Method and apparatus for gaming token verification

ABSTRACT

An apparatus and method for verifying the integrity and correct value of a game token. The token includes a primary and a secondary source of identification. The preferred primary token identification is an embedded RFID tag. The secondary token identification may be an alphanumeric serial number, a bar code or combination thereof. The game token is produced in conjunction with an electronic manifest. The manifest provides a production history of the game tokens and is a source of verification data. The data is subsequently used by a gaming establishment to verify the face value of the game token as compared to the physical appearance of the game token. In this way, counterfeit or altered game tokens may be identified prior to redemption.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority to U.S. Provisional Patent ApplicationNo. 60/919,137 filed on Mar. 19, 2007 titled A METHOD AND APPARATUS FORGAMING TOKEN VERIFICATION.

BACKGROUND OF THE INVENTION

1. Field of the Invention

The present invention relates to gaming chips or tokens, and inparticular to a method and apparatus for securely verifying the identityof a gaming chip or token.

2. Related Art

Games of chance have been enjoyed by people for many years and haveundergone increased and widespread popularity in recent times. As such,the gaming establishments that offer games of chance frequently deal inlarge sums of currency that change hands between the establishment andthe patrons. Gaming establishments or casinos will commonly provideplayers with a convenient form in which to facilitate the monetarytransactions. Casinos will usually implement some form of gaming chip ortoken payment scheme to facilitate the monetary transactions. In thistype of payment structure, the player will usually obtain a gaming tokenthat has an associated value in exchange for actual currency.

For example, the player may desire to obtain $100 worth of gaming tokenswhere the tokens are each worth $10. In this exchange, the player wouldprovide the actual currency to the gaming establishment; the playerwould then receive ten $10 gaming tokens in which the player may now usein the gaming establishment for placing wagers on the various games ofchance.

Correspondingly, when the player receives a winning payout in a game ofchance, the player is typically paid in gaming tokens which may bere-issued. In this way, the gaming tokens become a form of proprietarycurrency for that gaming establishment. When the player has determinedthat they no longer desire to participate in the games of chance, theplayer may “cash-in” or redeem the gaming tokens for actual currency.

Although the gaming chip/token payment scheme has several advantages tothe gaming establishment it also brings disadvantages. One disadvantageof the currently used gaming token scheme is that perpetrators attemptto counterfeit the gaming tokes and thus use the impostor tokens todefraud the gaming establishment of revenue. In this form ofcounterfeiting, a gaming token with a minimal value (i.e. $1) isphysically altered to have an appearance of a high value gaming tokensuch as a $1,000 token. The perpetrator then defrauds the gamingestablishment by cashing in or betting what was originally only a $1token for a $1,000. Alternatively, the same high quality manufacturingmethod that is used to create the original tokens may be used to createcounterfeit tokens.

In the past there have been several attempts to deter counterfeitingefforts of gaming chips or tokens and to improve wager tracking. Onesolution is to embed the gaming token with a radio frequencytransponder. The transponder, when energized and read, would thenprovide the gaming establishment with specific information regarding thegaming token such as token designation and value. While beneficial insome respects, this solution is still susceptible to illicit activity orconfusion should the transponder fail. In this situation the gamingestablishment would not be able to access the embedded information toverify the value of the token and the gaming establishment may still berequired to pay the face value of the gaming token or risk loss ofcustomer confidence or goodwill if such payment is not made.

Another attempt to provide an anti-counterfeiting measure was tosecretly code the gaming token with an external identifier that couldeasily viewed with the naked eye, or could only be viewed under aspecific lighting condition such as illumination by a specificfluorescent black light. While this solution was marginally helpful inpreventing counterfeiting, this method was subsequently counterfeitedalong with the gaming token. Once a perpetrator obtained the specificfluorescent lamp, and matching stamp/ink/paint, all that was required tosubvert this method was duplication of the coded external identifier.

In view of these disadvantages, what is needed in the art is a gamingtoken that has an internal redundant system for verifying the token'sintegrity and associated value in the event the primary transponderfails or external identifier is unreadable.

SUMMARY OF THE INVENTION

To overcome the drawbacks of the prior art and provide additionalbenefits, a method and apparatus for gaming token verification comprisedof a primary and secondary token identification is disclosed herein. Byproviding a secondary form of token identification, a gamingestablishment may cross-reference and verify a gaming token's value,origin and integrity.

