Home
Computer w? l"
Contents
1. firewire serial parallel or other type of connector now known or later developed that provides releasable engagement for an electrical device Internal to the security key is a bi directional communica tion driver 308 such as a RJ 45 driver or any other type driver It is contemplated that the driver 308 facilitates bi directional communication between the key and the progressive control ler 102 through the key interface 104 The driver 308 addi tionally provides a power source conduit to the internal com ponents of the key The security key further comprises a power conditioner 312 that supplies power to the internal non volatile memory 316 and the microprocessor 320 The power conditioner 312 transforms filters or stores electrical power for use by the memory 316 microprocessor 320 or both The non volatile memory 316 is accessible by the proces sor 320 and stores data as described above and configured to receive executable code for processing functionality Some examples of non volatile memory 316 are flash memory secured digital memory or other types of memory now known or later developed that provides for reliable and non volatile data storage The microprocessor 320 provides data processing func tionality to the security key and is configured to access data and or run executable code stored within memory 316 It is contemplated that the microprocessor 320 be selected such that the processor is capable of handling the freque
2. pated number generated by the progressive controller then the challenge routine proceeds to a step 632 where the progres sive controller subsequently queries for system identification information stored with in the non volatile memory of the security key In one embodiment it is contemplated that system identi fication information includes specific progressive game net work parameters such as Gaming Establishment Customer Number Maximum Number of Game Devices Maximum Number of Progressives Progressive Controller Serial Num ber Key Serial Number Key Expiration Parameters or other data considered pertinent to the operation of the progressive game network Ata step 636 the security key returns system identification information stored within the key s non volatile memory In one embodiment the system identification information is encrypted by the key processor prior to transmission to the progressive controller Next at a step 640 a comparison is performed between the system identification information returned by the security key and anticipated system identifi cation information stored within the progressive controller In one embodiment there are two possible comparison outcomes for the system identification information If the system identification information returned by the security key does not match the anticipated system identification informa tion within the progressive controller then a system fault would be generated at
3. Cease Communication with Associated Game Devices 424 V Execute Challenge Key Routine 428 V 432 Call Attendant KENo Fault Yes Successtul Yes V Display Progressive Controller Confi guration Menus 444 Y 448 Modify Progressive Controller Settings V Store Modified Controller Settings 452 V Store Modification Date and Time Information Into Event Log 456 V Remove Programming Key from Key Interface 460 V V Insert Run Key Into Key Interface 462 Restart Associated Game Devices 464 Fig 4 U S Patent Mar 1 2011 Sheet 4 of 7 US 7 896 741 B2 Access Progressive Controller 500 V insert Run Key Into Key Interface 506 V Generate Event for Event Log 508 Open Communication with Associated Game Devices 512 Execute Challenge Key Routine 516 V V 524 Y 520 Call Attendant Fault Challenge Yes Successful Yes 536 540 Compare the Number of Game Devices Connected to Controller with Number of Game Devices Licensed for Use A V Disconnect Game Devices in Number of Game Excess of Devices Correct Licensed Allocation Yes V Permit Play of Game Devices 556 Fig 5 U S Patent Mar 1 2011 Sheet 5 of 7 US 7 896 741 B2 600 Initiate Challenge Key Routine V 604 Progressive Controller Generates Random Number Y 608 Random Number is Sent to Key for Response V 612 Key Processor Modifies Random Number Us
4. the controller continually monitors the number of game devices connected to the controller and compares this number to a predetermined maximum number of game devices In the event the number of connected game devices exceeds the predetermined number the excess game devices are automatically disabled In this way the progres sive system manufacturer has increased control over the num ber of game devices that are connected to the game network Thirdly the present invention provides the progressive sys tem manufacturer with an enhanced ability to enforce and control the use of the progressive system Through the use of various expiration parameters the progressive system manu facturer has control over the duration of time that the progres sive system is operable Thus the expiration parameters can be configured to coincide with the expiration of a license agreement In this way a gaming establishment is required to interact with the progressive system manufacture upon expi ration of the license This provides for increased accountabil ity and maintains compliance with the terms of the agree ments While various embodiments of the invention have been described it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible that are within the scope of this invention In addi tion the various features elements and embodiments described herein may be claimed or combined alone in an
5. Client System UMS5000 Client 2005 0009599 A1 1 2005 Ryan 463 29 Paltronics Inc I page Date Unknown 2005 0054446 Al 3 2005 Kammler et al 463 42 One Link Streaming Server UMS50000 SS Paltronics Inc I page Date Unknown 2005 0059494 Al 3 2005 Kammler 463 42 2005 0113172 Al 5 2005 Gong i Shermin Voshmgir XML Tutorial http www javacommerce com i o i ME 2005 0116020 Al 6 2005 Smolucha et al displaypage jsp name intro sql amp id 18238 1999 2005 0148393 Al 7 2005 Crumby cited by examiner U S Patent Mar 1 2011 Sheet 1 of 7 US 7 896 741 B2 a 108 gt Programming Key gt 106 Key Interface Computer Progressive Controller 112 Game Device Interface 1 1 Board Device Interface 2 Board Game NE Rs Board Interface i Game Board fr 1 Game Interface Device Board s 2 Deride Board Fig 1 U S Patent Mar 1 2011 Sheet 2 of 7 US 7 896 741 B2 p 02 Progressive Controller 204 Processor 104 Key Interface 108 Programming Key 106 Fig 2 300 316 Non Volatile Power Power Memory Processor op Driver D Fig 3 U S Patent Mar 1 2011 Sheet 3 of 7 US 7 896 741 B2 400 Access Progressive Controller 404 Controller Configured V Insert Programming Key Into Key Interface 416 V Generate Event for Event Log 420 V 2
6. a step 642 A system fault may generate a Call Attendant alarm which may be displayed upon the progressive controller the associated game devices or both When a Call Attendant alarm occurs the progressive sys tem may become inoperative and require attention from casino management and or casino security Alternatively if the system identification information returned by the security key does match the anticipated sys tem identification information then the progressive controller continues the challenge routine as shown in FIG 6B by proceeding to query the security key for key expiration parameters at a step 644 A key expiration parameter may be a specific date number of days in use number of wagers played an access counter or other parameters upon which the functionality of the security key is scheduled to discontinue In one configuration the expiration parameter is referred to as a gas tank In one embodiment the access counter may be included with the initial configuration of the security key Then as the progressive controller polls or queries the security key the access counter is incremented each time a polling or query is performed In this way the security key has a finite pre determined lifespan and when the access counter reaches a predefined value the security key becomes inoperable It is contemplated that the access counter is incremented by either adding or subtracting polling query events from the initial v
7. algo rithm which is the same algorithm also used by the security key As defined herein the term scrambled refers to various types of data manipulation such as encrypting and or code hashing by which these techniques are well know to one of ordinary skill in the art The scrambled random number is then sent to the security key The security key receives the scrambled random number from the progressive controller Next the security key unscrambles the random number to obtain the original random number generated by the progres sive controller The security key uses this original random number to scramble the data programmed in the security key The security key scrambles the data in a pre determined fash ion using the original random number and the scrambled data is sent back to the progressive controller Upon receipt of the scrambled data the progressive controller unscrambles the data using the original random number to unscramble the data using the same pre defined algorithm used in the security key Additionally included within the scrambled data is a cyclic redundancy check CRC calculation that is used to deter mine the validity of the data This CRC is calculated on the received data after the descrambling of data and is compared to the transmitted CRC If both of these CRC values are identical then the security key data is determined valid As one of ordinary skill in the art will appreciate a cyclic redundancy check CRC i
