Device detection

ABSTRACT

Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security checks, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users. The apparatus may further emit a time varying signal to enhance security.

CROSS REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. patent application Ser. No.11/686,354 filed Mar. 15, 2007, which is a continuation in part of U.S.patent application Ser. No. 11/418,939, filed on May 5, 2006 now U.S.Pat. No. 754,9576, both of which are incorporated in their entirety byreference herein.

FIELD OF THE INVENTION

The present invention relates generally to the field of gaming and, moreparticularly, to a gaming system and method incorporating a wirelessnetwork and systems and methods for providing access thereto.

BACKGROUND OF THE INVENTION

Virtual casinos are accessible via communications networks such as theInternet. For example, on-line casinos present a graphicalrepresentation of games, such as casino games, to a user on the screenof a computer in communication with the Internet. The user may placewagers, participate in the gaming, and win or lose money. Receipt ofwinnings, or payment of losses is typically handled through a creditaccount.

Participants may use gaming devices, some of which may be wireless, toaccess such on-line casinos. However, security of wireless gamingdevices (e.g., handhelds such as the Blackberry™ handheld device) may besub-optimal as it is typically accomplished through soft checks. Forexample, a user may be merely asked to enter a valid user name andassociated password to provided access to a particular gaming device.

It would therefore be desirable to provide mechanisms that betterguarantee secure access to wireless gaming devices and gaming systems.

SUMMARY OF THE INVENTION

Therefore, it is an object of the invention to provide mechanisms thatbetter guarantee secure access to wireless gaming devices and gamingsystems.

This and other objects are accomplished in accordance with theprinciples of the invention by providing gaming networks with one ormore levels of security checks, such as a hard security check, insteadof, or in addition to, a soft security check before access to a gamingdevice is granted. In a hard security check, the user employs anapparatus such as a card or other physical token that can be used toaccess the gaming device. Such an apparatus may communicate informationthat identifies the user to the device or may be used to produce asignal without which the device is locked.

In some embodiments of the present invention, a device capable ofdetecting or reproducing a signal from an apparatus is provided. Accessto the device is provided when the signal is detected. Alternatively oradditionally, the signal may include identifying information that needsto be verified in order to provide access to the device. The apparatusmay include a medium for storing identifying information as well as anemitter for communicating the identifying information to the device suchthat access to the device is provided when the identifying informationis associated with a user that is authorized to operate the device.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of the present invention and forfurther features and advantages, reference is now made to the followingdescription, taken in conjunction with the accompanying drawings, inwhich:

FIG. 1 illustrates a convenience gaming system according to certainembodiments of the present invention;

FIG. 2 illustrates a convenience gaming system with a wireless networkaccording to certain embodiments of the present invention;

FIG. 3 is a block diagram of a convenience gaming system illustratingvarious gaming activities in accordance with certain embodiments of thepresent invention;

FIG. 4 illustrates a convenience gaming system showing coverage areas inaccordance with certain embodiments of the present invention;

FIG. 5 illustrates a convenience gaming system with a wireless networkshowing triangulation location determination in accordance with certainembodiments of the present invention;

FIG. 6 is a flow chart depicting steps in a convenience gaming methodaccording to certain embodiments of the present invention;

FIG. 7 depicts a convenience gaming system showing a communication pathin accordance with certain embodiments of the present invention;

FIG. 8 illustrates a ship-based convenience gaming system in accordancewith certain embodiments of the present invention;

FIG. 9 illustrates a convenience gaming device and apparatus for use inaccordance with certain embodiments of the present invention;

FIG. 10 illustrates a convenience gaming device and apparatus inaccordance with certain embodiments of the present invention; and

FIG. 11 illustrates another convenience gaming device in accordance withcertain embodiments of the present invention.

DETAILED DESCRIPTION OF THE INVENTION

A convenience gaming system enables participants to engage in gamingactivities from remote and/or mobile locations. The possible gamingactivities include gambling, such as that provided by casinos. Gamblingactivities may include any casino-type gambling activities including,but not limited to, slot machines, video poker, table games (e.g.,craps, roulette, blackjack, pai gow poker, Caribbean stud poker,baccarat, etc), the wheel of fortune game, keno, sports betting, horseracing, dog racing, jai alai, and other gambling activities. The gamingactivities can also include wagering on any type of event. Events caninclude, for example, sporting events, such as horse or auto racing, andathletic competitions such as football, basketball, baseball, golf, etc.Events can also include such things that do not normally involvewagering. Such events may include, without limitation, politicalelections, entertainment industry awards, and box office performance ofmovies. Gaming can also include non-wagering games and events. Gamingcan also include lotteries or lottery-type activities such as state andinterstate lotteries. These can include all forms of number-selectionlotteries, “scratch-off” lotteries, and other lottery contests. Theconvenience gaming system may be implemented over a communicationsnetwork such as a cellular network or a private wireless and/or wirelinenetwork. Examples of the latter include WiFi and WiMax networks. In someembodiments, the convenience gaming system communications network isentirely independent of the Internet. In other embodiments, theconvenience gaming system operation makes minimal use of the Internet,such that only information for which there is no security issues istransmitted via the Internet and/or information may be encrypted.Preferably, the communications network enables players to participate ingaming from remote locations (e.g., outside of the gaming area of acasino). Also, the system may enable players to be mobile duringparticipation in the convenience gaming activities. Preferably, thesystem has a location verification or determination feature, which isoperable to permit or disallow gaming from the remote location dependingupon whether or not the location meets one or more criteria. Thecriterion may be, for example, whether the location is within apre-defined area in which gaming is permitted by law.

As shown n FIG. 1, for example, convenience gaming system 10 includes atleast one user 12. The system may include additional users such thatthere is at least a first user 12 and a second user 14. Multiple usersmay access a first convenience gaming system 10, while other multipleusers access a second convenience gaming system (not shown) incommunication with first gaming system 10. Users 12 and 14 preferablyaccess system 10 by way of a gaming communication device 13. Gamingcommunication device 13 may comprise any suitable device fortransmitting and receiving electronic communications. Examples of suchdevices include, without limitation, mobile phones, PDAs, computers,mini-computers, etc. Gaming communication devices 13 transmit andreceive gaming information to and from communications network 16. Gaminginformation is also transmitted between network 16 and a computer 18,such as a server, which may reside within the domain of a gaming serviceprovider 20. The location of computer 18 is not critical, however, andcomputer 18 may reside adjacent to or remote from the domain of gamingservice provider 20. Moreover, in certain embodiments, a gaming serviceprovider is not required. The computer 18 and/or gaming service provider20 may reside within, adjacent to, or remote from a gaming provider (notshown in FIG. 1). The gaming provider may be an actual controller ofgames, such as a casino. As an example, a gaming service provider may belocated on the grounds of a casino and the computer 18 may be physicallywithin the geographic boundaries of the gaming service provider. Asdiscussed, however, either possibilities exist for remote location ofthe computer 18 and the gaming service provider 20. Computer 18 mayfunction as a gaming server. Additional computers (not expressly shown)may function as database management computers and redundant servers, forexample.

Preferably, software resides on both the gaming communication device 13and the computer 18. Software resident on gaming communication device 13is preferably operable to present information corresponding to gamingactivities (including gambling and non-gambling activities discussedherein) to the user. The information includes, without limitation,graphical representations of objects associated with the activities, andpresentation of options related to the activities and selectable by theuser. The gaming communication device software is also preferablyoperable to receive data from the computer and data input by the user orinformation communicated through another device or apparatus. Softwareresident on the computer is preferably able to exchange data with thegaming communication device, access additional computers and datastorage devices, and perform all of the functions described herein aswell as functions common to known electronic gaming systems.

Gaming information transmitted across network 16 may include anyinformation, in any format, which is necessary or desirable in theoperation of the gaming experience in which the user participates. Theinformation may be transmitted in whole, or in combination, in anyformat including digital or analog, text or voice, and according to anyknown or future transport technologies, which may include, for example,wireline or wireless technologies. Wireless technologies may include,for example, licensed or license-exempt technologies. Some specifictechnologies which may be used include, without limitation, CodeDivision Multiple Access (CDMA), Global System for Mobile Communication(GSM), General Packet Radio Service (GPRS), WiFi (802.11x), WiMax(802.16x), Public Switched Telephone Network (PSTN), Digital SubscriberLine (DSL), Integrated Services Digital Network (ISDN), or cable modemtechnologies. These are examples only and one of ordinary skill willunderstand that other types of communication techniques are within thescope of the present invention. Further, it will be understood thatadditional components may be used in the communication of informationbetween the users and the gaming server. Such additional components mayinclude, without limitation, lines, trunks, antennas, switches, cables,transmitters, receivers, computers, routers, servers, fiber opticaltransmission equipment, repeaters, amplifiers, etc.

In at least one embodiment, the communication of gaming information maytake place through the Internet or without involvement of the Internet.In certain embodiments, a portion of the gaming information may betransmitted over the Internet. Also, some or all of the gaminginformation may be transmitted partially over an Internet communicationspath. In certain embodiments, some information is transmitted entirelyor partially over the Internet, but the information is either not gaminginformation or is gaming information that does or does not need to bemaintained secretly. For instance, data that causes a graphicalrepresentation of a table game on the user's gaming communication devicemight be transmitted at least partially over the Internet, whilewagering information transmitted by the user might be transmittedentirely over a non-Internet communications network. As another example,identifying information associated with a hard check apparatus (e.g., abracelet as discussed below) may or may not be transmitted from thegaming communication device to a server over the Internet.

According to some embodiments of the invention, as shown in FIG. 2 forexample, the communications network 21 comprises a cellular network 22.Cellular network 22 comprises a plurality of base stations 23, each ofwhich has a corresponding coverage area 25. Base station technology isgenerally known and the base stations may be of any type found in atypical cellular network. The base stations may have coverage areas thatoverlap. Further, the coverage areas may be sectorized ornon-sectorized. The network also includes mobile stations 24, whichfunction as the gaming communication devices used by users to access theconvenience gaming system and participate in the activities available onthe convenience gaming system. Users are connected to the network ofbase stations via transmission and reception of radio signals. Thecommunications network also includes at least one voice/data switch 26,which is preferably connected to the wireless portion of the network viaa dedicated, secure landline. The communications network also includes agaming service provider 28, which is likewise connected to thevoice/data switch via a dedicated, secure landline. The voice/dataswitch may be connected to the wireless network of base stations via amobile switching center (MSC), for example and the landline may beprovided between the voice/data switch and the MSC.

Users access the convenience gaming system by way of mobile stationswhich are in communication with, and thus part of, the communicationsnetwork. The mobile station may be any electronic communication devicethat is operable in connection with the network as described. Forexample, in this particular embodiment, the mobile station may comprisea cellular telephone.

Preferably, in the case of a cellular network for example, theconvenience gaming system is enabled through the use of a private labelcarrier network. Each base station is programmed by the cellular carrierto send and receive private secure voice and/or data transmissions toand from mobile station handsets. The handsets are preferablypreprogrammed with both gaming software and the carrier's authenticationsoftware. The base stations communicate via Private T-1 lines to aswitch. A gaming service provider leases a private T-1 or T-3 line,which routes the calls back to gaming servers controlled by the gamingservice provider. Encryption can be installed on the telephones ifrequired by a gaming regulation authority, such as a gaming commission.

The cellular network is preferably a private, closed system. Mobilestations communicate with base stations and base stations are connectedto a centralized switch located within a gaming jurisdiction. At theswitch, voice calls are transported either locally or via long distance.Specific service provider gaming traffic is transported from the centralswitch to a gaming server at a host location, which can be a casino orother location.

