Keyless entry into and maintenance of gaming machine

ABSTRACT

Gaming machines and methods providing for control of gaming machines and gaming networks via a wireless device. A gaming machine includes a one or more cabinets enclosing interior components of the gaming machine. Access to each cabinet may be controlled with a locking mechanism. A communication interface of the gaming machine communicates with the wireless device and a network server. One or more processors of the gaming machine are configured to receive requests from the wireless device for access to a cabinet, facilitate verifying by the network server whether a user associated with the wireless device has access to the cabinet, and upon obtaining verification from the network server that the user has access to the main cabinet, unlock the appropriate locking mechanism. In some implementations, different cabinets require different security levels for the user.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims priority under 35 U.S.C. §119(e) from co-pendingU.S. Provisional Patent Application No. 61/541,469, filed Sep. 30, 2011,titled “KEYLESS ENTRY INTO AND MAINTENANCE OF GAMING MACHINE,” namingJamison Frady as the inventor, and which is incorporated herein byreference for all purposes.

TECHNICAL FIELD

The present disclosure relates generally to wager-based gaming machinesand wireless devices.

BACKGROUND

Electronic gaming machines currently employ antiquated locking, entry,and access log techniques. For access logs, operators (i.e. casinos) andsuppliers alike use paper log books to manually enter and track machineaccess information, which (in the simplest form) includes the technicianinformation, reason for accessing the gaming machine, date, and time.There are many opportunities for errors to be introduced in this manualprocess, and the information entered into the log book is locked away inthe gaming machine or a stand underneath the gaming machine, makingreview and data monitoring from these log books a time consumingprocess. Additionally, the operator may receive out of date data fromthese log books as a result of the recorded information having to bephysically retrieved from every machine or machine stand in order to beviewed. There have been occurrences where a certain gaming machine'sfilter becomes clogged, and the decreased air flow actually causes partsin the computer portion of the gaming machine to melt down and fail. Ifthe log books containing information of the frequency of the filterchanges were more readily available, for example, the operator couldhave possibly prevented the computer failure by changing the filtersmore often, relocating the gaming machine, or changing other externalfactors around the gaming machine.

Another barrier to machine maintenance and accurate record keeping isthe entry method itself. Using physical locks and keys to gain entry toa gaming machine, while very secure, is also very out of date. Physicallocks and keys in gaming machines have always been specified, purchased,installed, and tracked by the operator. Often, gaming regulators requiretwo locks on the main entry door on a machine, then another lock to gainaccess to the cashbox drop, and then one (and in some jurisdictions,two) more lock(s) on the cashbox itself. With this possible combinationof up to five locks per machine, it is easy to imagine that the cost topurchase, maintain and track all these lock and key sets is quiteexpensive for even a small gaming floor. Additionally, consider the casewhere a technician may lose a key or have it stolen, and then theoperator must replace their entire gaming floor with all new lock setsto ensure the security of the gaming machines—this is a very costlysituation.

In gaming properties, security is paramount to the operators, andmachine maintenance—while important to the profitability of the gamingmachine—is a lower priority. A floor supervisor's (often called a “pitboss”) job is to ensure the security of the games and compliance withthe regulations of the operator's legal jurisdiction. Because of theseconcerns, it is a common practice to disallow technicians to access thegaming machine to perform preventative maintenance or even readinformation from a paper log book when a patron is playing the game;furthermore, due to these security concerns and various regulations,access is limited during certain times of the day. As such, both thedifficulty of machine entry with physical locks and the out of datepaper log books affect the frequency and even the methods of how amachine is maintained and serviced. It is common for gaming machines tobe serviced only when a particular problem has occurred. Preventativemaintenance is not commonly performed and only occurs as a result oftrial by error because there is currently no good way to gathermeaningful or timely data.

An additional result of the security measures is that an operatorusually only had a small window of time in which to make their cash“drops” (changing out the cashboxes full of money with empty ones). Alarge inefficiency in the cash drop process, as noted, is the use ofphysical locks on the gaming machines due to the manual process offinding, inserting, unlocking, locking, and removing the correct key andthen moving on to the next machine. Because their time is limited andthe cash drop method is cumbersome, cash drop crews often only do halfof the floor one day and the other half the next day; this ties up halfof the day's take and leaves it in the gaming machines, and it alsointroduces the possibility of a gaming machine going down because thecashbox is full and will not accept any more tender.

Last, with regards to security, the gaming machines currently have noway of communicating to security or the pit boss that there isquestionable activity going on. Common cheating practices involveattempting to “string” (pull a inserted bill back out via an attachedstring or wire once the credits have appeared on the game), drillingholes in the gaming machine to access components, electrically shockingthe gaming machine, etc. In addition to cheating, patron damage tomachines is also a concern. To address cheating and damage problems,operators invest in security systems that are monitored in back rooms bysecurity officers, who then have to communicate to pit bosses andsecurity officers on the gaming floor of a possible problem that theyhave identified via, for instance, a security camera. This is akin toinstalling a webcam outside of a parking lot in order to monitor a carin the parking lot instead of just simply installing an alarm in the caritself.

SUMMARY

Various implementations described or referenced herein are directed todifferent devices, methods, systems, and computer program products forproviding a gaming machine. In some implementations, devices, methods,systems, and computer program products may be configured or designed foruse in a casino environment.

In some implementations, a gaming machine includes a main cabinet, amain cabinet locking mechanism, a communication interface, and one ormore processors. The main cabinet encloses hardware of the gamingmachine and includes a main cabinet door. The main cabinet lockingmechanism is configured to control access to the main cabinet via themain cabinet door. The communication interface is configured tocommunicate with a wireless device and a network server. The one or moreprocessors are configured to: receive a first request from the wirelessdevice for access to the main cabinet, facilitate verifying by thenetwork server whether a user associated with the wireless device hasaccess to the main cabinet, and upon obtaining verification from thenetwork server that the user has access to the main cabinet, unlock themain cabinet locking mechanism.

In some implementations, the one or more processors are furtherconfigured to: upon obtaining verification from the network server thatthe user has access to the main cabinet, allow the user to controllocking and unlocking of the main cabinet locking mechanism with thewireless device.

In some implementations, the gaming machine further includes a cash dropcabinet including a cash drop door, the cash drop cabinet configured tostore wager game currency and a cash drop cabinet locking mechanismconfigured to control access to the cash drop cabinet via the cash dropdoor. The one or more processors are further configured to: receive asecond request from the wireless device for access to the cash dropcabinet; facilitate verifying by the network server whether the userassociated with the wireless device has access to the cash drop cabinet;and upon obtaining verification from the network server that the userhas access to the cash drop cabinet, unlock the cash drop cabinetlocking mechanism.

In some implementations, the one or more processors are furtherconfigured to: upon obtaining verification from the network server thatthe user has access to the cash drop cabinet, allow the user to controllocking and unlocking of the cash drop cabinet locking mechanism withthe wireless device.

In some implementations, successfully obtaining verification from thenetwork server for access to the cash drop cabinet requires the user tohave a first security clearance level. In some implementations,successfully obtaining verification from the network server for accessto the main cabinet requires the user to have a second securityclearance level higher than the first security clearance level.

In some implementations, the wireless device is a cell phone, a smartphone, a tablet computer, a PDA, a personal computer, or a laptopcomputer.

In some implementations, a method provides for keyless entry into one ormore cabinets of a gaming machine via a wireless device associated witha user. The method includes: receiving, at one or more processors of thegaming machine, a first request from the wireless device for access to amain cabinet via a main cabinet door, the main cabinet enclosinghardware of the gaming machine; sending the first request to a networkserver; receiving a first response from the network server verifyingwhether the user has access to the main cabinet; and upon obtainingverification from the network server that the user has access to themain cabinet, unlocking a main cabinet locking mechanism, the maincabinet locking mechanism configured to control access to the maincabinet via the main cabinet door.

In some implementations, the method further includes: upon obtainingverification from the network server that the user has access to themain cabinet, allowing the user to control locking and unlocking of themain cabinet locking mechanism with the wireless device.

