1. Field of the Invention
The present disclosure relates to the fields of automation and remote communication; more particularly, the present disclosure relates to systems and methods relating to customer interactions at a free-standing point of sale device; yet more particularly, to systems and methods relating to an automated kiosk.
2. Description of the Background of the Invention
There are many types of automated kiosks used to provide information or commercial services to the public. The typical automated kiosk is an electromechanical device that interacts with and provides a user with a service or a consumable. Generally, the kiosk includes a combination of software and hardware components housed in a tamper resistant body. The software performs various functions, such as processing data, controlling hardware, providing security for the kiosk, and the like. The hardware includes, for example and without limitation, a display screen, a touch panel, a dispenser for cash or other consumables, control circuitry, power supplies, speakers, a camera. Typically, some of the hardware is disposed within the kiosk (e.g., power supplies) and some of the hardware is accessible by a user through a front panel of the kiosk (e.g., a cash dispenser). Additionally, some of the hardware is disposed both within the kiosk and accessible by a user through the front panel, for example, a display screen is disposed within the kiosk but the screen is viewable by a user. In addition, the kiosk may include a data storage capability and/or may transfer information over a network to a central server and other kiosks. For example, banking kiosks (ATMs) include software and hardware to allow access to a user's bank account, receive deposits, dispense cash, print receipts, etc.
Outdoor kiosks and other vending or point of sale (POS) devices typically include a steel or aluminum enclosure that is both durable and weather resistant. Some such kiosks also include a display screen for user interaction overlaid with a transparent touch panel that can detect the location of a touch by a finger or device. For outdoor applications, unimpaired operation of the touch panel in the presence of moisture or pooled water is required.
Both resistive and capacitive touch panels are currently in use for POS devices. Resistive touch panels are resistant to moisture and dust; however, because the resistive touch panel operates by deflecting one side of the panel, the panel must be thin and flexible. This degrades the overall durability of the resistive panel and reliability has suffered in outdoor applications due to scratching and puncturing of the panel. A capacitive touch panel, in comparison, requires only a single solid transparent panel, which can be made much more durable than a resistive panel. Current construction techniques employ a gasket between the touch panel surface and the surrounding supportive material, referred to as the front panel. However, when a conductive front panel is used (e.g., stainless steel), moisture buildup can electrically connect the capacitive surface and the conductive front panel causing improper determination of the location of the touch. Additionally, such construction techniques provide a “pry point” allowing insertion of a blade, screwdriver, or pry bar to enter the kiosk for purposes of theft of vandalism. Therefore, a need exists for a durable touch panel that is resistant to the effects of moisture build-up and connected to the kiosk with minimal or no pry points.
In addition, kiosks are commonly provided with a tamper-resistant access door or panel to facilitate service needs, such as replenishing of consumables, routine or preventive maintenance, or complex repair. In some cases, a single level of security, such as that provided by a single mechanical key, allows access for all of these service needs. In other cases, for example, in a kiosk that accepts or dispenses cash, a separately secured interior kiosk compartment is commonly provided. Having two separately secured compartments can provide access to the kiosk electromechanical components for maintenance or repair and/or to cash storage areas, as one example.
An undesirable result of having a single secured compartment for maintenance and repair is that a user who is only authorized to perform simple maintenance tasks is nonetheless able to access delicate electromechanical components and cash mechanisms. A structure and system that provides access to a user to the appropriate kiosk compartment(s) adequate to his or her training and authority would be a desirable improvement in this art.
Kiosks are commonly secured to an operating location where they are left unattended, and accessed by users to provide information and/or perform transactions for services and/or consumables. Such actions are preferably performed without the need for human assistance. However, at times, the software and/or hardware components of the kiosk may malfunction and the kiosk may not operate as intended. In addition, a user may require assistance to complete a transaction or may wish to communicate a problem or concern, such as when an ATM has not dispensed the correct amount of cash or has failed to return an ATM card. In these situations and others, service providers have designed kiosks to incorporate varying levels of assistance to the user. For example, a kiosk may display a customer support number for the user to call and report a problem. Other kiosks provide an integrated microphone, speaker, and communications connection to call and interact with an operator or support staff. Still other kiosks allow the operator or support staff to initiate communication with the user if a problem is detected or suspected. Additionally, some kiosks offer interactive help programs that can be either online or offline. Other examples include kiosks that are configured to perform self-diagnostics and can communicate data to and from a central server and/or support staff. However, the customer support systems in prior kiosks do not efficiently incorporate various levels of assistance and communication for one or more kiosk and one or more service providers.
Kiosks are used today in a wide variety of commercial settings. One use in particular is associated with gas stations and car washes. In some cases, the kiosk is incorporated into a gas pump that allows a user to pay for the gas and/or to purchase a car wash at the pump. The car wash can also be purchased at a point of sale (POS) location in the store or at an activation unit at a car wash appliance. After the car wash is purchased, the user can drive up to the car wash appliance, enter a code or swipe a card, and proceed to have the car wash performed. In most situations, the user is given a limited amount of time to consummate the sale and have the car wash performed, typically a few days. In addition, the car wash must be completed at the location where it was purchased. However, these prior systems do not allow a user to purchase a car wash at different locations and have the car wash performed at any number of different locations without the need for human assistance.