As subscribers launch their specific gaming application, the handsetwill only talk to certain base stations with cells or sectors that havebeen engineered to be wholly within the gaming jurisdiction. Forexample, if a base station is close enough to pick up or send a signalacross state lines, it will not be able to communicate with the device.When a customer uses the device for gaming, the system may prohibit, ifdesired, the making or receiving voice calls. Moreover, voice can beeliminated entirely if required. Further, the devices are preferably notallowed to “connect” to the Internet. This ensures a high level ofcertainty that bets/wagers originate and terminate within the boundariesof the gaming jurisdiction and the “private” wireless system cannot becircumvented or bypassed. In certain embodiments, some data and/or voicetraffic may be communicated at least partially over the Internet. Insome embodiments, certain non-gaming information may be transported overa path which includes the Internet, while other information relating tothe gaming activities of the system is transported on a path that doesnot include the Internet.

As shown in FIG. 3, a gaming communication device 32 is in communicationwith a gaming service provider 36 over a network 34. The gaming serviceprovider preferably has one or more servers, on which are residentvarious gaming and other applications. As shown in FIG. 3, some examplegaming applications include horse racing and other sports, financialexchange, casino and/or virtual casino, entertainment and other eventsexchange, and news and real time entertainment. Each of theseapplications may be embodied in one or more software modules. Theapplications may be combined in any possible combination. Additionally,it should be understood that these applications are not exhaustive andthat other applications may exist to provide an environment to the userthat is associated with any of the described or potential convenienceactivities.

In other embodiments of the invention, as shown in FIG. 4, for example,the communications network comprises a private wireless network. Theprivate wireless network may include, for example, an 802.11x (WiFi)network technology to cover “Game Spots” or “Entertainment Spots.” InFIG. 4, various WiFi networks are indicated as networks 41. Networks 41may use other communications protocols to provide a private wirelessnetwork including, but not limited to, 802.16x (WiMax) technology.Further, networks 41 may be interconnected. Also, a convenience gamingsystem may comprise a combination of networks as depicted in FIG. 4. Forexample, there is shown a combination of private wireless networks 44, acellular network comprising a multi-channel access unit or sectorizedbase station 42, and a satellite network comprising one or moresatellites 46.

With respect to the private wireless network, because the preferabletechnology covers smaller areas, (e.g., in the range of 100-300 feet)and provides very high-speed throughput, the private wireless network isparticularly well-suited for gaming commission needs of location andidentity verification for the gaming service provider products. Thegaming spots enabled by networks 41 may include a current casino area48, new areas such as swimming pools, lakes or other recreational areas49, guest rooms and restaurants such as might be found in casino 48 orhotels 45 and 47, residential areas 40, and other remote conveniencegaming areas 43. The configuration of the overall convenience gamingsystem depicted in FIG. 4 is intended only as an example and may bemodified within the scope of the invention.

In some embodiments of the invention, the system architecture for theconvenience gaming system includes:

(1) a wireless LAN (Local Access Network) component, which consists ofmostly 802.11x (WiFi) and/or 802.16x WiMax technologies; robust securityand authentication software; gaming software; mobile carrier approvedhandsets with Windows® or Symbian® operating systems integrated within;and

(a) CDMA-technology that is secure for over-the-air data protection;

(b) at least two layers of user authentication, (that provided by themobile carrier and that provided by the gaming service provider);

(c) compulsory tunneling (static routing) to gaming services;

(d) end-to-end encryption at the application layer; and

(e) state-of-the-art firewall and DMZ technologies;

(2) an MWAN (Metropolitan Wireless Access Network), which consists oflicensed and license-exempt, point-to-point links, as well as licensedand license-exempt, point-to-multi-point technologies;

(3) private MAN (Metropolitan Access Network) T-1 and T-3 lines toprovide connectivity where wireless services cannot reach; and

(4) redundant private-line communications from the mobile switch back tothe gaming server.

Each of the “Game Spots” or “Entertainment Spots” are preferablyconnected via the MWAN/MAN back to central and redundant game servers.For accessing the private wireless networks 41, the gaming communicationdevices are preferably WiFi- or WiMax-enabled PDAs or mini-laptops, anddo lot have to be managed by a third-party partner.

Preferably, the convenience gaming system includes a locationverification feature, which is operable to permit or disable gaming froma remote location depending upon whether or not the location meets oneor more criteria. The criterion may be, for example, whether thelocation is within a pre-defined area in which gaming is permitted bylaw. As another example, the criterion may be whether the location is ina no-gaming zone, such as a school. The location verification technologyused in the system may include, without limitation, “network-based”and/or “satellite-based” technology. Network-based technology mayincluded such technologies as multilateration, triangulation andgeo-fencing, for example. Satellite-based technologies may includeglobal positioning satellite (GPS) technology, for example.

As previously discussed, the cellular approach preferably includes theuse of at least one cellular, mobile, voice and data network. For gamingin certain jurisdictions, such as Nevada for example, the technology mayinvolve triangulation, global positioning satellite (GPS) technology,and/or geo-fencing to avoid the potential for bets or wagers to be madeoutside Nevada state lines. In some embodiments, the network would notcover all of a particular jurisdiction, such as Nevada. For instance,the network would not cover areas in which cellular coverage for aparticular base station straddled the state line or other boundary ofthe jurisdiction. This is done in order to permit the use of locationverification to insure against the chance of bets originating orterminating outside of the state. Triangulation may be used as a methodfor preventing gaming from unapproved locations. Triangulation may beaccomplished, for example, by comparing the signal strength from asingle mobile station received at multiple base stations, each havingGPS coordinates. This technology may be used to pinpoint the location ofa mobile station. The location can then be compared to a map or otherresource to determine whether the user of the mobile station is in anunapproved area, such as a school. Alternatively, GPS technology may beused for these purposes.

As shown in FIG. 5, the convenience gaming system includes a pluralityof gaming communication devices 54, 55, and 56. Device 54 is locatedoutside the gaming jurisdiction 58. Devices 55 and 56 are both locatedinside gaming jurisdiction 58. However only device 56 is located withingeo-fence 57, which is established by the coverage areas of a pluralityof base station 53. Thus, geo-fencing may be used to enable gaming viadevice 56 but disable gaming via devices 54 and 55. Even though somegaming communication devices that are within the gaming jurisdiction 58,such as device 55, are not permitted access to the convenience gamingsystem, the geo-fence 57 ensures that no gaming communication devicesoutside jurisdiction 58, such as device 54, are permitted access.

Geo-fencing does not specify location. Rather, it ensures that a mobilestation is within certain boundaries. For instance, geo-fencing may beused to ensure that a mobile station beyond state lines does not accessthe convenience gaming system. Triangulation on the other hand specifiesa pinpoint, or near-pinpoint, location. For example, as shown in FIG. 5,device 56 is triangulated between three of the base stations 53 todetermine the location of device 56. Triangulation may be used toidentify whether a device, such as a mobile station, is located in aspecific spot where gambling is unauthorized (such as, for example, aschool). Preferably, the location determination technology utilized inconjunction with the invention meets the Federal CommunicationCommission's (FCC's) Phase 2 E911 requirements. Geological InstituteSurvey (GIS) mapping may also be utilized to compare identifiedcoordinates of a gaming communication device with GIS map features orelements to determine whether a device is in an area not authorized forgaming. It should be noted that any type of location verification may beused such as triangulation, geo-fencing, global positioning satellite(GPS) technology, or any other type of location determining technology,which can be used to ensure, or provide an acceptable level ofconfidence, that the user is within an approved gaming area.

In other embodiments, location verification is accomplished usingchannel address checking or location verification using some otheridentifying number or piece of information indicative of which networkor portion of a network is being accessed by the gaming communicationdevice. Assuming the using of an identifying number for this purpose,then according to one method of location checking, as an example, aparticipant accesses the gaming system via a mobile telephone. Theidentifying number of the mobile telephone, or of the network componentbeing accessed by the mobile telephone, identifies the caller'sconnection to the mobile network. The number is indicative of the factthat the caller is in a defined area and is on a certain mobile network.A server application may be resident on the mobile telephone tocommunicate this information via the network to the gaming serviceprovider. In related embodiments, the identifying number for informationis passed from a first network provider to a second network provider.For example, a caller's home network may be that provided by the secondprovider, but the caller is roaming on a network (and in a jurisdiction)provided by the first provider. The first provider passes theidentifying information through to the second provider to enable thesecond provider to determine whether the caller is in a defined areathat does or does not allow the relevant gaming activity. Preferably thegaming service provider either maintains, or has access to, a databasethat maps the various possible worldwide mobile network identifyingnumbers to geographic areas. The invention contemplates using any numberor proxy that indicates a network portion of a network, or networkcomponent, which is being connected with a mobile telephone. Theidentifying number may indicate one or more of a base station or groupof base stations, a line, a channel, a trunk, a switch, a router, arepeater, etc.

In other embodiments of the present invention, when the user connectshis telephone to the gaming server, the gaming server draws the networkidentifying information and communicates that information into thegaming service provider. The software resident on the gamingcommunication device may incorporate functionality that will, upon loginor access by the user, determine the user's location (based at least inpart on the identifying information) and send a message to the gamingservice provider. The identifying number or information used todetermine location may be country-specific, state-specific,town-specific, or specific to some other definable boundaries.

In connection with any of the location determination methods, the gamingsystem may periodically update the location determination information.This may be done, for example, during a gaming session, at pre-definedtime intervals to ensure that movement of the gaming communicationdevice to an unauthorized area is detected during play, and not justupon login or initial access.

Thus, depending on the location determination technology being used, thedecision whether to permit or prohibit a gaming activity may be made atthe gaming communication device, at the gaming server, or at any of thecomponents of the telecommunication network being used to transmitinformation between the gaming communication device and the gamingserver (such as at a base station, for example).

An aspect of the private wireless network related to preventing gamingin unauthorized areas is the placement of sensors, such as RadioFrequency Identification (RFID) sensors on the gaming communicationdevices. The sensors trigger alarms if users take the devices outsidethe approved gaming areas. Further, the devices may be “tethered” toimmovable objects. Users might simply log in to such devices using theirID and password.

In connection with FIG. 6, an example embodiment of a method accordingto the invention can be described as follows. As discussed, software ispreferably loaded on a gaming communication device and is operable toreceive input data for gaming. The input data may originate atassociated gaming software resident on the gaming server, or it may beinput by the user of the gaming communication device. The software onthe device is operable to present a representation of a gamingenvironment. This can include, among other things, a representation of atable game such as a blackjack table or a slot machine. Other examplesof the representation of a gaming environment include graphicalrepresentations of any of the other applications described herein.

In the example method shown in FIG. 6, in a first step 602, the gamingcommunication device is activated. This may take place as a function ofturning on a phone, PDA, or other communication device as describedelsewhere herein. Preferably, activation comprises connecting the gamingcommunication device to a private data network. Part of the activationincludes logging in at a prompt. This may be considered as a first levelof authentication of a user of the gaming communication device. A secondlevel of user authentication comprises authentication of the gamingcommunication device itself. This may occur, for example, byauthentication of a mobile station by a mobile carrier. A third level ofuser identification may comprise biometrics. Various examples ofbiometrics may include, but are not limited to, fingerprintidentification, photo identification, retina scanning, voice printmatching, etc.

In a next step 604, the user is presented with the gaming environment.The gaming environment may be presented in various stages. For instance,in a first stage, the gaming environment may comprise a casino lobbywhere the user is presented with certain gaming options including, forexample, table games, slots, sports book, video poker, and a casinocashier. In a subsequent stage, the user may be presented with optionalinstances of the type of activity selected from the casino lobby.

In a next step 606, the user selects an activity, such as a particularcasino table game. In step 608, the user is presented with one or moreoptions related to the selected activity. In step 610, the user selectsan option. For instance, at this point, the user might place a wager,draw a card, select a restaurant or restaurant menu item, select a newssource or a news story, place a buy or sell order on a financialexchange, place a bet on a certain box office performance over/underamount for a given movie, etc. The options for user input are myriad. Instep 612, the software resident on the gaming communication deviceaccepts the option input by the user and transmits the input data to thesoftware resident at the gaming server. In step 614, the gaming serversoftware acts on the input data.

