WO2017027981A1 - Asset tracking and interrogation system and method - Google Patents

Asset tracking and interrogation system and method Download PDF

Info

Publication number
WO2017027981A1
WO2017027981A1 PCT/CA2016/050981 CA2016050981W WO2017027981A1 WO 2017027981 A1 WO2017027981 A1 WO 2017027981A1 CA 2016050981 W CA2016050981 W CA 2016050981W WO 2017027981 A1 WO2017027981 A1 WO 2017027981A1
Authority
WO
WIPO (PCT)
Prior art keywords
asset
event
location
sensor
records
Prior art date
Application number
PCT/CA2016/050981
Other languages
French (fr)
Inventor
Tony CASUSCELLI
Original Assignee
Probis Pty Ltd
FROST, H. Sam
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from AU2015903358A external-priority patent/AU2015903358A0/en
Application filed by Probis Pty Ltd, FROST, H. Sam filed Critical Probis Pty Ltd
Publication of WO2017027981A1 publication Critical patent/WO2017027981A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Definitions

  • the present invention relates to a system for tracking assets during their movement and/or storage within a designated environment and, or alternatively, interrogating long data in respect of the tracking.
  • the invention has particular, but not exclusive, utility to tracking and logging the passage of assets in the form of decks of playing cards within casinos and interrogating captured and logged data in respect of the tracking to investigate an event that may be associated with a departure from scheduled or expected movement and/or storage of the asset.
  • 'asset' is any piece of data associated with an article that is used in a game and is presented and handled by a participant in the game;
  • 'carton' is a container or box with a closure that holds a prescribed number of packages during transport from one location to another to and within a casino;
  • 'deck' is one or a plurality of sets of playing cards, a set typically comprising 52 cards - in the described mode, referring to modern casino parlance from a casino operators point of view, a deck comprises 8 sets of cards, namely 416 playing cards;
  • 'event' is a moment in time that an asset either enters or exits a prescribed proximity of a sensor, or both enters and exits the prescribed proximity of the sensor;
  • 'package' is a paper or cardboard wrapped deck of shuffled playing cards;
  • 'tray' is an open container for carrying packages or vaults in preference to a carton;
  • Machine readable tags are often applied to articles for efficient inventory management.
  • Product barcodes are ubiquitous throughout retailing and wholesaling. Barcodes are cheap and easy to attach to products.
  • reading barcodes requires a laser scanner to have direct line of sight to the barcode. Successful scanning can often take multiple swipes and interference from extraneous light sources can affect the scanning accuracy.
  • RFID Radio frequency identification
  • RFID tags are passive devices with a miniature coil antenna and data storage. These may be embedded or attached to labelling or the products themselves for reading with a suitable scanner. The scanner generates a fluctuating electromagnetic field which powers the RFID tag to transmit a response identifying the tag.
  • the scanning range is typically of the order of a few feet but 'line of sight' is not required and successful scans are more reliable.
  • RFID tags are well suited to supply chain and inventory management as goods will typically need to pass through specific portals or control points during the production and distribution process. Scanners at these control points capture the tag identities and immediately update the database.
  • RFID tags are significantly more expensive than barcodes and have a physical size and structure making them inappropriate for embedding or attaching to some articles.
  • FIG A the floor plan layout of a modern casino set up to play baccarat is shown illustrating the general methodology adopted for moving playing cards from their entry into the casino to their exit.
  • This drawing is a modification of Fig 2 of the patent specification that is the subject of Australian Patent Application AU2014201757, which includes an accurate description of a methodology deployed in casinos for handling playing cards from the time that they are made up in a factory 1 ready for play, packed in cartons for transporting and entry into the backroom 2 of a casino where they are stored ready to supply tables 3 on the gaming floor 4.
  • AU2014201757 and AU2014210600 describe installing a dedicated and elaborate camera reading system specifically adapted to read barcodes on the packages or cartons containing the decks of playing cards on a substantially continuous basis, both during transportation from one location to another within the casino, and during storage within the pit storage facility 5 and the table storage facilities 6, to create a data log that can be used in conjunction with the video surveillance system of the casino, the cost and practical inefficacy of such a system makes it unviable for a casino to adopt.