According to a one embodiment, a kiosk includes a front panel that defines an opening in a body and an interactive screen positioned within the opening. A moisture resistant support structure is disposed between the front panel and the interactive screen. A central processing unit is disposed within the body and the central processing unit is operatively connected to the interactive screen.
According to another embodiment, a method of providing customer support at a point of sale includes the steps of providing an activation unit for a customer to select a transaction and providing a product dispenser. The product dispenser is communicatively connected to the activation unit. The method further includes the steps of authorizing the product dispenser to dispense a product based on the selected transaction and providing a server that monitors the activation unit and the product dispenser. Furthermore, the method includes the steps of sensing a need for customer assistance at the activation unit or the product dispenser and providing customer assistance to the customer.
According to yet another embodiment, a method of selling a car wash includes the steps of providing a first car was appliance and a first activation unit at a first location and providing a second car wash appliance and a second activation unit at a second location that is different from the first location. Further, the method includes the steps of providing a first point of sale system at the first location and providing a central server that is communicatively connected with the first and second car wash appliances, the first and second activation units, and the first point of sale system.
The present disclosure generally relates to a point of sale (POS) device that performs automated and interactive functions. For example, the POS device preferably includes sensors to detect when a user is adjacent thereto, which sensors in turn preferably trigger a communication device to request of the user (i) a code relating, for example, to a prepurchased service or product, or (ii) to make a choice of a service or product that can be purchased at that time. Accordingly, the POS device is preferably a combination of a multiplicity of components directed at, without limitation intended, the following capabilities: sensing, communications (both with respect to receiving and providing, whether offline locally at the POS device or online remotely with other communications devices or human operators), recording (e.g., optimal images relating to the user, the user's vehicle (as in its license plate, for example), or identifying features of place and time of interaction with the user; price; transaction; or the like); change making; and more.
The POS device used in the context of the present disclosure is commonly referred to as a “kiosk,” however, the term kiosk is not intended to imply or define any particular geometry or design, arrangement, collection of features, or other particular characteristic or set of characteristics apart from it having an ability to be accessed by a user to provide information or commercial services. The kiosk of the present disclosure preferably includes: a main body supporting the overall structure of the kiosk and enclosing a multiplicity of internal components, means for attaching the kiosk securely to a location, a front panel, communications components, printer(s), memory device(s), a processor or processors, and locking mechanisms that secure each of the components.
The front panel 24 is attached to the main body 22 of the kiosk 20 and includes components through which a user and the kiosk interact with each other. For example, the front panel 24 can include any or all of the following: a display screen 30, speakers 32, a dispensing tray 34 where money and/or consumables are dispensed, a receipt printer 36, a card swipe 38, a bill acceptor 40, and a coin acceptor 42. The front panel 24 may include other components, as appropriate, such as, without limitation, a microphone 72, a camera 74, a change return 76, or a second display screen (not shown). The components are accessed by opening the front panel 24, which swings away from the main body 22 of the kiosk 20 about a hinge (not shown), to access the back 44 (seen more clearly in
In one embodiment, the kiosk 20 preferably includes multiple secured areas (also referred to as compartments). The secured areas can be respectively for: (i) electrical and/or mechanical components, (ii) receptacles for consumables, (iii) receptacles for cash, or (iv) other kiosk components or consumables. Each secured area is preferably distinct from the other areas and is associated with one or more specific security levels. Users with appropriate authorization to access one of the secured areas will preferably have the responsibility to inspect or perform certain tasks commensurate with that security level; additionally, such a user can have the responsibility for inspection or performing tasks commensurate with lesser security levels and associated secured compartments. In addition, access to the components in each secured area is preferably commensurate with the training level of the users authorized for each security level. For example, users with a low security level authorization, such as a typical site attendant, are allowed access to a first secured area to perform a limited number of tasks including, for example, performing preventative maintenance or routine service, and replenishing consumables. A second secured area can be associated with a medium security level, for example, that is associated with a higher degree of training and responsibility. In one embodiment, the second secured area (or areas) preferably includes the software or hardware or both software and hardware that controls the operation of the various components of the kiosk. In this embodiment, the second secure area can include the display screen 30, the speakers 32, the card swipe 38, and the like; and further include hardware for the dispensing of cash, consumables, and/or other products. Users with a medium security level authorization preferably have the required training to perform complex maintenance, such as software and hardware installation, repair, replacement, and troubleshooting. More preferably, the second secured area is accessed only at the request of others. For example, access to the second secured areas can be limited to a scheduled service call. Alternatively, access to the second secured area can be limited to times when access to a third secured area is scheduled. A third secured area is preferably associated with a high security level and may include access to cash and/or other components that allow for the performance of sensitive management functions. Such sensitive management functions can include the setting/resetting of security codes, for example. Accordingly, access to the third secured area is allowed for only trusted personnel with the specific training to perform management functions, such as the removing and replenishing of cash.
