amobile electronic device to play games of chance using a dockingstation.

FIGS. 10A-10B illustrate flowcharts of an example method for convertinga mobile electronic device to a trusted mobile electronic device using adocking station.

FIG. 11 illustrates a flowchart of an example method for authorizing amobile electronic device using a docking station.

FIG. 12 illustrates an example docking station.

FIG. 13 illustrates a block diagram of an example docking station.

FIGS. 14A-14B illustrate an example authorization of a mobile electronicdevice to play a game of chance.

FIGS. 15A-15B illustrate an example use of a docking station.

FIGS. 16A-16B illustrate another example use of a document station.

FIGS. 17A-17B illustrate still another example use of a docking station.

FIGS. 18A-18D illustrate yet another example uses of the dockingstation.

DETAILED DESCRIPTION

The present disclosure relates generally to gaming systems. Moreparticularly, the present disclosure relates to use of a portableelectronic device (PED) in a gaming system and even more particularlyuse of a PED in a gaming system with an intermediary trusted device.

Some embodiments are described herein in the context of a portableintermediary trusted device. The following detailed description isillustrative only and is not intended to be in any way limiting. Otherembodiments will readily suggest themselves to such skilled personshaving the benefit of this disclosure. Reference will now be made indetail to implementations as illustrated in the accompanying drawings.The same reference indicators will be used throughout the drawings andthe following detailed description to refer to the same or like parts.

In the interest of clarity, not all of the routine features of theimplementations described herein are shown and described. It will, ofcourse, be appreciated that in the development of any such actualimplementation, numerous implementation-specific decisions must be madein order to achieve the developer's specific goals, such as compliancewith application- and business-related constraints, and that thesespecific goals will vary from one implementation to another and from onedeveloper to another. Moreover, it will be appreciated that such adevelopment effort might be complex and time-consuming, but wouldnevertheless be a routine undertaking of engineering for those ofordinary skill in the art having the benefit of this disclosure.

In accordance with the present invention, the components, process steps,and/or data structures may be implemented using various types ofoperating systems, computing platforms, computer programs, and/orgeneral-purpose machines. In addition, those of ordinary skill in theart will recognize that devices of a less general purpose nature, suchas hardwired devices, field programmable gate arrays (FPGAs),application specific integrated circuits (ASICs), or the like, may alsobe used without departing from the scope and spirit of the inventiveconcepts disclosed herein.

FIG. 1 illustrates an example block diagram of a network-based gamingsystem. The network-based gaming system 100 may support interactionbetween intermediary gaming trusted devices and one or more unknown,untrusted PEDs and/or gaming machines so that games of chance are ableto be securely presented to the user(s). Initially, PEDs are untrusteddevices and are supported or capable to play games of chance. However,once connected to an intermediary gaming trusted device, a PED becomesor is otherwise transformed into a trusted PED and is able to be used toexecute gaming software.

The network-based gaming system 100 may include at least oneintermediary gaming trusted device 114 a-n (where n is an integer). Theintermediary gaming trusted device 114 a-n may be associated with a PED112 a-n via a physical or wireless connection. Although eachintermediary gaming trusted device is illustrated as connecting to onePED, the intermediary gaming trusted device may connect to more than onePED and thus acts as a trusted connection hub for multiple PED's. ThePED 112 a-n may be any portable device having a display such as, forexample, portable telephones, laptops, computers, notebooks, tablets,media players, and the like. Wireless connections may be any knownwireless methods such as a 3G wireless technology, 4G wirelesstechnology, Bluetooth, wireless universal serial bus, near-fieldmagnetic or communication sensor, Fire Wire, WiMax, IEEE 802.11xtechnology, radio frequency, narrow-beam infrared (IR) sensor, RFID tag,WiFi, vibration sensor or any other known wireless methods. Wiredconnections may be any known connection using a wire. The connectionbetween the intermediary gaming trusted device and PED creates a securedpairing environment. Once paired, either a short-range (e.g. Bluetooth)or a long-range (e.g. WiFi) wireless communication tether (e.g. wirelessleash) may be established and maintained during the wirelesscommunication session.

The intermediary gaming trusted device 114 a-n may be configured tocommunicate with a gaming server 102 via a network 106 through a wiredor wireless connection. In the same or another embodiment, theintermediary gaming trusted device 118 associated with the PED 120 mayalso be configured to communicate with a gaming machine 104 through awired or wireless connection. The gaming machine 104 may then connect tothe gaming server 102 via network 106 also through a wired or wirelessconnection. Wireless connections may be any known wireless methods suchas a 3G wireless technology, 4G wireless technology, Bluetooth, wirelessuniversal serial bus, near-field magnetic, Fire Wire, WiMax, IEEE 802.11technology, radio frequency, or any other known wireless methods. Wiredconnections may be any known connection using a wire.

The gaming server 102 may be configured to communicate with a playertracking server 108, location server 120, and an authentication server116. The player tracking server 108 may communicate with a playertracking database 110 to obtain tracked player information such asplayer preferences, games of chance the player likes to play,entertainment the player enjoys, accumulated and used points, number ofwins and losses, and any other similar player information.

The authentication server 116 may be used to authenticate and/or verifythe player, the intermediary gaming trusted device 114 a-n, 118, the PED112 a-n, 120, the gaming machine 104, or perform any otherauthentication or verification functions. Any known authenticationmethod may be used, such as public-private key authenticationalgorithms, random number generators, authentication keys, locationauthentication, and the like.

Each intermediary gaming trusted device 114 a-n, 120 may be assigned toat least one PED 112 a-n, 118. Although each intermediary gaming trusteddevice 114 a-n, 118 is illustrated as being associated with one PED 112a-n, 120, this is not meant to be limiting as the intermediary gamingtrusted device 114 a-n, 118 may be assigned to more than one PED 112a-n, 120 and acts as a trusted gaming hub. Initially, PEDs are unknownand untrusted devices not capable of playing games of chance. However,once connected to an intermediary gaming trusted device, the PED becomesor is otherwise transformed into a trusted PED and is able to be used toplay games of chance. Each intermediary gaming trusted device 114 a-n,118 may have a connector to connect to the PED 112 a-n, 120. Theconnector is further illustrated and described in detail with referenceto FIGS. 2A-C and 3, however, example connectors may be a universalserial bus, male connector, wire, or any other connector able to connectthe intermediary gaming trusted device 114 a-n, 118 with the PED 112a-n, 120 to transmit and receive data.

The intermediary gaming trusted device 114 a-n, 118 may be configured tocommunicate with the authentication server 116. The intermediary gamingtrusted device 114 a-n, 118 may then, in turn, authenticate or verifythe user of PED 112 a-n, 120. The user of the PED 112 a-n, 120 may beauthenticated and/or verified though any known authentication andverification methods such as, for example, biometric verification (i.e.voice recognition, retinal scan, fingerprint verification, and thelike), username, password, account number, and the like. Authenticationof the user may also include authentication via a web-applicationassociated with the gaming establishment and/or uploading authenticationsoftware from the intermediary gaming trusted device 114 a-n, 118 to thePED 112 a-n, 120. In another embodiment, the user of the PED 112 a-n,120 may also obtain the intermediary gaming trusted device 114 a-n, 118from a gaming establishment personnel. The gaming establishmentpersonnel may then authenticate and/or verify the user as well asassociate the intermediary gaming trusted device 114 a-n, 118 to the PED112 a-n, 120.

Once authenticated, the intermediary gaming trusted device 114 a-n, 118may receive gaming data from the gaming server 102. The gaming data mayinclude gaming information or gaming establishment information. Gaminginformation may include, for example, player tracking information,gaming options, data to play a game of chance, funding information oroptions in order to play the games of chance, pay tables, and the like.The gaming establishment information may include, for example,advertisements (e.g. buffet coupons, movie trailers, and the like),tournament information, room booking information, entertainmentinformation, and the like.

The intermediary gaming trusted device 114 a-n, 118 may control andreview the communication between the PED and the gaming server 102. Theintermediary gaming trusted device 114 a-n, 118 may be configured todetermine if the communication meets any desired rules or regulations.For example, if the user selects a “Cash Out” option on the PED 112 a-n,120 for $100,000.00, but the maximum amount to be cashed out is $2,000,the intermediary gaming trusted device 114 a-n, 118 may prevent the userfrom cashing out.

The intermediary gaming trusted device 114 a-n, 118 may transmit thegaming data to the PED 114 a-n, 120 or to the gaming machine 104. Theintermediary gaming trusted device 114 a-n, 118 may enable the PED 112a-n, 120 or the gaming machine 104 to display the gaming data. Forexample, if the gaming data is to play a game of chance, the game ofchance may be displayed on a display of the PED 112 a-n, 120 or thegaming machine 104. The game of chance may be, for example, poker,blackjack, roulette, bingo, keno, video slot machine games, or any othergame of chance. The intermediary gaming trusted device 114 a-n, 118 maybe configured to receive data from the PED 114 a-n, 120 or the gamingmachine 104 that is inputted by the user. The received data may then betransmitted from the intermediary gaming trusted device 114 a-n, 118 tothe gaming server 102 via the network 106 for processing. The receiveddata may be transmitted to the gaming server 102 dynamically orperiodically. In other words, the received data may be transmitted tothe gaming server 102 dynamically or in real-time as it is received bythe intermediary gaming trusted device 114 a-n, 118. Alternatively, thereceived data may be buffered and transmitted to the gaming server 102periodically such as every minute, ten (10) minutes, hour, or any otherpre-defined time period.

The gaming server 102 may then process and store the gaming datareceived from the intermediary gaming trusted device 114 a-n, 118. Thestored gaming data may be used in case of a power outage, weak or lostsignals, or any other loss of gaming data. Once the received gaming datais processed, the gaming server 102 may transmit additional gaming datain response to the processed gaming data. The additional gaming data maybe transmitted, in real-time on an as needed basis or in a bulk transfermode for batch operations, to the intermediary gaming trusted device 114a-n, 118 for display on the PED 114 a-n, 120 or the gaming machine 104so that the player can continue to play the game of chance or receiveadditional gaming information. For instance, a video poker game on thegaming machine 104 may receive one card at a time, or five cards at atime, or ten cards at a time. In another example, a 5-reel slot game mayreceive one random number seed at a time, or 100 random number seeds forthe next 20 games. Player input may include a selection of one of aplurality of games of chance, player preference options, selection ofadvertisement information, or the like.

The gaming server 102 may be configured to determine the location of theintermediary gaming trusted device 114 a-n, 118 using location server120. Any known position or location methods may be used to determine thelocation of the intermediary gaming trusted device 114 a-n, 118 such ascellular positioning, triangulation, global positioning systems, or anyother location or positioning determining method. The position orlocation of the intermediary gaming trusted device 114 a-n, 118 may beobtained periodically or at any pre-defined time period. For example,the intermediary gaming trusted device 114 a-n, 118 may be pinged everythirty (30) seconds, minute, ten minutes, hour, or any periodic timeinterval for its location.

A user may be prevented from playing a game or using the intermediarytrusted gaming device 114 a-n, 118 due to location, time, establishmentrules, government rules, or any other restrictions the gamingestablishment may have or impose. For example, if the user decides toleave the gaming establishment and the location server 120 determinesthat the intermediary gaming trusted device 114 a-n, 118 is outside thegaming establishment, the gaming server 102 may cause to theintermediary gaming trusted device to cease performing any gamingactivities. In another embodiment, if the intermediary trusted gamingdevice 114 a-n, 118 is in a restricted location such as the kids club,the intermediary trusted gaming device 114 a-n may cease performing anygaming activities. In still another example, if the player has played orlost a certain amount of money, the intermediary trusted gaming device114 a-n may cease performing any gaming activities.

FIGS. 2A-3C illustrate example embodiments of an intermediary trustedgaming device. The intermediary trusted gaming device may be a portableelectronic device that a user may carry around. The intermediary trustedgaming device may be any size, but is preferably sized to fit in apocket, purse, or the like.

FIG. 2A illustrates one example of an intermediary trusted gamingdevice. The intermediary trusted gaming device 200 may include a housing210. The housing 210 may have at least a status indicator, such as onelight emitting diode (LED) 204. The LED 204 may be any color and anyshape. The LED 204 may be configured to turn on or off to inform theuser of its activities. For example, a green LED 204 may inform the userthat the intermediary trusted gaming device 200 is properly connected toa PED, such as PED 112 a-n, 118 illustrated in FIG. 1 . In anotherexample, a red LED 204 may inform the user that the intermediary trustedgaming device 200 is low on battery or is not properly connected to thePED, such as PED 112 a-n, 118 illustrated in FIG. 1 . In still anotherexample, the LED 204 may flash to inform the user that the intermediarytrusted gaming device 200 is receiving information either from the PEDand/or gaming server, such as gaming server 102 illustrated in FIG. 1 .Although the LED 204 is illustrated as being positioned on side 212 ofthe intermediary trusted gaming device 200, this is not intended to belimiting as the LED 204 may located anywhere on housing 210. Althoughthe status indicator is described as a simple LED indicator, it may beimplemented as a LCD display for user-friendly text or graphicalinformation.

Intermediary trusted gaming device 200 may have connector 206 configuredto connect to a PED, such as PED 112 a-n, 118 illustrated in FIG. 1 .Connector 206 may be configured to receive or transmit signals or datafrom/to the PED. As illustrated, connector 206 may be a USB connector.Although illustrated as being positioned on side 202 of the intermediarytrusted gaming device 200, this is not intended to be limiting as theconnector 206 may located anywhere on housing 210.

