UNIVERSAL KEY SECURITY METHOD AND SYSTEM
First Claim
1. A method of providing security in a gaming machine, the method comprising:
- receiving a mechanical key in a lock within said gaming machine;
reading a first source of indicia from said key, wherein said first source of indicia comprises information or data specific to said lock;
reading a second source of indicia, wherein said second source of indicia comprises information specific to one or more users of said key;
authorizing a use of said key based on the readings of said first and second sources of indicia; and
permitting access to said key accessible environment.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus for providing universal key security in a mechanical key access environment is disclosed. An electromechanical lock is provided for securing an environment, whereby access is permitted through the steps of receiving a key in the lock, reading a first source of indicia from the key, wherein said first source of indicia comprises information or data specific to said lock, reading a second source of indicia, wherein the second source of indicia comprises information specific to the user of the key, and authorizing a use of the key based on both indicia readings. One embodiment involves the use of a biometric device within the key or on or near the lock, with one example of such a device being a fingerprint sensor. Another embodiment involves the use of added information, such as the entry of an individual PIN number by the user of the key.
-
Citations
47 Claims
-
1. A method of providing security in a gaming machine, the method comprising:
-
receiving a mechanical key in a lock within said gaming machine;
reading a first source of indicia from said key, wherein said first source of indicia comprises information or data specific to said lock;
reading a second source of indicia, wherein said second source of indicia comprises information specific to one or more users of said key;
authorizing a use of said key based on the readings of said first and second sources of indicia; and
permitting access to said key accessible environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of providing security in a key accessible environment, the method comprising:
-
receiving a key in a lock;
reading a first source of indicia from said key, wherein said first source of indicia comprises information or data specific to said lock;
reading a second source of indicia, wherein said second source of indicia comprises information specific to one or more users of said key;
authorizing a use of said key based on the readings of said first and second sources of indicia; and
permitting access to said key accessible environment. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. An apparatus, comprising:
-
a key accessible environment; and
an electromechanical lock securing said key accessible environment, wherein said electromechanical lock is adapted to deny access to said key accessible environment unless a mechanical key having a correct first source of indicia is inserted into the lock and an authorization signal is provided based upon the verification of a correct second source of indicia with respect to the user of said mechanical key. - View Dependent Claims (25, 26, 27, 28)
-
-
29. An apparatus, comprising:
a locking means for securing a key accessible environment, wherein said locking means is adapted to deny access to said key accessible environment unless two separate sources of indicia are read and confirmed by said locking means. - View Dependent Claims (30)
-
31. A gaming machine, comprising:
-
at least one key accessible region; and
an electromechanical lock securing said at least one key accessible region, wherein said electromechanical lock is adapted to deny access to said key accessible region unless a mechanical key having a correct first source of indicia is inserted into the lock and an authorization signal is provided based upon the verification of a correct second source of indicia with respect to the user of said mechanical key. - View Dependent Claims (32, 33, 34, 35)
-
-
36. A method of providing security in a gaming machine, the method comprising:
-
receiving a key in a lock;
reading a user-based source of indicia, wherein said user-based source of indicia comprises information specific to one or more users of said key;
authorizing a use of said key based on an affirmative reading of said user-based source of indicia; and
permitting access to said gaming machine or a component thereof in the event that said key is a correct key for said lock. - View Dependent Claims (37, 38, 39, 40)
-
-
41. A universal key security system, comprising:
-
at least one computer server; and
one or more gaming machines in communication with said at least one computer server, wherein at least one of said one or more gaming machines comprises an electromechanical lock securing at least one region of said gaming machine, wherein said electromechanical lock is adapted to deny access to said at least one region of said gaming machine unless a key having a correct first source of indicia is inserted into the lock and an authorization signal is provided based at least in part upon the verification of a correct second source of indicia with respect to the user of said mechanical key. - View Dependent Claims (42, 43, 44, 45, 46, 47)
-
Specification