Actions in this point, may include, without limitation, determining anoutcome and/or amount, accessing another server and/or softwareapplication, retrieving information, preparing a response to the user,etc. The action of determining an outcome and/or amount might takeplace, for example, if the user is using the device to place wagers inconnection with a gambling activity. For certain gambling activities,such as a table game or slot machine, a random number generator may beincorporated to determine the outcome (i.e., whether the user won orlost) and the gaming server software would also determine an amount wonor lost based on the amount wagered and any applicable odds. The actionof accessing another server and/or software application might occur, forexample, in the event the user is engaging in a services activity suchas accessing news services, making reservations and placing food andbeverage orders at a restaurant, or making a retail purchase. The actionof retrieving information might occur when the gaming server software isprompted to access another server for the purpose of retrieving acertain type of information requested by the user.

Preferably, the gaming server software prepares a response to the user'sinput data and in step 616. In step 618, the user acknowledges theresponse. For example, in the case of gambling, the user mightacknowledge that he won a hand of blackjack because the dealer bustedand that his payout was $100 based on a $50 bet at even odds. In step620, the user logs out.

In the situation where the user is gambling, after the series of stepsdescribed in connection with FIG. 6, (or a subset or modified series ofsteps), the user physically enters a casino and goes to a casino cashierfor payout and/or settlement (which can include, for example, extensionsof credit or advance deposits). In some embodiments, there is a waitingperiod (e.g., twenty-four hours) before the user can collect winnings.The purpose of the waiting period is to allow time for fraud monitoring.The waiting period may depend on the amount of the balance. For example,if the user is owed less than $5,000 the waiting period may be twelvehours. If the user is owed between $5,000 and $10,000 the waiting periodmay be twenty-four hours. If the user is owed more than $10,000 thewaiting period may be forty-eight hours.

Preferably, data is transmitted back and forth during the conveniencegaming activities between the gaming communication device and a servercontrolled by the gaming service provider. An example of the path ofcommunication is shown in FIG. 7. Gaming data, such as a wager placed bythe user, is transmitted from gaming communication device 701 to a basestation 702 (or a transmitter in the case of a private wireless networksuch as a WiFi or WiMax network). Base station 702 routes the datathrough network 703 to a hub or gateway 704, which in turn routes thedata to a gaming server 705 operated by a gaming service provider.Preferably, the communication from gaming communication device 701 tothe network 703 comprises wireless communication. This may be any typeof known wireless communication, or any type of wireless communicationavailable in the future. Examples of acceptable wireless communicationprotocols include CDMA, GSM, and GPRS.

Preferably, the communication from the network 703 to the gateway 704and to the server 705 are conducted over secure land line. FIG. 7 is anexample communication network only and the invention should beunderstood to cover other networks in which data may be transmitted fromgaming communication device 701 to server 705. Preferably, data inresponse to data being transmitted from gaming communication device 701to server 705 is transmitted back to gaming communication device 701along a path essentially opposite to the path of the first transmission.It should be noted that in at least certain embodiments of the methodsand systems described herein, a user is not actually playing a game onthe gaming communication device. Rather, the user is actually playingthe game on the server controlled by the gaming service provider, whichmay be located within a casino, thereby interacting with the gamingdevice and the server. In other embodiments, the user may be playing thegame on the gaming device itself or interacting solely with the device.

With respect to payment and/or receipt of winnings and losses, onepossible approach is as follows. Upon check-in at a casino hotel, ahotel representative may query a guest as to whether the guest wantsaccess to a convenience gaming device. If the guest does want suchaccess, the hotel representative may provide the guest with a gamingcommunication device in exchange for a credit-card type deposit or otherdeposit. The guest then deposits money into an account for wirelessgaming. The guest's account balance information is loaded onto theguest's account file, which is preferably maintained on the gamingserver. The user may load money into his gaming account by establishinga credit account, for example, at a casino cashier and/or by paying cashto the casino cashier. Many other alternatives exist and this process isan example only. Guest accounts or gaming communication devices may bepreloaded with funds. Funds may be deposited during a convenience gamingsession. This may occur, for example, if a user selected a casinocashier activity from the gaming environment and instructed the cashierto add funds to the account. The finance subsystem may also utilizeaccount card technology (such as ATM cards, credit cards, stored valuecards, gift cards, etc) in order to conduct financial transactionsassociated with a user's account. Moreover, the user may receive or makepayments remotely, by way of inputting instructions via the gamingcommunication device or by another remote device such as an automaticteller machine (ATM), which is in electronic communication with thegaming server or other server operated by the casino, hotel, gamingservice provider or other entity involved in the convenience gamingactivities. For example, a user might remotely (via the gamingcommunication device) place an order at a restaurant. Then, the usermight make advance payment for the meal at an ATM-type machine which isoperable to receive instructions corresponding to the financialtransaction requirements of the convenience gaming activity of orderingfood.

Electronic records of the gaming transactions undertaken by a user maybe established. Preferably, this is accomplished by utilization of akeystroke log, which is an electronic record of all keystrokes made bythe user. Utilization of a keystroke log in this context allows forunprecedented monitoring of a user's gaming activity. In the event of adispute, one may refer to the keystroke log and readily determinewhether, in fact, a user placed a particular wager, for example.

An additional possible aspect of the electronic record is to allow agaming control board or other regulatory authority, access to theelectronic record in a direct manner in order to conduct periodicindependent monitoring of the convenience gaming activities conductedover the system. Another possible aspect is to allow policing againstrigged machines. For instance, it is possible that the gaming controlboard (or other regulatory authority) could obtain a gamingcommunication device and compare their test results over time againstrecords in the electronic record database (e.g., by comparing theresults shown in the keystroke log). This essentially compriseselectronic access for testing.

In other embodiments of the invention, as shown in FIG. 8, a ship-basedconvenience gaming system is provided. The system preferably comprisespassenger vessel 802, such as a cruise liner for example. The systemincludes one or more gaming communication devices 806 connected to acommunication network. The network shown in FIG. 8 comprises a mobilenetwork with base stations 808 connected via a LAN to a base stationcontroller (BSC) 810. BSC 810 is connected via a T1 interface to a firstVery Small Aperture Terminal (SAT) modem 812, which is in communicationwith a first satellite 814. First satellite 814 is operable to transmitand receive signals from second satellite 814, which is in communicationwith second VSAT modem 812. Second VSAT modem 812 is in communicationwith a gaming server 818 located at gaming service provider 816. Gamingserver is coupled to gaming database 820. Again, the networkconfiguration depicted in FIG. 8 is for example purposes only, and otherconfigurations are within the scope of the invention. An on-board backoffice 822 is preferably provided. Data is communicated by the on-boardVSAT modem and transmitter to the first satellite for relay to thesecond (preferably land-based) VSAT receiver and modem. The data is thencommunicated to a server and/or centralized database via a mobilestation controller (not shown).

A corresponding business model involves the gaming service providercontracting with a cruise line, which agrees to allow the gaming serviceprovider to provide coverage throughout the cruise line's ship(s), byusing repeaters for example. The gaming service provider may provide aprivate wireless network, in which case any revenue generated from useof or access to the private wireless network, and revenue from gamingactivities, may be allocated among all or any subset of the cruise lineand the gaming service provider. Alternatively, the gaming serviceprovider may contract with a mobile carrier and a satellite provider, inwhich case revenue from the mobile calls, and revenue from gamingactivities, may be allocated among all or any subset of the cruise line,the mobile carrier and the gaming service provider.

There are several scenarios for a user's activity relative totransactions conducted over the convenience gaming system. In oneexample scenario the user is in a fixed, but remote, location from thegaming server, which may be located on the premises of a casino. Thismay include, for instance, a situation in which the gaming communicationdevice is a kiosk or some other communication device which is in a fixedposition or which is tethered to a fixed position so that the gamingcommunication device cannot be moved beyond a certain area. In anotherexample scenario, the user starts a convenience gaming transaction at afirst location and ends the transaction at a second location differentfrom the first location. In another example scenario, the user is mobileduring a single convenience gaming transaction. In another examplescenario, the user is mobile within a first approved area then (duringthe convenience gaming transaction) the user moves outside the firstapproved area, through an unapproved area, to a remote second approvedarea.

In another example embodiment, the convenience gaming system may be usedto enable gaming activities involving multiple wireless users whointeract with one another. For instance, the system may enable a tablegame (such as blackjack) in which a first user and a second user areconducting gaming transactions on the same table and in which optionsselected by the first user directly impact outcomes and options relativeto the second user. Preferably, the gaming environment presented on thegaming communication devices of both the first and second users willindicate the existence and activity of the other respective user.Another example of multiple users interacting on the convenience gamingsystem is the provision of a poker game in which users place betsagainst one another instead of, or in addition to, placing bets againstthe house. Another example of interaction between users is when a firstuser makes restaurant reservations or purchases event tickets, therebyreducing the options available to the second user.

Preferably, the gaming service provider provides at least the followingfunctions. First, the gaming service provider provides and controls theone or more gaming servers. These servers may be physically locatedwithin the confines of the gaming service provider or may exist at aremote location. As mentioned, the gaming servers may also be located ator near a games provider such as a casino, casino hotel, racino, cruiseship, race track, etc. The gaming service provider may also providemonitoring services such as transaction monitoring and key strokelogging services. The gaming service provider may also provide datamanagement and security services. These services are not intended to beexhaustive and the gaming service provider may provide other serviceswhich facilitate the convenience gaming process.

It should be noted that the invention can be implemented in connectionwith any gaming environment or an environment for any other activity,which may be conducted electronically. The invention is not limited toNevada or any other particular gaming jurisdiction. For instance, theinvention can be employed in connection with casinos in Atlantic City,N.J., international jurisdictions, Native American gaming facilities,and “racinos” which are race tracks that also have slot machines, videolottery terminals, or other gambling devices. For example, in connectionwith “racinos,” the invention might be used by participants who wish toplay slot machine games while they are viewing race horses in thepaddock area. This might be desirable in the event that the slot machinearea does not allow smoking and a participant wishes to gamble from anoutdoor smoking area. Alternatively, the slot machine area might permitsmoking and the gambler wishes to play the slot machines from an areawhere he or she can avoid breathing second-hand smoke. Numerous otherscenarios can be envisioned in which the gaming participant can use theinvention to participate in remote gaming, while enjoying some otherprimary activity in a location remote from the gaming facility.

Further, the invention is not limited to gaming, but can include otherapplications, such as trading financial instruments, and wagering onother types of events, such as elections, award events, or any otheractivity. More specifically, although the invention is described in thecontext of remote and/or mobile gaming, the principles of the inventionare applicable to any system or method that uses wireless communicationsor other portable devices including handheld devices such as personaldigital (or data) assistants (PDAs), computers, mini-computers, pagers,wireless terminals, mobile telephones, etc. Such systems may includeelectronic trading systems such as those used for trading financialinstruments or any commodities.

In at least one embodiment, the invention provides jurisdictionalcontrols, which limit gaming to approved geographical areas. Theinvention may also include an age/identity verification feature. Thiscan be accomplished through any applicable technique including retinascanning, finger print identification, voice print matching, or otherbiometrics. Identity verification can also be accomplished by having acustomer take a picture of himself (e.g., by use of a digital picturephone) and transmitting the picture to the gaming service provider forcomparison to a stored picture of the pre-approved user. Identityverification can also be accomplished by way of comparison ofparticipant provided data to stored data, and execution of electronicagreements or contracts by the participant. The invention may alsoprovide for the logging of keystrokes. In at least one embodiment, allcommunications are accomplished without accessing the Internet.

Mobile, remote gaming may be desirable for many reasons, some of whichhave already been described. The invention may allow supplementation ofexisting in-house gaming revenue by allowing bettors to place bets whileenjoying other leisure activities such as golf, swimming, dining andshows. The invention may complement the new coinless wageringenvironment as bettors can play their favorite games outside the casino.The invention provides a high-speed, reliable, accurate, and securemobile gaming environment that complies with regulatory requirements foridentification and location verification of the bettor with the abilityto generate key stroke logs. The invention may restrict unauthorizedusage from a geographic perspective and is capable of implementationusing location verification technology (e.g., geo fencing) to conformthe gaming activities to legal parameters.

