Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD OF CONTROLLING ACCESS TO A FUNCTION
Document Type and Number:
WIPO Patent Application WO/2020/012168
Kind Code:
A1
Abstract:
The invention relates to a two stage method of controlling access to a function the method comprising the steps of: storing a set of access levels for a first security stage and for a second security stage, the access levels defining a threshold for progressing through the first security stage and second security stage; receiving a user input representative of an access level for the second security stage; selecting the access level of the first security stage in dependence of the user input; processing user input representative of an access attempt for the first security stage; accessing the second security stage in dependence on progressing through the first security stage; and indicating a positive or negative outcome of access to the function.

Inventors:
GEOFFREY PARKER ALAN (GB)
Application Number:
PCT/GB2019/051924
Publication Date:
January 16, 2020
Filing Date:
July 09, 2019
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
ACE GAMING LTD (GB)
International Classes:
H04L29/06; G06F21/31; G06F21/62
Foreign References:
US20150052587A12015-02-19
US20170163658A12017-06-08
US20140310805A12014-10-16
GB201811224A2018-07-09
Attorney, Agent or Firm:
DAVIES, Elliott (GB)
Download PDF:
Claims:
Claims

1. A two stage method of controlling access to a function, the method comprising the steps of:

storing a set of access levels for a first security stage and for a second security stage, the access levels defining a threshold for progressing through the first security stage and second security stage;

receiving a user input representative of an access level for the second security stage;

selecting the access level of the first security stage in dependence of the user input;

processing user input representative of an access attempt for the first security stage;

accessing the second security stage in dependence on progressing through the first security stage;

and indicating a positive or negative outcome of access to the function.

2. The method according to Claim 1 , further comprising the step:

receiving a user input representative of a highest access level for the first security stage.

3. The method according to any previous Claim, wherein the user input representative of an access level for the second security stage is inversely proportional with the selected access level of the first security stage.

4. The method according to any previous Claim, further comprising the step:

setting a target value representative of a highest access level for the combined first and second security stage.

5. The method according to Claim 4, wherein the access level for the second security stage is limited to the target value.

6. The method according to Claim 5, further comprising the step: selecting the access level of the first security stage in dependence of the target value.

7. The method according to any of Claim 4 to 6, further comprising the step:

receiving a user input representative of an access level modifier for the first security stage, the access level modifier defining a tolerance augmentation to create a modified access level.

8. The method according to Claim 7, wherein the access level modifier for the first security stage is limited to the target value.

9. The method according to Claim 7, wherein the combined modified access level for the first security stage and access level for the second security stage are limited to the target value.

10. The method according to any previous Claim, wherein the access level of the first security stage and second security stage comprise one or more access level fragments, the access level fragments separately and respectively defining partial thresholds for progressing through the first security stage and second security stage; the method further comprising the steps:

receiving a user input representative of a number of access level fragments of the first security stage and second security stage; and,

receiving a user input representative of a threshold for progressing through the selected number of first security stage access level fragments and the second security stage access level fragments.

1 1. The method according to Claim 10, further comprising the step:

selecting the access level of the first security stage in dependence of the user input representative of the threshold for progressing through the selected first security level access level fragments and/or the second security level access level fragments.

12. The method according to any previous Claim, wherein in the event of non progression through the first security stage, access to the second security stage is denied, and, in the event of progression through the first security stage, access to the second security stage is granted.

13. The method according to any previous Claim, wherein in the event of non progression through the second security stage, access to the function is denied, and, in the event of progression through the second security stage access to the function is granted.

14. The method according to Claim 10 as appended to Claim 4, wherein the combined first security stage access level fragments and the second security level access level fragments are limited to the target value.

15. The method according to any previous claim, wherein the first security stage and second security stage comprise first and second non-overlapping temporal periods.

16. The method according to Claim 15, wherein the first security stage temporal period and second security stage temporal period are determined in dependence of the user input representative of the access level for the second security stage.

17. The method according to Claim 15 or 16, wherein the temporal period of first security stage is inversely proportional with the selected access level of the first security stage as determined by the user input representative of the access level for the second security stage.

18. The method according to any of Claim 15 to 17 as appended to Claim 10, wherein the first security stage access level fragments and the second security level access level fragments comprise temporal durations, the temporal durations separately and respectively defining segments of the temporal periods of the first security stage and second security stage.

