Conditional biometric access in a gaming environment

ABSTRACT

The present application provides methods and corresponding systems for accessing services in a gaming or other environment based on conditional biometric identity verification. In one aspect, this includes the step or steps of determining a location of a gaming device having a display and at least one biometric sensor associated therewith; prompting a user of the gaming device for at least one item of physical biometric data with the biometric sensor based at least on the location of the gaming device; receiving the at least one item of physical biometric data; and enabling at least one service on the gaming device based on a match between the at least one item of physical biometric data received and at least one authenticated item of physical biometric data associated with the user.

CROSS REFERENCE TO RELATED APPLICATION

This application is a continuation of U.S. patent application Ser. No.11/559,484, entitled “CONDITIONAL BIOMETRIC ACCESS IN A GAMINGENVIRONMENT,” filed Nov. 14, 2006, by Dean Alderucci et al., which ishereby incorporated by reference herein in its entirety.

RELATED APPLICATIONS

The present application may be considered related to the following U.S.patent applications, each of which is incorporated herein by referencein their entirety for the purpose of enablement and written description:Ser. Nos. 11/406,783, filed Apr. 18, 2006; 11/403,722, filed on Apr. 12,2006; 11/397,596, filed on Apr. 3, 2006; 11/335,253, filed on Jan. 18,2006; 11/335,210, filed on Jan. 18, 2006; 11/334,848, filed on Jan. 18,2006; 11/256,568, filed on Oct. 21, 2005; 11/210,482, filed on Aug. 24,2005; 11/201,830, filed on Aug. 10, 2005; 11/201,812, filed on Aug. 10,2005; 11/199,964, filed on Aug. 9, 2005; 11/199,835, filed on Aug. 9,2005; 11/199,831, filed on Aug. 9, 2005; 11/190,613, filed on Jul. 26,2005; 11/172,018, filed on Jun. 29, 2005; 11/171,809, filed on Jun. 29,2005; 11/076,561, filed on Mar. 9, 2005; 11/063,311, filed on Feb. 21,2005; 11/032,724, filed on Jan. 10, 2005; 11/022,394, filed on Dec. 22,2004; 11/021,848, filed on Dec. 22, 2004; 11/018,978, filed on Dec. 21,2004; 10/983,279, filed on Nov. 5, 2004; 10/963,399, filed on Oct. 12,2004; 10/879,972, filed on Jun. 28, 2004; 10/836,999, filed on Apr. 29,2004; 10/836,975, filed on Apr. 29, 2004; 10/836,958, filed on Apr. 29,2004; 10/836,077, filed on Apr. 29, 2004; 10/835,995, filed on Apr. 29,2004; 10/822,484, filed on Apr. 12, 2004; 10/816,238, filed on Apr. 1,2004; 10/798,106, filed on Mar. 10, 2004; 10/784,353, filed on Feb. 23,2004; 10/771,221, filed on Feb. 3, 2004; 10/771,076, filed on Feb. 3,2004; 10/759,693, filed on Jan. 15, 2004; 10/687,302, filed on Oct. 14,2003; 10/667,923, filed on Sep. 22, 2003; 10/667,755, filed on Sep. 22,2003; 10/654,280, filed on Sep. 3, 2003; 10/651,537, filed on Aug. 29,2003; 10/616,779, filed on Jul. 10, 2003; 10/453,769, filed on Jun. 3,2003; 10/453,761, filed on Jun. 3, 2003; 10/410,197, filed on Apr. 10,2003; 10/404,043, filed on Apr. 2, 2003; 10/287,332, filed on Nov. 1,2002; 10/194,358, filed on Jul. 12, 2002; 10/194,186, filed on Jul. 12,2002; 10/194,019, filed on Jul. 12, 2002; 10/194,018, filed on Jul. 12,2002; 10/193,980, filed on Jul. 12, 2002; 10/193,978, filed on Jul. 12,2002; 10/193,977, filed on Jul. 12, 2002; 10/193,971, filed on Jul. 12,2002; 10/193,817, filed on Jul. 12, 2002; 09/846,025, filed on Apr. 30,2001; 09/378,327, filed on Aug. 20, 1999; and 09/267,865, filed on Mar.12, 1999.

BRIEF DESCRIPTION OF THE FIGURES

FIG. 1 illustrates a gaming system according to at least one embodimentof the systems disclosed herein;

FIG. 2 illustrates a gaming system according to at least one embodimentof the systems disclosed herein;

FIG. 3 illustrates a gaming system according to at least one embodimentof the systems disclosed herein; and

FIG. 4 is a flow chart of a method according to at least one embodimentof the methods disclosed herein.

DETAILED DESCRIPTION OF THE INVENTION

The following sections I-X provide a guide to interpreting the presentapplication.

I. Terms

The term “product” means any machine, manufacture and/or composition ofmatter, unless expressly specified otherwise.

The term “process” means any process, algorithm, method or the like,unless expressly specified otherwise.

Each process (whether called a method, algorithm or otherwise)inherently includes one or more steps, and therefore all references to a“step” or “steps” of a process have an inherent antecedent basis in themere recitation of the term ‘process’ or a like term. Accordingly, anyreference in a claim to a ‘step’ or ‘steps’ of a process has sufficientantecedent basis.

The term “invention” and the like mean “the one or more inventionsdisclosed in this application”, unless expressly specified otherwise.

The terms “an embodiment”, “embodiment”, “embodiments”, “theembodiment”, “the embodiments”, “one or more embodiments”, “someembodiments”, “certain embodiments”, “one embodiment”, “anotherembodiment” and the like mean “one or more (but not all) embodiments ofthe disclosed invention(s)”, unless expressly specified otherwise.

The term “variation” of an invention means an embodiment of theinvention, unless expressly specified otherwise.

A reference to “another embodiment” in describing an embodiment does notimply that the referenced embodiment is mutually exclusive with anotherembodiment (e.g., an embodiment described before the referencedembodiment), unless expressly specified otherwise.

The terms “including”, “comprising” and variations thereof mean“including but not limited to”, unless expressly specified otherwise.

The terms “a”, “an” and “the” mean “one or more”, unless expresslyspecified otherwise.

The term “plurality” means “two or more”, unless expressly specifiedotherwise.

The term “herein” means “in the present application, including anythingwhich may be incorporated by reference”, unless expressly specifiedotherwise.

The phrase “at least one of”, when such phrase modifies a plurality ofthings (such as an enumerated list of things) means any combination ofone or more of those things, unless expressly specified otherwise. Forexample, the phrase “at least one of a widget, a car and a wheel” meanseither (i) a widget, (ii) a car, (iii) a wheel, (iv) a widget and a car,(v) a widget and a wheel, (vi) a car and a wheel, or (vii) a widget, acar and a wheel. The phrase “at least one of”, when such phrase modifiesa plurality of things does not mean “one of each of” the plurality ofthings.

Numerical terms such as “one”, “two”, etc. when used as cardinal numbersto indicate quantity of something (e.g., one widget, two widgets), meanthe quantity indicated by that numerical term, but do not mean at leastthe quantity indicated by that numerical term. For example, the phrase“one widget” does not mean “at least one widget”, and therefore thephrase “one widget” does not cover, e.g., two widgets.

The phrase “based on” does not mean “based only on”, unless expresslyspecified otherwise. In other words, the phrase “based on” describesboth “based only on” and “based at least on”. The phrase “based at leaston” is equivalent to the phrase “based at least in part on”.

The term “represent” and like terms are not exclusive, unless expresslyspecified otherwise. For example, the term “represents” do not mean“represents only”, unless expressly specified otherwise. In other words,the phrase “the data represents a credit card number” describes both“the data represents only a credit card number” and “the data representsa credit card number and the data also represents something else”.

The term “whereby” is used herein only to precede a clause or other setof words that express only the intended result, objective or consequenceof something that is previously and explicitly recited. Thus, when theterm “whereby” is used in a claim, the clause or other words that theterm “whereby” modifies do not establish specific further limitations ofthe claim or otherwise restricts the meaning or scope of the claim.

The term “e.g.” and like terms mean “for example”, and thus does notlimit the term or phrase it explains. For example, in the sentence “thecomputer sends data (e.g., instructions, a data structure) over theInternet”, the term “e.g.” explains that “instructions” are an exampleof “data” that the computer may send over the Internet, and alsoexplains that “a data structure” is an example of “data” that thecomputer may send over the Internet. However, both “instructions” and “adata structure” are merely examples of “data”, and other things besides“instructions” and “a data structure” can be “data”.

The term “respective” and like terms mean “taken individually”. Thus iftwo or more things have “respective” characteristics, then each suchthing has its own characteristic, and these characteristics can bedifferent from each other but need not be. For example, the phrase “eachof two machines has a respective function” means that the first suchmachine has a function and the second such machine has a function aswell. The function of the first machine may or may not be the same asthe function of the second machine.