In one embodiment, the apparatus includes a game token comprising: atoken having a recess formed therein and a carrier substantiallyreceived within the recess. The carrier has a primary identificationelement and a secondary identification element formed thereon. Theprimary identification element has game token information encodedtherein while the secondary identification element providesidentification information associated with a manifest. In one or moreembodiments, the manifest is a source of historical informationregarding the game token as identified by its identification elements.For example, the manifest may comprise a history of a game token'sproduction process. The manifest may be updated during production andover the life of a game token. The game token information may compriseat least the currency value of the game token as well as otherinformation.

In another embodiment, the game token comprises a token having arecessed formed therein and a carrier substantially received within therecess. In this embodiment, the primary and secondary identificationelements are formed on the token. The primary identification element hasgame token information encoded therein while the secondaryidentification element provides identification information associatedwith a manifest.

The primary identification element may comprise an electronictransponder, such as a radio frequency identification chip, in one ormore embodiments. The secondary identification element may be analphanumeric code, a bar code or both which may or may not be configuredto be readable by a device such as a reader. For example, the reader maycomprise a radio frequency identification chip reader, an X-ray deviceor T-ray device. The reader may also be an X-ray imaging device even anX-ray imaging device with a bar code scanner.

In another embodiment, the game token comprises a token having a recessformed therein, a carrier substantially received within the recess, andat least two identification elements associated with the token. Thefirst identification element has game token information encoded thereon,while the second identification element provides identificationinformation associated with a manifest.

The first identification element may comprise an electronic transponder,such as a radio frequency identification chip, in one or moreembodiments. The second identification element may be an alphanumericcode, a bar code or both which may or may not be configured to bereadable by a device such as a reader. As with above, the reader maycomprise a radio frequency identification chip reader, an X-ray deviceor T-Ray device. The reader may also be an X-ray imaging device even anX-ray imaging device with a bar code scanner.

The reader is generally capable of accessing the secondaryidentification element of a game token in one or more embodiments andmay be in communication with a computer, the computer configured toaccess a database, where the database contains a manifest of game tokenidentification data. Game token data may be displayed to a systemoperator on a display connected to the computer. In addition, a computerprogram operatively running on the computer may be configured to comparegame token data obtained from the reader with game token data withinsaid manifest. This may be used to verify the authenticity of a gametoken.

A method of verifying a game token prior to redeeming it for currency orother value is also provided. The method generally comprises: readingthe secondary identification element of a game token to obtain asecondary game token identification; accessing a database containing alist of game token data; locating the secondary game tokenidentification; obtaining a currency value for the game token from amanifest associated with the secondary game token identification; andpaying the currency value of the game token if the currency value, asreceived from the manifest, matches a face value of the game token. Ifthe currency value of the game token does not match the currency valuefrom the manifest, payment of currency value for the game token isrefused.

Other systems, methods, features and advantages of the invention will beor will become apparent to one with skill in the art upon examination ofthe following figures and detailed description. It is intended that allsuch additional systems, methods, features and advantages be includedwithin this description, be within the scope of the invention, and beprotected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The components in the figures are not necessarily to scale, emphasisinstead being placed upon illustrating the principles of the invention.In the figures, like reference numerals designate corresponding partsthroughout the different views.

FIG. 1A is a perspective view of a gaming token with a primarytransponder and a secondary alphanumeric serial number.

FIG. 1B is a perspective view of a gaming token with a primarytransponder and a secondary bar coded serial number.

FIG. 2 is a block diagram illustrating an example embodiment of aworkstation for verifying the secondary gaming token identifier.

FIG. 3 is an enlarged view of the computer display of FIG. 2illustrating the secondary gaming token identifier as viewed at theworkstation.

FIG. 4 is a block diagram illustrating an example embodiment of aworkstation for verifying the secondary gaming token identifier.

FIG. 5 is a block diagram illustrating an example embodiment of a gamingtoken production and gaming establishment inventory system.

FIGS. 6A-6B illustrate an operational flow diagram of a gaming tokenverification system.

DETAILED DESCRIPTION

In the following description, numerous specific details are set forth inorder to provide a more thorough description of the present invention.It will be apparent, however, to one skilled in the art, that thepresent invention may be practiced without these specific details. Inother instances, well-known features are have not been described indetail so as not to obscure the invention.