  • the present invention provides an asset tracking system for monitoring and recording the movement of assets within a designated environment, the system comprising:
  • each of the assets having remotely readable identification data associated therewith;
  • the sensors including:
  • each sensor generating an event signal in respect of an event when an asset either enters or departs, or both enters and departs, the prescribed proximity of the sensor, the event signal being indicative of the identification data associated with the particular asset causing the event;
  • the event signal either intrinsically functioning as a signal indicative of the identity or location of the sensor generating the event signal, or the sensor generating the event signal separately generating an identity or location signal; and a processor for receiving the event signal generated by a sensor, and if generated, the identity or location signal, and creating a time-stamped event record in a database associating the asset with the event and the identity or location of the sensor generating the event signal;
  • An asset tracking system simplifies compliance with any auditing requirements and assists with identifying the cause of any breaches of required protocol. With the collection of auxiliary data and only associating the relevant parts of that auxiliary data with the location data, it is possible to determine when an asset is handled or moved inappropriately, as well as how and why the error happened. In most organisations that handle articles or documents of value, there is an extensive CCTV surveillance system. The present asset tracking system is easily incorporated with the existing CCTV infrastructure at minimal cost to substantially enhance the information captured.
  • the processor is configured to compare the location records and the auxiliary records with predetermined parameters to identify any records not meeting the parameters.
  • the parameters may include:
  • the processor may be configured to use a history of the location records and the auxiliary records already stored in the database to identify any anomalous location or auxiliary records.
  • the processor may also be configured to determine a degree of anomaly for any anomalous location or auxiliary records and generate an alarm notification if the degree anomaly exceeds the threshold.
  • the processor is configured to generate a list of the anomalous location and auxiliary records ranked according to the degree of anomaly.
  • the conveyance is a wheeled platform such a trolley for manual movement throughout the designated environment, the wheeled platform having at least one of the auxiliary data recorders for generating location records from the tags on the containers placed on the trolley.
  • the trolley sensor may be wirelessly connected of the location records to the processor.
  • a preferred form of trolley includes a staff ID sensor for identifying the personnel manually operating the trolley and transmitting the personnel ID to the processor for storage as one of the auxiliary records.
  • the trolley may also have a payload weight sensor for sensing changes to the payload weight and transmitting weight data to the processor for storage as one of the auxiliary records.
  • the trolley is robotic and has a powered drive that avoids the need for manual actuation.
  • the robotic trolley may be controlled by the processor for the system or use on board processing to travel through the designated environment.
  • the trolley may have a secure enclosure for the containers during transit which is unlocked, remotely or locally, at one or more of the locations throughout the designated environment.
  • the auxiliary records include video data of the conveyance at one or more of the locations, and or in transit between locations.
  • the staff ID sensor is a proximity sensor configured to scan ID tags worn by authorised personnel such that the I D tag is within the range of the staff ID sensor when manually moving the trolley such that moving the ID tag into, and out of the range of the staff ID sensor is captured and transmitted to the processor for storage as one of the auxiliary records.
  • auxiliary data recorders used in the system also include biometric sensors for one or more of:
  • the staff ID checks can be dual verifications of the ID tag as well as a biometric check. Inconsistent results from the staff ID checks can generate an immediate alarm notification in the new system.
  • the designated environment is a casino and the containers are card vaults for holding decks of approved cards, the decks being loaded into the vault upon delivery at the casino receiving dock, stored or transported in the vaults to pit stands on gaming floors in the casino, and following use in the various table based card games, loaded back into the vaults and transported to a designated location for destruction.
  • the designated environment is defined by a physical or building premises occupied by an organisation such as a casino.
  • the designated environment may also be two or more separate buildings or premises such that the containers are moved between the buildings or premises, and the auxiliary include GPS data generated by a GPS locator.
  • a method for asset tracking including monitoring and recording the movement of assets within a designated environment, the method comprising:
  • an event signal in respect of an event when an asset either enters or departs, or both enters and departs, the prescribed proximity, the event signal being indicative of the identification data associated with a particular asset causing the event;
  • the event signal either intrinsically functioning as the signal indicative of the identity or location of the reading, or generating an event signal separately generating an identity or location signal;
  • Fig A is a schematic diagram showing the typical layout of a casino having a gaming floor dedicated to playing baccarat and showing the typical movement of assets in the form of playing cards from the time that they enter the casino to the time that they exit the casino;
  • Fig 1 is a schematic diagram, similar to Fig A, but showing the application of the asset tracking system and its methodology in accordance with the preferred embodiment
  • Fig 2 is a perspective view of an asset in the form of a deck of playing cards; wrapped in a package and sealed in a vault in accordance with the preferred embodiment;
  • Fig 3 shows video surveillance of the RFID tag printer and a tray of vaults to which RFID tags are applied in the card storage room of the casino in accordance with the preferred embodiment
  • Fig 4 shows a trolley used for conveying assets from the card storage room to the pit store and from the pit store to the used cards store room in accordance with the preferred embodiment
  • Fig 5 shows video surveillance of a pit cabinet in accordance with the preferred embodiment
  • Fig 6 shows video surveillance of a table with a dealer and a player ready to play a game of baccarat at the table in accordance with the preferred embodiment
  • Fig 7 are perspective views of two different forms of ministorage units with their closures removed in accordance with the preferred embodiment
  • Fig 8 is a plan view of the table shown in Fig 7;
  • Fig 9 shows a plurality of storage cabinets in the used cards store room in accordance with the preferred embodiment
  • Fig 10 shows a staff member attending a shredder in the card destruction room in accordance with the preferred embodiment
  • Fig 1 1 is a schematic diagram showing the process flow with respect to asset identification data capture and login with events as they occur in sequence, and their association with the video surveillance system of the casino.