Referring to the embodiment depicted in
In one embodiment, one or more keys are used to open locks on doors or panels to selectively allow access to the secured areas. For example, access can be allowed to the first secured area only, the first and second secured areas, the second secured area only, the first and third secured areas, all secured areas, etc. For example, in
Further, in the embodiment depicted in
Swinging open the front panel 24 also provides access to the cash receptacles 58 containing the cash. In
This arrangement of locks and secured areas provides a multi-level security system wherein access to secured areas that are associated with higher security levels preferably requires access to secured areas that are associated with lower security levels. For example, access to the cash receptacles 58 requires access to the first and/or second secured areas 46, 52. This type of arrangement provides a “ringed” security system that allows a level of access appropriate to a user's training and responsibility, and no more.
In another embodiment, each of the first, second, and third level keys is preferably part of a master key system, so that the first level key opens only low security level locks, the second level key opens both medium and low level locks and the third level key opens high security level, medium level, and low level locks. As a result, each user only needs to carry one key to access the secured area appropriate to his/her security level or responsibility.
Any key and matching locking mechanism may be used. For example, all known types of mechanical keys, all known types of electro-mechanical keys such as RFID-tagged keys and magnetic-encoded keys, and all other suitable keys as may be developed may be usefully employed. Other suitable keys may include a fingerprint, retinal scan, and other biometrics. Specifically, suitable keys are those that specifically unlock one or more locking mechanisms. The locking mechanisms include such locks as padlocks, combination locks, deadbolts, solenoids, magnetic locks, biometrics scanners, etc. Consequently, in some embodiments the key will not be a physical key, such as with a combination lock.
In yet another embodiment, a logging mechanism is provided with the kiosk so that each user with a key also has a security code. For example, the logging mechanism may be a keypad, a touch panel, or a mechanism for scanning a barcode or sensing a RFID tag.
In yet another embodiment, the process skips the block 104 of determining whether someone is trying to gain unauthorized access to the kiosk and control passes directly from block 102 to blocks 106 and 108 when an invalid code is entered.
Control passes to a block 110 if a valid security code is entered at the block 102. The block 110 stores relevant data into non-volatile memory inside the kiosk 20 and/or the data are sent to a central server and stored. The stored data includes, for example, data identifying the individual associated with the security code, a time of day, duration of access, a security level authorization of the individual such as only low level, low and medium levels, all security levels, only high level, etc. In addition, the kiosk may be equipped with other data capture components, for example, a video camera that records video and/or takes still photos of the user.
Thereafter, a decision block 112 determines whether an authorized access is being attempted. For example, in one embodiment, the relevant data stored by the block 110 includes a security level authorization, which is used at the block 112 to only allow access to the authorized area(s) even if the individual has the appropriate key(s) for the other area(s). If an unauthorized access attempt is detected, for example, when a user only authorized to access the first secured area attempts to further access the second secured area, then control passes to the “deny access” block 106 and to the “activate security” block 108. In another embodiment, the block 112 detects whether a user authorized only to perform management functions is attempting to perform complex maintenance functions. For example, if a user who is only authorized to access the cash storage receptacle is attempting to tamper with the software and hardware components, then control will pass to blocks 106 and 108. In yet another embodiment, access to certain areas is allowed only during certain times of the day or during special circumstances. For example, the management function of removing cash may be allowed only for a short time period each day, such as at the beginning or end of the day, or both. In addition or in the alternative, access for complex maintenance functions may be allowed only in the event of a service call that is recorded and communicated to the kiosk. As a result, the process of
Otherwise, if an authorized access is attempted then control preferably passes to a block 114 and access is allowed to the secured area. In this case, no alarms are activated; however, in one embodiment, a picture is taken of the user. In yet another embodiment, the validated security code is not assigned to a specific security level authorization and the user can access any of the secured areas with the appropriate key(s).
The process discussed in connection with
In yet another embodiment, the process of
In a further embodiment, a kiosk adapted for outdoor use is constructed of weather resistant materials and is further sealed from the elements to protect hardware and software components inside the kiosk. Further, the kiosk is preferably tamper resistant so that the physical and electrical components are secure from unauthorized access. For example, any screws and hinges are only accessible from the inside secured areas of the kiosk 20.
In another embodiment as depicted in
In the embodiment depicted in
The support structure in the embodiment of
In yet another embodiment, the support structure 84 is preferably connected to the touch panel 80 along the periphery of the touch panel 80. More preferably, the support structure 84 overlaps the touch panel along a portion of the front and/or back of the touch panel. This arrangement increases the strength of the interface between the touch panel 80 and the kiosk 20. Further, by controlling the yield strength (a well known term in the art) of the support panel 84, any residual pry points may be further reduced, and preferably eliminated, by the combination of the front panel 24, support panel 84, gasket 86, and touch panel 80.
In another embodiment shown in
Each kiosk 150 includes hardware and software components, preferably including printers, power supplies, CPUs, coin acceptors, bill acceptors, a display screen, a cash dispenser, a change dispenser, a card swipe, etc. that operate to perform intended functions of the kiosk. The specific hardware and software components will generally differ depending on the specific function of each kiosk 150. For example, in one embodiment, a parking payment kiosk can include a small display screen that can only display alphanumeric characters but does not include a cash dispenser. In contrast, an automated car wash kiosk can include a larger display screen that displays menus and images and does include a cash dispenser. Preferably, the kiosk 150 is also equipped with additional components, such as cameras, microphones, speakers, self-diagnostic equipment, keyboards, touch panels, and the like to enable the kiosk 150, the user 152, and the remote service provider 154 to communicate with each other and to provide real-time interactive assistance to the user.