FIG. 1A illustrates an embodiment of the invention where the game tokenis equipped with a primary identification element and a secondaryidentification element. The primary identification element may be anembedded electronic transponder and the secondary identification elementmay be an alphanumeric code. An example of one such transponder is radiofrequency identification (RFID) which comprises a microprocessor orsensor that may be activated by an antenna and/or energy omitting devicethereby causing the electronic transponder to emit data. As seen in FIG.1A, in this example embodiment a game token 100 includes an outersurface and edge in the shape of a coin. The game token 100 can also bemanufactured using the teachings of the following patents, which arehereby incorporated by reference in their entirety: U.S. Pat. Nos.6,296,190, 6,581,747, 5,895,321, 6,264,109, 6,021,949, 5,166,502,6,659,875, and 3,766,452.

The game token 100 has an outer rim 104 which may provide a marking areaand also provides support structure. A recess 108 is provided within thegame token 100 for receiving a carrier 112. In this embodiment thecarrier 112 has embedded therein, an antenna 116, an integrated circuit(IC) 120 and a secondary alphanumeric identifier 124. In combination,the antenna 116 and IC 120 may form an RFID circuit that provides aprimary identification means for authenticating the gaming token. Inother embodiments, any other type of primary identification may be used,including the visual appearance of the token. The information associatedwith authentication of the game token may include: the token's monetaryvalue, a serial number, gaming establishment name, token creation date,and other data that may be useful in the managerial function of thegaming establishment.

The secondary alphanumeric identifier 124 provides a backup orredundancy for authenticating the gaming token in the event the primaryidentification means should fail or be forced to fail (i.e.,counterfeiting). The secondary alphanumeric identifier 124 is embeddedinto the carrier 112 or any other aspect of the token such that externalobservation by way of an unaided human eye would not reveal thesecondary identifier's content. For example, the secondary alphanumericidentifier 124 may be printed or formed within the carrier 112 by usinga metallic based ink/paint that is only visible under X-ray observation.In other embodiments any other material structure, which may not be readby the unaided eye. Another method that could be used is .T-Raytechnology that uses terahertz radiation to see through layers ofmaterial. The game token 100 may be completed by encapsulating thecarrier 112 and outer rim 104 to form a permanently bonded unit. It iscontemplated that in one embodiment, serial numbers are added to all thepieces of the chip. This provides additional accountability and trackingcapability to the various methods of chip production. In addition, itprovides higher security during each stage of chip production.

During manufacturing, a compression method may be utilized that hotpresses materials together, including different colors while others willuse injection molded outer rings and will then insert a “slug” into thechip ring. Another method is based on a full chip foundation from aninjection mold and that the RFID tag is then laid in a special cavity onthe chip then covered by the chip inlay. The inlay may comprise thelabel that describes the casino name and denomination.)

FIG. 1B is an alternate embodiment for a game token 100. In thisembodiment the outer rim 104, recess 108, carrier 112, antenna 116 andIC 120 have similar functionality as previously described. However thesecondary identification is provided by a bar code 128 label. The barcode 128 is embedded, located or affixed to the interior surface of thecarrier 112. By “interior surface” it is meant that the label would becaptured between the carrier 112 and the recess 108 during assembly ofthe game token 100. Alternatively, the bar code 128 may be directlyprinted on the interior surface prior to encapsulation of the game token100 or embedded within the carrier 112. In addition, it is contemplatedthat the 2^(nd) ID may be placed at any location within, or on thetoken. The bar code 128 is a well known industrial technology and is notdiscussed in detail herein so as not to obscure the invention. The gametoken 100 may have an external label 110 placed over the carrier 112after assembly of the game token outer rim 104 and carrier 112. Anyother type of ID checker may be utilized.

Turning now to FIG. 2, which illustrates a block diagram of thedetection system in connection with verification of a game token. Thisis but one possible example configuration and the elements as shown arefor purposes of discussion and hence are not to scale. As part of theworkstation 200, there is a secondary identification reader 204 mountedthereon. There is a game token detection zone 208 which provides apredefined work area where a game token's secondary identificationinformation may be acquired and evaluated. Reader 204 is operativelyconnected to a computer/processor 212 having memory 216. The computer212 is configured to execute machine readable code which may be storedwithin memory 216. The machine readable code may comprise software codeor code logic capable of interaction with other systems, such as thereader 204, display 220 or network 224. The computer 212 may include auser input interface for receiving input from a user such as gamingestablishment supervisory personnel. The input may take the form of akeyboard, analog dial, potentiometer, mouse, touch screen, or any otherdevice capable of providing user input information to the computer 212.The computer may also be configured with one or more displays 220.

