This invention relates, generally, to contactless entry systems for ticketed events and spaces. More specifically, it relates to systems for valid entry verification using one or more cameras and one or more antennas within a predefined space, designed to verify an agreement between an amount of people counted within the space through the cameras and the amount of credentials scanned from mobile devices associated with the people within the space.
Traditionally, entry into a limited capacity event or space requires the possession of a physical or digital ticket. Prior to entering the event or space, a ticket holder must present the ticket, whether physical or digital, to an event management staff member. The staff member views and, in certain situations, scans the ticket to verify the validity of the ticket, as well as ensure that the ticket has not been previously scanned. Only upon a verification of both a valid ticket and a first-time entry does the ticket holder gain access to the space. Often, such a scanning event is associated with a unique code associated with the ticket, such as a barcode, a quick response code, or other scannable indicium that is unique to a singular ticket.
These traditional ticket verification systems function with relatively small failure rates, such that most, if not all, patrons within a location possess a valid ticket. However, such systems are time consuming by the nature of forcing a staff member to personally interact with each ticket holder entering a venue. For a relatively small-scale event with a few patrons, such personal interaction may only extend a line waiting time by a few minutes; however, for events such as sporting events including tens of thousands of patrons, ticket holders may be forced to wait in line for extended periods of time simply to verify that their ticket is valid.
Moreover, often, the process of entering a venue requires an additional step beyond ticket verification—safety verification. Particularly for larger events, security personnel must interact with patrons attempting to enter the venue to ensure that no patron enters the space with an unauthorized item, such as a weapon. These security stations are often located in close proximity to the ticket verification location; as such, waiting lines tend to condense into a confined space, within which multiple different tasks must be quickly performed to allow a patron to enter the venue, if authorized. As such, security personnel must maintain a watch over both the safety verification protocols, as well as the ticket verification location, ensuring not only that only authorized patrons enter a venue, but also that no unauthorized materials enter into the venue. Within the confined space proximate to a venue entrance, unauthorized patrons and/or materials can slip through security and ticketing verification, particularly for large-scale events.
Attempts have been made to provide remote-based security systems to enhance the ability of on-the-ground security personnel to concentrate on the more immediate dangers of unauthorized materials. For example, venues often employ camera technologies to record a given space, which can be monitored in real-time by a remote user, thereby helping the security personnel at the venue to identify all risks associated with the watched area. Moreover, venues have increasingly implemented scanner technologies that provide detailed images of patrons prior to entering a venue, as opposed to the more traditional metal detection screeners of the past. Each of these tools helps to ease security concerns within a venue; however, venues typically include a condensed space next to the entrance during which security and ticket verification must take place, even with these improved technologies. Moreover, while venues have increasingly implemented contactless scanning systems for tickets for both safety and health sanitization reasons, a physical or digital ticket often must be presented to gain entry into the venue.
Accordingly, what is needed is a comprehensive contactless entry verification system for use within a predefined space that eliminates the need for physical scanning events, thereby allowing venue staff to concentrate on security concerns, such as unauthorized materials, as opposed to credential verification. However, in view of the art considered as a whole at the time the present invention was made, it was not obvious to those of ordinary skill in the field of this invention how the shortcomings of the prior art could be overcome.
The long-standing but heretofore unfulfilled need for a contactless credential verification system is now met by a new, useful, and nonobvious invention.
The novel system includes a predefined virtual grid displayed on a position engine executable on a computing device. The predefined virtual grid represents an enclosed space at an event venue that includes an initial threshold spaced apart from an entrance. A first plurality of cameras are disposed proximate to the initial threshold, such that the first plurality of cameras form a field of vision that includes the initial threshold. A second plurality of cameras disposed proximate to the entrance, such that the second plurality of cameras form a field of vision that includes the entrance, the second plurality of cameras in electronic communication with the position engine. The first plurality of cameras and the second plurality of cameras are in electronic communication with the position engine. The first plurality of cameras and the second plurality of cameras are configured to record and transmit at least one visual frame showing the enclosed space to the position engine.