In one embodiment, the camera can tilt, pan, and zoom to communicate information regarding the physical characteristics of portions of the kiosk 152 and the surrounding area. In a preferred embodiment, the camera is a video camera and can record video of the area. In another embodiment, the video camera includes capabilities to capture infrared light (e.g., thermal vision) and to amplify light (e.g., night vision). In addition, the microphones and speakers are preferably capable of capturing and producing user speech and sounds in real time. In a further preferred embodiment, the display screen is capable of displaying video in the form of a live or virtual attendant.
The diagnostic equipment is preferably capable of collecting and analyzing information relating to the operation and status of the components in the kiosk. In a preferred embodiment, diagnostic tests of the kiosk 150 are periodically performed or performed at the request of the remote service provider 154. Any problems detected during the tests are reported to the service provider 154. In yet another preferred embodiment, diagnostic information from a number of kiosks 150A-150N is collected and displayed to the remote service provider 154 so that all of the kiosks can be easily managed at once.
The remote service providers 154 include systems that support the functioning of the kiosks 150 and the providing of interactive assistance. For example, the remote service provider manages information in a database 158 that supports the functioning of the kiosks 150. In addition, the remote service providers 154 preferably include a status module 160. The status module 160 collects information from the kiosk 150 regarding the status of the hardware and software components. In addition, the status module 160 can instruct the kiosk 150 to perform the diagnostic tests and give corrective instructions to the kiosk. Further, the status module collects information regarding interactions with the user 152. This information includes a time of day, a length of interaction, a history of the interaction, etc. In one embodiment, the history of the interaction includes actions performed by the user and by the kiosk, including, for example, a number of card swipes, the menus that the user has navigated through, and the responses from the kiosk to each of these actions. In a preferred embodiment, the remote service provider 154 uses the information to assist a user 152 by identifying the source of problems and by solving the problems by communicating instructions to the kiosk 150 and/or the user 152. In a more preferred embodiment, the remote service provider 154 uses the information to identify a user 152 that may benefit from assistance and can initiate contact directly with the user or remotely attempt to solve the issue without contacting the user. Alternatively or in conjunction, the information is used to identify the source of the problem and issue corrective instructions to the kiosk 150. In yet another embodiment, the remote service provider 154 can issue credits or dispense currency to the user 152.
In one embodiment, the kiosk(s) 150 are located at discrete locations throughout the world and provide a variety of different interactive functions. For example, the kiosk 150A can be located in Chicago, Ill. and is a parking payment kiosk and the kiosk 150N can be located in Irvine, Calif. and is an automated car wash kiosk. In another embodiment, the remote service provider is different for each type of kiosk. For example, remote service provider 154A communicates with the kiosk 150A and is different than the remote service provider 154N that communicates with the kiosk 150N. In this example, the status module 160 for different remote service providers 154 may be tailored to provide the most relevant information to the service provider for the specific kiosk 150. In another embodiment, a remote service provider 154 is the same for each of the different kiosks 150A-150N. In any of the above embodiments, the system of
In another embodiment, as shown in
In a preferred embodiment, the central server 162 connects the kiosk 150 and/or the user 152 with a specific remote service provider 154A-154N to solve the problem. In a more preferred embodiment, the central server 162 compares the specific problem with available remote service providers 154A-154N to select an optimal remote service provider to connect. The optimal connection of a remote service provider 154 to a kiosk 150 can be performed using any number of well-known management algorithms. For example, if the identified problem relates to hardware and software components of the kiosk 150, then a remote service provider 154, such as an equipment technician, can be selected and connected. In another example, the identified problem relates to an account question and the central server 162 connects an account supervisor to the kiosk 150. Thereafter, the remote service provider 154 provides assistance and attempts to solve the problem. After the remote service provider 154 has solved the problem or has otherwise discontinued interaction with the kiosk 150, the remote service provider is available for reassignment by the central server 162.
In another embodiment, status modules 160 are located at each remote service provider 154A-154N or at both the central server 162 and at each service provider. This embodiment allows the status modules 160 to be tailored for each type of kiosk 150 and remote service provider 154 to provide the most relevant information to the service provider. As a result, the central server 162 of
In a further embodiment, the assistance provided by the systems of
Referring now to
The local server 206 and the central server 208 provide functions, such as authorizing credit card or debit card payments, recording the transaction, providing the user with a wash code. The wash code is entered into the activation unit 202 to authorize the performance of a car wash by the car wash appliance 200. The wash code is one embodiment for authorizing the car wash at the activation unit 202 that includes a number of digits that uniquely identify the transaction. Other embodiments can be used to identify the transaction, such as bar codes, phone numbers, alphanumeric codes, magnetic cards, RFID tags, license plate numbers, user biometrics, etc. Further any combination of the preceding can be used to identify the transaction.
