Mass transit fare processing system
First Claim
Patent Images
1. A method for controlling access to a transit network by maintaining a black list of identifying tokens, the method comprising:
- granting a potential rider access to a transit system upon presentation of an identifying token, comprising;
reading a first set of token data from a first identifying token using a token reader;
computing a first token identifier from token data;
checking a first token against a black list in memory, using the first token identifier; and
allowing access to the transit network, if the first token is not black listed;
denying a potential rider access to the transit system upon presentation of an identifying token, comprisingreading a second set of token data from a second identifying token, using a token reader;
computing a second token identifier from the token data;
checking the second token identifier against the black list in memory, using the second token identifier; and
denying access to the transit network, if the second token is black listed;
removing a third identifying token from the black list after its outstanding balance is paid, comprising;
successfully charging a payment account associated with the third identifying token; and
removing the third identifying token from the black list; and
adding a fourth identifying token to the black list if the outstanding balance remains unpaid, comprising;
unsuccessfully charging one or more a payment accounts associated with the fourth identifying token; and
adding the fourth identifying token to the black list.
1 Assignment
0 Petitions
Accused Products
Abstract
An implementation of a system and method for using existing identification token infrastructures for mass transit fare product entitlement and payment is provided. The system and method make use of tokens—usually issued by a third party—for identification purposes and optionally for settlement purposes. The system does not store information on the tokens and instead maintains access control data (i.e., “white” and “black” lists). This implementation differs from known systems that require specially issued credit cards that have dedicated mass transit functionality.
-
Citations
6 Claims
-
1. A method for controlling access to a transit network by maintaining a black list of identifying tokens, the method comprising:
-
granting a potential rider access to a transit system upon presentation of an identifying token, comprising; reading a first set of token data from a first identifying token using a token reader; computing a first token identifier from token data; checking a first token against a black list in memory, using the first token identifier; and allowing access to the transit network, if the first token is not black listed; denying a potential rider access to the transit system upon presentation of an identifying token, comprising reading a second set of token data from a second identifying token, using a token reader; computing a second token identifier from the token data; checking the second token identifier against the black list in memory, using the second token identifier; and denying access to the transit network, if the second token is black listed; removing a third identifying token from the black list after its outstanding balance is paid, comprising; successfully charging a payment account associated with the third identifying token; and removing the third identifying token from the black list; and adding a fourth identifying token to the black list if the outstanding balance remains unpaid, comprising; unsuccessfully charging one or more a payment accounts associated with the fourth identifying token; and adding the fourth identifying token to the black list. - View Dependent Claims (2, 3, 4, 5, 6)
-
Specification