In some implementations, the method further includes: receiving, at oneor more processors of the gaming machine, a second request from thewireless device for access to a cash drop cabinet via a cash drop door,the cash drop cabinet configured to store wager game currency; sendingthe second request to the network server; receiving a second responsefrom the network server verifying whether the user has access to thecash drop cabinet; and upon obtaining verification from the networkserver that the user has access to the cash drop cabinet, unlocking acash drop cabinet locking mechanism, the cash drop cabinet lockingmechanism configured to control access to the cash drop cabinet via thecash drop cabinet door.

In some implementations, the method further includes: upon obtainingverification from the network server that the user has access to thecash drop cabinet, allowing the user to control locking and unlocking ofthe cash drop cabinet locking mechanism with the wireless device.

In some implementations, successfully obtaining verification from thenetwork server for access to the cash drop cabinet requires the user tohave a first security clearance level. In some implementations,successfully obtaining verification from the network server for accessto the main cabinet requires the user to have a second securityclearance level higher than the first security clearance level.

In some implementations, the wireless device is a cell phone, a smartphone, a tablet computer, a PDA, a personal computer, or a laptopcomputer.

In some implementations, a non-transitory computer-readable storagemedium stores instructions executable by a computing device to perform amethod for keyless entry into one or more cabinets of a gaming machinevia a wireless device associated with a user, the method comprising:receiving, at one or more processors of the gaming machine, a firstrequest from the wireless device for access to a main cabinet via a maincabinet door, the main cabinet enclosing hardware of the gaming machine;sending the first request to a network server; receiving a firstresponse from the network server verifying whether the user has accessto the main cabinet; and upon obtaining verification from the networkserver that the user has access to the main cabinet, unlocking a maincabinet locking mechanism, the main cabinet locking mechanism configuredto control access to the main cabinet via the main cabinet door.

In some implementations, the method further includes: upon obtainingverification from the network server that the user has access to themain cabinet, allowing the user to control locking and unlocking of themain cabinet locking mechanism with the wireless device.

In some implementations, the method further includes: receiving, at oneor more processors of the gaming machine, a second request from thewireless device for access to a cash drop cabinet via a cash drop door,the cash drop cabinet configured to store wager game currency; sendingthe second request to the network server; receiving a second responsefrom the network server verifying whether the user has access to thecash drop cabinet; and upon obtaining verification from the networkserver that the user has access to the cash drop cabinet, unlocking acash drop cabinet locking mechanism, the cash drop cabinet lockingmechanism configured to control access to the cash drop cabinet via thecash drop cabinet door.

In some implementations, the method further includes: upon obtainingverification from the network server that the user has access to thecash drop cabinet, allowing the user to control locking and unlocking ofthe cash drop cabinet locking mechanism with the wireless device.

In some implementations, successfully obtaining verification from thenetwork server for access to the cash drop cabinet requires the user tohave a first security clearance level. In some implementations,successfully obtaining verification from the network server for accessto the main cabinet requires the user to have a second securityclearance level higher than the first security clearance level.

In some implementations, the wireless device is a cell phone, a smartphone, a tablet computer, a PDA, a personal computer, or a laptopcomputer.

Aspects of the disclosed subject matter may be implemented by networkedgaming machines, game servers and other such devices. These and otherfeatures and benefits of aspects of the disclosed subject matter will bedescribed in more detail below with reference to the associateddrawings. In addition, other methods, features and advantages of thedisclosed subject matter will be or will become apparent to one withskill in the art upon examination of the following figures and detaileddescription. It is intended that all such additional methods, featuresand advantages be included within this description, be within the scopeof the disclosed subject matter, and be protected by the accompanyingclaims.

BRIEF DESCRIPTION OF THE DRAWINGS

The included drawings are for illustrative purposes and serve only toprovide examples of possible structures and process steps for thedisclosed subject matter. These drawings in no way limit any changes inform and detail that may be made to various implementations by oneskilled in the art without departing from the spirit and scope of thedisclosure.

FIGS. 1, 2A and 2B show perspective diagrams of a gaming machine 2,configured in accordance with some implementations.

FIG. 3 shows a flow diagram of a method 300 for keyless entry into agaming machine, performed in accordance with some implementations.

FIG. 4 shows a flow diagram of a method 400 for management of a gamingmachine via a wireless device, performed in accordance with someimplementations.

FIG. 5 shows a flow diagram of a method 500 for management of a casinofloor via a wireless device, performed in accordance with someimplementations.

FIG. 6 shows a gaming network, configured in accordance with someimplementations.

FIG. 7 shows a flow diagram of a method 700 for providing in casinolocation services, performed in accordance with some implementations.

FIG. 8 shows a flow diagram of a method 800 for locking down a gamingmachine via a wireless device, performed in accordance with someimplementations.

FIG. 9 shows a flow diagram of a method 900 for implementing a digitallog book, performed in accordance with some implementations.

FIG. 10 shows a flow diagram of a method 1000 for utilizing a camera forin casino services, performed in accordance with some implementations.

FIG. 11 shows a perspective diagram of the component parts of a gamingmachine, configured in accordance with some implementations.

FIG. 12 shows a perspective diagram of the component parts of a wirelessdevice, configured in accordance with some implementations.

DETAILED DESCRIPTION

Applications of gaming machines, systems and methods according to one ormore implementations are described in this section. These examples arebeing provided solely to add context and aid in the understanding of thepresent disclosure. It will thus be apparent to one skilled in the artthat the techniques described may be practiced without some or all ofthese specific details. In other instances, well known process stepshave not been described in detail in order to avoid unnecessarilyobscuring the present disclosure. Other applications are possible, suchthat the following examples should not be taken as definitive orlimiting either in scope or setting.

In the following detailed description, references are made to theaccompanying drawings, which form a part of the description and in whichare shown, by way of illustration, specific implementations. Althoughthese implementations are described in sufficient detail to enable oneskilled in the art to practice the disclosure, it is understood thatthese examples are not limiting, such that other implementations may beused and changes may be made without departing from the spirit and scopeof the disclosure, as defined by the appended claims.

FIGS. 1, 2A and 2B show perspective views of an electronic gamingmachine 2, configured in accordance with some implementations. Thegaming machine 2 includes a main cabinet 4, which generally surroundsthe gaming machine interior and is viewable by users. The main cabinetincludes a main door 8 on the front of the gaming machine, which opensto provide access to the interior of the gaming machine.

In some implementations, the gaming machine may include any of aplurality of devices. For example, the gaming machine may include aticket printer that prints bar-coded tickets, a key pad for enteringplayer tracking information, a display (e.g., a video display screen)for displaying player tracking information, a card reader for entering amagnetic striped card containing player tracking information, and anyother devices. The ticket printer may be used to print tickets for acashless ticketing system. In FIGS. 1-2B, attached to the main door is apayment acceptor 28, a bill validator 30, and a coin tray 38. Thepayment acceptor may include a coin slot and/or a payment, note, or billacceptor, where the player inserts money, coins, tokens, or other typesof payments.

In some implementations, devices such as readers or validators forcredit cards, debit cards, smart cards, or credit slips may facilitatepayment. For example, a player may insert an identification card into acard reader of the gaming machine. The identification card may be asmart card coded with a player's identification, credit totals (orrelated data) and other relevant information. As another example, aplayer may carry a portable device, such as a cell phone, a radiofrequency identification tag, a tablet computer with a touch screen orany other suitable wireless device. The portable device may communicatesa player's identification, credit totals (or related data), and/or anyother relevant information to the gaming machine. As yet anotherexample, money may be transferred to a gaming machine through electronicfunds transfer. When a player funds the gaming machine, another logicdevice coupled to the gaming machine may determine the amount of fundsentered and display the corresponding amount on a display device.

In some implementations, attached to the main door is a plurality ofplayer-input switches or buttons 32. The input switches can include anysuitable devices which enable the player to produce an input signalwhich is received by a processor. The input switches may include a gameactivation device that may be used by the player to start any primarygame or sequence of events in the gaming machine. The game activationdevice can be any suitable play activator such as a “bet one” button, a“max bet” button, or a “repeat the bet” button. In some instances, uponappropriate funding, the gaming machine may begin the game playautomatically. Alternately, the gaming machine may automaticallyactivate game play after detecting user input via the game activationdevice.

