摘要:
A method of conducting a community-based wagering game event includes the acts of displaying images associated with a community-based wagering game on a surface, sensing a player's movement using a sensing device, the player's movement comprising a game input, and outputting to a controller a signal bearing data relating to the player's movement. The method also includes the acts of determining, using the controller, a relation between the player's movement and the displayed images on the surface and adapting the displayed images responsive to the player's movement.
摘要:
Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key(190).
摘要:
Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
摘要:
Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
摘要:
A gaming machine comprises at least one visual display (mechanical or video) and a game of chance controlled by a processor in response to a wager. The game of chance includes a primary game and a sorting feature. The sorting feature is triggered by certain start-feature outcomes of the primary game. The sorting feature includes a collection of scrambled objects, such as letters, symbols, pictures, or puzzle pieces, that are at least partially sorted during operation of the sorting feature. The sorting feature generates an award, such as a payoff, a payoff multiplier, or extended play, if the sorted objects match predetermined criteria.
摘要:
A method of estimating the position of a first event of interest using a satellite positioning system. The method comprises: performing in response to the first event a satellite reception function; determining at some later time whether it is possible to calculate a position estimate from signals resulting from the satellite reception function; and, if not, estimating the position of the first event based on a position estimate of a second event, wherein the second event is that closest in time to the first for which a position estimate is available. Thus, the method can provide a position estimate for the first event even if the satellite reception function fails.
摘要:
A gaming system that allows a player to retain game assets earned during game play on a data storage medium (e.g., a paper ticket) for use in future gaming sessions. A game asset provides the player with an advantage for winning an award or for acquiring a larger award. The player receives the ticket during, or at the end of the player's gaming session. The player holds the ticket until his next gaming session, or may alternatively use the ticket in the same gaming session. At that time, the player may insert the ticket into the gaming machine's bill validator. The bill validator reads the tickets, and configures the game according to the game assets stored on the ticket.
摘要:
A method of receiving and processing an RF signal comprises receiving (5) the RF signal; analogue processing the signal and providing a digital output to a digital signal processor, the digital output including an added identification code unique to an RF front end receiver hardware. Within the digital signal processor, the identification code is compared with a predetermined identification code or set of codes to determine if there is match. If there is a (10) match, the digital output is processed to provide data to the user, and if there is not a match, an error function is implemented. This method enables a software developer to make the system function only when there is a match between the hardware and the software. This makes copying the software as difficult as copying the hardware, because (15) copied software will not work with the incorrect hardware batch.
摘要:
Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
摘要:
Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).