Recently, many paid garages have converted to fully automated facilities. Whereas in the past there were human attendants at every exit lane, full automation allows landlords to eliminate the human component by installing payment devices called Pay On Foot (POF) machines. Customers take a ticket upon entry, pay at a POF machine when leaving, insert the paid ticket into the exit terminal, and proceed to leave when the system recognizes the paid ticket and opens the gate arm. Full automation allows for an elimination of exit lane labor costs, reduced transaction times at exits, and elimination of mistakes or potential fraud.
Despite the benefits of a fully automated facility, certain problems exist when there is no human oversight at exit lanes. One problem that is increasingly common is for non-paying cars to follow a paying car into (or out of) the facility. This is referred to as “tailgating,” and allows the tailgating car(s) to avoid paying. Embodiments of the present disclosure address these and other issues.
Embodiments of the present disclosure provide a vehicle barrier system that may be used to help prevent instances of “tailgating,” where non-paying cars closely follow a paying car into (or out of) an automated garage facility or other venue to avoid fees. A vehicle barrier system according to various aspects of the present disclosure includes a control system in communication with a sensor system for detecting a vehicle seeking passage through a gateway, a first gate system, and a second gate system. The control system comprises a processor and memory coupled to the processor and storing instructions that, when executed by the processor, cause the control system to: receive data from the sensor system indicating the presence of the vehicle; in response to receiving the sensor data indicating the presence of the vehicle, determine whether the second gate system is closed; in response to determining that the second gate system is closed: open the first gate system to allow the vehicle to pass the first gate system; and attempt to close the first gate system behind the vehicle after the vehicle passes the first gate system; in response to successfully closing the first gate system behind the vehicle, opening the second gate system to allow the vehicle to proceed through the gateway; and in response to unsuccessfully closing the first gate system behind the vehicle, generating an alarm.
The present disclosure includes various methods, apparatuses (including computer systems) that perform such methods, and computer readable media containing instructions that, when executed by computing systems, cause the computing systems to perform such methods. Other features will be apparent from the accompanying drawings and from the detailed description which follows.
Subject matter will now be described more fully hereinafter with reference to the accompanying drawings, which form a part hereof, and which show, by way of illustration, specific example embodiments. Subject matter may, however, be embodied in a variety of different forms and, therefore, covered or claimed subject matter is intended to be construed as not being limited to any example embodiments set forth herein; example embodiments are provided merely to be illustrative. Likewise, a reasonably broad scope for claimed or covered subject matter is intended. Among other things, for example, subject matter may be embodied as methods, devices, components, or systems. Accordingly, embodiments may, for example, take the form of hardware, software, firmware or any combination thereof (other than software per se). The following detailed description is, therefore, not intended to be taken in a limiting sense.
In the accompanying drawings, some features may be exaggerated to show details of particular components (and any size, material and similar details shown in the figures are intended to be illustrative and not restrictive). Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a representative basis for teaching one skilled in the art to variously employ the disclosed embodiments.
Reference in this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the disclosure. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Moreover, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not other embodiments.
Any combination and/or subset of the elements of the methods depicted herein may be combined with each other, selectively performed or not performed based on various conditions, repeated any desired number of times, and practiced in any suitable order and in conjunction with any suitable system, device, and/or process. The methods described and depicted herein can be implemented in any suitable manner, such as through software operating on one or more computer systems. The software may comprise computer-readable instructions stored in a tangible computer-readable medium (such as the memory of a computer system) and can be executed by one or more processors to perform the methods of various embodiments.
While
The functionality of the control system 210, including the steps of method 300 from
The functionality of the control system 210 or other system and devices operating in conjunction with embodiments of the present disclosure may also be implemented through various hardware components storing machine-readable instructions, such as application-specific integrated circuits (ASICs), field-programmable gate arrays (FPGAs) and/or complex programmable logic devices (CPLDs). Systems according to aspects of certain embodiments may operate in conjunction with any desired combination of software and/or hardware components.