In some implementations, one input switch is a cash-out button. Theplayer may push the cash-out button and cash out to receive a cashpayment or other suitable form of payment corresponding to the number ofremaining credits. For example, when the player cashes out, the playermay receive the coins or tokens in a coin payout tray. As anotherexample, the player may receive other payout mechanisms such as ticketsor credit slips redeemable by a cashier (or other suitable redemptionsystem) or funding to the player's electronically recordableidentification card. As yet another example, funds may be transferredfrom the gaming machine to the player's smart card.

In some implementations, one input switch is a touch-screen coupled witha touch-screen controller, or some other touch-sensitive display overlayto enable for player interaction with the images on the display. Thetouch-screen and the touch-screen controller may be connected to a videocontroller. A player may make decisions and input signals into thegaming machine by touching the touch-screen at the appropriate places.One such input switch is a touch-screen button panel.

In some implementations, the gaming machine may include communicationports or interfaces for enabling communication of the gaming machineprocessor with external peripherals, such as external video sources,expansion buses, game or other displays, a Small Computer SystemInterface (SCSI) port, a key pad, or a network interface forcommunicating via a network.

In some implementations, the gaming machine may include a label area,such as the label area 36. The label area may be used to display anyinformation or insignia related to activities conducted at the gamingmachine.

In some implementations, the electronic gaming machine may include oneor more display devices. For example, the electronic gaming machine 2includes display devices 34 and 45. The display devices 34 and 45 mayeach include any of a cathode ray tube, a liquid crystal display (LCD),a light emitting diode (LED) based display, an organic light emittingdiode (OLED) based display, a polymer light emitting diode (PLED) baseddisplay, a surface-conduction electron-emitter display (SED), an E-inkdisplay, a plasma display, a multilayer display, a television display, adisplay including a projected and/or reflected image, or any othersuitable electronic display device.

In some implementations, the display devices at the gaming machine mayinclude one or more electromechanical devices such as one or morerotatable wheels, reels, or dice. The display device may include anelectromechanical device adjacent to a video display, such as a videodisplay positioned in front of a mechanical reel. The display devicesmay include dual-layered or multi-layered electromechanical and/or videodisplays that cooperate to generate one or more images. The displaydevices may include a mobile display device, such as a smart phone ortablet computer, that allows play of at least a portion of the primaryor secondary game at a location remote from the gaming machine. Thedisplay devices may be of any suitable size and configuration, such as asquare, a rectangle or an elongated rectangle.

In some implementations, the display devices of the gaming machine areconfigured to display game images or other suitable images. The imagesmay include symbols, game indicia, people, characters, places, things,faces of cards, dice, and any other images. The images may include avisual representation or exhibition of the movement of objects such asmechanical, virtual, or video reels and wheel. The images may include avisual representation or exhibition of dynamic lighting, video images,or any other images.

In some implementations, the electronic gaming machine may include a topbox. For example, the gaming machine 2 includes a top box 6, which sitson top of the main cabinet 4. The top box 6 may house any of a number ofdevices, which may be used to add features to a game being played on thegaming machine 2. These devices may include speakers 10 and 12, thedisplay device 45, service light 11 and any other devices. Further, thetop box 6 may house different or additional devices not illustrated inFIGS. 1-2B. For example, the top box may include a bonus wheel or aback-lit silk screened panel which may be used to add bonus features tothe game being played on the gaming machine. As another example, the topbox may include a display for a progressive jackpot offered on thegaming machine. As yet another example, the top box may include a smartcard interaction device. During a game, these devices are controlled andpowered, at least in part, by circuitry (e.g. a master gamingcontroller) housed within the main cabinet 4 of the gaming machine 2.

In some implementations, speakers may be mounted and situated in thecabinet with an angled orientation toward the player. For instance, thespeakers 10 and 12 located in the top box area 6 of the upper region ofgaming machine 2 may be mounted and situated in the cabinet with anangled orientation down towards the player and the floor. In oneexample, the angle is 45 degrees with respect to the vertical,longitudinal axis of the gaming machine 2. In another example, the angleis in a range of 30-60 degrees. In another example, the angle is anyangle between 0 and 90 degrees. In some implementations, the angle ofthe speakers in the gaming machine may be adjustable. For instance,speakers may be adjusted to face in a direction more closelyapproximating an estimated position of a player's head or facialfeatures.

The bill validator 30, the player-input switches 32, the display screen34, and other gaming devices may be used to present a game on the gamemachine 2. The devices may be controlled by code executed by a mastergaming controller housed inside the main cabinet 4 of the gaming machine2. The master gaming controller may include one or more processorsincluding general purpose and specialized processors, such as graphicscards, and one or more memory devices including volatile andnon-volatile memory. The master gaming controller may periodicallyconfigure and/or authenticate the code executed on the gaming machine.

In some implementations, the gaming machine may include a soundgenerating device coupled to one or more sounds cards. The soundgenerating device may include the one or more speakers or other soundgenerating hardware and/or software for generating sounds, such asplaying music for the primary and/or secondary game or for other modesof the gaming machine, such as an attract mode. The gaming machine mayprovide dynamic sounds coupled with attractive multimedia imagesdisplayed on one or more of the display devices to provide anaudio-visual representation or to otherwise display full-motion videowith sound to attract players to the gaming machine. During idleperiods, the gaming machine may display a sequence of audio and/orvisual attraction messages to attract potential players to the gamingmachine. The videos may also be customized for or to provide anyappropriate information.

In some implementations, the gaming machine may include a sensor, suchas a camera that is selectively positioned to acquire an image of aplayer actively using the gaming machine and/or the surrounding area ofthe gaming machine. The sensor may be configured to capture biometricdata about a player in proximity to the gaming machine. The biometricdata may be used to implement mechanical and/or digital adjustments tothe gaming machine. Alternately, or additionally, the sensor may beconfigured to selectively acquire still or moving (e.g., video) images.The display devices may be configured to display the image acquired bythe camera as well as display the visible manifestation of the game insplit screen or picture-in-picture fashion. For example, the camera mayacquire an image of the player and a processor may incorporate thatimage into the primary and/or secondary game as a game image, symbol,animated avatar, or game indicia. In some implementations, the sensormay be used to trigger an attract mode effect. For example, when thesensor detects the presence of a nearby player, the gaming machine mayplay sound effects or display images, text, graphics, lighting effects,or animations to attract the player to play a game at the gamingmachine.

The gaming machine 2 is but one example from a wide range of gamingmachine designs on which the techniques described herein may beimplemented. For example, not all suitable gaming machines have topboxes or player tracking features. Further, some gaming machines haveonly a single game display—mechanical or video, while others may havemultiple displays.

Keyless Entry into Gaming Machine

FIG. 3 shows a flow diagram of a method 300 for keyless entry into agaming machine, performed in accordance with some implementations. Themethod may be performed with a wireless device (e.g., mobile device 670in FIG. 6 or wireless device 1200 in FIG. 12) or other some device forgaining keyless access into a gaming machine. In some examples, thewireless device can be a cell phone, a PDA, a personalized computer, ora tablet computer.

At 301, communication is first established between a wireless device anda gaming machine or a network server, such as a server 630 shown in FIG.6. In one example, the wireless device communicates directly with thegaming machine. In another example, keyless entry to the gaming machineis controlled by the network server. Thus the wireless device mustconnect to the network server.

In some implementations, the communication may be established usingRFID, NFC (near field communication), or wireless 802.11 WLANtechnology. In some implementations, communication may be establishedvia Bluetooth technology or through existing cell phone networks.

At 302 and 304, it is determined whether the user has access to thegaming machine. “Access,” as used herein, may refer to authority orpermission to access the gaming machine. If the user is determined tohave access, access to the gaming machine is allowed at 306. If the useris determined not to have access, access to the gaming machine is deniedat 308. The verification may be done using the gaming machine itself(for isolated gaming machines) or through a network server (fornetworked gaming machines). Because security is a great concern in thegaming industry, it is important to verify whether a user indeed doeshave the authorization to access the gaming machine. At this point, themethod 300 may be considered complete at 310.