The term “i.e.” and like terms mean “that is”, and thus limits the termor phrase it explains. For example, in the sentence “the computer sendsdata (i.e., instructions) over the Internet”, the term “i.e.” explainsthat “instructions” are the “data” that the computer sends over theInternet.

Any given numerical range shall include whole and fractions of numberswithin the range. For example, the range “1 to 10” shall be interpretedto specifically include whole numbers between 1 and 10 (e.g., 1, 2, 3,4, . . . 9) and non-whole numbers (e.g., 1.1, 1.2, . . . 1.9).

Where two or more terms or phrases are synonymous (e.g., because of anexplicit statement that the terms or phrases are synonymous), instancesof one such term/phrase does not mean instances of another suchterm/phrase must have a different meaning. For example, where astatement renders the meaning of “including” to be synonymous with“including but not limited to”, the mere usage of the phrase “includingbut not limited to” does not mean that the term “including” meanssomething other than “including but not limited to”.

II. Determining

The term “determining” and grammatical variants thereof (e.g., todetermine a price, determining a value, determine an object which meetsa certain criterion) is used in an extremely broad sense. The term“determining” encompasses a wide variety of actions and therefore“determining” can include calculating, computing, processing, deriving,investigating, looking up (e.g., looking up in a table, a database oranother data structure), ascertaining and the like. Also, “determining”can include receiving (e.g., receiving information), accessing (e.g.,accessing data in a memory) and the like. Also, “determining” caninclude resolving, selecting, choosing, establishing, and the like.

The term “determining” does not imply certainty or absolute precision,and therefore “determining” can include estimating, extrapolating,predicting, guessing and the like.

The term “determining” does not imply that mathematical processing mustbe performed, and does not imply that numerical methods must be used,and does not imply that an algorithm or process is used.

The term “determining” does not imply that any particular device must beused. For example, a computer need not necessarily perform thedetermining.

III. Forms of Sentences

Where a limitation of a first claim would cover one of a feature as wellas more than one of a feature (e.g., a limitation such as “at least onewidget” covers one widget as well as more than one widget), and where ina second claim that depends on the first claim, the second claim uses adefinite article “the” to refer to the limitation (e.g., “the widget”),this does not imply that the first claim covers only one of the feature,and this does not imply that the second claim covers only one of thefeature (e.g., “the widget” can cover both one widget and more than onewidget).

When an ordinal number (such as “first”, “second”, “third” and so on) isused as an adjective before a term, that ordinal number is used (unlessexpressly specified otherwise) merely to indicate a particular feature,such as to distinguish that particular feature from another feature thatis described by the same term or by a similar term. For example, a“first widget” may be so named merely to distinguish it from, e.g., a“second widget”. Thus, the mere usage of the ordinal numbers “first” and“second” before the term “widget” does not indicate any otherrelationship between the two widgets, and likewise does not indicate anyother characteristics of either or both widgets. For example, the mereusage of the ordinal numbers “first” and “second” before the term“widget” (1) does not indicate that either widget comes before or afterany other in order or location; (2) does not indicate that either widgetoccurs or acts before or after any other in time; and (3) does notindicate that either widget ranks above or below any other, as inimportance or quality. In addition, the mere usage of ordinal numbersdoes not define a numerical limit to the features identified with theordinal numbers. For example, the mere usage of the ordinal numbers“first” and “second” before the term “widget” does not indicate thatthere must be no more than two widgets.

When a single device, article or other product is described herein, morethan one device/article (whether or not they cooperate) mayalternatively be used in place of the single device/article that isdescribed. Accordingly, the functionality that is described as beingpossessed by a device may alternatively be possessed by more than onedevice/article (whether or not they cooperate).

Similarly, where more than one device, article or other product isdescribed herein (whether or not they cooperate), a singledevice/article may alternatively be used in place of the more than onedevice or article that is described. For example, a plurality ofcomputer-based devices may be substituted with a single computer-baseddevice. Accordingly, the various functionality that is described asbeing possessed by more than one device or article may alternatively bepossessed by a single device/article.

The functionality and/or the features of a single device that isdescribed may be alternatively embodied by one or more other deviceswhich are described but are not explicitly described as having suchfunctionality/features. Thus, other embodiments need not include thedescribed device itself, but rather can include the one or more otherdevices which would, in those other embodiments, have suchfunctionality/features.

IV. Disclosed Examples and Terminology are not Limiting

Neither the Title (set forth at the beginning of the first page of thepresent application) nor the Abstract (set forth at the end of thepresent application) is to be taken as limiting in any way as the scopeof the disclosed invention(s). An Abstract has been included in thisapplication merely because an Abstract of not more than 150 words isrequired under 37 C.F.R. §1.72(b).

The title of the present application and headings of sections providedin the present application are for convenience only, and are not to betaken as limiting the disclosure in any way.

Numerous embodiments are described in the present application, and arepresented for illustrative purposes only. The described embodiments arenot, and are not intended to be, limiting in any sense. The presentlydisclosed invention(s) are widely applicable to numerous embodiments, asis readily apparent from the disclosure. One of ordinary skill in theart will recognize that the disclosed invention(s) may be practiced withvarious modifications and alterations, such as structural, logical,software, and electrical modifications. Although particular features ofthe disclosed invention(s) may be described with reference to one ormore particular embodiments and/or drawings, it should be understoodthat such features are not limited to usage in the one or moreparticular embodiments or drawings with reference to which they aredescribed, unless expressly specified otherwise.

No embodiment of method steps or product elements described in thepresent application constitutes the invention claimed herein, or isessential to the invention claimed herein, or is coextensive with theinvention claimed herein, except where it is either expressly stated tobe so in this specification or expressly recited in a claim.

All words in every claim have the broadest scope of meaning they wouldhave been given by a person of ordinary skill in the art as of thepriority date. No term used in any claim is specially defined or limitedby this application except where expressly so stated either in thisspecification or in a claim.

The preambles of the claims that follow recite purposes, benefits andpossible uses of the claimed invention only and do not limit the claimedinvention.

The present disclosure is not a literal description of all embodimentsof the invention(s). Also, the present disclosure is not a listing offeatures of the invention(s) which must be present in all embodiments.

Devices that are described as in communication with each other need notbe in continuous communication with each other, unless expresslyspecified otherwise. On the contrary, such devices need only transmit toeach other as necessary or desirable, and may actually refrain fromexchanging data most of the time. For example, a machine incommunication with another machine via the Internet may not transmitdata to the other machine for long period of time (e.g. weeks at atime). In addition, devices that are in communication with each othermay communicate directly or indirectly through one or moreintermediaries.

A description of an embodiment with several components or features doesnot imply that all or even any of such components/features are required.On the contrary, a variety of optional components are described toillustrate the wide variety of possible embodiments of the presentinvention(s). Unless otherwise specified explicitly, nocomponent/feature is essential or required.

Although process steps, algorithms or the like may be described orclaimed in a particular sequential order, such processes may beconfigured to work in different orders. In other words, any sequence ororder of steps that may be explicitly described or claimed does notnecessarily indicate a requirement that the steps be performed in thatorder. The steps of processes described herein may be performed in anyorder possible. Further, some steps may be performed simultaneouslydespite being described or implied as occurring non-simultaneously(e.g., because one step is described after the other step). Moreover,the illustration of a process by its depiction in a drawing does notimply that the illustrated process is exclusive of other variations andmodifications thereto, does not imply that the illustrated process orany of its steps are necessary to the invention(s), and does not implythat the illustrated process is preferred.

Although a process may be described as including a plurality of steps,that does not imply that all or any of the steps are preferred,essential or required. Various other embodiments within the scope of thedescribed invention(s) include other processes that omit some or all ofthe described steps. Unless otherwise specified explicitly, no step isessential or required.

Although a process may be described singly or without reference to otherproducts or methods, in an embodiment the process may interact withother products or methods. For example, such interaction may includelinking one business model to another business model. Such interactionmay be provided to enhance the flexibility or desirability of theprocess.

Although a product may be described as including a plurality ofcomponents, aspects, qualities, characteristics and/or features, thatdoes not indicate that any or all of the plurality are preferred,essential or required. Various other embodiments within the scope of thedescribed invention(s) include other products that omit some or all ofthe described plurality.

An enumerated list of items (which may or may not be numbered) does notimply that any or all of the items are mutually exclusive, unlessexpressly specified otherwise. Likewise, an enumerated list of items(which may or may not be numbered) does not imply that any or all of theitems are comprehensive of any category, unless expressly specifiedotherwise. For example, the enumerated list “a computer, a laptop, aPDA” does not imply that any or all of the three items of that list aremutually exclusive and does not imply that any or all of the three itemsof that list are comprehensive of any category.

An enumerated list of items (which may or may not be numbered) does notimply that any or all of the items are equivalent to each other orreadily substituted for each other.

