Instant anonymous account creation

ABSTRACT

A device and method is provided to create an anonymous account to play a wager-based game of chance on an mobile gaming device comprises obtaining a cashless ticket voucher having a unique identifier, the cashless ticket voucher having a monetary value, inputting the unique identifier into the mobile gaming device to expend the monetary value of the cashless ticket voucher, validating the unique identifier, and generating a game of chance on the mobile gaming device if the unique identifier is validated.

FIELD OF THE INVENTION

The present invention relates to portable gaming devices and methods,and more particularly, the present invention relates to creatinganonymous accounts for playing wager-based games on portable gamingdevices.

BACKGROUND OF THE INVENTION

Gaming is an increasingly popular industry, with casinos and othergaming establishments continually seeking new and exciting ways topresent games for play. Many games are generally presented on largefree-standing gaming devices, such as the well known slot machines,video poker machines and the like. Other games can be presented atsomething other than a gaming device, such as the table games of craps,blackjack and roulette. In addition, games such as keno and bingo may beplayed in areas specially configured to present the game to players(e.g., at areas where personnel pick up keno cards and called numbersare displayed on large displays).

Such wager-based games allow the casino customers to place bets orwagers that result in winnings if the wager is successful, or losses ifthe wager is unsuccessful. A substantial disadvantage to the way suchgames are currently presented is that a player may participate in aparticular game only at certain specified locations and/or on specificgaming machines or tables. For example, in order to play video poker ora particular slots game, such as “Red White and Blue,” a player may berequired to travel through a large hotel and/or casino to a specificgaming area where an actual video poker or “Red White and Blue” gamingmachine is located.

In addition, electronic gaming machines and gaming systems often employcashless instruments for ease of paying out winnings to users, which caninvolve the use of ticket printers and other associated hardware andsoftware components. Such cashless instruments can include, for example,paper tickets used in the EZ Pay™ system by IGT of Reno, Nev., amongothers. Of course, other suitable items or devices can be used as suchcashless instruments as well, and it is understood that the presentinvention is directed to all such items. Paper cashless tickets inparticular are printed by a printer at the gaming machine upon therequest of a player at the completion of a game or gaming session, andsignify a cash amount owed to the player, a portion of which mightrepresent cash winnings owed to the player. Such paper tickets typicallyinclude appropriate currency or credit amounts, as well as variousidentification features printed on them, which can include a uniqueidentifier or code.

It will be readily understood that such a unique identifier or code canbe called a variety of names, such as an identification, verification,and/or authentication number or code, among others, and that any suchterm or terms can be used where the basic function is to identify aspecific cashless instrument that has been issued at a specific time andlocation. Such a unique identifier or code on a printed ticket istypically used in association with a matching confirmation number orcode that is stored on the system, such that a match can be made with arecorded and outstanding number when a ticket is offered or received,whereby the ticket can be determined as valid and thus be accepted. Forpurposes of consistency within the present disclosure, the term “uniqueidentification” (or code) will be used with respect to printed ticketsor other cashless instruments, while the term “confirmation number” (orcode) will be used to denote those numbers or codes that are stored on asystem.

Casinos and other gaming operators generally desire to provide to theircustomers greater accessibility to gaming devices and the opportunity toplay games such as through the use of a personal gaming device (PGD).However, it is inconvenient and cumbersome to add additional funds tothe PGD. Players typically must bring the PGD to a cashier and give thecashier cash prior to being able to play wager based games on the PGD.Players do not have the option to simply insert additional funds or thecashless tickets directly into the PGD similar to fixed gaming machinesusing a bill/ticket acceptor. There is no equivalent bill/ticketacceptor that is small enough to be used with a PGD. Even a simplescanner may add too much size and cost to a PGD.

SUMMARY OF THE INVENTION

A device and method is provided to create an anonymous account to play awager-based game of chance on an mobile gaming device comprisesobtaining a cashless ticket voucher having a unique identifier, thecashless ticket voucher having a monetary value, inputting the uniqueidentifier into the mobile gaming device to expend the monetary value ofthe cashless ticket voucher, validating the unique identifier, andgenerating a game of chance on the mobile gaming device if the uniqueidentifier is validated.

In another embodiment, a method for creating an anonymous account toplay a game of chance on a mobile gaming device comprises obtaining acashless ticket voucher having a unique identifier, the cashless ticketvoucher having a monetary value, inputting the unique identifier intothe mobile gaming device to expend the monetary value of the cashlessticket voucher, validating the unique identifier, and generating a gameof chance on the mobile gaming device if the unique identifier isvalidated.

The portable gaming device to play at least one wager-based game mayhave a communication interface adapted to communicate with a remotegaming server, a display, an input mechanism to receive a uniqueidentifier of a cashless ticket voucher, a controller operativelycoupled to the display, communication interface, and the inputmechanism, and a validator operatively coupled to the controller totransmit the unique identifier to the remote gaming server forvalidation, the validator to receive an approval or a rejection messagefrom the remote gaming server. The controller is programmed to cause thedisplay to generate a game display relating to the at least onewager-based game and display an outcome of the at least one wager-basedgame if an approval message is received by the validator.

The validation server may have an interface to receive a cashless ticketvoucher unique identifier, and a confirmation number database having alist of confirmation numbers of distributed cashless ticket voucherswherein the unique identifier is matched to a confirmation number, andwherein an approval message is transmitted to a remote gaming server ifa match is found.

A mobile gaming network may have a validation server, comprising aninterface to receive a cashless ticket voucher unique identifier, and aconfirmation number database having a list of confirmation numbers ofdistributed cashless ticket vouchers, wherein the unique identifier ismatched to a confirmation number. The network may also have at least oneportable gaming device to play at least one wager-based game, comprisinga communication interface adapted to communicate with a remote gamingserver, a display, an input mechanism to receive the unique identifier,a controller operatively coupled to the display, communicationinterface, and the input mechanism, and a validator operatively coupledto the controller to transmit the unique identifier to the remote gamingserver for validation, the validator to receive an approval or arejection message from the remote gaming server wherein an approvalmessage is relayed from the validation server to the remote gamingserver if a match is found, and wherein the controller is programmed tocause the display to generate a game display relating to the at leastone wager-based game and display an outcome of the at least onewager-based game if an approval message is received by the validator.

BRIEF DESCRIPTION OF THE DRAWINGS

The accompanying drawings, which are incorporated into and constitute apart of this specification, illustrate one or more embodiments and,together with the detailed description, serve to explain the principlesand implementations of the invention.

In the drawings:

FIG. 1 is a perspective view of an exemplary PGD in accordance with anembodiment of the invention.

FIG. 2 is a block diagram of an exemplary component arrangement of thePGD illustrated in FIG. 1.

FIG. 3 is a schematic of an exemplary gaming system including a PGD inaccordance with the invention

FIG. 4 is a block diagram illustrating a method for creating ananonymous account to play a wager-based game of chance.

FIG. 5 is a diagram illustrating an exemplary gaming machine inaccordance with an embodiment of the invention.

FIG. 6 is a block diagram illustrating an exemplary network topology inaccordance with an embodiment of the invention.

FIG. 7 is a block diagram illustrating a simplified communicationtopology in accordance with an embodiment of the invention.

DETAILED DESCRIPTION

Embodiments are described herein in the context of an instant anonymousaccount creation. Those of ordinary skill in the art will realize thatthe following detailed description is illustrative only and is notintended to be in any way limiting. Other embodiments will readilysuggest themselves to such skilled persons having the benefit of thisdisclosure. Reference will now be made in detail to implementations asillustrated in the accompanying drawings. The same reference indicatorswill be used throughout the drawings and the following detaileddescription to refer to the same or like parts.

In the interest of clarity, not all of the routine features of theimplementations described herein are shown and described. It will, ofcourse, be appreciated that in the development of any such actualimplementation, numerous implementation-specific decisions must be madein order to achieve the developer's specific goals, such as compliancewith application- and business-related constraints, and that thesespecific goals will vary from one implementation to another and from onedeveloper to another. Moreover, it will be appreciated that such adevelopment effort might be complex and time-consuming, but wouldnevertheless be a routine undertaking of engineering for those ofordinary skill in the art having the benefit of this disclosure.

In general, the present invention is directed to creating an anonymousaccount to play a wager-based game of chance on an individual or mobilegaming unit such as a PGD. The use of a cashless ticket voucher does notrequire a player to input personal information thereby remaininganonymous. The ability to use cashless ticket vouchers with a mobilegaming unit is also addressed.

Personal Gaming Device

The individual gaming unit may be a PGD that is adapted to present awager-based game for play by a player. An example is described inco-pending patent application Ser. No. 11/155,702, filed Jun. 16, 2005,entitled “Virtual Leash For Personal Gaming Device” and co-pendingpatent application Ser. No. 10/672,307, filed Sep. 26, 2003, entitled“Personal Gaming Device and Method Of Presenting a Game” which areincorporated herein in their entirety for all purposes. FIG. 1illustrates an exemplary PGD, generally numbered 20, in accordance withone embodiment of the invention. In general, the PGD 20 includes a bodyor housing 22. The body 22 may be constructed from a wide variety ofmaterials and in a wide variety of shapes. In one embodiment, the body22 is constructed from one or more molded polypropylene or other plasticcomponents. The body 22 may be constructed of metal or a wide variety ofother materials. As illustrated, the body 22 is generally rectangular inshape, having a front side or face 24, a rear side or face (notvisible), a top end 26, a bottom end 28, a first side 30 and a secondside 32. Preferably, the body 22 defines an enclosed interior space (notshown) in which a variety of components are located.