There can be multiple levels of security for different classes of users.For instance, a lower level may be used for a cash drop crew to gainkeyless entry into a cash drop door 1140 (FIG. 11) of the gamingmachine. The cash drop door may enclose a cash drop cabinet whereincoins, money, tokens, or other forms of wager game currency may bedeposited into the gaming machine. The cash drop crew would only haveenough authorization to gain access to the cash drop door, but not anyother compartment of the gaming machine, such the main cabinet 4 wheregaming machine hardware is stored. Advantages for having this keylessentry access to the cash drop door include faster and more efficientcash drops, less interruptions in game play, reduced chances of gamingmachine failure due to the fact that the gaming machine is too full toaccept any more cash.

In yet another implementation, access to the gaming machine can meangaining physical access into the main cabinet 4 of the gaming machine inorder to fix or check maintenance issues such as reprogramming, clearingerrors, rebooting the gaming machine, replacing components, fixingprinter jams and bill validator jams, refilling tickets, and replacingmalfunctioning hardware. Users who are responsible for maintaining thegaming machine may have a different level of security than users in thecash drop crew.

In some implementations, an application (app) on a smart phone, tabletcomputer, or any other wireless device facilitates the communicationwith the gaming machine and the verification of the user's access level.For instance, the app may be used to identify and authenticate the userand to ensure that only authorized users gain access to the gamingmachine.

Management of Gaming Machine Via External Device App

In some implementations, the wireless device may provide an interactiveinterface for managing gaming machines. FIG. 4 shows a flow diagram of amethod 400 for accessing management options of a gaming machine, inaccordance with some implementations. Similar to FIG. 3, at 401, acommunication is established between a wireless device and a gamingmachine or a network server.

At 402, the wireless device displays a representation of the gamingmachine and gaming machine information on the wireless device. In someimplementations, this display can also be in the form of an app on asmart phone, tablet computer, or any other wireless device. While FIG. 4shows the representation of the gaming machine and gaming machineinformation being displayed at 402 before verifying whether a user hasaccess at 404, it should be noted that different implementations mayimplement the steps in different orders. For example, one implementationmay verify first whether a user has access before displaying therepresentation of the gaming machine and gaming machine information. Inthat particular implementation, if the user has been deemed not to haveaccess, then the wireless device might not display the representation ofthe gaming machine or some of the gaming machine information.

At 406, if a user is deemed to have access, the user may then accessmanagement options of the gaming machine on the wireless device. In someimplementations, this can be in the form of a sophisticated secure appon a wireless device maintaining a secure connection with the gamingmachine or a network server. Because gaming machines involve theexchange of money, security levels must be high in order for a user tomanage a gaming machine on a wireless device. In some implementations,there can be different levels of access for different classes of casinopersonnel having different levels of security clearance. At the highestlevel of access, all of the management options may be available. Atlower levels of access, only some of the management options may beavailable. If the user is deemed not to have access at 404, access tothe management options is denied at 408. At this point, the method 400may be considered complete at 410.

In some implementations, the management options of a gaming machine mayprovide, by way of example only: ticket printing, service light clearingor testing, gaming machine resetting or rebooting, remote shut down,remote out of service switching, button controller reset, displayadjustments, performance testing, and interactive information displays.

Ticket printing involves printing a ticket by the gaming machine via thewireless device. Ticket content ranges from monetary value (take it tothe casino cage to cash it) to coupons and such for buffets or othercasino amenities. One common task that an administrator may perform isticket reprinting. Ticket reprinting involves invalidating a previouslyprinted ticket and replacing it with a new ticket. In some instances,patrons require a new ticket with the same monetary value as thepreviously printed ticket. For instance, if a patron spilled a drink andruined the ticket, he might alert an administrator. The administratormay then use the wireless device to access the management options of thegaming machine that printed the previously printed ticket. Theadministrator may, utilizing the management options, invalidate thepreviously printed ticket and direct the gaming machine to print the newticket.

Service light clearing or testing involves determining an error that iscausing the service light (e.g., the service light 11 shown in FIG. 1)to illuminate. In some implementations, the management options mayprovide an administrator or technician with sufficient information todetermine whether the error may be cleared remotely or whether anin-person solution is required. Gaming machines often include a physical“reset key” that gives technicians access to administrator menus on thegaming machine for performing tasks such as clearing errors that causethe service light to illuminate. In some implementations, the managementoptions of the gaming machine on the wireless device present a softwareversion of the “reset key.” Furthermore, some or all of the functionsprovided by the administrator menus on a gaming machine may be providedby the wireless device, after access to the management options of thegaming machine has been granted.

Gaming machine reset or reboot allows a technician or administrator toreboot the gaming machine via the wireless device. Conventional gamingmachines often include a physical power switch locked inside the maincabinet. If a reboot is required, a technician must open the maincabinet, turn the switch off, then on again. There are gamingregulations regarding when, how, why, etc. a game has to be rebooted.Those of skill in the art will appreciate that the management optionsmay allow rebooting of the gaming machine via the wireless device inaccordance with any gaming regulations. In some implementations, similartechniques may be used to shut down a powered up gaming machine or topower up a shutdown gaming machine.

Remote out of service switching allows a technician or administrator toput the gaming machine in an “out of service mode,” as required byvarious regulations, via the wireless device. In the out of servicemode, the gaming machine may display a message indicating that thegaming machine is out of service. The gaming machine will also disallowany player inputs. One example of when a gaming machine would be put outof service is so that maintenance may be performed on the gamingmachine. For instance, gameplay or peripheral software may be updated.In some implementations, the gameplay or software updates may also beperformed by the technician via the wireless device.

Button controller reset allows a technician or administrator to resethardware controllers responsible for control devices that need to beloaded with code to function. Examples of such control devices mayinclude electromechanical devices (tracking balls, wheels, reels, etc.)and dynamic buttons (such as buttons displayed on a LCD with touchscreen capability). Conventional gaming machines have a dedicatedphysical switch responsible for enabling hardware controller resets. Themanagement options may be configured to perform a similar function tothe physical switch. In some implementations, the management options mayfurther include an interactive display of information regardinginstalled and available controllers in the gaming machine so that thetechnician or administrator may control resets at the individualcontroller level.

Performance testing allows a technician or administrator to check andmaintain the performance of any component of the gaming machine via thewireless device. For instance, the wireless device may be given accessto a gaming machine's cyclic redundancy check (CRC) software. The CRCsoftware may be used to verify the authenticity or version of the gamingmachine's software or firmware. In another example, the managementoptions may allow the wireless device to put hardware components into atest mode. For instance, trim lights that are used to attract customerswith dancing light patterns may be put into a test mode to ensure thatthey are lighting up correctly.

Similar techniques may be used to perform display adjustments on thegaming machine. For instance, gaming machine displays typically needsize and position adjustments when being installed. In someimplementations, the management options may also provide brightness,contrast, and other video display adjustments via the wireless device.In another example, the management options may provide performancetesting for any of the peripheral devices discussed above with referenceto FIGS. 1, 2A and 2B.

Any or all of the example functionality described above may beimplemented via an interactive information display. The interactiveinformation display may be provided by the management options of thegaming machine on the wireless device. The interactive informationdisplays allow a user, such as a manager or administrator, to monitorthe status of the gaming machine and its components and to performmaintenance responsive to the status, remotely via the wireless deviceor otherwise.

Casino Floor Management App

In some implementations, the wireless device may provide an interactiveinterface for managing a casino floor. FIG. 5 shows a flow diagram of amethod 500 for managing a casino floor, in accordance with someimplementations. In some implementations, a casino floor includes gamingmachines, tables, and devices. In the gaming industry, it would beadvantageous for a casino manager or pit boss to keep track and managethe different gaming machines, tables, and devices on the casino floorwith just a wireless device. At 501, communication is established with agaming machine or a network server. At 504, it is determined whether auser has access to manage a casino floor.

At 506, if it is determined that the user has access, the wirelessdevice will then display a casino floor layout screen. In someimplementations, this display can be in the form of an app on a wirelessdevice. At 508, the user is given access to manage the gaming machines,tables, and devices on the casino floor. If it is determined that theuser does not have access, access to the casino floor layout screen isdenied at 510. At this point, the method 500 may be considered completeat 512.