All embodiments are illustrative, and do not imply that the invention orany embodiments were made or performed, as the case may be.

V. Computing

It will be readily apparent to one of ordinary skill in the art that thevarious processes described herein may be implemented by, e.g.,appropriately programmed general purpose computers, special purposecomputers and computing devices. Typically a processor (e.g., one ormore microprocessors, one or more microcontrollers, one or more digitalsignal processors) will receive instructions (e.g., from a memory orlike device), and execute those instructions, thereby performing one ormore processes defined by those instructions. Instructions may beembodied in, e.g., a computer program.

A “processor” means one or more microprocessors, central processingunits (CPUs), computing devices, microcontrollers, digital signalprocessors, or like devices or any combination thereof.

Thus a description of a process is likewise a description of anapparatus for performing the process. The apparatus that performs theprocess can include, e.g., a processor and those input devices andoutput devices that are appropriate to perform the process.

Further, programs that implement such methods (as well as other types ofdata) may be stored and transmitted using a variety of media (e.g.,computer readable media) in a number of manners. In some embodiments,hard-wired circuitry or custom hardware may be used in place of, or incombination with, some or all of the software instructions that canimplement the processes of various embodiments. Thus, variouscombinations of hardware and software may be used instead of softwareonly.

The term “computer-readable medium” refers to any medium, a plurality ofthe same, or a combination of different media, that participate inproviding data (e.g., instructions, data structures) which may be readby a computer, a processor or a like device. Such a medium may take manyforms, including but not limited to, non-volatile media, volatile media,and transmission media. Non-volatile media include, for example, opticalor magnetic disks and other persistent memory. Volatile media includedynamic random access memory (DRAM), which typically constitutes themain memory. Transmission media include coaxial cables, copper wire andfiber optics, including the wires that comprise a system bus coupled tothe processor. Transmission media may include or convey acoustic waves,light waves and electromagnetic emissions, such as those generatedduring radio frequency (RF) and infrared (IR) data communications.Common forms of computer-readable media include, for example, a floppydisk, a flexible disk, hard disk, magnetic tape, any other magneticmedium, a CD-ROM, DVD, any other optical medium, punch cards, papertape, any other physical medium with patterns of holes, a RAM, a PROM,an EPROM, a FLASH-EEPROM, any other memory chip or cartridge, a carrierwave as described hereinafter, or any other medium from which a computercan read.

Various forms of computer readable media may be involved in carryingdata (e.g. sequences of instructions) to a processor. For example, datamay be (i) delivered from RAM to a processor; (ii) carried over awireless transmission medium; (iii) formatted and/or transmittedaccording to numerous formats, standards or protocols, such as Ethernet(or IEEE 802.3), SAP, ATP, Bluetooth™ and TCP/IP, TDMA, CDMA, and 3G;and/or (iv) encrypted to ensure privacy or prevent fraud in any of avariety of ways well known in the art.

Thus a description of a process is likewise a description of acomputer-readable medium storing a program for performing the process.The computer-readable medium can store (in any appropriate format) thoseprogram elements which are appropriate to perform the method.

Just as the description of various steps in a process does not indicatethat all the described steps are required, embodiments of an apparatusinclude a computer/computing device operable to perform some (but notnecessarily all) of the described process.

Likewise, just as the description of various steps in a process does notindicate that all the described steps are required, embodiments of acomputer-readable medium storing a program or data structure include acomputer-readable medium storing a program that, when executed, cancause a processor to perform some (but not necessarily all) of thedescribed process.

Where databases are described, it will be understood by one of ordinaryskill in the art that (i) alternative database structures to thosedescribed may be readily employed, and (ii) other memory structuresbesides databases may be readily employed. Any illustrations ordescriptions of any sample databases presented herein are illustrativearrangements for stored representations of information. Any number ofother arrangements may be employed besides those suggested by, e.g.,tables illustrated in drawings or elsewhere. Similarly, any illustratedentries of the databases represent exemplary information only; one ofordinary skill in the art will understand that the number and content ofthe entries can be different from those described herein. Further,despite any depiction of the databases as tables, other formats(including relational databases, object-based models and/or distributeddatabases) could be used to store and manipulate the data typesdescribed herein. Likewise, object methods or behaviors of a databasecan be used to implement various processes, such as the describedherein. In addition, the databases may, in a known manner, be storedlocally or remotely from a device which accesses data in such adatabase.

Various embodiments can be configured to work in a network environmentincluding a computer that is in communication (e.g., via acommunications network) with one or more devices. The computer maycommunicate with the devices directly or indirectly, via any wired orwireless medium (e.g. the Internet, LAN, WAN or Ethernet, Token Ring, atelephone line, a cable line, a radio channel, an optical communicationsline, commercial on-line service providers, bulletin board systems, asatellite communications link, a combination of any of the above). Eachof the devices may themselves comprise computers or other computingdevices, such as those based on the Intel® Pentium® or Centrino™processor, that are adapted to communicate with the computer. Any numberand type of devices may be in communication with the computer.

In an embodiment, a server computer or centralized authority may not benecessary or desirable. For example, the present invention may, in anembodiment, be practiced on one or more devices without a centralauthority. In such an embodiment, any functions described herein asperformed by the server computer or data described as stored on theserver computer may instead be performed by or stored on one or moresuch devices.

Where a process is described, in an embodiment the process may operatewithout any user intervention. In another embodiment, the processincludes some human intervention (e.g., a step is performed by or withthe assistance of a human).

VI. Continuing Applications

The present disclosure provides, to one of ordinary skill in the art, anenabling description of several embodiments and/or inventions. Some ofthese embodiments and/or inventions may not be claimed in the presentapplication, but may nevertheless be claimed in one or more continuingapplications that claim the benefit of priority of the presentapplication.

Applicants intend to file additional applications to pursue patents forsubject matter that has been disclosed and enabled but not claimed inthe present application.

VII. 35 U.S.C. §112, Paragraph 6

In a claim, a limitation of the claim which includes the phrase “meansfor” or the phrase “step for” means that 35 U.S.C. §112, paragraph 6,applies to that limitation.

In a claim, a limitation of the claim which does not include the phrase“means for” or the phrase “step for” means that 35 U.S.C. §112,paragraph 6 does not apply to that limitation, regardless of whetherthat limitation recites a function without recitation of structure,material or acts for performing that function. For example, in a claim,the mere use of the phrase “step of” or the phrase “steps of” inreferring to one or more steps of the claim or of another claim does notmean that 35 U.S.C. §112, paragraph 6, applies to that step(s).

With respect to a means or a step for performing a specified function inaccordance with 35 U.S.C. §112, paragraph 6, the correspondingstructure, material or acts described in the specification, andequivalents thereof, may perform additional functions as well as thespecified function.

Computers, processors, computing devices and like products arestructures that can perform a wide variety of functions. Such productscan be operable to perform a specified function by executing one or moreprograms, such as a program stored in a memory device of that product orin a memory device which that product accesses. Unless expresslyspecified otherwise, such a program need not be based on any particularalgorithm, such as any particular algorithm that might be disclosed inthe present application. It is well known to one of ordinary skill inthe art that a specified function may be implemented via differentalgorithms, and any of a number of different algorithms would be a meredesign choice for carrying out the specified function.

Therefore, with respect to a means or a step for performing a specifiedfunction in accordance with 35 U.S.C. §112, paragraph 6, structurecorresponding to a specified function includes any product programmed toperform the specified function. Such structure includes programmedproducts which perform the function, regardless of whether such productis programmed with (i) a disclosed algorithm for performing thefunction, (ii) an algorithm that is similar to a disclosed algorithm, or(iii) a different algorithm for performing the function.

Where there is recited a means for performing a function hat is amethod, one structure for performing this method includes a computingdevice (e.g., a general purpose computer) that is programmed and/orconfigured with appropriate hardware to perform that function.

Also includes a computing device (e.g., a general purpose computer) thatis programmed and/or configured with appropriate hardware to performthat function via other algorithms as would be understood by one ofordinary skill in the art.

VIII. Disclaimer

Numerous references to a particular embodiment does not indicate adisclaimer or disavowal of additional, different embodiments, andsimilarly references to the description of embodiments which all includea particular feature does not indicate a disclaimer or disavowal ofembodiments which do not include that particular feature. A cleardisclaimer or disavowal in the present application shall be prefaced bythe phrase “does not include” or by the phrase “cannot perform”.

IX. Incorporation By Reference

Any patent, patent application or other document referred to herein isincorporated by reference into this patent application as part of thepresent disclosure, but only for purposes of written description inaccordance with 35 U.S.C. §112, paragraph 1 and enablement in accordancewith 35 U.S.C. §112, paragraph 1, and should in no way be used to limit,define, or otherwise construe any term of the present application wherethe present application, without such incorporation by reference, wouldnot have failed to provide an ascertainable meaning, but rather wouldhave allowed an ascertainable meaning for such term to be provided.Thus, the person of ordinary skill in the art need not have been in anyway limited by any embodiments provided in the reference

Any incorporation by reference does not, in and of itself, imply anyendorsement of, ratification of or acquiescence in any statements,opinions, arguments or characterizations contained in any incorporatedpatent, patent application or other document, unless explicitlyspecified otherwise in this patent application.

