Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
METHOD AND APPARATUS FOR MANAGING ADMISSION TO VENUES
Document Type and Number:
WIPO Patent Application WO/2007/074396
Kind Code:
A2
Abstract:
An admission token 10 has an auto-UTD tag 12 and an attaching device 14 secured thereto for attaching the device to a user. A method for controlling access to a venue includes recording, in an admission token, admission information pertaining to a venue; issuing the device to a user; and granting access to the venue to the user presenting the device bearing the information. A method for dispensing a toke 10 includes installing, verifying, and confirming the device. A method for granting access to a user wearing an admission token 10 includes inspecting the token, and if it is intact, removing it and granting access to the user. Another method for an admission token 10 that contains admission information specific to the user includes reading the information and determining whether the user should be admitted and, if so, admitting the user. An apparatus 84 for reading data from an light-powered tag 60 of a token includes a light source 82.

Inventors:
BERRY KEN (CA)
Application Number:
PCT/IB2006/003818
Publication Date:
July 05, 2007
Filing Date:
May 19, 2006
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
BERRY KEN (CA)
International Classes:
G06K19/067; G06K7/00; G06K19/077; G06Q30/00; G07C9/00
Foreign References:
US6809646B1
US20040091659A1
US6774799B1
US20040012496A1
Other References:
GARFINKEL S.L.: 'Adopting Fair Information Practices to Low Cost RFID Systems' PRESENTED AT UBIQUITOUS COMPUTING 2002 PRIVACY WORKSHOP, [Online] 2002, Retrieved from the Internet:
Download PDF:
Claims:

What is claimed is:

1. An admission token comprising:

an auto-UID unit; and

attaching device secured to the auto-UID unit for attaching the device to a user.

2. The device of claim 1 comprising an adhesive product that attaches the attaching device to the auto-UID unit.

3. The device of claim 2, wherein the attaching device comprises a loop member and wherein the adhesive product passes through the loop member.

4. The device of claim 3, wherein the adhesive product comprises a segment of adhesive tape that extends through the loop member, and wherein a first portion of the adhesive surface is secured to itself and a second portion of the adhesive surface is secured to the auto-UID unit.

5. The device of claim 4, wherein the second portion of the adhesive surface of the adhesive product looses its adhesive function at temperatures of about 60 °C and higher or at temperatures of about -4O 0 C and lower.

6. The device of claim 1, wherein the auto-UID unit comprises an internal circuit and wherein the attaching device comprises an external circuit loop connected to the internal circuit.

7. The device of claim 6, wherein the external circuit loop is connected to the internal circuit by a binding device.

8. The device of claim 1, wherein the auto-UID unit is a light-sensitive auto-UID unit.

9. The device of claim 8, further comprising a light-emitting readiness indicator.

10. The device of claim 1, wherein the auto-UID unit is disposed within a plastic compound.

11. A method for controlling access to a venue, comprising:

recording in an admission token admission information pertaining to a venue;

issuing the admission token to a user; and

granting access to the venue to the user when the user presents the admission token bearing the admission information.

12. The method of claim 11 , wherein the admission token comprises an auto-UTD.

13. The method of claim 11 , further comprising collecting the admission token from a user granted access to the venue.

14. The method of claim 11, further comprising changing the admission information after issuing the admission token to the user.

15. The method of claim 11 , comprising accepting from the user payment of an admission fee in exchange for recording the admission information on the admission token.

16. The method of claim 11 , comprising accepting payment of a multiple admission fee, and wherein the admission information indicates a plurality of future admissions; and wherein the method further comprises changing the admission information to reduce the future admissions to be granted to the user.

17. The method of claim 11 , comprising accepting payment of a multiple admission fee, and wherein the admission information indicates a plurality of future admissions; and wherein the admission token comprises an electronic memory; and wherein the admission information is recorded electronically; and wherein the method further comprises changing the admission information in the electronic memory to reduce the future admissions to be granted to the user.

18. The method of claim 11 , comprising collecting an admission token from a selecting a user, and issuing the admission token to a second user with admission information for the second user.