  • a preferred embodiment of the best mode is specifically concerned with the passage of assets associated with decks of playing cards for playing baccarat on tables in the gaming room of a casino.
  • the tables are specifically designed for allowing multiple players to play baccarat involving a single dealer representing the house or banker.
  • the preferred embodiment is directed towards the monitoring and recording of the passage or movement of these assets throughout the casino by an asset tracking system following a prescribed methodology.
  • This methodology employs data capturing of identification data associated with each asset by strategically placed sensors throughout the casino, and logging of events associated with the requisite passage of the assets within a prescribed proximity of the sensors.
  • the particular methodology involved permits subsequent interrogation of the asset in conjunction with the video surveillance system of the casino in a very efficient and convenient way that enables rapid investigation of events that may be associated with the irregular passage or movement of an asset, or unusual occurrence associated with one or more assets at a particular table during a period of time.
  • Fig A showed the typical movement of assets in the form of playing cards from their entry into a casino to their exit.
  • Fig 1 shows how the system and methodology of the present invention is applied to a similar form of casino 1 1 to that shown in Fig A.
  • the casino 1 1 has a card store room 13, a gaming room 15 including a pit store 16 and tables 17, a used cards store room 18, a card destruction room 19 and a surveillance room 21 , which is set up to monitor the video surveillance system of the casino that includes the CCTV cameras 10 strategically located to cover all areas of the casino.
  • the asset tracking system 100 associated with the casino 1 1 comprises a plurality of sensors, divided into multiple recording security sensors 102 and single recording security sensors 104, an RFID scanner 105, a processor 106 and a database 108, all interconnected to form parts of a local area network 200.
  • the sensors comprise RFID antennae that transmit an RF field at a prescribed frequency, being 900 MHz under the Australian standard and 31 MHz under the European standard, within a prescribed proximity. This RF field is able to trigger the transponder within an RFID tag to issue an RF signal, which is remotely readable by the sensor, and which includes identification data associated with the RFID tag.
  • the RFID tags are divided into passive RFID tags 23 and active RFID tags 31 .
  • a passive RFID tag 23 does not require any battery power, and can project an RF signal capable of being read within a 6 metre range.
  • An active RFID tag 31 does require battery power and can project an RF signal capable of being read within a 130 metre distance.
  • Sensors are strategically placed in different locations around the casino 1 1 to record events associated with passage of an asset, transport media conveying an asset and staff members involved with handling and asset.
  • Multiple recording security sensors 102 are located in a pit cabinet 33 functioning as a pit storage facility in the pit store 16, a ministorage unit 35 functioning as the table storage facility at a table 17, within the tables 17 themselves to detect assets at the table and in storage cabinets 37 in the used cards store room 18.
  • Single recording security sensors 104 are located in the card store room 13, by virtue of the RFID scanner 105, above the security door 39 allowing access between the card store room 13 and the gaming room 15, above the security door 41 allowing access between the gaming room 15 and the used cards store room 18, at the shredder 43 in the card destruction room 19 and being surveillance room 21 .
  • the processor 106 and database 108 may physically be located in the surveillance room 21 and be remotely accessed by an administrator 1 10 and a server 1 12 to provide supplementary support.
  • the scanner 105 is located in the card store room 13 and works in conjunction with a computer terminal 1 14 operated by a staff member 1 16, under the control of an RFID tag dispensing and scanning software application working in conjunction with the processor 106 and database 108.
  • the assets are typically delivered on pallets 22 from a factory, such as factory 1 of Fig A, in different ways depending upon the particular casino.
  • the decks making up each asset are usually pre-shuffled in a random manner under strict security at the factory, wrapped into packages to form an asset and then packed into cartons that are then stacked on a pallet for delivery to the card store room 13 of the casino.
  • approved decks of playing cards are delivered to the casino and shuffled in a controlled and secure manner in the card store room 13 and wrapped in packages on site to form an asset.
  • each asset, along with the carton in which it is packed, if applicable, is required to be tagged with a passive RFID tag 23 when it is brought into the card store room 13.