A plurality of mobile devices are disposed within the enclosed space, with each of the plurality of mobile devices being associated with a patron of the event venue. At least one of the plurality of mobile devices includes a credential for attendance within the event venue. In an embodiment, the credential for attendance within the event venue is a unique combination of characters selected from the group consisting of numbers, letters, and symbols. In an embodiment, the computing device includes a database of credentials for attendance within the event venue generated to be associated with the plurality of patrons of the event venue, such that the computing device verifies an agreement between the received and the stored credentials.
A plurality of transmitters are disposed within the enclosed space. The plurality of transmitters are in electronic communication with the position engine, and are configured to be in electronic communication with the plurality of mobile devices. In an embodiment, the predefined virtual grid is partially defined by a coverage area associated with at least two of the plurality of transmitters, such that each portion of the predefined virtual grid is associated with a discrete point of the enclosed space that receives emitted signals from at least two of the plurality of transmitters.
The plurality of transmitters are configured to emit a signal readable by each of the plurality of mobile devices. The plurality of transmitters are also configured to receive the credential for attendance within the event venue from the at least one of the plurality of mobile devices, verify the credential for attendance, and transmit a confirmation of the verified credential to the position engine.
The position engine is configured to display, on the predefined virtual grid, a location of each of a plurality of patrons of the event venue based on the at least one visual frame showing the enclosed space received from the first plurality of cameras and the second plurality of cameras. In an embodiment, the position engine is configured to display a location of the verified credential. The position engine may place a bounding box over each of the plurality of patrons of the event venue, and display the bounding box on the predefined virtual grid. In an embodiment, the position engine displays a total number of the plurality of patrons of the event venue. The position engine compares the total number of the plurality of patrons of the event venue with the confirmation of the verified credential received from the plurality of transmitters to verify an agreement between the total number of the plurality of patrons of the event venue and the verified credential.
An embodiment of the system includes a second predefined virtual grid displayed on the position engine executable on the computing device. The second predefined virtual grid represents an enclosed space within the event venue, such that the entrance is disposed between the second predefined virtual grid and the threshold. A third plurality of cameras are disposed within the enclosed space within the event venue, and a second plurality of transmitters are disposed within the enclosed space within the event venue. The third plurality of cameras and the second plurality of transmitters are configured to transmit positional and credential data to the position engine for display on the second predefined virtual grid.
The novel method includes the step of disposing a plurality of transmitters within an enclosed space at an event venue. The enclosed space includes an initial threshold spaced apart from an entrance, such that the plurality of transmitters are disposed between the initial threshold spaced and the entrance. A first plurality of cameras are disposed proximate to the initial threshold, such that the first plurality of cameras form a field of vision that includes the initial threshold. A second plurality of cameras are disposed proximate to the entrance, such that the second plurality of cameras form a field of vision that includes the entrance.
The method includes the step of capturing, from each of the first plurality of cameras and the second plurality of cameras, an image of the enclosed space. The plurality of transmitters receive at least one unique credential for attendance within the event venue. A position engine executable on a computing device receives and displays the image of the enclosed space. In addition, the position engine receives the at least one unique credential for attendance. The position engine defines a virtual grid displayed thereon, which is defined by the initial threshold and the entrance. The method includes the step of counting, via the position engine, a total number of the plurality of venue patrons displayed in the image of the enclosed space. An embodiment of the method includes the step of placing, via the position engine, a bounding box over each of the plurality of venue patrons.
The position engine separates the at least one unique credential for attendance within the event venue into segments of the virtual grid. For each of the plurality of venue patrons, the position engine calculates a confidence rating representing a validity of the unique credential. The calculation is based on receiving multiple copies of the at least one unique credential for attendance within the event venue. Based on the confidence rating being above a minimum acceptable value for one of the plurality of venue patrons, the one of the plurality of venue patrons is allowed to traverse past the entrance. However, based on the confidence rating being below the minimum acceptable value for one of the plurality of venue patrons, the position engine transmits a security alert to a mobile device associated with a security personnel disposed within the enclosed space.
