Accompanying this application is a text file containing computer program listings that includes the names of operational components of the computer code as well as relevant sections of code sufficient to reconstruct the solution.
Technical Field
The subject specification generally relates to transactional processing used in transportation using hand-held mobile devices that serve as sensors and conduits for data exchange.
Background of the Invention
Customer identification and transaction processing for customers in transit (either by motorized vehicle, bicycle, walking/wheelchair or boat is limited by either manual methods or the use of a recognizing tag such as the radio frequency identification (RFID) affixed to the vehicle or held by agent. The RFID is currently the most popular form of identification on controlled access toll roads in all nations operating toll roads.
There is a broadening appreciation that having toll booths and access control devices slows down traffic where travelers could continue unencumbered having been tagged and charged without significantly adjusting their speeds. A case study for this on a grand scale is in the State of Florida, United States where toll roads have no toll booths but customers are detected by overhead receivers capturing RFID tag information as vehicles proceed at highway speeds. This technological breakthrough allows for vendors to monitor and charge customers who have compatible RFID transponders affixed to the progressing vehicle. Vehicles with no transponder mounted to the vehicle are non-communicating and via vendor-supplied overhead receivers and must be billed using a different business strategy. One way is to mail the vehicle owner(s) a paper bill with the incentive for payment being the possibility that travelling rights within the state could be compromised for non-payers.
Clearly the logistics for collecting payment for non-communicating travelers is a burden perhaps exceeding the cash value of the collected toll. Taken as a whole however, tollbooth free toll roads provide higher margins and better travelling experience relative to toll roads that retain booth functionalities in the United States. In nations whose socioeconomic structure and cultural norms differ from the United States, payment at time of travel may be preferred in which case a physical barrier should be employed and removed when payment is rendered.
In a similar manifestation of controlled access to vendor controlled space the modern turnstile in an urban rapid transit system requires the proximal association of an electronic card that, if valid and holding sufficient funds will allow the bearer to pass through the turnstile and complete a trip on the supported conveyance. While the detection technology is ostensibly different from the RFID technology used on toll roads, the fundamental purpose and activity is the same—namely controlling passage to a privileges space and deducting payment in exchange for conveyance. The key difference between RFID tag and an electronic swipe card is that the RFID tag is physically connected to the vehicle and the vendors strongly discourage transferring this to another vehicle, while the electronic swipe card is correlated to each traveler and most often a single swipe represents payment for one adult traveler.
In a similar manifestation of controlled access to vendor controlled space is the need for access-only control with no immediate transfer of payment required. This might be the case for example at a residential or office complex where access to the parking lot is reserved for lessees and invited guests. In this case an electronic passage device serves only to open the gate and not for an immediate transfer of funds.
In a similar manifestation of controlled access to vendor controlled space is the need to gain entry to a building using an electronic badge or swipe card. In this use case the electronic swipe card is used for access only for one or more individuals and is independent of conveyance. The sole purpose of the electronic swipe card is for identification purposes—the holder of the card is considered the authorized party, even if the person holding the card is not the intended agent expected to be granted access by the vendor.
Mobile devices are being given consideration as replacements for the RIFD and electronic swipe cards because of their widespread acceptance and use by customers for more activities than making phone calls. Mobile devices are used throughout the world and are accessible to a large segment of the population, not necessarily reserved for privileged persons and/or persons with access to financial resources. The mobile device adds value as a venue for information exchange and control features that are not typically part of the user and administrative experience with RFID or electronic swipe cards. This is because the modern mobile device is a computer and provides agents with the tools for interaction—such as a screen and network capabilities. The modern mobile device as computer also provides administrative capabilities such as opening and closing accounts, adding funds, transferring rights to other account holders and communicating with vendors directly. The ubiquitous nature of mobile devices together with their utility as computers make them alluring options for identification/access and/or toll payment.