8. bit modification the progressive controller 102 will automatically recognize the key as a run key 106 In operation the run key 106 authenticates the number of game devices connected to the progressive controller 102 Upon insertion of the run key 106 into the key interface 104 the progressive controller 102 activates and permits authen ticated game devices 120 to participate in the progressive award The key parameters which are stored within the security keys i e run key 106 or programming key 208 comprise but are not limited to Gaming Establishment Customer Num ber Maximum Number of Game Devices Maximum Num ber of Progressives Progressive Controller Serial Number Key Serial Number Key Expiration Parameters or other data considered pertinent to the operation of the progressive game network 100 Alone or in combination the progressive con 20 25 30 35 40 45 50 55 60 65 8 troller the key provides security and authentication function ality for the progressive system FIG 3 illustrates a block diagram ofan exemplary key used in the present invention The exemplary key of FIG 3 is either arun key 106 or programming key 108 The key comprises a key housing 300 which provides structural support and encapsulation ofthe key s electronic components bi direc tional communication connector 304 interfaces with the key interface 104 The communication connector 304 can be a universal serial bus USB
9. must match the new configuration US 7 896 741 B2 15 Ata step 700 the gaming establishment or casino commu nicates progressive system modifications to the progressive system manufacturer The communication occurs in any man ner including telephone written letter email facsimile or other communication techniques now known or later devel oped Once the modifications are communicated to the sys tem manufacturer the modifications and new security key configurations are entered and stored on a computer this occurs at a step 704 The computer preferably has a compre hensive database for storing electronic configuration data Ata step 708 the progressive system manufacture obtains a set of blank or unprogrammed security keys i e a run key and a programming key The security keys are connected to a secure computer running key programming software ex ecutable code at a step 712 The software has an interface for receiving input from a user in which the input includes the progressive system modifications or new system parameters The new parameters are entered into the programming soft ware at a step 716 Next at a step 720 the new progressive system parameters are uploaded by the programming software into the blank programming key s non volatile memory Likewise at a step 724 the programming software uploads the new parameters into the run key s non volatile memory Upon successful uploading of the new progressive system
10. parameters into both the run key and programming key the newly configured security keys are delivered to the gaming establishment or casino at a step 728 Next at a step 732 the progressive system manufacture receives the previously pro grammed security keys from the gaming establishment It is contemplated that the previously programmed security keys must be returned to the system manufacturer to prevent hav ing multiple sets of operable security keys from being in the gaming establishment s possession unless there is an enforceable agreement in effect for each set of operable secu rity keys In one embodiment the newly configured programmed security keys are delivered to the gaming establishment prior to return of the previously programmed security keys In this way the progressive system will continue to operate during the change in keys This avoids the situation in which the gaming establishment is required to first return the previous programmed security keys 1 e causing the progressive sys tem to be inoperative and wait to receive a newly pro grammed set of security keys Conversely in another embodi ment the gaming establishment returns the previously programmed keys prior to receipt of the newly programmed keys As will now be apparent progressive systems configured according to the teachings of the invention provide a number of advantages over known systems which do not have secure configuration and authentication a
11. 003 Legge et al 2006 0116194 Al 6 2006 Pacey et al 6 645 077 B2 11 2003 Rowe ern 463 42 2006 0166731 A1 7 2006 Yoshimi et al 6 656 048 B2 12 2003 Olsen 2006 0166735 Al 7 2006 Steil et al 6 712 698 B2 3 2004 Paulsen et al 463 30 2006 0183537 Al 8 2006 Dickerson 6 722 986 BL 4 2004 Lyons et al 2006 0252530 A1 11 2006 Oberberger et al 463 29 6 830 515 B2 12 2004 Rowe 2006 0287098 Al 12 2006 Morrow et al 463 42 6 840 860 BI 1 2005 Okuniewicz 2007 0021194 Al 1 2007 Aida 6 854 012 B1 2 2003 Taylor 2007 0105628 Al 5 2007 Arbogast etal 463 42 6 886 013 Bl 4 2005 Beranek 2008 0058059 Al 3 2008 Fitzsimons et al 463 20 6 896 618 B2 5 2005 Benoy etal n se 463 25 6 908 387 B2 6 2005 Hedrick et al FOREIGN PATENT DOCUMENTS 6 934 846 B2 8 2005 Szrek et al RE38 812 E 10 2005 Acres et al o EU us 2 6 965 992 B1 11 2005 Joseph et al 7 046 134 B2 5 2006 Hansen OTHER PUBLICATIONS 7 159 765 B2 1 2007 Frerking 7 258 612 B2 8 2007 Fujimoto OneLink BSK 100 Slot System Architecture Paltronics Inc 1 page 7 392 470 B2 6 2008 Kammler 715 234 Date Unknown 7 491 122 B2 2 2009 Ryan see 463 29 Hot Potato Compliance Manual Mikohn 21 pages Jun 1 1999 2002 0039923 AI 4 2002 Cannon et al One Line LSK500 Slot System Architecture Paltronics Inc 1 page 2002 0049909 Al 4 2002 Jackson et al Date Unknown 2002 0
12. 071557 Al 6 2002 Nguyen Mikohn Mystery DCU Controller Technician s Installation and 2002 0116615 Al 8 2002 Nguyen et al Configuration Guide Mikohn 53 pages Apr 10 2002 2002 0152120 A1 10 2002 Howington One Link Media Network Diagram Standard Configuration Paltron 2003 0002378 Al 1 2003 Uchida et al ics Inc 1 page Date Unknown 2003 0014639 Al 1 2003 Jackson et al Media systems Solutions Paltronics Inc Brochure 8 pages Date 2003 0150915 Al 8 2003 Reece Unknown 2003 0153375 Al 8 2003 Vancura Slot Systems Solutions Paltronics Inc Brochure 12 pages Date 2003 0181231 Al 9 2003 Vancura et al Unknown 2003 0195037 Al 10 2003 Vuong et al System Comparison Chart Paltronics Inc I page Date Unknown 2003 0203755 Al 10 2003 Jackson Mikohn MoneyTime Technician s Installation and Configuration 2003 0203756 Al 10 2003 Jackson Guide Mikohn 63 pages Jul 3 2002 2004 0038735 Al 2 2004 Steil et al IGT Mystery Progressive Jackpot User Manual Mikohn 22 pages 2004 0072611 A1 4 2004 Wolf et al 463 20 Mar 1995 2004 0077408 Al 4 2004 D Amico et al 463 42 Random Bonus Jackpot Users Manual Mikohn 18 pages Dec 1995 2004 0082384 Al 4 2004 Walker et al 463 40 One Link Ultimate Media System UMS5000 Paltronics Inc I page 2004 0092304 Al 5 2004 George et al Date Unknown 2004 0097285 Al 5 2004 Fisher et al c csescesees 463 24 One Link Ultimate Media
13. 112 are provided for two way communication between the pro gressive controller 102 and a series of game devices 120 Communication between the progressive controller 102 and game device 120 is facilitated by an interface board 116 In this example embodiment the progressive controller 102 has eight or more channels 112 and each channel operatively connects 32 or more game devices 120 to the progressive controller In one embodiment the progressive controller 102 handles 256 or more associated game devices 120 i e eight channels each connecting 32 game devices for a total of 256 It is contemplated that in other embodiments different num ber of channels or connections may be provided The progressive controller 102 communicates with a com puter 124 by way ofa bi directional communication link 128 In one embodiment the computer 124 may be replaced with other computing devices such as a desktop computer or hand held device e g a personal data assistant PDA In one embodiment the communication link 128 is a secure Ethernet type communication link or USB connection however other types of secure communication links may be used such as serial connections dial up or wireless connections Alterna tively the connection 128 may occur via a network connec tion In one embodiment the game device 120 is configured as a slot type gaming device A slot type game device typically has a plurality of physical reel assemblies with various indici
14. 444 as a result of the successful challenge key routine the progressive controller displays one or more pro gressive award configuration menus The configuration menus provide a convenient and intuitive interface for select ing modifying and storing various progressive controller parameters The available progressive parameters that can be configured depend upon the specific type of progressive award offered by the gaming establishment For example in a standard progressive some of the parameters that may be configured include a base award amount a reset amount and an increment rate In a mystery progressive the configurable parameters may include a base amount minimum award amount maximum award amount and an increment rate These are just two examples of progressive awards and their configurable parameters However one of ordinary skill in the art understands that there are other progressive award param eters specific to the play rules of the desired progressive system Consequently the progressive award parameters or settings can be modified at a step 448 Next the modified progressive controller settings are securely stored within the progressive controller and preferably within controller memory Upon completion of the modification or configuration pro cess pertinent data is recorded in the event log at a step 456 The modification process data may include a date stamp time stamp identification data pre modified parameters po
