专利汇可以提供Gaming system and method of securely transferring a monetary value专利检索,专利查询,专利分析的服务。并且A cashless gaming system and method of securely transferring a monetary value. When “cashing-out” of a first terminal of the system, the monetary value is encrypted with an encryption key and an encryption algorithm to produce an encrypted monetary value. A transaction code is associated with encryption key and the monetary value. The transaction code and encrypted monetary value are written to a transportable medium that is issued by the first terminal. The transaction code and associated encryption key are stored in a key repository database. The transaction code and monetary value are stored in an accounting database which is securely separate from the key repository database. The transportable medium is taken to a second terminal where the encrypted monetary value and transaction code are read. The encryption key associated with the transaction code is retrieved and used to decrypt the encrypted monetary value. The monetary value is then credited to the second terminal.,下面是Gaming system and method of securely transferring a monetary value专利的具体信息内容。
What is claimed is:
This application claims priority to U.S. Provisional Application Ser. No. 60/563,169, filed Apr. 16, 2004, which is hereby incorporated by reference.
The subject invention relates to a cashless gaming system and a method of securely transferring a monetary value in the cashless gaming system.
Electronic or video gaming machines in casinos, such as slot machines or electronic bingo games, typically have accepted coins to be wagered. These coins have typically been dispensed as winnings. This left a player of the machine to carry a large quantity of coins to a cashier for conversion into paper bills or other such convenient form. Furthermore, if the machine did not have sufficient coins in its hopper to pay the player, long waits typically occurred while an attendant filled the hopper with more coins. As a result, the casino industry has been moving toward cashless gaming systems where the player receives a voucher in lieu of coins when “cashing out” of a gaming machine. One such cashless gaming system is disclosed in U.S. Pat. No. 6,746,330 to Cannon (the '330 patent).
The '330 patent discloses a cashless gaming system and method of transferring a monetary value in the cashless gaming system. The cashless gaming system includes a plurality of gaming machines and a plurality of change machines. The cashless gaming system also includes a central processing system in communication with the gaming machines and change machines. The central processing system includes a processor and memory. When a player elects to “cash-out” of one of the gaming machines, the monetary value of the gaming machine is transferred to the memory of the central processing system. A memory address corresponding to the monetary value is then encrypted and printed as a bar code on a ticket. The ticket is issued from the gaming machine to the player. The player can then take the ticket to another gaming machine or a change machine. When inserted in the other gaming machine or the change machine, the bar code is read and the memory address is decrypted. The central processing system then transfers the monetary value associated with the memory address to the machine.
Although the '330 patent provides an adequate system and method for transferring a monetary value, the system and method remain vulnerable to security breaches. For example, if an unauthorized person were to access the central processing system, it may be possible to change the monetary value corresponding to a particular memory address. This may allow the unauthorized user to increase the amount received when the ticket is redeemed.
The present invention is aimed at the problem identified above.
In one aspect of the present invention, a method of securely transferring a monetary value in a cashless gaming system is provided. The method includes the steps of establishing the monetary value in a first terminal, receiving a request for transfer of the monetary value established in the first terminal, generating a unique encryption key for use with an encryption algorithm, encrypting the monetary value using the encryption key with the encryption algorithm to produce an encrypted monetary value, and forming an encrypted message including the encrypted monetary value. The method further includes the steps of associating a transaction code with the encryption key and the monetary value, debiting the monetary value from the first terminal, recording the transaction code and the monetary value in an accounting database in response to the debiting of the monetary value from the first terminal, storing the encryption key and the transaction code in a key repository database securely separate from the accounting database, and writing the transaction code and the encrypted message to a transportable medium.
In another aspect of the present invention, a cashless gaming system for securely transferring a monetary value is provided. The system includes a first terminal for generating a unique encryption key for use with an encryption algorithm, encrypting the monetary value using the encryption key with the encryption algorithm to produce an encrypted monetary value, forming an encrypted message including the encrypted monetary value, associating a transaction code with the encryption key and the monetary value, debiting the monetary value, writing the transaction code and the encrypted message to a transportable medium, and issuing the transportable medium to the player. The system also includes an accounting server in operative communication with the first terminal and having an accounting database for recording the transaction code and the monetary value. A key repository server is in operative communication with the first terminal and includes a key repository database separate from the accounting database for storing the encryption key and the transaction code.
Other advantages of the present invention will be readily appreciated, as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings wherein:
Referring to the Figures, wherein like numerals indicate like parts throughout the several views a gaming system 10 and method 100 of securely transferring a monetary value are shown.