An embodiment of the method includes the step of verifying an agreement between the total number of the plurality of venue patrons and a total number of the at least one unique credential for attendance within the event venue. Based on the agreement between the total number of the plurality of venue patrons and a total number of the at least one unique credential for attendance within the event venue, each of the plurality of venue patrons traverse past the entrance. However, based on a disagreement between the total number of the plurality of venue patrons and a total number of the at least one unique credential for attendance within the event venue, the position engine transmits a security alert to a mobile device associated with a security personnel disposed within the enclosed space.
In an embodiment, the virtual grid is be defined by a coverage area associated with at least two of the plurality of transmitters, such that each portion of the virtual grid is associated with a discrete point of the enclosed space that receives emitted signals from at least two of the plurality of transmitters. In an embodiment, the virtual grid is segmented into a plurality of predefined segments having equal area.
In an embodiment, the at least one unique credential for attendance within the event venue is a unique combination of characters selected from the group consisting of numbers, letters, and symbols. The method further includes the steps of storing, on a database of the computer device, a plurality of unique credentials for attendance within the event venue, and comparing, via the position engine, the received at least one unique credential for attendance within the event venue with the database including the plurality of unique credentials for attendance within the event venue.
In an embodiment, the plurality of transmitters emit a plurality of signals that are receivable by one or more mobile devices disposed within the enclosed space. Each of the one or more mobile devices is associated with one of the plurality of venue patrons, and is selected from the group consisting of a smartphone, a tablet, and a laptop. The one or more mobile devices transmit the at least one unique credential for attendance within the event venue that is receivable by the plurality of transmitters. An embodiment of the method includes the step of calculating, via the position engine, a confidence rating representing a validity of the at least one unique credential for attendance within the event venue based on receiving multiple copies of the at least one unique credential for attendance within the event venue from the one or more mobile devices.
An object of the invention is to provide a contactless credential verification system that is used within a given space to count the amount of people within the space, and verify the counted amount with a detected amount of proper credentials, thereby allowing venue personnel to concentrate on security concerns, as opposed to entry verification.
These and other important objects, advantages, and features of the invention will become clear as this disclosure proceeds.
The invention accordingly comprises the features of construction, combination of elements, and arrangement of parts that will be exemplified in the disclosure set forth hereinafter and the scope of the invention will be indicated in the claims.
The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee.
For a fuller understanding of the invention, reference should be made to the following detailed description, taken in connection with the accompanying drawings, in which:
In the following detailed description of the preferred embodiments, reference is made to the accompanying drawings, which form a part thereof, and within which are shown by way of illustration specific embodiments by which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the invention.
As used in this specification and the appended claims, the singular forms “a,” “an,” and “the” include plural referents unless the content clearly dictates otherwise. As used in this specification and the appended claims, the term “or” is generally employed in its sense including “and/or” unless the context clearly dictates otherwise.
All numerical designations are approximations which are varied up or down by increments of 1.0 or 0.1, as appropriate. It is to be understood, even if it is not always explicitly stated that all numerical designations are preceded by the term “about.” As used herein, “about” or “approximately” refers to being within an acceptable error range for the particular value as determined by one of ordinary skill in the art, which will depend in part on how the value is measured or determined. As used herein, the term “about” refers to ±10% of the numerical; it should be understood that a numerical including an associated range with a lower boundary of greater than zero must be a non-zero numerical, and the term “about” should be understood to include only non-zero values in such scenarios.
As used herein, “camera” includes, but is not limited to, any device that is capable of recording and transmitting audio and/or visual data in the form of one or more frames within a field of vision, such as an infrared device, an infrared sensor, a motion sensor, a laser, a radar, a similar device, and combinations thereof.