Consumers may benefit from an increased choice of gaming environments.Consumers will be able to bet in whatever surroundings they prefer,benefiting from the knowledge that the product is regulated, fair andsecure while enjoying the gaming experience at the speed they choosewithout external influences, such as that which might occur within thein-house casino environment. The gaming businesses can use the inventionto increase their revenue base through a new, regulated, mobile, remotechannel. Customers wanting to be entertained during downtime or outsidea casino will be able to play games on their gaming communication deviceand customers intimidated by a traditional casino environment will beable to play in private. The gaming jurisdictions may benefit from anincrease in gaming an ancillary revenue growth because customers willhave a more enjoyable experience.

The invention may also be used to deliver content at an increased speedcompared to traditional telecommunications systems. The content mayinclude, for example, live reports, entertainment, news, promotions andadvertising.

As mentioned above, the invention provides a mobile gaming environmentthat complies with regulatory requirements for identification andlocation verification of the bettor. Moreover, the system is designed tobe one hundred percent “clean” from a regulatory perspective. Thesoftware is clean in that it has not been and will not be licensed toanyone who does business illegally or otherwise operates in a “gray”area. For example, in a preferred embodiment, the software is notlicensed to an entity that will illegally operate the software, orotherwise illegally do business on, the Internet. This may be desirablein that certain gaming jurisdictions will not grant gaming permits orlicenses to companies that do business with, or license technology to orfrom, other entities known to be engaging in illegal operations.

Preferably, the system is designed such that the gaming software (orother application software operating on the system) is also one hundredpercent clean from a regulatory perspective. For instance, beforegranting a license, a gaming jurisdiction may require that the softwarebeing used is not tainted in that it has not been used by the licenseapplicant in violation of any laws and has not been licensed orotherwise distributed or disseminated to others who have used thesoftware for illegal purposes, or who have been engaging in illegalactivity. Therefore, it is preferred that the gaming software be cleanand untainted from this perspective.

The systems and methods described herein may also be used to deliverand/or access “Rich Media” content such as, for example, sports video(live or nearly live) and audio commentary. Such may often only bedistributed within specific jurisdictions. Therefore, the distributionmay benefit from the inventive aspects discussed herein, particularlythe location verification aspect, such as geofencing.

The gaming system and methods described herein may permit, among otherthings, pari-mutuel wagering, sports betting, and dissemination of newsand other content. The invention also enables a casino or other gamingprovider to advertise ancillary services such as shows, bars, andrestaurants. The invention also enables remote reservations andpurchases in connection with such services.

According to some embodiments of the invention, the convenience gamingsystem provides for the dissemination of real-time odds to usersaccessing the system.

In other embodiments, an outcome in one transaction can trigger thepresentation to the user of options for a second transaction. Forexample, if a user wins a predetermined amount of money playingblackjack, the user might be presented with an option to purchase retailitems at a casino store or to make reservations for certain services ata club. As another example, if a user uses the system to purchase showtickets, the user might be offered to make reservations at one ofseveral restaurants within a certain proximity to the show.

In some embodiments of the invention, access to the gaming device may berestricted unless a soft check and/or a hard check are performed. Forexample, in a soft check process, a user may be required to enter avalid user name and associated password, whereas in a hard checkmechanism, the user may employ a physical token such as a card thatidentifies the user to the gaming device.

FIG. 9 illustrates an apparatus 920 to be used in conjunction with agaming device 910 as part of a hard check mechanism according to theinvention. Apparatus 920 may include any of a card which bears amagnetic strip (such as a credit card), a key that includes an RFIDtransponder, a limited-distance signal emitted or other transponder, asmart card that has a microprocessor or other circuit or “chip”, abracelet or wristband which includes a signal transmitter such as anRFID signal transmitter, or which includes a magnetically encodedsignal, a substrate that bears a bar code or other optically readableidentifier, or any combination of the same.

For example, in some embodiments of the invention, apparatus 920 may bea magnet or a card bearing a magnetic strip (such as a credit card) or asmart card that has a microprocessor or other circuit or “chip” andwhich may be read by card reader 1010, which is part of gaming device1000, as depicted in FIG. 10. Alternatively, such a card may be read bya contact-less device (e.g., a signal reader which receives andinterprets signals transmitted by the card).

Apparatus 920 may therefore be capable of producing a signal that isdetectable by a gaming communication device such that access to thegaming device is provided when the signal is detected. Access to thegaming device may be provided for a predetermined period of time afterthe signal is initially detected or so long as the signal continues tobe detected. The signal produced by apparatus 920 may additionally oralternatively communicate identifying information stored on theapparatus. Such information may be communicated through a transponder orany other suitable emitter. Access to the gaming device may be providedwhen the identifying information is associated with a user that isauthorized to operate the gaming communication device. Such identifyinginformation may be stored on apparatus 920.

Moreover, the signal produced by apparatus 920 may additionally oralternatively communicate characteristics associated with the authorizeduser. These characteristics may include the average volume wagered bythe user, whether the user is a high-volume, medium-volume or low-volumewagerer, the user's wagering performance, whether the user is a memberof a club affiliated with the organization that distributed theapparatus to the user. User characteristics may be stored and updated onapparatus 920 and/or device 910 as the user enters into more wagers andtransactions, thereby enabling the provision of yet another layer ofsecurity for the device. For example, even after the initial soft andhard checks are successful, the user may subsequently be denied accessto device 910 if the updated information does not fall within apredetermined range of acceptable characteristics or does notsubstantially match ongoing wagering requirements within a predetermineddegree of tolerance. Alternatively or additionally, a certain number ofdeviation occurrences, which may be communicated by device 910 or merelycalculated based on the updated characteristics as communicated bydevice 910, may trigger an alarm signal generated at a security center.This signal may lead to increased surveillance of the user or may causesecurity or gambling facility personnel to take action vis-a-vis theuser.

Alternatively, the signal produced by apparatus 920 may be compatiblewith a certain class of devices (e.g., gaming devices associated with arelatively higher limit, if at all, on the amounts allowed to bewagered). Before being provided with the apparatus, a user may berequired to provide identifying information (e.g., a user I.D.). Uponreceipt of this information, a provider such as a gambling facility, mayretrieve a user record or profile containing characteristics associatedwith the user and the information provided. The user may then beprovided with an apparatus that corresponds to the retrievedcharacteristics. An example of such a verification process relating towagering is discussed below.

In some embodiments of the invention, apparatus 920 does not produce anysignal. Instead, apparatus 920 may be a storage device or storage mediumsuch as tape, memory, a disk, etc. and gaming device 910 may have areader capable of extracting information such as a compact disk or otherdisk or tape reader, or any other card reader or device capable ofextracting information stored on such a storage mechanism.

In some embodiments of the invention, apparatus 920 may also serve otherfunctions. In addition to, or as an alternative to, securing access to awireless gaming device, apparatus 920 may use the same mechanismsdescribed herein to communicate with a gaming station or otherinterface. For example, apparatus 920 may be associated with informationthat grants the user access to certain non-mobile gaming devices,certain areas within a casino or a hotel, a particular nightclub orrestaurant, a particular room or suite, etc., or serve as a user orplayer tracking card, e.g., a “comp card”.

In other embodiments of the invention, apparatus 920 may be a braceletor wristband such as bracelet 1100 depicted in FIG. 11. Bracelet 1100can be made of many types of material, such as rubber, plastic, metal orany combination thereof. Bracelet 1100 may be adapted for single-use ormultiple uses. The ends of the bracelet may be attachable at point 1111such that the bracelet can be affixed to or worn on, e.g., the wrist ofa user of the game device. For example, bracelet 1100 may have adhesiveon one end, allowing that end to be adhered to the other end when thebracelet is formed into a loop around the user's wrist.

The bracelet may include a chip, transmitter or transponder which emitsa signal that identifies the user (e.g., by emitting a signal thatrepresents a unique identifier such as a signal that represents asequence of alphanumeric characters). In such embodiments, the bracelet,when worn by a user of the gaming device, can emit a signal that isreceived by the gaming device, which in turn informs the gaming devicethat the wireless gaming device is being used by an authorized user(e.g., the user associated with the unique identifier transmitted by thebracelet).

The bracelet may operate only for the period during which it is worn bya user. For example, the bracelet or gaming device may include a devicewhich permits detection of whether the bracelet is in a looped positionwith its ends adhered to each other. This can be advantageous where itis desirable to determine, after a bracelet has been worn by a user,whether the bracelet has been removed by the user (because the ends ofthe bracelet are no longer in contact with each other). In someembodiments of the invention, a very low amperage current can be passedthrough the bracelet through a transmitter or battery in the bracelet.Thus, if the bracelet is worn by a user, the ends of the bracelet willbe electrically connected and a closed circuit will be formed therebycausing current to flow through the circuit. Such a current can bedetected by the gaming device. In other embodiments, the magnetic fieldof the circuit can be detected by the gaming device. If the circuit isbroken or otherwise disengaged, indicating that the user has probablyremoved the bracelet, then the hard check can fail, and the user mustpass the hard check in another manner (e.g., by obtaining anotherbracelet). The bracelet may or may not be permanently disabled uponremoval.

In various embodiments, an indicator may be associate with the apparatus920, or with any device containing the apparatus, such as a bracelet.For example, a bracelet may include an indicator. The indicator may be alight (e.g., a light-emitting diode), a buzzer or other noise maker, avibrating device, or any other indicator. The indicator may broadcast orproject a signal when some aspect of the apparatus 920 or the devicecontaining the apparatus (e.g., the bracelet) is near failing. Forexample, in various embodiments, a current runs through the bracelet soas to allow a determination of whether the bracelet is broken. Thecurrent may be powered by a power source, such as by a battery. Invarious embodiments, an indicator on the bracelet may show when thepower source is near expiration. In various embodiments, the device 910may provide an indication of when one or more functions of the apparatusare near failure. For example, the bracelet may communicate a signal tothe device 910 indicating that a power source within the bracelet isnear expiration. The device 910 may then display a message to a playerof the device which tells the player that he should get a new braceletbecause the battery in his current bracelet is about to lose power.

The bracelet may have visual or other indicator or indicia associatedwith user characteristics. Accordingly, different users may be handedout bracelets having different colors, dimensions, sizes, styles, etc.based on their gaming, or other, traits. For example, upon verificationof user identity and/or retrieval of user record, a user that wagers ortrades in high volumes may be given a bracelet having a different colorthan that given to a user that wagers or trades in lower volumes.

In some embodiments, the gaming device may be configured to provide arecognizable visual, audio and/or other signal when access to the deviceis provided through the bracelet (i.e., when the hard check issuccessful) or merely when the device is within a certain distance fromthe bracelet. For example, an LED on the gaming device may be enabledwhen access is provided. As another example, the device may produce ablinking light, a beeping sound and/or may vibrate when the device iscapable of detecting the bracelet and/or when the user actuates alocator button on the device. Actuation of such a button may also bepart of a sequence of steps taken to unlock the device.

In some embodiments of the invention, the gaming device may beprogrammed to recognize one or more particular bracelets at the time thewireless gaming device is registered to be provided to a user. In suchembodiments, the gaming device may be selected or determined to match orcorrespond to the unique identifier of the particular bracelet. Forexample, a unique identifier may be stored by, coded into, or programmedinto the wireless gaming device.

In other embodiments of the invention, a unique identifier, and/or usercharacteristics, are coded into the bracelet at the time the wirelessgaming device is registered to be provided to a user. In theseembodiments, the identifier of the bracelet would be set to match,correspond to or otherwise be recognized by, the wireless gaming device.

In some embodiments of the invention, the identifiers associated with ahard check apparatus (e.g., a bracelet as discussed above) are stored ona server or other device that the wireless gaming device can access. Inother embodiments, the wireless gaming device does not store suchidentifiers. Information conveyed from the apparatus to the wirelessgaming device may be checked, compared to predetermined criteria ormatched locally (i.e., at the wireless gaming device by, e.g., thedevice itself) or remotely through, e.g., a server which canauthenticate users and communicate back with the device. For example,such information may be transmitted across network 16 of FIG. 1 and maybe processed by computer 18.