FIG. 2B illustrates another example intermediary trusted gaming device.The intermediary trusted gaming device 220 may include a housing 230,display 224, microphone 228, buttons 226 a-n, and connector 222.Connector 222, similar to connector 206 illustrated in FIG. 2A, may beconfigured to connect to a PED. Display 224 positioned on the housingmay be used to display any desired information. For example, the displaymay display a request for a username and/or password, inform the userthat the intermediary trusted gaming device 220 is properly connected tothe PED, such as PED 112 a-n, 118 illustrated in FIG. 1 , or any otherdesired information.

In one embodiment, display 224 may be a projector. For example, if theimage on the display of the PED is too small, the player may want toview a larger image to play the game of chance. The display may beconfigured to project the game of chance in a larger image and allow theplayer to play the game of chance. The image may be projected on atable, wall, or any other surface or non-surface.

The microphone 228 may be configured to receive audio input, such as,for example, voice input. For example, if the user is unable to inputhis password on the PED, for any reason, the user may speak his passwordinto the microphone. In another example, the microphone 228 may be usedto receive the user's voice to authenticate the user. Instead of themicrophone 228, other biometric sensors such as a camera or afingerprint sensor may also be used for authenticating the user of thePED.

Buttons 226 a-n may be used for any desired purpose or reason. Forexample, buttons 226 a-n may be used to turn the intermediary trustedgaming device 220 on or off. In another example, button 226 a-n may beused to signal a gaming establishment personnel that the player wouldlike to order a drink. In another embodiment, buttons 226 a-n maybe anumeric keypad, or an alphanumeric keypad, or a directional keypad, andthe like.

FIG. 2C illustrates still another example of an intermediary trustedgaming device. Intermediary trusted gaming device 240 is similar tointermediary trusted gaming device 220 illustrated in FIG. 2B, exceptthat intermediary trusted gaming device 240 includes a camera 244.Camera 244 may be used for any desired purpose or reason. For example,camera 244 may be used to authenticate the player (e.g. facialrecognition, compare a picture of the player stored in the playertracking database to a picture taken by the intermediary trusted gamingdevice 240, and the like). In another example, camera 244 may be used toallow a player to take a picture for upload to the player's playertracking account. In still another example, camera 244 may be configuredto recognize player gestures to allow the player to play the games ofchance as opposed to using the PED to input data.

Although intermediary trusted gaming device 200, 220, 240 is illustratedas having a rectangular shape, this is for illustrating purposes and isnot intended to be limiting. Intermediary trusted gaming device 200,220, 240 may be formed of any desired shape such as a circle, triangle,star, shape of the gaming establishment's logo, and the like.Additionally, indicia may be printed anywhere on the housing ofintermediary trusted gaming device 200, 220, 240. For example, theintermediary trusted gaming device 200, 220, 240 may be personalized forthe player. In another example, the intermediary trusted gaming device200, 220, 240 may include indicia of any sponsor, the gamingestablishment, or any other desired indicia.

FIGS. 3A and 3B illustrate example uses of the intermediary trustedgaming device. Referring to FIG. 3A, the intermediary trusted gamingdevice 310 may have a connector 306 configured to connect into anyinput/output (I/O) port 308 of the PED 300 via arrow A. When connectedproperly, PED 300 may have a display 302 to display gaming data receivedfrom the intermediary trusted gaming device 310. Although illustratedwith the use of a connector 306, this is for illustrative purposes onlyand not meant to be limiting as the intermediary trusted gaming device310 may also be configured to communicate with the PED 300 via any knownwireless methods. In other words, intermediary trusted gaming device 310need not be physically connected to the PED 300 to communicate with thePED 300.

Referring now to FIG. 3B, intermediary trusted gaming device 310 mayconnect to a gaming machine 320. In one embodiment, intermediary trustedgaming device 310 may be coupled to a PED 300 and be configured tocommunicate with the gaming device 310 wirelessly. For example, theplayer may want to play the game of chance at the sports bar whilewatching a basketball game. However, after the basketball game ends, theplayer may then want to sit and continue to play the game of chance ongaming machine 320.

In another embodiment, intermediary trusted gaming device 310 may becoupled to the gaming machine 320 itself at I/O port 324. For example,the PED 300 may be low on batteries but the player would like tocontinue to play his game of chance. Thus, the intermediary trustedgaming device 310 may be coupled to the gaming machine 320 at I/O port324. Although the I/O port is illustrated on housing 326 of gamingmachine 320, this is for illustrative purposes only and not meant to belimiting. For example, I/O port 324 may also be positioned on a playertracking device 322 or in any other position on housing 326.

Whether connected to the PED 300 or gaming machine 320, intermediarytrusted gaming device 310 may transmit or receive gaming data to or fromgaming server 325 via any known wireless methods. If the intermediarytrusted gaming device 310 is connected to the PED 300, the gaming datamay be displayed on display 302 of the PED 300. If the intermediarytrusted gaming device 310 is connected to the gaming machine 320, thegaming data may be displayed on display 328 or secondary display 330.

FIG. 4 illustrates an example block diagram of an intermediary trustedgaming device. The intermediary trusted gaming device 400 may have aprocessor 402 configured to communicate with connector 404. Processor402 may be configured to receive and transmit gaming information viaconnector 404 from and to the PED. Processor 402 may also be configuredto communicate with a camera 408, microphone 410, LED 416, display 414,and buttons or switches 420. As stated above with reference to FIG. 2B,camera 408 may be used to authenticate or verify the user. Once apicture of the player is taken using camera 408, processor 402 mayprocess the picture to authenticate or verify the player. Additionally,processor 402 may process the input associated with selected buttons 420or display the desired message or indicia on display 414. As statedabove with reference to FIG. 2C, microphone 410 may also be used toauthenticate or verify the user. Once the player's voice is captured bythe intermediary trusted gaming device 400 via microphone 410, processor402 may process the player's voice to authenticate or verify the player.Additionally, processor 402 may be configured to control LED 416 asdescribed above with reference to FIG. 2A.

Intermediary trusted gaming device 400 may also have at least onetransceiver 412. In one embodiment, the intermediary trusted gamingdevice 400 may have a long-range transceiver, short-range transceiver,or both. The transceiver 412 may be designed to locate the position ofthe intermediary trusted gaming device 400 through use of any knownpositioning methods as discussed in detail above. As stated above,intermediary trusted gaming device 400 may communicate wirelessly andtherefore may have a wireless sensor 422.

Intermediary trusted gaming device 400 may have at least one memory 406.The memory 406 may be any type of memory configured to store gamingapplications, game logic, game session data, authentication software,and the like. For example, the memory may be a non-volatile randomaccess memory (NVRAM), flash memory, dynamic random access memory(“DRAM”)), and the like.

The intermediary trusted gaming device 400 may have a power source 424.The power source 424 may be any known power source such as a battery andmay be powered through any known means. For example, the power source424 may be powered when physically connected to a PED or plugged into apower outlet. When the power source 424 is an internal battery, it maybe recharged when connected to an external power source such as a poweroutlet. Having an internal battery onboard the intermediary trusteddevice 400 may maintain communication to another device in the networksuch as a location server or a game server even when the PED is notpowered on. In one embodiment, the intermediary trusted device 400'sconnection to the location server persists so that its location can beaccounted for at all time.

In one embodiment, intermediary trusted gaming device 400 may also havea cryptographic module 418 to decrypt communication received from agaming server and/or PED and to encrypt communication transmitted to thePED and/or gaming server.

FIGS. 5A and 5B illustrate example methods for playing games of chanceusing an intermediary gaming trusted device. Referring to FIG. 5A, themethod 500 initially begins with associating an intermediary gamingtrusted device with an untrusted PED at 502. The association may occurthrough any known association methods. For example, the gamingestablishment personnel may manually associate the intermediary gamingtrusted device with the untrusted PED. In another example, theintermediary gaming trusted device may be physically coupled to theuntrusted PED.

The associated untrusted PED may be detected at 504 by the intermediarygaming trusted device. If physically coupled to the untrusted PED,detection of the untrusted PED may occur when the intermediary gamingtrusted device is coupled to the PED via the connector of theintermediary gaming trusted device. If communication of the untrustedPED is wireless, detection may occur when the intermediary gamingtrusted device connects wirelessly with the untrusted PED.

A determination of whether the user of the untrusted PED isauthenticated is made at 506. If the user is not authenticated, themethod 500 may end. Authentication and/or verification of the user maybe through any known authentication and verification methods such as,for example, biometric verification (i.e. voice recognition, retinalscan, fingerprint verification, and the like), username, password,account number, and the like. Authentication of the user may alsoinclude authentication via a web-application associated with the gamingestablishment and/or uploading authentication software from theintermediary gaming trusted device to the untrusted PED. In anotherembodiment, the user of the untrusted PED may also obtain theintermediary gaming trusted device from a gaming establishmentpersonnel. The gaming establishment personnel may then authenticateand/or verify the user as well as associate the intermediary gamingtrusted device to the untrusted PED.

If the user of the untrusted PED is authenticated, the intermediarygaming trusted device may be authenticated at 508. If the intermediarygaming trusted device is not authenticated, the method 500 may end.Authentication of the intermediary gaming trusted device may be made byany known means. For example, a unique identifier of the intermediarygaming trusted device may be compared to identifiers stored at a gamingserver. In one embodiment, the intermediary gaming trusted device mayautomatically connect to the gaming server and authenticate itself whenturned on or powered up.

If the intermediary gaming trusted device is authenticated at 508, theintermediary gaming trusted device may receive gaming data at 510 from agaming server. The gaming data may include a plurality of options. Thegaming data may include gaming information or gaming establishmentinformation. Gaming information may include, for example, playertracking information, gaming options, data to play a game of chance,funding information or options in order to play the games of chance, paytables, and the like. The gaming establishment information may include,for example, advertisements (e.g. buffet coupons, movie trailers, andthe like), tournament information, room booking information,entertainment information, and the like.

The untrusted PED becomes or is otherwise transformed into a trusted PEDand the gaming data may then be transmitted to the associated trustedPED. As stated above, the gaming data may include a plurality of gamingoptions, such as, for example, a list of games of chance the user mayselect to play. The games of chance may be any game of chance such asblackjack, poker, roulette, craps, bingo, keno, video slot machines, andthe like. Each list may also include a logo or any other indicia witheach option, a summary of what the option is, a number of times theplayer has played each game of chance, the last time the selection wasmade by the player, or any other desired information.

A selection of one of the gaming options may be detected at 514. Forexample, the player may want and select to play a game of black jack. Inone embodiment, selection of one of the gaming options may be executedby the user on the trusted PED. In another embodiment, selection of oneof the gaming options may be selected on the intermediary gaming trusteddevice. Once a selection has been made, the intermediary gaming trusteddevice may transmit the selected gaming option to the gaming server at516.

Referring now to FIG. 5B, gaming data associated with the selectedgaming option may be received at 518 by the intermediary gaming trusteddevice. For example, gaming data to play black jack may be received ifthe black jack option was selected. The gaming data may then betransmitted to the associated trusted PED for display on a display ofthe associated trusted PED at 520. Once displayed, any input associatedwith the displayed data may be detected at 522. For example, if the datadisplayed was to play a game of chance, inputs associated with playingthe game of chance may be detected such as a wagering amount, spin,hold, and the like. In another example, if the data displayed was apoker tournament, the input may be to register for the tournament. Instill another example, if the displayed data was a coupon to the buffet,the input may be to add the coupon to the player tracking account, printthe coupon, or a cancel the coupon. The user input may be detected fromthe PED or the intermediary gaming trusted device.

If the displayed data was to play a game of chance, the gaming sessiondata may be generated at 524. In one embodiment, the intermediary gamingtrusted device may generate the gaming session data at 524. Forinstance, the number of games played, by whom, where and when, and theaggregate amount of wager since the start of the game session maybecalculated and recorded by the intermediary gaming trusted device. Instill another embodiment, the gaming session data may be generated fromthe gaming server and transmitted to the intermediary gaming trusteddevice. For instance, a random bonus amount and the associatedtriggering event maybe generated by the gaming server and sent to theintermediary gaming trusted device. In yet another embodiment, thegaming session data maybe generated from the user's inputs at the PEDduring the gaming session. Gaming session data may include anyinformation the user inputs while playing a game, number of wins orlosses, amount of funds remaining or added, clicking on advertisements,and any other gaming information generated during the game session. Thegaming session data may be stored at 526. The gaming session data may bestored on the intermediary gaming trusted device periodically ordynamically in real-time. For example, the gaming session data may bestored or saved at predefined intervals such as every minute, everyhour, every ten (10) seconds, and the like. In another example, thegaming session data may be stored dynamically as the gaming session datais generated.

The gaming session data may be transmitted to the gaming server at 528.The gaming session data may be transmitted to the gaming serverperiodically or dynamically in real-time. For example, the gamingsession data may be buffered and transmitted at predefined intervalssuch as every minute, every hour, every ten (10) seconds, and the like.In another example, the gaming session data may be transmitteddynamically in real-time as the gaming session data is generated.

A determination of whether the gaming session is still permitted is madeat 530. Gaming sessions may be permitted based on various factors suchas location of the intermediary gaming trusted device, duration of play,time of day, user information, gaming regulations, amount played, andthe like. For example, if the intermediary gaming trusted device isdetermined to be in the parking lot where playing games of chance arenot permitted, the gaming session will end and the intermediary gamingtrusted device may cease to perform any gaming activities. In anotherexample, if gaming regulations prohibit game play after the loss of $500within a 24-hr period, the gaming session will end and the intermediarygaming trusted device may cease to perform any gaming activities.

