CA2624657A1 - Visitor control and tracking system - Google Patents
Visitor control and tracking system Download PDFInfo
- Publication number
- CA2624657A1 CA2624657A1 CA002624657A CA2624657A CA2624657A1 CA 2624657 A1 CA2624657 A1 CA 2624657A1 CA 002624657 A CA002624657 A CA 002624657A CA 2624657 A CA2624657 A CA 2624657A CA 2624657 A1 CA2624657 A1 CA 2624657A1
- Authority
- CA
- Canada
- Prior art keywords
- visitor
- venue
- visitors
- destination points
- tracking system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C11/00—Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/28—Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19608—Tracking movement of a target, e.g. by detecting an object predefined as a target, using target direction and or velocity to predict its new position
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19639—Details of the system layout
- G08B13/19645—Multiple cameras, each having view on one of a plurality of scenes, e.g. multiple cameras for multi-room surveillance or for tracking an object by view hand-over
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19665—Details related to the storage of video surveillance data
- G08B13/19671—Addition of non-video data, i.e. metadata, to video stream
- G08B13/19673—Addition of time stamp, i.e. time metadata, to video stream
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19697—Arrangements wherein non-video detectors generate an alarm themselves
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2454—Checking of authorisation of a person accessing tagged items in an EAS system
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
- G08B13/24—Electrical actuation by interference with electromagnetic field distribution
- G08B13/2402—Electronic Article Surveillance [EAS], i.e. systems using tags for detecting removal of a tagged item from a secure area, e.g. tags for detecting shoplifting
- G08B13/2451—Specific applications combined with EAS
- G08B13/2462—Asset location systems combined with EAS
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/22—Status alarms responsive to presence or absence of persons
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B31/00—Predictive alarm systems characterised by extrapolation or other computation using updated historic data
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C11/00—Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere
- G07C2011/02—Arrangements, systems or apparatus for checking, e.g. the occurrence of a condition, not provided for elsewhere related to amusement parks
Abstract
A visitor control and tracking system for a venue (4) having various access points (6, 7) and multiple destination points (Z1-Z4) includes a monitoring system (120) that tracks location and movement of visitors to the venue (4).
Prior to entering the venue (4), visitors first interact with one of a plurality of screening centers (40) which performs a security scan. A
controller (130) operatively connected to the plurality of screening centers (40) determines a visitor associated metric for each of the plurality of destination points (Z1-Z4). Once the controller (130) determines the visitor associated metric, information is provided to the visitors that will help guide them about the venue (4). The information can be provided on a display (79) provided on each of the plurality of screening centers (40) and/or on displays (150 a-j) provided about the venue (4).
Prior to entering the venue (4), visitors first interact with one of a plurality of screening centers (40) which performs a security scan. A
controller (130) operatively connected to the plurality of screening centers (40) determines a visitor associated metric for each of the plurality of destination points (Z1-Z4). Once the controller (130) determines the visitor associated metric, information is provided to the visitors that will help guide them about the venue (4). The information can be provided on a display (79) provided on each of the plurality of screening centers (40) and/or on displays (150 a-j) provided about the venue (4).
Description
VISITOR CONTROL AND TRACKING SYSTEM
BACKGROUND OF THE INVENTION
1. Field of the Invention The present invention pertains to the art of visitor control and tracking systems and, more particularly, to a visitor control and tracking system for a venue that monitors and guides visitors from one of a plurality of access points towards one or more destination points.
BACKGROUND OF THE INVENTION
1. Field of the Invention The present invention pertains to the art of visitor control and tracking systems and, more particularly, to a visitor control and tracking system for a venue that monitors and guides visitors from one of a plurality of access points towards one or more destination points.
2. Discussion of the Prior A.rt As population centers continue to grow and as the number of users io of public transportation increases, it is important to monitor and control the flow of people moving fiom one location to another, particularly during time of heightened security. Large venues having multiple access z points and multiple internal destinations, such as amusement parks, fairgrounds, historical sites, community parks and the like, can benefit from crowd control and monitoring. For example, monitoring the flow of people in a rail station enables individuals to be directed toward areas of s the station that are less crowded and to a desired platform without getting lost thereby increasing their chances of finding, for example, a train or rail car without the need for a prolonged wait.
Amusement parks, fairgrounds, historical sites and the like would also benefit from crowd control and monitoring devices. Visitors io entering amusement parks typically head to a favorite area without knowledge or regard for how crowded that area may be. If the visitor is provided with real-time information regarding each potential destination in the park, the visitor could opt to head to less crowded areas, or toward areas where the flow of visitors is moving quickly and lines are shorter.
15 In this manner, the visitor's overall experience at the venue is positive, which leads to an increase in the likelihood of a return visit.
In addition to frustration that large crowds can generate, large uncontrolled crowds are an attractive target for terrorists. Terrorists use large crow.ds as cover for carrying out various attacks on civilian 20 populations. The crowds themselves offer an attractive target for terrorists. During prior attacks in London and Barcelona, terrorists hid among crowds trying to board trains and plant bombs which, when detonated, resulted in deaths and injury of numerous civilians. At present, security in many transportation hubs and large venues is 25 primarily passive. That is, many transportation hubs and other large venues simply employ cameras to monitor people waiting for trains or moving about a theme park towards various attractions. Many facilities also employ security personnel, both uniformed and undercover, that mingle with the crowds and which are ready to respond as necessary to emergency situations.
Unfortunately, large crowds often make it difficult to properly monitor all situations and areas.. Actually, many terrorists watch the monitors in order to determine how security personal respond to various situations. That is, the terrorists seek out established patterns in responses. Once any patterns in the responses can be determined, plans 1o are adjusted to compensate for the probable response in order to increase the likelihood of success of any planned event. By providing security personnel with real-time monitoring of crowd flow, randomized responses to various security threats can be developed that will thwart potential terrorists. In venues that employ security screening, individuals failing the screening process can often times get lost in the crowds before security personnel can respond. Also, without proper screening, individuals can enter private areas of the park unnoticed. Furthermore, present screening systems are not fully compatible with large crowds entering a venue. Existing screening systems are typically low-through put systems which themselves create congestion at entrances to the venue. Thus, the screening system itself generates long lines and crowds which are themselves potential targets.
Based on the above, there exists a need for an effective crowd control and monitoring system. More specifically, there exists a need for a crowd control and monitoring system that establishes a high throughput screening system, provides security personnel with a means to monitor and track potential threats, and also provides members of the crowd with real-time information regarding a particular venue or location.
SUMMARY OF THE INVENTION
The present invention is directed to a visitor control and tracking system for a venue having a plurality of access points and a plurality of destination points. In accordance with the invention, a monitoring system tracks a location and movement of individuals or crowds in the venue and works in combination with a distributed network of screening units or kiosks to provide effective crowd control and monitoring. In one io embodiment, the monitoring system employs RFID tags or devices which are distributed at kiosks to visitors entering the venue. A plurality of RFID readers or receivers are arranged about the venue and function to scan for the RFID devices. A central control, operatively connected to each of the RFID receivers, tracks a location and movement of each of the RFID devices to determine a visitor associated metric for each of the plurality of destination points. In another embodiment, the visitor associated metric is simply established by visual crowd monitoring.
Once the visitor associated metric is determined, information corresponding to the visitor associated metric relating to each of the plurality of destination points is provided to visitors on various display devices provided at each access point, as well as displays preferably arranged about the venue. More specifically, crowd flow rates, capacities at each of the plurality of destination points and wait times at particular attractions are determined in real time, such as through a processor of the central control. The calculated flow rates and capacities are compared to baseline quantities stored in memory to determine crowd levels at each of the plurality of destination points. The plurality of displays then provide information which can be used to guide visitors toward desired ones of the plurality of destination points. For example, visitors entering the venue can be informed that visiting areas or attractions in a particular order will result in shorter wait times.
In further accordance with the RFID embodiment of the invention, each of the plurality of RFID devices is provided with a unique address.
i o In this manner, the various RFID receivers can provide status information to the central control regarding particular ones of the RFID devices. In this arrangement, the venue can be divided into public areas and private areas, with the central control validating that only authorized individuals enter the private areas of the venue. In the event that an unauthorized RFID device is determined to be in a private area, a security response can be initiated. In addition, individuals who fail a security screening can be inonitored, tracked and, if necessary, detained by security personnel.