X. Prosecution History

In interpreting the present application (which includes the claims), oneof ordinary skill in the art shall refer to the prosecution history ofthe present application, but not to the prosecution history of any otherpatent or patent application, regardless of whether there are otherpatent applications that are considered related to the presentapplication, and regardless of whether there are other patentapplications that share a claim of priority with the presentapplication.

XI. Overview of Various Embodiments

The present application provides methods and corresponding systems foraccessing services in a gaming or other environment based on conditionalbiometric identity verification. In one aspect, methods are providedthat include the step or steps of determining a location of a gamingdevice having a display and at least one biometric sensor associatedtherewith; prompting a user of the gaming device for at least one itemof physical biometric data with the biometric sensor based at least onthe location of the gaming device; receiving the at least one item ofphysical biometric data; enabling at least one service on the gamingdevice based on a match between the at least one item of physicalbiometric data received and at least one authenticated item of physicalbiometric data associated with the user, the at least one servicecomprising a wager-type game; and displaying an interface screencomprising graphic objects associated with the wager-type game and atleast one selectable element for the user to submit a gaming command anda wagering command during game play.

Referring to FIG. 1, a gaming system 100 according to at least oneembodiment of the systems disclosed herein includes at least onecomputing device, such as a remote computer 118, e.g., a servercomputer, a gaming device 113, or a combination thereof, which mayreside in whole or in part within the domain of a gaming serviceprovider 120. The gaming provider 120 may be the proprietor of a casinoand the gaming system 100 may be physically within the geographicboundaries of the casino. Alternatively, the computing device, e.g., theremote computer 118 and/or the gaming device 113, may be the remote fromthe casino. As such, the gaming system 100 may allow users to engage ingaming services and access the other services disclosed herein fromremote and/or mobile locations relative to the gaming service provider120 or relative to the casino.

The computing device generally includes at least one processor 102, anda memory 104, such as ROM, RAM, FLASH, etc., or any computer readablemedium 106, such as a hard drive, a flash-drive, an optical or magneticdisk, etc. The memory 104 or computer readable medium 106 preferablyincludes software stored thereon that when executed performs one or moresteps of the methods disclosed herein, including communicating data backand forth between devices, displaying interface screens, etc. Thecomputing device may also be associated with or have access to one ormore databases for retrieving and storing the various types of datadiscussed herein, including identity verification data, such as an IDand password, physical biometric data, etc., user continuity data, suchas behavioral biometric data, proficiency data, player pattern data,etc., and user profile data, such as the user's names, identificationnumber, address, credit or debit card data, account balances, userpreferences, device preferences, etc.

In one embodiment, the system 100 includes a plurality of computingdevice, such as a remote computer 118 coupled to at least one gamingdevice 113 over a communication network 116, which are generallyconfigured or otherwise capable of transmitting and/or receivingcommunications to and/or from each other. The term remote in thiscontext merely means that the remote computer 118 and the gaming deviceare separate from each other. Thus, the devices may be remote even ifthe devices are located within the same room. As such, the gaming device113 is preferably configured or otherwise capable of transmitting and/orreceiving communications to and/or from the remote computer 118. Thismay be accomplished with a communication element 124, such as a modem,an Ethernet interface, a transmitter/receiver, etc., that enablescommunication with a similarly equipped remote computer 118, wirelessly,wired, or a combination thereof. It is understood that the relativefunctionality described herein may be provided by the remote computer118, by the gaming device 113, or both, and is thus not limited to anyone implementation discussed herein.

The gaming devices 113 may include, without limitation, a mobile phone,PDA, pocket PC, personal computer, as well as any special or generalpurpose gaming device, such as a slot machine, a video poker machine,video or computer-based versions of table games, e.g., roulette,blackjack, etc. As such, the gaming device 113 preferably includes aprocessor 122, a memory 123, a display 125, such as a CRT or an LCDmonitor, for displaying information and/or graphics associated with theservices provided by the gaming system 100, and at least one inputdevice, such as a mouse, a touch-sensitive pad, a pointer, a stylus, atrackball, a button, e.g., alphanumeric, a scroll wheel, atouch-sensitive monitor, etc., or a combination thereof, for users toenter commands and/or information relevant to the gaming systemservices. With the general purpose type gaming devices 113, such as thePC or PDA, users may access the services provided by the gaming system100, e.g., the remote computer 118, with a browser or any other genericapplication, or with special purpose software designed specifically foraccessing and providing the services disclosed herein.

In at least one embodiment, the gaming device 113 includes or isotherwise associated with at least one biometric sensor 120. Thebiometric sensor 120 is any device that is used to determine directlyfrom the user at least one item of biometric data associated with auser, such as a fingerprint reader, an iris scanner, a retinal scanner,a vascular pattern reader, a facial recognition camera, etc. Thebiometric sensor 120 may be embodied in hardware, software, or acombination thereof. The biometric sensor 120 may further shareresources with other components of the gaming device 113, such as theprocessor 122, memory 123, a camera, a microphone, a speaker, etc. Asingle biometric sensor 120 may be used for reading more than one typeof biometric data. For example, a digital camera may be used to obtainan image of the user's eye for iris scanning and an image of the user'sface for facial recognition. In this instance, a single image capture ofthe user's face may provide the data for facial recognition as well asdata for iris or retinal comparisons. The biometric data is generallyobtained with the biometric sensor 120 and used at least to verify theidentity of the user as a gateway for allowing the user to access theservices provided with the gaming device 113 and/or the remote computer118. In this regard, biometric data may be compared with previouslyobtained/stored physical biometric data that has preferably beenauthenticated as being associated with a particular authorized user, andaccess to the gaming system's services may be provided based on apositive match thereof.

In addition to the physical biometrics discussed above, the biometricsensor 120 may also obtain behavioral biometric data, such as bloodpressure, heart or pulse rate, body temperature data, speech,handwriting, keystrokes, body movements, etc. The behavioral biometricdata may be analyzed to determine whether there has been a user changeor otherwise verify that there has not been a break in user continuityat any time following verification of a user's identify followinginitial validation with, e.g., the physical biometric data, or ID andpassword. For example, a user's identity may be verified with afingerprint reader and access may be provided thereafter to the servicesprovided by the gaming system 100, e.g., for a predetermined period oftime or until some predetermined event, such as the gaming device 113being turned off, the device 113 being moved outside an approved gamingarea, etc. The gaming system 100 may thereafter monitor behavioralbiometric data with the device and prompt the user for physicalbiometric data or other identity verification data if it is determinedfrom the behavioral data collected following identity verification thatthere may have been a change in the users of the device. For example,the user's heart rate or body temperature may be monitored followinginitial verification to determine if there are any changes in the datastream, e.g., in consecutive data readings, that may be attributed to achange in users, such as a sudden change in heart rate or temperature(either lower or higher) in a relatively short amount of time, e.g., in5 seconds or less, or a break in the data, e.g., a null reading for oneor more consecutive data readings, or a combination thereof.

The behavioral biometric data collected may be analyzed for anyrecognizable pattern that may indicate a user change. The data collectedmay be analyzed without reference to data collected previously, e.g.prior to the initial or an immediately preceding identity verification,or based on historic biometric data, e.g., data collected prior to theinitial or the immediately preceding identity verification, forparticular individuals or for a group of individuals. For example, aheart rate reading either above or below an average heart rate computedbased on historic data for an authorized user may trigger the system 100to prompt the user for identity verification data, such as for a user IDand password, or physical biometric data. A heart rate reading followinga null reading in the data stream that is either below or above a heartrate reading before the break in the data stream may also trigger theprompt for identity verification data. Similarly, different peak heartrates in general or keyed to specific gaming events, such as at the timethe user places a bet, wins or loses a wager, etc., may also trigger theprompt for identity verification data in order for the user to continueusing the services of the system 100. The biometric data forestablishing the data stream may be obtained repeatedly, such ascontinuously, cyclically, periodically, e.g., every second, minute, etc.

Pattern recognition may be applied to user continuity data other thanbehavioral biometric data, including data indicative of a user'sproficiency with the system and/or the services provided by the system.For example the system may track the keystroke rate of a user in generalor for particular services, e.g., games, and determine if the keystrokerate of a user following identity verification differs from thekeystroke data obtained within the betting session followingverification or from data obtained prior to the verification. Otherproficiency data may be tracked to determine if there may have been achange in the user of the system 100, such as the rate at which the usernavigates through the menus, false selections of menus or menu items,etc. Keystroke data may be mapped or certain events, such as wins orlosses, as a measure for reducing false positives as a result ofdifferent keystroke rates that may be attributed to user nervousness. Inany event, a prompt for identity verification data may also be triggeredbased on a determination that there may have been a change in the userbased on the proficiency data collected.