Example embodiments of the present invention provide a method for the detection, control and transactional processing of an agent in transit, and the collaboration of hardware and software required to enable this technology. The protected technology of this invention is the sole use of 802.11b/g/n frequencies between a mobile device (client) and local control computer (server) connected to a receiver (router) for the purpose of validating and transacting with customers (agents) for the purpose of transportation or access. Furthermore this invention covers the immediate control of access devices such as a gate or door either modulated by the agent interacting with software on the mobile device or in an automated fashion.
The present invention will become more fully understood from the detailed description given herein below and the accompanying drawings, wherein like elements are represented by like reference numerals, which are given by way of illustration only and thus are not limiting of the present invention and wherein:
The claimed subject matter is now described with reference to the drawings, wherein like reference numerals are used to refer to like elements throughout. In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the claimed subject matter. It can be evident, however, that the claimed subject matter can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form in order to facilitate describing the claimed subject matter.
As used in this application, the terms “component,” “module,” “system,” “interface,” or the like are generally intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution. For example, a component can be, but is not limited to being, a process running on a processor, a processor, an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a controller and the controller can be a component. One or more components can reside within a process and/or thread of execution and a component can be localized on one computer and/or distributed between two or more computers. As another example, an interface can include I/O components as well as associated processor, application, and/or API components.
The embodiment described herein is an example drawn from the model of installation at a toll plaza on a toll road. Other example embodiments that are equally suitable to this technology include installations on bridges, airports and parking lots. As used in this application, the term “toll plaza” and “toll booth” are intended to refer to any toll collection structure. These could be single or multiple booth facilities.
The terms “mobile device”, “cell phone”, “mobile radio” and “client” all refer to an electronic device capable of execute specific transactional code, and send and receive signals to one or more routers in the vicinity. As an example—a laptop or tablet computer would also suffice with some consideration to operating system. The operating systems being either Google Android or Apple iOS—two operating systems well known to both end users and application developers of mobile devices.
The term “middle-tier business logic controller software (MTBLCS)” refers specifically to the software code of this application that executes on the local server enabling transactions with the mobile device (client). The MTBLCS package consists of procedures that 1) serve as RESTful web service; 2) query and write to the local database into both transient and temporal records; 3) run business logic pertinent to deciding fate of client and 4) control the gate as appropriate to permit vehicle passage upon transaction completion. Salient elements of this code are contained in this application.
The term “client software” refers specifically to the computer code executing on the mobile device (client) installed as a part of this application. The purpose of the client software is as an interface with the agent providing opportunities for registration, account funding, account inquiry and if need payment authorization. Another purpose of the client software is to communicate with the local toll plaza server when appropriate as well as the central server via REST requests.
The term “internet” as used in this application refers to the generally accepted meaning of “the global communication network that allows almost all computers worldwide to connect and exchange information”. The use of the term internet is relevant to this application because functionality ensues in the presence or absence of internet connectivity. The term “wifi router” refers to a device known to individuals with experience in computer networking that allows wireless devices to connect to the Internet and communicate with other devices on a specific network.
The “agent” is synonymous with “vehicle driver” or “operator” in this application.
As used herein, the terms to “infer” or “inference” refer generally to the process of reasoning about or deducing states of the system, environment, and/or user from a set of observations as captured via events and/or data. Inference can be employed to identify a specific context or action, or can generate a probability distribution over states, for example. The inference can be probabilistic—that is, the computation of a probability distribution over states of interest based on a consideration of data and events. Inference can also refer to techniques employed for composing higher-level events from a set of events and/or data. Such inference results in the construction of new events or actions from a set of observed events and/or stored event data, whether or not the events are correlated in close temporal proximity, and whether the events and data come from one or several event and data sources.
Furthermore, the claimed subject matter can be implemented as a method, apparatus, or article of manufacture using standard programming and/or engineering techniques to produce software, firmware, hardware, or any combination thereof to control a computer to implement the disclosed subject matter. It should be appreciated that a carrier wave can be employed to carry computer-readable electronic data such as those used in transmitting and receiving electronic mail or in accessing a network such as the Internet or a local area network (LAN). A deliberate effort has been made to avoid the use of technology language currently fashionable such as “cloud computing”. Those skilled in the art will recognize many modifications can be made to this configuration without departing from the scope or spirit of the claimed subject matter.
Now referring to
The “toll plaza wifi zone” encompasses a geographic area defined by the radiofrequency strength of the set of wifi routers all belonging to a single network in which the wifi signal can be detected by any phone sufficient to complete the identification and transactional processing required for this application to succeed. In the embodiment shown in
In example embodiments of the present invention, a vehicle may be associated with one registered mobile device such that, when other mobile devices are present in the vehicle, only one mobile device may be tracked and served with a bill for transit. In the case where multiple registered mobile devices are present in the same vehicle the MTBLCS software groups all registered devices by virtue of geographic proximity and trajectory. The MTBLCS software the serves the first device and associated agent with a bill for transit, while not charging any other mobile devices associated with this conveyance. Required accuracy rates for grouping of mobile devices within one conveyance are set by business rules.
While
In another embodiment of the present invention the agent is present in a moving vehicle and has in the agent's proximity a mobile device (client) in the ON position with a unique software package installed as instructed by the client software. The wireless radio button on the mobile device may be in the ON or OFF position because a procedure in the client software is capable of controlling the wifi feature status on a mobile device.
Turning to
To elaborate on the software architecture that is pertinent to this claimed invention, the local server operations fall into four categories: 1) communications management with clients (mobile devices); 2) customer validation and tracking; 3) controlling toll booth gates to permit vehicle transit upon completion of transaction and 4) Performing the calculation of the toll deduction from account-specific funds. To support these operations, the database schema for both local and central servers include tables for “account”, “customer”, “wallet”, “client”, “vehicle”, “phone”, “cust txns” (transaction history), plaza location and wifi router location. These tables need no further explanation except to indicate that there is a one to one to one to one relationship between phone, customer and account and vehicle. This business logic may be adjusted without impinging on the success of the technology. Descriptions of additional tables follow where relevant to the operation described.
The first server side operation category (communications management) is formulated around a REST web service that accepts requests from the client in the form of JavaScript Object Notation (JSON). This is a standard architectural style that is used routinely in providing resources to consumers using Uniform Resource Identifiers (URIs). A skilled software developer will be able to create a RESTful service that will adequately fill this need. The basic POST request is sent by the mobile device (client/consumer) and sends an http request that passes to the server the MAC address of the mobile device, account number, phone ID and positioning information. The REST service then commits this information to specifically designed tables in the local database. One key table (called “boom_action”) is the entry point for REST submitted mobile devices and therefor is the major source of incoming entries. The table “boom_action” registers the presence of the mobile device, marks it as valid and whether or not a boom open request has been submitted. The table “boom_action” retains a record of agents applying for transit through the toll plaza wifi zone.
There are three other transitory tables that form the axis of transaction mapping in real time. The first of these tables is called “in_toll_zone” and records the identity of the expected vehicle based on the data received from the mobile device (client). This table then is the correlation of the validating device to the conveyance. The second table is called “license_plates_from_camera” and represents a validation table whereby the transacting mobile device (client) is correlated to the expected vehicle's features known by the database as unique attributes such as the vehicle's license plate or dimensions. In lieu of camera footage this table retains qualification data for incoming agents.
The second local server side operation (customer validation and tracking) involves checking the database for records relating the signature of the mobile device to a customer account with sufficient funds. Tracking vehicles as they move through the toll plaza wifi zone is described above where coordinates received from the client are populated into a table is called “trajectory”. This table is updated each moment a new reading is received. In this embodiment of this invention the “trajectory” serves the purpose of relating incoming vehicles to their target booth. This is important as it allows activation of the correct gate.