In accordance with this embodiment of the invention, visitors entering an amusement park are screened for security threats prior to 2o being presented with a keepsake containing an RFID device. If, for example, the individual fails the screening process, the RFID device in the keepsake can be tracked by the RFID receivers and, if necessary, the individual stopped and questioned by security personnel. In accordance with one aspect of the invention, a plurality of video cameras are located about the venue. Individuals who fail the initial security screen are actually tracked through the RFID tags and/or visually. The video cameras can also be employed to track and locate lost children. In another example, the RFID device can be provided in a transit pass or ticket. If the individual fails a security screen, the transit pass can be tracked throughout a particular station or even an entire transportation s system through both an RFID tag embedded in the transit pass and cameras located throughout the transit system.
Furthermore, through real time tracking of the flow and location of visitors in a particular venue, various patterns can be evaluated and security responses customized to address various situations. Moreover, io the type of security response can be randomized so that individuals who may be monitoring a venue's security system cannot learn and analyze response patterns which can later be employed to exploit weakness in the venue's security system.
Additional objects, features and advantages of the present 15 invention will become more readily apparent from the following detailed description of a preferred embodiment when taken in conjunction with the drawings wherein like reference numerals refer to corresponding parts in the several views.
Amusement parks, fairgrounds, historical sites and the like would also benefit from crowd control and monitoring devices. Visitors io entering amusement parks typically head to a favorite area without knowledge or regard for how crowded that area may be. If the visitor is provided with real-time information regarding each potential destination in the park, the visitor could opt to head to less crowded areas, or toward areas where the flow of visitors is moving quickly and lines are shorter.
15 In this manner, the visitor's overall experience at the venue is positive, which leads to an increase in the likelihood of a return visit.
In addition to frustration that large crowds can generate, large uncontrolled crowds are an attractive target for terrorists. Terrorists use large crow.ds as cover for carrying out various attacks on civilian 20 populations. The crowds themselves offer an attractive target for terrorists. During prior attacks in London and Barcelona, terrorists hid among crowds trying to board trains and plant bombs which, when detonated, resulted in deaths and injury of numerous civilians. At present, security in many transportation hubs and large venues is 25 primarily passive. That is, many transportation hubs and other large venues simply employ cameras to monitor people waiting for trains or moving about a theme park towards various attractions. Many facilities also employ security personnel, both uniformed and undercover, that mingle with the crowds and which are ready to respond as necessary to emergency situations.
Unfortunately, large crowds often make it difficult to properly monitor all situations and areas.. Actually, many terrorists watch the monitors in order to determine how security personal respond to various situations. That is, the terrorists seek out established patterns in responses. Once any patterns in the responses can be determined, plans 1o are adjusted to compensate for the probable response in order to increase the likelihood of success of any planned event. By providing security personnel with real-time monitoring of crowd flow, randomized responses to various security threats can be developed that will thwart potential terrorists. In venues that employ security screening, individuals failing the screening process can often times get lost in the crowds before security personnel can respond. Also, without proper screening, individuals can enter private areas of the park unnoticed. Furthermore, present screening systems are not fully compatible with large crowds entering a venue. Existing screening systems are typically low-through put systems which themselves create congestion at entrances to the venue. Thus, the screening system itself generates long lines and crowds which are themselves potential targets.
Based on the above, there exists a need for an effective crowd control and monitoring system. More specifically, there exists a need for a crowd control and monitoring system that establishes a high throughput screening system, provides security personnel with a means to monitor and track potential threats, and also provides members of the crowd with real-time information regarding a particular venue or location.
SUMMARY OF THE INVENTION
The present invention is directed to a visitor control and tracking system for a venue having a plurality of access points and a plurality of destination points. In accordance with the invention, a monitoring system tracks a location and movement of individuals or crowds in the venue and works in combination with a distributed network of screening units or kiosks to provide effective crowd control and monitoring. In one io embodiment, the monitoring system employs RFID tags or devices which are distributed at kiosks to visitors entering the venue. A plurality of RFID readers or receivers are arranged about the venue and function to scan for the RFID devices. A central control, operatively connected to each of the RFID receivers, tracks a location and movement of each of the RFID devices to determine a visitor associated metric for each of the plurality of destination points. In another embodiment, the visitor associated metric is simply established by visual crowd monitoring.
Once the visitor associated metric is determined, information corresponding to the visitor associated metric relating to each of the plurality of destination points is provided to visitors on various display devices provided at each access point, as well as displays preferably arranged about the venue. More specifically, crowd flow rates, capacities at each of the plurality of destination points and wait times at particular attractions are determined in real time, such as through a processor of the central control. The calculated flow rates and capacities are compared to baseline quantities stored in memory to determine crowd levels at each of the plurality of destination points. The plurality of displays then provide information which can be used to guide visitors toward desired ones of the plurality of destination points. For example, visitors entering the venue can be informed that visiting areas or attractions in a particular order will result in shorter wait times.
In further accordance with the RFID embodiment of the invention, each of the plurality of RFID devices is provided with a unique address.
i o In this manner, the various RFID receivers can provide status information to the central control regarding particular ones of the RFID devices. In this arrangement, the venue can be divided into public areas and private areas, with the central control validating that only authorized individuals enter the private areas of the venue. In the event that an unauthorized RFID device is determined to be in a private area, a security response can be initiated. In addition, individuals who fail a security screening can be inonitored, tracked and, if necessary, detained by security personnel.
In accordance with this embodiment of the invention, visitors entering an amusement park are screened for security threats prior to 2o being presented with a keepsake containing an RFID device. If, for example, the individual fails the screening process, the RFID device in the keepsake can be tracked by the RFID receivers and, if necessary, the individual stopped and questioned by security personnel. In accordance with one aspect of the invention, a plurality of video cameras are located about the venue. Individuals who fail the initial security screen are actually tracked through the RFID tags and/or visually. The video cameras can also be employed to track and locate lost children. In another example, the RFID device can be provided in a transit pass or ticket. If the individual fails a security screen, the transit pass can be tracked throughout a particular station or even an entire transportation s system through both an RFID tag embedded in the transit pass and cameras located throughout the transit system.
Furthermore, through real time tracking of the flow and location of visitors in a particular venue, various patterns can be evaluated and security responses customized to address various situations. Moreover, io the type of security response can be randomized so that individuals who may be monitoring a venue's security system cannot learn and analyze response patterns which can later be employed to exploit weakness in the venue's security system.
Additional objects, features and advantages of the present 15 invention will become more readily apparent from the following detailed description of a preferred embodiment when taken in conjunction with the drawings wherein like reference numerals refer to corresponding parts in the several views.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is an overhead view of a venue employing a visitor control and tracking system constructed in accordance with the present invention;
Figure 2 is a perspective view of a security screening center employed in connection with the visitor control and tracking system of Figure 1;
Figure 3 is plan view of an article containing an RFID chip mounted to a bracelet issued by the security screening center of Figure 2;
Figure 4 is a block diagram illustrating aspects of the visitor control and tracking system of the present invention; and Figure 5 illustrates a visitor viewing a display that provides information regarding various portions of the venue of Figure 1 as determined by the visitor control and tracking system.
DETAILED DESCRIPTION OF THE PREFERRED
EMBODIMENT
The present invention is directed to a visitor control and tracking system for a venue 4, such as an amusement park venue 4 as depicted in Figure 1. As shown, venue park 4 has multiple access points indicated generally at 6 and 7, as well as multiple destination points indicated at Z 1-Z4. Of course, the number and location of access points 6, 7 and destination points Zl-Z4 can vary in accordance with the present invention. In any event, visitors seeking entrance to venue 4 can arrive through various modes of transportation, including automobiles arranged within a parking lot 12, a monorail 14 or a tram system 17. Upon arrival, visitors approach banks of security screening centers 31-34 arranged adjacent to access points 6 and 7. Each bank of screening centers 31-34 contains a plurality of individual screening centers 40 shown in detail in Figure 2.
In the embodiment shown in Figure 2, each screening center or kiosk 40 includes a main housing 50 provided with a front wa1152, a rear wal153, a top wall 54, a bottom wall or base 55 and opposing side walls 56 and 57. Preferably, each screening center 40 is provided with various accessories that enable screening center 40 to blend in or match a is particular architecture or theme at venue 4. In the embodiment shown, screening center 40 is shown with a pair of columns 62 and 63 that may mirror other columns (not shown) at access points 6 and 7. In any case, each screening center 40 can take on various configurations and/or themes, while also being readily adaptable and re-configurable to ao accommodate numerous, distinct venues and/or locations. Towards that end, front, rear and opposing side walls 52, 53, 56 and 57 are exposed so as to readily receive colored/printed coverings that match a particular theme.