If the gaming session is permitted at 530, a determination of whethergaming information is requested is made at 532. If a request for gaminginformation is detected at 532, the intermediary gaming trusted devicemay transmit the request to the gaming server and the method 500 maycontinue at step 512 of FIG. 5A. If a request for gaming information isnot detected or not permitted at 532, a determination of whether thegaming session ends is made at 534. For example, if a cash-out input wasdetected, the gaming session may end. In another example, if the PED hasbeen determined to have been moved out of the allowed area, the gamingsession may also end. In yet another example, if there are no credits toplay the game of chance, the gaming session may end. If the gamingsession did not end at 534, the method may continue at step 522.

If the gaming session is determined to end at 534, the gaming sessiondata may be transmitted to the gaming server at 536. Once the gamingsession data is transmitted to the gaming server at 536, all gamingsession data, gaming data, gaming software, and any other gaming relatedinformation and data are deleted from the associated trusted PED at 538.All gaming related information and data are deleted from the associatedtrusted PED to prevent fraud, hacking, and the like.

FIG. 6 illustrates an example method for playing a game of chance on aportable electronic device. The PED may be connected to an intermediarygaming trusted device to convert or otherwise transform an untrusted PEDto a trusted PED to play games of chance and/or receive gaming relatedinformation. The method 600 initially begins with detection of theintermediary gaming trusted electronic device at 602. If physicallycoupled to the untrusted PED, detection of the intermediary gamingtrusted device occurs when it is coupled to the PED via a connector,wire, or any other means. If communication with the intermediary gamingtrusted device is wireless, detection may occur when the untrusted PEDconnects wirelessly with the intermediary gaming trusted device.

An authentication and/or verification request may be received at 604.The untrusted PED may receive the authentication request from detectedintermediary gaming trusted electronic device. Authentication and/orverification of the user may be through any known authentication andverification methods such as, for example, biometric verification (i.e.voice recognition, retinal scan, fingerprint verification, and thelike), username, password, account number, and the like. Authenticationof the user may also include authentication via a web-applicationassociated with the gaming establishment and/or uploading authenticationsoftware from the intermediary gaming trusted device to the untrustedPED. In another embodiment, the user of the untrusted PED may alsoobtain the intermediary gaming trusted device from a gamingestablishment personnel. The gaming establishment personnel may thenauthenticate and/or verify the user as well as associate theintermediary gaming trusted device to the untrusted PED. In stillanother embodiment, the authentication request may require the untrustedPED to download software or an authentication application. The softwaremay request the user of the untrusted PED to input authentication and/orverification information to authenticate and/or verify the user.

If the untrusted PED is not authenticated at 606, the intermediarygaming trusted device will cease to perform any tasks and the method 600may end. If the untrusted PED is authenticated at 606, the untrusted PEDthen becomes or is otherwise converted to a trusted PED. The trusted PEDmay then receive gaming data from the intermediary gaming trustedelectronic device at 608. The gaming data may have a plurality of gamingoptions. The gaming data may include gaming information or gamingestablishment information. Gaming information may include, for example,player tracking information, gaming options, data to play a game ofchance, funding information or options in order to play the games ofchance, pay tables, and the like. The gaming establishment informationmay include, for example, advertisements (e.g. buffet coupons, movietrailers, and the like), tournament information, room bookinginformation, entertainment information, and the like. The gaming optionsmay include a list of games of chance the player may like to play suchas, blackjack, poker, video slot machines, video games, keno, and thelike. Each list may also include a logo or any other indicia with eachoption, a summary of what the option is, a number of times the playerhas played each game of chance, the last time the selection was made bythe player, or any other desired information.

The gaming data may then be displayed on a display of the trusted PED at610. The user of the trusted PED may select an option associated withthe displayed gaming data which is then transmitted to the intermediarygaming trusted device at 612. The selection may be made using thetrusted PED and/or the intermediary gaming trusted device. For example,if the gaming data was a list of games of chance the play may play, thelist may be displayed on the display of the trusted PED and the use mayselect one of the games of chance to play. The selected game of chancemay be transmitted to the intermediary gaming trusted device. In anotherexample, if the gaming data was a coupon for the buffet, the option maybe to accept or decline the coupon which the user may select. Theselection may then be transmitted to the intermediary gaming trusteddevice.

If the user selected a game of chance to play using the trusted PED,gaming data may be received at 614 to start a gaming session for theplayer. The gaming data may be associated with the selected game ofchance. For example, gaming data to play black jack may be received ifthe black jack option was selected. The gaming data may then betransmitted to the associated trusted PED for display on a display ofthe associated trusted PED at 616. Once displayed, any input associatedwith the displayed gaming data may be detected and transmitted to theintermediary gaming trusted device at 618. For example, if the datadisplayed was to play a game of chance, inputs associated with playingthe game of chance may be detected such as a wagering amount, spin,hold, and the like. In another example, if the data displayed was apoker tournament, the input may be to register for the tournament. Instill another example, if the displayed data was a coupon to the buffet,the input may be to add the coupon to the player tracking account, printthe coupon, or a cancel the coupon. The user input may be detected fromthe PED or the intermediary gaming trusted device.

A determination of whether the gaming session is permitted is made at620. Gaming sessions may be permitted based on various factors such aslocation of the intermediary gaming trusted device, duration of play,time of day, user information, gaming regulations, amount played, andthe like. For example, if the intermediary gaming trusted device isdetermined to be in the parking lot where playing games of chance arenot permitted, the gaming session will end and the intermediary gamingtrusted device may cease to perform any gaming activities. In anotherexample, if gaming regulations prohibit game play after the loss of $500within a 24-hr period, the gaming session will end and the intermediarygaming trusted device may cease to perform any gaming activities.

If the gaming session is permitted at 620, a determination of whetherthe gaming session should end is made at 622. For example, if a cash-outinput was detected, the gaming session may end. In another example, ifthe PED has been determined to have been moved out of the allowed area,the gaming session may also end. In yet another example, if there are nocredits to play the game of chance, the gaming session may end. If thegaming session did not end at 622, the method may continue at step 608.

If the gaming session is determined to end at 622, the gaming sessiondata may be transmitted to the intermediary gaming trusted device at624. Once the gaming session data is transmitted to the intermediarygaming trusted device at 624, all gaming session data, gaming data,gaming software, and any other gaming related information and data aredeleted from the associated trusted PED at 626. All gaming relatedinformation and data are deleted from the associated trusted PED toprevent fraud, hacking, and the like.

FIG. 7 illustrates an example method for playing a game of chance on aportable electronic device. The PED may be configured to communicatewith an intermediary gaming trusted device which is configured tocommunicate with a server. Use of the intermediary gaming trusted deviceconverts an unknown and untrusted PED to a trusted PED to create acontrolled and secure environment where a player may play games ofchance or obtain gaming data. The method 700 initially begins when agaming server receives an authentication request from the intermediarygaming trusted device at 702. The request may be to authenticate theunknown and untrusted PED and/or authenticate the intermediary gamingtrusted device. If neither the untrusted PED and/or intermediary gamingtrusted device are authenticated at 704, the method 700 may end.

Authentication and/or verification of the untrusted PED may be throughany known authentication and verification methods such as, for example,biometric verification (i.e. voice recognition, retinal scan,fingerprint verification, and the like) of the user, username, password,account number, device identifier, digital signature of the operatingsystem and/or the software application, and the like. Authentication ofthe untrusted PED may also include authentication via a web-applicationassociated with the gaming establishment and/or uploading authenticationsoftware from the intermediary gaming trusted device to the untrustedPED. The information received by the gaming server may be authenticatedwith information stored in a database, such as, for example, a playertracking base 110 illustrated in FIG. 1 . Similarly, the intermediarygaming trusted device may have a unique identifier that may be comparedto identifiers stored at the gaming server.

Once authenticated at 704, gaming data may be sent to the intermediarygaming trusted device at 706. The gaming data may include gaminginformation or gaming establishment information. Gaming information mayinclude, for example, player tracking information, gaming options, datato play a game of chance, funding information or options in order toplay the games of chance, pay tables, and the like. The gamingestablishment information may include, for example, advertisements (e.g.buffet coupons, movie trailers, and the like), tournament information,room booking information, entertainment information, and the like. Thegaming data may include a plurality of gaming options, such as, forexample, a list of games of chance the user may select to play. Thegames of chance may be any game of chance such as blackjack, poker,roulette, craps, sicbo, bingo, keno, video slot machines, and the like.Each list may also include a logo or any other indicia with each option,a summary of what the option is, a number of times the player has playedeach game of chance, the last time the selection was made by the player,or any other desired information.

A selected gaming option may be received at 708 from the intermediarygaming trusted device. Gaming data associated with the received selectedgaming option may be transmitted at 710 to the intermediary gamingtrusted device. For example, if the received selected gaming option isto play black jack, the transmitted gaming data may be associated withblack jack. In another example, if the selected gaming option is toobtain movie tickets, the gaming data may be a list of movies playing atthe theater.

The gaming server may periodically or dynamically receive gaming sessiondata at 712 from the intermediary gaming trusted device. Gaming sessiondata may be any session data resulting from playing a game of chancesuch as number of wins or losses, amount of funds remaining or added,clicking on advertisements, and any other gaming information generatedduring the game session. The gaming session data may be receivedperiodically or dynamically in real-time. For example, the gamingsession data may be received at predefined intervals such as everyminute, every hour, every ten (10) seconds, and the like. In anotherexample, the gaming session data may be received dynamically inreal-time as the gaming session data is generated.

A determination of whether the gaming session is permitted is made at714. Gaming sessions may be permitted based on various factors such aslocation of the intermediary gaming trusted device, duration of play,time of day, user information, gaming regulations, amount played, andthe like. For example, if the intermediary gaming trusted device isdetermined to be in the parking lot where playing games of chance arenot permitted, the gaming session will end and the intermediary gamingtrusted device may cease to perform any gaming activities. In anotherexample, if gaming regulations prohibit game play after the loss of $500within a 24-hr period, the gaming session will end and the intermediarygaming trusted device may cease to perform any gaming activities.

In no gaming session is permitted at 714, the method 700 may end. If thegaming session is permitted at 714, a determination of whether gaminginformation is requested is made at 716. If a request for gaminginformation is detected at 716, the method may return to step 706. If arequest for gaming information is not detected at 716, the method 700may end.

Other embodiments are described below are in the context of a gamingdevice docking station. The following detailed description isillustrative only and is not intended to be in any way limiting. Otherembodiments will readily suggest themselves to such skilled personshaving the benefit of this disclosure. Reference will now be made indetail to implementations as illustrated in the accompanying drawings.

FIG. 8 illustrates a block diagram of an example system to authorize aportable electronic device to play games of chance. The system 1100 mayhave a gaming server 1102, a gaming system manager 1104, a network 1106,a plurality of docking stations 1108 a-n (where n is an integer), and aplurality of mobile or portable electronic devices 1110 a-n.

Mobile electronic devices 1110 a-n may be any portable electronic devicesuch as mobile telephones, tablet computers, laptop computers, handheldgaming devices, media players, or any other mobile electronic devicehaving the capability to play a game of chance.

The docking station 1108 a-n may be configured to receive and/or detectwhether the mobile electronic device 1110 a-n is connected to thedocking station 1108 a-n. In one embodiment, the docking station 1108a-n may have a receiver configured to physically receive the mobileelectronic device 1110 a-n. In another embodiment, the mobile electronicdevice may be detected by the docking station via any wired or wirelessmeans. For example, an external connector or dongle may be used toconnect or couple the docking stations 1108 a-n and the mobileelectronic device 1110 a-n. In another example, the mobile electronicdevice 1110 a-n may be detected by the docking station 1108 a-n via anyknown wireless methods or device such as a 3G wireless technology, 4Gwireless technology, Bluetooth, Wireless USB, Near-field magnetic, FireWire, WiMax, IEEE 802.11x technology, radio frequency, and the like.Detection of the mobile electronic device 1110 a-n may be initiated by agraphical user interface on the docking station 108 a-n or the mobileelectronic device 1110 a-n.

Once the mobile electronic device 1110 a-n is detected by the dockingstation 1108 a-n, mobile device information may be transmitted from themobile electronic device 1110 a-n to the docking station 1108 a-n.Mobile device information may be any information necessary to determinewhether the mobile device has the capability to play games of chance,authenticate the mobile electronic device 1110 a-n, validate orauthenticate the user of the mobile electronic device 1110 a-n, or anyother desired information may be transmitted to the docking station 1108a-n. For example, mobile device information may include the mobileelectronic device 1110 a-n capabilities such as power capacity, displayresolution, memory capacity, processor capacity, disk space, softwareversions, and the like. Mobile device information may also includeidentification information such as model information, user information,user preferences, game history, bookmarks for specific games of chance,favorite websites and/or games of chance, favorite meals, shows,buffets, and the like. The mobile device information may allow thegaming establishment to determine the user interests. Knowing the user'sinterests may allow the gaming establishment to transmit any marketing,promotions, coupons, and the like to the mobile electronic device. Forexample, if a user's interest is playing poker games on the mobileelectronic device, the user may be notified of a poker tournament at thegaming establishment. In another example, the user may show an interestin gourmet food. The gaming establishment may transmit, to the mobileelectronic device, a coupon for 50% off at their steak house.

The docking station 1108 a-n may be configured to determine whethergames of chance can be played on the mobile electronic device 1110 a-nbased on the received mobile device information. For example, thedocking station 108 a-n may determine whether the mobile electronicdevice 1110 a-n is compatible with software residing of the dockingstation 1108 a-n, the gaming system manager 1104, or the gaming server1102 in order to play the game of chance. The docking station 1108 a-nmay also be configured to determine whether the mobile electronic device1110 a-n has enough memory to play the games of chance.