In the example shown in
The control system 210 includes a user interface 216 that may include any number of input devices (not shown) to receive commands, data, and other suitable input. The user interface 216 may also include any number of output devices (not shown) to provides the user with data, notifications and alerts, and other information. Typical I/O devices may include mice, keyboards, modems, network interfaces, printers, scanners, video cameras and other devices.
The control system 210 may communicate with one or more computing devices, as well as other systems and devices in any desired manner, including via network 260. The control system 210 and/or other computing devices may be, include, or operate in conjunction with, a laptop computer, a desktop computer, a mobile subscriber communication device, a mobile phone, a personal digital assistant (PDA), a tablet computer, an electronic book or book reader, a digital camera, a video camera, a video game console, and/or any other suitable computing device.
The network 260 may include any electronic communications system or method. Communication among components operating in conjunction with embodiments of the present disclosure may be performed using any suitable communication method, such as, for example, a telephone network, an extranet, an intranet, the Internet, point of interaction device (point of sale device, personal digital assistant (e.g., iPhone®, Palm Pilot®, Blackberry®), cellular phone, kiosk, etc.), online communications, satellite communications, off-line communications, wireless communications, transponder communications, local area network (LAN), wide area network (WAN), virtual private network (VPN), networked or linked devices, keyboard, mouse and/or any suitable communication or data input modality. Systems and devices of the present disclosure may utilize TCP/IP communications protocols as well as IPX, Appletalk, IP-6, NetBIOS, OSI, any tunneling protocol (e.g. IPsec, SSH), or any number of existing or future protocols.
The exemplary vehicle barrier system 200 shown in
System 200 further includes a pair of gate systems, first gate system 230 and second gate system 240. The first gate system 230 is positioned to control access to an initial portion of a gateway, while the second gate system is 240 is positioned subsequent to the first gate system 240 to control final access to the gateway. As shown in
The Gate Systems 230, 240 may include any number and type of different doors, gates, and other systems for controlling access to a gateway. For example, Gate Systems 230, 240 may comprise one or more of: a horizontally tilting door, a vertically tilting door, a sectional door, a vertically rotating arm, horizontally rotating arm, a spike barrier, and a post. The first gate system 230 and second gate system 240 need not utilize the same type of access control system. In the example shown in
In the example shown in
The Control System 210 may be adapted to analyze the information collected from the user (or automatically from a system associated with the user's vehicle) by the Access Terminal 250 to authenticate the user or vehicle for passage through the gateway. Successful authentication in this manner may be required prior to opening one or both of the first gate system 230 or the second gate system 240.
If the control system 210 determines that the second gate system 240 is closed, the control system 210 opens (320) the first gate system 230 to allow the vehicle to pass the first gate system 230. The control system 210 attempts to close (325) the first gate system 230 behind the vehicle after the vehicle passes the first gate system 230.
The control system 210 determines whether the first gate system 230 successfully closed behind the vehicle (330). If the first gate system 230 successfully closed behind the vehicle, the vehicle will be positioned between the first gate system 230 and the second gate system 240 (both off which are closed) as shown for the lead car in
In the event that the first gate system 230 did not close successfully, the control system may analyze (350) data from the sensor system 220 and generate an alarm (355). In The control system 210 may generate a variety of different alarms, such as visual alarms, audio alarms, and alarms included in electronic communications such as emails, SMS texts, and the like.
In order to prevent damage to longer vehicles, vehicles with trailers, or even a second vehicle attempting to tailgate behind a first vehicle, the control system 210 may refrain from closing either gate system 230, 240 in response to detecting an obstacle within a gate system. The control system may automatically analyze (350) sensor data to identify the nature of an obstacle. For example, in some embodiments the sensor system 220 may include one or more cameras positioned and adapted to capture an image (as well as video) of an obstacle blocking either gate system 230, 240. The control system 210 may then automatically identify the obstacle using, for example, an image recognition algorithm, and then generate the alarm (355) based on the identification of the obstacle.
For example, the subject matter and delivery of an alarm may be customized based on whether the obstacle is a person, animal, part of a vehicle, another vehicle, etc. Consider an example where the obstacle is identified to be a second vehicle, the control system 210 may automatically determine that a vehicle is attempting to tailgate, and generate the alarm (355) to alert a user of the system 200 (such as a parking attendant) to attend to the gateway and enforce payment from the tailgating vehicle. The alarm could also (or alternatively) be delivered to the driver of the tailgating vehicle to instruct the driver of the second vehicle to back up to allow the first gate system 230 to close. Alarms could also be generated and delivered to a law enforcement agency, as well as any other party.
In embodiments employing one or more cameras in conjunction with the sensor system 220, such cameras may be adapted to capture images of the drivers of vehicles attempting to pass through the gateway, as well as license plates coupled to such vehicles. The control system 210 may use image recognition algorithms or other techniques to determine whether a driver's face and/or license plate is obscured from the view of the cameras. For example, a license plate may be covered in mud, or the driver may intentionally be hiding his/her face. In such cases, an alarm may include a notification directed to the driver of a vehicle to remove the obfuscation to allow identification of the vehicle and/or driver.
For the sake of brevity, conventional data networking, application development and other functional aspects of the systems (and components of the individual operating components of the systems) may not be described in detail herein. Furthermore, the connecting lines shown in the various figures contained herein are intended to represent exemplary functional relationships and/or physical couplings between the various elements. It should be noted that many alternative or additional functional relationships or physical connections may be present in a practical system.
The systems and methods of the present disclosure may be embodied as a customization of an existing system, an add-on product, a processing apparatus executing upgraded software, a stand alone system, a distributed system, a method, a data processing system, a device for data processing, and/or a computer program product. Accordingly, any portion of the system or a module may take the form of a processing apparatus executing code, an internet based embodiment, an entirely hardware embodiment, or an embodiment combining aspects of the internet, software and hardware. Furthermore, the system may take the form of a computer program product on a computer-readable storage medium having computer-readable program code means embodied in the storage medium. Any suitable computer-readable storage medium may be utilized, including hard disks, CD-ROM, optical storage devices, magnetic storage devices, and/or the like.
The term “non-transitory” is to be understood to remove only propagating transitory signals per se from the claim scope and does not relinquish rights to all standard computer-readable media that are not only propagating transitory signals per se. Stated another way, the meaning of the term “non-transitory computer-readable medium” should be construed to exclude only those types of transitory computer-readable media which were found in In Re Nuijten to fall outside the scope of patentable subject matter under 35 U.S.C. § 101.
Although the disclosure includes a method, it is contemplated that it may be embodied as computer program instructions on a tangible computer-readable carrier, such as a magnetic or optical memory or a magnetic or optical disk. All structural, chemical, and functional equivalents to the elements of the above-described exemplary embodiments that are known to those of ordinary skill in the art are expressly incorporated herein by reference and are intended to be encompassed by the present claims. Moreover, it is not necessary for a device or method to address each and every problem sought to be solved by the present disclosure, for it to be encompassed by the present claims. Furthermore, no element, component, or method step in the present disclosure is intended to be dedicated to the public regardless of whether the element, component, or method step is explicitly recited in the claims. No claim element herein is to be construed under the provisions of 35 U.S.C. 112, sixth paragraph, unless the element is expressly recited using the phrase “means for.” As used herein, the terms “comprises”, “comprising”, or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Where a phrase similar to “at least one of A, B, or C,” “at least one of A, B, and C,” “one or more A, B, or C,” or “one or more of A, B, and C” is used, it is intended that the phrase be interpreted to mean that A alone may be present in an embodiment, B alone may be present in an embodiment, C alone may be present in an embodiment, or that any combination of the elements A, B and C may be present in a single embodiment; for example, A and B, A and C, B and C, or A and B and C.
Changes and modifications may be made to the disclosed embodiments without departing from the scope of the present disclosure. These and other changes or modifications are intended to be included within the scope of the present disclosure, as expressed in the following claims.
