Patents by Inventor Ian Simmons

Ian Simmons has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8235804
    Abstract: A method of conducting a community-based wagering game event includes the acts of displaying images associated with a community-based wagering game on a surface, sensing a player's movement using a sensing device, the player's movement comprising a game input, and outputting to a controller a signal bearing data relating to the player's movement. The method also includes the acts of determining, using the controller, a relation between the player's movement and the displayed images on the surface and adapting the displayed images responsive to the player's movement.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: August 7, 2012
    Assignee: WMS Gaming Inc.
    Inventors: Mark B. Gagner, Anthony Prohl, Gene Rigsby, Patrick Schaefer, Ian Simmons
  • Publication number: 20110169690
    Abstract: A method of estimating the position of a first event of interest using a satellite positioning system. The method comprises: performing in response to the first event a satellite reception function; determining at some later time whether it is possible to calculate a position estimate from signals resulting from the satellite reception function; and, if not, estimating the position of the first event based on a position estimate of a second event, wherein the second event is that closest in time to the first for which a position estimate is available. Thus, the method can provide a position estimate for the first event even if the satellite reception function fails.
    Type: Application
    Filed: September 9, 2009
    Publication date: July 14, 2011
    Inventors: Andrew T. Yule, Ian Simmons
  • Publication number: 20100291993
    Abstract: A method of conducting a community-based wagering game event includes the acts of displaying images associated with a community-based wagering game on a surface, sensing a player's movement using a sensing device, the player's movement comprising a game input, and outputting to a controller a signal bearing data relating to the player's movement. The method also includes the acts of determining, using the controller, a relation between the player's movement and the displayed images on the surface and adapting the displayed images responsive to the player's movement.
    Type: Application
    Filed: May 7, 2008
    Publication date: November 18, 2010
    Inventors: Mark B. Gagner, Anthony Prohl, Gene Rigsby, Patrick Schaefer, Ian Simmons
  • Publication number: 20100142594
    Abstract: A method of receiving and processing an RF signal comprises receiving (5) the RF signal; analogue processing the signal and providing a digital output to a digital signal processor, the digital output including an added identification code unique to an RF front end receiver hardware. Within the digital signal processor, the identification code is compared with a predetermined identification code or set of codes to determine if there is match. If there is a (10) match, the digital output is processed to provide data to the user, and if there is not a match, an error function is implemented. This method enables a software developer to make the system function only when there is a match between the hardware and the software. This makes copying the software as difficult as copying the hardware, because (15) copied software will not work with the incorrect hardware batch.
    Type: Application
    Filed: December 3, 2007
    Publication date: June 10, 2010
    Inventors: Andrew Thomas Yule, Ian Simmons
  • Publication number: 20080091958
    Abstract: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
    Type: Application
    Filed: October 26, 2007
    Publication date: April 17, 2008
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20080091957
    Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key(190).
    Type: Application
    Filed: October 25, 2007
    Publication date: April 17, 2008
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20080091956
    Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
    Type: Application
    Filed: October 25, 2007
    Publication date: April 17, 2008
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20080059812
    Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
    Type: Application
    Filed: October 25, 2007
    Publication date: March 6, 2008
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20080052515
    Abstract: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
    Type: Application
    Filed: October 26, 2007
    Publication date: February 28, 2008
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20070255955
    Abstract: Methods and apparati for securely loading one or more computer software applications onto a tamper resistant module (TRM) (107) and for securely deleting one or more applications from the TRM. An embodiment of the invention comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept loading of an application. Thereafter, the method provides for loading the application onto the TRM (107) only after the first step determines that the TRM (107) is qualified to accept the loading of the application. Another embodiment comprises a method for determining, based at least upon an encrypted personalization data block, whether a TRM (107) is part of a qualified set of TRM's to accept deleting of an application. Thereafter, the method provides for deleting the application from the TRM (107) only when the first step determines that the TRM (107) is qualified to accept the deleting of the application.