In one embodiment, if the mobile electronic device 1110 a-n isphysically connected to docking station 1108 a-n either wired, by aconnector, or received by the receiver of the docking station 1108 a-n,docking station 1108 a-n may be configured to provide a charge to themobile electronic device 1110 a-n. In another embodiment, if the mobileelectronic device 1110 a-n is physically connected to docking station1108 a-n wirelessly, the charge to the mobile electronic device 1110 a-nmay be transmitted via electromagnetic induction or any other similarmethods used to provide charges wirelessly.

Docking station 1108 a-n may be configured to authenticate the mobileelectronic device 1110 a-n to play games of chance based upon thereceived mobile device information. In one embodiment, using a userinterface either on the docking station 1108 a-n and/or on the mobileelectronic device 1110 a-n, the user may be requested to enter ausername, password, account number, player tracking information, facialrecognition information, voice recognition information, or any otherdesired user information. In another embodiment, the desired userinformation necessary to authenticate the mobile electronic device 1110a-n and/or user may be embedded in the mobile electronic device 1110 a-nsuch that authentication may be completed automatically without any userinteraction.

To authenticate the mobile electronic device and the user, the receivedmobile device information may be compared to information stored on thegaming system manager 1104. The docking station 1108 a-n may beconfigured to communicate with the gaming system manager 1104 by anyknown means such as wired or wirelessly. The gaming system manager 1104may have a player tracking server 1103 having a player database 1105configured to store all user information, player tracking information,and any other desired player information. If the received mobileelectronic information matches the information stored in the playertracking server 1103, the docking station 1108 a-n may authenticate themobile electronic device 1110 a-n such that the mobile electronic device1110 a-n then becomes a trusted gaming electronic device.

In one embodiment, the comparison of the received mobile deviceinformation and the information stored on the player tracking server1103 may be conducted at the docking station 1108 a-n. In thisembodiment, the docking station 1108 a-n may be configured to receivethe player tracking information from the gaming system manager 1104. Inanother embodiment, the comparison of the received mobile deviceinformation and the information stored on the player tracking server1103 may be conducted by the gaming system manager 1104. In thisembodiment, the docking station 1108 a-n may be configured to transmitthe received mobile device information to the gaming system manager 1104for comparison. If the information match, the gaming system manager 1104may transmit an authentication signal to the docking station 1108 a-n.If the information does not match, the gaming system manager 1104 maytransmit a rejection signal to the docking station 1108 a-n.

Once authenticated, the docking station 1108 a-n may receive a requestto play a game of chance from the mobile electronic device 1110 a-n. Ifthe docking station 1108 a-n determined that the mobile electronicdevice 1110 a-n is capable of playing games of chance, in oneembodiment, the docking station 1108 a-n may transmit the request forthe game of chance to the gaming system manager 1104. The requested gameof chance data may be obtained from the gaming server 1102 andtransmitted to the mobile electronic device 1110 a-n. In anotherembodiment, the docking station 1108 a-n may determine whether therequested game of chance is stored on the docking station 1108 a-n. Ifthe docking station 1108 a-n determined that the requested game ofchance is stored on the docking station 1108 a-n, the docking station1108 a-n may transmit the requested game of chance data to the mobileelectronic device 1110 a-n.

The game of chance data may be downloaded and stored on the mobileelectronic device 1110 a-n. In another embodiment, the game of chancedata may be streamed to the mobile electronic device 1110 a-n, eitherfrom the docking station 1108 a-n or the gaming system manager 1104. Inthis embodiment, user input used to play the game of chance may betransmitted to the docking station 1108 a-n or the gaming system manager1104. User input may be received from the mobile electronic device 1110a-n and/or the docking station 1108 a-n.

As the game of chance is played, game session data may be periodicallytransmitted to the docking station 1108 a-n. Game session data may betransmitted at any desired time. For example, game session data may betransmitted every thirty seconds, every minute, every fifteen minutes,every hour, or at designated time intervals such as between 1 pm-3 pm,and the like. In one embodiment, game session data may be stored at thedocking station 1108 a-n. In another embodiment, the game session datamay be received by the docking station 1108 a-n and transmitted to thegaming system manager 1104. In still another embodiment, the gamesession data may be directly received by the gaming system manager 1104from the mobile electronic device 1110 a-n. Game session data mayinclude any data produced during the game play such as game state data,game history data, account data, coins in and out, credits obtained orused, bonuses received, and any other game data. Game session data maybe used in case of a power failure by the docking station or mobileelectronic device, malfunction of the docking station or mobileelectronic device, or any other reasons. The game session data may beused recreate the gaming sessions to determine if the player won orlost, the amount of credits remaining, if the player was cheating, orany other game session information.

Since a player may want to move about the gaming establishment (e.g., tosee a show, eat dinner, watch their friends play at a table game orother gaming machine, etc.) the mobile electronic device 1110 a-n may beautomatically authenticated or received at another docking station 1108a-n located near the player. For example, if the player was originallyauthenticated by a docking station 1108 a-n located at the bar and isnow eating dinner at the buffet, the mobile electronic device 1110 a-nmay be automatically authenticated by a docking station located nearestthe buffet. Thus, once a mobile electronic device 1110 a-n has beenauthenticated by one docking station 1108 a-n, the mobile electronicdevice 1110 a-n is now deemed a trusted gaming device and may beautomatically authenticated when connecting to another docking station1108 a-n within the gaming establishment.

The mobile electronic device 1110 a-n may be configured to communicatewith the second docking station 1108 a-n similar to how it wasconfigured to communicate with the original docking station 1108 a-n(i.e. wirelessly, wired, physically received in a receiver, and/or useof an external connector). The second docking station 1108 a-n may alsobe configured to receive mobile device information from the mobileelectronic device 1110 a-n, transmit the received mobile deviceinformation to the gaming system manager 1104, transmit and receivegaming session data, and any other desired operations. The seconddocking station 1108 a-n and/or gaming system manager 1104 may determinewhether the mobile electronic device 1110 a-n was previously connectedto another portable docking station 1108 a-n within the gamingestablishment based upon the received mobile device information.

FIG. 9 illustrates a flowchart of an example method for authorizing amobile electronic device to play games of chance using a dockingstation. A mobile electronic device must be authorized, authenticated,and/or validated by a docking station prior to becoming a trusted devicethat may be used to play games of chance. Mobile electronic devices maybe any portable electronic device such as mobile telephones, tabletcomputers, laptop computers, handheld gaming devices, media players, orany other mobile electronic device having the capability to play a gameof chance.

Method 1200 starts with detecting a mobile electronic device at 1202.The docking station (e.g., docking station 1108 a-n illustrated in FIG.8 ) may be configured to receive and/or detect whether the mobileelectronic device is connected to the docking station. In oneembodiment, the docking station may have a receiver configured tophysically receive the mobile electronic device. In another embodiment,the mobile electronic device may be detected by the docking station viaany wired or wireless means. For example, an external connector ordongle may be used to connect or couple the docking stations and themobile electronic device. In another example, the mobile electronicdevice may be detected by the docking station via any known wirelessmethods or device such as a 3G wireless technology, 4G wirelesstechnology, Bluetooth, Wireless USB, Near-field magnetic, Fire Wire,WiMax, IEEE 802.11x technology, radio frequency, and the like. Detectionof the mobile electronic device may be initiated by a graphical userinterface on the docking station or the mobile electronic device.

Device information may be obtained from the mobile electronic device at1204. Mobile device information may be any information necessary todetermine whether the mobile device has the capability to play games ofchance, authenticate the mobile electronic device, validate orauthenticate the user of the mobile electronic device, or any otherdesired information may be transmitted to the docking station. Forexample, mobile device information may include the mobile electronicdevice capabilities such as power capacity, display resolution, memorycapacity, processor capacity, disk space, software versions, and thelike. Mobile device information may also include identificationinformation such as model information, user information, userpreferences, game history, bookmarks for specific games of chance,favorite websites and/or games of chance, favorite meals, shows,buffets, and the like. The mobile device information may allow thegaming establishment to determine the user interests. Knowing the user'sinterests may allow the gaming establishment to transmit any marketing,promotions, coupons, and the like to the mobile electronic device. Forexample, if a user's interest is playing poker games on the mobileelectronic device, the user may be notified of a poker tournament at thegaming establishment. In another example, the user may show an interestin gourmet food. The gaming establishment may transmit, to the mobileelectronic device, a coupon for 50% off at their steak house.

A determination of whether the mobile electronic device is acceptablemay be made at 1206. In other words, a determination of whether games ofchance can be played on the mobile electronic device based on thereceived mobile device information. The docking station can determinewhether the mobile electronic device is acceptable in terms of itstechnical specifications to play games of chance based on the mobiledevice information provided by the mobile electronic device. Forexample, the docking station and/or gaming system manager (e.g., gamingsystem manager 1104 illustrated in FIG. 8 ) may determine whether themobile electronic device is compatible with software residing of thedocking station, the gaming system manager, or the gaming server (e.g.,gaming server 1102 illustrated in FIG. 8 ) in order to play the game ofchance. The docking station may also be configured to determine whetherthe mobile electronic device has enough memory to play the games ofchance. In another example, a game of chance may require that a mobileelectronic device run a Macintosh operating system, have at least twogigabytes of memory, and have at least four hundred seventy kilobytes ofdrive space free. If the mobile electronic device cannot satisfy thoserequirements, the mobile electronic device may not be allowed to playgames of chance and thus, not be an acceptable mobile electronic device.

If the mobile electronic device is determined to be an acceptable deviceat 1206 a determination of whether the mobile electronic device iscurrently authenticated may be made at 1208. The mobile electronicdevice may have been previously authenticated by another docking stationwithin the gaming establishment. Since a player may want to move aboutthe gaming establishment (e.g., to see a show, eat dinner, watch theirfriends play at a table game or other gaming machine, etc.) the mobileelectronic device may be automatically authenticated or received at asecond docking station located near the player. For example, if theplayer was originally authenticated by a docking station located at thebar and is now eating dinner at the buffet, the mobile electronic devicemay be automatically authenticated by a docking station located nearestthe buffet. Thus, once a mobile electronic device has been authenticatedby one docking station, the mobile electronic device is now deemed atrusted gaming device and may be automatically authenticated whenconnecting to another docking station within the gaming establishment.

The mobile electronic device may be configured to communicate with thesecond docking station similar to how it was configured to communicatewith the original docking station (i.e. wirelessly, wired, physicallyreceived in a receiver, and/or use of an external connector). The seconddocking station may also be configured to receive mobile deviceinformation from the mobile electronic device, transmit the receivedmobile device information to the gaming system manager, transmit andreceive gaming session data, and any other desired operations. Thesecond docking station and/or gaming system manager may determinewhether the mobile electronic device was previously connected to anotherportable docking station within the gaming establishment based upon thereceived mobile device information.

If the mobile electronic device is determined to be currentlyauthenticated at 1208, a gaming session may be created for the mobileelectronic device at 1214 at the second docking station. If the mobileelectronic device is determined to not be currently authenticated at1208, the mobile electronic device may be authenticated at 1210.

Docking station may be configured to authenticate the mobile electronicdevice to play games of chance based upon the received mobile deviceinformation. In one embodiment, using a user interface either on thedocking station and/or on the mobile electronic device, the user may berequested to enter a username, password, account number, player trackinginformation, facial recognition information, voice recognitioninformation, or any other desired user information. In anotherembodiment, the desired user information necessary to authenticate themobile electronic device and/or user may be embedded in the mobileelectronic device such that authentication may be completedautomatically without any user interaction.

To authenticate the mobile electronic device and the user, the receivedmobile device information may be compared to information stored on thegaming system manager. The docking station may be configured tocommunicate with the gaming system manager by any known means such aswired or wirelessly. The gaming system manager may have a playertracking server (e.g., player tracking server 1103 illustrated in FIG. 8) having a player database configured to store all user information,player tracking information, and any other desired player information. Adetermination of whether the mobile electronic device is authenticatedmay be made at 1211. If the received mobile electronic informationmatches the information stored in the player tracking server, thedocking station may authenticate the mobile electronic device at 1211such that the mobile electronic device then becomes a trusted gamingelectronic device that may be used to play games of chance. If thereceived mobile electronic information does not match the informationstored in the player tracking server, the docking station may notauthenticate the mobile electronic device at 1211 and the method 1200may end.

In one embodiment, the comparison of the received mobile deviceinformation and the information stored on the player tracking server maybe conducted at the docking station. In this embodiment, the dockingstation may be configured to receive the player tracking informationfrom the gaming system manager. In another embodiment, the comparison ofthe received mobile device information and the information stored on theplayer tracking server may be conducted by the gaming system manager. Inthis embodiment, the docking station may be configured to transmit thereceived mobile device information to the gaming system manager forcomparison. A determination of whether the mobile electronic device isauthenticated may be made at 1211. If the information matches, thegaming system manager may transmit an authentication signal to thedocking station and the mobile electronic device may be authenticated at1211. If the information does not match, the gaming system manager maytransmit a rejection signal to the docking station and the mobileelectronic device may not be authenticated at 1211 and the method 1200may end.

If the mobile electronic device is authenticated at 1211, dockingstation may configure the mobile electronic device to play the games ofchance at 1212. In one example, space in the memory of the mobileelectronic device may be dedicated for use to play the game of chance.In another example, secure software to prevent cheating, hacking, and/orto comply with any gaming regulations or laws may be required to bedownloaded to the mobile electronic device.

