APPARATUS FOR ACCESS CONTROL AND PROCESSING
First Claim
1. An access control system, comprising:
- a scanner located adjacent to a venue entrance; and
a computer system coupled to the scanner, the computer system configured to;
receive coded user identification data scanned from an admission token from a token bearer via the scanner;
decode the coded user identification data;
transmit the decoded user identification to a terminal for display to a gate keeper so that the gate keeper can determine whether the token bearer is to be admitted.
7 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to methods and systems for providing secure access control to a facility. An access control system comprises a scanner located adjacent to a venue entrance. A computer system is coupled to the scanner. The computer system is configured to receive a coded user identification data scanned from an admission ticket from a ticket bearer via the scanner, decode the coded user identification data, and transmit the decoded user identification to a terminal for display to a gate keeper so that the gate keeper can determine whether the ticket bearer is to be admitted. An optional turnstile is coupled to the computer system, wherein the computer system enables the turnstile rotation.
-
Citations
80 Claims
-
1. An access control system, comprising:
-
a scanner located adjacent to a venue entrance; and
a computer system coupled to the scanner, the computer system configured to;
receive coded user identification data scanned from an admission token from a token bearer via the scanner;
decode the coded user identification data;
transmit the decoded user identification to a terminal for display to a gate keeper so that the gate keeper can determine whether the token bearer is to be admitted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of controlling access using a computer-based access control system, the method comprising:
-
receiving from a user terminal over a network at the access control system a request from a user for a plurality of access permits; and
providing from the access control system over the network to the user terminal a request that the user provide identification information for the intended recipients of the access permits, wherein the user is informed that one of the access permits needs to be allocated to the user. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48)
-
-
49. A method of controlling access using a computer-based access control system, the method comprising:
-
receiving from a user terminal over a network at the access control system a request from a first user for the purchase of a plurality of access permits;
providing from the access control system over the network to the user terminal a request that the user provide contact information for at a second user to whom a first of the plurality of access permits is to be provided;
using the contact information to contact the second user with a request for one or more types of identification; and
least partly in response to receiving the requested identification for the second user, providing a first access permit with a unique identifier related to the second user, wherein the unique identifier is machine readable and/or human readable. - View Dependent Claims (50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80)
-
Specification