1. Field of the Invention
The present invention pertains to the art of visitor control and tracking systems and, more particularly, to a visitor control and tracking system for a venue that monitors and guides visitors from one of a plurality of access points towards one or more destination points.
2. Discussion of the Prior Art
As population centers continue to grow and as the number of users of public transportation increases, it is important to monitor and control the flow of people moving from one location to another, particularly during time of heightened security. Large venues having multiple access points and multiple internal destinations, such as amusement parks, fairgrounds, historical sites, community parks and the like, can benefit from crowd control and monitoring. For example, monitoring the flow of people in a rail station enables individuals to be directed toward areas of the station that are less crowded and to a desired platform without getting lost thereby increasing their chances of finding, for example, a train or rail car without the need for a prolonged wait.
Amusement parks, fairgrounds, historical sites and the like would also benefit from crowd control and monitoring devices. Visitors entering amusement parks typically head to a favorite area without knowledge or regard for how crowded that area may be. If the visitor is provided with real-time information regarding each potential destination in the park, the visitor could opt to head to less crowded areas, or toward areas where the flow of visitors is moving quickly and lines are shorter. In this manner, the visitor's overall experience at the venue is positive, which leads to an increase in the likelihood of a return visit.
In addition to frustration that large crowds can generate, large uncontrolled crowds are an attractive target for terrorists. Terrorists use large crowds as cover for carrying out various attacks on civilian populations. The crowds themselves offer an attractive target for terrorists. During prior attacks in London and Barcelona, terrorists hid among crowds trying to board trains and plant bombs which, when detonated, resulted in deaths and injury of numerous civilians. At present, security in many transportation hubs and large venues is primarily passive. That is, many transportation hubs and other large venues simply employ cameras to monitor people waiting for trains or moving about a theme park towards various attractions. Many facilities also employ security personnel, both uniformed and undercover, that mingle with the crowds and which are ready to respond as necessary to emergency situations.
Unfortunately, large crowds often make it difficult to properly monitor all situations and areas. Actually, many terrorists watch the monitors in order to determine how security personal respond to various situations. That is, the terrorists seek out established patterns in responses. Once any patterns in the responses can be determined, plans are adjusted to compensate for the probable response in order to increase the likelihood of success of any planned event. By providing security personnel with real-time monitoring of crowd flow, randomized responses to various security threats can be developed that will thwart potential terrorists. In venues that employ security screening, individuals failing the screening process can often times get lost in the crowds before security personnel can respond. Also, without proper screening, individuals can enter private areas of the park unnoticed. Furthermore, present screening systems are not fully compatible with large crowds entering a venue. Existing screening systems are typically low-through put systems which themselves create congestion at entrances to the venue. Thus, the screening system itself generates long lines and crowds which are themselves potential targets.
Based on the above, there exists a need for an effective crowd control and monitoring system. More specifically, there exists a need for a crowd control and monitoring system that establishes a high throughput screening system, provides security personnel with a means to monitor and track potential threats, and also provides members of the crowd with real-time information regarding a particular venue or location.
The present invention is directed to a visitor control and tracking system for a venue having a plurality of access points and a plurality of destination points. In accordance with the invention, a monitoring system tracks a location and movement of individuals or crowds in the venue and works in combination with a distributed network of screening units or kiosks to provide effective crowd control and monitoring. In one embodiment, the monitoring system employs RFID tags or devices which are distributed at kiosks to visitors entering the venue. A plurality of RFID readers or receivers are arranged about the venue and function to scan for the RFID devices. A central control, operatively connected to each of the RFID receivers, tracks a location and movement of each of the RFID devices to determine a visitor associated metric for each of the plurality of destination points. In another embodiment, the visitor associated metric is simply established by visual crowd monitoring.
Once the visitor associated metric is determined, information corresponding to the visitor associated metric relating to each of the plurality of destination points is provided to visitors on various display devices provided at each access point, as well as displays preferably arranged about the venue. More specifically, crowd flow rates, capacities at each of the plurality of destination points and wait times at particular attractions are determined in real time, such as through a processor of the central control. The calculated flow rates and capacities are compared to baseline quantities stored in memory to determine crowd levels at each of the plurality of destination points. The plurality of displays then provide information which can be used to guide visitors toward desired ones of the plurality of destination points. For example, visitors entering the venue can be informed that visiting areas or attractions in a particular order will result in shorter wait times.