For example, the combination of a unique wash code and a specific license plate number can be used to allow repeated washes to the same car or only authorized cars. This combination is useful where a free additional wash is allowed to account for unexpected rainfall or other circumstances that deprive the user of the benefits of the initial wash. Further, in some situations a wash code is given to a category of authorized vehicles (e.g., law enforcement vehicles) or a fleet of authorized vehicles (e.g., cars of a particular rental agency or taxi cab company). Consequently, the combination of the wash code and the license plate number can ensure that only authorized vehicles are using the wash code. This embodiment, contemplates the addition of sensors at the activation unit 202 to detect the license plate number of the car.
In another embodiment, the servers 206, 208 also store revenue enhancement module (REM) information, including special discounts, loyalty programs, fleet programs, charity, and community programs. In addition, the central server 208 also processes financial information from each of the POS systems 204 and activation systems 202. The financial information includes, for example, profit margin, gross margin, net profit, etc.
The POS systems 204 offer additional locations where the user can purchase the car wash, for example, at a gas pump 212, from a cashier 214, or through an internet website 216. In a preferred embodiment, there is a plurality of car wash appliances, activation units, POS systems, and local servers located at distributed locations and the user can purchase the car wash at any of the locations and have the car wash performed at any location. In particular, the car wash can be performed at a different location than where it was purchased.
For example, the user accesses any of the POS systems 204 to purchase a car wash and selects a type of wash and payment method. The POS system 204 communicates to the local server 206 or to the central server 208 to authorize the payment and issue a wash code or other authorization for the car wash. The local server 206 and the central server 208 also store transaction information. The transaction information includes the type of car wash purchased, a wash code or other authorization method, a date of purchase, a location of purchase, REM information including a free upgrade or car wash program code, etc. In some situations, the transaction information is stored locally by the local server 206 before the information is transferred to the central server 208 via the communication connection 210. In other situations, the transaction information is transferred directly to the central server 208 without being first stored locally. In either case, the activation unit 202 periodically accesses the central server 208 and stores the transaction information. Consequently, the user can enter the wash code at the activation unit 202 and have the car wash performed by the associated car wash appliance 200 even in situations where the central server 208 is temporarily disconnected. In a preferred embodiment, all of the distributed activation units 202 store the transaction information so that the car wash can be performed by the associated car wash appliance 200 regardless of where the car wash was purchased.
Further embodiments of the disclosure follow:
The present disclosure, in the context of unattended payment systems, is directed to technology that focuses on the following capabilities:
The system provides the means to handle cash customers, i.e., by accepting cash payments, dispensing whole dollar change, and maintaining track of individual consumer's purchases in order to develop customer credits toward future purchases.
The system further interfaces with existing pump controllers to authorize fueling and update transaction logs; complies with local government (city planning, fire, etc.) regulations; and provides for necessary hardware security.
In one embodiment, this capability is addressed with a single centrally-located kiosk, such as depicted in the embodiment of
All cash customers are required to begin their transactions at this kiosk. They will be greeted by a friendly welcome screen that includes a positioning message from the system interface.
New customers are requested to press a “New Customer” button on the welcome screen, which will then begin a short safety tip video. After the video, the system will prompt the user for their name and phone number (which may be used to define a Personal Identification Number [PIN] for future transactions, for example), which is entered via the keyboard. Optionally, a sweepstakes can be used as an incentive to do so.
Existing customers (with the exception of new customers that have just signed up) will be asked to input their PIN. The system verifies the PIN as belonging to an existing customer. Once verified as an existing customer, the user will then proceed to a next screen, termed herein as a “terms of use” screen (which they can quickly accept on subsequent visits).
If the existing customer has credit for a future purchase from a previous transaction, the customer will be presented with the option of receiving whole dollar change in the form of $1 bills, with anything less than $1 remaining in credit for a future purchase, or the customer can choose to begin a new fueling transaction.
Customers who wish to begin a new fueling transaction will be prompted to select a pump number. They will be presented with an overhead representation of the station to assist in the selection.
After the pump number has been selected, customers will then be shown a payment screen with any credit from their previous transaction prominently displayed ($0.00, in the case of new customers). They will be prompted to insert bills of proper denominations into the clearly marked bill acceptor. As the bills are inserted, the current credit is updated accordingly. When finished inserting bills, the customer will press the “Pump Gas” button to move on. At this point, the system will pass a request via an “edge server” to the existing pump controller to dispense the appropriate amount of fuel.
Preferably, the Edge Server is a local computer system responsible for collecting and processing large amounts of data from various sources at the remote fueling site. Several software subsystems run on the edge server, in conventional fashion, in order to take advantage of the power of distributed processing and contextual data. Data is mined from these systems only as needed.
More preferably, the Edge Server is a 6102-based computer located within an equipment room or other designated location on-site. This server is responsible for communicating with the pump controller (CCISTech) as well as being the local data store for customer account information. It is connected with a Central System Server via a high-speed data network, such as a TCPIP based Internet connection, or other such network communication link. The definition of the communication is provided by the system at installation and may be adapted to local communication conditions by the system designer without interfering with system functionality.