In some embodiments of the invention, the identifier associated with aparticular apparatus (e.g., bracelet) allows one or more accounts of theuser to be recognized and accessed. For example, an account that storesor manages the “comp points” of the user may be determinable by, andaccessible from, the wireless gaming device. Thus, the user may wagerusing the wireless gaming device and also have her comp pointsmanipulated (e.g., added to in accordance with her use of the wirelessgaming device). In various embodiments, an apparatus, such as abracelet, may serve as a player tracking card. An apparatus 920 may bedetectable not only by a wireless gaming device, but also by astationary gaming device, such as by a slot machine. A stationary gamingdevice may detect the apparatus as a user interacts with the stationarygaming device. For example, as a user presses a button on a slotmachine, the user's arm may come close to the slot machine. The slotmachine may then detect a signal from the bracelet that the user iswearing on his arm. The slot machine may determine the user's identitybased on the signal from the bracelet. The slot machine may accordinglycause a comp point account or other account associated with the user tobe updated based on the user's play at the slot machine.

The wireless gaming device can be programmed to determine the form ofhard check used (e.g., from a bracelet instead of from a comp card witha magnetic stripe). For example, the manner of input may provide such adetermination (e.g., an identifier received via an integrated cardreader as depicted in FIG. 10 indicates that the hard check is performedvia a card, while an identifier received via an RFID transponderindicates that the hard check is performed via a bracelet as depicted inFIG. 11). Alternatively or additionally, the form of hard check may becoded into the identifier. For example, identifiers that begin with thenumber “1” may indicate that the hard check is via a card, whileidentifiers that begin with the number “2” indicate that the hard checkis via a bracelet.

Although this disclosure has been described in terms of certainembodiments and generally associated methods, alterations andpermutations of these embodiments and methods will be apparent to thoseskilled in the art. Accordingly, the above description of exampleembodiments does not define or constrain this disclosure. Other changes,substitutions, and alterations are also possible without departing fromthe spirit and scope of this disclosure.

In various embodiments, apparatus 920 may be a ring, necklace, earring,pendant, hairpin, or any other type of accessory or jewelry. In variousembodiments, apparatus 920 may be an item used in body piercings. Invarious embodiments, apparatus 920 may be a belt, shoe, scarf, hat, orother item of clothing.

In various embodiments, apparatus 920, e.g., a bracelet, may emit a timevarying signal. The time varying signal may vary according to apredetermined schedule. For example, for a first five-minute period, thebracelet may emit a signal comprising the bit sequence “1010101010”. Fora second five-minute period, the bracelet may emit a signal comprisingthe bit sequence “1111100000”. For a third five-minute period, thebracelet may emit a signal comprising a third bit sequence. As the bitsequences may be predetermined, the device may anticipate certainsequences at certain times. The device may store a table or some otherrecord of which sequences should be received from apparatus 920 at whichtimes. When the device receives a signal from the apparatus at aparticular time, the device may verify that the signal matches ananticipated signal for that period of time. If the signal does notmatch, the device may not allow the user to play.

In various embodiments, a time varying signal emitted from an apparatusmay make it difficult for a malfeasant to intercept a signal from theapparatus and subsequently emit the same signal in order to pose as adifferent person. Further, a malfeasant may find it difficult to track auser because a signal emitted by the user's bracelet will vary.

In various embodiments, an apparatus, such as a bracelet, may store userinformation. User information may include medical information, such asthe names and doses of drugs being taken by the user, the names of drugsto which the user is allergic, the user's blood type, one or moremedical conditions relevant to the user, the name of the user'sphysician, the name of the user's emergency contact, or any othermedical information, or any other information. In various embodiments,signals emitted from an apparatus may generally be encrypted. A user'sdevice (e.g., mobile wireless device) may possess a key for decryptingsignals from the user's own apparatus, but not necessarily fordecrypting signals from other users' apparatuses. However, in variousembodiments, signals from all users apparatus may be decrypted with asingle “master key”. Such master key may only be in the possession ofmedical professionals. Thus, a medical professional, upon finding anunconscious user, may be able to read information from the user'sapparatus using a device in the possession of the medical professional,where such device is in possession of the master key. In variousembodiments, medical information may be the only information encryptedin the signal of an apparatus. In various embodiments, the medicalinformation may be encrypted using a different key than is used forencrypting other information. In this way, for example, mobile wirelessdevices may have access to basic information about a user, such as auser name or identifier, but not about a user's medical information. Onthe other hand, a medical professional may possess a device which doeshave the key to accessing medical information about a user.

In various embodiments, the apparatus 920 may be physically connectableto the device 910. For example, a conducting cable or wire may beplugged into both the bracelet and the device. In various embodiments,the player may only be allowed to use the device 910 while theconnection is maintained.

In various embodiments, the apparatus 920 may interface with an accesscontrol system. A player may move apparatus 920 close to reader in orderto identify himself to the reader. The reader may then unlock a door(e.g., temporarily unlock the door) so that the player may enter arestricted location. In various embodiments, the apparatus 920 may serveas a room key. The player may move the apparatus near to a reader on hishotel room. The reader on the hotel room door may be configured tounlock the door only upon reading certain signals which correspond tothe player, or to other people staying in the room. The apparatus 920may also allow the player to gain access to restricted lounges, toexclusive restaurants, or to other restricted or private areas.

In various embodiments, apparatus 920 may be used to make payments. Theapparatus may emit a signal, for example, that represents a financialaccount identifier. The apparatus may emit a signal which can be tied toa financial account identifier. In various embodiments, the apparatusemits a signal which provides a merchant or other party with a roomnumber of the user. A purchase made by the user can then be charged tothe user's room. In various embodiments, the signal emitted by theapparatus 920 may represent a credit card number. A merchant whichreceives the signal can then charge the user's credit card for apurchase. In various embodiments, a casino may store a record whichincludes a signal (e.g., a bit pattern) that is emitted by a user'sapparatus 920 in association with a financial account identifier (e.g.,a debit card number) of the user. Thus, whenever the casino receives asignal from the user's apparatus 920 in the context of a payment orpurchase, the casino may charge the payment or purchase to theassociated financial account identifier.

In various embodiments, a device 910 may be configured to take a firstset of actions upon detection of a signal from a first apparatus 920. Invarious embodiments, a device 910 may be configured to permit a firstset of activities upon detection of a signal from a first apparatus 920.For example, as described herein, a device 910 may allow the play ofgames, may accept wagers, may determine payouts, and may take otheractions and permit other activities associated with game play whendetecting a signal from a first apparatus. In various embodiments, thesame device 910 may be configured to take a second set of actions orpermit a second set of activities upon the detection of a signal from asecond, different apparatus 920 (i.e., the second apparatus is differentfrom the first apparatus). For example, when the device 910 detects asignal emitted from the second apparatus, the device may display thename of the user with the second apparatus. However, the device may notallow the user with the second apparatus to make wagers using thedevice. Thus, in various embodiments, a device may respond to differentapparatuses, but may respond in different ways. The same device mayallow take different actions or permit different activities depending onwhich apparatus it detects.

In various embodiments, a user may be made aware of the proximity offriends or colleagues. A user may be playing on his device. If a friendof the user comes close enough that the device can detect the friend'sapparatus, the device may display the name of the friend. The user maythen look up to find his friend. A device may be configured to recognizeone or more friends of a user. The device may be configured to recognizea particular signals and to match such signals with the names of theuser's friends. For example, the device may store a lookup table inwhich names are stored in association with signal patterns.

In various embodiments, a device 910 need not directly detect anapparatus 920. In various embodiments, an apparatus 920 need notdirectly detect a device 910. In various embodiments, other methods maybe used to determine whether the device 910 and the apparatus 920 areproximate to one another. For example, a detector in the ceiling maydetect both the device and the apparatus. If the detector is capable ofdetecting only nearby devices and apparatuses, it may be inferred thatthe detected device and that the detected apparatus are near to oneanother. The detector may report that the two are near to one another tothe casino, and the casino may transmit a signal to the device 910indicating that the apparatus is near. Accordingly, the apparatus 910may allow gaming activities to take place.

Below are described other methods by which oneobject/thing/device/apparatus may detect another.

Detection of One Device by Another

Various embodiments described herein may refer to the interactionbetween a first device and a “nearby” second device. In variousembodiments, the first device may take action if the second device isnearby. In various embodiments, the second device may take action if thefirst device is nearby. When terms such as “nearby”, “near”, “close”,“proximate”, “presence”, or the like are used, it will be understoodthat the first device may recognize the presence of the second device invarious ways, that the second device may recognize the presence of thefirst device in various ways, that the first device may react to thepresence of the second device in various ways, and that the seconddevice may react to the first device in various ways. It may be notedthat the first device may react to the presence of the second devicewithout recognizing the presence of the second device if, for example,the first device is instructed to take an action by a third device whichrecognizes that the second device is near to the first device. Invarious embodiments, the first device and/or the second device may be inmotion. For example, the first device may be moving (e.g., the firstdevice may be carried by a walking person) while the second device maybe stationary.

Various technologies may allow a first device to recognize and/or toreact to the presence of a second device. Various technologies may allowa second device to recognize and/or to react to the presence of a firstdevice. As used herein, the term “beacon” may refer to a device whichgenerates a signal which may be used as a reference signal by anotherdevice or person, e.g., so that the other device may determine its ownlocation or position. A beacon may emit a continuous, periodic,sporadic, or other type of signal. A beacon may emit a directed signal(e.g., a signal which is most easily detected by devices at a certainincident angle to the beacon) or the beacon may emit a signal of equalstrength in all directions. A beacon may emit a signal when triggered bythe presence of another device, or may emit a signal independently ofother events. A beacon may have, as its sole function, the broadcast ofa reference signal. A beacon may serve as a beacon only incidentally.For example, a light bulb may incidentally serve as a beacon even thoughits primary purpose may be to light a room. A beacon may be natural(e.g., the sun) or man-made. A beacon may emit light, sound, radiowaves, microwaves, odors, or any other form of signals.

-   -   Radio Frequency Identification (RFID) tags or transponders are        devices, generally small, that can transmit signals and/or        redirect signals, and use such signals as a means for providing        identification. The transmitted or redirected signals are        generally radio waves. Signals which are transmitted or        redirected may contain a unique signature or pattern, which may        serve to uniquely identify the RFID tag. If the tag is        associated with a device (e.g., by attachment or by        incorporation into the device), then the unique identification        of the tag can, by association, serve to uniquely identify the        device.    -   Near field communication (NFC) is a technology that allows for        secure wireless communication over short distances, typically in        the range of inches. An exemplary application has been tested by        Motorola and Mastercard, in which cellular phones are outfitted        with NFC to allow for credit card payments using cellular        phones.    -   Bluetooth is a specification for wireless networks which        provides a means for devices to use radio waves to communicate        over short distances.    -   WiFi is a technology, based on radio waves, for operating        wireless local area networks. WiFi can allow a device to access        the Internet via hotspots. WiFi can also allow two devices to        communicate with one another directly in peer-to-peer mode.    -   Infrared data transmission can be used as a means of        communication between two nearby devices. For example, an        infrared light-emitting diode (LED) can be used to generate        signals. The signal pattern can be created by switching the LED        on and off. A receiver may include a silicon photodiode, which        may convert incident infrared light into electrical signals.        Infrared signals may also be transmitted with lasers.    -   A device may be recognized by means of a captured picture or        image of the device. For example, a first device may take a        picture of a second device. The first device may use image        processing algorithms to detect salient features of the second        device. For example, if the second device has a pattern of black        and white stripes, then the first device may search for such a        pattern within captured images.    -   One or more devices may use positioning technologies to        determine their own location. Once the locations of two devices        are known, simple algorithms may be used to determine whether        the devices are close to one another or not. For example, the        distances between two devices with known x and y coordinates can        be at least approximated using the Pythagorean Theorem. Various        positioning technologies may be used. For example, a device may        receive a signal from a beacon or other signal generator of a        known location. Particularly if the beacon has a short range,        the device's position may be assumed to approximate the position        of the beacon. In various embodiments, a device may receive        signals from multiple beacons or signal generators. The signal        generators may coordinate to transmit the signals        simultaneously. However, depending on the device's location, the        device will not necessarily receive the signals from all the        beacons at the same time. For example, if the device is closer        to beacon 1 than to beacon 2, the device will receive the signal        from beacon 1 prior to receiving the signal from beacon 2. Based        on the arrival times of signals from the various beacons, the        device's location may be deduced. For example, geometric or        trigonometric algorithms may be used to determine the location        of the device based on the known locations of the beacons and        based on the arrival times of simultaneously transmitted signals        from the beacons. In an analogous fashion to systems involving        beacons, positioning systems may make use of receivers at known        locations (e.g., fixed receivers). The fixed receivers each        receive a signal from the device about which a location is        desired. The same signal from the device might arrive at the        different receivers at different times, or from different        angles. Based on the arrival times or angles of arrival of the        signal at the various receivers, algorithms may be used to        determine the location of the device. Exemplary positioning        systems are as follows:        -   The Global Positioning System (GPS) is based on a            constellation of satellites which transmit reference signals            to locations on earth. GPS receivers can pick up reference            signals from multiple satellites and use the signals to            determine a position and/or an altitude.        -   Long Range Navigation (LORAN) is a navigation based on            earth-based radio transmitters. The location of a device can            be estimated based on differences in arrival times at the            device of signals from three or more transmitters.        -   Radiolocation using the cellular telephone network is a            system whereby cellular base stations serve as fixed            receivers. The signal from a cellular phone may be received            at multiple base stations. The location of the cellular            phone may be determined based on when a signal from the            cellular phone was received at each of the base stations,            based on the angle with which a signal from the cell phone            was received at each of the base stations, and/or based on            characteristic distortions in the cell phone signal that            would indicate a particular location of origin of the            signal.    -   A first device may emit an audio signal. The audio signal may        consist of a distinct series of notes or pulses. A second device        may pick up the audio signal using a microphone, for example.        The second device may recognize the distinctive pattern of the        audio signal and may thereby deduce the presence of the first        device. In a similar fashion, the second device may emit an        audio signal which may allow the first device to identify the        second device.    -   A first device may recognize the presence of a second device        from physical or electronic contact. For example, a first device        may have a port where a second device can be docked. When        docked, the second device may come into electrical contact with        the first device. The first device may thereby recognize the        presence of the second device and/or the second device may        thereby recognize the presence of the first device.

There are various ways in which one or more devices may detect thepresence of one or more other devices. There are various ways in theproximity of two devices may be determined.

-   -   A first device may detect a signal from a second device. The        first device may thereby detect the presence of the second        device.    -   A first device may determine its own location. For example, the        first device may use a positioning system to determine its own        location. The first device may already know the location of the        second device. For example, the second device may be at a        well-known, fixed location. The first device may have stored in        memory the location of the second device. Once the first device        knows its own location and that of the second device, the first        device may deduce (e.g., using geometric algorithms) when the        first device is near to the second device.    -   A third device may detect the position of a first device, e.g.,        using a positioning system. The third device may know the        position of a second device. The third device can then inform        the first, second, or both devices of the positions of either or        both of the first and second devices. The first device may        thereby determine whether it is proximate to the second device.        The second device may thereby determine whether it is proximate        to the first device. In some embodiments, the third device may        inform the first device that the first device is near the second        device. In some embodiments, the third device may inform the        second device that it is near the first device. In some        embodiments, the third device may instruct the first device to        take some action based on the fact that the first device is near        to the second device, without necessarily informing the first        device that the first device is near the second device. In some        embodiments, the third device may instruct the second device to        take some action based on the fact that the second device is        near to the first device, without necessarily informing the        second device that the second device is near the first device.    -   A third device may detect the positions of both a first device        and a second device. The third device can then inform the first,        second, or both devices as above. That is, the third device may        inform the first and/or second devices of the first and/or        second devices' positions or of the fact that the first and        second devices are near to each other. The third device may also        provide instructions to the first and/or to the second device        based on the fact that the two devices are near to each other.    -   A third device may detect the position of a first device. A        fourth device may detect the position of a second device. The        third and fourth devices may then inform the first device of        both positions. The third and fourth devices may inform the        second device of both positions. The third and fourth devices        may inform the first device that the first device is near the        second device. The third and fourth devices may inform the        second device that the first device is near the second device.        The third and/or fourth devices may instruct the first device to        take some action based on the fact that the first device is near        the second device. The third and/or fourth devices may instruct        the second device to take some action based on the fact that the        first device is near the second device. The fourth device may        inform the third device of the position of the second device.        The third device may inform the first device of the positions of        the first device and the second device. The third device may        inform the first device that the first device is near the second        device. The third device may inform the first device to take        some action based on the fact that the first device is near the        second device. The third device may inform the second device of        the positions of the first device and the second device. The        third device may inform the second device that the first device        is near the second device. The third device may inform the        second device to take some action based on the fact that the        first device is near the second device.    -   A third device may detect the position of a first device. A        fourth device may detect the position of a second device. The        third and fourth devices may inform a fifth device of both        positions. The fifth device may inform the first and/or second        devices of both positions. The fifth device may inform the first        device that it is near to the second device. The fifth device        may inform the second device that it is near to the first        device. The fifth device may instruct the first device to take        some action based on the fact that the first device is near the        second device. The fifth device may instruct the second device        to take some action based on the fact that the second device is        near the first device.        Detection of a Human by a Device

A mobile gaming device may detect the presence of another human being invarious ways. The mobile gaming device may include a microphone. Themicrophone may pick up ambient audio signals. The mobile gaming devicemay analyze ambient audio signals for tell-tell human sounds, such asthe sound of a voice, the sound of breathing, the sound of steps, and soon. For example, the mobile gaming device may use special software whichis tuned to recognize voice signals. The mobile gaming device mayrecognize the presence of humans by other means. For example, the mobilegaming device may include a heat or infrared sensor. The mobile gamingdevice may use such a sensor to pick up the heat signatures of humans.In various embodiments, the mobile gaming device may include a camera.The camera may periodically snap pictures of its surroundings. Themobile gaming device may include image processing software for analyzingthe pictures. The image processing software may have the capability torecognize images associated with humans. In various embodiments, themobile gaming device may recognize the presence of humans via devicesassociated with the humans. For example, the mobile gaming device mayrecognize the signal from a nearby cell phone, e.g., by receiving thesignal at an antenna associated with the mobile gaming device.Presumably, the cell phone is being carried by a human. Thus, byrecognizing the presence of a cell phone, the mobile gaming device maybe indirectly recognizing the presence of a human. In variousembodiments, the mobile gaming device may recognize the presence ofanother mobile gaming device. Presumably, the other mobile gaming deviceis being held or carried by another human. Thus, by recognizing anothermobile gaming device, the first mobile gaming device may indirectlyrecognize the presence of another human.

In various embodiments, when an apparatus is said to emit a signal, theapparatus may actively generate and emit the signal (e.g., using its ownpower source) or may create a signal by passively reflecting an incidentsignal from another source.

The following are embodiments, not claims:

-   A. A method comprising:    -   receiving a first signal at a first time;    -   determining a first period based on the first time;    -   comparing the first signal to a second signal that is associated        with the first period;    -   permitting the placement of a first bet and the generation of a        first game outcome if the first signal matches the second        signal;    -   receiving a third signal at a second time, in which the third        signal is different from the first signal;    -   determining a second period based on the second time;    -   comparing the third signal to a fourth signal that is associated        with the second period;    -   permitting the placement of a second bet and the generation of a        second game outcome if the third signal matches the fourth        signal.        For example, a gaming device may recognize a particular signal        identifying a player as legitimate at a first time, but as        illegitimate at a second time. At the second time, the gaming        device recognizes a different signal as legitimate. The gaming        device may permit play only when receiving a legitimate signal.-   B. The method of embodiment A in which the first signal is received    from a bracelet comprising a wristband and an RFID tag.-   C. The method of embodiment B in which the third signal is received    from the bracelet.    Thus, an apparatus may be configured to generate a first signal    during a first time period and a third signal during a second time    period. Signals may be generated according to a predetermined    schedule.-   D. The method of embodiment A in which the second signal is stored    in a table in association with the first period, and the fourth    signal is stored in the table in association with the second period.    For example, the table may contain a schedule of which signals are    legitimate at each period of time.-   E. The method of embodiment D in which the second signal is stored    in the table in further association with a player identifier, and in    which the fourth signal is stored in the table in further    association with the player identifier. For example, a gaming device    may recognize a player according to a signal received. The gaming    device may be programmed to allow only that player to play games on    the gaming device.-   F. The method of embodiment A in which the first period is a period    of time within which the first time falls. For example, the first    period of time may comprise a time interval from 9:00:00 to 9:04:59,    and the first time may be 9:02:32.-   G. The method of embodiment A in which the first period is adjacent    in time to the second period. For example, the first period may be    from 9:00:00 to 9:04:59 and the second period may be from 9:05:00 to    9:09:59.-   H. An apparatus comprising:    -   a wristband;    -   an emitter operable to emit different signals according to a        programmed schedule, wherein each signal is associated with the        same player.-   I. The method of embodiment H in which the emitter is operable to    repeatedly emit a first signal during a first five-minute period,    and to repeatedly emit a second signal during a second five-minute    period.-   J. An apparatus comprising:    -   a wristband;    -   an emitter operable to emit a first signal which is associated        with a first player;    -   a receiver operable to detect a second signal which is        associated with a second player;    -   a medium for storing a set of signals, each signal associated        with a player;    -   logic operable to use the medium to look up the identity of the        second player based on the second signal; and    -   an output device operable to produce a third signal which is        perceptible to humans, the third signal produced based on the        identity of the second player.        For example, a bracelet may receive signals emitted by the        bracelets of other players. The bracelet may recognize some        signals received from other bracelets as signals associated with        friends of the person wearing the bracelet.-   K. The apparatus of embodiment J in which the output device is a    display device. For example, the output device may be an liquid    crystal display screen attached to the bracelet.-   L. The apparatus of embodiment J in which the output device is a    buzzer.-   M. The apparatus of embodiment J in which the output device is    operable to produce the third signal if the identity of the second    player corresponds to a friend of the first player. For example, the    output device may display the name of the second player's friend.

The following sections I-X provide a guide to interpreting the presentapplication.

I. Determining

The term “determining” and grammatical variants thereof (e.g., todetermine a price, determining a value, determine an object which meetsa certain criterion) is used in an extremely broad sense. The term“determining” encompasses a wide variety of actions and therefore“determining” can include calculating, computing, processing, deriving,investigating, looking up (e.g., looking up in a table, a database oranother data structure), ascertaining and the like. Also, “determining”can include receiving (e.g., receiving information), accessing (e.g.,accessing data in a memory) and the like. Also, “determining” caninclude resolving, selecting, choosing, establishing, and the like.

The term “determining” does not imply certainty or absolute precision,and therefore “determining” can include estimating, extrapolating,predicting, guessing and the like.

The term “determining” does not imply that mathematical processing mustbe performed, and does not imply that numerical methods must be used,and does not imply that an algorithm or process is used.

The term “determining” does not imply that any particular device must beused. For example, a computer need not necessarily perform thedetermining.

II. Forms of Sentences

Where a limitation of a first claim would cover one of a feature as wellas more than one of a feature (e.g., a limitation such as “at least onewidget” covers one widget as well as more than one widget), and where ina second claim that depends on the first claim, the second claim uses adefinite article “the” to refer to the limitation (e.g., “the widget”),this does not imply that the first claim covers only one of the feature,and this does not imply that the second claim covers only one of thefeature (e.g., “the widget” can cover both one widget and more than onewidget).