Additionally, the computer 212 may connect to a network 224 which inturn may connect to a database 228. A database 228 is generallyunderstood in the art as an accessible memory for storing data. Thenetwork 224 may include accessibility to the database 228 for variousgaming establishment personnel such as management and security.

In one embodiment, the reader 204 is such that it can access, display orread either the secondary alphanumeric identifier 124, secondary barcode 128 or both which may be embedded within a game token 100. Oneexample of such a reader 204 would be an X-ray device. This type ofreader allows the object to be passed through or into a detection area208, the X-ray device then presents an image, of the object's internalstructure, for operator review. The reader 204 may also provide visualoutput data which the computer 212 may then present to a user by way ofthe display 220. For example, referring to FIG. 3, a display 220 maypresent a visual X-ray image of a gaming token 100, secondaryalphanumeric identifier 124 and/or bar code 128.

It is also contemplated that the reader 204 may provide electronicinformational data related to the gaming token 100 by way of the barcode and subsequently send this data to the computer 212 for review,additional processing and possible storage within the database 228. Inthis way, the reader 204 may function as both an X-ray device and barcode scanner. In FIG. 3, an enlarged view of display 220 is illustratedshowing an example of a scanned or read gaming token 100. In this viewthe game token's secondary identification information is boldly visibleas compared to the surrounding structure of the game token 100.

The system shown in FIGS. 2 & 3 operates to provide a gamingestablishment with an ability to verify a game token's true or intendedidentity from which the value may be determined. The true value of thegame token may be ascertained in the event the primary identificationtransponder has failed to provide game token information. Also, a gamingestablishment may desire to use the secondary identification means, toverify and compare the token's value with the primary transponder'sreported token information. A look-up in a look up table may determinethe value or algorithm run to determine value or could imprint value ora bar code may indicate numerous data items including a second ID oronly the second ID.

FIG. 4 illustrates a block diagram of the detection system in connectionwith a game token with an embedded electronic transponder. This is butone possible exemplary configuration and the elements as shown are forpurposes of discussion and hence are not to scale. As part of thisexample embodiment, the workstation 400, there is one RFID antenna, forthe primary transponder. The antenna 404 may be mounted below theworkstation 400, be integral with the workstation, on the top of theworkstation or any location. In this exemplary embodiment, the antenna404 is integral with the top surface of the workstation and creates adetection zone 412 when so instructed by the detection system describedabove. The detection zone 412 may also be understood as the area inwhich the energy emitted by the antenna energizes the RFID circuitry ofthe game token.

The antenna 404 connects to a corresponding a primary transponder reader416. It is contemplated that communication between the reader 416 andthe antenna is bi-directional such that the reader or other device mayprovide an electrical excitation signal to the antenna. The antenna 404converts the electrical signal to an electromagnetic field (EMF), whichexcites or powers the electronic transponder within the token locatedwithin the detection zone. As a result and in response to the EMFexcitation signal, the antenna may also detect data emitted from thetransponder. It is further contemplated that the antenna 404 would befrequency tuned to energize the transponder. For example, antenna 404may be assigned to the primary transponder and to a primary reader 416for communication there between. Once a game token is energized and thetransponder is in communication with the antenna, the data from thetransponder is sent back to the reader 416 and then on to the remainderof the system as described below.

The reader 416 connects to any type processor which may be embodied in acomputer 424 having memory 428. The computer is configured to executemachine readable code which may be stored on the memory 428. The machinereadable code may comprise software code or code logic capable ofinteraction with other systems, such as the reader. The computer 424 mayinclude an input interface for receiving input from a user such as pitsupervisory personnel or dealer. The user interface may comprise akeyboard, analog dial, potentiometer, mouse, touch screen, or any otherdevice capable of providing information to the computer. The computer424 may also be configured with one or more displays 220. The computer424 will allow the input of information by gaming establishmentsupervisory personnel.

In the embodiment shown in FIG. 4, the computer 424 connects to anetwork 224 which in turn may connect to a database 228. A database 228is generally understood in the art as an accessible memory for storingdata. The network 224 may provide access to the database forsurveillance or other personnel in the gaming establishment.