In a preferred embodiment, the PGD 20 is adapted to present video andsound game data to a player. As illustrated, the PGD 20 includes adisplay 34. The display is located in the front face 24 of the body 22,thus facing upwardly towards a player. In a preferred embodiment, thedisplay 34 comprises a liquid crystal display (“LCD”), and inparticular, an LCD permitting touch-screen input. It will be appreciatedthat other types of displays may be provided. PGD 20 also includes asound generating device in the form of at least one speaker 36. In oneembodiment, the speaker 36 is positioned beneath a top or cover portionof the body 22 having one or more perforations or apertures thereinthrough which the sound may readily travel. As illustrated, the speaker36 is located near the bottom end 28 of the body 22, generally oppositethe display 34. It will be appreciated that the speaker 36 or additionalspeakers may be provided in a wide variety of locations, such as at oneor both sides 30, 32 of the body 22.

In a preferred embodiment, the PGD 20 is adapted to send and/or receivedata from another device. As such, the PGD 20 includes one or more datainput and/or output devices or interfaces. In one embodiment, the PGD 20includes an RS-232 data port 38 for transmitting and accepting data,such as through a cable extending between the PGD 20 and another device,such as a computer. In one embodiment, the PGD 20 includes a USB dataport 40 for transmitting and accepting data, also through a cable. Inone embodiment, the PGD 20 includes an infrared datatransmitter/receiver 42 for transmitting information in wireless,infrared light form. In a preferred embodiment, the PGD 20 includesanother wireless communication device 44, such as a wirelesscommunication device/interface operating at radio frequency, such as inaccordance with the IEEE-802.1x or the Bluetooth™ standard.

Preferably, a player is permitted to provide input to the PGD 20, suchas for playing a game. As stated above, one means of input may bethrough the display 34. The display 34 may also be arranged to acceptinput via a touch screen, stylus or other device. In one embodiment, thePGD 20 includes a keypad 46. In one or more embodiments, the keypad 46is a sealed keypad having one or more keys or buttons which may beactivated by a player, such as by depressing the button with theirfinger. The PGD 20 can include a microphone 48 arranged to accept voiceinput from a player. Other input devices may alternatively be providedor be provided in addition to those input devices described. Forexample, a player may be permitted to provide input through a joystick(not shown). The joystick may comprise a control element associateddirectly with the body 22 of the PGD 20. Alternatively, the joystick maybe separate from the PGD 20, and then be placed in communicationtherewith, such as by plugging in the joystick to a data port of PGD 20.A smart card reader, optical reader, memory card slot, or other inputdevice may be provided for reading information from another element,such as a card, magnetic stripe, flash memory cards, ticket or the like.For example, in some embodiments of the invention PGD 20 includes ascanner for scanning a cashless ticket voucher. Some such embodimentsare made for use with cashless ticket vouchers having a light-sensitivecoating or the like: these embodiments may illuminate such a cashlessticket voucher with light of a sufficient intensity (and/or within aproper frequency range) to darken and void the cashless ticket voucher.PGD 20 may also include a keyboard or mouse.

In one embodiment, the PGD 20 includes an image collection device 41,such as a camera. The image collection device 41 may be used, forexample, to capture the image of a user or player of the PGD 20. Thisimage information may be used for security or authentication purposes,as set forth in greater detail below. The PGD 20 may also include abiometric sensor or device, such as a fingerprint scanner 49. In oneembodiment, as illustrated, the fingerprint scanner 49 may be locatedbehind or beneath a user input button, such as a “spin” or “draw”button. In this manner, a player's fingerprint may be obtained withoutthe user or player having to consciously participate. As describedbelow, a player's scanned fingerprint information may be used forauthentication purposes. The biometric sensor may be a fingerprintimager, a retina print imager, a voice pattern imager, a facialcomponent imager, handwriting sensor, and other similar devices torecognize and identify the player. The biometric sensor offers areliable and inexpensive way to authenticate the identity of a player,which is more secure than personal identification numbers (PINs) orpasswords, which are subject to being compromised or forgotten.

The PGD 20 may include a card reader 50. As illustrated, the card reader50 is located in a side 30 of the body 22 of the PGD 20. In a preferredembodiment, the card reader 50 comprises a magnetic stripe reader forreading information from a magnetic stripe of a card. The card readermay also be adapted to write or store data to a smart card or portablememory module.

As illustrated, the card reader 50 includes a slot that is positioned inthe side 30 of the PGD 20. The PGD 20 may be battery-powered, such aswith a rechargeable battery pack. An ON/OFF button 47 may be providedfor controlling the power to the PGD 20. The PGD 20 may be docked at orotherwise associated with a free-standing gaming machine or other gamingdevice. At such times that the PGD 20 is docked, the internal battery ofthe device can be recharged for later use in an undocked or “remote”mode, as will be readily appreciated. Appropriate detection provisions,warnings and safeguards for a low battery status in PGD 20 while in sucha remote mode can also be provided.

Preferably, PGD 20 includes control means for controlling the operationof the device, including accepting input and providing output. Oneembodiment of such a control means is illustrated in FIG. 2, a blockdiagram of an exemplary component arrangement of the PGD illustrated inFIG. 1. As illustrated, PGD 20 preferably includes a computingenvironment serving as the control means. The computing environmentincludes a central processing unit 52. The central processing unit 52preferably comprises a microprocessor. The central processing unit 52 isassociated with a bi-directional system bus 54. The system bus 54 maycontain, address lines for addressing a video memory or main memory. Inaddition, the system bus 54 includes a data bus for transferring databetween and among components associated with the bus 54. Alternatively,multiplex data/address lines may be used instead of separate data andaddress lines.

The display 34 is coupled to the bus 54. In one embodiment, a videomemory (not shown) is provided in association with the bus 54. The videomemory may be dual-ported video random access memory. The video memoryis preferably coupled to and arranged to drive the LCD display 34. Ofcourse, the video memory might be coupled to a cathode ray tube (CRT) orother suitable display device. A memory 56 is associated with the systembus 54. In one embodiment, the memory 56 comprises dynamic random accessmemory (“DRAM”), synchronous DRAM or other forms of random accessmemory. The memory 56 may have other forms as well, such aselectronically erasable programmable read-only memory (“EEPROM”).Preferably, the memory 56 is of the type that permits data to be writtenthereto and read there from. A mass storage device 58 is preferably alsoaccessible via the bus 54. The mass storage device 58 may be of theread-only type (such as a CD or DVD optical drive) or may be of theread-and-write variety such as flash memory, compact flash, orCD/DVD-R/W drives.

A validator 80 may also be coupled to the bus 54. The validator 80 maysend the unique identifier received by the central processing unit 52 tothe remote gaming server to be validated. If the unique identifier isvalidated, as further described below with reference to the validationserver, the validator may receive an approved message. If the uniqueidentifier is not validated, a rejected message may be received. Assuch, the validator 80 emulates or acts as the bill or ticketvalidator/acceptor for the PGD.

As illustrated, the variety of input and output devices can beassociated with the system bus 54, and thus the other componentsassociated with the bus. As illustrated, the speaker 36, keypad 46 andcard reader 50 are associated with the system bus 54. A variety of datainput/output devices (“I/O Devices”) may also associated with the systembus 54, such as, though not specifically illustrated, the RS-232 port38, the USB 40, and the infrared communication transmitter/receiver 42.As will be appreciated, these devices/elements may operate in accordancewith different protocols and have different architectures, and haveappropriate interfaces provided for communicating with the system bus54. For example, the infrared transmitter/receiver may have differentlayers, including a physical layer including the light-emitting device,and link and other layers which include software and/or hardware, as isknown. A variety of other input/output devices may be associated withthe PGD 20, as now known or later developed.

As stated above, the PGD 20 may include a wireless, radio frequency, andcommunication interface. The architectures/protocols of such wirelesscommunication interfaces are well known and thus will not be describedin detail herein. In general, however, such an interface 44 permitstwo-way data communication. The PGD 20 may be permitted to communicatewith a wide variety of devices/systems, including at least one deviceassociated with a gaming network. The PGD 20 may send and receive data,including program code, through the communication interface 44 (or theother input/output devices, such as the infrared transmitter/receiver).As one example described in more detail below, a gaming server maytransmit requested code for an application via a transceiver to thecommunication interface 44 of the PGD 20. The received code may beexecuted by the central processing unit 52 as it is received and/or bestored in the memory 56 for later execution. In one embodiment, the PGD20 may include a mass data storage device (not shown) such as a harddrive, CD-ROM or the like. In one or more embodiments, the memory 56 maycomprise a smart card or similar easily removable (and replaceable)device. In such event, data, such as operating code, may be associatedwith the PGD 20 via a CD-ROM placed in a CD-ROM drive or by insertion ofa coded smart card or portable memory device.

Although the foregoing exemplary PGD 20 is fairly specific with respectto many details, it will be readily appreciated that a wide variety ofsimilarly suitable devices can also be used as a PGD. For example, thePGD may be a specialized unit carried by casino personnel to onlyprovide mobile gaming service functions. As discussed herein, it will beunderstood that use of the term “PGD” can refer to the exemplary PGD 20disclosed above, as well as any other suitable device that can serve asa PGD for any purpose of the present invention, and that such a deviceor devices may or may not be portable or hand-held. Further, while useof the terms “portable” and “mobile” gaming device are used, it isunderstood that use of other suitable non-portable PGDs may besubstituted in relevant instances.