15. At step 416 the user inserts the programming key into the key interface of the progressive controller to thereby gain access to the controller s configuration menus Absent the program ming key the user may not access the configuration menus The key interface preferably has provision for insertion of only one security key at a time Correspondingly during step US 7 896 741 B2 9 416 if there is a key already in the key interface it should be removed to provide an open receptacle for the programming key For example if the progressive game network was run ning there would be a run key installed into the receptacle of key interface The run key would need to be removed before the programming key could be inserted and the progressive award system programmed or modified After insertion of the programming key the operation advances to a step 420 wherein an event is generated and stored in an event log The event log is a continually running data acquisition system that records information pertaining to the status of the progressive controller and associated game network Changes to the con troller may be recorded in the event log It is contemplated that the generated event of step 420 records data regarding the event such as but not limited to date stamp time stamp listing of modifications and personnel identification associ ated with the programming key The generated event data is subsequently stored within the progressive contr
16. The authentication may compare data stored within the security key with data stored within the progressive control ler Also disclosed herein is a system for configuring and authenticating a progressive game network The system com prises at least one security key configured to interface with a progressive controller In one embodiment the progressive controller further comprises at least one key interface config ured to receive at least one security key and at least one input output port configured to interface with one or more gaming device interfaces associated with one or more gaming devices Also part of this embodiment is an authenticator configured to interface with the at least one security key The authenticator is used to authenticate at least one security key and enable operation of the progressive controller if the authentication was successful Conversely if the authentica tion is unsuccessful the authenticator disables operation of the progressive controller gaming device interfaces or both Another embodiment has an authenticator that comprises hardware software or a combination of both Additionally in one embodiment the at least one security key comprises a program key and a run key In another embodiment the pro gressive controller is configured to operate a predetermined number of game devices only if at least one run key is inter facing with the key interface and if the at least one run key authenticates Also disclos
17. The challenge key routine is disclosed in greater detail below with reference to FIGS 6A amp 6B During the execution of the challenge routine 432 there are two possible outcomes The first outcome is that the challenge routine was not successful An unsuccessful challenge rou tine generates a fault error such as a Call Attendant fault 436 When a Call Attendant fault 436 occurs the progres sive controller may become inoperative and require attention from casino management security or both Thus a fault will bring attention to the situation where an inappropriate pro gramming key has been used in an attempt to modify progres sive award settings The second possible outcome is that the challenge routine was successful and in this situation there are two additional possible outcomes First in a successful key challenge the positive outcome is redirected to execute the challenge key routine again In this way the challenge key routine cycles and continually verifies or authenticates the inserted pro gramming key In one embodiment the challenge key routine may repeat every three to five seconds However other time intervals may be utilized Secondly in a successful key chal lenge the programming key is authenticated and the pro gramming of the progressive controller proceeds to subse quent steps such as the display of configuration menus at a step 444 0 20 30 35 40 45 50 60 10 At step
18. United States Patent US007896741B2 12 10 Patent No US 7 896 741 B2 Kuehling et al 45 Date of Patent Mar 1 2011 54 PROGRESSIVE CONTROLLER 6 152 824 A 11 2000 Rothschild et al 6 178 510 Bl 1 2001 O Connor et al 75 Inventors Brian L Kuehling Henderson NV 6217448 BL 4 2001 Olsen US Michael F Hollenbeck North Las 6 241 608 B1 6 2001 Torango Vegas NV US Clyde Ruckle Las 6 264 561 Bl 7 2001 Saffari et al Vegas NV US RE37 885 E 10 2002 Acres et al 73 Assignee IGT Reno NV US Notice Subject to any disclaimer the term of this Continued patent is extended or adjusted under 35 U S C 154 b by 40 days FOREIGN PATENT DOCUMENTS AU 589158 10 1986 21 Appl No 11 582 134 22 Filed Oct 16 2006 Continued 65 Prior Publication Data OTHER PUBLICATIONS US 2008 0090652 Al Apr 17 2008 PGP sourced from http web archive org 200605050947 54 51 Int Cl http www imss caltech edu cms php 0p wiki amp wiki_op view A63F 9 24 2006 01 amp id 244 last updated 2003 A63F 13 00 2006 01 Continued A A ESPE CL rine 463 29 463 24 463 40 463 42 Primary Examiner Melba Bumgarner 58 Field of Classification Search 463 29 Assistant Examiner Steven J Hylinski 463 40 42 24 74 Attorney Agent or Firm Armstrong Teasdale LLP See application file for complete search history 57 ABSTRACT 56 References Cited U S PATENT DOCUMENTS 4 283 709 A 8 1981 Luc
19. a located around the circumference of the reel The game device provides control means for receiving a wager activat ing and spinning the reels stopping the reels determining an outcome and paying an award if applicable During play of the slot type game device the player attempts to receive a predetermined arrangement of the indicia The indicia are then compared against a pay table for determination of any possible winning outcomes In another embodiment the game device 120 comprises a video type game device A video type game device includes a 5 20 30 40 45 50 55 60 65 6 a computer generation or representation of the mechanical reels of the slot type game device described above video type game device may include video poker such as Double Bonus The video type game device may comprise a series of games that are different from the common slot type game Some examples of these alternate types of games would be various card games poker twenty one baccarat etc keno roulette or dice games In the video type game device there is a computer or microprocessor which is enabled to accept a wager display a game determine a game outcome and pay an award if applicable The game device also provides a means for currency handling receiving player inputs and a game display for displaying game play In either of the game devices 120 previously discussed e g slot type or video type there is an interfa
20. alue of the access counter Next the key processor returns the expiration parameter to the progressive controller In one embodiment the key pro cessor encrypts the expiration parameter prior to returning the expiration parameter to the progressive controller The parameter encryption may be performed by various types of encryption however one of ordinary skill in the art may implement other forms of encryption now known or later developed At a decision step 652 the operation examines whether the key is expired Based on the outcome of step 652 the opera 20 30 40 45 65 14 tion advances At a step 654 the system generates a key fault and displays a Call Attendant alarm In this case the chal lenge key routine would be considered unsuccessful The key may expire due to the expiration parameter exceeding a pre determined threshold such as a fixed date number of key access events i e polling or queries or other parameters that provide a means for controlling the operable lifespan of the security key Alternatively if at step 652 the operation determines that the key has not expired then the operation advances to a step 656 and the key challenge routine is con sidered successful In another embodiment the progressive controller polls the security key The progressive controller generates a random number that is the same size as the required data structure This random number is scrambled by a pre determined