As used herein, “transmitter” includes, but is not limited to, real-time location-based tracking devices that are capable of transmitting, receiving, and/or reflecting wave-based data emitted from an electronic device, such as radio-frequency identification (RFID), wireless network protocol-based radio waves (such as those provided under the trade name WI-FI™), wireless personal area networks (such as those provided under the trade name BLUETOOTH LOW ENERGY™), ultra-wideband signals, similar signals, and combinations thereof.
As used herein, “computing device” includes, but is not limited to, electronic devices that are capable or wired or wireless data transmission and that are capable of graphically displaying data to a viewing user, such as a personal computer, laptop, mobile device, or similar device.
As used herein, “mobile device” includes, but is not limited to, an electronic device that is capable of being carried by a user and is capable of data transmission without requiring a tethered power source, such as a smartphone, a tablet, a laptop, a wearable device such as a smart watch or smart glasses, an artificial and/or virtual reality device, or a similar device.
As used herein, “venue” includes, but is not limited to, an enclosed space, whether entirely enclosed by walls and/or a ceiling, partially enclosed by walls and/or a ceiling, or enclosed by outer boundaries but otherwise open to the ambient environment, within which is ticketed or otherwise limited event takes place, such as a sporting event, a concert, a restaurant, a bar, a theatre, an office building or other workplace requiring identification badges, a grocery store or other service providing establishment, a theme park, an airplane or other mode of transportation, or a similar location that provides a limit on an amount of individual within the space at a given time, thereby requiring the counting and/or verification of a presence of an individual in real-time.
The present invention includes a comprehensive contactless entry verification system for use within a predefined space, such as an entry point to a venue requiring verified credentials for entry, including sporting events, modes of transportation, bars and restaurants, concerts, and other exclusive or limited capacity events. Rather than relying on a physical scanning event, the present invention improves an entry speed of a patron by automatically tracking, in real-time, a position of each patron within a predefined space, simultaneously querying, verifying, and tracking a credential associated with each patron for a contactless entry into a venue. Moreover, by allowing venue personnel to focus attention on security concerns rather than entry verification, the present invention improves safety protocols associated with a given event. The present invention accomplishes these goals by providing a collaborative, comprehensive system including cameras, transmitters, and a position engine, with each component working in combination to detect and verify a credential associated with one or more mobile devices. The system will be described in greater detail in the sections herein below.
As shown in
Referring now to
The position engine then graphically displays the objects in a simplified image, such that the persons detected in the image are assigned a different icon than non-persons within the image, thereby allowing a viewing user to quickly and easily identify humans within a given video frame. Moreover, the position engine thereby is capable of counting a total number of persons within the given video frame, and of tracking the total number of persons across subsequent video frames. The data received by the computing device 30 and displayed within the position engine are stored within a back-end database that is accessible by a back-end user, such as a security personnel or a network administrator.
As shown in
Moreover, as shown in
In addition to the plurality of transmitters 20, as shown in
As shown in
Different combinations of cameras 10 and/or transmitters 20 are contemplated for use within the credential verification system depending on the requirements of an end-user venue. For example, as shown in
As noted in the sections above, the credential verification system is designed to capture data related to a presence of one or more individuals within a predetermined grid 100 to determine whether the individual should gain access to a venue, airplane, restaurant, or other ticketed or limited capacity space. Turning now to
As shown in
Turning to
In an embodiment, upon querying for a credential, the one or more transmitters 20 receive the queried information at least partially in the form of positional data related to a pinged location of a mobile device 40 of a patron 150. The pinged location includes at least an elevation angle of the mobile device 40 with respect to a vertical plane, as well as an azimuth angle of the mobile device 40 with respect to a horizontal plane. The elevation angle and the azimuth angle data are transmitted to the position engine for plotting on an overlayed grid, such that the position engine performs both triangulation and trilateration to determine a location of the pinged mobile device 40 on the predetermined grid. Moreover, as the transmitters 20 ping location data from a plurality of mobile devices 40 within the predetermined grid 100, the position engine plots the locations of each of the mobile devices 40 to develop a relative location of each mobile device 40 within the predetermined grid 100.