FIG. 3 is a schematic of an exemplary gaming system including a PGD inaccordance with the invention. As illustrated therein, the gamingsystem, generally numbered 60, includes a PGD interface 62. This PGDinterface 62 serves as a gateway to data communications between the PGD20 and various networks, servers and other devices. In one embodiment,data communications between the PGD 20 and the PGD interface 62 is via atransceiver 64 associated with the PGD interface 62. In general, thetransceiver is arranged to receive information from the PGD interface 62and transmit it to the PGD 20 and/or receive information from the PGD20. As illustrated, a PGD 20 may communicate directly with thetransceiver 64. It will be appreciated, however, that limitations mayexist as to the range over which such data can be accuratelytransmitted. Therefore, in one or more embodiments, one or more relays66 may be provided for receiving and re-transmitting the data to theappropriate location.

As stated above, in a preferred embodiment, the PGD interface 62 servesas a gateway or interface between the one or more PGDs 20 and one ormore other devices, systems or networks. The interface 62, whether inthe form of a wireless interface or a docking station, may be associatedwith or reside in a kiosk, slot or other type of gaming machine, a pointof sale device, a personal computer or the like. As illustrated, in oneembodiment, the PGD interface 62 is associated with a financial server68 either via a direct link (as illustrated in FIG. 3) or via a network.The financial server 68 may be a computer or be associated with acomputer having a processing unit and one or more data files. Thefinancial server 68 is preferably arranged to confirm financialtransaction data. For example, in order for a player to be permitted toplay a game using the PGD 20, the player may be required to place a bet.In one embodiment, the portable memory device may be updated using acredit card. In such event, the player may swipe their credit card usingthe card reader 50 associated with the PGD 20. This data may betransmitted to the financial server 68 for confirmation (and as is knownin the art, the generation of financial transaction data, such as atransaction date, time and value).

In one embodiment, the system 60 includes a game server 70. Asillustrated, the game server 70 is associated with the PGD interface 62,either directly or via a network. In one or more embodiments, the gameserver 70 is, or is associated with, a computing device, such as aprocessor adapted to execute game code. Preferably, the game server 70is arranged to provide game data to the PGD 20 via the interface 62.This game data may comprise video data for generating an image on adisplay 34 of the PGD 20, and sound data for generating sound emitted bythe speaker 36. The game server 70 is preferably also adapted to receiveinput from a player, such as a player selection during the play of agame. In one embodiment, a reservation server 72 is connected to the PGDinterface 62, either directly or via a network. The reservation server72 may be arranged to accept reservation selections, and provideinformation regarding available hotel rooms, rates, shows, restaurantsand the like for use by a player of the PGD 20 in making a reservationselection.

The system may also include a validation server 82 having a confirmationnumber database with a list of confirmation numbers of distributedcashless ticket vouchers. The validation server 82 may have an interfaceto receive the unique identifier of a cashless ticket voucher. Theunique identifier may then be compared with the list of confirmationnumbers in the confirmation number database. If there is a match, anapproved message may be relayed to the remote gaming server and/or PGDand the unique identifier and confirmation number is subsequently markedas used or deleted. This ensures that the cashless ticket voucher cannotbe reused if reinserted. Otherwise, a rejection message may be relayedif no match was found.

While the PGD 20 may communicate with other devices via direct networklinks as illustrated in FIG. 2, the PGD 20 may communicate with avariety of other devices (via a wired or wireless connection) such asthe portable memory device, a printer, kiosk, cell phone, slot machine,another computer, and the like. Internet gateway 74 may also used toallow the PGD 20 to connect to other services available on the Internet.

Anonymous Account Creation

FIG. 4 is a block diagram illustrating a method for creating ananonymous account to play a wager-based game of chance. A cashlessticket voucher may be formed at 400 via a remote gaming server. Theremote gaming server may be, but is not limited to, a personal computer,slot machine, a kiosk, remote gaming device, another PGD such as but notlimited to a cell phone, a personal digital assistant, and a wirelessgame player, or any other gaming machine that may be used to generate acashless ticket voucher. For example, a player may input credit cardinformation into a personal computer to generate a cashless ticketvoucher for use on a PGD. Alternatively, the player may input cash intoa bill validator on a slot machine to obtain the cashless ticketvoucher. In some implementations, a player may use a portable device,such as a cellular telephone, a personal digital assistant, a PDG, etc.,to communicate directly with a gaming machine for the purpose ofobtaining the cashless ticket voucher. For example, an infrared,Bluetooth™ or other interface of the portable device may use a systemcomparable to that of NTT DoCoMo's i-mode mobile Internet service,Sanyo's i-PS system, or the like, which facilitate purchases fromvending machines using cellular telephones. User ID and age could beverified by reference to cellular phone registration data, e.g., byusing a system such as that developed by Matsushita Refrigeration Co.for ensuring that alcoholic beverages and cigarettes are sold only toadults from vending machines. Through whatever means, the cashlessticket voucher formed may have a unique identifier and a monetary valueassociated with it. This allows a user to remain anonymous when playinga wager-based game of chance since no identifying or personalinformation is needed to generate and/or use the cashless ticketvoucher. The unique identifier may be any combination of words, number,and/or symbols as described below to identify and provide security tothe cashless ticket voucher. The ticket voucher may be printed with anytemplate desired. For example, the ticket voucher may not indicate themonetary value, may state that it is valid for PGD use only, etc.

The ticket voucher unique identifier may be inputted into the secondgaming device, such as a PGD, at 402 to expend the monetary value of thecashless ticket voucher. The unique identifier may be inputted using anymeans available. For example, the player may manually input the uniqueidentifier into the PGD using an interactive display, keyboard, or anyother similar means. In another embodiment, the PGD may be placed in adocking station where the unique identifier may be downloaded onto thedevice. In yet another embodiment, a camera on the PGD may be used. Animage of the ticket voucher may be taken and transmitted to the PGDand/or remote gaming server.

In still another embodiment, the unique identifier may be obtained via ascanner, such as a barcode or magnetic stripe scanner, or ticketacceptor. The scanner or ticket acceptor may be coupled to the PDGand/or remote gaming server. If coupled to the remote gaming server, adocking station, transceiver, or wireless or non-wireless means may beused to download the unique identifier to the PGD.

Alternatively, the unique identifier does not have to be downloaded tothe PGD. Rather, the scanner or ticket acceptor may be in communicationwith the validation server and forwards the unique identifier directlyto the validation server for validation. In any of the above examples,an additional security code may be associated with the uniqueidentifier. The security code may be any known security codes such as apersonal identification number or password, a biometric identifierobtained from a biometric device as described above, and any othersimilar security means. The player may be required to input the securitycode before the unique identifier is forwarded to the validation server.

The unique identifier may be transmitted to the validation server at404. The validation server may have a confirmation number database witha list of confirmation numbers of distributed cashless ticket vouchers.The unique identifier may then be compared with the list of confirmationnumbers in the confirmation number database. If there is a match at 406,an approved message may be relayed to the remote gaming server ordirection to the PGD and the unique identifier and confirmation numberis subsequently marked as used or deleted. This ensures that thecashless ticket voucher cannot be reused if reinserted. Otherwise, arejection message may be relayed if no match was found.

A game of chance may be generated on the PGD if the unique identifier isvalidated at 408. This may be signified by an approval message receivedfrom the validation server and/or a transfer of monetary funds to thePGD. In one embodiment, the PGD may require the user to acknowledge thatuse of the monetary funds to play the game of chance will void thecashless ticket voucher.

The use of cashless ticket vouchers requires that certain securitymeasures be taken. For example, players may attempt to redeem the samevoucher ticket a second time. Thus, efforts should be taken to notifyplayers that a ticket voucher has been redeemed and is no longer valid.One embodiment to void a redeemed ticket may be to print a writtenindicium on the cashless ticket voucher to indicate the ticket voucheris void, such as a dark line, “X”, the word “VOID”, or any other writtenindicium.

In another embodiment, the ticket voucher may be coated with a lightsensitive coating so that when the redeemed ticket is scanned orinserted into a ticket accepter, the ticket voucher may be exposed tolight, thereby voiding the ticket voucher.

Alternatively, the tickets may be returned to the establishment wherethe ticket voucher was formed. Various incentives may be used to enticea player to return redeemed ticket vouchers. One embodiment may be toretain an amount from the monetary value of the ticket voucher from gameplay, similar to a security deposit. Once the ticket is returned, theretained amount would be returned to the player. This may also be usedwith player tracking points—points may be deducted and redeemed uponreturn of the ticket voucher. In another embodiment, the ticket vouchermay be used to enter the player into a second game of chance, such as alottery drawing. It will now be realized that other means to entice aplayer to return redeemed ticket vouchers may be used.

Secure Validation Numbers and Counterfeit Detection

The cashless instruments or printed tickets described above can in someinstances be susceptible to counterfeiting by those that wish tofabricate false cashless instruments and redeem them for money.Typically, the validation number is printed on the printed ticket and acorresponding confirmation number is also stored in a back-end system,such as the confirmation number database of the validation server. Whena printed ticket is redeemed, the unique identifier is checked to see ifit matches the stored confirmation number in the validation server. Ifso, the printed ticket amount is paid out. However, such validationnumbers are often just number strings that may have predictable portionsand/or unpredictable portions.