The gaming system 100 may also verify user continuity by tracking theplaying pattern of a user and prompting the user for identityverification data based on gaming commands or requests that deviate orare inconsistent from the playing pattern associated with the user. Forexample, if the user has a pattern of never having wagered more than$100 on any particular game, the system 100 may prompt the user forverification data, such as physical biometric data, if the user makes awager of $500 or any appreciable amount above the highest wager, such as5% or greater than the highest wager. Similarly, the system 100 maytrack the user's response to wins or losses and prompt the user foridentity verification data on any deviation therefrom. For example, auser may establish a pattern of placing a higher wager on every win andlowering the wager on a loss. The system 100 may, upon comparing playingpattern data obtained previously and current playing pattern data anddetermining therefrom that a wager deviates from the pattern of wagersfor the particular authorized user, prompt the user for identityverification data before the user is allowed to continue accessing theservices provided by the system 100. Continuity may also be tracked withan authentication device as discussed below.

The system 100 may track the user continuity data, e.g., behavioralbiometric, proficiency, playing pattern, as well as any other variabletype data obtained from users for a sufficient amount of time to collecta data set for the comparisons discussed above. The amount of data inthe data set for the comparison will generally vary based on the type ofdata and the desired sample set for the comparison. For example, indetermining whether there may have been a user change based on a changein consecutive data readings, such as when there is a break in the datastream, the amount of data necessary for the comparison generallyincludes two consecutive readings: a first reading followed by a secondreading having an appreciable value, e.g., 5% or greater, above or belowthe first reading. Similarly, when the comparison is based on historicdata, the amount of data necessary for the comparison includes at leasttwo non-consecutive readings: a first reading at a time to classify thedata as historic data, e.g., prior to the then current physicalbiometric identity verification, and a second more recent reading, e.g.,after the then current physical biometric identity verification, havingan appreciable value above or below the first reading. It can beappreciated that a larger data set, in certain instances, may yieldgreater accuracy or less false prompts for additional data (falsepositives). For example, comparison of a current reading with, e.g., theaverage of 5 prior readings, may result in less false positives in thatthe average value will tend to diminish the impact of noise in the dataset for the comparison. Alternatively or additionally, the system 100may filter noise from the data set for the comparison. The system 100may, for example, filter improbable data, such as temperature readingsless 90 degrees F. and greater than 110 degrees F., heart rates lessthan 40 bpm and greater than 180 bpm, etc.

In one embodiment, the system 100 triggers the prompt for identityverification data based at least on a configurable level of confidenceassociated with the comparison. The level of confidence may be set,e.g., by a system administrator or by the user. The level of confidencemay be set in any manner including by adjusting variables that factorinto the confidence or the probability of a false positive or negative,as the case may be, such as the difference between the data that willtrigger the prompt for identity verification data, the amount of data inthe data set used for the comparison, the filters used to filter noisefrom the data set for the comparison, etc.

In one embodiment, the system 100 tracks data indicative of a falsepositive, which may be used as a basis for adjusting variablesassociated with the data set, the data set filters, the differencebetween the data that triggers the prompt, etc., and/or algorithms usedto trigger the prompt for identity verification data. False positivedata generally includes a positive verification of the user's identityin response to a prompt for identity verification data following atrigger. The data indicative of the false positive may further includethe amount of time between the prompt and the positive verification, orany other data which may indicate that the positive verification of theuser's identity is attributed to a user change back to the authorizeduser, including the data believed to be suspect.

The data resulting in a false positive, prompting the user for identityverification data, may further be input into a neural network whichadjusts the variables associated with the data set, the data set filter,algorithms, etc. accordingly. Similarly, data indicative of truepositives may also be input into the neural network. The neural networkmay be trained using supervised, unsupervised learning, and reinforcedlearning techniques, or a combination thereof. With supervisedtechniques, the neural network is supplied sets of example pairs, e.g.,data reading(s) and an indication of the data reading(s) is/are false ortrue positive, and the neural network infers a mapping implied by thedata. With unsupervised techniques, the neural network is supplied withdata and the neural network derives therefrom a mapping without the aidof the false or true positive indications, such as based on statisticalmodeling, filtering, blind source separation, clustering, etc. Withreinforcement learning, the data is derived generally from interactionswithin the system and observations made therefrom. In addition to thedata resulting in a false positive, any of the data discussed herein maybe supplied to the neural network to adjust the size of the data set,vary the data set filter values, the difference between the readingsthat trigger the prompt, etc., as the case may be, to achieve a desiredconfidence, such as greater than 85% or greater accuracy. Alternativelyor additionally, the data resulting in a false positive maybe fed into asupport vector machine, which classifies the data using a supervisedmachine learning technique. Image type data may further be preprocessedprior to being introduced into the neural network or the support vectormachine to create an abstract representation of the image that isdimensionally smaller than the image data. Preprocessing may beperformed using statistical techniques, such linear discriminantanalysis techniques.

The system 100 may detect various types of errors and may furthercategorize the types of errors in one of a plurality of categories, suchas a type I error, a type II error, etc. The categories may be derivedbased on the severity of the error or any other characterization scheme.For example, a false identity verification with physical biometric datamay be classified as a type I error which has greater weight than afalse identity verification with behavioral biometric data classified asa type II error. The manner in which the system 100 responds to errorsmay be class dependent. In this respect, the system 100 may favorcertain classes of errors and respond, e.g., aggressively or favorably,based on the class of the error. For example, the system may block allaccess with type I errors while providing continued access for type IIerrors until a configurable tolerance has been crossed. For instance,continued access may be provided until a certain number of type IIerrors have been registered, e.g., 3 or more type II errors. In thisrespect, type II errors favor permitting rather than excluding game playin comparison to type I errors. The classification and the thresholdmaybe be either administrator or user configurable. Additionally, usersmay be limited to only configuring the classification of certain errorsand thresholds more restrictively. For example, users may be limited toonly adding default type II errors into type I error class with a moreaggressive response that type II errors. Similarly, the userconfiguration with regard to the threshold may be limited to onlyreducing the threshold, e.g., to 2 instead of 3 type II errors, beforeaccesses is blocked. All user configurations may be stored in a userprofile in one or more databases associated with the gaming system 100.The thresholds and/or classifications may be location specific. Forexample, the thresholds for certain types of errors while in a hotelrestaurant may be relaxed to account for the user engaging in otheractivity, such as eating.

The gaming system 100 may provide users with access to various types ofservices including one or more of a plurality of different types ofgames, e.g., card games; slot-machine style games; craps; othercasino-style games; table games, such as poker, craps, roulette,blackjack, baccarat, etc.; the wheel of fortune game; keno; sportsbetting; horse, dog, or auto racing; jai alai; lottery-type games,including video versions of scratch off lotteries. The system 100 mayprovide game play based on the outcome of any type of event, such assporting events and athletic competitions, including football,basketball, baseball, golf, etc., and non-sporting events, such as onthe movement in particular financial markets, indexes, or securities,political elections, entertainment industry awards, box officeperformance of movies, weather events, etc. The games may be providedboth with and without wagering, or with simulated wagering using pointsthat may be traded in for prizes. The gaming system 100 may also providenon-gaming services, e.g., on the gaming device 113, such as audio andvideo entertainment, news, messaging, telephone, IP telephony, etc.

The gaming system 100 may be implemented over any type of communicationsnetwork 116, such as a local area network (LAN), a wide area network(WAN), the Internet, a telephone network (POTS), a wireless network,including cellular, WiFi, and WiMax networks, or a combination of wiredand/or wireless networks. The communications network 116 may be entirelyindependent of the Internet. The system 100 may alternatively limit theinformation transmitted over the Internet to that with little or nosecurity risk, or that which has been encrypted.

As noted above, the gaming system 100 may, in certain embodiments, allowusers to access services provided by the system from one or more of aplurality of remote locations. The system 100 may also allow users toaccess the services of the system 100 with the device 113 while mobileor transient. For example, the gaming system 100 may allow users toaccess services in any location within a service area 148, such aswithin the vicinity of a hotel. Service area 148 may further be brokendown into a plurality of sub-areas 140, 146, such as the casino of ahotel vs. general occupancy areas, e.g., the lobby, the pool, the gym,etc. The service area 148, in the broadest sense, includes any locationwithin the communication capability of the system 100. Thus, servicearea 148 for services provided over the Internet includes any locationwith access to the Internet. Similarly, service area 148 for servicesprovided by wireless communication includes any locations within thetransmission range of the transmitter and/or reception range of thereceiver. The service area 148 may be limited artificially by the systemprovider and/or the user within certain geographic boundaries. Forexample, the system provider may limit the service area to within one ormore states, cities, municipalities, hotels in a city or municipality,areas within the hotel, such as the casino area, etc., or a combinationthereof. Thus, the system 100 may provide services to users in adisjointed area 140, as shown in FIG. 1, where the service providerprovides services in one state, such as Nevada, and one or more citiesin another state, such as in Atlantic City, N.J., or in any one or morehotels within a city. User defined location access limits may be storedin a user profile in a database associated with the system 100.

Accordingly, in one embodiment, the system 100 has a locationverification feature, which is discussed below in greater detail. Thelocation verification feature may be used to permit or block users fromaccessing the services provided by the system 100 based on theparticular location of, e.g., the gaming device 113. For example,services may be enabled when it is determined that the location of thegaming device 113 is within a pre-defined area 140, such as within thearea of a hotel that provides the services disclosed herein, or disabledwhen the device 113 is moved to a location outside of the area 140. Thelocation verification feature may also be used to disable fewer than allof the services of the gaming system 100 based on the location of thedevice 113. For example, the system 100 may limit wager-type gaming toareas where such gaming is permitted by law, such as to the casino areaof a hotel, whereas non-wagering services, such as messaging, may beenabled irrespective of the location of the device 113. Particularservices may also be enabled or disabled by the provider and/or the userbased on the location of the device. For example, the user may beallowed to disable non-wagering services, such as messaging, when theuser is within the wagering area, such as the casino, and/or duringcertain events, such as when the user is engaged in game play. As withthe classification and threshold limitations discussed above, the usermay only be allowed to specify more restrictive service limitations andthus may not be able to override certain limitations imposed by theservice provider. For example, the user may not be allowed to enablewager-type gaming in areas where that type of gaming is has beendisabled by the service provider. The user defined service limitationsmay be stored in a user profile in a database associated with the system100.

In one embodiment, the gaming system 100 provides services in at leasttwo areas 140, 146 each of the areas having a different level ofsurveillance than the other. The level of surveillance may be quantifiedbased on any scheme indicative of the effectiveness with regard todetermining whether an authorized user is in fact using the gamingsystem 100 or that the gaming system 100 is being used properly. Thelevel may be established based on the number of measures implemented inthis regard. For example, the level of surveillance for an area usingface recognition and human surveillance may be deemed greater than anarea with only fingerprint scanning. Alternatively or additionally,certain measures may be given greater weight, e.g., based on thereliability of the measure. For example, a fingerprint scan may have agreater reliability or accuracy in verifying the identity of a user thanan iris scan. The weight of a particular measure may be independent ofits reliability and may simply be based on a subjective confidence inthe measure, e.g. of the user or the service provider, relative to othermeasures. The surveillance level may have nominal designationsindicative of overall effectiveness and/or confidence. For example, thelevel of an area may be classified as being A, B, C, . . . , Z; low,medium, high, or as a Type I, II, III, . . . . The surveillance levelmay also be distinguished using finer nominal designations, such as 0%to 100% in increments of 1, 0.1, 0.01, . . . .

In one embodiment, the system 100 provides access based on thesurveillance level of the area the gaming system 100 is being accessedfrom, e.g., the location of the gaming device 113. That is, surveillancebased access may allow access to one or more services if there is asufficient level of surveillance, defined by either the system providerand/or the user. In this respect, surveillance based access may beimplemented in any one of a number of ways. The system may, forinstance, provide wager-type gaming services only if the level ofsecurity associated with the access area satisfies a minimum level. Forexample, a user may limit wager-type gaming with system 100 to areashaving no less that a type I surveillance level, such as a casino. Thus,wager-type gaming will be disabled in type II surveillance level or lessareas, such as hotel common areas, e.g., the pool, the hotel lobby, andnon-common areas, such as hotel rooms.

In one embodiment, the system 100 supplements the surveillance of thearea with surveillance measures available with the system 100 to achievethe desired surveillance level. Further to the previous example, thesystem 100 may increase the surveillance level of type II areas to typeI for wager-type gaming by prompting the user for identity verificationdata and/or collect user continuity data thereby adding to thesurveillance level of type II areas sufficient to classify the area withthe combined area and device surveillance measures as a type I orbetter. Thus, the system 100 may allow the user to access services inhigher surveillance areas, such as casinos, without biometric data whilerequiring biometric data with the device in areas with lessersurveillance, such as the hotel courtyard. Surveillance based accesslimitations may be stored in a user profile in a database associatedwith the system 100.

As can be appreciated from the present disclosure, the system 100 maymaintain a plurality of different types of data, such as physicalbiometric data, behavioral biometric data, proficiency data, playingpattern data, etc., for identity verification purposes for eachauthorized user. The system 100 preferably verifies the identity of auser before allowing the user to access at least one of the servicesprovided therewith. In this respect, the system may require that theuser submit at least one item of identity verification data, such as anID and password combination, or any one of the physical biometric dataitems discussed herein, etc. The system may further require from theuser at least one additional item of identity verification data forsystem access. In this respect, the system maintains at least one itemof redundant verification data. The requirement for additionalverification data may be implemented in certain but not all instances.For example, additional verification data may be required in certainareas of a hotel, such as those with lesser surveillance or reliabilityas discussed above. In these areas, the system 100 may prompt the userfor a first and a second item of verification data, such as at least twoof: a facial image, an iris scan, a retinal scan, a fingerprint scan, avascular pattern scan, etc., before allowing the user to access thesystem services. The surveillance level or reliability associated witheach of the measures may be added to achieve a desired surveillancelevel or reliability as indicated above.

The user may generally customize any of the aspects of the servicesprovided by the system 100 or any other customizable aspect of thesystem 100, including classification and threshold configurations, andservice, location, and surveillance based access limits In certaininstances, customization generally allows users to vary the level ofsecurity, e.g., above a minimum set by a service provider, to a levelbased on the user's comfort level and/or the location where services arebeing accessed. For example, if the user only intends to access thesystem 100, e.g., the gaming device 113, at a particular casino, theuser may configure the system 100 to require biometric data at any timethe gaming device is used at a off the premises of the particularcasino, e.g., at another casino. This feature may be used to prevent asituation where a thief steals the gaming device 113 and attempts toaccess services at another casino. The services may be customized foreach device 113 individually or for groups of devices.

The system 100 may further be configured to encrypt data, such as thephysical biometric data, before it is communicated from the gamingdevice to the remote computer 118 over network 116 for authentication.In one embodiment, this is accomplished with a one-way encryptionalgorithm that encrypts, e.g., the identity verification data, toproduce a string of alphanumeric characters having a length, such as 100or greater, from, in certain instances, image data. The string may thenbe communicated to the remote computer 118 for verification, which iscompared with data in the user's profile. The remote computer 118preferably does not store any identity verification data in the rawform, i.e., unencrypted. Rather, the remote computer stores the postencryption string of characters for the validation. Thus, a matchbetween the string of characters communicated from the device foridentity verification and the stored string, within a configurabletolerance, will result in enabling the user to access one or more of theservices provided by the system 100. The gaming device 113 may also beconfigured so that the raw and/or the encrypted identity verificationdata is not stored permanently and/or to purged periodically, followingvalidation, when the data is transmitted successfully to the remotecomputer 113, or at any other time the data is no longer needed for theimmediate validation. Therefore, in this instance, the gaming device 113will be required to obtain and/or encrypt identity verification dataanew each time there is a prompt for such data.

The system 100 may also disable access thereto with a hard checkmechanism. That is, device 113 may include a reader 150 that obtainsinformation from a corresponding authentication device 155. Theauthentication device 155 may be any item for storing informationthereon, such as a card which bears a magnetic strip, such as a creditcard, a key that includes an RFID transponder, a limited-distance signalemitter or other transponder, a smart card, a bracelet or wristbandwhich includes a signal transmitter, such as an RFID signal transmitter,or which includes a magnetically encoded signal, a substrate that bearsa bar code or other optically readable identifier, or any combinationthereof. The reader 150 may be a magnetic strip reader, an RF orinfrared receiver, an optical scanner, etc.

The gaming device 113 may therefore be capable of detecting a signalfrom the authentication device 155 and the system 100 may enable systemaccess based on the signal from the authentication device 155. Continuedaccess may also be conditioned on the gaming device 113 receivingcontinuing to detect the signal from the authentication device 155. Thesignal produced by authentication device 155 may additionally oralternatively include information stored on the device 155, such asidentity verification data, or any other data that may be used as a keyfor system access. In one embodiment, the authentication device 155includes a token that is derived from the authorized user's biometricdata, such as the string of alphanumeric characters derived from theuser's biometrics. The system 100 may then provide access based on acomparison of the string of characters derived from the biometric sensorreading and the string stored on the authentication device.Alternatively or additionally, the data stored on the authenticationdevice 155 may be used to authenticate the user without other identityverification data. That is, the authentication device data may be givengreater weight and may thus be used as the primary data for identityverification.