19. The method of claim 11 , wherein issuing the admission token comprises attaching the admission token to a user.

20. The method of claim 19, wherein granting access comprises inspecting the admission token and, if the admission token is intact, taking the admission token from the user and giving the user a rebate and, if the admission token is not intact, taking the admission token from the user without giving a rebate to that user.

21. The method of claim 19, wherein granting access comprises inspecting the admission token and, if the admission token is intact, taking the admission token from the user and granting admission to the user and, if the admission token is not intact, denying admission to that user.

22. The method of claim 11, wherein the auto-UID unit comprises an internal circuit and wherein the attaching device comprises an external circuit loop connected to the internal circuit, and wherein issuing the admission token comprises attaching the external circuit loop to a user.

23. A method for dispensing a admission token, comprising:

installing the admission token;

verifying the admission token; and

confirming the admission token.

24. The method of claim 23, further comprising electronically communicating the completion of installing, verifying and confirming the admission token to a computer.

25. A method for granting access to a venue to a user wearing an admission token, comprising:

inspecting the admission token, and if the admission token is intact, removing the admission token and granting access to the user.

26. A method for granting access to a venue to a user having an admission token that contains admission information specific to the user, comprising:

reading the admission information and determining from the admission information whether the user is entitled to admission and, if so, admitting the user to the venue.

27. The method of claim 26 further comprising determining from the admission information whether the user is due a refund and, if so, offering the refund.

28. The method of claim 26 further comprising determining from the admission information whether the user is entitled to admission in other venues and, if so, permitting the user to retain the admission token after being admitted to the venue.

29. The method of 26 further comprising keeping track of the number of venues to which the user has become entitled to admission, and discounting the price of a future admission to a venue based on the past admission fees paid.

30. A device for instiling an admission token, comprising:

a first installation mechanism for assembling and attaching the token to the user;

a second installation mechanism which verifies and confirms the token as valid for use; and

a control and communication mechanism for communicating installation and verification information to a main database.

31. The device of claim 30, further comprising a removal station.

32. The device of claim 31, wherein the removal station comprises a first removal mechanism for inspecting the auto-UID token; a second removal mechanism that is responsive to the first removal mechanism, for removing the token from the user; and a control and communication module.

33. A method for installing an admission token comprising: A device for instiling an admission token, comprising: assembling and attaching the token to the user; verifying and confirming the token as valid for use; and communicating installation and verification information to a main database.

34. A method for recycling an admission token, comprising:

receiving the admission token from a user for admission to a venue, and either (i) determining that the token entitles the user to future admissions, and allowing the user to keep the token, or (ii) offering a refund to the user in exchange for the token.

35. An improved electronic auto-UID tag, wherein the improvement comprises a light sensor for receiving light to power the function of the tag.

36. An improved apparatus for reading data from an admission token, the improvement comprising a light source for powering a light-sensitive admission token.

37. An auto-UID tag comprising an auto-UID device embedded in a plastic housing.

38. A method of making an auto-UID tag comprises embedding an auto-UID device in a plastic housing.

Description:

METHOD AND APPARATUS FOR MANAGINGADMISSION TO VENUES

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. provisional application number 60/682,483, filed May 19, 2005, which is incorporated herein by reference.

BACKGROUND OF THE INVENTION

[0001] This invention relates to controlling the entry of people and things to venues, as traditionally done, for example, by limiting admission to people who present a pre- purchased ticket for admission. Conventional admission tickets are not reused after a ticket holder has presented the ticket to gain admission to the venue.

SUMMARY

[0002] An admission token comprises an auto-UID unit and an attaching device secured to the auto-UID unit for attaching the device to a user.

[0003] According to one aspect, the device may comprise an adhesive product that attaches the attaching device to the auto-UID unit. Optionally, the attaching device may comprise a loop member and the adhesive product may pass through the loop member. In a particular embodiment, the adhesive product may comprise a segment of adhesive tape that extends through the loop member, and wherein a first portion of the adhesive surface is secured to itself and a second portion of the adhesive surface is secured to the auto-UID unit.