For example, unique identifiers are often generated as a multiple-digitnumber or code, such as a 10 digit number “1234567890,” where the firstseven digits “1234567” are used for every printed ticket generated at agiven location and time frame, while the last three digits “890” aresequentially or randomly generated with each new ticket printed at thatlocation and during that time frame. Thus, a printed ticket could beissued with the unique identifier “1234567890,” and 100 tickets lateranother printed ticket might be printed with the unique identifier“1234567215,” and so forth. As will be readily appreciated, charactersother than numbers might also be used in such a number or codevalidation system, with such characters including letters, dashes,punctuation marks and the like. Alternatively, bar codes or otherdevices could be used in such a ticket validation system. It will beunderstood that any and all such alternative uses of other charactersand/or devices can be used in conjunction with the methods and systemsof the present invention. In yet another specific example, amultiple-digit number or code for a printed ticket might be representedas “1234-ABCD-5678-efgh,” where the first two sets of characters canrepresent the gaming establishment, gaming machine, time and date, amongother items, and thus appear to remain constant and/or can be readilydiscerned by a thief or other unscrupulous party attempting to decipherprinted tickets. The third set of characters might simply involve asequential numbering system for printed tickets, while the fourth set ofcharacters represents a randomly generated set of numbers or othercharacters that cannot be predicted.

A potential thief or other unscrupulous party might then discern such apattern by a simple inspection of several printed tickets, thus guessingthat one or more sets of digits remain the same, while others sets orindividual digits are varied, perhaps sequentially, perhaps randomly, orin some other manner. The potential thief could then create his or herown printed tickets with the same constant or predictable digits, andguess at the variable or random digits, hoping to get lucky for an“easy” cash out of a fraudulent ticket. To combat such an approach,various methods and systems, such as incorporating the use of hashnumbers, codes or values may be used. This and other methods and systemsare disclosed in co-pending application Ser. No. 10/938,934, filed Sep.9, 2004, entitled “Counterfeit Cashless Instrument Detection Methods andSystems”, which is incorporated herein in its entirety for all purposes,and will not be discussed further to prevent obfuscation of theinvention.

Exemplary Gaming Machine

As stated above, the remote gaming server may be, but is not limited to,a personal computer, slot machine, remote gaming device, another PGDsuch as but not limited to a cell phone, a personal digital assistant,and a wireless game player, or any other gaming machine. FIG. 5illustrates an exemplary gaming machine in accordance with an embodimentof the invention.

Video gaming machine 502 includes a main cabinet 504, which generallysurrounds the machine interior (not shown) and is viewable by users. Themain cabinet includes a main door 508 on the front of the machine, whichopens to provide access to the interior of the machine. Attached to themain door are player-input switches or buttons 5032, a coin acceptor5028, and a bill validator 5030, a coin tray 5038, and a belly glass5040. Viewable through the main door is a video display monitor 5034 andan information panel 5036. The display monitor 5034 will typically be acathode ray tube, high resolution flat-panel LCD, or other conventionalelectronically controlled video monitor. The information panel 5036 maybe a back-lit, silk screened glass panel with lettering to indicategeneral game information including, for example, a game denomination(e.g. $0.25 or $1). The bill validator 5030, player-input switches 5032,video display monitor 5034, and information panel are devices used toplay a game on the game machine 502. The devices are controlled bycircuitry (e.g. the master gaming controller) housed inside the maincabinet 504 of the machine 502.

Many different types of games, including mechanical slot games, videoslot games, video poker, video black jack, video pachinko and lottery,may be provided with gaming machines of this invention. In particular,the gaming machine 502 may be operable to provide a play of manydifferent instances of games of chance. The instances may bedifferentiated according to themes, sounds, graphics, type of game(e.g., slot game vs. card game), denomination, number of paylines,maximum jackpot, progressive or non-progressive, bonus games, etc. Thegaming machine 502 may be operable to allow a player to select a game ofchance to play from a plurality of instances available on the gamingmachine. For example, the gaming machine may provide a menu with a listof the instances of games that are available for play on the gamingmachine and a player may be able to select from the list a firstinstance of a game of chance that they wish to play.

The various instances of games available for play on the gaming machine502 may be stored as game software on a mass storage device in thegaming machine or may be generated on a remote gaming device but thendisplayed on the gaming machine. The gaming machine 502 may execute gamesoftware, such as but not limited to video streaming software thatallows the game to be displayed on the gaming machine. When an instanceis stored on the gaming machine 502, it may be loaded from the massstorage device into a RAM for execution. In some cases, after aselection of an instance, the game software that allows the selectedinstance to be generated may be downloaded from a remote gaming device,such as another gaming machine.

The gaming machine 502 includes a top box 506, which sits on top of themain cabinet 504. The top box 506 houses a number of devices, which maybe used to add features to a game being played on the gaming machine502, including speakers 5010, 5012, 5014, a ticket printer 5018 whichprints bar-coded tickets 5020, a key pad 5022 for entering playertracking information, a florescent display 5016 for displaying playertracking information, a card reader 5024 for entering a magnetic stripedcard containing player tracking information, and a video display screen5045. The ticket printer 5018 may be used to print tickets for acashless ticketing system. Further, the top box 506 may house differentor additional devices than shown in FIG. 5. For example, the top box maycontain a bonus wheel or a back-lit silk screened panel that may be usedto add bonus features to the game being played on the gaming machine. Asanother example, the top box may contain a display for a progressivejackpot offered on the gaming machine. During a game, these devices arecontrolled and powered, in part, by circuitry (e.g. a master gamingcontroller) housed within the main cabinet 504 of the machine 502.

Understand that gaming machine 502 is but one example from a wide rangeof gaming machine designs on which the present invention may beimplemented. For example, not all suitable gaming machines have topboxes or player tracking features. Further, some gaming machines haveonly a single game display—mechanical or video, while others aredesigned for bar tables and have displays that face upwards. As anotherexample, a game may be generated in on a host computer and may bedisplayed on a remote terminal or a remote gaming device. The remotegaming device may be connected to the host computer via a network ofsome type such as a local area network, a wide area network, an intranetor the Internet. The remote gaming device may be a portable gamingdevice such as but not limited to a cell phone, a personal digitalassistant, and a wireless game player. Images rendered from 3-D gamingenvironments may be displayed on portable gaming devices that are usedto play a game of chance. Further a gaming machine or server may includegaming logic for commanding a remote gaming device to render an imagefrom a virtual camera in a 3-D gaming environments stored on the remotegaming device and to display the rendered image on a display located onthe remote gaming device. Thus, those of skill in the art willunderstand that the present invention, as described below, can bedeployed on most any gaming machine now available or hereafterdeveloped.

Some preferred gaming machines of the present assignee are implementedwith special features and/or additional circuitry that differentiatesthem from general-purpose computers (e.g., desktop PC's and laptops).Gaming machines are highly regulated to ensure fairness and, in manycases, gaming machines are operable to dispense monetary awards ofmultiple millions of dollars. Therefore, to satisfy security andregulatory requirements in a gaming environment, hardware and softwarearchitectures may be implemented in gaming machines that differsignificantly from those of general-purpose computers. A description ofgaming machines relative to general-purpose computing machines and someexamples of the additional (or different) components and features foundin gaming machines are described below.

At first glance, one might think that adapting PC technologies to thegaming industry would be a simple proposition because both PCs andgaming machines employ microprocessors that control a variety ofdevices. However, because of such reasons as 1) the regulatoryrequirements that are placed upon gaming machines, 2) the harshenvironment in which gaming machines operate, 3) security requirementsand 4) fault tolerance requirements, adapting PC technologies to agaming machine can be quite difficult. Further, techniques and methodsfor solving a problem in the PC industry, such as device compatibilityand connectivity issues, might not be adequate in the gamingenvironment. For instance, a fault or a weakness tolerated in a PC, suchas security holes in software or frequent crashes, may not be toleratedin a gaming machine because in a gaming machine these faults can lead toa direct loss of funds from the gaming machine, such as stolen cash orloss of revenue when the gaming machine is not operating properly.

For the purposes of illustration, a few differences between PC systemsand gaming systems will be described. A first difference between gamingmachines and common PC based computers systems is that gaming machinesare designed to be state-based systems. In a state-based system, thesystem stores and maintains its current state in a non-volatile memory,such that, in the event of a power failure or other malfunction thegaming machine will return to its current state when the power isrestored. For instance, if a player was shown an award for a game ofchance and, before the award could be provided to the player the powerfailed, the gaming machine, upon the restoration of power, would returnto the state where the award is indicated. As anyone who has used a PC,knows, PCs are not state machines and a majority of data is usually lostwhen a malfunction occurs. This requirement affects the software andhardware design on a gaming machine.