In terms of the ability to interface with existing fuel pump controller systems, in one embodiment, CCISTech to used control the pumps and dispensers. Through an agreement with CCISTech, the system manufacturer will provide a CCISTech controller with dispenser, amount, and pump authorization instructions, as well as have the ability to mine transaction details (i.e., quantity of fuel pumped, amount paid, change due, and the like).
All pump transactions will continue to be logged by CCISTech. Cash transactions will be identified in the logs by a system manufacturer specific key utilizing the existing table structure provided by CCISTech. This will ensure that existing reconciliation processes in place at the system can continue without undergoing any change management.
When the request is accepted and authorized, the kiosk will inform the customer that they may begin fueling. At this point, the kiosk resets itself, ready for the next customer.
After the customer is finished fueling, the Edge Server will receive information about the transaction from the pump controller. If the transaction totaled less than the initially authorized amount, a credit for a future purchase will be saved and associated with the customers PIN for future use.
If the customer has pumped less than the amount of money initially authorized and wishes to receive change back, the customer may return to the kiosk to do so. After entering their PIN at the welcome screen, they would be presented with their change options and informed that local fire codes prohibit the dispensing of coin change at unattended fueling stations. After removing the whole dollar change that is dispensed, the kiosk would reset itself.
Customers can cancel their transaction at any point, with the customer credit, change dispensing, kiosk and pump systems reset as appropriate, depending on the status of the transaction. If the system is forced to cancel a transaction due to inactivity, pump out of order, etc, a similar flow will be followed to ensure that the customer receives the appropriate credit for a future purchase.
The customer PIN, credit for a future purchase, transaction status, etc., will be stored locally and synchronized with a “central server,” described in greater detail below, so as to ensure that customers can go to any fueling site that is implemented with the system of the present disclosure and receive the appropriate credit for a future purchase.
According to one embodiment, certain assumptions will be made:
The system solution will comply with the local Fire Marshal and City Planning regulations, as well as all UL and ADA guidelines.
While every consideration will be taken to promote security and prevent theft, nothing is ever 100% secured. Based on well known practices in the security and kiosk industries, all necessary and practical measures will be taken to ensure the physical security of the hardware placed on site. The kiosk is designed to be tamper resistant, with a sturdy steel enclosure, a substantial base securely bolted (with bolts welded shut) into concrete, and locked limited access doors for cash removal and refilling.
In addition, the kiosk will preferably be protected by a high-decibel siren connected to state of the art motion, shock, and tamper sensors, as well as direct dial connection to a security monitoring service.
According to this embodiment, the following assumptions have been made:
The system according to one embodiment consists of various hardware and software systems controlled and accessed via role-based GUI's outlined below. In order to minimize the cost of development and the time to market, common off-the-shelf (COTS) components are used wherever possible.
As described above, the edge server is a local computer system responsible for collecting and processing large amounts of data from various sources at the remote fueling site. Several software subsystems run on the edge server, in conventional fashion, in order to take advantage of the power of distributed processing and contextual data. Data is mined from these systems only as needed.
The Edge Server is a 6102-based computer located within an equipment room or other designated location on-site. This server is responsible for communicating with the pump controller (CCISTech) as well as being the local data store for customer account information. It is connected with a Central System Server via a high-speed data network, such as a TCPIP based Internet connection, or other such network communication link. The definition of the communication is provided by the system at installation and may be adapted to local communication conditions by the system designer without interfering with system functionality.
The Central Server is a computer system located at a Network Operations Center (NOC) that interacts with and mines data from the Edge Server as needed, as well as serves up information through a browser to the operational and business end users. Business logic on the Central Server will synchronize the customer data located on the Edge Servers at the various automated system sites.
The kiosk is a custom-fabricated freestanding device that provides the physical means of interaction with the customer. In one embodiment, the kiosk is a steel encased unit that contains the following equipment:
A kiosk alarm controller is a 4020 based unit which will be housed in the equipment room. It will be connected to the shock sensors on the kiosk as well as the siren, in addition to having a direct dial connection to the security monitoring service.
The alarm controller will be connected to an existing phone line in the equipment room. It does not require a dedicated line, but rather has the ability to “take control” of a land line, in a manner well understood by those having skill in the art, in the event its use is required.
The following user scenarios are meant to be an example of how a potential customer might interact with the system of the present disclosure. While not necessarily strict process flow procedures, the scenarios are nevertheless illustrative of certain steps and actions that a particular consumer may take in order to interface with the system.
First-time Cash Customer:
Returning Cash Customer
The system of the present disclosure supports a completely automated and unattended fueling sites, while maintaining a complete transaction ability for a consumer. The central kiosk is effectively a “point of sale” (POS) system coupled to function in accord with an edge server that maintains local transactions and is responsible for collecting and processing data from various sources implemented at the automated fueling location.
Similarly, individual edge servers, disposed at various different automated fueling locations, are coupled to and communicate with a centrally located server system. The centrally located server system provides for synchronizing all the customer data located on the edge servers at the various automated system sites, and further provides for off-sites maintenance, programming changes and updates, and implementation of various marketing offers, customized user “rewards” programs, and the like, at all of the various automated system sites, or selected ones of the various automated system sites, as determined by the system management.