19. The method according to any Claim 18, wherein the temporal durations are determined in dependence of the user input representative of the number of access level fragments of the first security stage and second security stage; and, the user input representative of the threshold for progressing through the selected number of first security stage access level fragments and the second security stage access level fragments.

20. An apparatus, comprising a processor communicatively coupled to a memory, the memory holding instructions that when executed by the processor, cause the apparatus to perform the method steps of any previous Claim.

21.The apparatus of Claim 20 further comprising an input and output device.

22. A computer-readable medium holding instructions configured to be executed by a processor to cause a computer to perform the method steps of any Claims 1 to 19.

Description:
METHOD OF CONTROLLING ACCESS TO A FUNCTION

The present invention relates to methods, systems and apparatus for controlling access to a function.

Many computer systems, communication systems and physical environments rely on the use of various security means, including passwords, for authentication and prevention of access by authorized and unauthorized users, respectively. A password is an authentication means, commonly a sequence of alphanumeric characters known only to an authorized user that can be entered on a keyboard. However, an authentication means may comprise any act or series of acts that must be performed to gain access to a system and which acts are, at least presumably, known only by persons authorized to have access to the system. Whilst a series of alphanumeric characters that may be typed on a keyboard is the most common form for a password, other types are known, for example voiced or biometric passwords, and apparatus which require a particular series of manipulations of an input are also known.

Continual improvements in and relating to methods of controlling access are important to almost all aspects of modern technology.

The present invention proposes a two stage access control method, to control and limit the access of a user to various systems and for various purposes, as will be demonstrated with respect to exemplary embodiments. The invention comprises a method where the user can set the difficulty of the second security level before entering a“password” for the first security level. The user selected difficulty for the second stage affects the difficult of the first stage. The user cannot access the second stage unless they are successful in the first stage. Such a method can effectively control and limit access to the protected function.

An example of this method’s use, is in respect of a controlling access to a password protected device or account, such as a parental lock on a child’s smartphone or an online banking application. It is well known that limiting screen time to young people is important for a multitude of social and health reasons, such as content control and addition. The ubiquity of personal information on the internet has seen a rise in social engineering security methods, many countermeasures have been employed to combat this. Therefore it is desirable to be able to control and limit the exposure of a underlying function to both authorized and unauthorized users.

An example of this method’s use, is in respect to controlling access to a wagering game is given in GB181 1224.3. In the UK a gaming machine is currently defined by the Gambling Act 2005 as a machine that is designed or adapted for use by individuals to gamble (whether or not it can also be used for other purposes).

Gaming machines fall into categories depending on the maximum stake and prize available. The Gambling Commission currently define these categories as follows:

Table 1

As shown in Table 1 above, the category of game determines the maximum stake, the maximum prize and the allowed premises. Due to the maximum £100 stake, players can lose large sums of money over a short period of time and this has become a social issue, with much lobbying for these games to either be banned or have the maximum stake significantly reduced.

Due to this pressure, various restrictions on this type of game were introduced by the Gambling Commission to try to address this. These included the requirement for a player to register or make a request at the location if they want to stake more than £50 per game. This seems to have only had a limited effect.

More recently the Gambling Commission has recommended to the Department for Culture, Media and Sport (DCMS) that the maximum stake for B2 games should be restricted to £30 per game. However, the DCMS has now announced that it will reduce the maximum stake to £2.

To control and limit the exposure of a user to significant financial losses, while any addiction is addressed, the present invention proposes a two stage game where the player can set the potential value of a second stage game before paying for a first stage game. The player cannot access the second stage game unless the first stage game is won. Once the first stage game has commenced, the player cannot change the potential value of the second stage game.

Other examples of use of this method are envisaged but not limited to: controlling access to physical environments such as personal dwellings, verification of ID, granting access according to pre-set access levels, and, cryptographic systems such as coded telecommunications. Such functions can benefit from the method.

According to a first aspect of the present invention there is provided a two stage method of controlling access to a function, the method comprising the steps of: storing a set of access levels for a first security stage and for a second security stage, the access levels defining a threshold for progressing through the first security stage and second security stage; receiving a user input representative of an access level for the second security stage; selecting the access level of the first security stage in dependence of the user input; processing user input representative of an access attempt for the first security stage; accessing the second security stage in dependence on progressing through the first security stage; and indicating a positive or negative outcome of access to the function.

Advantageously, any user can be controlled and limited by adjusting the difficulty of the first security stage in dependence on the second security stage. In this way a access difficulty may be maintained regardless of whether one stage has been compromised. The relationship between the stages allows for numerous strategies to be employed beneficial to specific situations. The function may be access to a wagering game, an access level controlled file, bank account, ID verification technique or physical access to an environment. The access levels may be a set of probabilities of success/positive outcome, a number of characters from a variable length strings, a level of concordance with an physical gesture or biometric marker.

In an embodiment, the method, further comprising the step: receiving a user input representative of a highest access level for the first security stage.

Advantageously, a maximum difficulty for the first stage can be set, such that the relationship with the second stage does not create impossible odds.

In an embodiment, the user input representative of an access level for the second security stage is inversely proportional with the selected access level of the first security stage. This is a preferable embodiment.

In an embodiment the method, further comprising the step: setting a target value representative of a highest access level for the combined first and second security stage.

Advantageously, the combined difficulty of the first and second stage can be set, such that the relationship between the two can operate in a manner suitable for specific embodiments, such as where access will eventually be granted.

In an embodiment, the access level for the second security stage is limited to the target value. This allows for a second stage to be at a highest difficulty while the first stage may almost certainly be successful which may be advantageous in certain scenarios.

In an embodiment, the method further comprising the step: selecting the access level of the first security stage in dependence of the target value. An alternate ability for the relationship defining the first stage difficulty may be beneficial in scenarios where maximum difficulties are set.

In an embodiment, the method further comprising the step: receiving a user input representative of an access level modifier for the first security stage, the access level modifier defining a tolerance augmentation to create a modified access level. Advantageously, the first stage may be further modified beyond the relationship with the second stage or target value.

In an embodiment, the access level modifier for the first security stage is limited to the target value. Likewise to the second stage the first stage may be ata highest difficulty while the second stage may almost certainly be successful which may be advantageous in certain scenarios.

In an embodiment, the combined modified access level for the first security stage and access level for the second security stage are limited to the target value. This is another beneficial relationship in certain scenarios where limits on difficulty are required.

In an embodiment, the access level of the first security stage and second security stage comprise one or more access level fragments, the access level fragments separately and respectively defining partial thresholds for progressing through the first security stage and second security stage; the method further comprising the steps: receiving a user input representative of a number of access level fragments of the first security stage and second security stage; and, receiving a user input representative of a threshold for progressing through the selected number of first security stage access level fragments and the second security stage access level fragments. Advantageously the first and second stages may be comprised of sub stages, for example instead of require a single character of a password in a first stage there may be required three characters, alternatively the first stage may require one or more user inputs before the threshold for progressing is reached. The number and difficulty of the individual fragments can be set by the user.

In an embodiment, the method further comprising the step: selecting the access level of the first security stage in dependence of the user input representative of the threshold for progressing through the selected first security level access level fragments and/or the second security level access level fragments. Advantageously the fragments for each stage can take advantage of the relationship between the first and second stage.

In an embodiment, in the event of non-progression through the first security stage, access to the second security stage is denied, and, in the event of progression through the first security stage, access to the second security stage is granted.

In an embodiment, in the event of non-progression through the second security stage, access to the function is denied, and, in the event of progression through the second security stage access to the function is granted.

In an embodiment, the combined first security stage access level fragments and the second security level access level fragments are limited to the target value.

In an embodiment, the first security stage and second security stage comprise first and second non-overlapping temporal periods. Advantageously the stages of the methods can be combined with a duration in time to further improve the granularity of access control to a function.

In an embodiment, the first security stage temporal period and second security stage temporal period are determined in dependence of the user input representative of the access level for the second security stage. Advantageously the time periods for each stage can take advantage of the relationship between the first and second stage. In an embodiment, the temporal period of first security stage is inversely proportional with the selected access level of the first security stage as determined by the user input representative of the access level for the second security stage. This is a preferable embodiment mirroring the potential relationship between access levels of the stages.

In an embodiment, the first security stage access level fragments and the second security level access level fragments comprise temporal durations, the temporal durations separately and respectively defining partial spans of the temporal periods of the first security stage and second security stage. The access levels fragments may also have associated time duration, further increasing the access control of the method.

In an embodiment, the temporal durations are determined in dependence of the user input representative of the number of access level fragments of the first security stage and second security stage; and, the user input representative of the threshold for progressing through the selected number of first security stage access level fragments and the second security stage access level fragments. This is a preferable embodiment mirroring the potential relationship between access level fragemnets of the stages.

According to a second aspect of the present invention there is provided; an apparatus, comprising a processor communicatively coupled to a memory, the memory holding instructions that when executed by the processor, cause the apparatus to perform the method steps according to the first aspect. In an embodiment, the apparatus further comprising an input and output device.

According to a third aspect of the present invention there is provided; a computer- readable medium holding instructions configured to be executed by a processor to cause a computer to perform the method steps according to the first aspect.

According to an exemplary embodiment of the present invention there is provided a method of controlling access to a wagering game, the method comprising the steps of: storing a set of probabilities for a positive outcome of a first game and for a second game; receiving user input indicating a wager amount for the second game; selecting the probability of a positive outcome of the first game in dependence of the user input for the second game; accessing the second game in dependence on a positive outcome of the first game being achieved.

Advantageously, the financial exposure of the user can be controlled and limited by activating the larger potential wager on the second game only when a positive outcome, namely a win, of the first game is achieved.

In an embodiment, the method further comprises the steps: receiving user input indicating a stake amount for the first game.

In an embodiment, the wager value is inversely proportional with the probability of a positive outcome of the first game.

In an embodiment, the method further comprises the step: receiving a user input indicating a target value indicating a wager maximum limit.

In an embodiment, the second game wager is limited to the target value.

In an embodiment, the method further comprises the step: selecting the outcome of the first game in dependence of the user input for the target value.

In an embodiment, the method further comprises the step: receiving a user input indicating a sub-wager amount for the first game.

In an embodiment, the sub-wager is limited to the target value.

In an embodiment, the sub-wager and second game wager total are limited to the target value.

In an embodiment, the first and second games comprise one or more features and the method further comprises the steps: receiving user input selecting the first game features and the second games features and user input indicating wager amounts for the selected first game features and the second games features.

In an embodiment, the method further comprises the step: selecting the variable outcome of the first game in dependence of the user input indicating the first game features wagers and/or the second games features wagers.

In an embodiment, in the event of a negative outcome, namely a loss, of the first game the stake and any sub-wager or feature wager are lost and in the event of a positive outcome of the first game the stake and any sub-wager or feature wager are won.

In an embodiment, in the event of a negative outcome of the second game the wager and any second game feature wagers are lost, and, in the event of a positive outcome of the second game the wager and any second game feature wagers are won.

In an embodiment, the first game sub-wager or feature wager and any second game feature wagers total value are limited to the target value.

In an embodiment, the stake is physical currency.

In an embodiment, the first game sub-wager or feature wagers and the second game wager or feature wagers are virtual currency.

In an embodiment, in the event a virtual currency wager is won, the wager is converted from virtual currency to physical currency.

In an embodiment, all wagers are in physical currency.

According to an exemplary embodiment of the present invention, there is provided an apparatus, comprising a processor coupled to a memory, the memory holding instructions that when executed by the processor, cause the apparatus to perform the method steps according to the embodiments. In an embodiment, the apparatus further comprising an input and output device.

According to an exemplary embodiment of the present invention, there is provided a computer readable medium holding instructions configured to be executed by a processor to cause a computer to perform the method steps of the embodiments.

The invention may be performed in various ways and embodiments thereof will now be described, by way of example only, reference being made to the accompanying drawings, in which:

Figure 1 is a flow chart sequencing the steps associated with a method according to an embodiment of the present invention,

Figure 2 is a flow chart sequencing the steps associated with accessing a function according to the method of an embodiment of the present invention,

Figure 3 is a flow chart sequencing the steps associated with a game played according to the method of an embodiment of the present invention,

Figure 4 is a flow chart sequencing the steps associated with a game played according to the method of an embodiment of the present invention, and

Figures 5-8 are illustrations of interfaces for an apparatus according to an embodiment of the present invention.

Referring to Figure 1 of the drawings, there is illustrated a flow chart sequencing the steps of a method (1 ) of controlling access to a function according to an embodiment of the present invention. Upon commencing the method, for example on a smartphone accessing a banking app, the method stores a set of access levels (10), the access levels defining a threshold for progressing through the first security stage and second security stage e.g. the different levels of difficulty for the passwords for each stage. The user inputs an access level for the second stage (12) using an interface which may comprise a touch sensitive display screen. The method selects the access level (difficulty of threshold for progressing) of the first stage in dependence on the user input for the second stage (14) (the second stage may have a fixed level determined by an external policy, such that higher access levels for the second stage can decrease the combined difficulty of the stages. The user will then make an attempt at the first stage (16) e.g. entering a password. The method will then control access to the second stage in dependence on the successful progression of the first stage (18). Depending on the setup of the method, a second input (second password) may be required in the second stage to gain access to the function. Finally the method will indicate to the user a positive or negative outcome of access to the function (20).

Referring to Figure 2 of the drawings there is illustrated a flow chart sequencing the steps of accessing a function according to method (1 ) according to an embodiment of the present invention. The user starts the two stage method (900); this can include selecting a launch button on an application for banking application. In this example the user defines the difficulty of the second stage (902) e.g. a number of randomly chosen characters from a pre-existing alphanumeric string password, which are required to be entered to pass the threshold for progression. In this example the higher difficulty level would require entering more characters of the password and vice versa for lower difficulty. The application takes the input for the second security stage and selects the corresponding access level for the first security stage (904). For example, if the user chooses a low access level on the second security stage, the access level (probability of a successful progression) in the first security stage will be high. The access level (difficulty) of the first security stage may be inversely proportional to the access level selected on the second stage for example, or any other relationship. This can be used to effect/control the access rate of the function. The user then then enters an attempt on the first security stage (906) - this may be another“password” relating to a personal detail of the user. If the user has an unsuccessful or negative outcome on the first security stage then the method ends (912). The user may choose to try the stage again immediately without changing the second stage, before being locked out d ue to numerous failures. If the user has a successful outcome in the first stage i.e. enters the correct password, the user is provided access to the second stage (922). The second stage proceeds, the user in the example will have to enter characters from their pre-existing password and if the user is unsuccessful on the second stage i.e. incorrect, then the application ends (132). If the user has a successful outcome in the second stage i.e. enters correctly, the user will gain access to the function, in this case their bank account on the application (142).

Overview

1. Start Two Stage Method

2. Select Stage 2 access level

3. Stage 2 access level affects difficulty of Stage 1 access level (e.g. higher Stage 2 = lower Stage 1 )

4. Attempt Stage 1

a. Lose Stage 1

i. End method

b. Win Stage 1

i. Progress

5. Attempt Stage 2

a. Lose Stage 2

i. End method

b. Win Stage 2

c. Access function

Further modifications to this method may be introduced, to improve control abilities.

A target value may be added to the method. The user selects a target value before choosing an access level of the second security stage. The target value acts to limit the combined maximum difficulty (threshold for progression) of the first and second security stages. The target value can be used to adjust the probability of successful and unsuccessful outcomes i.e. the difficulty of the access level for the first or second stages.

In an embodiment a further access level modifier can be applied to the first security stge. The access level modifier on the first stage can be a further input which may be placed on the first stage. The access level modifier can be used to adjust the probability of successful and unsuccessful outcome. For example the modifier may affect the concordance/tolerance required of the users answer, such as when the require character is“m”, the additional character“n” may also be acceptable for progressing through the threshold of the access level.

In an embodiment the first and second stages comprise access level fragments; these are chances which may be bet upon within each stage separately and respectively defining partial thresholds for progressing through the first security stage and second security stage. For example a first stage may include entry of one or more passwords each relating to a users personal details i.e. each password being a fragment. The aforementioned access level modifier may be considered an access level fragment in some embodiments. The user can input the amount of fragments and thereby select the probability for a successful outcome in the first stage accordingly. For example, if the user places few and/or easy fragments on the second stage, the probability of a successful outcome in the first stage will be high, the exact nature of the modification may be inversely proportional or any other relationship, this can be used to limit and control access to the function. These fragments also allow for dictation of what is considered a successful or unsuccessful outcome. If the user has an unsuccessful outcome on the first stage i.e. incorrect on a fragment, then the method ends. The user may choose to retry the stage immediately without changing the fragments, if one fragment is correct and another wrong then this may not effect an attempts count negatively. If the user has a successful outcome in the first stage i.e. succeeds on the all the fragments, the user then accesses the second stage. The second stage proceeds, if the user has an unsuccessful outcome a second stage fragment i.e. is incorrect, then the method ends, however, if the user get one fragment and correct and one incorrect, they may be provided another opportunity to attempt the second stage. If the user has a successful outcome in all second stage fragment i.e. wins, the player will gain access to the function.

Associated with all the stages of the method may be adjustable time periods. The durations and separations of and between the time periods of the stages and or fragments may be related to the relationship between the access levels of the first and second security stages (e.g. access level of the first security stage in dependence of the user input). Alternatively, the time durations and separations can be set unrelated to the relationship. For example the temporal duration of a first stage or fragment thereof may be increased as the difficulty for the first stage increases (user input); thereby limiting the speed that attempts that can be made at progressing through the threshold of the first stage. Alternatively if the first stage is progressed a time delay may be placed before the second stage is attempted, furthermore a delay may be placed after progressing through the second stage and preceding access to the function. This grants the method a further ability to control access to a function.

Referring to Figure 3 of the drawings, there is illustrated a flow chart sequencing the steps of a game played according to the method (1 ) of controlling access to a wagering game according to an embodiment of the present invention. The user starts the Two Stage Game (100); this can include selecting a start option from a machine and inserting an amount of money which will be the players bank/credit meter to pay for the game. In this example the user places a“virtual” wager on the second game (102). At this point the user is not wagering from their credit. The game takes the input for the second game wager and selects the corresponding probability for a successful outcome in the first game (104). For example, if the player places a large wager on the second game, the probability of a successful outcome in the first game will be small. The probability of winning the first game may be inversely proportional to the virtual wager placed on the second game for example, or any other relationship. This can be used to effect the“return to player” or“hit frequency” of the game. The player then plays the first game (106) - this requires the payment of a physical wager e.g. on a B3 table, this may be £2. If the player has an unsuccessful or negative outcome on the first game i.e. loses, then the physical bet is lost (1 10) and the game ends (112). The player may choose to replay the game immediately without changing the second game wager, by placing the first game physical wager again or may proceed back to the beginning of the game. If the player has a successful outcome in the first game i.e. wins, the player will have the win/keep the first game physical bet (120). The player then provided access to the second game (122). The second game proceeds, and if the player has an unsuccessful outcome on the second game i.e. loses, then the virtual bet is lost (130) and the game ends (132). If the player has a successful outcome in the second game i.e. wins, the player will win/keep the second game virtual wager (140), the virtual wager may then by converted to physical currency i.e. output to the player or added to the credit. The game then ends (142). The game may then be repeated in a quick manner by maintaining the second game wager and returning to play the first game (106), or may cash about or adjust the second game wager.

Overview

100. Play Two Stage Game

102. Place virtual bet (Bet 2) on Stage 2 game

104. Bet 2 on Stage 2 affects Probability% of Stage 1 win (higher Bet 2 = lower Stage 1 win%)

106. Play Stage 1 - Pay physical Stage 1 (Bet1 )

a. Lose Stage 1

1 10. Lose Bet1

112. End game

b. Win Stage 1

120. Win/Keep Bet1

122. Play Stage 2

130. Lose Stage 2

a. Lose virtual bet (Bet2)

132. End game

140. Win Stage 2

a. Win virtual bet (bet2)

b. virtual Bet2 converted to physical

142. End game

Further examples of games played according to the method (1 ) of controlling access to a wagering game according to an embodiment of the present invention are given below with the additions explained, building upon the overview described above. w/ Target Value

1. Play Two stage game

2. Set Two Stage Game target value (TValue)

3. Place virtual bet (Bet 2) upto max TValue on Stage 2 game 4. (Bet 2 on Stage 2 and/or TValue) modifies Stage 1 win% (higher Bet 2 = lower Stagel win%)

5. Play Stage 1 - Pay fixed physical Stage 1 (Bet1 )

a. Lose Stage 1

i. Lose Bet 1

ii. End game

b. Win Stage 1

i. Win/Keep physical Bet1

ii. Play Stage 2

1. Lose Stage 2

a. Lose virtual bet (Bet2)

b. End game

2. Win Stage 2

a. Win virtual bet (bet2)

b. virtual Bet2 converted to physical

c. End game

In this example, a target value has been added to the game. The player selects a target value before placing a wager on the second game. The target value acts to limit the maximum stake that can be placed on the game. The target value can be used to adjust the probability of successful and unsuccessful outcomes. w/ Target Value (with Stage 1 additional bet)

1. Play Two stage game

2. Set Two Stage Game target value (TValue)

a. Place virtual bet (Bet 2) portion of max TValue on Stage 2 game

b. Place virtual bet (Bet 1 A) portion of max TValue on Stage 1 Game

i. wherein portions total = max TValue

3. (Bet 2 on Stage 2 and/or TValue and/or Bet 1A) modifies Stage 1 win%

4. Play Stage 1 - Pay fixed physical Stage 1 (Bet1 )

a. Lose Stage 1

i. Lose Bet 1

ii. Lose virtual Bet 1 A

iii. End game b. Win Stage 1

i. Win/Keep physical Bet1

ii. Win virtual Bet1 A

iii. Virtual Bet1A converted to physical

iv. Play Stage 2

1. Lose Stage 2

a. Lose virtual bet (Bet2)

b. End game

2. Win Stage 2

a. Win virtual bet (bet2)

b. virtual Bet2 converted to physical

c. End game

In this example a further sub-wager has been applied to the first game. The sub wager on the first game can be a further virtual bet which may be placed on the outcome of the first game. The sub-wager can be used to adjust the probability of successful and unsuccessful outcomes. w/ Target Value (with additional physical bet)

1. Play Two stage game

2. Set Two Stage Game target value (TValue) from physical credit

a. Place physical bet (Bet 2) portion of max TValue on Stage 2 game b. Place physical bet (Bet 1A) portion of max TValue on Stage 1 Game

i. wherein portions total = max TValue

3. (Bet 2 on Stage 2 and/or TValue and/or Bet 1A) modifies Stage 1 win%

4. Play Stage 1 - Pay fixed physical Stage 1 (Bet1 )

a. Lose Stage 1

i. Lose fixed Bet 1

ii. Lose physical Bet 1 A

iii. End game

b. Win Stage 1

i. Win/Keep physical Bet1

ii. Win physical BeflA

iii. Play Stage 2 1. Lose Stage 2

a. Lose physical bet (Bet2)

b. End game

2. Win Stage 2

a. Win physical bet (bet2)

b. End game

In this example the game is played with physical bets i.e. the players real money. The step of converting the virtual bet to physical currency is no longer required. The probabilities involved with the game may be changed where there is more real money at stake.

Referring to Figure 4 of the drawings, there is illustrated an there is illustrated a flow chart sequencing the steps of a game played according to the method (1 ) of controlling access to a wagering game according to an embodiment of the present invention. The user starts the Two Stage Game (200); this can include selecting a start option from a machine and inserting an amount of money which will be the players bank/credit meter to pay for the game. The player may set their target value (202) which will affect the outcome probability. In this example the first and second games comprise features; these are chances which may be bet upon within each game (203). The aforementioned sub-wager may be considered a feature bet. The user can place a physical or virtual wager on the first and second game features. The game takes the input for feature wagers and selects the probability for a successful outcome in the first game accordingly (204). For example, if the player places a large wager across all the features, the probability of a successful outcome in the first game will be small, the exact nature of the modification may be inversely proportional or any other relationship, this can be used to effect the return to player or hit frequency of the game, also to ensure the house advantage. These features also allow for dictation of what is considered a successful or unsuccessful outcome. The player then plays the first game (206), this requires the payment of a physical bet e.g. on a B3 table £2. If the player has an unsuccessful outcome on the first game i.e. loses the main feature, then the physical bet is lost (210) and the game ends (212). The player may choose to replay the game immediately without changing the feature wagers, by paying the first game physical bet again or may proceed back to the beginning of the game. If the player has a successful outcome in the first game i.e. wins the main feature, the player will win/keep the first game physical bet (220) and any first game features that were also successful. The player then accesses the second game (222). The second game proceeds, if the player has an unsuccessful outcome a second game feature i.e. loses, then the bet is lost (230) and the game ends (232). If the player has a successful outcome in a second game feature i.e. wins, the player will win/keep the second game feature bet (240), any virtual bet may then by converted to physical currency i.e. output to the player or added to the credit. The game then ends (242). The game may then be repeated in a quick manner by maintaining the feature wagers and returning to play the first game (206), or may cash out or adjust the feature wagers. w/ Target Value (with additional Stage 2 features bet) optional