21. ce board 116 installed therein The interface board 116 connects the inter nal microprocessor of the game device 120 and the progres sive controller 102 Additionally the interface board 116 provides controls and processing means for sending and receiving communications over the game network 100 FIG 2 illustrates a block diagram of an example embodi ment of the progressive controller 102 Internal to the pro gressive controller housing 200 is a processor 204 for running various executable codes that facilitate operation of the pro gressive game network 100 The executable code is stored within memory 208 and the executable code is accessed by the processor 204 through a bi directional communication link between the processor 204 and memory 208 The memory 208 may be volatile non volatile or a combination of both Examples of memory 208 include random access memory optical disk drive technology magnetic disk drive technology read only memory secured digital memory card or other types of computing memory now known or later developed In this example embodiment there are several input output ports 212 associated with and operatively connected to the processor 204 The I O ports 212 facilitate communication between the progressive controller 102 and the game devices 120 In this example embodiment there is one I O port 212 for each channel associated with the progressive game network 100 The progressive controller 102 is further config
22. cipating In a progressive award a cumulative portion of the wagers placed on the associated gaming devices is added to the progressive amount Correspondingly the more players that participate in the progressive award the larger and faster the award accu mulates Gaming establishments frequently participate in a wide selection of progressive based award programs The gaming establishments commonly assign a designated group of gam ing devices to a progressive award type Further a gaming establishment may be required to account for each gaming device associated with the progressive award such as by paying a use fee or license fee to a manufacturer or distributor for the progressive system The use fee or license fee can be paid on a daily basis for each gaming device which could be a slot machine video poker machine video table game such as Tablemax or a mobile gaming device offering the pro gressive award which could include a mystery progressive In general a progressive controller is utilized to oversee and control operation of the progressive system The progres sive controller often communicates with the gaming machines and hence manages the progressive for each machine One drawback of existing systems is that the con figuration of a progressive controller may be altered to estab lish an improper progressive controller configuration In the event a progressive controller configuration is modified the gaming establishment ma
23. cle It is contemplated that the comparison routine is repeated every three to five seconds However other time intervals may be implemented Game devices are excluded from the game network when the progressive controller ceases polling the particular game device For example the game device internal executable a 5 25 30 40 45 50 55 65 12 code is configured such that the code is expecting a polling inquiry from the progressive controller at predefined intervals of time When the game device does not receive a polling request as expected the game device enters into a fault mode and is no longer available to accept wagers or permit player interaction The second possible outcome from step 544 is that the comparison was successful which in turn leads to the opera tion of two additional steps Firstly if the challenge was successful the operation returns to step 540 to execute the comparison routine again In this way the comparison routine continually cycles and verifies or authenticates that the num ber of connected game devices does not exceed the licensed number of permitted game devices In one embodiment the comparison routine repeats every three to five seconds How ever other time intervals may be adopted Secondly in a successful challenge routine the number of connected game devices is authenticated and operation of the progressive sys tem occurs at a step 556 As introduced above and referrin
24. data received from the security key Additionally in one embodiment the interrogating comprises generating a first value within the progressive controller and then sending the first value from the progressive controller to the security key The process then processes the first value within the security key to generate a second value which may be encrypted and processing the first value within the progres sive controller to generate a third value This embodiment then compares the second value to the third value In another embodiment the step of interrogating repeats one or more times during the operation Other systems methods features and advantages of the invention will be or will become apparent to one with skill in the art upon examination of the following figures and detailed description It is intended that all such additional systems methods features and advantages be included within this description be within the scope of the invention and be protected by the accompanying claims BRIEF DESCRIPTION OF THE DRAWINGS The components in the figures are not necessarily to scale emphasis instead being placed upon illustrating the principles of the invention In the figures like reference numerals des ignate corresponding parts throughout the different views FIG 1 illustrates a progressive game network with a plu rality of gaming devices in communication with a progressive controller FIG 2 is a block diagram of an example e
25. ed herein is a method of configuring a progres sive system The method includes receiving a security key into a key interface such that the key interface is associated with a progressive controller and the security key is config ured to enable configuration ofthe progressive controller The method further comprises interrogating the security key and correspondingly if the interrogation was successful then displaying at least one progressive controller parameter modification options The method next enables modifying one or more progressive controller parameters and storing the modified parameters in the progressive controller Next this method removes the security key from the key interface and un displaying the at least one progressive controller param eter modification options In one variation the step of interrogating comprises ana lyzing data received from the security key The interrogating may further comprise generating a first value within the pro gressive controller and sending the first value from the pro gressive controller to the security key The method then pro cesses the first value within the security key to generate second value and processes the first value within the progres sive controller to generate a third value Finally this method compares the second value to the third value Additionally in one embodiment the step of interrogating repeats one or more times during the displaying and modifying In another emb
26. er further comprises memory having machine read able code stored thereon The machine readable code is con figured to authenticate the first security key or the second security key when the first security key or the second security key is in the key interface If the authentication is successful then the code permits programming of the progressive con troller or operation of a predetermined number of game devices associated with the progressive controller based on whether the first security key or the second security key was authenticated In one embodiment the first security key and the second security key comprise a processor and memory Furthermore the first security key may comprise a programming key and the second security key may comprise a run key Additionally the run key may further comprise an expiration parameter which when expired prevents operation of the run key the progressive controller or both In still another embodiment the machine readable code is further configured to as part of the authentication perform a calculation on a value sent to the first security key or the second security key and compare a value resulting from the calculation to a value received from the first security key or the second security key US 7 896 741 B2 3 Inone embodiment the invention further comprises a gam ing machine interface configured to disable one or more aspects of the game device if the authentication is unsuccess ful
27. ero et al 5 116 055 A 5 1992 Tracy krsite apii 463 27 5 146 273 A 9 1992 Yamada 5 257 981 A 11 1993 Takahashi 5 280 909 A 1 1994 Tracy 5 326 104 A 7 1994 Peaseetal 463 18 5 344 144 A 9 1994 Canon 5 429 361 A 7 1995 Ravenetal 463 25 5 536 016 A 7 1996 Thompson 5 643 086 A 7 1997 Alcorn et al 5 851 149 A 12 1998 Xidos et al 5 970 143 A 10 1999 Schneier et al 6 110 043 A 8 2000 Olsen A method and system for configuring a progressive system that insures enhanced operative control and security of the progressive system The progressive controller provides one or more security keys to access and verify modifications to the progressive configuration The allocated number of gaming devices connected to the progressive system is authenticated by a dedicated security key Gaming devices in excess of the allocation are disabled from the progressive system The security keys are configured with an expiration parameter that requires gaming establishments to remain current with respect to progressive system agreements 23 Claims 7 Drawing Sheets Kia 108 Programming Key Run Key 116 Game za mm TEE Hwee 120 US 7 896 741 B2 Page 2 U S PATENT DOCUMENTS 2005 0192099 Al 9 2005 Nguyen et al 2006 0076404 Al 4 2006 Frerking 235 382 6 557 054 B2 4 2003 Reisman 2006 0093142 Al 5 2006 Schneier et al 6 629 019 B2 9 2