In further accordance with the RFID embodiment of the invention, each of the plurality of RFID devices is provided with a unique address. In this manner, the various RFID receivers can provide status information to the central control regarding particular ones of the RFID devices. In this arrangement, the venue can be divided into public areas and private areas, with the central control validating that only authorized individuals enter the private areas of the venue. In the event that an unauthorized RFID device is determined to be in a private area, a security response can be initiated. In addition, individuals who fail a security screening can be monitored, tracked and, if necessary, detained by security personnel.
In accordance with this embodiment of the invention, visitors entering an amusement park are screened for security threats prior to being presented with a keepsake containing an RFID device. If, for example, the individual fails the screening process, the RFID device in the keepsake can be tracked by the RFID receivers and, if necessary, the individual stopped and questioned by security personnel. In accordance with one aspect of the invention, a plurality of video cameras are located about the venue. Individuals who fail the initial security screen are actually tracked through the RFID tags and/or visually. The video cameras can also be employed to track and locate lost children. In another example, the RFID device can be provided in a transit pass or ticket. If the individual fails a security screen, the transit pass can be tracked throughout a particular station or even an entire transportation system through both an RFID tag embedded in the transit pass and cameras located throughout the transit system.
Furthermore, through real time tracking of the flow and location of visitors in a particular venue, various patterns can be evaluated and security responses customized to address various situations. Moreover, the type of security response can be randomized so that individuals who may be monitoring a venue's security system cannot learn and analyze response patterns which can later be employed to exploit weakness in the venue's security system.
Additional objects, features and advantages of the present invention will become more readily apparent from the following detailed description of a preferred embodiment when taken in conjunction with the drawings wherein like reference numerals refer to corresponding parts in the several views.
The present invention is directed to a visitor control and tracking system for a venue 4, such as an amusement park venue 4 as depicted in
In the embodiment shown in
In any event, screening center 40 includes a collection portion 70 arranged within a housing 72 that retrieves trace residue samples and certain demographic samples from a subject. As such, collection portion 70 includes a residue sample collector 75 and a demographic sample collector (not shown). In addition, security screening center 40 includes various input devices, such as an exterior camera 78 and a display 79 which, in addition to serving as an input device for screening center 40, provides the visitor with information about the various zones Z1-Z4 and attractions (not separately labeled) within venue 4. For instance, display 79 can provide information regarding a desired order in which to visit zones Z1-Z4 and/or other locations so as to encounter shorter lines and minimize wait times. In another example, display 79 can provide information guiding groups of visitors initially to different ones of zones Z1-Z4. For example, display 79 can provide information which guides the first thousand visitors to Z1, the next thousand visitors to Z2 and so on. The particular details of collection portion 70 and the input devices do not form part of the present invention and thus will not be discussed more fully herein. Instead, the details can be found in commonly assigned U.S. patent application Ser. No. 11/418,193, entitled “Security Screening and Support System”, filed on May 5, 2006 and U.S. Provisional Patent Application Ser. No. 60/756,573, entitled “System and Method For Optimization For Trace Chemical Sample Collection”, filed Jan. 6, 2006, both of which are incorporated herein by reference. In any case, while the visitor interacts with screening center 40, a security scan is performed to determine whether the visitor poses a potential threat to venue 4 or other visitors in a manner that will be discussed more fully below. Following the security scan, a keepsake 90 (see
As best shown in
With reference to
Processor 132 compares flow-in data, flow-out data and population data with data stored in memory 134. That is, memory 134 includes both maximum in and out flow rate data for each zone Z1-Z4, as well as a maximum capacity value for each zone Z1-Z4. Thus, central control 130 determines which zones Z1-Z4 are under or over capacity and directs visitors toward zones that are under capacity in a manner that will be described more fully below.
In addition to display 79 provided on security screening center 40, visitor tracking control system includes a plurality of displays 150a-150j (see
In addition to guiding visitors about venue 4, the visitor control and tracking system performs a security screening of each visitor. Towards that end, as represented in
In accordance with one aspect of the invention, normal and abnormal comparison data is periodically updated using “supervised learning.” One form of supervised learning occurs when local processing of data received through the input sensors contains unfamiliar attributes. The unfamiliar attributes are sent to a comparison database contained within behavior analysis portion 203. Another form of update occurs when security screening center 40 sounds an alarm on a particular visitor. In this situation, sensor information is presented to security operation center personnel who determine the validity of a potential threat, perform necessary actions, and resolve the threat condition. Sensor data and threat resolution information is then stored in behavior analysis portion 203 in order to update databases contained therein. In any event, as set forth above, once the security scan is complete, security screening center 40 issues an article or keepsake 90 to the visitor. If the visitor fails the security screen, an embedded code or graphic known only to security personnel is imprinted on keepsake 90. Thus, when presenting keepsake 90 to security personnel in order to gain entry, visitors who have failed the security screen can be subjected to greater scrutiny.
Central control 130 also includes a tracking portion 224 which can track each individual visitor through the unique address in each RFID chip 113 about venue 4. By tracking real-time crowd flow and the location of each visitor, central control 130 can establish patterns of movement in venue 4. The patterns of movement are employed by security personnel to determine responses to various situations. Moreover, the patterns of movement can be employed to develop randomized responses to prevent individuals from learning and analyzing responses and exploit weaknesses in the security system. In addition, tracking portion 224, working in combination with RFID readers 122a-122f and video cameras 125a-125g, can track individuals, particularly those who fail the initial security screen. In addition, RFID readers 122a-122f and video cameras 125a-125g can be employed to determine whether visitors are moving about public portions of venue 4 or whether a visitor has moved into private portions of venue 4.
A visitor observed in private areas of venue 4 can be quickly located and escorted back into the public areas. Central control 130 is preferably linked to security personnel through a plurality of portable data devices, such as indicated generally at 300 in
Based on the above, it should be readily apparent that the visitor control and tracking system of the invention provides for real-time crowd monitoring, advanced visitor guidance and enhanced venue security. In particular, it should be realized that the visitor control and tracking functions can be performed at the screening centers or kiosks only, in combination with cameras provided throughout the venue and/or with the use of the RFID chips and readers. In any case, a visitor associated metric would be established for crowd control purposes. The visitor readable displays can simply be constituted by those at the kiosks or the kiosk displays in combination with various displays arranged throughout the venue. The invention also has various security aspects. In particular, in addition to performing explosive checks at the kiosks, abnormal behavior can be monitored. In this case, each kiosk serves as security sentinel whereby the kiosk is an interactive tool to assess behavior. Additional security and tracking features exist with the use of the RFID tags. Further security is established in connection with the randomized responses.
Although shown with venue 4 illustrated as an amusement park, it should be readily understood that the present invention is readily adaptable into a wide variety of venues that have multiple entrance points and multiple destination points, such as metro systems, stadiums, parks, fairgrounds, historical sites and the like. Although described with reference to preferred embodiments of the invention, it should be readily understood that various changes and/or modifications can be made to the invention without departing from the spirit thereof. For instance, while the monitoring system is described as employing RFID readers to scan for RFID devices carried by each visitor, it should be understood other devices such as video cameras, passive or active sensors and the like can also be employed. In general, the invention is only intended to be limited by the scope of the following claims.
The present invention claims the benefit of U.S. Provisional Patent Application Ser. No. 60/723,476 entitled “Kiosk/Security and Decision Support Software, Crowd Control” filed Oct. 5, 2005, and U.S. Provisional Patent Application Ser. No. 60/846,509 entitled “Visitor Control and Tracking System” filed Sep. 22, 2006.
Number | Name | Date | Kind |
---|---|---|---|
4788039 | Glattstein | Nov 1988 | A |
5138889 | Conrad | Aug 1992 | A |
5157261 | Grey et al. | Oct 1992 | A |
5296380 | Margalit | Mar 1994 | A |
5476794 | O'Brien et al. | Dec 1995 | A |
5480612 | Margalit | Jan 1996 | A |
5483601 | Faulkner | Jan 1996 | A |
5566327 | Sehr | Oct 1996 | A |
5571976 | Drolet | Nov 1996 | A |
5648047 | Kardish et al. | Jul 1997 | A |
5741984 | Danylewych-May et al. | Apr 1998 | A |
5818047 | Chaney et al. | Oct 1998 | A |
5859375 | Danylewych-May et al. | Jan 1999 | A |
6028626 | Aviv | Feb 2000 | A |
6073499 | Settles | Jun 2000 | A |
6078928 | Schnase et al. | Jun 2000 | A |
6424264 | Giraldin et al. | Jul 2002 | B1 |
6446514 | Danylewych-May et al. | Sep 2002 | B1 |
6509829 | Tuttle | Jan 2003 | B1 |
6529786 | Sim | Mar 2003 | B1 |
6610977 | Megerle | Aug 2003 | B2 |
6613576 | Rodacy et al. | Sep 2003 | B1 |
6674367 | Sweatte | Jan 2004 | B2 |
6747562 | Giraldin et al. | Jun 2004 | B2 |
6914668 | Brestel et al. | Jul 2005 | B2 |
6937147 | Dilbeck et al. | Aug 2005 | B2 |
6952163 | Huey et al. | Oct 2005 | B2 |
6976032 | Hull et al. | Dec 2005 | B1 |
7047829 | Napoli | May 2006 | B2 |
7109869 | Sweatte | Sep 2006 | B2 |
7136513 | Waehner et al. | Nov 2006 | B2 |
7327251 | Corbett, Jr. | Feb 2008 | B2 |
20020070863 | Brooking | Jun 2002 | A1 |
20020070865 | Lancos et al. | Jun 2002 | A1 |
20020082897 | Menelly et al. | Jun 2002 | A1 |
20030013459 | Rankin et al. | Jan 2003 | A1 |
20030128100 | Burkhardt et al. | Jul 2003 | A1 |
20030130035 | Kanarat | Jul 2003 | A1 |
20030142853 | Waehner et al. | Jul 2003 | A1 |
20030149526 | Zhou et al. | Aug 2003 | A1 |
20040169589 | Lea et al. | Sep 2004 | A1 |
20040230437 | Havrilak, Jr. | Nov 2004 | A1 |
20040252024 | Huey et al. | Dec 2004 | A1 |
20040265169 | Haas et al. | Dec 2004 | A1 |
20050024204 | Germaine et al. | Feb 2005 | A1 |
20050043897 | Meyer | Feb 2005 | A1 |
20050045710 | Burke et al. | Mar 2005 | A1 |
20050057354 | Jenkins et al. | Mar 2005 | A1 |
20050074147 | Smith et al. | Apr 2005 | A1 |
20050101027 | Haas | May 2005 | A1 |
20050108912 | Bekker | May 2005 | A1 |
20050137890 | Bhatt et al. | Jun 2005 | A1 |
20050251398 | Zanovitch et al. | Nov 2005 | A1 |
20050256724 | Rasin et al. | Nov 2005 | A1 |
20050264416 | Maurer | Dec 2005 | A1 |
20050270158 | Corbett, Jr. | Dec 2005 | A1 |
20050287036 | Eckels et al. | Dec 2005 | A1 |
20050288937 | Verdiramo | Dec 2005 | A1 |
20060000903 | Barry et al. | Jan 2006 | A1 |
20060015503 | Simons et al. | Jan 2006 | A1 |
20060017541 | Nguyen | Jan 2006 | A1 |
Number | Date | Country |
---|---|---|
9-126965 | May 1997 | JP |
WO 0146916 | Jun 2001 | WO |
WO 2004104559 | Dec 2004 | WO |
Number | Date | Country | |
---|---|---|---|
20070109134 A1 | May 2007 | US |
Number | Date | Country | |
---|---|---|---|
60723476 | Oct 2005 | US | |
60846509 | Sep 2006 | US |