It is understood that all or some of the data discussed herein may bestored on the authentication device 155 and used as a basis for thecomparison with data obtained for identity verification. For example,the device 155 may include physical biometric data, such as fingerprintdata, that is compared with fingerprint data received for immediateidentity verification. The data used for the comparison may also belimited to being stored to areas only within the user's control, such asareas other than the authentication device 155 and/or the gaming device113. Validation may therefore be accomplished locally between the gamingdevice 113 and the authentication device 155; without the transfer ofidentity verification data to the remote computer 118 for this purpose.Alternatively or additionally, the validation may be accomplishedbetween the remote computer 118 and the authentication device 155.

The functionality disclosed herein may be provided with software thatresides on both the gaming communication device 113 and the remotecomputer 118. Software resident on gaming communication device 113 ispreferably operable to present information corresponding to the systemservices, including wagering and non-wagering type gaming to the user.The information includes, without limitation, graphical and/or textualrepresentations of objects associated with the services, e.g., in one ormore interface screens, windows, and/or message boxes, with thepresentation of selectable options related to the services, such asmenus, icons, buttons, selectable areas, hyperlinks, etc. The gamingdevice software is also preferably operable to receive data from theremote computer 118 and data input by the user. Software resident on theremote computer 118 is preferably able to exchange data with the gamingdevice 118, access additional computers, and data storage devices, andperform all of the functions described herein, including providing thebackend functionality for the services discussed herein as well thosecommon to gaming systems.

The data discussed herein as being transmitted or used by the variousdevices of the gaming system 100 may be in any format, which isnecessary or desirable for the services provided for the user. Theinformation may be transmitted in whole or in fractional portionsthereof, in any format including digital or analog, text or voice, andaccording to any transport technology, which may include wired orwireless technologies. Wireless technologies may include licensed orlicense-exempt technologies. Some specific technologies which may beused include, without limitation, Code Division Multiple Access (CDMA),Global System for Mobile Communication (GSM), General Packet RadioService (GPRS), WiFi (802.11x), WiMax (802.16x), Public SwitchedTelephone Network (PSTN), Digital Subscriber Line (DSL), IntegratedServices Digital Network (ISDN), or cable modem technologies. These areexamples only and one of ordinary skill will understand that other typesof communication techniques are within the scope of the presentinvention. Further, it will be understood that additional components maybe used in the communication of information between the users and thegaming server. Such additional components may include, withoutlimitation, physical communication lines, trunks, antennas, switches,cables, transmitters, receivers, computers, routers, servers, fiberoptical transmission equipment, repeaters, amplifiers, etc.

In at least one embodiment, some or all of the data communication maytake place through the Internet or without involvement of the Internet.In certain embodiments, a portion of the information may be transmittedover the Internet while another portion of the information iscommunicated over a more secure network. For instance, graphic filesdepicting a roulette table, such as files in .gif or .jpg formats, maybe communicated over the Internet while gaming information, such as theresults from roulette wheel spin, may be communicated in a parallelnetwork and assembled at the gaming device 113 for display together in asingle interface screen. In addition to security considerations, thechoice of which of the plurality of networks handle the split data maybe based on the bandwidth of the network. Thus, larger graphics filesmay be transmitted to device 113 over a WiMax network while smaller datafiles are transmitted over a cellular network.

Referring to FIG. 2, the communication network 116 may be a cellularnetwork 222. Cellular network 222 comprises a plurality of base stations223, each of which has a corresponding coverage area 225. Base stationsmay have coverage areas that overlap. Further, the coverage areas may besectorized or non-sectorized. In the cellular network, the gaming device113 is generally a mobile station 224, such as a cell phone, that may betransient within the network. The mobile stations 224 communicate withthe base stations 223 wirelessly via radio signals. The base stations223 generally communicate with, e.g., the remote computer 118, overlandlines, such as POTS, T1-T3, ISDN, etc. Each base station ispreferably programmed to send and receive voice and/or datatransmissions to and from mobile station. The gaming device 113 may becoupled to the remote computer 118 with a private label cellularcarrier. The mobile stations 224 are preferably preprogrammed with thecarrier's authentication software to establish a connection to thecellular network.

In one embodiment, the location verification feature for determining thelocation of the gaming device 113 does so in relation to the location ofat least one of the base stations of the cellular network. That is, thesystem 100 determines the location of the gaming device 113 based on thelocation of one or more base stations and the distance and/or thedirection (azimuth) of the device 113 from at least one base station.The distance may be determined based on the strength of the transmitsignal received from gaming device 113. That is, the gaming systemdevice's transmitter communicates at a fixed transmit power output. Theattenuation of the transmit signal is generally a function of thedistance between the transmitter and the receiver. Thus, the power ofthe signal received from the device 113 may be measured at the basestation and the distance determined there from, e.g., calculated, orlooked up in a database or table that maps distance to signal strength.The direction may be determined based on the azimuth of the antennareceiving the signal from the device 113. Alternatively or additionally,the direction may be determined based on the distance of the device 113from a plurality of the base stations 223, such as two or three, usingtechniques, such as triangulation, multilateration, etc., as shown inFIG. 3. Determining the location of the gaming device 113 based on thepower level of the signal received form the gaming device is not limitedto cellular network. Rather, the process is generally applicable to alltypes of wireless networks, including satellite, WiFi, GPS, LORAN, RFID,etc., where the location of the base stations are known and the locationof the device 113 may be derived based on the distance from the basestation.

Referring to FIG. 3, in one embodiment, the location verificationfeature is implemented using geo-fencing. That is, the location basedaccess features disclosed herein are enforced based on the communicationrange of base stations in the wireless communication network. Forexample, the gaming system 100 may communicate with a plurality ofgaming devices 354, 355, and 356. Device 354 is shown located outsidethe gaming jurisdiction or area 358. Devices 355 and 356 are bothlocated inside gaming area 58. However, only device 356 is locatedwithin sub-area or geo-fence 357, which is defined by the perimeter ofthe coverage areas of the plurality of base stations 353. Thus,geo-fencing may be used to enable access for device 356 but disableservices for devices 354 and 355. Even though some gaming devices may bewithin the area 358, such as device 355, those devices may not beallowed to access the gaming system 100 based on its location inrelation to geo-fence 357. The base stations may be cellular basestations as discussed above or base stations having a relatively shortrange, such as WiFi or RFID transmitters/receivers, located within thepremises of a hotel. The short-range base stations may, for example, beset up within the service area in a grid pattern, e.g., in the ceilingof a facility, with sufficient separation to determine the location ofthe device.

Location verification may be implemented with multiple overlapping aswell as non-overlapping geo-fences. For example, geo-fence 361 may bedefined by the range of fewer than all of the base stations in thenetwork, such as base station 360, which includes all of the basestations in a casino. Geo-fence 360 may be a subset of the area ofgeo-fence 357 or excluded from area 357, which may include all of thebase stations in a hotel. In either event, location based accessfeatures, such as classifications, thresholds, services, surveillance,etc., may be geo-fence specific. Geo-fencing may further be combinedwith triangulation and/or other location verification techniques todetermine the specific location of the device within the geo-fence. Forexample, the location of device 356 may be determined based ontriangulation between three of the base stations 353.

Alternatively or additionally, the device 113 may include a globalpositioning satellite (GPS) chip that determines the location of thedevice based on signals received from GPS satellites. The GPS chip maystand alone, in which instance the GPS chip sends the GPS location datato other components of the device, such as the processor 122 and/orcommunication element 124, or part of a single computer chip thatcombines the function of the GPS chip with the other element.

The location verification feature may generally be implemented with anelement, i.e., a location verification element, which is a component ofthe gaming device 113, the remote computer 118, any intermediarycomponent there between, such as the base station or stations, or acombination thereof. The location verification element may beimplemented in hardware, software, or a combination thereof, andgenerally determines the location of the gaming device 113.

In connection with any of the location determination methods, the gamingsystem 100 may periodically update the location determinationinformation. This may be done, for example, during a gaming session, atpre-defined time intervals to ensure that movement of the gaming device113 to an unauthorized area is detected during play, and not just uponlogin or initial access.

Referring to FIG. 4, a method according to at least one embodiment ofthe methods disclosed herein begins at 402 with initiating the gamingdevice 113. Initiation is dependent on the type of the gaming device113. For example, initiation may simply be turning the device 113 orrunning an application, such as a browser application or special purposesoftware. In one embodiment, initiation includes communicating aninitiation message from the device 113 to the system 100, e.g., theremote computer 118. The initiation message is generally interpreted bythe system 100 as a first request for access. The initiation message mayinclude information therein identifying the device and/or the user, suchas a unique device identification number, e.g., for an initial accessdetermination. The unique device identification number may be serialnumber, a cell-phone number, an IP address, etc.

