A computer-based customer tracking system uses a passive biometric identification for identifying customers. Neither the customer, nor any establishment personnel, are required to enter any informational data with respect to the customer; identification is done completely biometrically. Biometric identification information is sent to a central computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library, assigning a code or identification number to the file. Information with respect to the customers biometric data, along with any transactional information, are stored in the file. If prior activity information stored in the file exceeds a predetermined level, information with respect to the customers prior activity is retrieved from the file and sent to a terminal, preferably at the location of the transaction. Any new information from the transaction is then sent to the processor and stored for future access. The processor scans the files periodically, and deletes files for which the activity level in the file is below a certain predetermined level over a preselected time period.
Passive Biometric Customer Identification And Tracking System
A computer-based customer tracking system passively identifies customers. Acquired biometric identification information is sent to a computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library. If a match is found, said processor stores in the file that a repeat identification has occurred. If said processor is only able to reduce the number of possible matches to two or more files, personnel determines if a match certain has occurred. If prior activity information stored in the file exceeds a predetermined level, the prior activity information is retrieved from the file and sent to a terminal, preferably at the location of the transaction. New information from the transaction is stored for future access. The processor scans the files periodically, and deletes files which include activity level below a predetermined level over a preselected time period.
Passive Biometric Customer Identification And Tracking System
A computer-based customer tracking system passively identifies customers. Acquired biometric identification information is sent to a computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library. If a match is found, said processor stores in the file that a repeat identification has occurred. If said processor is only able to reduce the number of possible matches to two or more files, personnel determines if a match certain has occurred. If prior activity information stored in the file exceeds a predetermined level, the prior activity information is retrieved from the file and sent to a terminal, preferably at the location of the transaction. New information from the transaction is stored for future access. A selected or assigned personal identification number (PIN) reduces the time associated with, and improves the efficiency of, the identification process.
Apparatus And Method For Controlling And Preventing Compulsive Gaming
A system and method for passively tracking the play of gaming devices which allows compulsive gambling to be controlled. Players provide identification information and physical recognition data is acquired. For each player an account file and a file of the image data is stored. When the player plays the device, a camera scans the player and acquires image data which is compared to stored data to identify the player. Optionally, an infrared light source enhances the image data acquired by the camera. The identified player's account file is opened and data from the device representing parameters of play, e. g. amounts wagered, is allocated to the identified player's account file. Doe image data and account files can be stored to allocate parameters for unidentified players. The acquired image data is then used to identify undesirables, such as compulsive players, and control their activity including the automatic disablement of the device.
Passive Biometric Customer Identification And Tracking System
A computer-based customer tracking system passively identifies customers. Acquired biometric identification information is sent to a computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library. If a match is found, said processor stores in the file that a repeat identification has occurred. If said processor is only able to reduce the number of possible matches to two or more files, personnel determines if a match certain has occurred. If prior activity information stored in the file exceeds a predetermined level, the prior activity information is retrieved from the file and sent to a terminal, preferably at the location of the transaction. New information from the transaction is stored for future access. The processor scans the files periodically, and deletes files which include activity level below a predetermined level over a preselected time period.
A system and method is set forth for passively tracking the play of players playing gaming devices such as slot machines. Players provide identification information and facial recognition data is acquired as by a digital or video camera. For each player an account file and a file of the facial image data is stored. When the player plays the slot machine, a camera scans the player and acquires facial image data which is compared to stored data to identify the player. The identified player's account file is opened and data from the device representing parameters of play, e. g. amounts wagered is allocated to the identified player's account file for the purpose of providing comps and other benefits to the player. Doe image data and account files can be stored to allocate parameters for unidentified players. Further the device acquired image data can be compared with stored image data to identify undesirables such as slot cheats or the like.
A system and method is set forth for tracking the play of players playing gaming devices such as slot machines through passive identification of the players. Passive identification can be achieved by analysis of a player, such as facial image photography, infrared scan, scans of a player's iris or other features of the eye, and the like. Players provide identification information and physical recognition data is acquired as by a digital or video camera. For each player an account file and a file of the image data is stored. When the player plays the slot machine, a camera scans the player and acquires image data which is compared to stored data to identify the player. The identified player's account file is opened and data from the device representing parameters of play, e. g. amounts wagered, is allocated to the identified player's account file for the purpose of providing comps and other benefits to the player. Doe image data and account files can be stored to allocate parameters for unidentified players.
Youtube
portfolio- delete later
Duration:
1m 7s
Day 1 Story 4: Shonaleigh Cumbers tells How t...
Shonaleigh's website:...
Duration:
4m 47s
A Fully Dramatized Recording: The BFG
Adapted from The BFG (1982) by Roald Dahl Cover illustration by Quenti...
Duration:
1h 36m 36s
Connie Regan-Blake - Storyteller - Joke
Connie Regan-Blake Storyteller Connie@storywind... Subscribe to my ...
Duration:
1m 30s
debut performance from Shonaleigh Cumbers
Shonaleigh is a drut'syla (storyteller) from the Yiddish oral traditio...