A gaming session may then be created for the mobile electronic device at1214. For example, creating a gaming session may include creating aplayer tracking account, if no player traction account was created forthe user. In another example, creating a gaming session may includecreating an account for the mobile electronic device to save and storegame session data. The game session data stored in the gaming databasemay include game state data, game history data, account data, and thelike. Game state data may show a position in a game, game progress, acurrent account balance, active bets placed, pending game outcomes, andthe like. The game history data may include games of chance played,wagers made, past account balances, game progress, outcomes of games ofchance, and the like. Game session data may be used in case of a powerfailure by the docking station or mobile electronic device, malfunctionof the docking station or mobile electronic device, or any otherreasons. The game session data may be used recreate the gaming sessionsto determine if the player won or lost, the amount of credits remaining,if the player was cheating, or any other game session information.

In still another example, creating the gaming session may includetransmitting a list of the games of chance, establishing a link to aplayer tracking account, and any other desired actions to create agaming session. The list of games of chance may be customized based uponthe user interests, randomly provided, include a summary of each game ofchance, and any other information about each of the games of chance. Thelist of the games of chance may be presented on either the mobileelectronic device or the docking station.

Creating the gaming session may also allow the user to easily access andtransfer funds to play the game of chance and/or cash out the remainingfunds in the gaming session. For example, the gaming session may storethe amount of funds received and remaining for the gaming session.

In one embodiment, the funds stored in the gaming session may be used toplay the games of chance. In another embodiment, the funds stored in thegaming session may be used for non-gaming purposes, such as paying for ahotel stay, watch a movie, eat at the buffet, play bowling, and anyother purchases.

At least one game of chance may be selected at 1216. Using the mobileelectronic device and/or the docking station, the player may select agame of chance to play. If selected using the mobile electronic device,a request for the selected game of chance may be received by the dockingstation at 1217. If selected using the docking station, a request forthe selected game of chance may be received by to the gaming systemmanager at 1217.

The requested game of chance may be transmitted to the mobile electronicdevice at 1218. The requested game of chance data may be obtained fromthe gaming server and transmitted to the mobile electronic device. Inanother embodiment, the docking station may determine whether therequested game of chance is stored on the docking station. If thedocking station determines that the requested game of chance is storedon the docking station, the docking station may transmit the requestedgame of chance data to the mobile electronic device.

The game of chance data may be downloaded and stored on the mobileelectronic device. In another embodiment, the game of chance data may bestreamed to the mobile electronic device, either from the dockingstation or the gaming system manager. In this embodiment, user inputused to play the game of chance may be transmitted to the dockingstation or the gaming system manager. User input may be received fromthe mobile electronic device and/or the docking station.

FIGS. 10A-10B illustrate flowcharts of an example method for convertinga mobile electronic device to a trusted mobile electronic device using adocking station. As illustrated in FIG. 10A, the method 1300 may startwith detecting a mobile electronic device at 1302. A mobile electronicdevice must be authorized, authenticated, and/or validated by a dockingstation in order to become a trusted device capable of being used toplay games of chance. Mobile electronic devices may be any portableelectronic device such as mobile telephones, tablet computers, laptopcomputers, handheld gaming devices, media players, or any other mobileelectronic device having the capability to play a game of chance.

Method 1300 starts with detecting a mobile electronic device at 1302.The docking station (e.g., docking station 1108 a-n illustrated in FIG.8 ) may be configured to receive and/or detect whether the mobileelectronic device is connected to the docking station. In oneembodiment, the docking station may have a receiver configured tophysically receive the mobile electronic device. In another embodiment,the mobile electronic device may be detected by the docking station viaany wired or wireless means. For example, an external connector ordongle may be used to connect or couple the docking stations and themobile electronic device. In another example, the mobile electronicdevice may be detected by the docking station via any known wirelessmethods or device such as a 3G wireless technology, 4G wirelesstechnology, Bluetooth, Wireless USB, Near-field magnetic, Fire Wire,WiMax, IEEE 802.11x technology, radio frequency, and the like. Detectionof the mobile electronic device may be initiated by a graphical userinterface on the docking station or the mobile electronic device.

Mobile device information may be obtained from the mobile electronicdevice at 1304. Mobile device information may be any informationnecessary to determine whether the mobile device has the capability toplay games of chance, authenticate the mobile electronic device,validate or authenticate the user of the mobile electronic device, orany other desired information may be transmitted to the docking station.For example, mobile device information may include the mobile electronicdevice capabilities such as power capacity, display resolution, memorycapacity, processor capacity, disk space, software versions, and thelike. Mobile device information may also include identificationinformation such as model information, user information, userpreferences, game history, bookmarks for specific games of chance,favorite websites and/or games of chance, favorite meals, shows,buffets, and the like. The mobile device information may allow thegaming establishment to determine the user interests. Knowing the user'sinterests may allow the gaming establishment to transmit any marketing,promotions, coupons, and the like to the mobile electronic device. Forexample, if a user's interest is playing poker games on the mobileelectronic device, the user may be notified of a poker tournament at thegaming establishment. In another example, the user may show an interestin gourmet food. The gaming establishment may transmit, to the mobileelectronic device, a coupon for 50% off at their steak house.

A determination of whether the mobile electronic device is acceptablemay be made at 1306. In other words, a determination of whether games ofchance can be played on the mobile electronic device based on thereceived mobile device information. The docking station can determinewhether the mobile electronic device is acceptable in terms of itstechnical specifications to play games of chance based on the mobiledevice information provided by the mobile electronic device. Forexample, the docking station and/or gaming system manager (e.g., gamingsystem manager 1104 illustrated in FIG. 8 ) may determine whether themobile electronic device is compatible with software residing of thedocking station, the gaming system manager, or the gaming server (e.g.,gaming server 1102 illustrated in FIG. 8 ) in order to play the game ofchance. The docking station may also be configured to determine whetherthe mobile electronic device has enough memory to play the games ofchance. In another example, a game of chance may require that a mobileelectronic device run a Macintosh operating system, have at least twogigabytes of memory, and have at least four hundred seventy kilobytes ofdrive space free. If the mobile electronic device cannot satisfy thoserequirements, the mobile electronic device may not be allowed to playgames of chance and thus, not be an acceptable mobile electronic device.

If the mobile electronic device is determined to be an acceptable deviceat 1306 a determination of whether the mobile electronic device iscurrently authenticated may be made at 1308. The mobile electronicdevice may have been previously authenticated by another docking stationwithin the gaming establishment. Since a player may want to move aboutthe gaming establishment (e.g., to see a show, eat dinner, watch theirfriends play at a table game or other gaming machine, etc.) the mobileelectronic device may be automatically authenticated or received at asecond docking station located near the player. For example, if theplayer was originally authenticated by a docking station located at thebar and is now eating dinner at the buffet, the mobile electronic devicemay be automatically authenticated by a docking station located nearestthe buffet. Thus, once a mobile electronic device has been authenticatedby one docking station, the mobile electronic device is now deemed atrusted gaming device and may be automatically authenticated whenconnecting to another docking station within the gaming establishment.

The mobile electronic device may be configured to communicate with thesecond docking station similar to how it was configured to communicatewith the original docking station (i.e. wirelessly, wired, physicallyreceived in a receiver, and/or use of an external connector). The seconddocking station may also be configured to receive mobile deviceinformation from the mobile electronic device, transmit the receivedmobile device information to the gaming system manager, transmit andreceive gaming session data, and any other desired operations. Thesecond docking station and/or gaming system manager may determinewhether the mobile electronic device was previously connected to anotherportable docking station within the gaming establishment based upon thereceived mobile device information.

A determination of whether the mobile electronic device is authenticatedmay be made at 1310. Docking station may be configured to authenticatethe mobile electronic device to play games of chance based upon thereceived mobile device information. In one embodiment, using a userinterface either on the docking station and/or on the mobile electronicdevice, the user may be requested to enter a username, password, accountnumber, player tracking information, facial recognition information,voice recognition information, or any other desired user information. Inanother embodiment, the desired user information necessary toauthenticate the mobile electronic device and/or user may be embedded inthe mobile electronic device such that authentication may be completedautomatically without any user interaction.

To authenticate the mobile electronic device and the user, the receivedmobile device information may be compared to information stored on thegaming system manager. The docking station may be configured tocommunicate with the gaming system manager by any known means such aswired or wirelessly. The gaming system manager may have a playertracking server (e.g., player tracking server 1103 illustrated in FIG. 8) having a player database configured to store all user information,player tracking information, and any other desired player information.If the received mobile electronic information matches the informationstored in the player tracking server, the docking station may determinethat the mobile electronic device is authenticated at 1310. If thereceived mobile electronic information does not match the informationstored in the player tracking server, the mobile electronic device isnot authenticated at 1310 and the method 1300 may end.

In one embodiment, the comparison of the received mobile deviceinformation and the information stored on the player tracking server maybe conducted at the docking station. In this embodiment, the dockingstation may be configured to receive the player tracking informationfrom the gaming system manager. In another embodiment, the comparison ofthe received mobile device information and the information stored on theplayer tracking server may be conducted by the gaming system manager. Inthis embodiment, the docking station may be configured to transmit thereceived mobile device information to the gaming system manager forcomparison. If the information matches, the gaming system manager maytransmit an authentication signal to the docking station and adetermination of whether the mobile electronic device is a trusteddevice may be made at 1312. If the information does not match, thegaming system manager may transmit a rejection signal to the dockingstation and the method 1300 may end.

In order to become a trusted device, the mobile electronic device mustbe authenticated and secured. Thus, if the mobile electronic device isdetermined to be authenticated at 1310, a determination of whether themobile electronic device is trusted may be made at 1312. To beconfigured to play games of chance, the mobile electronic device mustprovide for security features to prevent cheating, hacking, and/or tocomply with any gaming regulations or laws. In one embodiment, thesecurity features may deny access to all programs or applications on themobile electronic device except the programs or applications necessaryto play the game of chance. If the mobile electronic device contains thedesired security features, the mobile electronic device may beconsidered a trusted device at 1312.

If the desired security features are not located on the mobileelectronic device, the device is deemed to not be a trusted device at1312. If not a trusted device at 1312, the mobile electronic device maybe converted to a trusted mobile electronic device at 1314. The dockingstation and/or the gaming system manager may determine what securesoftware and/or applications are necessary for the mobile electronicdevice to have to become a trusted device. The secure software may thenbe downloaded to the mobile electronic device. Once the secured softwareand/or applications are downloaded and saved to the mobile electronicdevice, the mobile electronic device may be converted to a trusteddevice at 1314.

If the mobile electronic device is already trusted, the docking stationmay create a gaming session for the trusted mobile electronic device at1316. For example, creating a gaming session may include creating aplayer tracking account, if the player did not have an existing playertracking account. In another example, creating a gaming session mayinclude creating an account for the mobile electronic device to save andstore game session data. The game session data stored in the gamingdatabase may include game state data, game history data, account data,and the like. Game session data may be used in case of a power failureby the docking station or mobile electronic device, malfunction of thedocking station or mobile electronic device, or any other reasons. Thegame session data may be used recreate the gaming sessions to determineif the player won or lost, the amount of credits remaining, if theplayer was cheating, or any other game session information.

Game state data may show a position in a game, game progress, a currentaccount balance, active bets placed, pending game outcomes, and thelike. The game history data may include games of chance played, wagersmade, past account balances, game progress, outcomes of games of chance,and the like. In still another example, creating the gaming session mayinclude transmitting a list of the games of chance that may be played onthe mobile electronic device, establishing a link to a player trackingaccount, and any other desired actions to create a gaming session. Thelist of games of chance may be customized based upon the user interests,randomly provided, include a summary of each game of chance, and anyother information about each of the games of chance. The list of thegames of chance may be presented on either the mobile electronic deviceor the docking station.

A request for a fund transfer may be received at 1318 by the dockingstation. The fund transfer amount may include a fund amount, the amountrequested to be transferred and used to play the game of chance, and afund account. The fund account may be a bank, the gaming establishmentwhere the player has a player tracking account, or any other fundaccount or source from where the fund amount may be obtained. The fundamount may also be used for non-gaming purposes, such as purchasingdrinks, paying for a hotel stay, and the like. The fund amount may bemonetary or non-monetary, such as credits, player tracking points, andthe like.

In one embodiment, the docking station may transmit the fund transferrequest to the fund account. In another embodiment, the docking stationmay transmit the fund transfer request to the gaming management server.The gaming management server may then transmit the fund transfer requestto the fund account.

A determination of whether funds were transferred may be made at 1320.If the docking station receives the fund amount, the fund amount may besaved to a player account at 1322. The player account may be theplayer's tracking account, the gaming session account, or any otherplayer account. If no fund amount was received at the docking station,the method 1300 may end. The docking station may not receive the fundamount for various reasons such as an insufficient account balance, theplayer leaves the gaming establishment prior to the transfer of funds,the mobile electronic device is no longer a trusted device, the playerusing the mobile electronic device is underage, the mobile electronicdevice is incapable of playing games of chance, the request fund amountis prohibited by law, the player has already requested the maximumamount allowed by law, the mobile electronic device has a low batterycharge, or any other reasons.

Having created the gaming session at 1316, the user may easily accessand transfer funds to play the game of chance and/or cash out theremaining funds in the gaming session. For example, the gaming sessionmay store the amount of funds received and remaining for the gamingsession.

At least one game of chance selection may be detected at 1324. A playermay select a game of chance to play on the mobile electronic deviceusing controls on the mobile electronic device and/or the dockingstation. If selected using the mobile electronic device, a request forthe selected game of chance may be transmitted at 1217 to the dockingstation. If selected using the docking station, a request for theselected game of chance may be transmitted at 1217 to the gaming systemmanager.

Referring now to FIG. 10B, the requested game of chance may betransmitted to the mobile electronic device at 1332. The requested gameof chance data may be obtained from the gaming server and transmitted tothe mobile electronic device. In another embodiment, the docking stationmay determine whether the requested game of chance is stored on thedocking station. If the docking station determines that the requestedgame of chance is stored on the docking station, the docking station maytransmit the requested game of chance data to the mobile electronicdevice.

The game of chance data may be downloaded and stored on the mobileelectronic device. In another embodiment, the game of chance data may bestreamed to the mobile electronic device, either from the dockingstation or the gaming system manager. In this embodiment, user inputused to play the game of chance may be transmitted to the dockingstation or the gaming system manager. User input may be received fromthe mobile electronic device and/or the docking station.

Game session data may be transmitted at 1334. Game session data mayinclude any data produced during the game play such as game state data,game history data, account data, coins in and out, credits obtained orused, bonuses received, and any other game data. Game session data maybe used in case of a power failure by the docking station or mobileelectronic device, malfunction of the docking station or mobileelectronic device, or any other reasons. The game session data may beused recreate the gaming sessions to determine if the player won orlost, the amount of credits remaining, if the player was cheating, orany other game session information. Game state data may show a positionin a game, game progress, a current account balance, active bets placed,pending game outcomes, and the like. The game history data may includegames of chance played, wagers made, past account balances, gameprogress, outcomes of games of chance, and the like. As the game ofchance is played, game session data may periodically transmitted to thedocking station. Game session data may be transmitted at any desiredtime. For example, game session data may be transmitted every thirtyseconds, every minute, every fifteen minutes, every hour, or atdesignated time intervals such as between 1 pm-3 pm, and the like. Inone embodiment, game session data may be stored at the docking station.In another embodiment, the game session data may be received by thedocking station and transmitted to the gaming system manager. In stillanother embodiment, the game session data may be directly received bythe gaming system manager from the mobile electronic device.

A determination of whether the gaming session should end may be made at1336. The gaming session may end for a variety of reasons such as nomore credits to play the game of chance, insufficient account balance,the player leaves the vicinity in which the mobile electronic device istrusted, the mobile electronic device is no longer capable of playingthe game of chance, the mobile electronic device is in an area whereplaying games of chance is prohibited, the battery charge of the mobileelectronic device is low, or for any legal reasons.

If it is determined that the gaming session should end at 1336, any gameof chance data stored on the mobile electronic device may be deleted at1338. Any game session data as well as security software downloaded onthe mobile electronic device may also be deleted. If it is determinedthat the gaming session should not end at 1336, game of chance data maycontinue to be provided to the mobile electronic device at 1332.

FIG. 11 illustrates a flowchart of an example method for authorizing amobile electronic device using a docking station. The method 1400 maybegin by connecting a mobile electronic device to a docking station at1402. The mobile electronic device may be any device such as mobiletelephones, tablet computers, laptop computers, handheld gaming devices,media players, and the like. The connection to the docking station maybe via a wired, wireless, or a physical connection to the dockingstation. In one embodiment, a connector on a receiver of the dockingstation may be used to connect the mobile electronic device to thedocking station. The connector may be designed to receive the mobileelectronic device and configured to detect whether the mobile electronicdevice is physically connected to the docking station. The connector maybe designed or configured to allow the mobile electronic device tocommunicate with the docking station.

In another embodiment, an intermediary connector (e.g., intermediaryconnector described in detail with reference to FIG. 12 ) may be used toconnect the mobile electronic device to the receiver. The intermediaryconnector may be a universal connector to allow all types of mobileelectronic devices to communicate with the docking station. Theintermediary connector may have a plurality of inputs configured toreceive the mobile electronic device or a wire connection to the mobileelectronic device. Each of the plurality of inputs may have a differentconfiguration to receive different mobile electronic devices. Theintermediary connector may also have an external wire configured to bereceived by a mobile electronic device. This allows connection to thedocking station 1500 to be a wired connection.

In another embodiment, the docking station may have a wireless receiver(as illustrated in FIG. 13 ) to connect the mobile electronic device tothe docking station wirelessly. Any known wireless methods may be usedsuch as a 3G wireless technology, 4G wireless technology, Bluetooth,Wireless USB, Near-field magnetic, Fire Wire, WiMax, IEEE 802.11xtechnology, radio frequency, and the like.

Device information may be transmitted to the docking station at 1404.Mobile device information may be any information necessary to determinewhether the mobile device has the capability to play games of chance,authenticate the mobile electronic device, validate or authenticate theuser of the mobile electronic device, or any other desired informationmay be transmitted to the docking station. For example, mobile deviceinformation may include the mobile electronic device capabilities suchas power capacity, display resolution, memory capacity, processorcapacity, disk space, software versions, and the like. Mobile deviceinformation may also include identification information such as modelinformation, user information, user preferences, game history, bookmarksfor specific games of chance, favorite websites and/or games of chance,favorite meals, shows, buffets, and the like. The mobile deviceinformation may allow the gaming establishment to determine the userinterests. Knowing the user's interests may allow the gamingestablishment to transmit any marketing, promotions, coupons, and thelike to the mobile electronic device. For example, if a user's interestis playing poker games on the mobile electronic device, the user may benotified of a poker tournament at the gaming establishment. In anotherexample, the user may show an interest in gourmet food. The gamingestablishment may transmit, to the mobile electronic device, a couponfor 50% off at their steak house.

A determination of whether the mobile electronic device is authenticatedmay be made at 1406 based on the transmitted mobile device information.Docking station may be configured to authenticate the mobile electronicdevice to play games of chance based upon the received mobile deviceinformation. In one embodiment, using a user interface either on thedocking station and/or on the mobile electronic device, the user may berequested to enter a username, password, account number, player trackinginformation, facial recognition information, voice recognitioninformation, or any other desired user information. In anotherembodiment, the desired user information necessary to authenticate themobile electronic device and/or user may be embedded in the mobileelectronic device such that authentication may be completedautomatically without any user interaction.

To authenticate the mobile electronic device and the user, the receivedmobile device information may be compared to information stored on thegaming system manager. The docking station may be configured tocommunicate with the gaming system manager by any known means such aswired or wirelessly. The gaming system manager may have a playertracking server (e.g., player tracking server 1103 illustrated in FIG. 8) having a player database configured to store all user information,player tracking information, and any other desired player information.If the received mobile electronic information matches the informationstored in the player tracking server, the docking station may determinethat the mobile electronic device is authenticated at 1406. If thereceived mobile electronic information does not match the informationstored in the player tracking server, the mobile electronic device isnot authenticated at 1406 and the method 1400 may end.

In one embodiment, the comparison of the received mobile deviceinformation and the information stored on the player tracking server maybe conducted at the docking station. In this embodiment, the dockingstation may be configured to receive the player tracking informationfrom the gaming system manager. In another embodiment, the comparison ofthe received mobile device information and the information stored on theplayer tracking server may be conducted by the gaming system manager. Inthis embodiment, the docking station may be configured to transmit thereceived mobile device information to the gaming system manager forcomparison. If the information matches, the gaming system manager maytransmit an authentication signal to the docking station and adetermination of whether the mobile electronic device is a trusteddevice may be made at 1408. If the information does not match, thegaming system manager may transmit a rejection signal to the dockingstation and the method 1400 may end.

In order to become a trusted device, the mobile electronic device mustbe authenticated and secured. Thus, if the mobile electronic device isdetermined to be authenticated at 1406, a determination of whether themobile electronic device is trusted may be made at 1408 based on thetransmitted mobile device information. To be configured to play games ofchance, the mobile electronic device must provide for security featuresto prevent cheating, hacking, and/or to comply with any gamingregulations or laws. In one embodiment, the security features may denyaccess to all programs or applications on the mobile electronic deviceexcept the programs or applications necessary to play the game ofchance. If the mobile electronic device contains the desired securityfeatures, based on the received mobile device information, the mobileelectronic device may be considered a trusted device at 1408.

If the desired security features are not located on the mobileelectronic device, the device is deemed to not be a trusted device at1408, the required security software or applications may be received bythe mobile electronic device at 1410. The mobile electronic device maythen be converted to a trusted mobile electronic device. The dockingstation and/or the gaming system manager may determine what securesoftware and/or applications are necessary for the mobile electronicdevice to have to become a trusted device. The secure software may thenbe downloaded to the mobile electronic device. Once the secured softwareand/or applications are downloaded and saved to the mobile electronicdevice, the mobile electronic device may be converted to a trusteddevice and a list of a plurality of games of chance may be received atthe mobile gaming device at 1412.

Once selected by the user, a request for a selected game of chance maybe transmitted at 1414 to the docking station and/or gaming systemmanager. The game of chance data for the selected game of chance may bereceived at 1416. The requested game of chance data may be obtained fromthe gaming server and transmitted to the mobile electronic device. Inanother embodiment, the docking station may determine whether therequested game of chance is stored on the docking station. If thedocking station determines that the requested game of chance is storedon the docking station, the docking station may transmit the requestedgame of chance data to the mobile electronic device.

The game of chance data may be downloaded and stored on the mobileelectronic device. In another embodiment, the game of chance data may bestreamed to the mobile electronic device, either from the dockingstation or the gaming system manager. In this embodiment, user inputused to play the game of chance may be transmitted to the dockingstation or the gaming system manager. User input may be received fromthe mobile electronic device and/or the docking station.

A determination of whether the gaming session should end may be made at1418. The gaming session may end for a variety of reasons such as nomore credits to play the game of chance, insufficient account balance,the player leaves the vicinity in which the mobile electronic device istrusted, the mobile electronic device is no longer capable of playingthe game of chance, the mobile electronic device is in an area whereplaying games of chance is prohibited, the battery charge of the mobileelectronic device is low, or for any legal reasons.

If it is determined that the gaming session should end at 1418, any gameof chance data stored on the mobile electronic device may be deleted.Any game session data as well as security software downloaded on themobile electronic device may also be deleted. If it is determined thatthe gaming session should not end at 1418, game of chance data maycontinue to be received at 1416.

FIG. 12 illustrates an example docking station. The docking station 1520may have a housing 1508, a receiver 1514, and a connector 1516. Thehousing 1508 may be made from any material, such as metal, plastic, andany other desired material. The housing, although illustrated as arectangular shape, may be formed as any desired shape such as acircular, cube, square, cube, triangle, prism, and the like. The housing1508 may be formed from any known process such as being molded or anyother known methods.

The receiver 1514 may be designed to receive any mobile electronicdevice. The receiver 1514 may be designed to be set into or recessedinto the housing 1508. In another embodiment, the receiver may extendoutwardly from the housing. In still another embodiment, the receiver1514 may be flush with the housing 1508 of the docking station 1520.

Receiver 1514 may include a connector 1516 positioned in the center ofthe receiver 1514 and extending outwardly from the receiver 1514. Theconnector 1516 may be designed to receive a mobile electronic device andconfigured to detect whether the mobile electronic device is physicallyconnected to the docking station 1520. The connector 1516 may bedesigned or configured to allow the mobile electronic device tocommunicate with the docking station 1520. As illustrated, connector1516 may have different shapes and be different types of connectors toreceive different types of mobile electronic devices. Although depictedas a physical connection, the connector 1516 maybe a wireless connectionbetween the docking station and the mobile electronic device. A wirelessconnection is convenient to allow connection between the docking stationand the mobile electronic device without having to find a matchingphysical connector-pair. Wireless communication technology such as WiFi(802.11x), BlueTooth, Near Field Communication, Zigbee, and the like areknown in the art and can be implemented. Additionally, the chargingfunction may also be implemented without a physical connection using awireless charging technology. For example, wireless charging viaelectromagnetic induction utilizes two induction coils, one in thecharging station and one in the portable electronic device, to transferenergy via alternating electromagnetic field.

In one embodiment, the detection may occur when the mobile electronicdevice is physically connected or coupled to the receiver 1514. Inanother embodiment, detection may occur when an intermediary connector(not shown) may be used to connect the mobile electronic device to thereceiver 1514. The intermediary connector 1502 may be a universalconnector to allow all types of mobile electronic devices to communicatewith the docking station, such as, for example, the portableintermediary trusted device discussed in U.S. application Ser. No.13/833,116, filed Mar. 15, 2013, which is incorporated by reference. Themobile electronic device may be any device such as mobile telephones,tablet computers, laptop computers, handheld gaming devices, mediaplayers, and the like.

The intermediary connector may have a plurality of inputs configured toreceive the mobile electronic device or a wire connection to the mobileelectronic device. Each of the plurality of inputs may have a differentconfiguration to receive different mobile electronic devices. Theintermediary connector -may also have an external wire configured to bereceived by a mobile electronic device. This allows connection to thedocking station 1520 to be a wired connection. Although depicted as aphysical connection, the intermediary connector may be replaced with awireless connection between the docking station and the mobileelectronic device. A wireless connection is convenient to allowconnection between the docking station and the mobile electronic devicewithout having to find a matching physical connector-pair. Wirelesscommunication technology such as WiFi (802.11x), BlueTooth, Near FieldCommunication, Zigbee, and the like are known in the art and can beimplemented.

In one embodiment, when the mobile electronic device is connected to thedocking station 1520, the docking station may be configured to providean electronic charge to the mobile electronic device thereby chargingthe battery of the mobile electronic device. Charging maybe implementedas a wired connection. Additionally, the charging function may also beimplemented without a physical connection using a wireless chargingtechnology. For example, wireless charging via electromagnetic inductionutilizes two induction coils, one in the charging station and one in theportable electronic device, to transfer energy via alternatingelectromagnetic field.