200. Play Two stage game

202. Set Two Stage Game target value (TValue)

203. Select Stage 1 and 2 Features(A-n)

a. Place physical / virtual bet (Bet 2A) portion of max TValue on Stage 2 feature A

b. Place physical / virtual bet (Bet 2n) portion of max TValue on Stage 2 feature n

c. Place physical / virtual bet (Bet 1A) portion of max TValue on Stage 1 Feature A

d. Place physical / virtual bet (Bet 1n) portion of max TValue on Stage 1 Feature n

i. wherein portions total = max TValue

204. (Bets2A-n and/or TValue and/or Betsl A-n) modifies Stage 1 win%

206. Play Stage 1 - Pay fixed physical Stage 1 (Bet1 )

210. Lose Stage 1

i. Lose fixed Bet 1

//. Lose physical / virtual Bet 1A -n

212. End game

220. Win Stage 1

i. Win/Keep fixed physical Bet1

//. Win physical / virtual Bet 1 A-n iii. Virtual Bet1A-n converted to physical

222. Plav Stage 2

230. Lose Stage 2A-n

a. Lose physical / virtual bet (Bet2-n)

232. End game

240. Win Stage 2A-n

a. Win physical / virtual bet (bet2-n)

b. virtual Bet2-n converted to physical

242. End game

Referring to Figure 5-8 of the drawings, there is shown illustrations of interfaces for an apparatus controlling access to a wagering game according to an embodiment of the present invention. Using the disk first game as an example, features of the first game could also include further segments of different colours offering different levels of prizes/features selected by the player. E.g. there could be a yellow segment that represents prizes selected by the player for a set of values e.g. 0, £2, £4, £6, £8 and £10 and a blue segment that represents prizes of 0, £5, £10, £15 and £20 with the segment size(s) changing depending on the value of the win(s).

To maintain the“house edge” in favour of the machine, the higher the potential value of the second stage game, the lower the probability of the player winning the first stage game. For example, if the player sets the value of the second stage game to £10, then on a B3 machine with a maximum stake of £2, there would be a one in five chance of progressing to the second stage.

The following examples describe the operation of a game in accordance with the present invention with a roulette game for the second stage:

Example 1

On a B3 game, the player has placed 5 chips (each worth £2) on the Roulette table to set the Roulette feature (second stage) value (stake) at £10. This can be seen illustrated in Figure 6. At this stage, the £10 placed has not been paid for by the player but determines the potential win value of the second stage game if the first stage game is won. The first stage game (e.g. Red/Green disc) is then played by the player by pressing the start button to spin the arrow. This can be seen illustrated in Figure 5. At this stage of the game, £2 (the maximum stake for the category of machine) is deducted from the player’s bank/credit meter to pay for the game. If the arrow stops in the green (“smaller”) segment the player qualifies for the second stage game which is then played automatically, and any prizes won are paid to the player and the game ends. If the arrow stops in the red (“larger”) segment the player loses the £2 and the game ends.

Example 2

The player has set a target value of £5 for the first stage game and placed 4 chips (each worth £1 ) on the Roulette table to set the Roulette feature to £4. This can be seen illustrated in Figure 8.

The first stage game (e.g. Red/Green disc) is then played by the player by pressing the start button to spin the arrow. This can be seen at Figure 7. At this stage of the game £2 is deducted from the players bank/credit meter to pay for the game. If the arrow stops in the green (“smaller”) segment the player qualifies for the second stage game which is then played automatically, and any prizes won paid to the player including the £1 not staked on the Roulette game, and the game ends. If the arrow stops in the red (“larger”) segment the player loses and the game ends.

On this occasion the player has only played £4 on the Roulette feature of the £5 prize won on the first stage game so the £1 not played forms part of the prize.

It will be appreciated that the method of controlling access to a wagering game in accordance with the present invention can be suitably modified for use in various games of chances and their embodiments. The advantages of the device are scalable and applicable to all such games.

Furthermore, while the invention has been described in relations to embodiments of device access control, account access control, wager game access control etc. The advantages of the method can be applicable to any application where access control is or can be used.




 
Previous Patent: AN EXHAUST SYSTEM

Next Patent: BEARING CAGE