In some implementations, there can be different levels of security fordifferent levels of casino floor management. Examples of security levelsfrom highest to lowest include, administrators, pit bosses, casinotechnicians, and cash drop crews.

In some implementations, this method can work in conjunction with themethod of accessing management options of a gaming machine. Forinstance, an app on a wireless device may display the layout of thecasino floor along with representations and locations of gamingmachines, tables, and devices on the casino floor. Depending on thelevel of security access accessible by the user, certain ones of thegaming machines, tables, and devices on the casino floor may beindividually accessed and managed by the user. In one example, this maybe performed by selecting a representation of a gaming machine, table,or device on the layout of the casino floor. Once certain ones of thegaming machines, tables, and devices have been individually accessed bythe user, the method for accessing management options of a gamingmachine as described in FIG. 4 can be utilized.

In some implementations, the interactive interface for managing a casinofloor further includes drop and drop capability. For instance, a usermay drag and drop certain configurations or settings from a first gamingmachine displayed on the layout of the casino floor to a second gamingmachine displayed on the layout. Performing such an action is astreamlined method for transferring configurations on one gaming machineto a second gaming machine.

FIG. 6 shows a gaming network, configured in accordance with someimplementations and will be discussed in more detail later in theapplication.

In Casino Location Services

In some implementations, the location of the wireless device may betracked and used to provide various location-based services to the userof the wireless device. FIG. 7 shows a flow diagram of a method 700 forproviding in casino location services, performed in accordance with someimplementations. At 701, communication is established with a wirelessdevice and a network server. It should be noted that in someimplementations, communication could also be established with a gamingmachine instead of a network server.

At 702, the location of the user is determined. In some implementations,location can be determined using Wi-Fi technology, GPS, or cell towertriangulation. In some implementations, location can be determined usingthe same method of communication as described elsewhere in thespecification, for example, with reference to the keyless entrytechnique of FIG. 3. Still in other implementations, location isdetermined by determining which gaming machine the user is nearestand/or with which gaming machine the user's wireless device hasestablished communication.

In some implementations, a category for the user is determined at 704.In some implementations, one category of user is customer or patron. Insome implementations, at 708, once the category of the user has beendetermined to be customer or patron, in casino location services areprovided. In some implementations, for customers or patrons, the incasino location services include, but are not limited to, proximitybased advertising, gaming information, and user customizable alerts. Anexample of such a service can be an alert to a customer that a jackpotis due in the proximity of the customer. Another example of such aservice can be in the form of a notice to the customer regarding theoperational status of nearby gaming machines. For instance, the noticemay indicate that a gaming machine is out of service, locked down orotherwise unplayable. Still another example of such a service could bein the form of a special promotion offered to customers for certaingaming machines in the area.

In some implementations, at 706, once the category of the user has beendetermined to be casino employee, in casino location services areprovided. In some implementations, for casino employees, in casinolocation services include, but are not limited to, proximityverification, proximity based maintenance and security alerts, anduser/employee tracking. At this point, the method 700 may be consideredcomplete at 710.

In some implementations, proximity verification can work in conjunctionwith keyless entry into a gaming machine as described earlier in theapplication. For example, proximity verification can allow for higherlevel management or floor management software to verify whether a user,i.e. a casino technician, is physically within a certain proximitybefore allowing the user to gain access into the gaming machine.

In some implementations, automated maintenance and security alerts canbe dispatched using the in casino location services to the nearestcasino technician or casino employee available in the area. In thisfashion, in casino location services greatly reduces the response timefor technical issues or security problems.

In some implementations, in casino location services can also be used byhigher level management to keep track of employees and manage the floormore effectively.

Lockdown Button

Lockdown refers to a security action that places the gaming machine outof service, temporarily out of order, and other such actions. In someimplementations, the wireless device may provide a virtual lockdownbutton for the gaming machine. Such functionality may be implemented,for instance, via the management options of the gaming machine discussedabove with reference to FIG. 3.

FIG. 8 shows a flow diagram of a method 800 for locking down a gamingmachine, performed in accordance with some implementations. At 801,communication is established between a user's wireless device and agaming machine or a network server. At 802 and 804, it is determinedwhether the user has access to lock down the gaming machine. If the userhas access, then the user is allowed to lock down the gaming machine viaa lock down button on the wireless device at 806. If the user does nothave access, the user is not allowed to lock down the gaming machine at808. At this point, the method 800 may be considered complete at 810.

In some implementations, the lock down button need not be on a wirelessdevice. For example, the lock down button could be achieved on acomputing device connected to the casino network anywhere in the casino.In addition, the lock down button can be on the gaming machine itself orany external device in communication with the gaming machine.

In some implementations, the lock down button can be implemented insoftware on the wireless device or an app on the wireless device. Thelock down button can be either an actual physical button or a virtualbutton (e.g., a video graphic button displayed on a touch screen) on agaming machine or a wireless device.

In some implementations, lock down may refer to a single security actionor a set of security actions that could range from minor to severe. Insome implementations, the lock down actions could be programmable andcustomizable to a user's needs and/or jurisdictional requirements. Forexample, in some implementations, lock down can refer to placing thegaming machine in an unplayable state. In some implementations, lockdown can refer to restricting keyless entry access for a determinedamount of time. In some implementations, lock down may be used to stop asecurity violation, such as improper tampering with the gaming machine.For instance, lock down may stop game play on the gaming machine. Visualalarms, such as flashing lights, and audio alarms may also be set offwhen the gaming machine is locked down for security reasons.

In some implementations, the lock down button can refer to differentlevels of lock down depending on the security level access of the user.For example, a casino technician could possibly have access to lock downa gaming machine as temporarily out of order due to mechanical issues.However, the casino technician would probably not have enough securityaccess to lock down a gaming machine for other management or securityreasons, but a casino administrator might have the authority to do so.In some implementations, the lock down button can lock down one gamingmachine or multiple gaming machines at once, assuming the user hassufficient access to do so.

In some implementations, the network server or gaming machines may beconfigured to detect triggering events. One instance of a triggeringevent includes when one of the cabinets of the gaming machine has beenopened without proper authorization. In such a case, the gaming machinemay send a message to the network server, and the network server mayrespond with an indication to lock down the gaming machine. In anotherexample, the gaming machine may determine lock down itself withoutcommunication with the network server. Here, the gaming machine may senda message or alert to the network server after lock down.

In some implementations, the state of the gaming machine prior to lockdown is stored in a non-volatile memory. The non-volatile memory may belocated in the gaming machine or on a network server. This may beuseful, for example, when the gaming machine is being locked down toprevent unauthorized tampering or hacking into the gaming machine toalter the wager game in any way. Once the state of the gaming machine isstored in the non-volatile memory, the gaming machine may be shut downor otherwise rendered inoperable for a determined period of time. Anadministrator, technician, or other operator may then use the datastored in the non-volatile memory to determine the state of the gamingmachine before lock down for maintenance or investigatory purposes. Uponunlocking the gaming machine, the state of the gaming machine may bereconstructed from the data in the non-volatile memory, allowing gameplay to continue at the state prior to lock down.

Digital Log Book

A digital log book may be used to track the various events on the gamingmachine. Qualifying entry events can include, but are not limited to,maintenance tasks, gaming machine accesses, and cash drops. Furthermore,any configurations or maintenance tasks performed with the managementoptions of the gaming machine may be logged in the digital log book.Gaming machines and network servers may each have individual digital logbooks. In some implementations, the digital log book is stored in amemory of each gaming machine, such as a memory 1190 of the examplegaming machine 1100 shown in FIG. 11. In other implementations, one ormore network servers may store the digital log book for one or moregaming machines.

In some implementations, the wireless device may provide access to thedigital log book of a gaming machine. Such functionality may beimplemented, for instance, via the management options of the gamingmachine discussed above with reference to FIG. 3. By using similartechniques, the wireless device may also provide access to the digitallog book of a network server.

FIG. 9 shows a flow diagram of a method 900 for implementing a digitallog book, performed in accordance with some implementations. At 901, acommunication is established with a gaming machine or a network server.For instance, a user may request access to the digital log using thewireless device. At 902, it is determined whether the user has access tothe gaming machine. At 904, it is determined whether the user has accessto the digital log book. At 906, if it is verified that the user hasaccess to the digital log book, the user is allowed to access, view orwrite to the digital log book. At this point, the method 900 may beconsidered complete at 908.

In some implementations, the digital log book is protected by highlevels of security in order to maintain the integrity of the log eventsand entries. In some implementations, modifying and/or deleting entriesmay require a higher security clearance level than the securityclearance level required to add entries or to view entries.

In some implementations, the digital log book can be tied to keylessentry systems. For instance, an entry to the digital log book may beadded each time keyless entry to the gaming machine is requested orgranted. In some implementations, the gaming machine may be furtherconfigured to add entries in the log book upon any qualifying entryevent. In some implementations, the digital log book can be customizableor upgradable according to the user's preferences. Any of thefunctionalities described with reference to FIGS. 3-10 may be recordedin the digital log book.

Keyless Entry and in Casino Location Services Via Digital Camera

In some implementations, the keyless entry and in casino locationservices described above with reference to FIGS. 3 and 7 above may beimplemented with the use a digital camera located on the wirelessdevice. FIG. 10 shows a flow diagram of a method 1000 for providing incasino location services via the digital camera. At 1001, a wirelessdevice establishes a communication with a gaming machine or networkserver.

At 1002, a user takes a digital image (photograph) with a digital cameraon the wireless device. The digital image is then uploaded to the gamingmachine or to the network via a network server. At 1004, the location ofthe user is determined based on the digital image uploaded. At 1006, incasino location services are provided based on the digital image or thelocation of the user as determined based on the digital image. At thispoint, the method 1000 may be considered complete at 1008.

In some implementations, the method 1000 is performed via an app orother software program on the wireless device. In some implementations,the digital image taken is automatically uploaded to the gaming machineor network server upon being taken by the user. In some implementations,the app or other software program on the wireless device utilizes theoriginal camera functions of the wireless device and additionally addson an extra layer of security and protocol in order to establish aconnection with the gaming machine or casino network. Alternatively, theapp or software program can connect to the Internet and digital imagescan be uploaded to the Internet to be utilized by the casino. In someimplementations, the app or software program would connect to adedicated web-portal, e.g. a web-portal developed and dedicatedspecifically to gaming.

In some implementations, in casino location services using the digitalimage can include all of the in casino services described earlier in theapplication. Additionally, in some implementations, in casino locationservices can include allowing a user, such as a technician, to take adigital image of the serial tag of the gaming device in order to gainaccess to device entry or information menus available. In someimplementations, a user may submit a machine trouble ticket along with adigital image of the gaming machine in order to better describe theissue. In some implementations, a user, such as a customer, may beallowed to review a gaming machine. The digital image taken wouldinitiate the review and pattern recognition software might allow the appor software program to recognize the gaming device in the digital imagein order to attribute the correct review to the correct gaming device.In some implementations, the user may be allowed to take a digital imageof the user's surroundings and the pattern recognition software can beused to determine the location of the user. In some implementations,once the location has been determined, the app or software program mayallow the user to utilize an in casino map, directions, and up to datelocation information similar to GPS but within the casino, possibly overthe casino's secure network. In some implementations, the app orsoftware program can use the digital camera feature for userparticipation in casino scavenger hunts and/or other challenges andreward systems.

As mentioned above, in some implementations, the app or software programcan utilize the camera for facilitating keyless entry into a gamingmachine. For instance, the digital camera can be used to take a photo tostart the keyless entry process. The digital camera could be used toverify that the user is within the vicinity.

Components of a Gaming Machine and Wireless Device

FIG. 11 shows a gaming machine and its component parts, configured inaccordance with some implementations. A gaming machine 1100 may includea controller 1110 configured to provide communications between a display1120, a communication component (“CC”) 1130, a CPU 1150, a main cabinetdoor 1162 and a cash drop door 1140. The display 1120 is configured todisplay a user and communication interface. The communication component1130 is configured to communicate directly with a wireless device (e.g.,wireless device 1200 shown in FIG. 12) or a network server (e.g., server630 shown in FIG. 6). The CPU 1150 with a cache 1151 is an example ofthe one or more processors configured to perform the functions describedearlier in the application. The CPU 1150 works in conjunction with thecommunication component 1130 and the controller 1110 to establishkeyless entry access into the gaming machine. Once keyless access hasbeen granted, a main cabinet locking mechanism (“MCLM”) 1160 unlocks,allowing access to the main cabinet door 1162. As discussed above, themain cabinet door 1162 prevents unauthorized access to the main cabinet4 of the gaming machine wherein gaming machine hardware is stored. Thekeyless entry system can also allow access to a cash drop door (“CDD”)1140 via a cash drop locking mechanism (“CDLM”) 1142. The gamingmachine, as discussed, may include speakers (“SPK”) 1180, lights 1182,and a memory 1190.

FIG. 12 shows a wireless device and its component parts, in accordancewith some implementations. The wireless device 1200 includes a CPU 1250with a cache 1251. The CPU 1250 is in communication with a communicationcomponent (“CC”) 1230 and an authorization component (“AC”) 1260. Insome implementations, the authorization component 1260 is implemented insoftware run on the CPU 1250. User interface and apps are displayed on adisplay 1220. A location service component (“LSC”) 1270 can also be incommunication with the CPU 1250. In some implementations, the locationservice component 1270 may be implemented in software on the CPU 1250.The wireless device 1200 also includes a linking component (“LC”) 1280in communication with the CPU 1250. In some implementations, the linkingcomponent 1280 can be in the form of a wireless connection. The wirelessdevice 1200 also includes a memory 1290 and a digital camera 1240. Asdiscussed, the wireless device may in various examples be a cell phone,a smart phone, a tablet computer, a PDA, a personal computer, or alaptop computer.

Gaming Network

FIG. 6 shows a gaming network, configured in accordance with someimplementations. Those of skill in the art will realize that thisarchitecture and the related functionality are merely examples and thatthe present disclosure encompasses many other such implementations andmethods.

In FIG. 6, a casino computer room 620 and networked devices of a gamingestablishment 605 are illustrated. The gaming establishment 605 may beconfigured for communication with a central system 663 via a firewall640, a network 629, and a gateway 650. Gaming establishments 693, 695and 697 may contain some or all of the features of the gamingestablishment 605. Furthermore, the gaming establishments 693, 695 and697 may also be configured for communication with the central system 663via firewalls 694, 696 and 698 respectively and via the network 629.

In some implementations, gaming establishments may be configured forcommunication with one another. In this example, gaming establishments693 and 695 are configured for communication with the casino computerroom 620. Such a configuration may allow devices and/or operators in thegaming establishment 605 to communicate with and/or control devices inother casinos. In some such implementations, a server (e.g., the server630) in the casino computer room 620 may control devices in the gamingestablishment 605 and devices in other gaming establishments.Conversely, devices and/or operators in another gaming establishment maycommunicate with and/or control devices in the gaming establishment 605.

For example, the server 630 may be provisioned with relatively moreadvanced software (e.g., 3-D facial recognition software) for patronidentification than servers of other networked locations. Such a servermay process patron identification requests from devices in gamingestablishment 605 as well as patron identification requests from devicesin gaming establishments 693 and 695.

The gaming establishment 697 is configured for communication with thecentral system 663, but is not configured for communication with othergaming establishments. Some gaming establishments (not shown) may not bein communication with other gaming establishments or the central system663.

The gaming establishment 605 further includes multiple gaming machines621, each of which is part of a bank of gaming machines 621. In theexample shown in FIG. 6, the gaming establishment 605 also includes abank of networked gaming tables 653. However, the present disclosure maybe implemented in gaming establishments having any number of gamingmachines, gaming tables, etc. It will be appreciated that many gamingestablishments include hundreds or even thousands of gaming machines 621and/or gaming tables 653, not all of which are necessarily included in abank and some of which may not be connected to a network. At least someof the gaming machines 621 and/or the mobile device 670 (e.g., thewireless device 1200 in FIG. 12) may be “thin clients” that areconfigured to perform client-side methods as described elsewhere herein.