In any event, screening center 40 includes a collection portion 70 25 arranged within a housing 72 that retrieves trace residue sainples and certain demographic samples from a subject. As such, collection portion 70 includes a residue sample collector 75 and a demographic sample collector (not shown). In addition, security screening center 40 includes various input devices, such as an exterior camera 78 and a display 79 which, in addition to serving as an input device for screening center 40, provides the visitor with information about the various zones Zl-Z4 and attractions (not separately labeled) within venue 4. For instance, display 79 can provide information regarding a desired order in which to visit zones Z1-Z4 and/or other locations so as to encounter shorter lines and minimize wait times. In another example, display 79 can provide lo information guiding groups of visitors initially to different ones of zones Zl-Z4. For example, display 79 can provide information which guides the first thousand visitors to Z1, the next thousand visitors to Z2 and so on. The particular details of collection portion 70 and the input devices do not form part of the present invention and thus will not be discussed more fully herein. Instead, the details can be found in commonly assigned U.S. Patent Application Serial No. 11/418,193, entitled "Security Screening and Support System", filed on May 5, 2006 and U.S.
Provisional Patent Application Serial No. 60/756,573, entitled "System and Method For Optimization For Trace Chemical Sample Collection", filed January 6, 2006, both of which are incorporated herein by reference.
In any case, while the visitor interacts with screening center 40, a security scan is performed to determine whether the visitor poses a potential threat to venue 4 or other visitors in a manner that will be discussed more fully below. Following the security scan, a keepsake 90 (see Figure 3) is issued to the visitor via output portion 86.
As best shown in Figure 3, keepsake 90 includes a main body portion 94 having imprinted thereon an image 97 of the visitor captured through camera 78, a date stamp 98, a time stamp 99 and a graphic 100.
Graphic 100 can take on various forms and, in addition, provide security personnel with an indication that the visitor has passed a screening process. That is, as will be discussed more fully below, the graphic can include embedded or encoded portions that indicate whether the visitor passed the security screen. In addition, keepsake 90 includes a bracelet portion 109 that is detachably connected to main body portion 94. Upon receiving keepsake 90, the visitor simply detaches bracelet 109 from main body portion 94and secures bracelet 109 about his or her wrist io during their stay in venue 4. Preferably, bracelet 109 includes an image 111 which is a reduced duplicate of image 97. In addition, bracelet 109 is provided with an RFID chip 113 having a unique address which, as will be discussed more fully below, enables the visitor control and tracking system to monitor the visitor's location and provide input regarding crowd information for each zone Z 1-Z4.
With reference to Figure 4, the visitor control and tracking system includes a monitoring system (not separately labeled) that tracks the location and/or movement of visitors to venue 2. Preferably, the monitoring system includes an overall control system 120 operatively connected to a plurality of RFID readers 122a-122f that, along with security and screening centers 40, provide inputs to a central control 130.
RFID readers 122a-122f are scattered about venue 4 so as to track RFID
tags 113 moving about and between zones Z 1-Z4. In addition, visitor control and tracking system includes a plurality of video caineras 125a-125g which, in a manner that will be discussed more fully below, cooperate with RFID readers 122a-122f to track visitors throughout venue 4. In any event, central control 130 includes a processor 132 and a memory 134. Processor 132 receives input from RFID readers 122a-122f to determine a visitor associated metric which enables visitors to be guided around venue 4 and, in particular, about and between each of zones Zl-Z4. More specifically, processor 132 includes a location determination portion 138 that identifies a location of each RFID tag 113, a flow-in portion 139 that determines a flow of visitors into each zone Z1-Z4, a flow-out portion 140 which determines a flow of visitors out of each zone Zl-Z4, a population determination portion 141 which calculates and determines the particular population in each zone Z1-Z4, io and a line length determination portion 142 which determines line length at each attraction (not separately labeled) in each zone Z1-Z4.
Processor 132 compares flow-in data, flow-out data and population data with data stored in memory 134. That is, memory 134 includes both maximum in and out flow rate data for each zone Z 1-Z4, as well as a maximum capacity value for each zone Z1-Z4. Thus, central control 130 determines which zones Z 1-Z4 are under or over capacity and directs visitors toward zones that are under capacity in a manner that will be described more fully below.
In addition to display 9 provided on security screening center 40, visitor tracking control system includes a plurality of displays 150a-150j (see Figure 1) arranged within venue 4 that provide visitor metric information, indicated generally at 154 in Figure 5, to visitors 158 moving about venue 4. In accordance with a preferred embodiment of the invention, each display 9 and 150a-150j provides a visitor with information relating to the number of visitors in each zone ZI-Z4, whether any one of zones Z1-Z4 is at or above capacity, and which ii attractions within each zone Z1-Z4 is operating under capacity. In this manner, the visitor can appropriately choose which zone Z1-Z4 or even particular zone attraction to visit. Thus, the visitor control and tracking system in accordance with the present invention guides visitors about venue 4 in a manner that minimizes crowding, wait times and confusion, thereby enhancing the visitor's overall experience.
In addition to guiding visitors about venue 4, the visitor control and tracking system performs a security screening of each visitor. Towards that end, as represented in Figure 4, screening center 40 includes a lo security scanning portion 200 having a threat assessment portion 202 and a behavior analysis portion 203. Threat assessment portion 202 scans for a threat residue obtained through residue sample collector 75, while behavior analysis portion 203 scans for any odd behavior exhibited by the visitor. The particular operation of residue sample collector 75 does not form part of the present application and can be found in commonly assigned U.S. Patent Application Serial No. 11/418,193, entitled "Security Screening and Support System", filed on May 5, 2006 and U.S.
Provisional Patent Application Serial No. 60/756,573, entitled "System and Method For Optimization For Trace Chemical Sample Collection", filed January 6, 2006, again incorporated herein by reference. That is, collected data, such as from external camera 78 and sample collector 75 which, according to a preferred embodiment includes an internal camera (not shown), is evaluated and categorized against known data representing both normal behavior and abnormal behavior to produce an output which represents a degree to which the current data is similar to normal or abnormal behavior. More specifically, based on timing of the interaction, pressure applied, interplay with camera 78 and/or sample collector 75, behavior analysis portion 203 then assigns a nulnerical value that is considered in determining the possibility that a visitor is a potential threat. Inputs in determining whether behavior of a visitor is normal or abnormal also include tilne records of activity, face and hand video screens, face and hand images, and interactions with residue sample collector 75. In order to make a proper analysis, comparative normal behavior data is collected from visitors who interact with security center 40 naturally. Comparative abnormal behavior data is collected from visitors who are directed to attempt to "beat the system." The io comparative normal behavior and comparative abnormal behavior result in distinct differences which indicate natural and deceptive interaction with security center 40.
In accordance with one aspect of the invention, normal and abnormal comparison data is periodically updated using "supervised learning." One form of supervised learning occurs when local processing of data received through the input sensors contains unfamiliar attributes.
The unfalniliar attributes are sent to a comparison database contained within behavior analysis portion 203. Another form of update occurs when security screening center 40 sounds an alarm on a particular visitor.
In this situation, sensor information is presented to security operation center personnel who determine the validity of a potential threat, perform necessary actions, and resolve the threat condition. Sensor data and threat resolution information is then stored in behavior analysis portion 203 in order to update databases contained therein. In any event, as set forth above, once the security scan is complete, security screening center 40 issues an article or keepsake 90 to the visitor. If the visitor fails the security screen, an embedded code or graphic known only to security personnel is imprinted on keepsake 90. Thus, when presenting keepsake 90 to security personnel in order to gain entry, visitors who have failed the security screen can be subjected to greater scrutiny.
Central control 130 also includes a tracking portion 224 which can s track each individual visitor through the unique address in each RFID
chip 113 about venue 4. By tracking real-time crowd flow and the location of each visitor, central control 130 can establish patterns of movement in venue 4. The patterns of movement are employed by security personnel to determine responses to various situations.
