Patents by Inventor Ian Simmons
Ian Simmons has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8235804Abstract: A method of conducting a community-based wagering game event includes the acts of displaying images associated with a community-based wagering game on a surface, sensing a player's movement using a sensing device, the player's movement comprising a game input, and outputting to a controller a signal bearing data relating to the player's movement. The method also includes the acts of determining, using the controller, a relation between the player's movement and the displayed images on the surface and adapting the displayed images responsive to the player's movement.Type: GrantFiled: May 7, 2008Date of Patent: August 7, 2012Assignee: WMS Gaming Inc.Inventors: Mark B. Gagner, Anthony Prohl, Gene Rigsby, Patrick Schaefer, Ian Simmons
-
Publication number: 20110169690Abstract: A method of estimating the position of a first event of interest using a satellite positioning system. The method comprises: performing in response to the first event a satellite reception function; determining at some later time whether it is possible to calculate a position estimate from signals resulting from the satellite reception function; and, if not, estimating the position of the first event based on a position estimate of a second event, wherein the second event is that closest in time to the first for which a position estimate is available. Thus, the method can provide a position estimate for the first event even if the satellite reception function fails.Type: ApplicationFiled: September 9, 2009Publication date: July 14, 2011Inventors: Andrew T. Yule, Ian Simmons
-
Publication number: 20100291993Abstract: A method of conducting a community-based wagering game event includes the acts of displaying images associated with a community-based wagering game on a surface, sensing a player's movement using a sensing device, the player's movement comprising a game input, and outputting to a controller a signal bearing data relating to the player's movement. The method also includes the acts of determining, using the controller, a relation between the player's movement and the displayed images on the surface and adapting the displayed images responsive to the player's movement.Type: ApplicationFiled: May 7, 2008Publication date: November 18, 2010Inventors: Mark B. Gagner, Anthony Prohl, Gene Rigsby, Patrick Schaefer, Ian Simmons
-
Publication number: 20100142594Abstract: A method of receiving and processing an RF signal comprises receiving (5) the RF signal; analogue processing the signal and providing a digital output to a digital signal processor, the digital output including an added identification code unique to an RF front end receiver hardware. Within the digital signal processor, the identification code is compared with a predetermined identification code or set of codes to determine if there is match. If there is a (10) match, the digital output is processed to provide data to the user, and if there is not a match, an error function is implemented. This method enables a software developer to make the system function only when there is a match between the hardware and the software. This makes copying the software as difficult as copying the hardware, because (15) copied software will not work with the incorrect hardware batch.Type: ApplicationFiled: December 3, 2007Publication date: June 10, 2010Inventors: Andrew Thomas Yule, Ian Simmons
-
Publication number: 20080091958Abstract: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.Type: ApplicationFiled: October 26, 2007Publication date: April 17, 2008Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20080091957Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key(190).Type: ApplicationFiled: October 25, 2007Publication date: April 17, 2008Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20080091956Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).Type: ApplicationFiled: October 25, 2007Publication date: April 17, 2008Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20080059812Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).Type: ApplicationFiled: October 25, 2007Publication date: March 6, 2008Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20080052515Abstract: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.Type: ApplicationFiled: October 26, 2007Publication date: February 28, 2008Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20070255955Abstract: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.Type: ApplicationFiled: February 16, 2007Publication date: November 1, 2007Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20070180276Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).Type: ApplicationFiled: March 29, 2007Publication date: August 2, 2007Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20070167218Abstract: A gaming system that allows a player to retain game assets earned during game play on a data storage medium (e.g., a paper ticket) for use in future gaming sessions. A game asset provides the player with an advantage for winning an award or for acquiring a larger award. The player receives the ticket during, or at the end of the player's gaming session. The player holds the ticket until his next gaming session, or may alternatively use the ticket in the same gaming session. At that time, the player may insert the ticket into the gaming machine's bill validator. The bill validator reads the tickets, and configures the game according to the game assets stored on the ticket.Type: ApplicationFiled: February 23, 2005Publication date: July 19, 2007Inventors: Wayne Rothschild, Jeremy Hornik, Noel Steere, Mark Sieka, Ian Simmons, Allon Englman
-
Publication number: 20070143616Abstract: Methods and systems for flexibly loading an application, e.g., a software application, and associated data from an application provider (101) onto a tamper resistant module (TRM) (103) having an I/O buffer (115) and a memory (119). A method embodiment of the invention comprises determining (501) the size of the TRM's I/O buffer (115), segmenting (503) the application to be loaded and its associated data into a plurality of segments, with each segment adapted to be stored in the I/O buffer (115) and the size of each segment being a function of the determined size of the I/O buffer (115), separately transmitting (505) each segment to the tamper resistant module (103), and storing (603) each separately transmitted segment in a selected one of one or more available spaces of the TRM's memory (119), said spaces selected depending upon the size of each segment and upon which of said available spaces has the smallest available area in the TRM's memory (119) in which the segment can be stored.Type: ApplicationFiled: January 19, 2007Publication date: June 21, 2007Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
-
Publication number: 20060252492Abstract: A gaming machine comprises at least one visual display (mechanical or video) and a game of chance controlled by a processor in response to a wager. The game of chance includes a primary game and a sorting feature. The sorting feature is triggered by certain start-feature outcomes of the primary game. The sorting feature includes a collection of scrambled objects, such as letters, symbols, pictures, or puzzle pieces, that are at least partially sorted during operation of the sorting feature. The sorting feature generates an award, such as a payoff, a payoff multiplier, or extended play, if the sorted objects match predetermined criteria.Type: ApplicationFiled: June 30, 2006Publication date: November 9, 2006Inventors: Peter Anderson, Michael Casey, Erica Frohm, Jason Gilmore, Damon Gura, Darryl Hughes, Joel Jaffe, Ian Simmons
-
Publication number: 20060252487Abstract: A gaming machine comprises at least one visual display (mechanical or video) and a game of chance controlled by a processor in response to a wager. The game of chance includes a primary game and a sorting feature. The sorting feature is triggered by certain start-feature outcomes of the primary game. The sorting feature includes a collection of scrambled objects, such as letters, symbols, pictures, or puzzle pieces, that are at least partially sorted during operation of the sorting feature. The sorting feature generates an award, such as a payoff, a payoff multiplier, or extended play, if the sorted objects match predetermined criteria.Type: ApplicationFiled: July 6, 2006Publication date: November 9, 2006Inventors: Peter Anderson, Michael Casey, Erica Frohm, Jason Gilmore, Damon Gura, Darryl Hughes, Joel Jaffe, Ian Simmons