In example embodiments of the present invention, mobile identification and position are delivered to the server via REST services to listener software known as a web service. The mobile identification components may be either a unique mobile telephone number associated with the mobile station or an electronic serial number associated with the mobile station. In example embodiments of the present invention, the mobile station may be associated with the agent and agent's conveyance following business rules to which the agent will agree prior to initiating service. The business rules insist that the agent will be responsible for payment of all tolls and costs associated with the passage of the mobile device through the access control zone. This assumes that the registered mobile device is either directly or via a proxy under the control of the agent.
The third local server side operation is the MTBLCS code that serves to manage all transaction-related activities. This software is multithreaded in order to permit boom control to happen independently of agent transaction processing and is made up of three essential classes: 1) ManagePhones.java; 2) CheckLicensePlates.java and 3) SNMPGetAndSet.java. In order to guarantee independent threading the program is launched as two executable jar files (excluding slave-to-master retrograde copy function which is a separate standalone executable jar file). The methods in the MTBLCS listed in the Computer Listing most often contain custom SQL queries. Connection to the database is accomplished via a java JDBC MySQL driver.
A simplified flowchart exhibiting these steps is shown in
The fourth local server side operation is controlling the gate to permit passage of vehicles for which the transaction is complete.
Concurrent with server activities outlined in
Now turning to
In example embodiments of the present invention, toll collecting may include determining whether to make a toll collection based on the current position of the mobile device, and collecting a toll based on the determining step. In example embodiments of the present invention, the current position of the mobile device may be compared with stored locations of toll collection zones, and a toll may be collected if the comparing step indicates that the mobile device has traveled through a toll collection zone.
In example embodiments of the present invention, the tracking step may be initiated based on a message sent by the mobile station and/or the location of the mobile device respective to a local server. In example embodiments of the present invention, the current location of the mobile device may be updated periodically. The message may be one of a phone call or a text message. In example embodiments of the present invention, the initiating step may be performed at the mobile device and/or the local server. The mobile station proximally associated with the agent may be tracked by MTBLCS only within a specified set of areas where wifi routers constituting the toll plaza network exist.
Now turning to
In practice, the RSS experienced by any wifi-enabled mobile device differs depending on environmental conditions and the strength of the wifi receiver contained within an individual mobile device—mostly a reflection of make and model. Claimed in this embodiment is the ability to improve the accuracy in an ongoing fashion by applying a scalar correction specific to each phone. To compensate for these differences in RSS between mobile devices the client software undergoes an improvement algorithm whereby a scalar is applied to offset differences between calculated and actual position. This scalar is stored as a field in the database table holding mobile device data. The scalar values are updated (either increased or decreased) when the arrival time as determined by inputs from the vehicle sensor (induction loop) at a particular toll booth differs from the expected. This method appears sufficiently robust to extract the necessary resolution for this solution to perform without error.
Now turning to
Also in reference to
In another embodiment of this invention, the second server side component is a full local copy of the vendor's central database. This local copy is considered a Replication Slave using MySQL terminology. However the local version represents the transaction gateway where all agent actions as they pertain to vendor access and toll payment are recorded first prior to being transferred to the central server located at a remote location. This is accomplished using a selective retrograde copy service which is the subject of a separate patent. Suffice it to say only a selection of transactions are transferred to the master as many of the tables used in the local Server are used for temporary record keeping such as moment by moment progression through the toll plaza zone. This information is unnecessary to retain at the central Server as it provides no business value. However it is essential that the local Server have an updated record of agents' account balances and recent transactions in order to ensure accurate qualification prior to entry.
The schema are designed to be lightweight specifically for the purpose of controlling the size of the local database copy. For a customer base of 1 million agents undergoing 1 million transactions daily, the database size is estimated to be no larger than 500 gigabytes.
Continuing with reference to
A method for toll collection via a wireless network, according to an example embodiment of the present invention, may include tracking a current position of a mobile station within a vehicle, and collecting a toll based on the current position of the mobile station.
Example embodiments of the present invention may be used with currently existing automated toll collection systems, infrastructure, and/or eliminate the use of toll booths.