1o Moreover, the patterns of movement can be employed to develop randomized responses to prevent individuals from learning and analyzing responses and exploit weaknesses in the security system. In addition, tracking portion 224, working in combination with RFID readers 122a-122f and video cameras 125a-125g, can track individuals, particularly 15 those who fail the initial security screen. In addition, RFID readers 122a-122f and video cameras 125a-125g can be employed to determine whether visitors are moving about public portions of venue 4 or whether a visitor has moved into private portions of venue 4.
A visitor observed in private areas of venue 4 can be quickly 20 located and escorted back into the public areas. Central control 130 is preferably linked to security personnel through a plurality of portable data devices, such as indicated generally at 300 in Figure 4. In this manner, central control 130 can quickly and efficiently transmit information to security personnel provided with portable data device 300 regarding a 25 location of a person of interest. In addition to providing text information, central control 130 can also transmit visual images of the person of interest through portable data device 300. Of course, tracking portion 224 can also be employed to locate individuals who may become lost within venue 4.
Based on the above, it should be readily apparent that the visitor control and tracking system of the invention provides for real-time crowd monitoring, advanced visitor guidance and enhanced venue security. In particular, it should be realized that the visitor control and tracking functions can be performed at the screening centers or kiosks only, in combination with cameras provided throughout the venue and/or with the 1o use of the RFID chips and readers. In any case, a visitor associated metric would be established for crowd control purposes. The visitor readable displays can simply be constituted by those at the kiosks or the kiosk displays in combination with various displays arranged throughout the venue. The invention also has various security aspects. In particular, in addition to performing explosive checks at the kiosks, abnormal behavior can be monitored. In this case, each kiosk serves as security sentinel whereby the kiosk is an interactive tool to assess behavior.
Additional security and tracking features exist with the use of the RFID
tags. Further security is established in connection with the randomized 2o responses.
Although shown with venue 4 illustrated as an amusement park, it should be readily understood that the present invention is readily adaptable into a wide variety of venues that have multiple entrance points and multiple destination points, such as metro systems, stadiums, parks, fairgrounds, historical sites and the like. Although described with reference to preferred embodiments of the invention, it should be readily understood that various changes and/or modifications can be made to the invention without departing from the spirit thereof. For instance, while the monitoring system is described as employing RFID readers to scan for RFID devices carried by each visitor, it should be understood other devices such as video cameras, passive or active sensors and the like can also be employed. In general, the invention is only intended to be limited by the scope of the following claims.
Figure 1 is an overhead view of a venue employing a visitor control and tracking system constructed in accordance with the present invention;
Figure 2 is a perspective view of a security screening center employed in connection with the visitor control and tracking system of Figure 1;
Figure 3 is plan view of an article containing an RFID chip mounted to a bracelet issued by the security screening center of Figure 2;
Figure 4 is a block diagram illustrating aspects of the visitor control and tracking system of the present invention; and Figure 5 illustrates a visitor viewing a display that provides information regarding various portions of the venue of Figure 1 as determined by the visitor control and tracking system.
DETAILED DESCRIPTION OF THE PREFERRED
EMBODIMENT
The present invention is directed to a visitor control and tracking system for a venue 4, such as an amusement park venue 4 as depicted in Figure 1. As shown, venue park 4 has multiple access points indicated generally at 6 and 7, as well as multiple destination points indicated at Z 1-Z4. Of course, the number and location of access points 6, 7 and destination points Zl-Z4 can vary in accordance with the present invention. In any event, visitors seeking entrance to venue 4 can arrive through various modes of transportation, including automobiles arranged within a parking lot 12, a monorail 14 or a tram system 17. Upon arrival, visitors approach banks of security screening centers 31-34 arranged adjacent to access points 6 and 7. Each bank of screening centers 31-34 contains a plurality of individual screening centers 40 shown in detail in Figure 2.
In the embodiment shown in Figure 2, each screening center or kiosk 40 includes a main housing 50 provided with a front wa1152, a rear wal153, a top wall 54, a bottom wall or base 55 and opposing side walls 56 and 57. Preferably, each screening center 40 is provided with various accessories that enable screening center 40 to blend in or match a is particular architecture or theme at venue 4. In the embodiment shown, screening center 40 is shown with a pair of columns 62 and 63 that may mirror other columns (not shown) at access points 6 and 7. In any case, each screening center 40 can take on various configurations and/or themes, while also being readily adaptable and re-configurable to ao accommodate numerous, distinct venues and/or locations. Towards that end, front, rear and opposing side walls 52, 53, 56 and 57 are exposed so as to readily receive colored/printed coverings that match a particular theme.
In any event, screening center 40 includes a collection portion 70 25 arranged within a housing 72 that retrieves trace residue sainples and certain demographic samples from a subject. As such, collection portion 70 includes a residue sample collector 75 and a demographic sample collector (not shown). In addition, security screening center 40 includes various input devices, such as an exterior camera 78 and a display 79 which, in addition to serving as an input device for screening center 40, provides the visitor with information about the various zones Zl-Z4 and attractions (not separately labeled) within venue 4. For instance, display 79 can provide information regarding a desired order in which to visit zones Z1-Z4 and/or other locations so as to encounter shorter lines and minimize wait times. In another example, display 79 can provide lo information guiding groups of visitors initially to different ones of zones Zl-Z4. For example, display 79 can provide information which guides the first thousand visitors to Z1, the next thousand visitors to Z2 and so on. The particular details of collection portion 70 and the input devices do not form part of the present invention and thus will not be discussed more fully herein. Instead, the details can be found in commonly assigned U.S. Patent Application Serial No. 11/418,193, entitled "Security Screening and Support System", filed on May 5, 2006 and U.S.
Provisional Patent Application Serial No. 60/756,573, entitled "System and Method For Optimization For Trace Chemical Sample Collection", filed January 6, 2006, both of which are incorporated herein by reference.
In any case, while the visitor interacts with screening center 40, a security scan is performed to determine whether the visitor poses a potential threat to venue 4 or other visitors in a manner that will be discussed more fully below. Following the security scan, a keepsake 90 (see Figure 3) is issued to the visitor via output portion 86.
As best shown in Figure 3, keepsake 90 includes a main body portion 94 having imprinted thereon an image 97 of the visitor captured through camera 78, a date stamp 98, a time stamp 99 and a graphic 100.
Graphic 100 can take on various forms and, in addition, provide security personnel with an indication that the visitor has passed a screening process. That is, as will be discussed more fully below, the graphic can include embedded or encoded portions that indicate whether the visitor passed the security screen. In addition, keepsake 90 includes a bracelet portion 109 that is detachably connected to main body portion 94. Upon receiving keepsake 90, the visitor simply detaches bracelet 109 from main body portion 94and secures bracelet 109 about his or her wrist io during their stay in venue 4. Preferably, bracelet 109 includes an image 111 which is a reduced duplicate of image 97. In addition, bracelet 109 is provided with an RFID chip 113 having a unique address which, as will be discussed more fully below, enables the visitor control and tracking system to monitor the visitor's location and provide input regarding crowd information for each zone Z 1-Z4.
With reference to Figure 4, the visitor control and tracking system includes a monitoring system (not separately labeled) that tracks the location and/or movement of visitors to venue 2. Preferably, the monitoring system includes an overall control system 120 operatively connected to a plurality of RFID readers 122a-122f that, along with security and screening centers 40, provide inputs to a central control 130.
RFID readers 122a-122f are scattered about venue 4 so as to track RFID
tags 113 moving about and between zones Z 1-Z4. In addition, visitor control and tracking system includes a plurality of video caineras 125a-125g which, in a manner that will be discussed more fully below, cooperate with RFID readers 122a-122f to track visitors throughout venue 4. In any event, central control 130 includes a processor 132 and a memory 134. Processor 132 receives input from RFID readers 122a-122f to determine a visitor associated metric which enables visitors to be guided around venue 4 and, in particular, about and between each of zones Zl-Z4. More specifically, processor 132 includes a location determination portion 138 that identifies a location of each RFID tag 113, a flow-in portion 139 that determines a flow of visitors into each zone Z1-Z4, a flow-out portion 140 which determines a flow of visitors out of each zone Zl-Z4, a population determination portion 141 which calculates and determines the particular population in each zone Z1-Z4, io and a line length determination portion 142 which determines line length at each attraction (not separately labeled) in each zone Z1-Z4.
Processor 132 compares flow-in data, flow-out data and population data with data stored in memory 134. That is, memory 134 includes both maximum in and out flow rate data for each zone Z 1-Z4, as well as a maximum capacity value for each zone Z1-Z4. Thus, central control 130 determines which zones Z 1-Z4 are under or over capacity and directs visitors toward zones that are under capacity in a manner that will be described more fully below.
In addition to display 9 provided on security screening center 40, visitor tracking control system includes a plurality of displays 150a-150j (see Figure 1) arranged within venue 4 that provide visitor metric information, indicated generally at 154 in Figure 5, to visitors 158 moving about venue 4. In accordance with a preferred embodiment of the invention, each display 9 and 150a-150j provides a visitor with information relating to the number of visitors in each zone ZI-Z4, whether any one of zones Z1-Z4 is at or above capacity, and which ii attractions within each zone Z1-Z4 is operating under capacity. In this manner, the visitor can appropriately choose which zone Z1-Z4 or even particular zone attraction to visit. Thus, the visitor control and tracking system in accordance with the present invention guides visitors about venue 4 in a manner that minimizes crowding, wait times and confusion, thereby enhancing the visitor's overall experience.
In addition to guiding visitors about venue 4, the visitor control and tracking system performs a security screening of each visitor. Towards that end, as represented in Figure 4, screening center 40 includes a lo security scanning portion 200 having a threat assessment portion 202 and a behavior analysis portion 203. Threat assessment portion 202 scans for a threat residue obtained through residue sample collector 75, while behavior analysis portion 203 scans for any odd behavior exhibited by the visitor. The particular operation of residue sample collector 75 does not form part of the present application and can be found in commonly assigned U.S. Patent Application Serial No. 11/418,193, entitled "Security Screening and Support System", filed on May 5, 2006 and U.S.
Provisional Patent Application Serial No. 60/756,573, entitled "System and Method For Optimization For Trace Chemical Sample Collection", filed January 6, 2006, again incorporated herein by reference. That is, collected data, such as from external camera 78 and sample collector 75 which, according to a preferred embodiment includes an internal camera (not shown), is evaluated and categorized against known data representing both normal behavior and abnormal behavior to produce an output which represents a degree to which the current data is similar to normal or abnormal behavior. More specifically, based on timing of the interaction, pressure applied, interplay with camera 78 and/or sample collector 75, behavior analysis portion 203 then assigns a nulnerical value that is considered in determining the possibility that a visitor is a potential threat. Inputs in determining whether behavior of a visitor is normal or abnormal also include tilne records of activity, face and hand video screens, face and hand images, and interactions with residue sample collector 75. In order to make a proper analysis, comparative normal behavior data is collected from visitors who interact with security center 40 naturally. Comparative abnormal behavior data is collected from visitors who are directed to attempt to "beat the system." The io comparative normal behavior and comparative abnormal behavior result in distinct differences which indicate natural and deceptive interaction with security center 40.
In accordance with one aspect of the invention, normal and abnormal comparison data is periodically updated using "supervised learning." One form of supervised learning occurs when local processing of data received through the input sensors contains unfamiliar attributes.
The unfalniliar attributes are sent to a comparison database contained within behavior analysis portion 203. Another form of update occurs when security screening center 40 sounds an alarm on a particular visitor.
In this situation, sensor information is presented to security operation center personnel who determine the validity of a potential threat, perform necessary actions, and resolve the threat condition. Sensor data and threat resolution information is then stored in behavior analysis portion 203 in order to update databases contained therein. In any event, as set forth above, once the security scan is complete, security screening center 40 issues an article or keepsake 90 to the visitor. If the visitor fails the security screen, an embedded code or graphic known only to security personnel is imprinted on keepsake 90. Thus, when presenting keepsake 90 to security personnel in order to gain entry, visitors who have failed the security screen can be subjected to greater scrutiny.
Central control 130 also includes a tracking portion 224 which can s track each individual visitor through the unique address in each RFID
chip 113 about venue 4. By tracking real-time crowd flow and the location of each visitor, central control 130 can establish patterns of movement in venue 4. The patterns of movement are employed by security personnel to determine responses to various situations.
1o Moreover, the patterns of movement can be employed to develop randomized responses to prevent individuals from learning and analyzing responses and exploit weaknesses in the security system. In addition, tracking portion 224, working in combination with RFID readers 122a-122f and video cameras 125a-125g, can track individuals, particularly 15 those who fail the initial security screen. In addition, RFID readers 122a-122f and video cameras 125a-125g can be employed to determine whether visitors are moving about public portions of venue 4 or whether a visitor has moved into private portions of venue 4.
A visitor observed in private areas of venue 4 can be quickly 20 located and escorted back into the public areas. Central control 130 is preferably linked to security personnel through a plurality of portable data devices, such as indicated generally at 300 in Figure 4. In this manner, central control 130 can quickly and efficiently transmit information to security personnel provided with portable data device 300 regarding a 25 location of a person of interest. In addition to providing text information, central control 130 can also transmit visual images of the person of interest through portable data device 300. Of course, tracking portion 224 can also be employed to locate individuals who may become lost within venue 4.
Based on the above, it should be readily apparent that the visitor control and tracking system of the invention provides for real-time crowd monitoring, advanced visitor guidance and enhanced venue security. In particular, it should be realized that the visitor control and tracking functions can be performed at the screening centers or kiosks only, in combination with cameras provided throughout the venue and/or with the 1o use of the RFID chips and readers. In any case, a visitor associated metric would be established for crowd control purposes. The visitor readable displays can simply be constituted by those at the kiosks or the kiosk displays in combination with various displays arranged throughout the venue. The invention also has various security aspects. In particular, in addition to performing explosive checks at the kiosks, abnormal behavior can be monitored. In this case, each kiosk serves as security sentinel whereby the kiosk is an interactive tool to assess behavior.
Additional security and tracking features exist with the use of the RFID
tags. Further security is established in connection with the randomized 2o responses.
Although shown with venue 4 illustrated as an amusement park, it should be readily understood that the present invention is readily adaptable into a wide variety of venues that have multiple entrance points and multiple destination points, such as metro systems, stadiums, parks, fairgrounds, historical sites and the like. Although described with reference to preferred embodiments of the invention, it should be readily understood that various changes and/or modifications can be made to the invention without departing from the spirit thereof. For instance, while the monitoring system is described as employing RFID readers to scan for RFID devices carried by each visitor, it should be understood other devices such as video cameras, passive or active sensors and the like can also be employed. In general, the invention is only intended to be limited by the scope of the following claims.
Claims (26)
1. A visitor control and tracking system for a venue having a plurality of access points and a plurality of destination points comprising:
a monitoring system for tracking location and movement of visitors to the venue, said monitoring system including a network of screening centers distributed about the venue in connection with the plurality of access points;
a controller for determining a visitor associated metric for each of the plurality of destination points based on signals received from the monitoring system; and a plurality of display devices arranged about the venue and operatively connected to the controller, said plurality of display devices presenting information to visitors regarding at least one of the plurality of destination points and the plurality of access points based upon the visitor associated metric.
a monitoring system for tracking location and movement of visitors to the venue, said monitoring system including a network of screening centers distributed about the venue in connection with the plurality of access points;
a controller for determining a visitor associated metric for each of the plurality of destination points based on signals received from the monitoring system; and a plurality of display devices arranged about the venue and operatively connected to the controller, said plurality of display devices presenting information to visitors regarding at least one of the plurality of destination points and the plurality of access points based upon the visitor associated metric.
2. The visitor control and tracking system according to claim 1, wherein the visitor associated metric includes at least one of a flow-in rate to one of the plurality of destination points, a flow-out rate of the one of the plurality of destination points and a population at the one of the plurality of the destination points.
3. The visitor control and tracking system according to claim 2, wherein the central control includes a memory having stored therein at least one of a maximum flow-in rate data, maximum flow-out rate data and maximum capacity data for each of the plurality of destination points.
4. The visitor control and tracking system according to claim 3, wherein the information presented on each of the plurality of displays is based upon differences between respective ones of the at least one flow-in rate, the flow-out rate, the population, the maximum flow-in rate, the maximum flow-out rate and the maximum capacity data.
5. The visitor control and tracking system according to claim 1, wherein the monitoring system includes:
a plurality of RFID devices distributed to visitors to the venue; and a plurality of RFID receivers arranged about the venue between the plurality of access points and the plurality of destination points, said RFID receivers scanning for the plurality of RFID devices.
a plurality of RFID devices distributed to visitors to the venue; and a plurality of RFID receivers arranged about the venue between the plurality of access points and the plurality of destination points, said RFID receivers scanning for the plurality of RFID devices.
6. The visitor control and tracking system according to claim 5, wherein the controller tracks the plurality of RFID devices to determine whether any visitor has moved from a public area of the venue into a private area of the venue.
7. The visitor control and tracking system according to claim 1, wherein each of the plurality of screening centers is adapted to perform a security scan of each visitor entering the venue.
8. The visitor control and tracking system according to claim 7, further comprising: a keepsake dispensed from the at least one security screening center upon completion of a security scan.
9. The visitor control and tracking system according to claim 8, wherein the keepsake includes a bracelet portion incorporating an RFID
device.
device.
10. The visitor control and tracking system according to claim 7, wherein the network of screening centers includes a threat assessment portion and a behavior analysis portion.
11. The visitor control and tracking system according to claim 10, wherein said behavior analysis portion scans for odd behavior exhibited from a visitor.
12. The visitor control and tracking system according to claim 1, wherein the plurality of display devices are incorporated in the network of screening centers.
13. The visitor control and tracking system according to claim 1, further comprising: a plurality of video cameras arranged about the venue, said video cameras being operatively connected to the controller to enable visual tracking of visitors in the venue.
14. The visitor control and tracking system according to claim 1, further comprising: a plurality of portable data devices operatively connected to the controller, said portable data devices being adapted to receive security information from the controller.
15. A method of tracking and assisting visitors in a venue having a plurality of access points and a plurality of destination points comprising:
screening visitors entering the venue;
monitoring visitor movement about the venue towards various ones of the plurality of destination points;
determining a visitor associated metric for each of the plurality of destination points; and displaying information to the visitors regarding the visitor associated metric for each of the plurality of destination points.
screening visitors entering the venue;
monitoring visitor movement about the venue towards various ones of the plurality of destination points;
determining a visitor associated metric for each of the plurality of destination points; and displaying information to the visitors regarding the visitor associated metric for each of the plurality of destination points.
16. The method of claim 15, wherein determining the visitor associated metric includes comparing a flow-in rate to one of the plurality of destination points with a maximum flow-in rate to the one of the plurality of destination points.
17. The method of claim 15, wherein determining the visitor associated metric includes comparing a flow-out rate of one of the plurality of destination points with a maximum flow-out rate from the one of the plurality of destination points.
18. The method of claim 15, wherein determining the visitor associated metric includes comparing current population data at one of the plurality of destination points with a maximum capacity data for the one of the plurality of destination points.
19. The method of claim 15, wherein determining the visitor associated metric includes determining wait times for one or more attractions located in at least one of the plurality of destination points.
20. The method according to claim 15, wherein displaying information to the visitors occurs at screening centers used in screening the visitors entering the venue.
21. The method of claim 20, wherein screening visitors includes a behavioral analysis for odd behavior of each visitor.
22. The method of claim 15, further comprising: monitoring the venue through a plurality of video cameras.
23. The method of claim 15, further comprising:
distributing RFID devices to visitors entering the venue through one of the plurality of access points; and tracking the RFID devices with a plurality of RFID readers as the visitors move about the venue towards various ones of the plurality of destination points.
distributing RFID devices to visitors entering the venue through one of the plurality of access points; and tracking the RFID devices with a plurality of RFID readers as the visitors move about the venue towards various ones of the plurality of destination points.
24. The method of claim 23, further comprising:
providing each of the plurality of RFID devices with a unique address; and tracking visitors that fail the security scan.
providing each of the plurality of RFID devices with a unique address; and tracking visitors that fail the security scan.
25. The method of claim 23, further comprising: tracking each of the plurality of RFID devices to determine if any visitor has moved from a public area of the venue to a private area of the venue.
26. The method of claim 23, further comprising: transmitting security information regarding one of the plurality of RFID devices to portable data devices.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US72347605P | 2005-10-05 | 2005-10-05 | |
US60/723,476 | 2005-10-05 | ||
US84650906P | 2006-09-22 | 2006-09-22 | |
US60/846,509 | 2006-09-22 | ||
PCT/US2006/038746 WO2007044380A2 (en) | 2005-10-05 | 2006-10-05 | Visitor control and tracking system |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2624657A1 true CA2624657A1 (en) | 2007-04-19 |
Family
ID=37943333
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002624657A Abandoned CA2624657A1 (en) | 2005-10-05 | 2006-10-05 | Visitor control and tracking system |
Country Status (4)
Country | Link |
---|---|
US (1) | US7541926B2 (en) |
CA (1) | CA2624657A1 (en) |
GB (1) | GB2444468B (en) |
WO (1) | WO2007044380A2 (en) |
Families Citing this family (58)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7774001B2 (en) * | 2005-12-16 | 2010-08-10 | Sony Ericsson Mobile Communications Ab | Device and method for determining where crowds exist |
US20070226044A1 (en) * | 2006-03-27 | 2007-09-27 | Hanson Michael F | Real-Time Subjective/Objective Venue Evaluation Method |
US8606605B2 (en) | 2006-09-28 | 2013-12-10 | Lo-Q, Plc | Reservation management system and method |
US8704659B2 (en) | 2007-06-18 | 2014-04-22 | At&T Intellectual Property I, L.P. | Interaction analyzer |
US7642920B2 (en) | 2007-06-18 | 2010-01-05 | At&T Intellectual Property I, L.P. | Interaction analyzer |
US8447463B1 (en) | 2008-02-08 | 2013-05-21 | Gaurav Chowdhary | Tracking vehicle locations in a parking lot for definitive display on a GUI |
US7957900B2 (en) * | 2008-02-08 | 2011-06-07 | Gaurav Chowdhary | Tracking vehicle locations in a parking lot for definitive display on a GUI |
EP2266107A4 (en) * | 2008-03-28 | 2011-11-23 | Security Point Holdings Llc | Methods and systems for efficient security screening |
US20090267728A1 (en) * | 2008-04-23 | 2009-10-29 | Yves Mayrand | Method of visiting a site |
US7579945B1 (en) | 2008-06-20 | 2009-08-25 | International Business Machines Corporation | System and method for dynamically and efficently directing evacuation of a building during an emergency condition |
US10885471B2 (en) * | 2008-07-18 | 2021-01-05 | Disney Enterprises, Inc. | System and method for providing location-based data on a wireless portable device |
US20110145053A1 (en) * | 2008-08-15 | 2011-06-16 | Mohammed Hashim-Waris | Supply chain management systems and methods |
US20100144442A1 (en) * | 2008-12-04 | 2010-06-10 | Anthony Yanow | Integrated entertainment arrangement and methods thereof |
US7994910B2 (en) * | 2008-12-10 | 2011-08-09 | International Business Machines Corporation | Directing a movement of visitors in an event venue for maximizing revenue |
US9922167B2 (en) | 2009-11-20 | 2018-03-20 | Versus Technology, Inc. | Context-aware method and system for facilitating the delivery of healthcare to patients within a clinical environment monitored by real-time locating apparatus |