Some of the gaming machines or mobile devices can provide automated,multi-player roulette, blackjack, baccarat, and other table games. Thetable games may be conducted by a dealer and/or by using some form ofautomation, which may include an automated roulette wheel, an electronicrepresentation of a dealer, etc. In some such implementations, devicessuch as cameras, radio frequency identification devices, etc., may beused to identify and/or track playing cards, chips, etc. Some of gamingtables 653 may be configured for communication with individual playerterminals (not shown), which may be configured to accept bets, presentan electronic representation of a dealer, indicate game outcomes, etc.

The gaming establishment 605 also includes networked kiosks 677.Depending on the implementation, the kiosks 677 may be used for variouspurposes, including but not limited to cashing out, prize redemption,redeeming points from a player loyalty program, redeeming “cashless”indicia such as bonus tickets, smart cards, etc. In someimplementations, the kiosks 677 may be used for obtaining informationabout the gaming establishment, e.g., regarding scheduled events (suchas tournaments, entertainment, etc.), regarding a patron's location,etc. Software related to such features may be provided and/orcontrolled, and related data may be obtained and/or provided, accordingto the present disclosure. For example, in some implementations of thedisclosure, the kiosks 677 may be configured to receive information froma patron, e.g., by presenting graphical user interfaces.

Also as shown in FIG. 6, each bank of gaming machines has acorresponding switch 615, which may be a conventional bank switch insome implementations. Each switch 615 is configured for communicationwith one or more devices in the casino computer room 620 via a mainnetwork device 625, which combines switching and routing functionality.Although various communication protocols may be used, some preferredimplementations use the Gaming Standards Association's G2S MessageProtocol. Other implementations may use International Game Technology's(IGT) open, Ethernet-based SuperSAS® protocol, which IGT makes availablefor downloading without charge. Still other protocols, including but notlimited to Best of Breed (“BOB”), may be used to implement variousexamples of the disclosed subject matter. IGT has also developed agaming-industry-specific transport layer called CASH that rides on topof Transmission Control Protocol/Internet Protocol (TCP/IP) and offersadditional functionality and security.

The gaming establishment 605 also includes a radio-frequencyidentification (RFID) network, implemented in part by RFID switches 619and multiple RFID readers 617. An RFID network may be used, for example,to track objects (such as mobile device 670, which include RFID tags 627in one example), patrons, etc., in the vicinity of the gamingestablishment 605.

As noted elsewhere herein, some implementations of the disclosure mayinvolve “smart” player loyalty instruments, such as player trackingcards, which include an RFID tag. Accordingly, the location of suchRFID-enabled player loyalty instruments may be tracked via the RFIDnetwork. In FIG. 6, the mobile device 670 may include an RFID tag 627which includes encoded identification information for the mobile device670. Accordingly, the locations of the tagged mobile device 670 may betracked via the RFID network in gaming establishment 605. Otherlocation-detection devices and systems, such as the global positioningsystem (“GPS”), may be used to monitor the location of people and/ordevices in the vicinity of the gaming establishment 605 or elsewhere.

Various alternative network topologies can be used to implementdifferent examples of the disclosure and/or to accommodate varyingnumbers of networked devices. For example, gaming establishments withlarge numbers of gaming machines 621 may require multiple instances ofsome network devices (e.g., of main network device 625, which combinesswitching and routing functionality in this example) and/or theinclusion of other network devices not shown in FIG. 6. Someimplementations of the disclosure may include one or more middlewareservers disposed between kiosks 677, RFID switches 619 and/or bankswitches 615 and one or more devices in the casino computer room 620(e.g., a corresponding server). Such middleware servers can providevarious useful functions, including, but not limited to, the filteringand/or aggregation of data received from switches, from individualgaming machines and from other devices. Some implementations of thedisclosure include load-balancing methods and devices for managingnetwork traffic.

Storage devices 611, the server 630, License Manager 631, arbiter 633,servers 632, 634, 636 and 638, host device(s) 660 and main networkdevice 625 are disposed within the casino computer room 620 of gamingestablishment 605. In practice, more or fewer devices may be used.Depending on the implementation, some such devices may reside in gamingestablishment 605 or elsewhere. These servers or devices may operate to,but are not limited to, provide for the implementation of tasks specificto the present disclosure in conjunction with devices such as the wagergaming machines 621 and the mobile device 670. For example, the mobiledevice 670 may connect with the server 630 and receive the managementoptions for a gaming machine via a user interface provided by the server630. In another example, the server 630 provides to the wireless devicemanagement options for a plurality of gaming machines by also providingthe casino floor management application and the casino floor layoutscreen discussed above with reference to FIG. 5.

One or more devices in the central system 663 may also be configured toperform, at least in part, tasks specific to the present disclosure. Forexample, one or more servers 662 and/or one or more storage devices 664may be configured to provide to the management options of a gamingmachine discussed above with reference to FIG. 4.

One or more of the servers of the casino computer room 620 may beconfigured with software for receiving a player's wager gamingnotification parameters, determining when a wagering conditioncorresponds with the wager gaming notification parameters and/orproviding a notification to the player when the wagering conditioncorresponds with the wager gaming notification parameters. Moreover, oneor more of the servers may be configured to receive, process and/orprovide image data from casino floor cameras 609, to provide navigationdata to patrons (e.g., to indicate the location of and/or directions toa gaming table, a wager gaming machine, etc., associated with a wagergaming notification), etc.

For example, navigation data (which may include map data, casino layoutdata, camera image data, etc.) may be provided by one or more of theservers of the casino computer room 620 to the mobile device 670. Someimplementations of the present disclosure include, as noted, a pluralityof networked cameras 609, which may be video cameras, smart cameras,digital still cameras, etc. In some such implementations, such camerasmay provide, at least in part, real-time navigation.

Other devices that may be deployed in the gaming network do not appearin FIG. 6. For example, some gaming networks may include not onlyvarious radio frequency identification (“RFID”) readers 617, but alsoRFID switches, middleware servers, etc., some of which are not depictedin FIG. 6. These features may provide various functions. For example, aserver (or another device) may determine a location of a mobile device670 according to the location of an RFID reader that reads an RFID tag627.

The servers and other devices indicated in FIG. 6 may be configured forcommunication with other devices in or outside of the gamingestablishment 605, such as the host devices 660, the kiosks 677 and/orthe mobile device 670, for implementing some methods described elsewhereherein. Servers (or the like) may facilitate communications with suchdevices, receive and store patron data, provide appropriate responses,etc., as described elsewhere herein.

Some of these servers may be configured to perform tasks relating toaccounting, player loyalty, bonusing/progressives, configuration ofgaming machines, etc. One or more such devices may be used to implementa casino management system, such as the IGT Advantage™ Casino Systemsuite of applications, which provides instantaneous information that maybe used for decision-making by casino managers. A Radius server and/or aDHCP server may also be configured for communication with the gamingnetwork. Some implementations of the disclosure provide one or more ofthese servers in the form of blade servers.

Some implementations of the server 630 and the other servers shown inFIG. 6 include (or are at least in communication with) clustered CPUs,redundant storage devices, including backup storage devices, switches,etc. Such storage devices may include a “RAID” (originally redundantarray of inexpensive disks, now also known as redundant array ofindependent disks) array, back-up hard drives and/or tape drives, etc.

In some implementations, many of these devices (including but notlimited to the License Manager 631, the servers 632, 634, 636, and 638,and the main network device 625) are mounted in a single rack with theserver 630. Accordingly, many or all such devices will sometimes bereferenced in the aggregate as an “Sb™ server.” However, in alternativeimplementations, one or more of these devices is in communication withthe server 630 and/or other devices of the network but locatedelsewhere. For example, some of the devices could be mounted in separateracks within the casino computer room 620 or located elsewhere on thenetwork. Moreover, it can be advantageous to store large volumes of dataelsewhere via a storage area network (“SAN”).