In one embodiment, the system 100 displays at 404 a first interfacescreen in response to initiation, such as in response to the initiationmessage. The first interface screen may be stored locally on the device113 or communicate over the network 116 to the device 113 for display.The nature of the first interface screen will vary depending on thecircumstances. For instance, if the device 113 cannot establish link tothe remote computer 113, the first interface screen may contain amessage indicating as such. Alternatively, upon successfullyestablishing the necessary connection, the first interface screen mayinclude at least one form element therein, such as a text box, for theuser to enter an ID, a password, or a combination thereof to log intothe system 100. The ID and/or password may generally be used as a firstlevel of identity verification and for providing users with userspecific customized services. Alternatively or additionally, thecustomized services may be device specific in which instance the deviceidentification number may be used distinguish the particular device 113from all other devices in the system.

If at 408 it is determined that the user is new and/or the device hasnot been activated, the user and the device may at 140 be registered andactivated for service, respectively. In one embodiment, the user isregistered by receiving at 412 identity verification data, such as auser ID and password, name(s), identification number, address, creditcard number(s), physical biometric data, e.g., a fingerprint scan, aniris scan, a retinal scan, a vascular pattern scan, a facial image, etc.The identity verification data may be authenticated with a third partyprovider, such as the relevant department of motor vehicles, a creditrating agency, etc. User preference information may also be received at414, such as preference information relating to error classificationsand thresholds, location access limits, service limits, surveillancelimits, etc. The identity verification data may be encrypted and storedat 416 either with the remote computer 118 or the authentication device155, as discussed above, and the device 113 may at 417 be activated forservice. Once all the requisite and/or desired information is obtained,an appropriate service-type interface screen is displayed at 430.

If at 408 it is determined that the user and/or the device 113 are notnew and activated, respectively, the system 100, in one embodiment,determines at 406 the location of the device 113. The location of thedevice 113 may be determined in a variety of ways, as discussed above.In one embodiment, the location of the device 113 is determined based onthe location of at least one base station with which the device 113 isin communication with wirelessly. The base station may be a base stationin a cellular network, a local WiFi router, an RFID transponder, etc.The location of the device 113 may simply be an acknowledgement that thedevice 113 is communicating with at least one base station having aknown location. Thus, it can be determined therefrom that the device iswithin an area defined by the communication range of the at least onebase station. Additionally or alternatively, the location of the device113 may be determined based further on the distance and direction of thedevice 113 from one or more base stations, e.g., based on the receivedsignal power from the device transmitter. The determination of thedevice location may also be accomplished with GPS technology. In eitherinstance, the location of the device 113 may be communicated and/orreceived by the system 10 for use in providing services as discussedherein. The location may be specified in terms of the coordinates, e.g.,latitude and longitude, the base station communicating with the device,the class of base station the device is communicating with, e.g., basestations in the casino vs. those in the hotel, base stations in awagering vs. non-wagering geo-fence areas, etc.

In one embodiment, the system 100 determines at 418 the surveillancelevel associated with the location of the device 113. This may beaccomplished, for instance by looking up the surveillance level in atable that includes surveillance level data mapped to the locationswithin the service area of the system 100. Alternatively oradditionally, the surveillance level may be computed in real-time basedon surveillance measures in place at that time.

In one embodiment, the system 100 prompts the user for identityverification data, e.g. physical biometric data, based on the locationand/or the surveillance level associated with the location of the device113. In this instance, the system 100 implements a verification schemebased thereon. That is, the particular type and quantity of identityverification data required to access the services of the system 100 isbased on the location and/or surveillance level associated with thelocation. For example, in a casino area the system 100 may not requireany physical biometric verification for access whereas non-casino areasmay require physical biometric verification with at least one item ofphysical biometric data. Similarly, certain common areas outside of thecasino, identity verification may require further a second, redundantitem of physical biometric data. In the context of the surveillancelevels, areas with a type I surveillance may not require physicalbiometric verification whereas areas with type II surveillance mayrequire at least one item of physical biometric data and areas with typeIII surveillance may further require at least one redundant item ofphysical biometric data. As noted above, the system 100 may implement averification scheme to achieve a target surveillance level. That is, thesystem 100 may determine the surveillance level of the device locationand require identity verification to the extent necessary to meet orexceed the target level. For example, at least one item of redundantverification data may be required to raise type II areas to a targettype I. Similarly, at least two items of redundant verification data maybe required to raise type III areas to target type I.

Identity verification data may then be compared at 422 with the datastored previously, such as with the remote computer 118 and/or theauthentication device 155. If identity verification fails at 424, thesystem 100 may prompt the user for reentry or additional data. Ifverification passes, the system 100 may at determine if there are anylocation based service limits and at 428 determine any applicable userpreferences related thereto. That is, the system 100 may determine whichof the plurality of available services the user will be provided accessto based on the location of the device and/or the surveillance levelassociated with the location. For example, the system 100 may provideaccess to all services, such as wagering, entertainment, news,messaging, telephone, IP telephony etc., in the casino, when the device113 is located within the casino. Similarly, access to all servicesother than wagering may be provided in all areas. In this respect, thesystem 100 blocks access to wagering services in certain areas, such asareas outside of the casino.

Following identity verification, a service appropriate interface screenmay be displayed for the user at the device 113. That is, the interfacescreen displayed for the user includes therein selectable options foraccessing the enabled services. Non-enabled services will preferably beblacked out. For example, the interface screen may include menu items,icons, hyperlinks, selectable text and graphics, etc., for each of theenabled services that when selected causes a related interface screen tobe displayed. As noted above, the system 100 may provide users withaccess to, e.g., video versions of table games, such as poker. In thisinstance, a related interface screen may include graphics for videopoker, including playing card graphics, betting selections, etc. Theinterface screens preferably include selectable elements for navigatingthrough the service environment, e.g., for access to other services,and/or selectable elements for submitting gaming and wagering commands,such as hit, stay, hold, draw, bet, bet up, bet down, double down, etc.

In one embodiment, the system 100 obtains data for determining whetheror not there has been a user change following the prior identityverification. As discussed above, a user change may be determined basedon various types of data, such as behavioral biometric data, e.g., bloodpressure, heart or pulse rate, body temperature data, speech,handwriting, keystrokes, body movements, etc., proficiency data, such askeystroke rate, menu item or icon selection rate, player pattern data,e.g., the magnitude and rate of gaming commands, wagering commands, etc.If it is determined at 434 that there may have been a user change sincethe previous identity verification, the system 100 may prompt the userfor identity verification data at 436 or respond based on errorclassification and thresholds, and repeat identity verification. Thesystem 100 preferably determines if there is a change in the location ofthe device 113 at 438 and adjusts/enables the services accordingly.

While the foregoing invention has been described in some detail forpurposes of clarity and understanding, it will be appreciated by oneskilled in the art, from a reading of the disclosure, that variouschanges in form and detail can be made without departing from the truescope of the invention in the appended claims.

1-20. (canceled)
 21. A method comprising: determining that a gamingdevice is located in a first area of a plurality of service areas;prompting a user of the gaming device for at least one item of physicalbiometric data based on the gaming device being located in the firstarea, the user not prompted for physical biometric data when the gamingdevice is located in a second area of the plurality of service areas;receiving at least one item of physical biometric data; and enabling atleast one service on the gaming device based on a match between the atleast one item of physical biometric data received and at least one itemof physical biometric data associated with the user obtained previously.22. A method comprising: determining a location of a gaming device froma plurality of service areas; prompting a user of the gaming device forat least a first item of physical biometric data based on the gamingdevice being located in a first area of the plurality of service areas;prompting the user of the gaming device for at least a second item ofphysical biometric data based on the gaming device being located in asecond area of the plurality of service areas; receiving the first orthe second item of physical biometric data; and enabling at least oneservice on the gaming device based on a match between the physicalbiometric data received and at least one authenticated item of physicalbiometric data associated with the user.
 23. The method of claim 22,comprising prompting the user for the first and the second item ofphysical biometric data when in the second area.
 24. The method of claim22, comprising prompting the user for the second and a third item ofphysical biometric data when in the second area.
 25. A methodcomprising: determining a location of a gaming device from a pluralityof service areas; determining a surveillance level associated with thelocation of the gaming device; prompting a user of the gaming device forat least a first item of physical biometric data when it is determinedthat the gaming device is located in a first of the plurality of serviceareas, the user not prompted for physical biometric data when in asecond area of the plurality of service areas, the second area having asurveillance level associated therewith higher than a surveillance levelassociated with the first area; receiving at least one item of physicalbiometric data; and enabling at least one service on the gaming devicebased on a match between the at least one item of physical biometricdata received and at least one authenticated item of physical biometricdata associated with the user. 26-28. (canceled)