When an ordinal number (such as “first”, “second”, “third” and so on) isused as an adjective before a term, that ordinal number is used (unlessexpressly specified otherwise) merely to indicate a particular feature,such as to distinguish that particular feature from another feature thatis described by the same term or by a similar term. For example, a“first widget” may be so named merely to distinguish it from, e.g., a“second widget”. Thus, the mere usage of the ordinal numbers “first” and“second” before the term “widget” does not indicate any otherrelationship between the two widgets, and likewise does not indicate anyother characteristics of either or both widgets. For example, the mereusage of the ordinal numbers “first” and “second” before the term“widget” (1) does not indicate that either widget comes before or afterany other in order or location; (2) does not indicate that either widgetoccurs or acts before or after any other in time; and (3) does notindicate that either widget ranks above or below any other, as inimportance or quality. In addition, the mere usage of ordinal numbersdoes not define a numerical limit to the features identified with theordinal numbers. For example, the mere usage of the ordinal numbers“first” and “second” before the term “widget” does not indicate thatthere must be no more than two widgets.

When a single device, article or other product is described herein, morethan one device/article (whether or not they cooperate) mayalternatively be used in place of the single device/article that isdescribed. Accordingly, the functionality that is described as beingpossessed by a device may alternatively be possessed by more than onedevice/article (whether or not they cooperate).

Similarly, where more than one device, article or other product isdescribed herein (whether or not they cooperate), a singledevice/article may alternatively be used in place of the more than onedevice or article that is described. For example, a plurality ofcomputer-based devices may be substituted with a single computer-baseddevice. Accordingly, the various functionality that is described asbeing possessed by more than one device or article may alternatively bepossessed by a single device/article.

The functionality and/or the features of a single device that isdescribed may be alternatively embodied by one or more other deviceswhich are described but are not explicitly described as having suchfunctionality/features. Thus, other embodiments need not include thedescribed device itself, but rather can include the one or more otherdevices which would, in those other embodiments, have suchfunctionality/features.

III. Terms

The term “product” means any machine, manufacture and/or composition ofmatter, unless expressly specified otherwise.

The term “process” means any process, algorithm, method or the like,unless expressly specified otherwise.

Each process (whether called a method, algorithm or otherwise)inherently includes one or more steps, and therefore all references to a“step” or “steps” of a process have an inherent antecedent basis in themere recitation of the term ‘process’ or a like term. Accordingly, anyreference in a claim to a ‘step’ or ‘steps’ of a process has sufficientantecedent basis.

The term “invention” and the like mean “the one or more inventionsdisclosed in this application”, unless expressly specified otherwise.

The terms “an embodiment”, “embodiment”, “embodiments”, “theembodiment”, “the embodiments”, “one or more embodiments”, “someembodiments”, “certain embodiments”, “one embodiment”, “anotherembodiment” and the like mean “one or more (but not all) embodiments ofthe disclosed invention(s)”, unless expressly specified otherwise.

The term “variation” of an invention means an embodiment of theinvention, unless expressly specified otherwise.

A reference to “another embodiment” in describing an embodiment does notimply that the referenced embodiment is mutually exclusive with anotherembodiment (e.g., an embodiment described before the referencedembodiment), unless expressly specified otherwise.

The terms “including”, “comprising” and variations thereof mean“including but not limited to”, unless expressly specified otherwise.

The terms “a”, “an” and “the” mean “one or more”, unless expresslyspecified otherwise.

The term “plurality” means “two or more”, unless expressly specifiedotherwise.

The term “herein” means “in the present application, including anythingwhich may be incorporated by reference”, unless expressly specifiedotherwise.

The phrase “at least one of”, when such phrase modifies a plurality ofthings (such as an enumerated list of things) means any combination ofone or more of those things, unless expressly specified otherwise. Forexample, the phrase “at least one of a widget, a car and a wheel” meanseither (i) a widget, (ii) a car, (iii) a wheel, (iv) a widget and a car,(v) a widget and a wheel, (vi) a car and a wheel, or (vii) a widget, acar and a wheel. The phrase “at least one of”, when such phrase modifiesa plurality of things does not mean “one of each of” the plurality ofthings.

Numerical terms such as “one”, “two”, etc. when used as cardinal numbersto indicate quantity of something (e.g., one widget, two widgets), meanthe quantity indicated by that numerical term, but do not mean at leastthe quantity indicated by that numerical term. For example, the phrase“one widget” does not mean “at least one widget”, and therefore thephrase “one widget” does not cover, e.g., two widgets.

The phrase “based on” does not mean “based only on”, unless expresslyspecified otherwise. In other words, the phrase “based on” describesboth “based only on” and “based at least on”. The phrase “based at leaston” is equivalent to the phrase “based at least in part on”.

The term “represent” and like terms are not exclusive, unless expresslyspecified otherwise. For example, the term “represents” do not mean“represents only”, unless expressly specified otherwise. In other words,the phrase “the data represents a credit card number” describes both“the data represents only a credit card number” and “the data representsa credit card number and the data also represents something else”.

The term “whereby” is used herein only to precede a clause or other setof words that express only the intended result, objective or consequenceof something that is previously and explicitly recited. Thus, when theterm “whereby” is used in a claim, the clause or other words that theterm “whereby” modifies do not establish specific further limitations ofthe claim or otherwise restricts the meaning or scope of the claim.

The term “e.g.” and like terms mean “for example”, and thus does notlimit the term or phrase it explains. For example, in the sentence “thecomputer sends data (e.g., instructions, a data structure) over theInternet”, the term “e.g.” explains that “instructions” are an exampleof “data” that the computer may send over the Internet, and alsoexplains that “a data structure” is an example of “data” that thecomputer may send over the Internet. However, both “instructions” and “adata structure” are merely examples of “data”, and other things besides“instructions” and “a data structure” can be “data”.

The term “respective” and like terms mean “taken individually”. Thus iftwo or more things have “respective” characteristics, then each suchthing has its own characteristic, and these characteristics can bedifferent from each other but need not be. For example, the phrase “eachof two machines has a respective function” means that the first suchmachine has a function and the second such machine has a function aswell. The function of the first machine may or may not be the same asthe function of the second machine

The term “i.e.” and like terms mean “that is”, and thus limits the termor phrase it explains. For example, in the sentence “the computer sendsdata (i.e., instructions) over the Internet”, the term “i.e.” explainsthat “instructions” are the “data” that the computer sends over theInternet.

Any given numerical range shall include whole and fractions of numberswithin the range. For example, the range “1 to 10” shall be interpretedto specifically include whole numbers between 1 and 10 (e.g., 1, 2, 3,4, . . . 9) and non-whole numbers (e.g., 1.1, 1.2, . . . 1.9).

Where two or more terms or phrases are synonymous (e.g., because of anexplicit statement that the terms or phrases are synonymous), instancesof one such term/phrase does not mean instances of another suchterm/phrase must have a different meaning. For example, where astatement renders the meaning of “including” to be synonymous with“including but not limited to”, the mere usage of the phrase “includingbut not limited to” does not mean that the term “including” meanssomething other than “including but not limited to”.

IV. Disclosed Examples and Terminology are not Limiting

Neither the Title (set forth at the beginning of the first page of thepresent application) nor the Abstract (set forth at the end of thepresent application) is to be taken as limiting in any way as the scopeof the disclosed invention(s). An Abstract has been included in thisapplication merely because an Abstract of not more than 150 words isrequired under 37 C.F.R. §1.72(b).

The title of the present application and headings of sections providedin the present application are for convenience only, and are not to betaken as limiting the disclosure in any way.

Numerous embodiments are described in the present application, and arepresented for illustrative purposes only. The described embodiments arenot, and are not intended to be, limiting in any sense. The presentlydisclosed invention(s) are widely applicable to numerous embodiments, asis readily apparent from the disclosure. One of ordinary skill in theart will recognize that the disclosed invention(s) may be practiced withvarious modifications and alterations, such as structural, logical,software, and electrical modifications. Although particular features ofthe disclosed invention(s) may be described with reference to one ormore particular embodiments and/or drawings, it should be understoodthat such features are not limited to usage in the one or moreparticular embodiments or drawings with reference to which they aredescribed, unless expressly specified otherwise.

No embodiment of method steps or product elements described in thepresent application constitutes the invention claimed herein, or isessential to the invention claimed herein, or is coextensive with theinvention claimed herein, except where it is either expressly stated tobe so in this specification or expressly recited in a claim.

The preambles of the claims that follow recite purposes, benefits andpossible uses of the claimed invention only and do not limit the claimedinvention.

The present disclosure is not a literal description of all embodimentsof the invention(s). Also, the present disclosure is not a listing offeatures of the invention(s) which must be present in all embodiments.

Devices that are described as in communication with each other need notbe in continuous communication with each other, unless expresslyspecified otherwise. On the contrary, such devices need only transmit toeach other as necessary or desirable, and may actually refrain fromexchanging data most of the time. For example, a machine incommunication with another machine via the Internet may not transmitdata to the other machine for long period of time (e.g. weeks at atime). In addition, devices that are in communication with each othermay communicate directly or indirectly through one or moreintermediaries.

A description of an embodiment with several components or features doesnot imply that all or even any of such components/features are required.On the contrary, a variety of optional components are described toillustrate the wide variety of possible embodiments of the presentinvention(s). Unless otherwise specified explicitly, nocomponent/feature is essential or required.

Although process steps, algorithms or the like may be described orclaimed in a particular sequential order, such processes may beconfigured to work in different orders. In other words, any sequence ororder of steps that may be explicitly described or claimed does notnecessarily indicate a requirement that the steps be performed in thatorder. The steps of processes described herein may be performed in anyorder possible. Further, some steps may be performed simultaneouslydespite being described or implied as occurring non-simultaneously(e.g., because one step is described after the other step). Moreover,the illustration of a process by its depiction in a drawing does notimply that the illustrated process is exclusive of other variations andmodifications thereto, does not imply that the illustrated process orany of its steps are necessary to the invention(s), and does not implythat the illustrated process is preferred.

Although a process may be described as including a plurality of steps,that does not imply that all or any of the steps are preferred,essential or required. Various other embodiments within the scope of thedescribed invention(s) include other processes that omit some or all ofthe described steps. Unless otherwise specified explicitly, no step isessential or required.

Although a process may be described singly or without reference to otherproducts or methods, in an embodiment the process may interact withother products or methods. For example, such interaction may includelinking one business model to another business model. Such interactionmay be provided to enhance the flexibility or desirability of theprocess.

Although a product may be described as including a plurality ofcomponents, aspects, qualities, characteristics and/or features, thatdoes not indicate that any or all of the plurality are preferred,essential or required. Various other embodiments within the scope of thedescribed invention(s) include other products that omit some or all ofthe described plurality.

An enumerated list of items (which may or may not be numbered) does notimply that any or all of the items are mutually exclusive, unlessexpressly specified otherwise. Likewise, an enumerated list of items(which may or may not be numbered) does not imply that any or all of theitems are comprehensive of any category, unless expressly specifiedotherwise. For example, the enumerated list “a computer, a laptop, aPDA” does not imply that any or all of the three items of that list aremutually exclusive and does not imply that any or all of the three itemsof that list are comprehensive of any category.

An enumerated list of items (which may or may not be numbered) does notimply that any or all of the items are equivalent to each other orreadily substituted for each other.

All embodiments are illustrative, and do not imply that the invention orany embodiments were made or performed, as the case may be.

V. Computing

It will be readily apparent to one of ordinary skill in the art that thevarious processes described herein may be implemented by, e.g.,appropriately programmed general purpose computers, special purposecomputers and computing devices. Typically a processor (e.g., one ormore microprocessors, one or more microcontrollers, one or more digitalsignal processors) will receive instructions (e.g., from a memory orlike device), and execute those instructions, thereby performing one ormore processes defined by those instructions. Instructions may beembodied in, e.g., one or more computer programs, one or more scripts.

A “processor” means one or more microprocessors, central processingunits (CPUs), computing devices, microcontrollers, digital signalprocessors, or like devices or any combination thereof, regardless ofthe architecture (e.g., chip-level multiprocessing/multi-core, RISC,CISC, Microprocessor without Interlocked Pipeline Stages, pipeliningconfiguration, simultaneous multithreading).

