摘要:
A technique for controlling access to one or more attractions is achieved using a number of access keys, each being issued to one or more users. An electronic queue management part manages a virtual queue in respect of each attraction and receives electronic requests for attraction access, each request relating to an access key and being for the users associated with it to access a particular attraction. Receipt of each request causes the respective users to be added to a corresponding virtual queue. A time at which each group of users reaches the front of the virtual queue and can access the attraction is determined. The users access the attractions by presenting an access key to an access control part, in communication with the electronic queue management part. Only a user presenting an access key at the correct time for accessing the attraction is allowed access to the attraction.
摘要:
An electronic card access system, for example, for managing access control of a venue or facility, and an access card for use with the card access system
摘要:
The present invention provides a printer responsive to commands from printer driver software. The printer driver software is characterized by being responsive to two types of input data. One of the types includes text data, and the other of the types includes watermark data. The two types of data are separately applied to printer driver software, rather than integrated together prior to application to the printer driver software.
摘要:
A method and computer program product for managing information about transactions occurring in a physical establishment includes gathering information about multiple transactions at a physical establishment, and storing the information as metadata. A byte stream corresponding to the metadata is generated. Several elements of the metadata are associated with a particular session based on predefined criteria.
摘要:
A method and system for reserving a time slot to gain access to a resource, such as an attraction, ride, show or event, as may be found in an amusement park. A portable module is used to determine a time when the user is able to access the resource based on reservation requests and throughput, without need for a docking station or continuous communication with a central database of all reservations and queue times.
摘要:
A queue management system in accordance with present embodiments may include a data server system including a processor and memory. The queue management system may include an interface system of the data server system configured to receive a reservation request including an indication of a general time period of arrival of a guest to an area. Additionally, the queue management system may include a reservation right allotment system of the data server system configured to correlate a reservation slot for accessing an attraction to identification information for the guest. Further, the queue management system may include a detection system of the data server system configured to determine when a portable identification feature associated with the identification information has arrived to the area, and a reservation assignment system of the data server system configured to establish a reservation to access the attraction at a specific time window.
摘要:
A method for outputting information about a person includes identifying the person utilizing a wireless system upon entry into a physical location, and also includes locating the person within the physical structure. An engagement plan is retrieved based on the identification of the person and output. The engagement plan has information useful for interacting with the person. The engagement plan is created based at least in part on personal information of the person, the preferences of the person, and the past transactions of the person. A system for outputting information about a person, such as a customer, includes an object carried by the person, which is capable of being identified by a wireless system. A wireless interface communicates with the object. A computing device correlates the identification of the object with the person. An output device outputs information relating to the person.
摘要:
A cash dispensing banking machine that operates responsive to data bearing records includes a card reader that reads identifying data from a user card. The machine dispenses cash from a cash dispenser for a financial account without causing the card reader device to read data from a card corresponding to the financial account, when a determination indicates that a voice of the user corresponds to a particular recognized user stored in a data store in correlated relation with the financial account.
摘要:
A method for outputting information about a person includes identifying the person utilizing a wireless system upon entry into a physical location, and also includes locating the person within the physical structure. An engagement plan is retrieved based on the identification of the person and output. The engagement plan has information useful for interacting with the person. The engagement plan is created based at least in part on personal information of the person, the preferences of the person, and the past transactions of the person. A system for outputting information about a person, such as a customer, includes an object carried by the person, which is capable of being identified by a wireless system. A wireless interface communicates with the object. A computing device correlates the identification of the object with the person. An output device outputs information relating to the person.
摘要:
A data security system comprises a host processor, and a plurality of remote computers. Each remote computer provides biometric authentication of a user prior to responding to the user request for data access. The remote computers are handheld when in operational mode. A sensor in the handheld computer captures a biometric image while the remote computer is being used. The biometric sensor is positioned in such a way that the sensor enables the capture of the biometric image continually during computer usage with each request for access to secure data. The biometric authentication occurs in a seamless manner and is incidental to the data request enabling user identity authentication with each request to access secure data.