FR2953476B1 (en) * | 2009-12-03 | 2015-04-24 | Denis Creissels Consultant | TELEPHERIC WITH CONTROL OF THE ENTITY NUMBER OF PASSENGERS IN CABIN |
EP2354940A1 (en) * | 2010-02-01 | 2011-08-10 | Siemens Aktiengesellschaft | Calibration of stream models and stream simulation tools |
US8775244B2 (en) | 2010-11-09 | 2014-07-08 | International Business Machines Corporation | Optimal scheduling of venue attendance based on queue size and location |
US20120150586A1 (en) * | 2010-12-14 | 2012-06-14 | Scenetap Llc | Apparatus and method to record customer demographics in a venue or similar facility using cameras |
US11354638B2 (en) * | 2010-12-20 | 2022-06-07 | Ncr Corporation | Dynamic security for a self-checkout terminal |
FR2982985B1 (en) * | 2011-11-23 | 2014-09-12 | Solvay | METHOD OF PROTECTING A PERSON ON A SITE AND RELIANCE ON ITS DISPLACEMENT ON THIS SITE |
US9615063B2 (en) | 2011-12-27 | 2017-04-04 | Eye Stalks Corporation | Method and apparatus for visual monitoring |
US9129239B2 (en) * | 2012-03-29 | 2015-09-08 | Discovery Schools, Inc. | Driver/parent arrival notification system and method of notification |
US10304276B2 (en) | 2012-06-07 | 2019-05-28 | Universal City Studios Llc | Queue management system and method |
ITMI20121159A1 (en) * | 2012-07-02 | 2014-01-03 | Ct Studi S R L | METHOD FOR MONITORING USERS FLOW IN A DELIMITED AREA |
US9405978B2 (en) * | 2013-06-10 | 2016-08-02 | Globalfoundries Inc. | Prioritization of facial recognition matches based on likely route |
US9477858B2 (en) * | 2013-09-27 | 2016-10-25 | The Boeing Company | Restraining system including near field RFID detection |
US9640003B2 (en) * | 2014-05-06 | 2017-05-02 | Honeywell International Inc. | System and method of dynamic subject tracking and multi-tagging in access control systems |
WO2016002400A1 (en) * | 2014-06-30 | 2016-01-07 | 日本電気株式会社 | Guidance processing device and guidance method |
US20160055429A1 (en) | 2014-08-20 | 2016-02-25 | Universal City Studios Llc | Virtual queuing system and method |
US11263851B2 (en) * | 2014-09-11 | 2022-03-01 | Michael K. Proctor | Systems and methods for advanced headwear |
AU2015353439A1 (en) | 2014-11-25 | 2017-06-29 | Rapiscan Systems, Inc. | Intelligent security management system |
US9547971B2 (en) * | 2014-12-27 | 2017-01-17 | Intel Corporation | Technologies for determining a threat assessment based on fear responses |
FR3037761B1 (en) * | 2015-06-19 | 2019-05-24 | Metrolab | SYSTEM FOR LOCATING USERS WITHIN A DELIMITE SPACE WELCOMING THE PUBLIC |
US10152840B2 (en) | 2016-03-16 | 2018-12-11 | Universal City Studios Llc | Virtual queue system and method |
US10943188B2 (en) | 2016-11-09 | 2021-03-09 | Universal City Studios Llc | Virtual queuing techniques |
US10768425B2 (en) * | 2017-02-14 | 2020-09-08 | Securiport Llc | Augmented reality monitoring of border control systems |
CN111542799B (en) * | 2017-09-22 | 2023-07-25 | 埃尔特菲斯控股公司 | Computer-implemented method for customizing interactivity |
US10970725B2 (en) | 2017-11-29 | 2021-04-06 | Universal Studios LLC | System and method for crowd management and maintenance operations |
US10653957B2 (en) | 2017-12-06 | 2020-05-19 | Universal City Studios Llc | Interactive video game system |
US10916059B2 (en) | 2017-12-06 | 2021-02-09 | Universal City Studios Llc | Interactive video game system having an augmented virtual representation |
CA3020322A1 (en) | 2017-12-13 | 2019-06-13 | Matthew Usi | Systems and methods for threshold detection of a wireless device |
US10603564B2 (en) | 2018-01-03 | 2020-03-31 | Universal City Studios Llc | Interactive component for an amusement park |
US10699084B2 (en) | 2018-01-15 | 2020-06-30 | Universal City Studios Llc | Local interaction systems and methods |
US10360419B1 (en) | 2018-01-15 | 2019-07-23 | Universal City Studios Llc | Interactive systems and methods with tracking devices |
US10818152B2 (en) | 2018-01-15 | 2020-10-27 | Universal City Studios Llc | Interactive systems and methods with feedback devices |
US10614271B2 (en) | 2018-01-15 | 2020-04-07 | Universal City Studios Llc | Interactive systems and methods |
US10537803B2 (en) | 2018-01-18 | 2020-01-21 | Universal City Studios Llc | Interactive gaming system |
US10845975B2 (en) | 2018-03-29 | 2020-11-24 | Universal City Studios Llc | Interactive animated character head systems and methods |
US10650627B1 (en) | 2018-11-08 | 2020-05-12 | International Business Machines Corporation | Cognitive vetting system for unsolicited residential visitors |
US11068065B2 (en) * | 2018-11-28 | 2021-07-20 | International Business Machines Corporation | Non-verbal communication tracking and classification |
US11205330B2 (en) * | 2018-11-30 | 2021-12-21 | Indyme Solutions, Llc | Anti-theft response randomizer |
US11745351B2 (en) * | 2019-01-03 | 2023-09-05 | Lucomm Technologies, Inc. | Robotic devices |
US11568333B2 (en) | 2019-06-27 | 2023-01-31 | Universal City Studios Llc | Systems and methods for a smart virtual queue |
US11501591B2 (en) | 2020-02-20 | 2022-11-15 | Universal City Studios Llc | System and method for monitoring queue characteristics and initiating adjustments |
DE102020107268A1 (en) | 2020-03-17 | 2021-09-23 | Deutsche Bahn Aktiengesellschaft | Crowd organization procedures |
US11234098B1 (en) | 2020-07-01 | 2022-01-25 | Motorola Solutions, Inc. | Method and apparatus for setting geofence |
CN112435382A (en) * | 2020-11-23 | 2021-03-02 | 上海宝信数据中心有限公司 | Data center operation full-self-service access following passing method, system and medium |
Family Cites Families (62)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
IL80311A (en) * | 1986-10-15 | 1990-11-05 | Erez Forensic Technology Ltd | Test kit for the detection of explosives |
US5109691A (en) | 1989-12-08 | 1992-05-05 | Research Corporation Technologies, Inc. | Explosive detection screening system |
US5157261A (en) * | 1990-08-08 | 1992-10-20 | Eg&G Idaho, Inc. | Detection device for high explosives |
US5138889A (en) * | 1990-10-11 | 1992-08-18 | The United States Of America As Represented By The United States Department Of Energy | Hand held explosives detection system |
ES2090493T3 (en) * | 1991-03-20 | 1996-10-16 | Thermedics Detection Inc | DETECTION METHOD TO VERIFY SPECIFIC COMPOUNDS ON SURFACES. |
US5335288A (en) | 1992-02-10 | 1994-08-02 | Faulkner Keith W | Apparatus and method for biometric identification |
US5296380A (en) * | 1992-09-03 | 1994-03-22 | Israel Institute For Biological Research | Method and kit for detecting explosives |
US5566327A (en) * | 1994-07-08 | 1996-10-15 | Sehr; Richard P. | Computerized theme park information management system utilizing partitioned smart cards and biometric verification |
WO1996006346A1 (en) * | 1994-08-20 | 1996-02-29 | Renishaw Plc | Detector for explosive substances |
CA2137604A1 (en) * | 1994-12-08 | 1996-06-09 | Gerald Drolet | Apparatus and method for collecting samples for ims(ion mobility spectrometers) analyzers and the like |
US6028626A (en) * | 1995-01-03 | 2000-02-22 | Arc Incorporated | Abnormality detection and surveillance system |
GB2307324B (en) * | 1995-11-15 | 1999-07-21 | Leonard Sim | Queue management system |
US5648047A (en) * | 1996-03-29 | 1997-07-15 | Kardish; Nitza | Device for colorimetric detection of explosives and narcotics |
US5859375A (en) * | 1996-04-03 | 1999-01-12 | Barringer Research Limited | Apparatus for and method of collecting trace samples for analysis |
US5741984A (en) * | 1996-10-21 | 1998-04-21 | Barringer Technologies Inc. | Method and apparatus for sample collection by a token |
US5914671A (en) * | 1997-02-27 | 1999-06-22 | Micron Communications, Inc. | System and method for locating individuals and equipment, airline reservation system, communication system |
US6078928A (en) * | 1997-12-12 | 2000-06-20 | Missouri Botanical Garden | Site-specific interest profiling system |
US6073499A (en) * | 1998-03-12 | 2000-06-13 | Penn State Research Foundation | Chemical trace detection portal based on the natural airflow and heat transfer of the human body |
JP2000001024A (en) * | 1998-06-15 | 2000-01-07 | Minolta Co Ltd | Imaging apparatus |
GB9906037D0 (en) * | 1999-03-16 | 1999-05-12 | Searcher Limited | Tagging system and method |