    Type: Application
    Filed: February 16, 2007
    Publication date: November 1, 2007
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20070180276
    Abstract: Methods, apparati, and computer-readable media for securely transporting a software application onto a tamper resistant module (TRM) (103) by using an individualized TRM key set. A method embodiment of the present invention comprises: storing a key pair unique to the TRM (103) in a memory located on the TRM (103), where the key pair comprises a TRM public key (150) and a TRM private key (190); retrieving the TRM public key from the TRM; encrypting a portion of the software application using the TRM public key (150); transmitting the encrypted software application to the TRM (103); and recovering and decrypting the encrypted software application using the TRM private key (190).
    Type: Application
    Filed: March 29, 2007
    Publication date: August 2, 2007
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20070167218
    Abstract: A gaming system that allows a player to retain game assets earned during game play on a data storage medium (e.g., a paper ticket) for use in future gaming sessions. A game asset provides the player with an advantage for winning an award or for acquiring a larger award. The player receives the ticket during, or at the end of the player's gaming session. The player holds the ticket until his next gaming session, or may alternatively use the ticket in the same gaming session. At that time, the player may insert the ticket into the gaming machine's bill validator. The bill validator reads the tickets, and configures the game according to the game assets stored on the ticket.
    Type: Application
    Filed: February 23, 2005
    Publication date: July 19, 2007
    Inventors: Wayne Rothschild, Jeremy Hornik, Noel Steere, Mark Sieka, Ian Simmons, Allon Englman
  • Publication number: 20070143616
    Abstract: Methods and systems for flexibly loading an application, e.g., a software application, and associated data from an application provider (101) onto a tamper resistant module (TRM) (103) having an I/O buffer (115) and a memory (119). A method embodiment of the invention comprises determining (501) the size of the TRM's I/O buffer (115), segmenting (503) the application to be loaded and its associated data into a plurality of segments, with each segment adapted to be stored in the I/O buffer (115) and the size of each segment being a function of the determined size of the I/O buffer (115), separately transmitting (505) each segment to the tamper resistant module (103), and storing (603) each separately transmitted segment in a selected one of one or more available spaces of the TRM's memory (119), said spaces selected depending upon the size of each segment and upon which of said available spaces has the smallest available area in the TRM's memory (119) in which the segment can be stored.
    Type: Application
    Filed: January 19, 2007
    Publication date: June 21, 2007
    Inventors: David Everett, Stuart Miller, Anthony Peacham, Ian Simmons, Timothy Richards, John Viner
  • Publication number: 20060252492
    Abstract: A gaming machine comprises at least one visual display (mechanical or video) and a game of chance controlled by a processor in response to a wager. The game of chance includes a primary game and a sorting feature. The sorting feature is triggered by certain start-feature outcomes of the primary game. The sorting feature includes a collection of scrambled objects, such as letters, symbols, pictures, or puzzle pieces, that are at least partially sorted during operation of the sorting feature. The sorting feature generates an award, such as a payoff, a payoff multiplier, or extended play, if the sorted objects match predetermined criteria.
    Type: Application
    Filed: June 30, 2006
    Publication date: November 9, 2006
    Inventors: Peter Anderson, Michael Casey, Erica Frohm, Jason Gilmore, Damon Gura, Darryl Hughes, Joel Jaffe, Ian Simmons
  • Publication number: 20060252487
    Abstract: A gaming machine comprises at least one visual display (mechanical or video) and a game of chance controlled by a processor in response to a wager. The game of chance includes a primary game and a sorting feature. The sorting feature is triggered by certain start-feature outcomes of the primary game. The sorting feature includes a collection of scrambled objects, such as letters, symbols, pictures, or puzzle pieces, that are at least partially sorted during operation of the sorting feature. The sorting feature generates an award, such as a payoff, a payoff multiplier, or extended play, if the sorted objects match predetermined criteria.
    Type: Application
    Filed: July 6, 2006
    Publication date: November 9, 2006
    Inventors: Peter Anderson, Michael Casey, Erica Frohm, Jason Gilmore, Damon Gura, Darryl Hughes, Joel Jaffe, Ian Simmons