Once connected to or in communication with the docking station, any datamay be transferred from the mobile electronic device to the dockingstation and vice versa using connector 1516. In one example, the dockingstation 1520 may detect whether the mobile electronic device is receivedby receiver 1514 upon the initial transfer of information from themobile electronic device to the docking station. Mobile deviceinformation may be any information necessary to determine whether themobile device has the capability to play games of chance, authenticatethe mobile electronic device, validate or authenticate the user of themobile electronic device, or any other desired information may betransmitted to the docking station. For example, mobile deviceinformation may include the mobile electronic device capabilities suchas power capacity, display resolution, memory capacity, processorcapacity, disk space, software versions, and the like. Mobile deviceinformation may also include identification information such as modelinformation, user information, user preferences, game history, bookmarksfor specific games of chance, favorite websites and/or games of chance,favorite meals, shows, buffets, and the like. The mobile deviceinformation may allow the gaming establishment to determine the userinterests. Knowing the user's interests may allow the gamingestablishment to transmit any marketing, promotions, coupons, and thelike to the mobile electronic device. For example, if a user's interestis playing poker games on the mobile electronic device, the user may benotified of a poker tournament at the gaming establishment. In anotherexample, the user may show an interest in gourmet food. The gamingestablishment may transmit, to the mobile electronic device, a couponfor 50% off at their steak house.

In another example, game session data may be periodically transferredfrom the mobile electronic device to the docking station and game ofchance data may be transmitted from the docking station to the mobileelectronic device as the player plays the game of chance. Game sessiondata may be used in case of a power failure by the docking station ormobile electronic device, malfunction of the docking station or mobileelectronic device, or any other reasons. The game session data may beused recreate the gaming sessions to determine if the player won orlost, the amount of credits remaining, if the player was cheating, orany other game session information. Game session data and/or game ofchance data may be transmitted at any desired time. For example, gamesession data and/or game of chance data may be transmitted every thirtyseconds, every minute, every fifteen minutes, every hour, or atdesignated time intervals such as between 1 pm-3 pm, and the like. Gamesession data may include any data produced during the game play such asgame state data, game history data, account data, coins in and out,credits obtained or used, bonuses received, and any other game data.Game state data may show a position in a game, game progress, a currentaccount balance, active bets placed, pending game outcomes, and thelike. The game history data may include games of chance played, wagersmade, past account balances, game progress, outcomes of games of chance,and the like. In one embodiment, game session data may be stored at thedocking station. In another embodiment, the game session data may bereceived by the docking station and transmitted to the gaming systemmanager. In still another embodiment, the game session data may bedirectly received by the gaming system manager from the mobileelectronic device.

Also feasible is a wireless connection for communication as well as forcharging. Docking station may also have a variety of inputs, outputs,controls, peripherals, and other external devices. For example, dockingstation may have a plurality of user controls speaker, camera, printer,microphone, card reader, and display.

The plurality of user controls 1610 may be used to transmit an inputand/or output to the mobile electronic device and/or to the dockingstation. The plurality of user controls may be any type of user controlssuch as a keypad, keyboard, button panel, buttons, joystick, and anyother user controls able to provide input and/or output. For example,the user controls may be used to input username, account number, requestfor drinks, request restaurant reservation, request a fund transfer, andany other requests and/or data. The user controls 1610 may also be usedto play the game of chance.

The speaker may be used to provide audio such as music, audioinstructions, and any other audio sounds such as bells, whistles, andthe like. For example, if the player wins a bonus play, the speaker mayoutput a distinctive sound that alerts the player a bonus game is aboutto begin.

Microphone 1618 may be configured to receive audio sounds from the user.For example, in lieu of using the plurality of user controls, the usermay use the microphone to verbally input requests and data, such asusername, account number, request for drinks, request restaurantreservation, request a fund transfer, and any other requests and/ordata. In another example, microphone may be configured to recognize thevoice of the player using voice recognition information previouslyprovided by the player.

Camera may be used to detect images, such as the user's image toauthenticate the user. For example, camera may be configured to conductfacial recognition to authenticate the player in order to convert themobile electronic device to a trusted device. In another example, cameramay also be used by the gaming establishment to communicate with theuser and/or allow the user to play the games of chance. In anotherexample, camera may be configured to recognize gestures. For example, ifthe player is playing blackjack, the player may use gestures to “Hit” or“Stand”. In another example, the player may use gestures to request afund amount. Thus, camera may be used for any gaming or non-gamingpurposes.

Printer may be configured to print any information or data. For example,printer may be used to print vouchers, coupons, receipts, documents, andthe like. As stated above with reference to FIG. 8 , mobile deviceinformation may also include identification information such as modelinformation, user information, user preferences, game history, bookmarksfor specific games of chance, favorite websites and/or games of chance,favorite meals, shows, buffets, and the like. The mobile deviceinformation may allow the gaming establishment to determine the userinterests. Knowing the user's interests may allow the gamingestablishment to transmit any marketing, promotions, coupons, and thelike to the mobile electronic device. For example, if a user's interestis playing poker games on the mobile electronic device, the user may benotified of a poker tournament at the gaming establishment by printingout a flyer notifying the player of the poker tournament. In anotherexample, the user may show an interest in gourmet food. The gamingestablishment may transmit, to the docking station, a coupon for 50% offat their steak house that may be printed using printer 616.

Card reader may be configured to read data from a storage medium, suchas a credit card, player tracking card, and the like. Card reader may beused to access to a player tracking account, transfer funds from acredit card or banking card, transfer user information, or any otherdesired requests, uses, and the like. In another example, card readermay be used to read data from a card to authenticate and/or validate themobile electronic device.

Display may be any type of known display such as a liquid crystaldisplay, touch screen, and the like. Display may be used for any knownpurposes such as displaying or presenting gaming establishmentinformation (e.g., list of games of chance that may be played on themobile electronic device, tournament information, movie times, and thelike) to the player, display funds in the player tracking account,display remaining credits to play the game of chance. In anotherexample, display may be used as a touch screen to input userinformation, such as username, password, play games of chance, and anyother information. Display may be used to present or display any othergaming or non-gaming information.

In use, a player may select to play a game of chance using a variety ofmethods. For example, the player may select a game of chance using thetouch-screen display, one of the plurality of user inputs, both thedisplay and at least one of the plurality of user inputs, verballyrequesting the game of chance using the microphone, gesture recognitionusing the camera.

As discussed in detail above, the game of chance may be downloaded orstreamed to the mobile electronic device. Either way, the user may playthe game of chance using a variety of devices or peripherals on thedocking station0. For example, the user may play the game of chanceusing controls on the mobile electronic device. In another example, theuser may play the game of chance using the plurality of user controls,display, microphone, gesture recognition on camera, a combination ofperipherals, or any other method.

After playing the game of chance, the user may want to cash out anyremaining credits. The user may transmit a request to cash out using theuser controls, display, microphone, camera, card reader, a combinationof peripherals, or any other input methods to transmit the request tocash out. In one example, when the docking station receives the requestto cash out, a credit voucher may be printed using printer. In anotherexample, the player may verbally request to cash out using microphoneand that the remaining balance be transferred to a credit card usingcard reader. In yet another example, user may request to cash out usingdisplay.

FIG. 13 illustrates a block diagram of an example docking station.Docking station 1800 may have a processor 1802, memory 1828, and aplurality of peripherals. Although only a few of the peripherals will bediscussed herein, it will now be known that the docking station may haveand use a variety of peripherals as described herein or desired by theuser. For example, processor 1802 may be configured to determine whetherthe games of chance can be played on the mobile electronic device basedon received device information. In another example, processor 1802 maybe configured to transmit game session data, accounting data, mobiledevice information, and the like to the gaming system manager and/or themobile electronic device. In yet another example, processor may beconfigured to delete all gaming session data, game of chance data, andany other desired data, application, and information from the mobileelectronic device. Processor 1802 may be configured to communicate withthe docking station 1800 peripherals, mobile electronic device, gamingserver, and other servers in order to carry out the necessary desiredfunctions. For example, processor 1802 may receive a game of chancerequest from the mobile electronic device. In turn, processor 1802, maytransmit the game of chance request to the gaming system manager (e.g.,gaming system manager 1104 illustrated in FIG. 8 ) via the networkinterface 1804.

Docking station 1800 may detect a mobile electronic device. In oneembodiment, the docking station 1800 may detect the mobile electronicdevice when physically connected to the receiver 1808 of the dockingstation 1800. Receiver 1808 may be designed to receive any mobileelectronic device and may have a connector (e.g., connector 1516illustrated in FIG. 12 ) designed to receive a mobile electronic deviceand configured to detect whether the mobile electronic device isphysically connected to the docking station 1800.

In another embodiment, the mobile electronic device may be detected whenan intermediary connector (e.g., a portable intermediary trusted device)is connected to receiver 1808. In still another embodiment, mobileelectronic device may communicate wireless with docking station 1800 viawireless interface 1801 using any known wireless technology such as suchas a 3G wireless technology, 4G wireless technology, Bluetooth, WirelessUSB, Near-field magnetic, Fire Wire, WiMax, IEEE 802.11x technology,radio frequency, and the like.

Once detected, mobile device information may be obtained from the mobileelectronic device. Mobile device information may be any informationnecessary to determine whether the mobile device has the capability toplay games of chance, authenticate the mobile electronic device,validate or authenticate the user of the mobile electronic device, orany other desired information may be transmitted to the docking station.For example, mobile device information may include the mobile electronicdevice capabilities such as power capacity, display resolution, memorycapacity, processor capacity, disk space, software versions, and thelike. Mobile device information may also include identificationinformation such as model information, user information, userpreferences, game history, bookmarks for specific games of chance,favorite websites and/or games of chance, favorite meals, shows,buffets, and the like. The mobile device information may allow thegaming establishment to determine the user interests. Knowing the user'sinterests may allow the gaming establishment to transmit any marketing,promotions, coupons, and the like to the mobile electronic device. Forexample, if a user's interest is playing poker games on the mobileelectronic device, the user may be notified of a poker tournament at thegaming establishment. In another example, the user may show an interestin gourmet food. The gaming establishment may transmit, to the mobileelectronic device, a coupon for 50% off at their steak house.

Mobile device information may be stored in memory 1828. Memory 1828 maybe configured to store any type of data such as, game of chance data,secure software, applications, game session data, and any other desireddata or information. Memory 1828 may be any type of memory includingrandom access memory (RAM), read only memory (ROM), non-volatile randomaccess memory (NVRAM), disk memory, magnetic tapes, paper tapes, laserstorage and the like. Independently, random access memory requires powerin order to maintain stored data. Battery backed RAM may store variableif the power goes down. ROM cannot be adjusted once written but does notrequire power in order to store information. NVRAM does not requirepower in order to maintain variables and can be written to. Disk memoryand tape memory may be a bit slower but can store variables withoutpower. ROM may be useful for storing games of chance on the dockingstation. RAM and NVRAM may also be useful for storing games on thedocking station, especially if the docking station only temporarilystores games during a particular gaming session.

Docking station 1800 may have a variety of peripherals such as usercontrols 1810, card reader 1814, microphone 1822, camera 1824, anddisplay 1826. User controls 1810 may be used to transmit an input and/oroutput to the mobile electronic device and/or to the docking station.User controls 1810 may be any type of user controls such as a keypad,keyboard, button panel, buttons, joystick, and any other user controlsable to provide input and/or output. For example, user controls 1801 maybe used to input username, account number, request for drinks, requestrestaurant reservation, request a fund transfer, and any other requestsand/or data. The user controls 1810 may also be used to play the game ofchance.

Microphone 1822 may be configured to receive audio sounds from the user.For example, in lieu of using user controls 1801, the user may use themicrophone 1822 to verbally input requests and data, such as username,account number, request for drinks, request restaurant reservation,request a fund transfer, and any other requests and/or data. In anotherexample, microphone 1822 may be configured to recognize the voice of theplayer using voice recognition information previously provided by theplayer.

Camera 1824 may be used to detect images, such as the user's image toauthenticate the user. For example, camera 1824 may be configured toconduct facial recognition to authenticate the player in order toconvert the mobile electronic device to a trusted device. In anotherexample, camera 1824 may also be used by the gaming establishment tocommunicate with the user and/or allow the user to play the games ofchance. In another example, camera 1824 may be configured to recognizegestures. For example, if the player is playing blackjack, the playermay use gestures to “Hit” or “Stand”. In another example, the player mayuse gestures to request a fund amount. Thus, camera 1824 may be used forany gaming or non-gaming purposes.

Printer 1816 may be configured to print any information or data. Forexample, printer 1816 may be used to print vouchers, coupons, receipts,documents, and the like. As stated above with reference to FIG. 8 ,mobile device information may also include identification informationsuch as model information, user information, user preferences, gamehistory, bookmarks for specific games of chance, favorite websitesand/or games of chance, favorite meals, shows, buffets, and the like.The mobile device information may allow the gaming establishment todetermine the user interests. Knowing the user's interests may allow thegaming establishment to transmit any marketing, promotions, coupons, andthe like to the mobile electronic device. For example, if a user'sinterest is playing poker games on the mobile electronic device, theuser may be notified of a poker tournament at the gaming establishmentby printing out a flyer notifying the player of the poker tournament. Inanother example, the user may show an interest in gourmet food. Thegaming establishment may transmit, to the docking station, a coupon for50% off at their steak house that may be printed using printer 816.

Card reader 1814 may be configured to read data from a storage medium,such as a credit card, player tracking card, and the like. Card reader1814 may be used to access to a player tracking account, transfer fundsfrom a credit card or banking card, transfer user information, or anyother desired requests, uses, and the like. In another example, cardreader 1814 may be used to read data from a card to authenticate and/orvalidate the mobile electronic device.