As shown in
As noted above, the system relies not only on transmitter 20 data related to the querying of credentials from the patrons, but also on the raw number of individuals within a given area as measured by the cameras 10. As such, the cameras 10 and the transmitters 20 provide a detailed picture of the identities and validity of credentials for patrons within a given area, such that patrons without proper credentials can be quickly and easily isolated from credentialled individuals by using camera 10 data in combination with transmitter 20 data—for example, if the cameras 10 detect a presence of ten individual patrons, and the transmitters 20 detect a presence of only eight proper credentials, the position engine can not only identify a location of the eight proper credentials, but also can transmit an alert to security personnel of the location of the two improper credentials.
Moreover, in embodiments of the system, a single patron is associated with a mobile device 40 having multiple valid credentials, such as a situation in which a family including parents and children attend an event at a given venue. Moreover, a different patron lacks a valid credential and is instead attempting to gain access to the venue without a credential. In such a situation, an agreement between an amount of valid credentials and a total number of patrons within a given area may not equate to total compliance with valid credentialing, such as if the patron having multiple credentials possesses an extra credential. As the one or more transmitters 20 receive queried information from patrons located within the predetermined grid, the position engine calculates a confidence level for each patron within the predetermined grid. As groups of patrons travel together across the threshold 110 and toward the entrance 120, the position engine increases the confidence level for nonresponsive patrons within the group based on an association with the ticket holder. Accordingly, an uncredentialed patron separated from a group of patrons receives a low confidence level even during a situation in which a total amount of credentials matches a total amount of patrons within the predetermined grid.
An embodiment of the system quantifies the individuals with and without credentials based on a position-based grid 200 within the predetermined grid 100, as shown in
Moreover, as noted above, in certain situations individual patrons may be grouped together, with one of the patrons holding multiple credentials and the remainder of the group lacking a credential associated with their mobile device (or lacking a mobile device altogether). In addition, one or more individual patrons may lack a credential, and in the absence of a confidence level-based entrance determination, could improperly gain access to a venue. For example, referring to
All referenced publications are incorporated herein by reference in their entirety. Furthermore, where a definition or use of a term in a reference, which is incorporated by reference herein, is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.
While certain aspects of conventional technologies have been discussed to facilitate disclosure of the invention, Applicants in no way disclaim these technical aspects, and it is contemplated that the claimed invention may encompass one or more of the conventional technical aspects discussed herein.
The present invention may address one or more of the problems and deficiencies of the prior art discussed above. However, it is contemplated that the invention may prove useful in addressing other problems and deficiencies in a number of technical areas. Therefore, the claimed invention should not necessarily be construed as limited to addressing any of the particular problems or deficiencies discussed herein.
In this specification, where a document, act or item of knowledge is referred to or discussed, this reference or discussion is not an admission that the document, act or item of knowledge or any combination thereof was at the priority date, publicly available, known to the public, part of common general knowledge, or otherwise constitutes prior art under the applicable statutory provisions; or is known to be relevant to an attempt to solve any problem with which this specification is concerned.
This nonprovisional application is a continuation of and claims priority to provisional application No. 63/035,889, entitled “A method of identifying and verifying a person using geolocation and person recognition/a contact-less ticketing and payment system that is able to detect people who do not have a valid ticket or payment method stored on their mobile device,” filed on Jun. 8, 2020, by the same inventors, the entirety of which is incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
10380814 | Mathiesen | Aug 2019 | B1 |
20110205022 | Cavallaro | Aug 2011 | A1 |
20140139678 | Moriarty | May 2014 | A1 |
20170061715 | Busch-Sorensen | Mar 2017 | A1 |
20170228949 | Trani | Aug 2017 | A1 |
20190019361 | Kayhani | Jan 2019 | A1 |
20200097732 | Doolittle | Mar 2020 | A1 |
Number | Date | Country | |
---|---|---|---|
20210383626 A1 | Dec 2021 | US |
Number | Date | Country | |
---|---|---|---|
63035889 | Jun 2020 | US |