Thus a description of a process is likewise a description of anapparatus for performing the process. The apparatus that performs theprocess can include, e.g., a processor and those input devices andoutput devices that are appropriate to perform the process.

Further, programs that implement such methods (as well as other types ofdata) may be stored and transmitted using a variety of media (e.g.,computer readable media) in a number of manners. In some embodiments,hard-wired circuitry or custom hardware may be used in place of, or incombination with, some or all of the software instructions that canimplement the processes of various embodiments. Thus, variouscombinations of hardware and software may be used instead of softwareonly.

The term “computer-readable medium” refers to any medium, a plurality ofthe same, or a combination of different media, that participate inproviding data (e.g., instructions, data structures) which may be readby a computer, a processor or a like device. Such a medium may take manyforms, including but not limited to, non-volatile media, volatile media,and transmission media. Non-volatile media include, for example, opticalor magnetic disks and other persistent memory. Volatile media includedynamic random access memory (DRAM), which typically constitutes themain memory. Transmission media include coaxial cables, copper wire andfiber optics, including the wires that comprise a system bus coupled tothe processor. Transmission media may include or convey acoustic waves,light waves and electromagnetic emissions, such as those generatedduring radio frequency (RF) and infrared (IR) data communications.Common forms of computer-readable media include, for example, a floppydisk, a flexible disk, hard disk, magnetic tape, any other magneticmedium, a CD-ROM, DVD, any other optical medium, punch cards, papertape, any other physical medium with patterns of holes, a RAM, a PROM,an EPROM, a FLASH-EEPROM, any other memory chip or cartridge, a carrierwave as described hereinafter, or any other medium from which a computercan read.

Various forms of computer readable media may be involved in carryingdata (e.g. sequences of instructions) to a processor. For example, datamay be (i) delivered from RAM to a processor; (ii) carried over awireless transmission medium; (iii) formatted and/or transmittedaccording to numerous formats, standards or protocols, such as Ethernet(or IEEE 802.3), SAP, ATP, Bluetooth□, and TCP/IP, TDMA, CDMA, and 3G;and/or (iv) encrypted to ensure privacy or prevent fraud in any of avariety of ways well known in the art.

Thus a description of a process is likewise a description of acomputer-readable medium storing a program for performing the process.The computer-readable medium can store (in any appropriate format) thoseprogram elements which are appropriate to perform the method.

Just as the description of various steps in a process does not indicatethat all the described steps are required, embodiments of an apparatusinclude a computer/computing device operable to perform some (but notnecessarily all) of the described process.

Likewise, just as the description of various steps in a process does notindicate that all the described steps are required, embodiments of acomputer-readable medium storing a program or data structure include acomputer-readable medium storing a program that, when executed, cancause a processor to perform some (but not necessarily all) of thedescribed process.

Where databases are described, it will be understood by one of ordinaryskill in the art that (i) alternative database structures to thosedescribed may be readily employed, and (ii) other memory structuresbesides databases may be readily employed. Any illustrations ordescriptions of any sample databases presented herein are illustrativearrangements for stored representations of information. Any number ofother arrangements may be employed besides those suggested by, e.g.,tables illustrated in drawings or elsewhere. Similarly, any illustratedentries of the databases represent exemplary information only; one ofordinary skill in the art will understand that the number and content ofthe entries can be different from those described herein. Further,despite any depiction of the databases as tables, other formats(including relational databases, object-based models and/or distributeddatabases) could be used to store and manipulate the data typesdescribed herein. Likewise, object methods or behaviors of a databasecan be used to implement various processes, such as the describedherein. In addition, the databases may, in a known manner, be storedlocally or remotely from a device which accesses data in such adatabase.

Various embodiments can be configured to work in a network environmentincluding a computer that is in communication (e.g., via acommunications network) with one or more devices. The computer maycommunicate with the devices directly or indirectly, via any wired orwireless medium (e.g. the Internet, LAN, WAN or Ethernet, Token Ring, atelephone line, a cable line, a radio channel, an optical communicationsline, commercial on-line service providers, bulletin board systems, asatellite communications link, a combination of any of the above). Eachof the devices may themselves comprise computers or other computingdevices, such as those based on the Intel® Pentium® or Centrino™processor, that are adapted to communicate with the computer. Any numberand type of devices may be in communication with the computer.

In an embodiment, a server computer or centralized authority may not benecessary or desirable. For example, the present invention may, in anembodiment, be practiced on one or more devices without a centralauthority. In such an embodiment, any functions described herein asperformed by the server computer or data described as stored on theserver computer may instead be performed by or stored on one or moresuch devices.

Where a process is described, in an embodiment the process may operatewithout any user intervention. In another embodiment, the processincludes some human intervention (e.g., a step is performed by or withthe assistance of a human).

VI. Continuing Applications

The present disclosure provides, to one of ordinary skill in the art, anenabling description of several embodiments and/or inventions. Some ofthese embodiments and/or inventions may not be claimed in the presentapplication, but may nevertheless be claimed in one or more continuingapplications that claim the benefit of priority of the presentapplication.

Applicants intend to file additional applications to pursue patents forsubject matter that has been disclosed and enabled but not claimed inthe present application.

VII. 35 U.S.C. §112, Paragraph 6

In a claim, a limitation of the claim which includes the phrase “meansfor” or the phrase “step for” means that 35 U.S.C. §112, paragraph 6,applies to that limitation.

In a claim, a limitation of the claim which does not include the phrase“means for” or the phrase “step for” means that 35 U.S.C. §112,paragraph 6 does not apply to that limitation, regardless of whetherthat limitation recites a function without recitation of structure,material or acts for performing that function. For example, in a claim,the mere use of the phrase “step of” or the phrase “steps of” inreferring to one or more steps of the claim or of another claim does notmean that 35 U.S.C. §112, paragraph 6, applies to that step(s).

With respect to a means or a step for performing a specified function inaccordance with 35 U.S.C. §112, paragraph 6, the correspondingstructure, material or acts described in the specification, andequivalents thereof, may perform additional functions as well as thespecified function.

Computers, processors, computing devices and like products arestructures that can perform a wide variety of functions. Such productscan be operable to perform a specified function by executing one or moreprograms, such as a program stored in a memory device of that product orin a memory device which that product accesses. Unless expresslyspecified otherwise, such a program need not be based on any particularalgorithm, such as any particular algorithm that might be disclosed inthe present application. It is well known to one of ordinary skill inthe art that a specified function may be implemented via differentalgorithms, and any of a number of different algorithms would be a meredesign choice for carrying out the specified function.

Therefore, with respect to a means or a step for performing a specifiedfunction in accordance with 35 U.S.C. §112, paragraph 6, structurecorresponding to a specified function includes any product programmed toperform the specified function. Such structure includes programmedproducts which perform the function, regardless of whether such productis programmed with (i) a disclosed algorithm for performing thefunction, (ii) an algorithm that is similar to a disclosed algorithm, or(iii) a different algorithm for performing the function.

Where there is recited a means for performing a function hat is amethod, one structure for performing this method includes a computingdevice (e.g., a general purpose computer) that is programmed and/orconfigured with appropriate hardware to perform that function.

Also includes a computing device (e.g., a general purpose computer) thatis programmed and/or configured with appropriate hardware to performthat function via other algorithms as would be understood by one ofordinary skill in the art.

VIII. Disclaimer

Numerous references to a particular embodiment does not indicate adisclaimer or disavowal of additional, different embodiments, andsimilarly references to the description of embodiments which all includea particular feature does not indicate a disclaimer or disavowal ofembodiments which do not include that particular feature. A cleardisclaimer or disavowal in the present application shall be prefaced bythe phrase “does not include” or by the phrase “cannot perform”.

IX. Incorporation By Reference

Any patent, patent application or other document referred to herein isincorporated by reference into this patent application as part of thepresent disclosure, but only for purposes of written description inaccordance with 35 U.S.C. §112, paragraph 1 and enablement in accordancewith 35 U.S.C. §112, paragraph 1, and should in no way be used to limit,define, or otherwise construe any term of the present application wherethe present application, without such incorporation by reference, wouldnot have failed to provide an ascertainable meaning, but rather wouldhave allowed an ascertainable meaning for such term to be provided.Thus, the person of ordinary skill in the art need not have been in anyway limited by any embodiments provided in the reference

Any incorporation by reference does not, in and of itself, imply anyendorsement of, ratification of or acquiescence in any statements,opinions, arguments or characterizations contained in any incorporatedpatent, patent application or other document, unless explicitlyspecified otherwise in this patent application.

X. Prosecution History

In interpreting the present application (which includes the claims), oneof ordinary skill in the art shall refer to the prosecution history ofthe present application, but not to the prosecution history of any otherpatent or patent application, regardless of whether there are otherpatent applications that are considered related to the presentapplication, and regardless of whether there are other patentapplications that share a claim of priority with the presentapplication.

What is claimed is:
 1. A method comprising: detecting by a receiver afirst signal produced by a device associated with a first person, thedevice comprising a mobile phone, PDA, computer, or mini-computer, thefirst signal being unique to the device associated with the firstperson; detecting by the receiver a second signal produced by a deviceassociated with a second person, the device associated with the secondperson comprising a mobile phone, PDA, computer, or mini-computer, thesecond signal being unique to the device associated with the secondperson and different than the first signal; using a medium, which storesa set of signals each corresponding to a device and a person, to look upan identity of the second person by matching the second signal with oneof the signals stored on the medium; and causing an output device toproduce a third signal which is perceptible to humans, the third signalproduced based on the identity of the second person.
 2. The method ofclaim 1, in which the output device is a display device.
 3. The methodof claim 1, in which the output device is a buzzer.
 4. The method ofclaim 1, in which the output device produces the third signal if theidentity of the second person corresponds to a friend of the firstperson.
 5. The method of claim 1, further comprising: using the mediumto look up an identity of the first person based on the first signal;and producing by an output device a fourth signal which is perceptibleto humans, the fourth signal produced based on the identity of the firstperson.
 6. The method of claim 1, further comprising providing by atleast one server games to the first person and to the second person viathe device associated with the first person and the device associatedwith the second person respectively.
 7. The method of claim 1, furthercomprising providing by at least one server to the first person and tothe second person via the device associated with the first person andthe device associated with the second person respectively at least onegame in which the first and second persons interact with one another. 8.A method comprising: detecting by a receiver a signal produced by adevice associated with a first person, the device comprising a mobilephone, PDA, computer, or mini-computer; associating the signal producedby the device with an identity of the first person; and based on theidentity of the first person, causing another device to display theidentity of the first person.
 9. The method of claim 8, in which theanother device is a mobile phone or PDA.
 10. The method of claim 9, inwhich the another device is associated with a second person, and inwhich the method further comprises providing by at least one servergames to the first person and to the second person via the deviceassociated with the first person and the device associated with thesecond person respectively.
 11. The method of claim 9, in which theanother device is associated with a second person, and in which themethod further comprises providing by at least one server to the firstperson and to the second person via the device associated with the firstperson and the device associated with the second person respectively atleast one game in which the first and second persons interact with oneanother.
 12. The method of claim 8, in which the another device is acomputer.
 13. The method of claim 8, wherein the signal produced by adevice associated with a first person is unique to the device associatedwith the first person.
 14. The method of claim 8, wherein a set ofsignals are stored on a medium with each signal corresponding to adevice and a person, and wherein associating the signal produced by thedevice with an identity of the first person includes matching the signalproduced by the device with one of the signals stored on the medium. 15.A method comprising: detecting by a receiver of a mobile phone or PDAassociated with a first person a signal produced by a mobile phone orPDA associated with a second person; associating by the mobile phone orPDA associated with the first person the signal with an identity of thesecond person; and displaying by the mobile phone or PDA associated withthe first person the identity of the second person.
 16. The method ofclaim 15, comprising displaying by the mobile phone or PDA associatedwith the first person information associated with a game.
 17. The methodof claim 16, in which the game comprises a game in which the first andsecond persons interact with one another.
 18. The method of claim 16,wherein the signal produced by the mobile phone or PDA associated withthe second person is unique to the mobile phone or PDA associated withthe second person.