28. essive award for a plurality of gaming devices the progressive con troller comprising at least one key interface configured to receive the at least one security key at least one input output port configured to interface with one or more gaming device interfaces associated with the plurality of gaming devices each of the plu rality of gaming devices receiving wagers from play ers a portion of the wagers added to the progressive award an authenticator configured to interface with the at least one key interface to authenticate the at least one secu rity key disable operation of the gaming device inter faces and permit programming of the progressive con troller with the progressive game network programming parameters or enable operation of the progressive controller and the gaming device inter faces with the progressive game network operation parameters in response to a successful authentication or disable operation of at least one of the progressive controller and the gaming device interfaces in response to an unsuccessful authentication 9 The system of claim 8 wherein the authenticator com prises hardware 10 The system of claim 8 wherein the authenticator com prises software 11 The system of claim 8 wherein the authenticator com prises a combination of hardware and software 12 The system of claim 8 wherein the at least one security key comprises a program key and a run key 13 The system of claim 12 wherein t
29. except for a data bit modification that iden tifies the programming key as such to the progressive con troller 102 The data bit modification may be a flagged memory location a dip switch setting or a particular jumper arrangement internal to the programming key struc ture It is contemplated that the programming key data bit modification provide adequate security from tampering and further provide distinguishing characteristics from the run key 106 Correspondingly once the programming key 108 is inserted into the key interface 104 and because of the data bit modification the progressive controller 102 will automati cally recognize the key as a programming key 108 In operation the programming key 108 controls access to the progressive controller configuration settings and param eters Upon insertion of the programming key 108 into the key interface 104 the progressive controller 102 presents a series of progressive controller configuration menus to the user which would not otherwise be visible or accessible The key interface 104 is configured to accept only one security key at a time and thus any security key previously inserted into the key interface 104 is required to be removed before another key can be inserted In one exemplary method of operation once the program ming key 108 inserted into the key interface 104 any game devices 120 connected to the progressive controller 102 will be automatically disabled and not ava
30. g to FIG 6A upon inser tion of either the run key or programming key the progressive controller initiates a challenge key routine at a step 600 The challenge key routine authenticates the security keys and assures that the proper matched set of keys are inserted or used with the matching progressive controller The challenge key routine proceeds after initialization by having the pro gressive controller generate a random number This occurs at a step 604 At a step 608 the random number is sent to the particular security key e g run key or programming key for response In one embodiment when the security key receives a ran domly generated number from the progressive controller the key processor executes code stored within key non volatile memory It is contemplated that at a step 612 the executable code performs a modification of the random number by way of a predefined and structured algorithm For example the random number is modified by multiplying the number by a predetermined number Subsequent to the modification pro cess of step 612 the key processor encrypts the modified random number at a step 616 The number encryption may be performed by various types of encryption One of ordinary skill in the art may implement other forms of encryption now known or later developed It is further contemplated that the key processor returns the modified and encrypted random number at a step 620 to the progressive controller Alterna ti
31. he Invention The present invention relates to gaming and in particular to a method and system for secure configuration and operation of progressive awards 2 Related Art Games of chance have been enjoyed by people for many years and have undergone increased and widespread popular ity in recent times As with most forms of entertainment some players enjoy playing a single favorite game while others prefer playing a wide variety of games In response to the diverse range of player preferences gaming establishments commonly offer many types of games and potential for increased winnings associated with these games such as enhanced bonuses progressive awards and various prizes As is well known in the art and as used herein the terms gaming and gaming devices are used to indicate that some form of wagering is involved and that players must make wagers of value whether actual currency or some equivalent value e g token or credit This is in contrast to the playing ofnon wagering games which implies the absence of a wager of value and the possibility of receiving a payout and in which skill is ordinarily an essential part of the non wa gering game There are many different bonus incentives that a gaming establishment may offer to entice a player to place a wager at the gaming device An example of such a bonus is a progres sive award or jackpot that accumulates over time and increases based on the number of players parti
32. he progressive con troller is configured to operate a predetermined number of game devices only ifthe run key is interfacing with the at least one key interface and if the run key is successfully authenti cated by the authenticator 14 A method of configuring a progressive system the method comprising coupling a progressive controller to a plurality of gaming devices wherein the progressive controller includes a an 0 a 5 20 40 45 55 65 18 key interface a memory and a processor coupled to the key interface and to the memory wherein the progres sive controller is configured to manage a progressive award for the plurality of gaming devices receiving a security key into the key interface wherein the security key is configured with one of progressive game network programming parameters and progressive game network operation parameters wherein the secu rity key is configured to enable configuration of the progressive controller interrogating the security key using the processor in response to a successful interrogation disabling opera tion of the plurality of gaming devices and permitting modification of at least one progressive controller parameter via the progressive game network program ming parameters or enabling operation of the plurality of gaming devices according to the progressive game net work operation parameters displaying the at least one progressive parameter modifi cation st
33. ilable for game play while the programming key remains inserted into the key interface In this way when a programming key 108 is inserted in to the key interface 104 the progressive game network 100 is inoperative with respect to accepting wagers and providing game play events In another embodiment only the progressive aspect is disabled A run key 106 is configured with run key parameters that are used to enable operation of the progressive network and authenticate the number of game devices 120 connected to the progressive controller 102 In this embodiment the run key 106 controls the number of game devices 102 that can access the progressive controller In this embodiment the run key is inserted into the key interface 104 for the progressive game network 100 to function The run key 106 has substantially identical internal con figuration as a programming key 108 discussed above except fora data bit modification that identifies the run key as such to the progressive controller 102 The data bit modifi cation may be a flagged location of memory a dip switch setting or a particular jumper arrangement internal to the run key structure It is contemplated that the run key 106 data bit modification provide adequate security from tampering and further provide distinguishing characteristics from the pro gramming key 108 Correspondingly once the run key 106 is operatively inserted into the key interface 104 and because of the data
34. ing Structure Algorithm Y 616 Key Processor Encrypts Modified Random Number Y 620 Key Processor Returns Modified Random Number to Controller V 624 Response Number Matches Anticipated Number 632 636 ID Information Matches Anticipated ID Information System Fault Call Attendant i Yes Fig 6A U S Patent Mar 1 2011 Sheet 6 of 7 US 7 896 741 B2 644 Progressive Controller Queries Key for Key Expiration Parameters Key Processor Returns Expiration Parameters Stored in Key Memory 648 Key Expired Key Fault Call Attendant No 656 Key Challenge Successful Fig 6B U S Patent Mar 1 2011 Sheet 7 of 7 US 7 896 741 B2 Casino Communicates Progressive System Modifications to Progressive ce System Manufacturer 704 Enter and Store New Key Configuration on Computer 708 System Manufacture Obtains Blank Programming and Run Keys Connect Blank Keys to a Secure Computer Running Key Programming 712 Software 716 Enter New Parameters into the Programming Software Programming Software Uploads New Parameters into Blank 720 Programming Key s Non Volatile Memory Programming Software Uploads New Parameters into Blank Run Key s 724 Non Volatile Memory Deliver Newly Configured Programming and Run Keys to the Casino Tem 732 Receive Previously Configured Programming and Run Keys US 7 896 741 B2 1 PROGRESSIVE CONTROLLER BACKGROUND OF THE INVENTION 1 Field of t