[0004] In another aspect, the auto-UID unit may comprise an internal circuit and the attaching device may comprise an external circuit loop connected to the internal circuit.

[0005] According to still another aspect, the auto-UID unit may comprise a light- sensitive auto-UID unit.

[0006] A method for controlling access to a venue comprises recording in an admission token admission information pertaining to a venue; issuing the admission token to a user; and granting access to the venue to the user when the user presents the admission token bearing the admission information.

[0007] According to one method aspect, the method may comprise accepting payment of a multiple admission fee, and wherein the admission information indicates a plurality of future admissions; and wherein the method further comprises changing the admission information to reduce the future admissions to be granted to the user.

[0008] According to another aspect, the method may comprise accepting payment of a multiple admission fee, and wherein the admission information indicates a plurality of future admissions; and wherein the admission token comprises an electronic memory; and wherein the admission information is recorded electronically; and wherein the method further comprises changing the admission information in the electronic memory to reduce the future admissions to be granted to the user.

[0009] According to still another aspect, the method may comprise collecting an admission token from a selecting a user, and issuing the admission token to a second user with admission information for the second user.

[0010] Optionally, issuing the admission token comprises attaching the admission token to a user.

[0011] A method for dispensing an admission token comprises installing the admission token; verifying the admission token; and confirming the admission token.

[0012] A method for granting access to a venue to a user wearing an admission token, comprises inspecting the admission token, and if the admission token is intact, removing the admission token and granting access to the user.

[0013] Another method for granting access to a venue to a user having an admission token that contains admission information specific to the user, comprises reading the admission information and determining from the admission information whether the user is entitled to admission and, if so, admitting the user to the venue.

[0014] An improved apparatus for reading data from an admission token comprises a light source for powering a light-sensitive admission token.

[0015] A device for installing an admission token comprises a first installation mechanism for assembling and attaching the token to the user; a second installation mechanism which verifies and confirms the token as valid for use; and a control and communication mechanism for communicating installation and verification information to a main database.

[0016] A method for recycling an admission token comprises receiving the admission token from a user for admission to a venue, and either (i) determining that the token entitles the user to future admissions, and allowing the user to keep the token, or (ii) offering a refund to the user in exchange for the token.

[0017] An improved electronic auto-UID tag comprises a light sensor for receiving light to power the function of the tag.

[0018] In one embodiment, an auto-UID tag comprises an auto-UID device embedded in a plastic housing.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

[0019] Referring now to the drawings wherein like parts are provided with like reference numerals throughout the several views,

[0020] Fig. IA is an elevation view of one particular embodiment of an admission token as described herein;

[0021] Fig. IB is an exploded view of the device of Fig. IA;

[0022] Fig. 2A is an elevation view of another embodiment of an admission token as described herein;

[0023] Fig. 2B is an exploded view of the device of Fig. 2A;

[0024] Fig. 3 A is an elevation view of one particular embodiment of an admission token as described herein;

[0025] Fig. 3B is a view of the device of Fig. 3A along line B-B;

[0026] Fig. 4 is a partly exploded, schemative view of one embodiment of an apparatus for installing and/or removing an admission token;

[0027] Fig. 5 A is an elevation view of still another embodiment of an admission token as described herein;

[0028] Fig. 5B is an schematic view of the device of Fig. 5 A and an apparatus for use therewith;

[0029] Fig. 6 A is a schematic view of a method for making a tag for use in a token as described herein; and

[0030] Fig. 6B is a schematic plan view of the tag made by the method of Fig. 6 A.