A second important difference between gaming machines and common PCbased computer systems is that for regulation purposes, the software onthe gaming machine used to generate the game of chance and operate thegaming machine has been designed to be static and monolithic to preventcheating by the operator of gaming machine. For instance, one solutionthat has been employed in the gaming industry to prevent cheating andsatisfy regulatory requirements has been to manufacture a gaming machinethat can use a proprietary processor running instructions to generatethe game of chance from an EPROM or other form of non-volatile memory.The coding instructions on the EPROM are static (non-changeable) andmust be approved by a gaming regulators in a particular jurisdiction andinstalled in the presence of a person representing the gamingjurisdiction. Any changes to any part of the software required togenerate the game of chance, such as adding a new device driver used bythe master gaming controller to operate a device during generation ofthe game of chance can require a new EPROM to be burnt, approved by thegaming jurisdiction and reinstalled on the gaming machine in thepresence of a gaming regulator. Regardless of whether the EPROM solutionis used, to gain approval in most gaming jurisdictions, a gaming machinemust demonstrate sufficient safeguards that prevent an operator orplayer of a gaming machine from manipulating hardware and software in amanner that gives them an unfair and some cases an illegal advantage.The gaming machine should have a means to determine if the code it willexecute is valid. If the code is not valid, the gaming machine must havea means to prevent the code from being executed. The code validationrequirements in the gaming industry affect both hardware and softwaredesigns on gaming machines.

A third important difference between gaming machines and common PC basedcomputer systems is the number and kinds of peripheral devices used on agaming machine are not as great as on PC based computer systems.Traditionally, in the gaming industry, gaming machines have beenrelatively simple in the sense that the number of peripheral devices andthe number of functions the gaming machine has been limited. Further, inoperation, the functionality of gaming machines were relatively constantonce the gaming machine was deployed, i.e., new peripherals devices andnew gaming software were infrequently added to the gaming machine. Thisdiffers from a PC where users will go out and buy different combinationsof devices and software from different manufacturers and connect them toa PC to suit their needs depending on a desired application. Therefore,the types of devices connected to a PC may vary greatly from user touser depending in their individual requirements and may varysignificantly over time.

Although the variety of devices available for a PC may be greater thanon a gaming machine, gaming machines still have unique devicerequirements that differ from a PC, such as device security requirementsnot usually addressed by PCs. For instance, monetary devices, such ascoin dispensers, bill validators and ticket printers and computingdevices that are used to govern the input and output of cash to a gamingmachine have security requirements that are not typically addressed inPCs. Therefore, many PC techniques and methods developed to facilitatedevice connectivity and device compatibility do not address the emphasisplaced on security in the gaming industry.

To address some of the issues described above, a number ofhardware/software components and architectures are utilized in gamingmachines that are not typically found in general purpose computingdevices, such as PCs. These hardware/software components andarchitectures, as described below in more detail, include but are notlimited to watchdog timers, voltage monitoring systems, state-basedsoftware architecture and supporting hardware, specialized communicationinterfaces, security monitoring and trusted memory.

A watchdog timer is normally used in IGT gaming machines to provide asoftware failure detection mechanism. In a normally operating system,the operating software periodically accesses control registers in thewatchdog timer subsystem to “re-trigger” the watchdog. Should theoperating software fail to access the control registers within a presettimeframe, the watchdog timer will timeout and generate a system reset.Typical watchdog timer circuits contain a loadable timeout counterregister to allow the operating software to set the timeout intervalwithin a certain range of time. A differentiating feature of the somepreferred circuits is that the operating software cannot completelydisable the function of the watchdog timer. In other words, the watchdogtimer always functions from the time power is applied to the board.

IGT gaming computer platforms preferably use several power supplyvoltages to operate portions of the computer circuitry. These can begenerated in a central power supply or locally on the computer board. Ifany of these voltages falls out of the tolerance limits of the circuitrythey power, unpredictable operation of the computer may result. Thoughmost modern general-purpose computers include voltage monitoringcircuitry, these types of circuits only report voltage status to theoperating software. Out of tolerance voltages can cause softwaremalfunction, creating a potential uncontrolled condition in the gamingcomputer. Gaming machines of the present assignee typically have powersupplies with tighter voltage margins than that required by theoperating circuitry. In addition, the voltage monitoring circuitryimplemented in IGT gaming computers typically has two thresholds ofcontrol. The first threshold generates a software event that can bedetected by the operating software and an error condition generated.This threshold is triggered when a power supply voltage falls out of thetolerance range of the power supply, but is still within the operatingrange of the circuitry. The second threshold is set when a power supplyvoltage falls out of the operating tolerance of the circuitry. In thiscase, the circuitry generates a reset, halting operation of thecomputer.

The standard method of operation for IGT slot machine game software isto use a state machine. Different functions of the game (bet, play,result, points in the graphical presentation, etc.) may be defined as astate. When a game moves from one state to another, critical dataregarding the game software is stored in a custom non-volatile memorysubsystem. This is critical to ensure the player's wager and credits arepreserved and to minimize potential disputes in the event of amalfunction on the gaming machine.

In general, the gaming machine does not advance from a first state to asecond state until critical information that allows the first state tobe reconstructed is stored. This feature allows the game to recoveroperation to the current state of play in the event of a malfunction,loss of power, etc that occurred just prior to the malfunction. Afterthe state of the gaming machine is restored during the play of a game ofchance, game play may resume and the game may be completed in a mannerthat is no different than if the malfunction had not occurred.Typically, battery backed RAM devices are used to preserve this criticaldata although other types of non-volatile memory devices may beemployed. These memory devices are not used in typical general-purposecomputers.

As described in the preceding paragraph, when a malfunction occursduring a game of chance, the gaming machine may be restored to a statein the game of chance just prior to when the malfunction occurred. Therestored state may include metering information and graphicalinformation that was displayed on the gaming machine in the state priorto the malfunction. For example, when the malfunction occurs during theplay of a card game after the cards have been dealt, the gaming machinemay be restored with the cards that were previously displayed as part ofthe card game. As another example, a bonus game may be triggered duringthe play of a game of chance where a player is required to make a numberof selections on a video display screen. When a malfunction has occurredafter the player has made one or more selections, the gaming machine maybe restored to a state that shows the graphical presentation at the justprior to the malfunction including an indication of selections that havealready been made by the player. In general, the gaming machine may berestored to any state in a plurality of states that occur in the game ofchance that occurs while the game of chance is played or to states thatoccur between the play of a game of chance.

Game history information regarding previous games played such as anamount wagered, the outcome of the game and so forth may also be storedin a non-volatile memory device. The information stored in thenon-volatile memory may be detailed enough to reconstruct a portion ofthe graphical presentation that was previously presented on the gamingmachine and the state of the gaming machine (e.g., credits) at the timethe game of chance was played. The game history information may beutilized in the event of a dispute. For example, a player may decidethat in a previous game of chance that they did not receive credit foran award that they believed they won. The game history information maybe used to reconstruct the state of the gaming machine prior, duringand/or after the disputed game to demonstrate whether the player wascorrect or not in their assertion.

Another feature of gaming machines, such as IGT gaming computers, isthat they often contain unique interfaces, including serial interfaces,to connect to specific subsystems internal and external to the slotmachine. The serial devices may have electrical interface requirementsthat differ from the “standard” EIA 232 serial interfaces provided bygeneral-purpose computers. These interfaces may include EIA 485, EIA422, Fiber Optic Serial, optically coupled serial interfaces, currentloop style serial interfaces, etc. In addition, to conserve serialinterfaces internally in the slot machine, serial devices may beconnected in a shared, daisy-chain fashion where multiple peripheraldevices are connected to a single serial channel.

The serial interfaces may be used to transmit information usingcommunication protocols that are unique to the gaming industry. Forexample, IGT's Netplex is a proprietary communication protocol used forserial communication between gaming devices. As another example, SAS isa communication protocol used to transmit information, such as meteringinformation, from a gaming machine to a remote device. Often SAS is usedin conjunction with a player tracking system.

IGT gaming machines may alternatively be treated as peripheral devicesto a casino communication controller and connected in a shared daisychain fashion to a single serial interface. In both cases, theperipheral devices are preferably assigned device addresses. If so, theserial controller circuitry must implement a method to generate ordetect unique device addresses. General-purpose computer serial portsare not able to do this.

Security monitoring circuits detect intrusion into an IGT gaming machineby monitoring security switches attached to access doors in the slotmachine cabinet. Preferably, access violations result in suspension ofgame play and can trigger additional security operations to preserve thecurrent state of game play. These circuits also function when power isoff by use of a battery backup. In power-off operation, these circuitscontinue to monitor the access doors of the slot machine. When power isrestored, the gaming machine can determine whether any securityviolations occurred while power was off, e.g., via software for readingstatus registers. This can trigger event log entries and further dataauthentication operations by the slot machine software.

Trusted memory devices are preferably included in an IGT gaming machinecomputer to ensure the authenticity of the software that may be storedon less secure memory subsystems, such as mass storage devices. Trustedmemory devices and controlling circuitry are typically designed to notallow modification of the code and data stored in the memory devicewhile the memory device is installed in the slot machine. The code anddata stored in these devices may include authentication algorithms,random number generators, authentication keys, operating system kernels,etc. The purpose of these trusted memory devices is to provide gamingregulatory authorities a root trusted authority within the computingenvironment of the slot machine that can be tracked and verified asoriginal. This may be accomplished via removal of the trusted memorydevice from the slot machine computer and verification of the securememory device contents is a separate third party verification device.Once the trusted memory device is verified as authentic, and based onthe approval of the verification algorithms contained in the trusteddevice, the gaming machine is allowed to verify the authenticity ofadditional code and data that may be located in the gaming computerassembly, such as code and data stored on hard disk drives. A fewdetails related to trusted memory devices that may be used in thepresent invention are described in U.S. Pat. No. 6,685,567 from U.S.patent application Ser. No. 09/925,098, filed Aug. 8, 2001 and titled“Process Verification,” which is incorporated herein in its entirety andfor all purposes.