35. ller The key interface pref erably has provision for insertion of only one security key at a time Correspondingly during step 506 if there is a key already in the key interface it may be removed to provide an open receptacle for insertion of the run key For example if the progressive game network was previously being pro grammed there would be a programming key installed into the key interface The programming key would need to be removed before the run key could be inserted and the pro gressive award system monitored After insertion of the run key an event is generated and stored in the event log at a step 508 The event log is a continually running data acquisition system that records information pertaining to the status of the progressive controller It is contemplated that the generated event of step 508 may provide data such as date stamp time US 7 896 741 B2 11 stamp listing of modifications and personnel identification associated with the run key The generated event data is sub sequently stored within the progressive controller and pref erably within a secure non volatile memory device such as a secured digital memory card At a step 512 the progressive controller opens communi cation with the associated game devices The communication over the channels to game devices is initiated when the run key is engaged with the key interface In this way the pro gressive controller enters into a run mode when the program mi
36. mbodiment of a progressive controller FIG 3 is a block diagram of an example embodiment of a security key FIG 4 is an operational flow diagram of one example embodiment for programming a progressive system FIG 5 is an operational flow diagram of one example embodiment for monitoring a progressive system FIGS 6A amp 6B is an operational flow diagram of one example embodiment for verification of the security key FIG 7 is an operational flow diagram of one example embodiment for programming a pair of security keys DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS In the following description numerous specific details are set forth in order to provide a more thorough description of the present invention It will be apparent however to one skilled in the art that the present invention may be practiced without these specific details In other instances well known features have not been described in detail so as not to obscure the invention Referring now to the drawings FIG 1 illustrates a progres sive game network 100 As seen in FIG 1 a progressive controller 102 connects and controls the progressive game network 100 The progressive controller 102 monitors the US 7 896 741 B2 5 game devices 120 that are connected to the game network 100 The progressive controller 102 also manages the pro gressive award by performing various accounting procedures including but not limited to how much of each wager is incremen
37. ming establishment will agree to pay a fee for each gaming device connected to the progressive controller The agreement will frequently limit and specifically desig nate the number of gaming devices that may be connected to the progressive controller In this way if the gaming estab lishment increases the number gaming devices or groups of gaming devices the establishment is pay an additional fee Undesirably however existing progressive controllers permit the gaming establishment to connect additional gaming devices to the progressive award system without paying an additional fee As a result there is a need in the art for a progressive controller which overcomes the drawbacks in the prior art The method and apparatus described herein overcomes these drawbacks and provides additional benefits SUMMARY OF THE INVENTION To overcome the drawbacks of the existing systems and provide additional benefits a method and system is disclosed which securely configure a progressive award system verifies and permits only the licensed number of gaming devices to access the system In one embodiment a system for configuring and authen ticating a progressive game network is disclosed which com prising a first security key a second security key and a pro gressive controller The progressive controller comprises an integrated key interface which is configured to receive the first security key or the second security key The progressive controll
38. mprise a processor and a memory US 7 896 741 B2 17 3 The system of claim 1 wherein the first security key comprises a programming key and the second security key comprises a run key 4 The system of claim 3 wherein the run key further comprises an expiration parameter which when expired pre vents operation of the run key the progressive controller or both 5 The system of claim 1 wherein the machine readable code is further configured to as part of the authentication perform a calculation on a value sent to the first security key or the second security key and compare a value resulting from the calculation to a value received from the first security key or the second security key 6 The system of claim 1 further comprising a gaming machine interface configured to disable one or more aspects of the plurality of gaming devices if the authentication is unsuccessful 7 The system of claim 1 wherein the authentication com prises comparing data stored within the first or second secu rity key with data stored within the progressive controller 8 A system for configuring and authenticating a progres sive game network the system comprising at least one security key configured with one of progressive game network programming parameters and progres sive game network operation parameters wherein the at least one security key is configured to interface with a progressive controller a progressive controller that manages a progr
39. ng key is removed and the run key is inserted into the key interface At a step 516 the progressive controller executes a challenge key routine which verifies that the proper run key has been inserted into the key interface The challenge key routine is disclosed in greater detail below with reference to FIGS 6A amp 6B During the execution of the challenge routine 520 there are two possible outcomes The first possible outcome is that the challenge routine was unsuccessful An unsuccessful chal lenge routine results in a fault error such as a Call Atten dant fault 524 When a Call Attendant fault 524 occurs the progressive controller may become inoperative and require attention from casino management security or both Thus a fault error will bring attention to the situation where an inap propriate run key has been used to actively monitor or run the progressive game network The second possible outcome from step 520 is that the challenge routine was successful First in a successful key challenge the operation returns to step 516 to execute the challenge key routine again In this way the challenge key routine continually cycles and verifies or authenticates the inserted run key In one embodiment the challenge key rou tine repeats every three to five seconds However other time intervals may be configured Secondly in a successful key challenge the run key is authenticated and the operation will proceed to subsequent ste
40. nt and constant polling by the progressive controller FIG 4 is an operational flow diagram illustrating potential steps for programming a progressive system This is but one possible method of operation and as such it is contemplated that other methods of operation may occur based on this disclosure At a step 400 a user or other entity gains access to the progressive controller In the preferred embodiment the user would physically access the controller by opening and possibly unlocking the progressive controller security cabinet or housing The progressive controller may have a computer display associated therewith or the user may connect another computer device i e a laptop computer to facilitate com munication with the progressive controller Once the user has accessed the progressive controller the user next determines if the progressive system is configured This occurs at a step 404 There are two possible outcomes of step 404 the first being that the controller is not configured If the controller is not configured then the progressive control ler will require an initial controller setup 408 which is termed herein as birthing The birthing process establishes the progressive controller s settings and provides a baseline oper ating configuration The second possible outcome of step 404 may be that the progressive controller is already configured If the controller is configured then the operation advances to a step 416