In operation, a suspect token is first placed within the detection areaand the secondary alphanumeric identifier, bar code or both are read bythe reader/computer system. In one embodiment, the bar code is read intothe system and this information is compared against information (in theform of a manifest which is discussed in detail below) which may becontained in a database associated with the game tokens. The comparisonmay be performed by software executed on the computer or by casinopersonnel. The computer then displays the actual or intended value ofthe game token. The operator may then determine if the game tokenmatches the intended value. For example, the operator may read orcontract out to a third party for reader services, the secondaryidentifier and obtain an intended value of $5 from the manifest and thisvalue may be presented on the display. This allows the secondary ID tobe read without taking the token apart, but yet the secondary ID is notvisible to the naked eye. This value is compared to the face value ofthe game token, if the token is structured (i.e. coloring and markings)as a $5 game token a redemption would likely be permitted because thegaming establishment has verified the intended value of the game token.However, if this same $5 token, as provided through electronicverification has a face value and is structured as a $1,000 token, thetoken is most likely a forgery and there may be an attempt to defraudthe gaming establishment.

Manifest generation, game token production and game token inventoryintake will be discussed with reference to FIG. 5. Game token production500 may begin with a company that specializes in RFID silicon chipmanufacturing 504. At this stage the RFID chip is initially manufacturedand may be programmed with information regarding the end use in the gametoken such as monetary value, denomination, RFID serial number, softwareversion or other manufacturing information. The information programmedinto the RFID chip by the manufacture is used to initiate and begingenerating a manifest. The manifest will follow the RFID chip throughoutthe production process at the manufacturer. The manifest is preferablyupdated with information regarding the status of each actual RFID chipcontained in the current production run. Upon completion of the RFIDsilicon chip manufacturing process both the actual RFID chips 508 andassociated manifest 512 are provided to the next company in theproduction line for the gaming token such as an RFID tag manufacturer516.

The RFID tag manufacturer 516 receives the actual RFID silicon chips 508as well as the associated manifest 512. The manifest 512 may be in anelectronic form that is readable by any computer system, such as a CD,DVD, flash memory stick, or by way of secure download via a network. Themanifest 512 is preferably delivered in a protected andverifiable/authenticated format so that only authorized personnel mayaccess and/or modify the manifest. The RFID tag manufacturer(s) 516 maythen update and modify the manifest as required throughout themanufacturing process of producing the actual RFID tags. In this way,the manifest becomes a source of historical information regarding eachRFID tag assembly and additionally provides for increase securityregarding the manufacturing process.

In some embodiments this may establish a secure process because thismethod allows the electronic historic tracking of the semiconductor totag manufacturer, tag manufacturer to end chip manufacturer and finallythe chip manufacturer to the casino establishment. Basically, itprovides the chain of trust from the primitive device (semiconductor) tothe end user (gaming chip purchased from the casino). And at the end ofthis process all of the semiconductors that are produced, tags that areproduced, and gaming chips that are produced will provide a verifiablelog of the token. This provides a balance and record showing all of theoperative and non-operative semiconductors, tags, tokens which are thenall accounted for. Each of these elements which are not recorded andtracked could be used to create counterfeits. If these elements everappear or are used in any other establishment, they would be known assuspect devices and to be then quarantined for investigation.

The RFID tag manufacturer 516 may assemble the RFID silicon chip with anassociated antenna, and a secondary identification indicia into acompleted RFID tag carrier. The secondary identification indicia mayinclude an alphanumeric code, bar code or both. The RFID tagmanufacturer 516 has the responsibility to update the manifest withaccurate information regarding each RFID tag carrier assembly. At eachstage of the manufacturing process, the manifest may be updated withinformation regarding each stage and with information regarding thetoken and sub-parts. Such information would include the values andassociation of the primary RFID transponder with the secondaryidentification indicia assembled within the completed RFID tag carrierassembly. The pairing of the primary RFID transponder with its matingsecondary identification indicia provides a means for subsequentverification of the primary RFID transponder and eventually a completegame token 100. Once the RFID tag manufacturer 516 has completed theirrespective manufacturing process, both the actual completed RFID tags520 and the currently updated manifest 524 are sent to a game tokenmanufacturer 528 for further processing.

