Abstract: A computer-based customer tracking system passively identifies customers. Acquired biometric identification information is sent to a computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library. If a match is found, said processor stores in the file that a repeat identification has occurred. If said processor is only able to reduce the number of possible matches to two or more files, personnel determines if a match certain has occurred. If prior activity information stored in the file exceeds a predetermined level, the prior activity information is retrieved from the file and sent to a terminal, preferably at the location of the transaction. New information from the transaction is stored for future access. The processor scans the files periodically, and deletes files which include activity level below a predetermined level over a preselected time period.
Abstract: A system and method for passively tracking the play of gaming devices which allows compulsive gambling to be controlled. Players provide identification information and physical recognition data is acquired. For each player an account file and a file of the image data is stored. When the player plays the device, a camera scans the player and acquires image data which is compared to stored data to identify the player. Optionally, an infrared light source enhances the image data acquired by the camera. The identified player's account file is opened and data from the device representing parameters of play, e.g. amounts wagered, is allocated to the identified player's account file. Doe image data and account files can be stored to allocate parameters for unidentified players. The acquired image data is then used to identify undesirables, such as compulsive players, and control their activity including the automatic disablement of the device.
Abstract: A computer-based customer tracking system passively identifies customers. Acquired biometric identification information is sent to a computer processor, which searches files in a library for matching biometric data. If no match is found, the processor opens a new file in the library. If a match is found, said processor stores in the file that a repeat identification has occurred. If said processor is only able to reduce the number of possible matches to two or more files, personnel determines if a match certain has occurred. If prior activity information stored in the file exceeds a predetermined level, the prior activity information is retrieved from the file and sent to a terminal, preferably at the location of the transaction. New information from the transaction is stored for future access. A selected or assigned personal identification number (PIN) reduces the time associated with, and improves the efficiency of, the identification process.