Display 1826 may be any type of known display such as a liquid crystaldisplay, touch screen, and the like. Display 1826 may be used for anyknown purposes such as displaying or presenting gaming establishmentinformation (e.g., list of games of chance that may be played on themobile electronic device, tournament information, movie times, and thelike) to the player, display funds in the player tracking account,display remaining credits to play the game of chance. In anotherexample, display 1826 may be used as a touch screen to input userinformation, such as username, password, play games of chance, and anyother information. Display 1826 may be used to present or display anyother gaming or non-gaming information.

Docking station 1800 may also have a notification device 1812.Notification device 1812 may be a light, light rope, light pipe, candle(e.g., candle 2210 illustrated in FIG. 17A and 17B), multicolor LED's, aspeaker which makes noise, and any other notification device to notifyservice personnel that a service request is desired by the player. Inanother example, notification device 1812 may notify service personnelof the gaming establishment that the docking station has a failure ormalfunction. In another example, if a player would like to ordered adrink, a yellow light can flash to notify a waitress. In anotherexample, a red light can flash to indicate a malfunction.

Docking station 1800 may also have a scanner 1818. Scanner may be usedto scan documents, bar codes, and the like. For example, the scanner maybe used by the player to scan a voucher printed from another gamingmachine. The credits remaining on the voucher may then be used to playthe games of chance. In another example, the player may scan a voucherto participate in a poker tournament without having to be at the exactlocation of where the poker tournament is being played.

Docking station 1800 may also have a motion tracking device 1820. Themotion tracking device 1820 may be used to play the games of chance. Themotion tracking device 1820 may be any device configured to determinethe orientation, produce motion, and the like on the docking station1800 and/or the mobile electronic device. For example, the motiontracking device 1820 may be a gyroscope to determine orientation, alaser, haptic transducers, and/or an accelerometer to determineacceleration magnitude and vectors. For example, if playing a car racingsimulation game of chance, the docking station 1800 may be tilted to theright in order to turn the car to the right. When the docking station1800 is turned to the right, the motion tracking device 1820 maydetermine the orientation and turn the car in the simulation game ofchance to the right. If the car crashes, haptic transducers in thedocking station 800 may cause the docking station to vibrate in responseto the crash.

FIGS. 14A-14B illustrate an example authorization of a mobile electronicdevice to play a game of chance. The mobile electronic device 1902 maybe inserted into the receiver 1906 of the docking station 1904. Thereceiver 1906 may have a connector (e.g., connector 1516 illustrated inFIG. 12 ) configured to connect the mobile electronic device to thedocking station. The connector may be designed to receive the mobileelectronic device and configured to detect whether the mobile electronicdevice is physically connected to the docking station. The connector maybe designed or configured to allow the mobile electronic device tocommunicate with the docking station. As previously discussed in FIGS.12A-12B, the connection may be implemented as a wired or a wirelessconnection.

Referring to FIG. 14A, once the mobile electronic device 1902 isphysically connected to the docking station 1904, the docking station1904 may detect the mobile electronic device. The mobile electronicdevice may have a display 1918 displaying a battery life indicator 1914.As illustrated, the battery life indicator 1914 may indicate that themobile electronic device 1902 is not fully charged. If not fullycharged, the docking station 1904 may transmit a charge to the batteryof the mobile electronic device 1902 to recharge the battery of themobile electronic device. In one embodiment, the mobile electronicdevice may indicate that it is being charged with a message displayed ondisplay 1918. For example, “Charging” 1912 may be displayed on display1918.

Docking station may transmit an authentication request to the mobileelectronic device to authenticate the mobile electronic device 1902and/or the user. In one embodiment, a request for a user identification1920 and password 1922 may be displayed on display 1918. The player maythen enter the button 1924 on the display 1902 to gain authorization.

Referring now to FIG. 14B, after a period of time being physicallyconnected to the gaming, the battery life indicator 1914 indicates thatthe battery is being recharged. If the mobile electronic device isauthenticated an authentication notification may be transmitted to themobile gaming device 1902 and presented on display 1912. For example,FIG. 15B may display a “Welcome To Our Gaming Network!!!” 1932 messageon display 1918. This indicates that the mobile gaming device 1902and/or user is authenticated.

FIGS. 15A-15B illustrate an example use of a docking station. FIG. 15Aillustrates the mobile electronic device 2002 docked in the dockingstation 2004 while playing a game of chance presented on display 2018.The display 2018 may present a plurality of user interface controls2006. The user interface controls 2006 may be any type of displayed usercontrols used to play the game of chance such as to select a wageramount, spin, cash out, and the like. The amount of credits remaining2022 may also be presented on display 2018.

In one embodiment, docking station 2004 may have a joystick 2020. Thejoystick may also be used to play the game of chance 2009. Asillustrated, joystick 2020 may be used to spin the reels 2008 of thegame of chance presented on display 2018. The joystick 2020 may be in afirst position indicating that no action has been taken. Referring toFIG. 15B, the player may move the joystick 2020 to a second positionindicating that the player would like to spin the reel 2008 using thejoystick 2020 and not the user interface controls 2006.

FIGS. 16A-16B illustrate another example use of a document station. Ifthe user would like to end the game session, the user may want to cashout his remaining credits. FIG. 16A illustrates the mobile electronicdevice 2102 connected to docking station 2104. In one embodiment, theplayer may use user interface controls (e.g., user interface controls2006 illustrated in FIGS. 15A and 15B) to cash out. In anotherembodiment, the player may use user controls 2103 (e.g., user controls1610 illustrated in FIG. 13 ) to cash out.

Once a request to cash out is transmitted to the docking station 2104,the player may be questioned to determine whether the player would liketo print a voucher for the remaining credit. For example, a message“Would You Like To Cash Out And Print A Voucher?” 2106 may be displayedon display 2118. A “No” indicator 2108 and a “Yes” indicator 2110 may besimultaneously displayed on display 2118. Although the inquiry isillustrated as being presented on the display 2118 of the mobileelectronic device 2102, this is not intended to be limiting as theinquiry may also be presented on a display of the docking station 2104(e.g., display 1622 illustrated in FIG. 13 ).

Referring now to FIG. 16B, if the player would like a voucher printedout for the remaining credit balance, printer 2112 may print the voucher2124. Once the voucher is printed, display 2118 may present a completionnotification 2122 such as, for example, “THANKS FOR PLAYING! Please ComeBack Soon”.

FIGS. 17A-17B illustrate still another example use of a docking station.Referring to FIGS. 17A and 17B, while the player is playing the game ofchance 2208, waiting for the mobile electronic device 2202 to charge, orfor any other reason, player may want to order a drink, food, or anyother type of service. Thus, the docking station 2204 may be used tomake service calls. The user may use either the user interface controls2206 displayed on display 2218 or user controls 2222 on the dockingstation 2204 to indicate he would like to make a service request. Therequest for service may be transmitted to the docking station 2204 and acandle 2210 on the docking station may be illuminated (as illustrated inFIG. 17B) to alert the customer service personnel that the player wouldlike to make a service request.

FIGS. 18A-18D Illustrate yet another example uses of the dockingstation. Some players may desire to work while playing games of chancefor entertainment, such as while on vacation. The docking station mayprovide the flexibility for business people to work while on vacation(or not on vacation) and may also be used as a work station. Asillustrated in FIG. 18A, if the mobile electronic device 2302 is able toreceive electronic mail (e-mail), display 2318 may indicate that theplayer has a new email message 2306.

Referring now to FIG. 18B, the e-mail message may be displayed 2322 ondisplay 2318. The email message may contain a document 2324 that theplayer may need to print out to review. As illustrated in FIG. 18C, theuser may be provided the option 2334 to print the document using thedocking station 2304. In one embodiment, the user may be charged perpage for each page printed out and may use the docking station to payfor the printouts. In another embodiment, the user is not charged forthe printout. If the user would like to print the document using thedocking station, as illustrated in FIG. 18D, the document 2344 may beprinted using printer 2312. Upon completion of the printing, display2318 may display a completion notification 2342, for example, a“Printing Complete!” message.

While embodiments and applications of this invention have been shown anddescribed, it would be apparent to those skilled in the art having thebenefit of this disclosure that many more modifications than mentionedabove are possible without departing from the inventive concepts herein.

What is claimed is:
 1. A gaming system for authorizing a mobileelectronic device to play a game, the gaming system comprising: a serversystem having user data associated with the game; and a first dockingstation among a plurality of docking stations operable to be coupled tothe server system and the mobile electronic device, and having at leastone processor and a memory storing a plurality of instructions, whenexecuted, cause the at least one processor to at least: receive deviceinformation from the mobile electronic device when the mobile electronicdevice is coupled to the first docking station, determine if the mobileelectronic device is capable of playing the game based on the deviceinformation received and the user data from the server system, convertthe mobile electronic device to a trusted device when the mobileelectronic device is capable of playing the game, enable the dockingstation to receive a fund request for the game from the trusted device,and enable the trusted device to display the game when the fund requestis authorized and the trusted device remains coupled to at least one ofthe plurality of docking stations.
 2. The gaming system of claim 1,wherein the server system comprises a gaming server, and wherein theinstructions, when executed, cause the at least one processor tocommunicate with the gaming server for game software.
 3. The gamingsystem of claim 1, wherein the instructions, when executed, cause the atleast one processor to securely communicate signals between the firstdocking station and the mobile electronic device via a physicalconnection or a short-ranged wireless network.
 4. The gaming system ofclaim 3, wherein the instructions, when executed, cause the at least oneprocessor to periodically collect gaming data from the mobile electronicdevice.
 5. The gaming system of claim 4, wherein the instructions, whenexecuted, cause the at least one processor to subsequently update theuser data stored in the server system based on the gaming datacollected.
 6. The gaming system of claim 1, wherein the instructions,when executed, cause the at least one processor to locate one or moresecurity features on the mobile electronic device to be considered beingcapable of playing the game.
 7. The gaming system of claim 1, whereinthe instructions, when executed, cause the at least one processor todetermine whether the first docking station stores the game, andtransmit the game to the mobile electronic device when the first dockingstation stores the game.
 8. A method for authorizing a mobile electronicdevice to play a game in a gaming system having a manager system storingdata associated with the game, and a plurality of docking stations, eachof the plurality of docking stations being operable to be coupled to themanager system and the mobile electronic device, and having at least oneprocessor and a memory storing instructions, the method comprising:transmitting device information from the mobile electronic device to afirst docking station when the mobile electronic device is coupled tothe first docking station; determining at the first docking station ifthe mobile electronic device is capable of playing the game based on thedevice information received from the mobile electronic device and thedata from the manager system; converting the mobile electronic device toa trusted device when the mobile electronic device is capable of playingthe game; initiating the first docking station to receive a fund requestfor the game from the trusted device; authorizing the trusted device torequest funds for the game; and displaying at the trusted device thegame when the funds requested are authorized and the trusted deviceremains coupled to at least one of the plurality of docking stations. 9.The method of claim 8, wherein the manager system comprises a server,and further comprising controlling the first docking station tocommunicate with the server for game software.
 10. The method of claim8, further comprising controlling the first docking station to securelycommunicate signals between the first docking station and the mobileelectronic device via a physical connection or a short-ranged wirelessnetwork.
 11. The method of claim 10, further comprising periodicallycollecting gaming data from the mobile electronic device.
 12. The methodof claim 11, further comprising subsequently updating the data stored inthe manager system based on the gaming data collected.
 13. The method ofclaim 8, further comprising locating one or more security features onthe mobile electronic device to be considered being capable of playingthe game.
 14. The method of claim 8, further comprising determiningwhether the first docking station stores the game, and transmitting thegame to the mobile electronic device when the first docking stationstores the game.
 15. A non-transitory computer-readable medium forauthorizing a mobile electronic device to play a game in a gaming systemhaving a server system having user data associated with the game, and aplurality of docking stations, each of the plurality of docking stationsbeing operable to be coupled to the server system and the mobileelectronic device, and having at least one processor and storinginstructions, which, when executed cause the at least one processor toperform at least the steps of: requesting device information from themobile electronic device when the mobile electronic device is coupled toa first docking station; determining if the mobile electronic device iscapable of playing the game based on the device information received andthe user data from the server system; converting the mobile electronicdevice to a trusted device when the mobile electronic device is capableof playing the game; receiving a fund request for the game from thetrusted device; and authorizing the trusted device to play the game whenthe fund request is authorized and the trusted device remains coupled toat least one of the plurality of docking stations.
 16. Thenon-transitory computer-readable medium of claim 15, wherein the serversystem comprises a gaming server, and wherein the instructions, whenexecuted, cause the at least one processor to perform the step ofcommunicating with the gaming server for game software.
 17. Thenon-transitory computer-readable medium of claim 15, wherein theinstructions, when executed, cause the at least one processor to performthe steps of securely communicating signals between the first dockingstation and the mobile electronic device via a physical connection or ashort-ranged wireless network, and collecting gaming data from themobile electronic device periodically.
 18. The non-transitorycomputer-readable medium of claim 17, wherein the instructions, whenexecuted, cause the at least one processor to perform the step ofsubsequently updating the user data stored in the server system based onthe gaming data collected.
 19. The non-transitory computer-readablemedium of claim 15, wherein the instructions, when executed, cause theat least one processor to perform the step of locating one or moresecurity features on the mobile electronic device to be considered beingcapable of playing the game.
 20. The non-transitory computer-readablemedium of claim 15, wherein the instructions, when executed, cause theat least one processor to perform the step of determining whether thefirst docking station stores the game, and transmit the game to themobile electronic device when the first docking station stores the game.