The game token manufacturer 528 may then begin the process of producinga completed game token in which the RFID tag carrier is encapsulatedinto a game token outer rim 104 (see FIG. 1A). At this stage, the gametoken manufacturer 528 may use both the manifest data and data from theRFID tag carrier to produce a game token with the proper face value andornamental structure. The ornamental structure may include the colorscheme, texture, look and feel, or other distinguishing characteristicsof the game token. The manifest may include image files showing the‘look’ of the token. Game tokens will commonly have an elaborate colorscheme, gaming establishment logo and currency value either printed onor molded into the token. The game token manufacturer 528 has theresponsibility to update the manifest with information pertaining to thecompleted game token. For example, the manifest may be updated withinformation pairing each RFID tag carrier to a specific game token,where the information is keyed to the token's currency value, colorscheme, image, dimensions, version number and other identifying data.Upon completion of the game token 532 and updated manifest 536, both areprovided to the gaming establishment for inventory intake and furtherprocessing. The gaming establishment 538 may receive the actual physicalgame tokens 532 and the current manifest 536 together in a single securedelivery or the tokens and manifest may be securely delivered inseparate transactions. The manifest could be encrypted and to decryptand if such a process is implemented then it may be necessary to use aseparate certificate provided by the chip manufacturer, the technologylicense holder, or a chip broker or distributor of sorts. Thecertificate will be transmitted separately from the manifest and thechip shipments.

In one embodiment, the actual physical game tokens 532 may be deliveredby an armored delivery service and the current manifest 536 may bedelivered by secure electronic download over a network communicationlink. It is further contemplated, that the physical delivery of thegaming tokens 542 would be directed to gaming establishment personneldesignated to the task of receiving game tokens and the electronicdelivery of the manifest 546 would be directed to personnel designatedto receive confidential electronic information. The manifest, which maybe in electronic form, may be read directly by the casino, into theircomputer system which in turn reduces data entry burden the casino. Inaddition, the risk of data entry error by the casino is reduced.

Once the gaming establishment has received both the actual physical gametokens 542 and electronic manifest 546, the optional step of inventoryintake processing begins to verify the accuracy of the manifest, if sodesired. The physical game tokens are sent to a game token readingstation 550 for electronic reading of the token's primary transponder.After the game tokens are electronically read, they are sent for securestorage and later use in the gaming establishment's vault 554. Theelectronic game token data 556 generated by the token reading station550 is then sent to a game token inventory computer and/or reader 558for further processing. Any computer or reader system may be utilizedthat is capable of reading a token.

In a parallel process, the manifest 546 is sent to an electronic datareader 562 for electronic processing of data contained within themanifest. The data reader 562 may be one of several known types ofelectronic data readers that are capable of operative connectivity to acomputer system. Examples of a data reader include: a CD drive, DVDdrive, flash memory reader, internet browser, hard drive or any otherelement capable of receiving electronic date. It is contemplated thatthe electronic data reader 562 be operatively compatible with the formand format of the electronically supplied manifest. Once the manifest isread, the manifest data 560 is forwarded to the game token inventorycomputer 558 for further processing and the original manifest data issubsequently sent to a secure electronic data archive 566 for storage.

The game token inventory computer 558 uses computer software installedthereon to perform further processing of the electronic game token data556 and manifest data 560. The processing may include a comparison andvalidation between the electronic game token data 556 obtained from thegame token reader 550 and the manifest data 560 obtained from theelectronic data reader 562. Game token data that is not accuratelymatched or is in conflict with the manifest data may be used to alertgaming establishment supervisory personnel that an anomaly is present inthe game token inventory intake process. In this way, the gamingestablishment may conduct further research regarding the questionablegame tokens and avoid putting these suspect tokens into play. Thisprocess provides another level of security to the transaction from thetoken vendor to the casino.

For game tokens that have been adequately compared and authenticatedagainst the manifest, they may be place into the gaming rotation and putinto play within the gaming establishment. Accurate comparison data maybe subsequently sent to a game token information server 570 having anassociated data base 574. This data, or subsets thereof, may beaccessible from the network to provide access to various parties if sodesired. A database 574 is generally understood in the art as anaccessible memory for storing accessible data.