41. odiment the method also displays at least one progressive controller parameter modification options that comprise displaying one or more menu options for soft ware configuration Additionally this method may receive a security key that disables operation ofthe progressive system with respect to a predetermined number of game devices connected thereto Similarly disclosed herein is a method of enabling opera tion ofa progressive system by receiving a security key into a key interface such that the key interface 1s associated with a progressive controller and the security key is configured to enable operation of the progressive controller The method further comprises interrogating the security key and if the an 5 20 25 30 35 40 45 50 55 60 65 4 interrogation was successful then enabling operation of a predetermined number of game devices coupled with the progressive system Conversely if the interrogation was unsuccessful then the method disables operation of the pro gressive system The method also comprises operating the progressive system and intermittently monitoring for the presence of and interrogating the security key while the pro gressive system is operating Ifthe monitoring was successful then enabling operation of the progressive system If the monitoring unsuccessful then disabling operation of the pro gressive system In another embodiment the interrogating step comprises analyzing
42. oller and preferably within a secure non volatile memory device such as a secured digital memory card Recording the events such as changes to the progressive controller configuration pro vides the benefit of notifying the gaming establishment if there is a malfunction or if the game device reports a jackpot of an incorrect amount As a result of recording events per taining to the progressive controller configuration the gaming establishment can monitor and determine who and when any configuration parameters may have changed The recorded event information provides an evidentiary trail with respect to who was responsible for the incorrect setup of the controller that caused the incorrect payout or other malfunction Addi tionally the recorded information provides gaming regulators a way to see if the gaming establishment has changed the parameters to cheat the customers or the tax collectors Next at a step 424 the progressive controller halts commu nication with the associated game devices The communica tion over channels to game devices discontinues when the run key is either not present or removed from the key interface In this way the progressive controller enters into a programming mode when the run key is removed and the programming key is inserted into the key interface Ata step 428 the progressive controller executes a challenge key routine which verifies that the proper programming key has been inserted into the key interface
43. oring the modified at least one progressive controller parameter in the memory removing the security key from the key interface and un displaying the at least one progressive controller parameter modification 15 The method of claim 14 wherein interrogating the security key comprises analyzing data received from the security key 16 The method of claim 14 wherein interrogating the security key comprises generating a first value within the progressive controller sending the first value from the progressive controller to the security key processing the first value within the security key to gener ate second value processing the first value within the progressive controller to generate a third value and comparing the second value to the third value 17 The method of claim 14 wherein displaying at least one progressive controller parameter modification comprises dis playing one or more menu options for software configuration 18 The method of claim 14 wherein interrogating the security key comprises repeating one or more times during the displaying and modifying 19 A method of enabling operation of a progressive sys tem the method comprising coupling a progressive controller to a plurality of gaming devices wherein the progressive controller includes a key interface a memory and a processor coupled to the key interface and to the memory wherein the progres sive controller is configured to manage a progres
44. ps such as determining the number game devices con nected to the game network At a step 536 the progressive controller polls or queries each of the game devices associ ated with the progressive system The polling process pro vides the progressive controller with the number of game devices connected or logged onto the progressive system At a step 540 the operation compares the number of connected game devices acquired at a step 536 to the actual number of game devices permitted for use by the gaming establishment Inone embodiment the number of permitted game devices is stored in electronic data form within the run key In this way the run key provides the comparison value for the correct number of game devices that are permitted on the progressive game network After the comparison of step 540 there are two possible outcomes from a step 544 The first possible outcome is that the comparison was unsuccessful i e the number of con nected game devices exceeds the number of licensed game devices and in this situation the excess game devices are excluded from the progressive game network In one embodi ment an excluded game device may display a fault error such as a Call Attendant fault When a Call Attendant fault occurs the game device may become inoperative and require attention from casino management security or both Addi tionally after excluding excessive game devices the process of step 544 is repeated in a continual cy
45. s a type of hash function used to produce a checksum a small fixed number of bits against a block of data such as a packet of network traffic or a block of a electronic data The CRC checksum is used to detect errors after transmission and or storage of data A CRC is typically computed and appended before transmission or storage and usually verified afterwards by the recipient of the data to confirm that no changes to the data occurred during transit Reference is now made to FIG 7 which is an operational flow diagram that illustrates potential steps for programming a pair of security keys It is contemplated that a gaming establishment may want to implement various changes or modifications to an existing progressive system Any type modification is possible such as decreasing or increasing the number of game devices connected to the game network altering the number progressive awards offered or altering the type of progressive awards offered Correspondingly when the gaming establishment implements such modifica tions there are likely be changes to the fee owed by the gaming establishment to the progressive system manufacturer The modifications may require reconfiguration or reprogramming of the security keys to ensure that the progressive game net work functions properly within the terms and conditions of an agreement For example the key and controller parameter which limits the number of machines that connect to the controller
46. s described herein Numerous benefits are realized by the method and appara tus described herein Incorporating the use of multiple secu rity keys increases the security and accountability of the progressive system and decreases the potential for inaccurate or fraudulent controller configuration The traditional way in which progressive systems were configured did not adequately prevent fraud or tampering In the past a progres sive system may be compromised if for example unautho rized access to the progressive controller occurs then the progressive controller configuration may be changed to inac curate settings By enabling access to the progressive system configuration settings only with actual possession of a tan gible security key the progressive system is more secure and there is a record of accountability because the tangible secu rity key is assigned to a particular individual Consequently a 20 25 30 35 40 45 50 55 60 65 16 gaming establishment enjoys increased security and account ability for their progressive system Secondly by providing a dedicated security key such as the run key a progressive system manufacture can adequately monitor and control the number of game devices connected to the progressive system Existing progressive systems permit gaming establishments to connect excessive additional game devices to the progressive controller In one or more configu rations described herein
47. sive award for the plurality of gaming devices receiving a security key into the key interface and disabling operation of the progressive system with respect to a predetermined number of the plurality of gaming devices connected thereto wherein the security key is configured with one of progressive game network pro gramming parameters and progressive game network operation parameters and wherein the security key is configured to enable operation of the progressive con troller interrogating the security key permitting programming of the progressive controller with one of the progressive game network programming parameters and the progressive game network operation parameters in response to a successful interrogation operating the progressive system US 7 896 741 B2 19 intermittently monitoring for the presence of and interro gating the security key while the progressive system is operating in response to interrogating the security key while the progressive system is operating enabling operation of 5 the progressive system when the security key includes the progressive game network operation parameters and in response to interrogating the security key disabling operation of the progressive system when the security key includes the progressive game network program ming parameters 20 The method of claim 19 wherein interrogating the security key comprises analyzing data received from the security key 21 The me