The casino computer room 620 may include one or more operator consolesor other host devices that are configured for communication with otherdevices within and outside of the casino computer room 620. Such hostdevices may be provided with software, hardware and/or firmware forproviding various implementations of the disclosure. However, such hostdevices need not be located within the casino computer room 620. Thehost devices 660 (which are desktop and laptop computers in thisexample) and the mobile device 670 (which are PDAs in this example) maybe located elsewhere in the gaming establishment 605 or at a remotelocation.

These and other aspects of the disclosure may be implemented by varioustypes of hardware, software, firmware, etc. For example, some featuresof the disclosure may be implemented, at least in part, bymachine-readable media that include program instructions, stateinformation, etc., for performing various operations described herein.Examples of program instructions include both machine code, such asproduced by a compiler, and files containing higher-level code that maybe executed by the computer using an interpreter. Examples ofmachine-readable media include, but are not limited to, magnetic mediasuch as hard disks, floppy disks, and magnetic tape; optical media suchas CD-ROM disks; magneto-optical media; and hardware devices that arespecially configured to store and perform program instructions, such asread-only memory devices (“ROM”) and random access memory (“RAM”).

Any of the above implementations may be used alone or together with oneanother in any combination. Although various implementations may havebeen motivated by various deficiencies with the prior art, which may bediscussed or alluded to in one or more places in the specification, theimplementations do not necessarily address any of these deficiencies. Inother words, different implementations may address differentdeficiencies that may be discussed in the specification. Someimplementations may only partially address some deficiencies or just onedeficiency that may be discussed in the specification, and someimplementations may not address any of these deficiencies.

While various implementations have been described herein, it should beunderstood that they have been presented by way of example only, and notlimitation. Thus, the breadth and scope of the present applicationshould not be limited by any of the implementations described herein,but should be defined only in accordance with the following andlater-submitted claims and their equivalents.

What is claimed is:
 1. A gaming machine comprising: a main cabinetincluding a main cabinet door, the main cabinet enclosing hardware ofthe gaming machine; a main cabinet locking mechanism configured tocontrol access to the main cabinet via the main cabinet door; acommunication interface configured to communicate with a wireless deviceand a network server; and one or more processors configured to: receivea first request from the wireless device for access to the main cabinet,facilitate verifying by the network server whether a user associatedwith the wireless device has access to the main cabinet, and uponobtaining verification from the network server that the user has accessto the main cabinet, unlock the main cabinet locking mechanism.
 2. Thegaming machine of claim 1, wherein the one or more processors arefurther configured to: upon obtaining verification from the networkserver that the user has access to the main cabinet, allow the user tocontrol locking and unlocking of the main cabinet locking mechanism withthe wireless device.
 3. The gaming machine of claim 1, furthercomprising: a cash drop cabinet including a cash drop door, the cashdrop cabinet configured to store wager game currency; a cash dropcabinet locking mechanism configured to control access to the cash dropcabinet via the cash drop door; and wherein the one or more processorsare further configured to: receive a second request from the wirelessdevice for access to the cash drop cabinet; facilitate verifying by thenetwork server whether the user associated with the wireless device hasaccess to the cash drop cabinet; and upon obtaining verification fromthe network server that the user has access to the cash drop cabinet,unlock the cash drop cabinet locking mechanism.
 4. The gaming machine ofclaim 3, wherein the one or more processors are further configured to:upon obtaining verification from the network server that the user hasaccess to the cash drop cabinet, allow the user to control locking andunlocking of the cash drop cabinet locking mechanism with the wirelessdevice.
 5. The gaming machine of claim 3, wherein successfully obtainingverification from the network server for access to the cash drop cabinetrequires the user to have a first security clearance level.
 6. Thegaming machine of claim 5, wherein successfully obtaining verificationfrom the network server for access to the main cabinet requires the userto have a second security clearance level higher than the first securityclearance level.
 7. The gaming machine of claim 1, wherein the wirelessdevice is a cell phone, a smart phone, a tablet computer, a PDA, apersonal computer, or a laptop computer.
 8. A method for keyless entryinto one or more cabinets of a gaming machine via a wireless deviceassociated with a user, comprising: receiving, at one or more processorsof the gaming machine, a first request from the wireless device foraccess to a main cabinet via a main cabinet door, the main cabinetenclosing hardware of the gaming machine; sending the first request to anetwork server; receiving a first response from the network serververifying whether the user has access to the main cabinet; and uponobtaining verification from the network server that the user has accessto the main cabinet, unlocking a main cabinet locking mechanism, themain cabinet locking mechanism configured to control access to the maincabinet via the main cabinet door.
 9. The method of claim 8, furthercomprising: upon obtaining verification from the network server that theuser has access to the main cabinet, allowing the user to controllocking and unlocking of the main cabinet locking mechanism with thewireless device.
 10. The method of claim 8, further comprising:receiving, at one or more processors of the gaming machine, a secondrequest from the wireless device for access to a cash drop cabinet via acash drop door, the cash drop cabinet configured to store wager gamecurrency; sending the second request to the network server; receiving asecond response from the network server verifying whether the user hasaccess to the cash drop cabinet; and upon obtaining verification fromthe network server that the user has access to the cash drop cabinet,unlocking a cash drop cabinet locking mechanism, the cash drop cabinetlocking mechanism configured to control access to the cash drop cabinetvia the cash drop cabinet door.
 11. The method of claim 10, furthercomprising: upon obtaining verification from the network server that theuser has access to the cash drop cabinet, allowing the user to controllocking and unlocking of the cash drop cabinet locking mechanism withthe wireless device.
 12. The method of claim 10, wherein successfullyobtaining verification from the network server for access to the cashdrop cabinet requires the user to have a first security clearance level.13. The method of claim 12, wherein successfully obtaining verificationfrom the network server for access to the main cabinet requires the userto have a second security clearance level higher than the first securityclearance level.
 14. The method of claim 8, wherein the wireless deviceis a cell phone, a smart phone, a tablet computer, a PDA, a personalcomputer, or a laptop computer.
 15. A non-transitory computer-readablestorage medium storing instructions executable by a computing device toperform a method for keyless entry into one or more cabinets of a gamingmachine via a wireless device associated with a user, the methodcomprising receiving, at one or more processors of the gaming machine, afirst request from the wireless device for access to a main cabinet viaa main cabinet door, the main cabinet enclosing hardware of the gamingmachine; sending the first request to a network server; receiving afirst response from the network server verifying whether the user hasaccess to the main cabinet; and upon obtaining verification from thenetwork server that the user has access to the main cabinet, unlocking amain cabinet locking mechanism, the main cabinet locking mechanismconfigured to control access to the main cabinet via the main cabinetdoor.
 16. The non-transitory computer-readable storage medium of claim15, the method further comprising: upon obtaining verification from thenetwork server that the user has access to the main cabinet, allowingthe user to control locking and unlocking of the main cabinet lockingmechanism with the wireless device.
 17. The non-transitorycomputer-readable storage medium of claim 15, the method furthercomprising: receiving, at one or more processors of the gaming machine,a second request from the wireless device for access to a cash dropcabinet via a cash drop door, the cash drop cabinet configured to storewager game currency; sending the second request to the network server;receiving a second response from the network server verifying whetherthe user has access to the cash drop cabinet; and upon obtainingverification from the network server that the user has access to thecash drop cabinet, unlocking a cash drop cabinet locking mechanism, thecash drop cabinet locking mechanism configured to control access to thecash drop cabinet via the cash drop cabinet door.
 18. The non-transitorycomputer-readable storage medium of claim 17, the method furthercomprising: upon obtaining verification from the network server that theuser has access to the cash drop cabinet, allowing the user to controllocking and unlocking of the cash drop cabinet locking mechanism withthe wireless device.
 19. The non-transitory computer-readable storagemedium of claim 17, wherein successfully obtaining verification from thenetwork server for access to the cash drop cabinet requires the user tohave a first security clearance level.
 20. The non-transitorycomputer-readable storage medium of claim 19, wherein successfullyobtaining verification from the network server for access to the maincabinet requires the user to have a second security clearance levelhigher than the first security clearance level.
 21. The non-transitorycomputer-readable storage medium of claim 15, wherein the wirelessdevice is a cell phone, a smart phone, a tablet computer, a PDA, apersonal computer, or a laptop computer