The gaming establishment may then have several departments that canaccess the game token information server 570 and associated database 574to verify a game token's value or history. One departmental computerthat may have access to the game token information server 570 is thevault computer 578. Some other examples of departments with access maybe the gaming pit supervisory computer 582, security/surveillancecomputer 586 and the cashier/cage computer 590. The access may be readonly, or read/write. These departments may use the detection systemspreviously described with respect to FIGS. 2 and 4 and comparisoninformation stored on the game token information server 570 to perform agame token inquiry and verification when these departments suspect agame token has suffered an internal failure or when the token'sintegrity is questionable. This service may be contracted out to a thirdparty service provider.

In operation, a game token may be verified prior to redemption accordingto the steps as illustrated in the operational flow diagram of FIG. 6.This is but one possible example and as such, it is contemplated that inother embodiments, other methods of operation may be enabled withoutdeparting from the scope of the claims. In step 600, game tokenproduction is initiated by a gaming establishment which places an orderfor a quantity of game tokens of a specified denomination and ornamentalappearance. During the production process of step 604, the game tokensare manufactured with a primary and a secondary identification means asprovided by the present invention. Additionally, during themanufacturing process, a manifest is generated and updated 608 duringmajor or essential production events. The manifest update may includetracking and recording of important game token related configurationtasks. It is contemplated that each vital step of the game tokenproduction process be recorded in the manifest and the responsible partyat each step be identified. This provides increased security and theability to track the production history of the game token 100. This canbe used to help identify fraud or theft.

In step 612, the completed game tokens and associated manifest aresecurely delivered to the gaming establishment. This delivery comprisesboth actual physical delivery of the gaming tokens and a transfer of themanifest in some form of secure/authenticated data transfer such as byway of an encrypted CD, DVD, flash memory or by way of secure networkdownload.

After receipt of both the physical game tokens and the electronicmanifest, the gaming establishment performs optional inventory intakeprocessing of these items in step 616. During the intake processing, theactual physical game tokens are electronically read into a computersystem and compared to the electronic data recorded in the manifest.Parameters that may be compared are the primary/secondary transmittedtoken values, token face value, manifest token values, software version,serial numbers, or any other value, data, or parameter.

At step 620 a decision is made regarding whether the transmitted tokeninformation accurately represents the manifest data. If there is not anaccurate match the game token may be quarantined at step 624 for furtherinvestigation by the gaming establishment. Conversely, if there is anaccurate match at step 620, the game tokens are placed into service andthe manifest data is provided to various departments within the gamingestablishment 628.

In step 632, a game token may be presented for redemption at the gamingestablishment. The token's currency value will need to be verified toensure the game token is not counterfeit. The game token's primaryidentification may be queried and should provide the correct value ofthe token. In one embodiment this comprises a visual inspection of thetoken or RFID read process. The gaming establishment personnel may thencompare the actual physical value as shown on the face of the game tokenwith the value transmitted by the primary identification circuit. Atdecision step 634 the personnel may permit redemption of the token, atstep 642 if there is confirmation of the value of the game token. Shouldthere be a discrepancy, the game token may require additional processingat a step 638.

For further processing, the detection system of the present inventionmay be initiated to query the secondary game token identification 646.Depending on the particular embodiment of the secondary identification,the gaming establishment personnel may either use an alphanumeric serialnumber, bar code or both to compare with the manifest data. In eitherevent, the gaming establishment personnel will obtain secondaryidentification and compare this with the manifest data 654. Aftercomparison at step 658, there will either be a confirmation of thesecondary information and the manifest data and if so, redemption may bepermitted 664. Conversely, if there is no confirmation between thesecondary information and the manifest data, the game token may bequarantined 662. The term quarantined as used herein is defined to meanremoved from play and optionally investigated.

As can be appreciated, the apparatus and method described herein hasnumerous advantages over other game token identification innovations.Once such advantage is that the present invention provides a gamingestablishment with a secondary way to verify a game token's true orintended value. This secondary identification may be implemented whenthe primary identification means has failed. Thus the gamingestablishment has more than one way to verify a game token's value.

Another advantage over other innovations is that the present inventionprovides for substantially increased security throughout the entiremanufacturing process. At several stages of the manufacturing process amanifest is updated with various pertinent information regarding thegame token, in this way a historical document is generated that catalogsthe production process. This provides several levels of review andinvolves personnel from several companies to produce the final gametoken and associated manifest. By implementing a manifest that tracksthe actual production of game tokens, the probability of a conspiracy tomodify or alter the game tokens is reduced because the conspiracy wouldrequire involvement from management personal from several companies andthis is unlikely.