DETAILED DESCRIPTION

[0031] As described herein, auto-UTD device is adapted for use as an admission token (e.g., as an admission ticket or pass) to identify a user of the token in a secure manner. Some embodiments allow for the re-use of the token by another user at a later date. Auto-UTDs (Automatic Unique Identification products), include electronic auto-UTD's such as RFID tags, UHF tags, HF tags, LF tabs and IR transmitters, and nonelectronic auto VIDs such as linear bar codes and 2D matrix codes and the like and the readers that decipher the unique information carried by such devices. An electronic tag can be passive (powered by the RF field) or active (powered by a battery). RFID tags (Radio Frequency Identification tags) are electronic devices that allow for radio frequency communication with a reader. UHF Tags (Ultra high frequency tags) are RFIDs that operate in the 800 to 5800 megahertz range. HF Tags (High frequency tags are RFIDs that operate at around 13.5 megahertz. LF Tags (Low frequency tags) are of RFIDs that operate in the Kilohertz range. The user may be a person or an object whose entry to a venue is to be managed. When the description herein refers to actions taken by a user, it will be understood that the action may be performed by a person on his or her own behalf as the user, or on behalf of an object with which the token is associated. Managing entry to a venue encompasses electing to allow or deny access to the venue, or monitoring the user's entry to the venue.

[0032] The admission token is recyclable, secure and tamperproof or tamper-evident and is suitable for the use as a token in a variety of venues, such as ski areas, concert halls, recreational facilities and any other area or building that requires recyclable, secure and tamperproof passes or tickets for public access. The admission token may also be used to secure movement of goods.

[0033] Admission token 10, shown in Figs. IA and IB is designed to offer low cost per use of auto-UID technology. This allows for the user to have use of the token and return the token for refund at a later time and at the discretion of the issuer of the token, either through an automated terminal or with an authorized user who will recover the auto-UID product and reimburse the user for the token.

[0034] Token 10 comprises an auto-UID tag 12 with an attaching device 14 secured thereto by way of an adhesive product 16 in such a way that the user will not be able to remove the tag 12 from the attaching device 14 without damaging the adhesive product 16. The adhesive product 16 thus serves as a security feature that makes a user's tampering with token 10 evident. The attaching device 14 to which tag 12 will be joined, will first be attached to the user by way of the user's clothing for instance, such as a belt buckle, zipper or simply pierced through the clothing, and then the adhesive product 16 will be used to attach the tag 12 to the attaching device 14 in a manner that is not removable without tampering with the adhesive product 16. Attachment device 14 has an opening 18 that will be used to allow for inserting the device into any part of clothing of the user, as mentioned above. When the adhesive product 16 is applied to the tag 12, it will seal the opening and create the secure attachment between the tag 12 and the user's clothing.

[0035] Alternatively, the tag 12 can simply be attached with a wire or cord type device (similar to the embodiment of Figure 3 A and 3B) that wraps around the user's wrist or other part of the body in such a way that it cannot remove from the user unless cut or damaged. The wire or cord will then be attached using a single use binding device that once removed cannot be reused.

[0036] Tampering with the token 10 will not affect the operation of the token, but will simply make the user become the owner of the token for instance, if so desired by the issuer of the token under their own terms of use for the token. It would also permit the issuer of the token to refuse rights granted by the terms of the original transaction involving the token user, if tampering is detected by the issuer or its representatives.

[0037] In one embodiment, adhesive product 16 maybe a piece of adhesive tape having an adhesive layer a backing material. The adhesive layer may comprise a hot-melt adhesive composition, a pressure-sensitive adhesive composition, or any other suitable type of adhesive. The adhesive product 16 that bonds the tag 12 to the attaching device 14, is designed to be used in any environmental conditions, for instance from -40 degrees C to +60 degrees C. The adhesive layer may have zones in which adhesive compositions of different characteristics may be applied. For example, there may be a first zone 16a and an optionally bifurcated second zone 16b. The adhesive composition in zone 16b may be temperature-

sensitive (e.g., a hot melt adhesive) that will release at temperature above 60°C or below -40 °C for instance, in order to free the token from the attaching device 14. The adhesive in zone 16a may optionally provide a more durable bond to increase the tamperproof aspect of the adhesive product 16.