The gaming system 10 of the present invention operates to allow a cashless transfer of a monetary value. Referring to
Referring to
The method 100 continues with the step of receiving 104 a request for transfer of the monetary value established in the first terminal 12. In the first embodiment, when the player is done playing the EGM 16, they player will elect to “cash out”. This is typically accomplished by depressing a physical or “virtual” button on the EGM 16.
Once the request to transfer the monetary value is received, the method 100 continues by generating 106 a unique encryption key for use with an encryption algorithm. In the first embodiment, the unique encryption key is generated within the first terminal 12. However, it is understood that the unique encryption key could be generated elsewhere in the gaming system 10, such as a remote computer. Also in the first embodiment, the encryption key is further defined as a public encryption key and a private encryption key. The public and private encryption keys are related to one another as is well known to those skilled in the art. Typically, the private encryption key is used to encrypt data while the public encryption key is used to decrypt data.
Referring again to
The method 100 continues with the step of storing 112 the encryption key and the transaction code 28 in the key repository server 24. In the first embodiment, this is more specifically accomplished by storing the public encryption key and the transaction code 28 in the key repository database 26 of the key repository server 24.
The transaction code 28 is sent from the key repository server 24 to the first terminal 12. The method 100 progresses by associating 114 the transaction code 28 with the encryption key and the monetary value in the first terminal 12. In the first embodiment, this is specifically accomplished by associating 114 the transaction code 28 with the private encryption key and the monetary value.
The method 100 then continues with the step of encrypting 116 the monetary value using the encryption key with the encryption algorithm. As a result, the encryption algorithm produces an encrypted monetary value 30. In the first embodiment, the monetary value is encrypted in the first terminal 12 by using the private encryption key and the encryption algorithm. The first terminal 12 also encrypts the transaction code 28 and a machine identification (MID) code. The MID code is a unique number for uniquely identifying the first terminal 12 from other terminals that are part of the system 10. The encrypting of the transaction code 28 and the MID code generates, respectively, an encrypted transaction code 32 and an encrypted MID code 34.
The method 100 continues further by forming 118 an encrypted message 38. The encrypted message 38 includes the encrypted monetary value 30. In the first embodiment, the encrypted message 38 also includes the encrypted transaction code 32 and the encrypted MID code 34.
The method 100 continues with the step of writing 120 the transaction code 28 and the encrypted message 38 to a transportable medium 40. In the first embodiment, the first terminal 12 includes a printer. The transportable medium 40 is further defined as a ticket 42. The ticket 42 is printed on paper by the printer. Referring to
In response to the step of writing 120 the transaction code 28 and the encrypted message 38 to the transportable medium 40, the method 100 progresses by debiting 124 the monetary value from the first terminal 12. Essentially, the monetary value that was established on the first terminal 12 is transferred to the transportable medium 40.
The system 10 also includes an accounting server 44. The accounting server 44 includes an accounting database 46 for recording monetary transfer transactions taking place on the system 10. Maintaining the accounting database 46 is critical for casino management being able to know the monetary value owed to various players holding transportable medium 40. In response to the debiting of the monetary value from the first terminal 12, the method 100 continues with the step of recording 126 the transaction code 28 and the monetary value in the accounting server 44. This evidences the debiting of the monetary value from the first terminal 12, thus essentially creating an account payable.
For purposes of security, the key repository database 26 is securely separate from the accounting database 46. This separation lessens the likelihood that the monetary value encoded on the transportable medium 40 could be changed or altered. For example, an unauthorized person would have to make an unauthorized alteration of the encryption key associated with a transaction code 28 in the key repository database 26. Then, the unauthorized person would have to change (or create anew) the transportable medium 40 such that the encoded message 38 is encoded with the altered encryption key. Further, the unauthorized user would have to also modify the accounting database 46 on the accounting server 44 such that the monetary value associated with the transaction code 28 is changed to match the changed transportable medium.
Referring now to
The transaction code 28 is sent from the second terminal 14 to the key repository server 24. The method continues with the key repository server 24 searching 132 the key repository database 26 for the transaction code 28. Once located, the method progresses by retrieving 134 the encryption key associated with the transaction code 28 from the key repository database 26. In the first embodiment, the public encryption key is searched for and retrieved from the key repository database 26. The retrieved encryption key is sent from the key repository server 24 to the second terminal 14.
In response to the encryption key being received by the second terminal 14, the method 100 progresses with the step of decrypting 136 the encrypted message 38 using the encryption key and the encryption algorithm. In the first embodiment, before decrypting, the encrypted message 38 is parsed into the encrypted monetary value 30, the encrypted transaction code 32, and the encrypted MID code 34 (of the first terminal 12. Then, as a result of the decrypting, the encrypted message 38 is decoded to provide the monetary value, a decrypted transaction code 28, and the MID code (of the first terminal 12). The decrypted transaction code 28 is then compared 138 to the transaction code 28 previously read from the transportable medium 40. This comparison provides one way to validate the authenticity of the transportable medium 40.