This application is a continuation of U.S. application Ser. No. 14/852,323, filed 11 Sep. 2015 by Aram Marabyan et al., which is herein incorporated by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
3794966 | Platzman | Feb 1974 | A |
4133140 | Berard | Jan 1979 | A |
5177479 | Cotton | Jan 1993 | A |
5323151 | Parsadayan | Jun 1994 | A |
5331312 | Kudoh | Jul 1994 | A |
5815983 | Lodge | Oct 1998 | A |
5872525 | Fukasawa | Feb 1999 | A |
5884432 | DeLillo | Mar 1999 | A |
6267332 | Almblad | Jul 2001 | B1 |
7789258 | Anderson | Sep 2010 | B1 |
7856915 | Anderson | Dec 2010 | B1 |
8223010 | Petite | Jul 2012 | B2 |
8292538 | Morgan | Oct 2012 | B2 |
8502698 | Chen | Aug 2013 | B2 |
8641352 | Stutz | Feb 2014 | B2 |
8678701 | Aldasem | Mar 2014 | B1 |
8742949 | Chang | Jun 2014 | B2 |
8818682 | Dolgov | Aug 2014 | B1 |
8831970 | Weik | Sep 2014 | B2 |
8845125 | Lumsden | Sep 2014 | B1 |
8869448 | Lee | Oct 2014 | B1 |
8960536 | Wright | Feb 2015 | B2 |
8985890 | Miracle | Mar 2015 | B2 |
9098954 | Byrd | Aug 2015 | B1 |
9732483 | Marabyan et al. | Aug 2017 | B2 |
20030033388 | Hom | Feb 2003 | A1 |
20050207616 | Brad | Sep 2005 | A1 |
20060176171 | Fitzgibbon | Aug 2006 | A1 |
20100052947 | Lin | Mar 2010 | A1 |
20120050069 | Mercier | Mar 2012 | A1 |
20120092125 | Farber | Apr 2012 | A1 |
20120143657 | Silberberg | Jun 2012 | A1 |
20130088324 | Morley | Apr 2013 | A1 |
20130132167 | Krug | May 2013 | A1 |
20130176107 | Dumas | Jul 2013 | A1 |
20130179238 | Warner, IV | Jul 2013 | A1 |
20130209167 | Heald | Aug 2013 | A1 |
20130211628 | Thurow | Aug 2013 | A1 |
20130211784 | Christianson | Aug 2013 | A1 |
20130287491 | Petryshyn | Oct 2013 | A1 |
20130314232 | Jerhotova | Nov 2013 | A1 |
20130317693 | Jefferies | Nov 2013 | A1 |
20140241798 | Sharipov | Aug 2014 | A1 |
20140259930 | Gilliam | Sep 2014 | A1 |
20140266804 | Asadpour | Sep 2014 | A1 |
20140314480 | Heald | Oct 2014 | A1 |
20150016882 | Oakes | Jan 2015 | A1 |
20150025947 | Dutta | Jan 2015 | A1 |
20150130642 | Huang | May 2015 | A1 |
20150139726 | Burgin | May 2015 | A1 |
20150146001 | White | May 2015 | A1 |
20150217873 | Cox | Aug 2015 | A1 |
20150254914 | Harucksteiner | Sep 2015 | A1 |
20150281658 | Lee | Oct 2015 | A1 |
20160343251 | Lee | Nov 2016 | A1 |
20170073912 | Marabyan et al. | Mar 2017 | A1 |
Number | Date | Country |
---|---|---|
WO-8502698 | Jun 1985 | WO |
Entry |
---|
“U.S. Appl. No. 14/852,323, Non Final Office Action dated Mar. 7, 2017”, 12 pages. |
“U.S. Appl. No. 14/852,323, Notice of Allowance dated Apr. 12, 2017”, 7 pages. |
“U.S. Appl. No. 14/852,323, Restriction Requirement dated Nov. 29, 2016”, 7 pages. |
Number | Date | Country | |
---|---|---|---|
20170321385 A1 | Nov 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14852323 | Sep 2015 | US |
Child | 15660665 | US |