[0038] In another embodiment, the features described above with reference to Figures IA and IB can be provided with a second level of security when required by the issuer of the token. For example, referring to Figures 2A and 2B, a token 20 may comprise an adhesive product 16 that includes printed lines 22 that will be aligned in such a way during installation to allow for visual inspection of the alignment of the lines. Lines 22 can be used by automated inspection or by an attendant who can visually inspect the token 20 to verify if the user has tampered with the attaching device 14. When aligned properly, this also indicates that the adhesive product 16 has been installed properly.

[0039] In another embodiment a token comprising an electronic tag may use an external electrical circuit that assure a tamperproof operation, while allowing for removal and recycling of the token from the user. This product uses a further level of security, while maintaining its recyclable capacity. For example, in token 30 shown in Fig. 3 A and 3B, an external circuit 32 is attached to the electronic tag 34 to allow the internal operation of the electronic tag 34 to operate correctly, for example, to emit its UID information electronically upon request, via an embedded two-way communication circuit and antenna 39.

[0040] The external circuit 32 is attached to the tag 34 by a clamping device that is both secure and tamper-evident or tamperproof and that assures the electrical connection with the tag 34. An internal electrical circuit of tag 34 is broken at attachment area 36 where circuit contacts are accessible to the external circuit 32. If the external circuit 32 is not present or is damaged, the token will not operate. When the external circuit 32 is attached to tag 34, optionally by a single-use binding device 38, it makes contact with the electrical contacts of the internal circuit of tag 34 so it closes the internal circuit that allows for the operation of the token 30.

[0041] The external circuit 32 is strong enough to withstand normal use, but when damaged by tampering or otherwise, cannot easily be repaired. In order to achieve this, the

external circuit will be constructed with two layers at a minimum, one outer layer that gives the external circuit strength and an inner layer that is the conductive part of the circuit.

[0042] When the external circuit 32 is attached to the user and in order to become secure, the external circuit is attached around a user's part of the body such as the wrist, waist or ankle for instance, in such a way that when secured to the tag 34 by the attachment area 36, it cannot be removed from the user without damaging the external circuit.

[0043] A single use binding device 38 keeps the external circuit operably connected to tag 34. Device 38, once removed, cannot be reused. However, the binding device 38 can be replaced by the issuer of token 30 at its discretion.

[0044] In other embodiments an electronic auto-UID token can be attached to and/or removed from a user can be accomplished in two ways: by an attendant authorized by the pass or ticket issuer or by automated machines that function to install or remove a token B, or both install the token and/or remove the token.

[0045] One embodiment of a machine that performs both functions is shown in Fig. 4. Machine 40 that incorporates several options in order to install and verify an auto-UTD token. The machine 40 includes a first station 42 for installing an auto-UID token in an automated method.

[0046] Installation station 42 includes a first installation mechanism 44 for assembling and attaching the token to the user with either of the options described with reference to Figs.l - 3. There is also a second installation mechanism 46 which verifies and confirms the token as valid for use by the user, as per the terms of the issuer of the token. The confirmation will be determined by either an automated visual inspection of the token and its attachment to the user or through the testing of the functioning of the token with the higher security level as described with reference to Figures 1-3. There may also be a control and communication mechanism 48 which will communicate the installation and verification information to a main database.

[0047] Machine 40 also has a removal station 50 for the token. Station 50 may include several options in order to remove and verify in a secure and tamperproof method the

auto-UID token. Station 50 includes a first removal mechanism 52 to inspect the auto-UID token in an automated method, by verifying the token attached to the user with either of the options described with reference to Figures 1-3. The inspection will be done by an automated visual system and/or an electrical testing method in order to determine if the token has been tampered with.

[0048] If the token is deemed to be attached to the user in a proper manner, with respect to the terms of the token issuer, then the token will be removed by second removal mechanism 54 in a safe and secure method. For example, one removal method comprises heating part of a temperature-sensitive adhesive product of a heating device to its release temperature. The method for removal will depend on the type of token attachment

[0049] The control and communication module 56 will authorize a reimbursement in the case of a token that is eligible, based on the terms and conditions of the issuer.