US6674367B2 (en) * | 1999-09-28 | 2004-01-06 | Clifford Sweatte | Method and system for airport and building security |
US7109869B2 (en) * | 1999-09-28 | 2006-09-19 | Clifford Sweatte | Method and system for facility security |
US6976032B1 (en) * | 1999-11-17 | 2005-12-13 | Ricoh Company, Ltd. | Networked peripheral for visitor greeting, identification, biographical lookup and tracking |
AU2086401A (en) | 1999-12-22 | 2001-07-03 | Axcess Inc. | Method and system for operating an amusement park |
US6446514B1 (en) * | 2000-01-18 | 2002-09-10 | Barringer Research Limited | Combined particle/vapor sampler |
US6847892B2 (en) * | 2001-10-29 | 2005-01-25 | Digital Angel Corporation | System for localizing and sensing objects and providing alerts |
US20020070865A1 (en) * | 2000-09-29 | 2002-06-13 | Lancos Kenneth J. | System and method for creating a group of guests at a coverage area |
US6424264B1 (en) * | 2000-10-12 | 2002-07-23 | Safetzone Technologies Corporation | System for real-time location of people in a fixed environment |
US6747562B2 (en) * | 2001-11-13 | 2004-06-08 | Safetzone Technologies Corporation | Identification tag for real-time location of people |
US20020082897A1 (en) * | 2000-12-26 | 2002-06-27 | Douglas Menelly | Method and apparatus for facilitating amusement park activities and storing demographic information |
CN100362364C (en) * | 2001-06-19 | 2008-01-16 | 派科斯弗洛霍尔丁公司 | Location, communication and tracking systems |
US20030013459A1 (en) * | 2001-07-10 | 2003-01-16 | Koninklijke Philips Electronics N.V. | Method and system for location based recordal of user activity |
US6610977B2 (en) * | 2001-10-01 | 2003-08-26 | Lockheed Martin Corporation | Security system for NBC-safe building |
US7136513B2 (en) * | 2001-11-08 | 2006-11-14 | Pelco | Security identification system |
US7023356B2 (en) * | 2001-11-26 | 2006-04-04 | Aero-Vision Technologies, Inc. | System and method for monitoring individuals and objects associated with wireless identification tags |
US7286692B2 (en) * | 2001-12-27 | 2007-10-23 | Amnart Kanarat | Automatic celebrity face matching and attractiveness rating machine |
US6613576B1 (en) * | 2002-01-15 | 2003-09-02 | Sandia Corporation | Field kit and method for testing for the presence of gunshot residue |
EP1479033A4 (en) * | 2002-02-01 | 2008-11-26 | Amnon Rasin | Personalized boarding pass |
IL164111A0 (en) * | 2002-03-18 | 2005-12-18 | Il Gatto Inc | System and method for monitoring and tracking individuals |
GB0228807D0 (en) * | 2002-12-11 | 2003-01-15 | Koninkl Philips Electronics Nv | Opportunistic location tracking |
US6937147B2 (en) * | 2003-01-24 | 2005-08-30 | Hyperalert, Inc. | System and method for management of resources in emergency situations |
US20050045710A1 (en) * | 2003-03-24 | 2005-03-03 | Nicholas Burke | Amusement park system |
US20040230437A1 (en) * | 2003-04-29 | 2004-11-18 | Havrilak Robert J. | Method for assessing and managing security risk for systems |
US6914668B2 (en) * | 2003-05-14 | 2005-07-05 | International Technologies (Laser) Ltd. | Personal identification verification and controlled substance detection and identification system |
SE0301519D0 (en) | 2003-05-22 | 2003-05-22 | Biosensor Applications Sweden Ab Publ | Detection of trace amounts of airborne or deposited low molecular weight compounds |
US6952163B2 (en) * | 2003-06-11 | 2005-10-04 | Quantum Magnetics, Inc. | Combined systems user interface for centralized monitoring of a screening checkpoint for passengers and baggage |
US7317390B2 (en) * | 2003-06-11 | 2008-01-08 | Quantum Magnetics, Inc. | Screening checkpoint for passengers and baggage |
US7294306B2 (en) * | 2003-06-30 | 2007-11-13 | The Regents Of The University Of California | Inspection tester for explosives |
US7253727B2 (en) * | 2003-07-08 | 2007-08-07 | General Electric Company | Security checkpoint |
US7068161B2 (en) * | 2003-07-31 | 2006-06-27 | Ch2M Hill, Inc. | Method and system for analyzing the security of a facility |
US20050043897A1 (en) * | 2003-08-09 | 2005-02-24 | Meyer Robert W. | Biometric compatibility matching system |
GB2406424A (en) * | 2003-09-23 | 2005-03-30 | Ncr Int Inc | Biometric system provides feedback if the biometric capture was not complete |
US8252602B2 (en) * | 2003-11-07 | 2012-08-28 | Haas Jeffrey S | System for explosives detection |
US20050108912A1 (en) * | 2003-11-25 | 2005-05-26 | Alexander Bekker | Identification tag and related identification tag system |
US7801833B2 (en) * | 2003-12-22 | 2010-09-21 | Endicott Interconnect Technologies, Inc. | Item identification control method |
US7628324B2 (en) * | 2004-03-11 | 2009-12-08 | Passur Aerospace, Inc. | System and method for a smart passenger travel kiosk |
US20050251398A1 (en) * | 2004-05-04 | 2005-11-10 | Lockheed Martin Corporation | Threat scanning with pooled operators |
US7180420B2 (en) * | 2004-05-25 | 2007-02-20 | Mgm Computer Systems, Inc. | System and method using triangulation with RF/LF and infrared devices for tracking objects |
US7327251B2 (en) * | 2004-05-28 | 2008-02-05 | Corbett Jr Bradford G | RFID system for locating people, objects and things |
US7939029B2 (en) * | 2004-06-24 | 2011-05-10 | Lawrence Livermore National Security, Llc | Chemical analysis kit for the presence of explosives |
US20060017541A1 (en) * | 2004-07-22 | 2006-01-26 | Nguyen Martin K | Tracking by radio frequency identification |
US7047829B2 (en) * | 2004-08-30 | 2006-05-23 | General Electric Company | Device for testing traces of explosives and/or drugs |
-
2006
- 2006-10-05 WO PCT/US2006/038746 patent/WO2007044380A2/en active Application Filing
- 2006-10-05 US US11/543,101 patent/US7541926B2/en not_active Expired - Fee Related
- 2006-10-05 CA CA002624657A patent/CA2624657A1/en not_active Abandoned
- 2006-10-05 GB GB0806477A patent/GB2444468B/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
WO2007044380A3 (en) | 2008-02-21 |
US20070109134A1 (en) | 2007-05-17 |
GB2444468B (en) | 2010-12-22 |
US7541926B2 (en) | 2009-06-02 |
GB0806477D0 (en) | 2008-05-14 |
WO2007044380A2 (en) | 2007-04-19 |
GB2444468A (en) | 2008-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7541926B2 (en) | Visitor control and tracking system | |
US11792370B2 (en) | System for automatically triggering a recording | |
Staples | Everyday surveillance: Vigilance and visibility in postmodern life | |
Newton | Crime on public transport:'Static'and'Non-Static'(moving) crime events | |
Eck et al. | Crime places in crime theory | |
Braga et al. | Policing problem places: Crime hot spots and effective prevention | |
Braga | Problem-oriented policing and crime prevention | |
US8120505B2 (en) | Emergency ingress/egress monitoring system | |
US20020080198A1 (en) | System for real-time location of people in a fixed environment | |
US20150339871A1 (en) | Entity management and recognition system and method | |
JP2003087771A (en) | Monitoring system and monitoring method | |
Newman et al. | Policing terrorism: An executive's guide | |
KR101034643B1 (en) | System for managing and indicating a person of going and coming | |
Clarke et al. | Crime analysis for problem solvers in 60 small steps | |
Oliveira et al. | Bus robberies in belo horizonte, Brazil: solutions for safe travel | |
US20040145475A1 (en) | School security method and system for implementing same | |
Yancey II et al. | World Cup 2010 planning: an integration of public health and medical systems | |
US7114647B2 (en) | Data analysis system and method | |
Taylor et al. | Designing and operating safe and secure transit systems: Assessing current practices in the United States and abroad | |
JP7329829B2 (en) | Processors, systems and programs | |
LeBeau et al. | Developing Future Smart Parking Solutions for Hangzhou's IoT Town | |
Andress | A postevent smallpox mass vaccination clinic exercise | |
Virginus et al. | Design and Implementation Vehicle Tracking System Using GSM and GPS | |
Archana et al. | Smart Automated Parking System using IoT | |
Arias | Introductory handbook on policing urban space |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
FZDE | Discontinued |
Effective date: 20130821 |