Yet another advantage of the present invention is that inventory intakeprocessing at the gaming establishment is streamlined. In the past, theintake process was very labor intensive and required personnel to verifyeach token. This could be extremely time-consuming in the case where thegaming establishment ordered hundreds or thousands of game tokens. Thepresent invention provides an enhanced system for intake processing andverification of freshly manufactured game tokens.

While various embodiments of the invention have been described, othersystems, methods, features and advantages of the invention will be orwill become apparent to those of ordinary skill in the art uponexamination of the figures and detailed description. It is intended thatthat all such additional systems, methods, features, and advantages beincluded within this description, be within the scope of the invention,and be protected by the accompanying claims. In addition, the variousfeatures, elements, and embodiments described herein may be claimed orcombined in any combination or arrangement.

1. A game token comprising: a token having a recess formed therein; acarrier substantially received within said recess, wherein said carrierhas a primary identification element and a secondary identificationelement formed thereon; said primary identification element having gametoken information encoded therein; and said secondary identificationelement providing identification information associated with a manifest.2. The game token of claim 1, wherein the primary identification elementfurther comprises an electronic transponder.
 3. The game token of claim2, wherein the electronic transponder is a radio frequencyidentification chip.
 4. The game token of claim 1, wherein saidsecondary identification element, is an alphanumeric code, a bar code orboth.
 5. The game token of claim 4, wherein said secondaryidentification is configured to be readable using a reader.
 6. The gametoken of claim 5, wherein said reader comprises is a radio frequencyidentification chip reader, an X-ray device or T-Ray device.
 7. The gametoken of claim 1, wherein the game token information comprises at leastthe currency value of said token.
 8. A game token verification systemcomprising: at least one reader capable of accessing a secondaryidentification element of a game token; a computer in communication withsaid reader, the computer configured to access a database, wherein saiddatabase contains a manifest of game token identification data; adisplay connected with said computer for displaying game token data to asystem operator; and a computer program operatively running on saidcomputer, where said computer program compares game token data obtainedfrom at least one said reader with game token data within said manifest.9. The system as recited in claim 8, wherein said reader is a radiofrequency identification reader.
 10. The system as recited in claim 8,wherein said reader is an X-ray imaging device.
 11. The system asrecited in claim 8, wherein said X-ray imaging device further comprisesa bar code scanner.
 12. The system as recited in claim 8, wherein saidsecondary identification element comprises an alphanumeric code, a barcode or both.
 13. The system as recited in claim 8, wherein the gametoken data comprises at least the currency value of said token.
 14. Thesystem as recited in claim 8, wherein the manifest comprises a historyof the game token production process.
 15. A method of game tokenverification prior to redemption, the method comprising: reading asecondary identification element of a game token to obtain a secondarygame token identification; accessing a database containing a list ofgame token data; locating the secondary game token identification;obtaining a currency value for the game token from the database, whereinthe currency values is associated with the secondary game tokenidentification; paying the currency value of the game token if thecurrency value, as received from the database, matches a face value ofthe game token; refusing to pay the currency value of the game token ifthe currency value does not match the face vale of the game token. 16.The method of claim 15, wherein the secondary identification elementcomprises an alphanumeric code, a bar code or both.
 17. The method ofclaim 15, wherein the step of reading the secondary identificationelement uses an X-ray reader, a bar code scanner or both.
 18. A gametoken comprising: a token having a first side and a second side and atoken identifier visible from the either the first side, the secondside, or both; a primary identification element having game tokeninformation encoded therein, the primary identification elementcontained within the token and accessible by electronic activation; anda secondary identification element providing identification informationregarding the token.
 19. The game token of claim 18, wherein the primaryidentification element comprises an electronic transponder.
 20. The gametoken of claim 19, wherein the electronic transponder is a radiofrequency identification chip.
 21. The game token of claim 18, whereinsaid secondary identification element, is an alphanumeric code, a barcode or both contained within the game token.
 22. The game token ofclaim 21, wherein said secondary identification is configured to bereadable using a reader.
 23. The game token of claim 22, wherein saidreader comprises is a radio frequency identification chip reader, anX-ray device or T-Ray device.
 24. The game token of claim 18, whereinthe game token information comprises at least the currency value of saidtoken.