Mass storage devices used in a general purpose computer typically allowcode and data to be read from and written to the mass storage device. Ina gaming machine environment, modification of the gaming code stored ona mass storage device is strictly controlled and would only be allowedunder specific maintenance type events with electronic and physicalenablers required. Though this level of security could be provided bysoftware, IGT gaming computers that include mass storage devicespreferably include hardware level mass storage data protection circuitrythat operates at the circuit level to monitor attempts to modify data onthe mass storage device and will generate both software and hardwareerror triggers should a data modification be attempted without theproper electronic and physical enablers being present.

Returning to the example of FIG. 5, when a user wishes to play thegaming machine 502, he or she inserts cash through the coin acceptor5028 or bill validator 5030. Additionally, the bill validator may accepta printed ticket voucher that may be accepted by the bill validator 5030as indicia of credit when a cashless ticketing system is used. At thestart of the game, the player may enter playing tracking informationusing the card reader 5024, the keypad 5022, and the florescent display5016. Further, other game preferences of the player playing the game maybe read from a card inserted into the card reader. During the game, theplayer views game information using the video display 5034. Other gameand prize information may also be displayed in the video display screen5045 located in the top box.

During the course of a game, a player may be required to make a numberof decisions, which affect the outcome of the game. For example, aplayer may vary his or her wager on a particular game, select a prizefor a particular game selected from a prize server, or make gamedecisions that affect the outcome of a particular game. The player maymake these choices using the player-input switches 5032, the videodisplay screen 5034 or using some other device which enables a player toinput information into the gaming machine. In some embodiments, theplayer may be able to access various game services such as conciergeservices and entertainment content services using the video displayscreen 5034 and one or more input devices.

During certain game events, the gaming machine 502 may display visualand auditory effects that can be perceived by the player. These effectsadd to the excitement of a game, which makes a player more likely tocontinue playing. Auditory effects include various sounds that areprojected by the speakers 5010, 5012, 5014. Visual effects includeflashing lights, strobing lights or other patterns displayed from lightson the gaming machine 502 or from lights behind the belly glass 5040.After the player has completed a game, the player may receive gametokens from the coin tray 5038 or the ticket 5020 from the printer 5018,which may be used for further games or to redeem a prize. Further, theplayer may receive a ticket 5020 for food, merchandise, or games fromthe printer 5018.

Exemplary System Architecture

One example of a network topology for implementing some aspects of thepresent invention is shown in FIG. 6. Those of skill in the art willrealize that this exemplary architecture and the related functionalityare merely examples and that the present invention encompasses manyother such embodiments and methods. Here, for example, a single gamingestablishment 1205 is illustrated, which is a casino in this example.However, it should be understood that some implementations of thepresent invention involve multiple gaming establishments.

Gaming establishment 1205 includes 16 gaming machines 2, each of whichis part of a bank 1210 of gaming machines 2. In this example, gamingestablishment 1205 also includes a bank of networked gaming tables 1100.It will be appreciated that many gaming establishments include hundredsor even thousands of gaming machines 2 and/or gaming tables 1100, notall of which are included in a bank. However, the present invention maybe implemented in gaming establishments having any number of gamingmachines, gaming tables, etc.

Various alternative network topologies can be used to implementdifferent aspects of the invention and/or to accommodate varying numbersof networked devices. For example, gaming establishments with very largenumbers of gaming machines 2 may require multiple instances of somenetwork devices (e.g., of main network device 1225, which combinesswitching and routing functionality in this example) and/or theinclusion of other network devices not shown in FIG. 6. For example,some implementations of the invention include one or more middlewareservers disposed between gaming machines 2 and server 1230. Suchmiddleware servers can provide various useful functions, including butnot limited to the filtering and/or aggregation of data received frombank switches 1215, from individual gaming machines and from otherplayer terminals. Some implementations of the invention include loadbalancing methods and devices for managing network traffic.

Each bank 1210 has a corresponding bank switch 1215, which may be aconventional bank switch. Each bank switch is connected to server-basedgaming (“SBG”) server 1230 via main network device 1225, which combinesswitching and routing functionality in this example. Although variousfloor communication protocols may be used, some preferredimplementations use IGT's open, Ethernet-based SuperSAS® protocol, whichIGT makes available for downloading without charge. However, otherprotocols such as Best of Breed (“BOB”) may be used to implement variousaspects of SBG. IGT has also developed a gaming-industry-specifictransport layer called CASH that rides on top of TCP/IP and offersadditional functionality and security.

SBG server 1230, License Manager 1231, Arbiter 133, servers 1232, 1234,1236 and 1238, and main network device 1225 are disposed within computerroom 1220 of gaming establishment 1205. In practice, more or fewerservers may be used. Some of these servers may be configured to performtasks relating to player tracking, bonusing/progressives, etc. Someservers may be configured to perform tasks specific to the presentinvention. License Manager 1231 may also be implemented, at least inpart, via a server or a similar device. Some exemplary operations ofLicense Manager 1231 are described in detail in U.S. patent applicationSer. No. 11/225,408, entitled “METHODS AND DEVICES FOR AUTHENTICATIONAND LICENSING IN A GAMING NETWORK” by Kinsley et al., which is herebyincorporated by reference.

SBG server 1230 can also be configured to implement, at least in part,various aspects of the present invention. Some preferred embodiments ofSBG server 1230 and the other servers shown in FIG. 6 include (or are atleast in communication with) clustered CPUs, redundant storage devices,including backup storage devices, switches, etc. Such storage devicesmay include a redundant array of inexpensive disks (“RAID”), back-uphard drives and/or tape drives, etc. Preferably, a Radius and a DHCPserver are also configured for communication with the gaming network.Some implementations of the invention provide one or more of theseservers in the form of blade servers.

In some implementations of the invention, many of these devices(including but not limited to License Manager 1231, servers 1232, 1234,1236 and 1238, and main network device 1225) are mounted in a singlerack with SBG server 1230. Accordingly, many or all such devices willsometimes be referenced in the aggregate as an “SBG server.” However, inalternative implementations, one or more of these devices is incommunication with SBG server 1230 and/or other devices of the networkbut located elsewhere. For example, some of the devices could be mountedin separate racks within computer room 1220 or located elsewhere on thenetwork. For example, it can be advantageous to store large volumes ofdata elsewhere via a storage area network (“SAN”).

In some embodiments, these components are SBG server 1230 preferably hasan uninterruptible power supply (“UPS”). The UPS may be, for example, arack-mounted UPS module.

Computer room 1220 may include one or more operator consoles or otherhost devices that are configured for communication with SBG server 1230.Such host devices may be provided with software, hardware and/orfirmware for implementing various aspects of the invention; many ofthese aspects involve controlling SBG server 1230. However, such hostdevices need not be located within computer room 1220. Wired host device1260 (which is a laptop computer in this example) and wireless hostdevice 1270 (which is a PDA in this example) may be located elsewhere ingaming establishment 1205 or at a remote location.

Arbiter 133 may be implemented, for example, via software that isrunning on a server or another networked device. Arbiter 133 serves asan intermediary between different devices on the network. Someimplementations of Arbiter 133 are described in U.S. patent applicationSer. No. 10/948,387, entitled “METHODS AND APPARATUS FOR NEGOTIATINGCOMMUNICATIONS WITHIN A GAMING NETWORK” and filed Sep. 23, 2004 (the“Arbiter Application”), which is incorporated herein by reference andfor all purposes. In some preferred implementations, Arbiter 133 is arepository for the configuration information required for communicationbetween devices on the gaming network (and, in some implementations,devices outside the gaming network). Although Arbiter 133 can beimplemented in various ways, one exemplary implementation is discussedin the following paragraphs.

FIG. 7 is a block diagram of a simplified communication topology betweena gaming unit 21, the network computer 23 and the Arbiter 133. Althoughonly one gaming unit 21, one network computer 23 and one Arbiter 133 areshown in FIG. 7, it should be understood that the following examples maybe applicable to different types of network gaming devices within thegaming network 12 beyond the gaming unit 21 and the network computer 23,and may include different numbers of network computers, gaming securityarbiters and gaming units. For example, a single Arbiter 133 may be usedfor secure communications among a plurality of network computers 23 andtens, hundreds or thousands of gaming units 21. Likewise, multiplegaming security arbiters 46 may be utilized for improved performance andother scalability factors.

Referring to FIG. 7, the Arbiter 133 may include an arbiter controller121 that may comprise a program memory 122, a microcontroller ormicroprocessor (MP) 124, a random-access memory (RAM) 126 and aninput/output (I/O) circuit 128, all of which may be interconnected viaan address/data bus 129. The network computer 23 may also include acontroller 131 that may comprise a program memory 132, a microcontrolleror microprocessor (MP) 134, a random-access memory (RAM) 136 and aninput/output (I/O) circuit 138, all of which may be interconnected viaan address/data bus 139. It should be appreciated that although theArbiter 133 and the network computer 23 are each shown with only onemicroprocessor 124, 134, the controllers 121, 131 may each includemultiple microprocessors 124, 134. Similarly, the memory of thecontrollers 121, 131 may include multiple RAMs 126, 136 and multipleprogram memories 122, 132. Although the I/O circuits 128, 138 are eachshown as a single block, it should be appreciated that the I/O circuits128, 138 may include a number of different types of I/O circuits. TheRAMs 126, 136 and program memories 122, 132 may be implemented assemiconductor memories, magnetically readable memories, and/or opticallyreadable memories, for example.

