Patent application number | Description | Published |
20080214300 | METHODS FOR ELECTRONIC DATA SECURITY AND PROGRAM AUTHENTICATION - Apparatus and methods for improving security and preventing tampering in a gaming system are described. In particular, the gaming system may comprise an authorization device that is configured to control a download of gaming data, such as an executable image for generating a game of chance, from a first gaming device to a second gaming device. For each download between two different devices, the authorization device may be operable to generate a unique encryption key pair utilized in the download and determine whether the downloaded data is authentic. The gaming device receiving the download of game data may be configured such that it doesn't utilize the game data until an approval is received from the authorization device. | 09-04-2008 |
20080313636 | SYSTEM AND METHOD FOR SECURE AUTOMATED DATA COLLECTION - The invention provides for an automated data collection having an endpoint coupled to at least one gaming machine to collect data from the at least one gaming machine, at least one concentrator in communication with the endpoint via a personal area network to obtain the data from the endpoint, and at least one remote collection server in communication with the at least one concentrator to receive the data from the at least one concentrator, wherein the data is pushed from the endpoint to the at least one remote collection server at predefined time intervals without interrupting game play on the at least one gaming machine. | 12-18-2008 |
20090104954 | METHODS AND SYSTEMS FOR TRACKING AN EVENT OF AN EXTERNALLY CONTROLLED INTERFACE - A method for tracking an event of an externally controlled interface (ECI) is described. The method includes generating the externally controlled interface independent of an outcome of a wager-based game regulated by a regulatory authority, and logging the event of the externally controlled interface. | 04-23-2009 |
20090104989 | SEPARABLE BACKLIGHTING SYSTEM - A gaming machine may have an optical module having a first display screen configured to output a visual image in response to a control signal, and a lighting module having light film on a first surface, a plate on a second surface, and a plurality of light sources positioned in an interior region formed by the light film and plate, wherein the plurality of light sources provide light to the optical module, and wherein the lighting module is removably coupled to the optical module such that the lighting module may be replaced or serviced without disturbing the optical module. | 04-23-2009 |
20100016073 | AUTOMATED AND SECURE DATA COLLECTION FOR SECURING AND MANAGING GAMING NETWORKS - Data collected by a secure automated data collection system can be used to effectively manage various gaming systems including wired and/or wireless gaming networks. Managing a gaming network can, for example, include securing the gaming network against unauthorized access and/or unauthorized devices, changing the mode and/or manner of communication, and generating and providing alerts. A gaming management system can be operable to monitor transmissions made in a gaming network including transmissions made to and from at least one gaming device, obtain data pertaining to the transmissions, and manage the gaming network based on the data. | 01-21-2010 |
20100105454 | METHODS AND SYSTEMS FOR INTERFACING WITH A THIRD-PARTY APPLICATION - A system for interfacing with a third-party application is described. The system includes a third-party device, a server-based system configured to communicate with the third-party device, and a gaming device configured to communicate with the server-based system to display content of the product or service. The gaming device is configured to generate an outcome of a wager-based game independent of the content that is displayed. | 04-29-2010 |
20110230268 | COMMUNICATION METHODS FOR NETWORKED GAMING SYSTEMS - Methods and devices are provided for secure identification and authentication of computing hardware connected to wired or wireless networks, including but not limited to thin clients in server-based systems, mobile gaming devices, etc. Some implementations involve a frequent exchange of information between networked devices. In some implementations the exchange may be so frequent as to be effectively a constant exchange of information, though there may be small time intervals during which no such information is exchanged. Some preferred methods are effective against both external attacks and those benefiting from assistance or information provided by those with administrative access. | 09-22-2011 |
20130035157 | METHODS AND SYSTEMS FOR INTERFACING WITH A THIRD-PARTY APPLICATION - A system for interfacing with a third-party application is described. The system includes a third-party device, a server-based system configured to communicate with the third-party device, and a gaming device configured to communicate with the server-based system to display content of the product or service. The gaming device is configured to generate an outcome of a wager-based game independent of the content that is displayed. | 02-07-2013 |
20130123007 | BEHAVIORAL BIOMETRICS FOR AUTHENTICATION IN COMPUTING ENVIRONMENTS - Techniques for authenticating one or more entities are disclosed. Authentication can be performed based on one or more attributes associated with an image and/or input provided in connection with an image. The image is effectively provided for authenticating one or more entities associated with a computing environment. The attributes which can be measures include the manner in which an image has been created and/or traced by a person being authenticated. A person can initially register with an authentication system by creating and/or tracing an image. Subsequently, the person can be provided with the same, similar and/or completely different image in order to be authenticated by the authentication system. It will be appreciated that the image needs not be a signature or provide any personal information about the person being authenticated. | 05-16-2013 |
20130130774 | REALISTIC VIDEO REELS - Described herein is a gaming machine configured to output video data that simulates mechanical reels in a traditional mechanical slot machine. Embodiments detailed herein contribute to the emulation and perception of a mechanical machine by providing video data adaptations that each simulate a realistic visual attribute of a mechanical reel gaming machine. | 05-23-2013 |