In a further aspect, the principles of the system of the present disclosure provide for implementation of a locally and remotely networked car wash management system. In a manner similar to the automated fueling implementation, above, the automated car wash management system is comprised of custom software and various off the shelf electronic components that are combined and connected in such a way that allows for one or more physical car washing systems to be monitored, controlled, and programmed either individually or collectively in a networked manner.
Advantageously, the system of the disclosure consists of various hardware and software systems controlled and accessed via role-based graphical user interface components (also termed GUI's) outlined below. The system is based on COTS components wherever possible.
An Edge Server 10 (seen in
The Edge Server(s) 10 is adapted to communicate with a cash register system 12 and/or a point of sale (POS) system or systems 14, an automated car wash controller system 16 (identified herein as a PLC), including, in turn, a teller 18, video and camera systems 320, alarm controller (DSC) 322, and a Central Server 324. The Edge Server 10 also functions as the local data store for transaction information. Preferably, the edge server 10 is connected with the Central Server 324 via a high-speed data network or dial-up modem, communicating via TCPIP protocols over the Internet.
A more specific implementation of the Edge Server 10 is shown in the exemplary embodiment of
The Edge Server 10 monitors communication between the register and any existing POS systems and captures wash codes generated by the POS and/or generates wash codes for use by the end consumer. It stores these codes in the MySQL database for later reference. When a car wash customer enters a valid wash code or purchases a wash at the car wash teller, the PLC begins the actual car wash process. The Edge Server monitors activity on the PLC to determine when a car wash has been initiated, and continues receiving input from the PLC as the car wash progresses.
The DSC is also connected to the PLC and receives inputs that are translated to simple text messages by the DSC. The Edge Server receives these text messages from the DSC and based on keywords triggers specific actions (such as “take a picture”). Once the car wash has been completed, the Edge Server packages the data it has gathered and sends it to the Central Server for further processing and reporting.
In the exemplary embodiment of
The Central Server 324 is a central administration console and user store for the distributed carwash management sites of the present disclosure. Central Server 324 provides a central data store for all of the Edge Servers of the distributed carwash management system. The Edge Servers, in turn, control each individual site.
Turning now to
In the diagram of
The Central Server provides the following features and functionality:
The general physical specifications of the Central Server 324 are depicted in the embodiment of
Both a firewall and router are provided and may be implemented as a single physical device, even though they are depicted as two separate components in the embodiment of
A camera array is comprised of strategically located still and/or video cameras (best seen in the embodiment of
The communication methodologies of communication between and among the various components of the system in accord with the disclosure are depicted in the exemplary table of
Car wash volume is under-optimized, yet operators typically view minimizing downtime as the primary means of increasing revenue, rather than finding ways to proactively acquire new customers and build loyalty over time.
Volume sales program to organizations with a large pool of potential car washers are largely untapped due to lack of management and reporting tools needed to cost-effectively offer such programs. With the right tools and a modest sales effort, car wash operators can proactively market volume purchase programs to drive incremental revenue at profit margins higher than those achieved at the gas pumps or in the c-store. In accord with the disclosure, a Revenue Enhancement Module (termed herein REM) provides operators with those tools and allows them to sell charity, fleet and promotional marketing programs that acquire new customers and give these new customers an incentive to keep coming back.
Adding a program tracking code to the workflow of a customer purchase transaction is the key to the management of a virtually unlimited number of REM programs. The code facilitates tracking of wash transactions associated with a charity, fleet or promotional program and drives the reporting that the operator needs to document activity to the program's partner. The difference among the programs comes in the action taken by the distributor on the information reported:
The commonality of REM programs simplifies the development of the software and underlying data structure required to support them. A REM tracking code field added to the standard transaction record, when tied to a table that includes REM program type and details on the program partner, leverages a data-driven interface that reads the program type and serves up data into a WashNet user interface under appropriately branded REM reports. As used herein, the term WashNet refers to the system according to one embodiment of the disclosure. Notably, the term, and the focus of the REM program, is not limited to the automated carwash system, but may be easily expanded to encompass the automated fueling system described above. Accordingly, when the transaction is described in terms of a wash transaction, it will be understood that the term also refers to a fueling transaction, or a combination of the two transaction types.
WashNet will typically utilize three identification methods in order to promote a REM program and initiate/track a wash transaction:
Thus, the system enables a virtually unlimited number of REM programs to be managed simultaneously. REM programs can be set up remotely for multiple sites via the WashNet interface, and a plurality of sites may implement one REM program, while other sites may implement a different REM program.
Use Case: Cards and Coupons
Card Management
Car wash operators purchase pre-printed and pre-encoded magnetic stripe cards in bulk. Each card is printed with a unique (typically eight-digit) serial number; the same serial number is also encoded on the magnetic stripe of the card. When the operator creates a new REM program, the serial number for each card issued is associated with that REM program. Encoding the magnetic stripe card with a unique serial number allows the operator and REM program partner to detect and manage fraudulent use of wash cards; disable individual fleet cards in the event of theft or misappropriation; and modify existing REM programs without requiring issuance of new cards.
Each card can be associated with only one REM program, and for fleet programs, a unique, four-digit personal identification number can be assigned to each card issued but is not required.