Although the program memories 122, 132 are shown in FIG. 7 as read-onlymemories (ROM) 122, 132, the program memories of the controllers 121,131 may be a read/write or alterable memory, such as a hard disk. In theevent a hard disk is used as a program memory, the address/data buses129, 139 shown schematically in FIG. 7 may each comprise multipleaddress/data buses, which may be of different types, and there may be anI/O circuit disposed between the address/data buses.

As shown in FIG. 7, the gaming unit 21 may be operatively coupled to thenetwork computer 23 via the data link 25. The gaming unit 21 may also beoperatively coupled to the Arbiter 133 via the data link 47, and thenetwork computer 23 may likewise be operatively coupled to the Arbiter133 via the data link 47. Communications between the gaming unit 21 andthe network computer 23 may involve different information types ofvarying levels of sensitivity resulting in varying levels of encryptiontechniques depending on the sensitivity of the information. For example,communications such as drink orders and statistical information may beconsidered less sensitive. A drink order or statistical information mayremain encrypted, although with moderately secure encryption techniques,such as RC4, resulting in less processing power and less time forencryption. On the other hand, financial information (e.g., accountinformation, winnings, etc.), game download information (e.g., gamesoftware and game licensing information) and personal information (e.g.,social security number, personal preferences, etc.) may be encryptedwith stronger encryption techniques such as DES, AES, or 3DES to provideincreased security.

As disclosed in further detail in the Arbiter Application, the Arbiter133 may verify the authenticity of each network gaming device. TheArbiter 133 may receive a request for a communication session from anetwork device. For ease of explanation, the requesting network devicemay be referred to as the client, and the requested network device maybe referred to as the host. The client may be any device on the network12 and the request may be for a communication session with any othernetwork device. The client may specify the host, or the gaming securityarbiter may select the host based on the request and based oninformation about the client and potential hosts. The Arbiter 133 mayprovide encryption keys (session keys) for the communication session tothe client via the secure communication channel. Either the host and/orthe session key may be provided in response to the request, or may havebeen previously provided. The client may contact the host to initiatethe communication session. The host may then contact the Arbiter 133 todetermine the authenticity of the client. The Arbiter 133 may provideaffirmation (or lack thereof) of the authenticity of the client to thehost and provide a corresponding session key, in response to which thenetwork devices may initiate the communication session directly witheach other using the session keys to encrypt and decrypt messages.

Alternatively, upon receiving a request for a communication session, theArbiter 133 may contact the host regarding the request and providecorresponding session keys to both the client and the host. The Arbiter133 may then initiate either the client or the host to begin theircommunication session. In turn, the client and host may begin thecommunication session directly with each other using the session keys toencrypt and decrypt messages. An additional explanation of thecommunication request, communication response and key distribution isprovided in the Arbiter Application.

Wireless devices are particularly useful for managing a gaming network.Such wireless devices could include, but are not limited to, laptops,PDAs or even cellular telephones. Referring once again to FIG. 6, one ormore network devices in gaming establishment 1205 can be configured aswireless access points. For example, a casino manager may use a wirelesshandheld device to revise and/or schedule gaming machine configurationswhile roaming the casino floor. Similarly, a representative of aregulatory body could use a PDA to verify gaming machine configurations,generate reports, view activity logs, etc., while on the casino floor.

If a host device is located in a remote location, security methods anddevices (such as firewalls, authentication and/or encryption) should bedeployed in order to prevent the unauthorized access of the gamingnetwork. Similarly, any other connection between gaming network 1205 andthe outside world should only be made with trusted devices via a securelink, e.g., via a virtual private network (“VPN”) tunnel. For example,the illustrated connection between SBG 1230, gateway 1250 and centralsystem 1263 (here, IGT.com) that may be used for game downloads, etc.,is advantageously made via a VPN tunnel.

An Internet-based VPN uses the open, distributed infrastructure of theInternet to transmit data between sites. A VPN may emulate a private IPnetwork over public or shared infrastructures. A VPN that supports onlyIP traffic is called an IP-VPN. VPNs provide advantages to both theservice provider and its customers. For its customers, a VPN can extendthe IP capabilities of a corporate site to remote offices and/or userswith intranet, extranet, and dial-up services. This connectivity may beachieved at a lower cost to the gaming entity with savings in capitalequipment, operations, and services. Details of VPN methods that may beused with the present invention are described in the reference, “VirtualPrivate Networks-Technologies and Solutions,” by R. Yueh and T. Strayer,Addison-Wesley, 2001, ISBN#0-201-70209-6, which is incorporated hereinby reference and for all purposes.

There are many ways in which IP VPN services may be implemented, suchas, for example, Virtual Leased Lines, Virtual Private Routed Networks,Virtual Private Dial Networks, Virtual Private LAN Segments, etc.Additionally VPNs may be implemented using a variety of protocols, suchas, for example, IP Security (IPSec) Protocol, Layer 2 TunnelingProtocol, Multiprotocol Label Switching (MPLS) Protocol, etc. Details ofthese protocols, including RFC reports, may be obtained from the VPNConsortium, an industry trade group (http://www.vpnc.com, VPNC, SantaCruz, Calif.).

For security purposes, any information transmitted to or from a gamingestablishment over a public network may be encrypted. In oneimplementation, the information may be symmetrically encrypted using asymmetric encryption key, where the symmetric encryption key isasymmetrically encrypted using a private key. The public key may beobtained from a remote public key server. The encryption algorithm mayreside in processor logic stored on the gaming machine. When a remoteserver receives a message containing the encrypted data, the symmetricencryption key is decrypted with a private key residing on the remoteserver and the symmetrically encrypted information sent from the gamingmachine is decrypted using the symmetric encryption key. A differentsymmetric encryption key is used for each transaction where the key israndomly generated. Symmetric encryption and decryption is preferablyapplied to most information because symmetric encryption algorithms tendto be 100-10,000 times faster than asymmetric encryption algorithms.

As mentioned elsewhere herein, U.S. patent application Ser. No.11/225,408, entitled “METHODS AND DEVICES FOR AUTHENTICATION ANDLICENSING IN A GAMING NETWORK” by Kinsley et al., describes novelmethods and devices for authentication, game downloading and gamelicense management. This application has been incorporated herein byreference.

Providing a secure connection between the local devices of the SBGsystem and IGT's central system allows for the deployment of manyadvantageous features. For example, a customer (e.g., an employee of agaming establishment) can log onto an account of central system 1263 (inthis example, IGT.com) to obtain the account information such as thecustomer's current and prior account status.

Moreover, such a secure connection may be used by the central system1263 to collect information regarding a customer's system. Suchinformation includes, but is not limited to, error logs for use indiagnostics and troubleshooting. Some implementations of the inventionallow a central system to collect other types of information, e.g.,information about the usage of certain types of gaming software, revenueinformation regarding certain types of games and/or gaming machines,etc. Such information includes, but is not limited to, informationregarding the revenue attributable to particular games at specific timesof day, days of the week, etc. Such information may be obtained, atleast in part, by reference to an accounting system of the gamingnetwork(s), as described in U.S. patent application Ser. No. 11/225,407,by Wolf et al., entitled “METHODS AND DEVICES FOR MANAGING GAMINGNETWORKS,” which has been incorporated herein by reference.

Automatic updates of a customer's SBG server may also be enabled. Forexample, central system 1263 may notify a local SBG server regarding newproducts and/or product updates. For example, central system 1263 maynotify a local SBG server regarding updates of new gaming software,gaming software updates, peripheral updates, the status of currentgaming software licenses, etc. In some implementations of the invention,central system 1263 may notify a local SBG server (or another deviceassociated with a gaming establishment) that an additionaltheme-specific data set and/or updates for a previously-downloadedglobal payout set are available. Alternatively, such updates could beautomatically provided to the local SBG server and downloaded tonetworked gaming machines.

After the local SBG server receives this information, it can identifyrelevant products of interest. For example, the local SBG server mayidentify gaming software that is currently in use (or at least licensed)by the relevant gaming entity and send a notification to one or morehost devices, e.g., via email. If an update or a new software product isdesired, it can be downloaded from the central system. Some relevantdownloading methods are described elsewhere herein and in applicationsthat have been incorporated herein by reference, e.g., in U.S. patentapplication Ser. No. 11/078,966. Similarly, a customer may choose torenew a gaming software license via a secure connection with centralsystem 1263 in response to such a notification.

Secure communication links allow notifications to be sent securely froma local SBG server to host devices outside of a gaming establishment.For example, a local SBG server can be configured to transmitautomatically generated email reports, text messages, etc., based onpredetermined events that will sometimes be referred to herein as“triggers.” Such triggers can include, but are not limited to, thecondition of a gaming machine door being open, cash box full, machinenot responding, verification failure, etc.

In addition, providing secure connections between different gamingestablishments can enable alternative implementations of the invention.For example, a number of gaming establishments, each with a relativelysmall number of gaming machines, may be owned and/or controlled by thesame entity. In such situations, having secure communications betweengaming establishments makes it possible for a gaming entity to use asingle SBG server as an interface between central system 1263 and thegaming establishments.

While embodiments and applications of this invention have been shown anddescribed, it would be apparent to those skilled in the art having thebenefit of this disclosure that many more modifications than mentionedabove are possible without departing from the inventive concepts herein.The invention, therefore, is not to be restricted except in the spiritof the appended claims.

