Systems and methods for providing access to wireless gaming devices
First Claim
Patent Images
1. An apparatus comprising a storage medium that includes software that when executed by the apparatus directs the apparatus to:
- perform a security check that results in a determination that a user of a communication device is authorized to access the communication device, wherein performing the security check includes;
(i) obtaining an identifier from a security device,wherein the security device comprises one of a least two security devices, andwherein the identifier comprises a code, the code having a first value when the identifier is obtained from a first of the at least two security devices, and the code having a second value when the identifier is obtained from a second of the at least two security devices; and
(ii) based at least in part on the value of the code, determining whether the security device from which the identifier is obtained comprises at least one of the first and the second security devices; and
provide to the user of the communication device access to the communication device based at least in part on the determination that the user is authorized to access the communication device.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for controlling access to wireless gaming devices and networks are provided. For example, access is controlled through one or more levels of security check, such as a hard security check instead of or in addition to a soft security check. In a hard security check, the user employs an apparatus such as a card or other physical token that can be used to access the wireless gaming device. Such an apparatus may communicate information that identifies the user to the device or may simply be used to produce a signal without which the device is locked to users.
-
Citations
20 Claims
-
1. An apparatus comprising a storage medium that includes software that when executed by the apparatus directs the apparatus to:
-
perform a security check that results in a determination that a user of a communication device is authorized to access the communication device, wherein performing the security check includes; (i) obtaining an identifier from a security device, wherein the security device comprises one of a least two security devices, and wherein the identifier comprises a code, the code having a first value when the identifier is obtained from a first of the at least two security devices, and the code having a second value when the identifier is obtained from a second of the at least two security devices; and (ii) based at least in part on the value of the code, determining whether the security device from which the identifier is obtained comprises at least one of the first and the second security devices; and provide to the user of the communication device access to the communication device based at least in part on the determination that the user is authorized to access the communication device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
performing a security check that results in a determination that a user of communication device is authorized to access the communication device, wherein performing the security check includes; (i) obtaining an identifier from a security device, wherein the security device comprises one of a least two security devices, and wherein the identifier comprises a code, the code having a first value when the identifier is obtained from a first of the at least two security devices, and the code having a second value when the identifier is obtained from a second of the at least two security devices; and (ii) based at least in part on the value of the code, determining whether the security device from which the identifier is obtained comprises at least one of the first and the second security devices; and providing to the user of the communication device access to the communication device based at least in part on the determination that the user is authorized to access the communication device. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification