The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located adjacent to a venue entrance. A computer system is coupled to the scanner. The computer system is configured to receive a coded user identifica
The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located adjacent to a venue entrance. A computer system is coupled to the scanner. The computer system is configured to receive a coded user identification data scanned from an admission ticket from a ticket bearer via the scanner, decode the coded user identification data, and transmit the decoded user identification to a terminal for display to a gate keeper so that the gate keeper can determine whether the ticket bearer is to be admitted. An optional turnstile is coupled to the computer system, wherein the computer system enables the turnstile rotation.
대표청구항▼
1. An access control system, comprising: at least one system configured to:receive over a network a request from a user for a plurality of access permits for an event, wherein the plurality of access permits are associated with respective different seats;receive from the user user-specified allocati
1. An access control system, comprising: at least one system configured to:receive over a network a request from a user for a plurality of access permits for an event, wherein the plurality of access permits are associated with respective different seats;receive from the user user-specified allocations of the plurality of access permits to respective intended recipients including an allocation of an access permit to the user;enable the user to transfer one or more access permits in the plurality of access permits, and inhibit transfer by the user of the access permit allocated to the user;a scanner located adjacent to a venue entrance; anda computer system coupled to the scanner, the computer system configured to:receive coded user identification data scanned from an event admission token for a ticketed event from a token bearer via the scanner, wherein the admission token includes information identifying the ticketed event, andwherein the coded user identification data includes a reference to a record stored in a database that stores an identification code from the token bearer's driver license, credit card, passport, or state identification card;decode the coded user identification data,use the user identification data to access from the database the identification code from the token bearer's driver license, credit card, passport, or state identification card;receive coded information, scanned from the admission token for the ticketed event, including a unique event ticket identifier;transmit the identification code of the token bearer's driver license, credit card, passport, or state identification card and an indication as to whether the admission token is valid for the ticketed event to a terminal for display to a gate keeper so that the gate keeper can determine whether the token bearer is to be admitted. 2. The access control system as defined in claim 1, wherein the access control system is configured to determine whether the token bearer is to be admitted, without requiring biometric information to be electronically scanned from the token bearer. 3. The access control system as defined in claim 1, further comprising an access control barrier coupled to the computer system. 4. The access control system as defined in claim 1, further comprising: a ticketing server;an account manager;a credit card authorization system; andand a router. 5. The access control system as defined in claim 1, wherein the coded user identification data includes an encrypted unique identifier. 6. The access control system as defined in claim 5, wherein the access control system is configured to perform a decryption process on the encrypted user identification data. 7. The access control system as defined in claim 1, wherein the computer system is configured to decode the coded user identification data by using the coded user identification data to locate a corresponding user identifier from a database. 8. The access control system as defined in claim 1, wherein the computer system is configured to: receive user identification data scanned from an identification document separate from the access token;compare the scanned identification document user identification data with the coded or decoded identification data; andbased at least in part on the result of the comparison and on the user identification data, determine whether the token bearer is to be admitted. 9. The access control system as defined in claim 8, wherein the identification document is a driver license, a credit card, a passport, or a state identification card. 10. The access control system as defined in claim 8, wherein the identification document stores the user identification data in a magnetic stripe, an RFID tag, and/or a hologram. 11. A method of controlling access using a computer-based access control system, the method comprising: receiving from a user terminal over a network at the access control system a request from a user for a plurality of access permits for an event, wherein the plurality of access permits are associated with respective different seats;providing a user interface via which the user can specify which access permit, associated with a respective identified seat, in the plurality of access permits is to be allocated to which intended recipient, and which access permit, associated with a respective identified seat, is to be allocated to the user;providing from the access control system over the network to the user terminal a request that the user provide identification information for the intended recipients of the access permits;receiving from the user at the access control system user specified allocations of the plurality of access permits to the respective intended recipients and to the user; andenabling the user to transfer one or more access permits in the plurality of access permits, and inhibiting transfer by the user of the access permit allocated to the user. 12. The method as defined in claim 11, wherein the user is requested to provide for the intended recipients corresponding government issued identifiers. 13. The method as defined in claim 11, wherein the user is requested to provide for the intended recipients corresponding government issued identifiers and/or an identifier associated with corresponding intended recipients financial instruments. 14. The method as defined in claim 11, wherein the user is requested to provide for the intended recipients corresponding copies of physical identification instruments. 15. The method as defined in claim 11, wherein the user is requested to provide for the intended recipients corresponding images of identification instruments. 16. The method as defined in claim 11, wherein the user is requested to provide biometric identifiers for the intended recipients. 17. The method as defined in claim 11, the method further comprising providing the access permits to the user and/or the other intended recipients of the access permits, wherein the access permits have a corresponding intended recipient identifier provided thereon. 18. The method as defined in claim 11, the method further comprising providing access permits to the user and/or at least a portion of the other intended recipients of the access permits, wherein the access permits have a corresponding intended recipient machine readable identifier. 19. The method as defined in claim 13, wherein the corresponding intended recipient identifier includes a corresponding recipient's name, and/or a corresponding identifier from a government document and/or a financial instrument. 20. The method as defined in claim 19, wherein the corresponding recipient identifier includes at least a portion of a passport number, at least a portion of a driver license number, and/or at least a portion of an identification card number. 21. The method as defined in claim 19, wherein the financial instrument is a credit card or a debit card. 22. The method as defined in claim 13, wherein the corresponding intended recipient identifier is provided via at least one access permit in encrypted form. 23. The method as defined in claim 13, wherein the corresponding intended recipient identifier is provided via at least one access permit in barcode form. 24. The method as defined in claim 11, wherein the user is permitted to transfer a first number of access permits originally assigned to the user to others within a specified time period. 25. The method as defined in claim 11, wherein the user is authorized to transfer at least one access permit within a designated period of time. 26. The method as defined in claim 25, wherein the designated period of time is a designated period of time related to when the at least one access permit is provided to the user, wherein the user is permitted to transfer the at least one access permit after a predetermined first time period has elapsed, but not before the predetermined first time period has elapsed. 27. The method as defined in claim 25, wherein the designated period of time is a designated period of time related to a start date for an event for which the at least one access permit grants admittance. 28. The method as defined in claim 11, wherein the user is not authorized to transfer the right to use at least one of the plurality of requested access permits, but at least one other intended recipient is authorized to transfer at least one of the plurality of requested access permits. 29. The method as defined in claim 11, wherein a first of the intended recipients is authorized to transfer at least one access permit via the access control system. 30. The method as defined in claim 29, wherein the first intended recipient is requested to provide identification of a party to whom the at least one access permit is being transferred to. 31. The method as defined in claim 29, wherein the first intended recipient is requested to provide contact information of a party to whom the at least one access permit is being transferred to. 32. The method as defined in claim 29, wherein the first intended recipient is requested to provide an email address of a party to whom the at least one access permit is being transferred to. 33. The method as defined in claim 29, wherein the first intended recipient posts the at least one access permit for sale via the access control system. 34. The method as defined in claim 29, the method further comprising: receiving a request from the first intended recipient to post the at least one access permit for sale for a first price;determining if the at least one access permit for sale is eligible for resale; andat least partly in response to determining that the at least one access permit for sale is eligible for resale, posting the at least one access permit for sale. 35. The method as defined in claim 11, the method further comprising requesting the purchaser to provide contact information, including at least an address, for the intended recipients. 36. The method as defined in claim 35, the method further comprising providing at least one access permit directly to at least one of the intended recipients without first providing the at least one access permit to the user. 37. The method as defined in claim 11, wherein at least one of the plurality of access permits is provided as a physical, hardcopy ticket. 38. The method as defined in claim 11, wherein at least one of the plurality of access permits is transmitted over a network to at least one of the intended recipients. 39. The method as defined in claim 11, wherein at least one of the plurality of access permits is downloadable by at least one of the intended recipients. 40. The method as defined in claim 11, wherein at least one of the plurality of access permits is transmitted to a mobile telecommunications device associated with a intended recipient. 41. The method as defined in claim 11, the method further comprising: determining if at least a first of the intended recipients is identified in a watch database; andif the first intended recipient is identified in the watch database, providing a notification to a government entity. 42. The method as defined in claim 41, wherein the notification is automatically provided to the government entity via an electronic message. 43. The method as defined in claim 41, wherein the notification includes identification information related to the first intended recipient and information regarding an event for which the requested access permits are intended for. 44. The method as defined in claim 11, the method further comprising: determining if at least a first of the intended recipients is identified in a watch database; andif the first intended recipient is identified in the watch database, not issuing an access permit for the first intended recipient. 45. The method as defined in claim 11, the method further comprising: determining if at least a first of the intended recipients is identified in a watch database; andif the first intended recipient is identified in the watch database, inhibiting entry of the first intended recipient to a first event. 46. The method as defined in claim 11, the method further comprising storing access permit inventory information for a first event, the inventory information including information regarding sales of access permits. 47. The method as defined in claim 11, the method further comprising providing a user interface to the user via which the user can indicate whether a first intended recipient of a first access permit is allowed to transfer the first access permit to another via the access control system. 48. The method as defined in claim 11, the method further comprising providing a user interface to the user via which the user can indicate whether a first intended recipient of a first access permit is to be notified that the user will not transfer the first access permit to another via the access control system. 49. A method of controlling access using a computer-based access control system, the method comprising: receiving from a user terminal over a network at the access control system a request from a first user for the purchase of a plurality of access permits;providing from the access control system over the network to the user terminal a request that the user provide contact information for at least a second user to whom a first of the plurality of access permits is to be provided;using the contact information to contact the second user with a request for one or more types of identification, wherein the one or more types of identification include at least one of a government issued identifier, a credit card, or biometric information; andat least partly in response to receiving the requested identification corresponding to at least one of the one or more types of identification, for the second user from the second user, providing a first access permit with a unique identifier related to the second user, wherein the unique identifier is machine readable and/or human readable,wherein the first user is permitted to transfer a second access permit originally assigned to the first user to others within a specified time period and is not authorized to transfer the second access permit outside of the specified time period. 50. The method as defined in claim 49, wherein the second user is requested to provide a government issued identifier. 51. The method as defined in claim 49, the method further comprising storing the received requested identification in memory, wherein the received requested identification includes a driver license number, a government issued identification card number, a social security number and/or a passport number. 52. The method as defined in claim 49, the method further comprising storing the received requested identification in memory, wherein the received requested identification includes a financial instrument number. 53. The method as defined in claim 49, wherein the second user is requested to provide a copy of a physical identification instrument. 54. The method as defined in claim 49, wherein the received identification includes an image received over the network. 55. The method as defined in claim 49, wherein the received identification includes a biometric identifier. 56. The method as defined in claim 49, wherein the unique identifier includes a barcode. 57. The method as defined in claim 49, wherein the unique identifier is magnetically stored on the first access permit. 58. The method as defined in claim 49, wherein the first access permit is electronically stored in a smart card. 59. The method as defined in claim 49, wherein the first access permit is electronically stored in a mobile phone. 60. The method as defined in claim 49, wherein the first access permit is provided as a physical ticket. 61. The method as defined in claim 49, wherein the first access permit is emailed to the second user using the contact information. 62. The method as defined in claim 49, wherein the first access permit is emailed to the second user. 63. The method as defined in claim 49, wherein the unique identifier is readable by a camera, an optical scanner, and/or a magnetic reader. 64. The method as defined in claim 49, wherein the unique identifier is encrypted. 65. The method as defined in claim 64, the method further comprising: receiving from a reader located at a venue a reading of the unique identifier for the first access permit;decrypting the unique identifier; andcausing the decrypted unique identifier to be displayed to an access control person so that the access control person can compare the decrypted unique identifier with physical media presented by the user that contains an un-encrypted version of the unique identifier. 66. The method as defined in claim 49, wherein the designated period of time is a designated period of time related to when the second access permit is provided to the user. 67. The method as defined in claim 49, wherein the designated period of time is a designated period of time related to a start date for an event for which the second access permit grants admittance. 68. The method as defined in claim 49, wherein the first user is not authorized to transfer the right to use a second access permit, but the second user is authorized to transfer the first access permit. 69. The method as defined in claim 49, wherein at least partly in response to receiving a request from the second user to transfer the first access permit to a third user, requesting the second user to provide contact information to the third user. 70. The method as defined in claim 49, wherein the second user posts the first access permit for sale via the access control system. 71. The method as defined in claim 49, the method further comprising providing the first access permit directly to the second user without first providing the first access permit to the first user. 72. The method as defined in claim 49, the method further comprising: determining if the second user is identified in a watch database; andif the second user is identified in the watch database, providing a notification to a government entity. 73. The method as defined in claim 72, wherein the notification is automatically provided to the government entity via an electronic message. 74. The method as defined in claim 72, wherein the notification includes identification information related to the second user and information regarding an event for which the requested access permits are intended for. 75. The method as defined in claim 49, the method further comprising: determining if the second user is identified in a watch database; andif the second user is identified in the watch database, not issuing an access permit for the second user. 76. The method as defined in claim 49, the method further comprising: determining if the second user is identified in a watch database; andif the second user is identified in the watch database, inhibiting entry of the second user to a first event. 77. The method as defined in claim 49, the method further comprising providing a user interface to the first user via which the first user can indicate whether the second user is allowed to transfer the first access permit to another via the access control system. 78. The method as defined in claim 49, the method further comprising providing a user interface to the first user via which the first user can indicate whether the second user is to be notified that the first user will not transfer the first access permit to another via the access control system. 79. The method as defined in claim 49, wherein the first user purchases the first access permit for the second user.
연구과제 타임라인
LOADING...
LOADING...
LOADING...
LOADING...
LOADING...
이 특허에 인용된 특허 (156)
Graveline,Marc; Viney,Ulf; Masson,Matt, Access control list checking.
Smith Barry Craig ; Balakrishnan Vinod ; Green Richard Wenman Pennefather, Apparatus and method of allocating flight inventory resources based on the current market value.
Lupien William A. (La Canada ; Flintridge CA) McCormack John P. (West Boxford MA) Schulman H. E. C. (Boston MA), Automated system for providing liquidity to securities markets.
Ahlstrom Mark L. (Minneapolis MN) Keller Bruce A. (Vadnais Heights MN) Storch Randy S. (Chicago IL), Computer reservation system with means to rank travel itineraries chosen in terms of schedule/fare data.
Salmon Bardwell C. (Weston MA) Borgman John D. (Acton MA) Holtey Thomas O. (Newton MA), Computer-assisted system for interactively brokering goods or services between buyers and sellers.
Rose Marshall T. ; Stein Lee H. ; Borenstein Nathaniel S. ; Lowery Carlyn M. ; New Darren ; Stefferud Einar, Computerized payment system for purchasing goods and services on the internet.
Stein Lee H. ; Stefferud Einar A. ; Borenstein Nathaniel S. ; Rose Marshall T., Computerized system for facilitating transactions between parties on the internet using e-mail.
Stein Lee H. ; Stefferud Einar A. ; Borenstein Nathaniel S. ; Rose Marshall T., Computerized system for making payments and authenticating transactions over the internet.
Walker Jay S. ; Lech Robert R. ; Van Luchene Andrew S. ; Sparico Thomas M. ; Jorasch James A. ; Schneier Bruce, Conditional purchase offer management system for event tickets.
Trippe Kenneth A. B. (P.O Box 5915 ; Ponce De Leon Blvd. ; Suite 16 Coral Gables FL 33146) Edgar Peter M. (P.O Box 5915 ; Ponce De Leon Blvd. ; Suite 16 Coral Gables FL 33146) Vollrath David (3085 Av, Cruise information and booking data processing system.
Berent Thomas Gerard ; Hurst Dennis Wayne ; Patton Thomas Edward ; Tabernik Ty J. ; Warpool Julie Elizabeth ; Reig Donald C. ; Whittle William Howard, Electronic on-line motor vehicle auction and information system.
Swonger Claron W. (Elma NY) Bowers Dan M. (Fairfield CT) Stock Robert M. (Severna Park MD), Fingerprint-based access control and identification apparatus.
Fraser Richard (10 Glen Avon Dr. Riverside CT 06878), Interactive computer system to match buyers and sellers of real estate, businesses and other property using the internet.
Fraser Alexander G. (Bernardsville NJ) Perea Carlos A. (Somerset NJ) Weber Roy P. (Bridgewater NJ), Mediation of transactions by a communications system.
Walker Jay S. ; Schneier Bruce ; Jorasch James A., Method and apparatus for a cryptographically assisted commercial network system designed to facilitate buyer-driven cond.
Gobburu, Venkata T.; Narayanan, Krishnakumar; Challa, Nagesh; Gannage, Michel E., Method and apparatus for acquiring, maintaining, and using information to be communicated in bar code form with a mobile communications device.
Griffin Gene R. (Crofton MD) Stoll Sheryl K. (Severn MD) LaBarge Ralph S. (Gambrills MD) Seltzer Martin J. (Oyster Bay NY), Method and apparatus for providing travel destination information and making travel reservations.
Alaia Marc ; Becker David J. ; Bernard Anthony F. ; Heckmann Daniel C. ; Kinney ; Jr. Sam E. ; Meakem Glen T. ; Rago Vincent F. ; Reneau Jason ; Roberts Frederick W. ; Rupp William D. ; Stevens Rober, Method and system for controlling closing times of electronic auctions involving multiple lots.
Campbell Gregory L. ; Phillips Robert L. ; Zimmerman Jon P.,GBX ; Saleh Richard A.,GBX ; Grimes Richard C. ; Beskow Stefan L., Method and system for determining marginal values for use in a revenue management system.
Charuk,James Michael; Capper,Russell Neill; Jumper,Samuel Waldon; Cafferky,Sean Allan, Method and system for managing real property transactions having internet access and control.
Brown,Michael Wayne; Dutta,Rabindranath; Paolini,Michael A., Method, system, and program for providing information on proximate events based on current location and user availability.
Husemann Dirk,CHX ; Kaiserwerth Matthias, Smart card mechanism and method for obtaining electronic tickets for goods services over an open communications link.
Jay S. Walker ; Sanjay K. Jindal ; Bruce Schneier ; Toby Weir-Jones, System and method for managing third-party input to a conditional purchase offer (CPO).
Donner,Irah H.; Donner,Zachary J.; Donner,Jason J., System and method for reallocating and/or upgrading and/or selling tickets, other even admittance means, goods and/or services.
Hunter, Charles Eric; Ballou, Jr., Bernard L.; Summer, Robert D.; Sparks, Kelly C.; Sykes, Ollin B.; Hebrank, John H., System and method permitting customers to order products from multiple participating merchants.
Merrill William E. (Houston TX) Rhebergen John A. (Houston TX) Delgado Robert (Houston TX), System for displaying selected assembly-facility seating views.
Challa, Nagesh; Gobburu, Venkata T., System, method and apparatus for communicating information between a mobile communications device and a bar code reader.
Challa, Nagesh; Gobburu, Venkata T.; Gannage, Michel E., System, method, and apparatus for communicating information encoded in a light-based signal using a fob device.
McKenna William J. (Barrington IL) Silvers Kenneth W. (Frankfort IL) Nickerson Rand B. (Scarborough CAX) Welsh Russell J. (Toronto NJ CAX) Walker Harold R. (Edison NJ) Cullity Joseph A. (Jersey City , Television and market research data collection system and method.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device identifiers to enhance security.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device identifiers to enhance security.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device identifiers to enhance security.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, System and method for using unique device indentifiers to enhance security.
Levin, Samuel; Scarborough, David; Du, Fengpei; DiStefano, Richard; Denker, Dennis; Moriarty, Sean; Plamondon, Charles; Siegel, Matthew; Marti, Benjamin, Systems and methods for using unique device identifiers to enhance security.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.