[0050] Embodiments include the business process of using recyclable passes or tickets for public access venues.

[0051] Tokens as described herein may be recycled. The recycling process may pertain to the use of auto-UID technology in all its forms, including RFID, Linear Bar Codes, 2D matrix codes as well as any later-developed technology for auto-UID that can be used for tokens as described herein. The process allows issuers of the token to recycle the token by offering a refund at the end of the event or let the user keep the token for future use at the same venue or expand another venue.

[0052] The auto-UID token can be used to offer discounts to repeat users because of cost savings involved in recycling the token, if so desired by the issuer. The discount can escalate with the increasing number of events or venues that the user wishes to access with the token.

[0053] Another embodiment of a token is designed to resolve one of the issues facing existing RFID tags as they are manufactured today. When using long range UHF tags in the 800 MHZ range or higher, it is difficult to aim the reader and try and read only one tag, if there are multiple tags in the range of the reader or if the RF signal bounces off of metal

objects for instance and reads the wrong tag. This type of tag is used in warehouse applications among others, but can apply in a large variety of applications. In the case of HF or LF type RFID tags, it can be used to increase the range by providing an external source of energy to the operation of the tag, so it becomes semi-active.

[0054] Referring to Figure 5 A, one example of a tag 60 for use in or as a token according to this embodiment includes an RFID or other electronic auto-UID device and an optically directed light receptor 62 that permits the operation of the tag when a certain quantity and frequency of light is directed at the location of the light receptor on the tag. The light source can be a laser or other directed light signal in order to prevent cross talk of the light signal to another tag that is close by. Once the light receiving conductor has received sufficient quantity of light at the proper frequency, it will allow the RF or other electronic circuit 64 of the tag 60 to function by providing via energy for the operation of the device by way of the connections 66.

[0055] As an option, tag 60 includes a light emitter 68 such as an LED to indicate that it is ready to be read by the RF signal or other type of communication methodology. The power source for emitter 66 may be receptor 62, through the power connections 70.

[0056] Optionally, the auto-UTD tag 60 may function without the extra power provided by the receptor, but its range would be reduced.

[0057] Figure 5B shows a device 80 that includes a light source 82 that directs light 86 at the tag 60. The light source 82 activates the tag and allows it to function. Device 80 also includes a reader 84 capable of reading data from tag 60. Source 82 emits the specific frequency and intensity of light required to activate tag 60. Source 82 can be incorporated into any reader 84 that exists or will exist that is designed to read auto-UTD tags, including RFID or other electronic means of communicating data from a remote tag.

[0058] In one embodiment shown in Fig. 6, a tag 90 is flexible, durable and readable. Referring to Figure 6, the basic concept is to embed an auto-UID circuit 92 in a plastic housing 94 directly, in order to create maximum flexibility along with protecting the operating components of the auto-UID tag. This may be accomplished in a process similar to injection molding, except that the auto-UID tag will be inside the injection cavity of the mold

96 when the plastic is injected into the cavity. The thickness 98 of the housing 94 may be about 0.3mm (about 0.015 inches) to about 2mm (about 0.05 inches). The end result will be complete unit that is both flexible and durable, with a smooth surface that will permit printing. The finished surface will be smooth enough to accept Die Sublimation type printing without defects or missing print area.

[0059] The shape of the final product can vary to accommodate a particular application, if so required. This means the surface area can be square, rounded, rectangular, or any other shape that suites the needs of the application. The injection die will simply determine the shape of the final product.

[0060] The terms "first," "second," and the like, herein do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. The terms "a" and "an" herein do not denote a limitation of quantity, but rather denote the presence of at least one of the referenced item. The conjunction term "and/or" indicates that the terms so conjoined are meant individually, or in combination, or both.

[0061] Although the invention has been described with reference to particular embodiments thereof, it will be understood by one of ordinary skill in the art, upon a reading and understanding of the foregoing disclosure, that numerous variations and alterations to the disclosed embodiments will fall within the spirit and scope of this invention and of the appended claims.