48. st modified parameters or other useful data regarding the modification process The event log then subsequently stores the data with the progressive controller and preferably within controller memory Once the progressive controller has been adequately pro grammed or configured the programming key is removed from the key interface at a step 460 Subsequently at a step 462 a run key is inserted into the key interface to place the progressive controller into a run mode The progressive game network is then restarted at a step 464 and players may subsequently begin wagering at the game devices utilizing the new or modified progressive controller parameters settings As discussed below in at least one embodiment the run key must be inserted into the controller interface for the progres sive system to operate Turning now to FIG 5 which is an operational flow dia gram illustrating potential steps for monitoring a progressive award system At a step 500 the programming begins with accessing the progressive controller In one embodiment the user would physically access the controller by opening and possibly unlocking the progressive controller security cabinet or housing The progressive controller may have computer display associated therewith or the user may connect another computer device to facilitate communication with the pro gressive controller The next step 506 is to insert the run key into the key interface ofthe progressive contro
49. ted to the progressive and how much is placed in a reserve account for reseeding a progressive regarding the amount wagered at each of the game devices 120 associated with the game network 100 The progressive controller 102 assigns a predetermined portion of the amounts wagered at each game device 120 to the progressive award amount The progressive controller 102 also provides a series of menus displayed on a computer 124 for facilitating configuration of the various progressive awards that may be active on the game network 100 In an alternate embodiment the progressive controller 102 is contained within a central server which could include a thin client form or using downloadable games not shown A central server connects to game devices 120 and provides communication between the progressive controller 102 and associated game devices Additionally the central server may provide game information to the game devices The informa tion includes game rules game graphics game sounds and game outcomes The key interface 104 integrated within the controller 102 is configured in this example embodiment to accept a single security key such as a run key 106 or a programming key 108 The security keys are discussed in greater detail below The key interface 104 facilitates communication between the security keys and the progressive controller 102 by way of a bi directional communication link A plurality of bi directional communication channels
50. thod of claim 19 wherein interrogating the 15 security key comprises 20 generating a first value within the progressive controller sending the first value for the progressive controller to the security key processing the first value within the security key to gener ate second value processing the first value within the progressive controller to generate a third value and comparing the second value to the third value 22 The method of claim 21 wherein processing the first 10 value within the security key comprises generating an encrypted second value 23 The method of claim 19 wherein interrogating the security key comprises repeating the interrogation one or more times during the operation of the progressive system
51. ured with a key interface 104 The key interface 104 is structured to operatively accept a single security key i e either a pro gramming key or a run key and is further structured to facili tate bi directional communication between the processor 204 and the inserted security key In one embodiment and to provide additional security the key interface 104 is only accessible by unlocking a portion of the progressive controller housing 200 Once unlocked a user may insert or replace a security key i e replace a run key with a programming key or vise a versa programming key 108 is configured with progressive system parameters and establishes the progressive controller 102 configuration and permits access to the various progres sive award configuration menus associated with the progres sive controller The programming key 108 is used to access the configuration menus and may be assigned to a particular designated employee of the gaming establishment In this way the designated employee is paired with the particular programming key 108 and is responsible for the proper use of the programming key gaming establishment is defined as an operator of game devices and may comprise a casino riverboat cruise ship lounge or other business entity provid ing gaming activities Inthis example embodiment the programming key 108 has substantially identical internal configuration as a run key 106 US 7 896 741 B2 7 discussed below
52. vely this process may be reversed in that the key may generate the random number and forward it to the controller for modification At a step 624 a comparison is performed between the modified random number returned by the security key and an anticipated number within the progressive controller The anticipated number is generated by the progressive controller using executable code stored within progressive memory that performs a modification of the random number by way of a predefined and structured algorithm In this way the progres sive controller generates a random number that is sent to the security key and the progressive controller also generates a modified random number for use in the comparison In this example embodiment there are two possible com parison outcomes which may occur at decision step 624 Ifthe modified random number returned from the security key does not mach the anticipated number generated by the progressive controller then a key fault would be generated at a step 628 key fault may generate a Call Attendant alarm which may be displayed upon the progressive controller the associated game devices or both When a Call Attendant alarm occurs US 7 896 741 B2 13 the progressive game network may become inoperative and require attention from casino management and or casino security Alternatively if at decision step 624 the modified random number returned from the security key does match the antici
53. y combination or arrangement What is claimed is 1 A system for configuring and authenticating a progres sive game network the system comprising a plurality of gaming devices providing game play on the progressive game network a first security key configured with progressive game net work programming parameters a second security key configured with progressive game network operation parameters a progressive controller comprising a key interface integrated with the progressive control ler wherein the key interface is configured to receive only one of the first security key and the second secu rity key memory having machine readable code stored thereon the machine readable code configured to authenticate the first security key or the second secu rity key when the first security key or the second security key is in the key interface and in response to a successful authentication of the first security key disable said game play on the progres sive game network and permit programming of the progressive controller with the progressive game network programming parameters associated with the first security key and in response to a successful authentication of the sec ond security key permit operation of the progres sive game network based on the progressive game network operation parameters associated with the second security key 2 The system of claim 1 wherein the first security key and the second security key co
54. y face significant risk of financial injury because the progressive controller configuration may pay an award that is excessive or provide awards too often In the existing progressive controllers the progressive con troller settings are usually accessed by way of a password protected logon procedure While password protection is somewhat beneficial this type of protection is vulnerable in several respects First a password may be shared among several users and once the password is out of the direct control of the password owner the security of password protection is 0 a 5 35 40 45 65 2 compromised Second passwords may be anticipated For example many people will use their birthday pet s name or a nickname for a password Thus a person wishing to guess or anticipate the password may initiate the process by research ing the password owner s background and then using the owner s common information such as a birthday in an attempt to hack the password Third a password may be inadvertently observed by another individual during the login process Finally the actual entry of the password may be recorded by an algorithm or other type of data logging device Another drawback with existing progressive controllers is that the progressive system manufacturer has little or no con trol over the number of gaming devices that may be connected to the progressive award system Commonly in the gaming industry a ga
Download Pdf Manuals
Related Search
Related Contents
画面で見るマニュアル - アイ・オー・データ機器 Manuale di Istruzioni Instruction manual ICE MAKER “WHITE” Manual do utilizador - Instituto Casa da Photographia . Fotografe e NOX NOXBOR15 Règlement du PLU - Châteauneuf-sur Copyright © All rights reserved.
Failed to retrieve file