1. A portable gaming device adapted to play at least one wager-basedgame, comprising: a communication interface adapted to communicate witha remote gaming server; a display; an input mechanism to receive aunique identifier of a cashless ticket voucher; a controller operativelycoupled to the display, communication interface, and the inputmechanism; and a validator operatively coupled to the controller totransmit the unique identifier to the remote gaming server forvalidation, the validator to receive an approval or a rejection messagefrom the remote gaming server; wherein the controller is programmed tocause the display to generate a game display relating to the at leastone wager-based game and display an outcome of the at least onewager-based game if an approval message is received by the validator. 2.The device of claim 1, wherein the input mechanism is a user interfaceon the portable gaming device.
 3. The device of claim 1, wherein theinput mechanism is a transceiver.
 4. The device of claim 1, wherein theunique identifier is associated with a security code.
 5. The device ofclaim 4, wherein the security code is a biometric data obtained from abiometric sensor coupled to the portable gaming device.
 6. The device ofclaim 1, wherein the remote gaming server is a gaming machine configuredfor providing wager-based games of chance.
 7. A validation server,comprising: an interface to receive a cashless ticket voucher uniqueidentifier; and a confirmation number database having a list ofconfirmation numbers of distributed cashless ticket vouchers; whereinthe unique identifier is matched to a confirmation number, and whereinan approval message is transmitted to a remote gaming server if a matchis found.
 8. The validation server of claim 7, wherein the remote gamingserver is a gaming machine configured for providing games of chance. 9.The validation server of claim 7, wherein the remote gaming server is amobile gaming device.
 10. The validation server of claim 7, wherein arejection message is relayed to the remote gaming server if the uniqueidentifier is not matched to a confirmation number.
 11. The validationserver of claim 7, wherein the interface is a wireless transceiver. 12.A mobile gaming network, comprising: a validation server, comprising: aninterface to receive a cashless ticket voucher unique identifier; and aconfirmation number database having a list of confirmation numbers ofdistributed cashless ticket vouchers; wherein the unique identifier ismatched to a confirmation number; at least one portable gaming device toplay at least one wager-based game, comprising: a communicationinterface adapted to communicate with a remote gaming server; a display;an input mechanism to receive the unique identifier; a controlleroperatively coupled to the display, communication interface, and theinput mechanism; and a validator operatively coupled to the controllerto transmit the unique identifier to the remote gaming server forvalidation, the validator to receive an approval or a rejection messagefrom the remote gaming server; wherein an approval message is relayedfrom the validation server to the remote gaming server if a match isfound; and wherein the controller is programmed to cause the display togenerate a game display relating to the at least one wager-based gameand display an outcome of the at least one wager-based game if anapproval message is received by the validator.
 13. The network of claim12, wherein the remote gaming server is a gaming machine configured forproviding games of chance.
 14. The network of claim 12, wherein thevalidation server relays a rejection message to the remote gaming serverif the unique identifier is not matched to a confirmation number. 15.The network of claim 12, wherein the interface and wager input mechanismis a wireless transceiver.
 16. The network of claim 12, wherein thewager input mechanism is a user interface on the portable gaming device.17. The network of claim 12, wherein the unique identifier is associatedwith a security code.
 18. The network of claim 17, wherein the securitycode is a biometric data obtained from a biometric sensor coupled to theportable gaming device.
 19. The network of claim 17, wherein thesecurity code is a personal identification number.
 20. A method forcreating an anonymous account to play a game of chance, comprising:forming a cashless ticket voucher via a first device, the cashlessticket voucher having a unique identifier and a monetary value;inputting the unique identifier into a second device to expend themonetary value of the cashless ticket voucher; forwarding the uniqueidentifier to a validation server to validate the cashless ticketvoucher; and generating the game of chance on the second device if theunique identifier is validated.
 21. The method of claim 20, wherein thefirst device is a gaming machine configured for providing games ofchance.
 22. The method of claim 20, wherein the first device is apersonal computer.
 23. The method of claim 20, wherein the second deviceis a mobile gaming device.
 24. The method of claim 20, wherein theforming further comprises entering credit card information.
 25. Themethod of claim 20, wherein the generating further comprises associatinga security code with the unique identifier.
 26. The method of claim 25,wherein the security code is a personal identification number orpassword.
 27. The method of claim 25, wherein the security code is abiometric identifier obtained from a biometric device.
 28. The method ofclaim 20, wherein the inputting further comprises wirelessly inputtingthe unique identifier to the second gaming machine.
 29. The method ofclaim 20, wherein the inputting further comprises: inserting the seconddevice in a docking station; and downloading the unique identifier tothe second device.
 30. The method of claim 20, wherein the inputtingfurther comprises reading the unique identifier with a scanner coupledto the second device.
 31. The method of claim 20, wherein the inputtingfurther comprises: reading the unique identifier with a scanner coupledto the first device; and downloading the unique identifier to the seconddevice.
 32. The method of claim 31, wherein the downloading occurs in adocking station.
 33. The method of claim 31, where the downloadingoccurs wirelessly.
 34. The method of claim 20, wherein the forwardingcomprises: comparing the unique identifier to a list of confirmationnumbers; and marking the unique identifier as used if the uniqueidentifier matches a confirmation number.
 35. The method of claim 20,wherein the forming further comprises coating the ticket voucher with alight sensitive coating.
 36. The method of claim 35, further comprisingthe step of exposing the ticket voucher to light, thereby voiding theticket voucher.
 37. The method of claim 20, wherein the inputtingfurther comprises inserting the ticket voucher into a ticket reader incommunication with a validation server.
 38. The method of claim 37,wherein the ticket reader is coupled to the first device.
 39. The methodof claim 37, wherein the ticket reader is removably coupled to thesecond device.
 40. The method of claim 37, further comprising printing awritten indicium on the cashless ticket voucher to indicate the ticketvoucher is void.
 41. The method of claim 20, wherein the inputtingfurther comprises manually inputting the unique identifier into thesecond device.
 42. The method of claim 20, further comprising: returningthe validated cashless ticket voucher to a third party; and redeeming aretained amount from the value of the cashless ticket voucher.
 43. Themethod of claim 20, further comprising: returning the validated cashlessticket voucher to a third party; and entering the validated ticketvoucher into a second game of chance.
 44. The method of claim 43,wherein the second game of chance is a lottery drawing.
 45. A method forcreating an anonymous account to play a game of chance on a mobilegaming device, comprising: forming a cashless ticket voucher having aunique identifier, the cashless ticket voucher having a monetary value;inputting the unique identifier into the mobile gaming device to expendthe monetary value of the cashless ticket voucher; validating the uniqueidentifier; and generating a game of chance on the mobile gaming deviceif the unique identifier is validated.
 46. The method of claim 45,further comprising voiding the validated ticket voucher.
 47. The methodof claim 45, wherein the forming further comprises entering credit cardinformation.
 48. The method of claim 45, wherein the cashless ticketvoucher is obtained from a remote gaming machine.
 49. The method ofclaim 48, wherein the remote gaming machine is a gaming machineconfigured for providing games of chance.
 50. The method of claim 45,wherein the inputting comprises reading the unique identifier with ascanner.
 51. The method of claim 50, wherein the scanner is removablycoupled to the mobile gaming device.
 52. The method of claim 50, whereinthe scanner is coupled to a gaming machine.
 53. The method of claim 52,further comprising wirelessly inputting the unique identifier to themobile gaming device.
 54. The method of claim 45, wherein the inputtingfurther comprises inserting the cashless ticket voucher into a ticketreader in communication with a validation server.
 55. The method ofclaim 54, wherein the ticket reader is coupled to a gaming machine. 56.The method of claim 55, further comprising wirelessly downloading thevalue of the ticket voucher to the mobile gaming device if the uniqueidentifier is validated.
 57. The method of claim 54, wherein the ticketreader is removably coupled to the mobile gaming device.
 58. The methodof claim 46, wherein the voiding further comprises printing a writtenindicium on the ticket voucher to indicate the ticket voucher is void.59. The method of claim 46, wherein the voiding further comprises:coating the ticket voucher with a light sensitive coating; and exposingthe ticket voucher to light.
 60. The method of claim 45, wherein theinputting further comprises manually inputting the unique identifierinto the mobile gaming device.
 61. The method of claim 45, wherein thevalidating further comprises: forwarding the unique identifier to avalidation server; and matching the unique identifier to a list ofconfirmation numbers.
 62. The method of claim 61, further comprisingmarking the unique identifier as used if there is a match.
 63. Themethod of claim 45, wherein the forming further comprises associating asecurity code with the unique identifier.
 64. The method of claim 63,wherein the security code is a personal identification number orpassword.
 65. The method of claim 63, wherein the security code is abiometric identifier obtained from a biometric device.
 66. The method ofclaim 45, wherein the forming further comprises deducting a retainedamount from the monetary value.
 67. The method of claim 66, furthercomprising: returning the ticket voucher to a third party; and redeemingthe retained amount.
 68. The method of claim 67, further comprising:entering the validated ticket voucher into a second game of chance. 69.The method of claim 68, wherein the second game of chance is a lotterydrawing.
 70. The method of claim 45, further comprising: returning thevalidated ticket voucher to a third party; and entering the validatedticket voucher into a second game of chance.
 71. The method of claim 70,wherein the second game of chance is a lottery drawing.