The method 100 continues by crediting 140 the monetary value in the second terminal 14. In the first embodiment, where the second terminal 14 is implemented as the ECM, the player is now able to play the machine with the monetary value, just as if cash had been inserted. In the second embodiment, where the second terminal 14 is implemented as the validation station 18, cash is dispensed to the player in the amount of the monetary value.
In response to the crediting of the monetary value at the second terminal 14, the method 100 continues further with the step of recording 142 the transaction code 28 and the monetary value in the accounting database 46 of the accounting server 44. This recording in the accounting database 46 will evidence the crediting of the monetary value at the second terminal 14. The accounting server 44 may then compare the earlier record debiting the corresponding monetary value. If the credited and debited monetary values do not match, the system 10 may take a corrective action. For example, the system 10 may debit the monetary value from the second terminal 14 and notify casino security.
In the first embodiment, a network 48 is electrically connected to the first terminal 12, the second terminal 14, the accounting server 44, and the key repository server 24. The network 48 provides communications between the first 12 and second terminals 14 and the accounting server 44. The network 48 also provides communications between the first 12 and second terminals 14 and the key repository server 24. Those skilled in the art realize that the network 48 may be implemented as a hard-wired network 48, such as Ethernet, or as a wireless network 48, such as a network using 802.11 protocols. Of course, the network 48 may be implemented using numerous other techniques, as known to those skilled in the art.
The above-detailed actions of the terminals 12, 14, databases 26, 46, and servers 24, 44, are virtually transparent to the player. In one scenario, the player would approach a first EGM. The player may insert a $20 bill into the bill validator 22 of the first EGM. Twenty dollars worth of credits are then available on the machine. The player may then play the game or games provided by the first EGM. After a playing awhile the player has accumulated winnings and the credit on the machine is now worth $50. The player may want to try his luck on a different machine and presses the “cash-out” button on the first EGM. The credits on the machine are removed and a ticket 42 is printed by the first EGM and issued to the player. The ticket 42 may include the name of the casino, the monetary value ($50), a series of numbers or characters, and a bar code which represents the series of numbers or characters. The player then approaches a second EGM and inserts the ticket 42 into the bill validator 22. The second EGM processes the ticket 42, as described above, and credits the machine for $50. After playing the second EGM, the player has won again and the machine is credited with $100. The player then elects to cash out of the second EGM. The second EGM prints and issues a new ticket 42. The player may then take the ticket 42 to a validation station 18. The player inserts the ticket 42 into an appropriate slot on the validation station 18. The validation station 18 reads the bar code, processes the information, and dispenses $100 in currency to the player.
Obviously, many modifications and variations of the present invention are possible in light of the above teachings. The invention may be practiced otherwise than as specifically described within the scope of the appended claims.
标题 | 发布/更新时间 | 阅读量 |
---|---|---|
一种基于区块链的异质频谱多轮拍卖方法 | 2020-05-17 | 59 |
一种增强加密货币匿名性的方法 | 2020-05-20 | 187 |
加密性保证的交换控制的网络 | 2020-05-25 | 461 |
一种基于区块链的数字资产信息交换系统及方法 | 2020-05-21 | 394 |
一种基于加密货币的跨平台推广系统 | 2020-05-22 | 699 |
基于区块链技术的大众自助公证系统平台 | 2020-05-13 | 41 |
提供微服务信息 | 2020-05-22 | 33 |
一种文件处理方法及装置 | 2020-05-26 | 923 |
区块链的交易生成方法和区块链的块验证方法 | 2020-05-11 | 521 |
一种基于智能合约的加密货币多通道支付方法 | 2020-05-14 | 61 |
高效检索全球专利专利汇是专利免费检索,专利查询,专利分析-国家发明专利查询检索分析平台,是提供专利分析,专利查询,专利检索等数据服务功能的知识产权数据服务商。
我们的产品包含105个国家的1.26亿组数据,免费查、免费专利分析。
专利汇分析报告产品可以对行业情报数据进行梳理分析,涉及维度包括行业专利基本状况分析、地域分析、技术分析、发明人分析、申请人分析、专利权人分析、失效分析、核心专利分析、法律分析、研发重点分析、企业专利处境分析、技术处境分析、专利寿命分析、企业定位分析、引证分析等超过60个分析角度,系统通过AI智能系统对图表进行解读,只需1分钟,一键生成行业专利分析报告。