Coupon Management
Currently, prior art-type coupon programs are typically capable of accepting only three different types of coupons. Each coupon can be configured in a variety of ways, but they cannot be configured to be unique to a particular operator. The system in accord with the present disclosure is capable of configuring coupons to provide the necessary uniqueness for tracking and operator designated specific REM programs.
REM Program Management
Car wash operators will have the ability to create, modify, and delete customized REM programs through the WashNet user interface. Each REM program may be associated for use at an individual site, a select group of sites, or for use at all of the operator's sites.
The operator can configure the REM program as any of the three types of programs: charity, fleet, or promotional. Each program can be set to a specific wash type (if applicable) for use on a specific day or days of the week. For charity and promotional programs, the operator can set an expiration date for the program if desired. The program can also be configured for pre-paid, declining balance accounts, discounted washes, or full-price washes. Car wash transactions attributed to a REM program will be flagged with the appropriate identifier for that program.
The operator can modify existing REM programs and disable or re-enable programs at any time through the WashNet user interface.
Upon entering the REM portion of the WashNet user interface, the operator is presented with all REM programs, active and inactive. The list of programs shows cumulative accounting data that the operator can view over specified date ranges. The operator can filter the list of programs to show, for example, only fleet programs, promotions, active, or inactive programs.
The operator can ‘drill-down’ into individual REM programs to see detailed transaction data (including car wash images), modify the terms of the program, or add, disable or re-enable individual mag stripe cards associated with the program.
Reports
Car wash operators will have the ability to download detailed transaction data for each REM program through the WashNet user interface for accounting, invoicing, and security purposes. Downloads are available in comma-separated values (CSV) files for import into spreadsheet applications such as Excel. The types and format of the reports will be specified with input from WashNet customers but, in general, will consist of transaction reports, cumulative accounting reports, and mag stripe card usage reports over specified date ranges.
The WashTeller is contemplated as comprising a standard Unitec WashSelect II with bill acceptor, credit card reader, voice processor, and proximity sensor options added, as well as a custom Mark VII WashTeller overlay (face plate).
In a further aspect, the system of the present disclosure is adaptable to support additional functionality, such as enabling entry of 4-digit REM program code at WashTeller keypad; adding voice prompts and responses to improve customer experience; and enabling use of rechargeable wash cards. This functionality allows an operator to manage discounts (REM programs) by day of week and time of day, enable sale of rain insurance and add a remote wash capability (i.e., sell a card, coupon, or code at non-car wash site, and redeem at car wash site).
Use Case: Codes
Use Case: Rechargeable Wash Cards
Use Case: Remote Wash
Code Management
Managing four-digit codes will use the same REM program management user interface as created for Phase 1; the option of assigning a four-digit code will be added to the REM program creation workflow. When assigning four-digit codes, a check must be made against the database to ensure the operator has no other REM programs utilizing that same code.
When a code is entered into the WashTeller, a check is made against a local database and the transaction is flagged with the appropriate REM program identifier.
Rechargeable Wash Card Management
Using the REM program management user interface, Car wash operators can configure an unlimited number of mag stripe cards to be used as pre-paid, declining balance wash cards. At the customer's option, any of these cards may be designated as rechargeable wash cards. To activate a rechargeable wash card, the customer must complete and sign an authorization form (the authorization form includes the serial number of the wash card issued). Upon receipt of the authorization form, credit card processing technicians will configure the record in the database to recognize the wash card as rechargeable. Once the card reaches a low-balance threshold, a credit card transaction is automatically submitted in an amount appropriate to restore the card to full face value. Upon approval of the credit card transaction, the database will be updated to reflect the new balance for the card.
Car wash transactions purchased with a rechargeable wash card will be flagged with the appropriate REM program identifier. For each transaction, the database will be updated to reflect the new balance for the card.
Remote Wash Management
When a car wash is purchased at a remote site, a unique remote wash code is printed on the customer's receipt. When the remote wash code is redeemed at one of the pre-designated car wash sites, a message is sent to the other car wash sites that the code has been redeemed and is no longer valid.
The remote site will appear in the WashNet user interface Site List, but remote sites will not show operational or security status information. Also, site management functionality will be disabled for remote sites.
On the remote site's accounting page, the wash mix will be shown for purchases made at remote sites, but gross revenue, estimated costs, and estimated gross margins will be disabled; gross revenue, estimated costs, and estimated gross margins will be reported for the site at which the remote wash code was redeemed in order to simplify operator accounting issues.
Reports
Car wash operators will have the ability to download detailed transaction data for each REM program through the WashNet user interface for accounting, invoicing, and security purposes. Downloads are available in comma-separated values (CSV) files for import into spreadsheet applications such as Excel. The types and format of the reports will be specified with input from WashNet customers but, in general, will consist of transaction reports, cumulative accounting reports, and magnetic stripe card usage reports over specified date ranges.
Numerous modifications to the present disclosure will be apparent to those skilled in the art in view of the foregoing description. Accordingly, this description is to be construed as illustrative only.
Number | Date | Country | |
---|---|---|---|
60920079 | Mar 2007 | US |