  • Each passive RFID tag 23 has remotely readable identification data associated with it in the form of a unique manufacturing identification code, and an encrypted asset tracking code and a status code which are able to be encoded with it.
  • Each passive RFID tag 23 has its unique manufacturing identification code and a corresponding asset tracking code and an initial status code, preprogrammed into a look up table stored within the database 108.
  • the look up table may be in the form of a simple flat file database such as ExcelTM, or alternatively may be implemented in a more complex relational database form , and will be described in more detail later.
  • the tagging process is performed at an RFID tagging station 24 within the card store room 13 in a manner that is adapted to suit the particular methodology adopted by the casino for delivering assets to the gaming floor.
  • there are two principal methodologies employed one involving the assets being delivered in cartons designed to transfer the assets to the pit store 16 and subsequently to the tables 17, and the other involving the assets being delivered in card vaults 25 disposed upon trays 27 to the pit store 16 and subsequently to the tables 17.
  • a card vault 25 includes a container portion 25a particularly sized to fully accommodate a package comprising a single deck, and a slidable lid 25b which is able to be closed to fully encapsulate the package within the container.
  • the tagging of the assets with passive RFID tags 23 is performed by a staff member 1 16 under the guidance of the RFID tag dispensing and scanning software application previously mentioned.
  • the application software functions through a user interface that steps the staff member 1 16 through dispensing a passive RFID tag with an accompanying barcode from an RFID tag and barcode dispenser 26, and operating the RFID scanner 105 to encode and activate the RFID tag.
  • the RFID tag and barcode is in the form of an adhesive label 29, which when used with a card vault 25, is applied to the card vault to act as a frangible seal between the lid and the side of the card vault.
  • the label 29 functions to provide a tamper evident indication that the vault has been opened.
  • the RFID tag 23 is read and written to by the RFID scanner 105, which in the present embodiment is a handheld scanner, to perform the following functions: • read the unique manufacturing identification code of the RFID tag and locate this within the look up table of the database 108;
  • the RFID scanner 105 when the RFID scanner 105 is triggered to perform the aforementioned functions, it operates as a single recording security sensor 104. In this manner, it signals the processor 106 to invoke a time stamping process to store a record of the time that be RFID tag 23 was activated in the look up table of the database, associated with the tracking code entry of the particular asset being tagged. This timestamp signifies when the asset became active, ready for passage from the card store room 13 to the gaming room 15.
  • the generating of the timestamp at this stage also constitutes the first event in the tracking of the particular asset being tagged in its life cycle within the casino 1 1 .
  • Activating the time stamping process also prompts the processor 106 to capture and store in the look up table associated with the tracking code of the particular asset, the identification details of the staff member 1 16 performing the tagging process associated with the first event of the particular asset tracking.
  • These details in the present embodiment are derived from the login details entered by the staff member 1 16 into the computer terminal 1 14 for the purposes of invoking the RFID tag dispensing and scanning software application to perform the tagging operation being undertaken.
  • other means of identifying the staff member 1 16 can be employed, such as recording an RFID tag provided on the access control card of the staff member, which is detected by either a multiple recording security sensor 102 or a single recording security sensor 104 located at the RFID tagging station 24.
  • activating the time stamping process also prompts the processor 106 to interact with the incoming stream of the video surveillance system of the casino 1 1 and store a snippet of the video data footage generated by the CCTV camera 10a located above the RFID tagging station 24 in a storage location within the database 108 that is linked with the first event associated with the asset tracking code.
  • this snippet is five minutes in duration preceding the timestamp, and five minutes in duration subsequent to the timestamp.
  • the trolley also is equipped with a multiple recording security sensor 102 for tracking each of the assets located thereon during transit.
  • the multiple recording security sensor 102 is wirelessly connected to the processor 106. Reading of the identification data of the assets constitutes an event, and each is time stamped for recording in the look up table in connection with the tracking code of the particular asset read.
  • the trolley 28 has an active RFID tag 31 associated with it, which has its tracking code pre-recorded into the look up table to identify the trolley to which it is attached and recorded events associated with its passage throughout the casino.
  • the trolley has an active RFID tag 31 as opposed to a passive RFID tag 23, in order to ensure that it is read when it passes under the single recording security sensors of the security doors 39 and 41 and to distinguish it from the passive RFID tag signals.
  • Each reading of the active RFID tag 31 of a trolley 28 passing a security door 39 or 41 constitutes an event which is time stamped by the processor 106 and recorded in the look up table under the event associated with the tracking code of the trolley.
  • the identification details of the staff member driving the trolley will also be recorded alongside the particular event for the trolley 28 and be time stamped, as well as the particular event for each asset disposed on the trolley, by way of an RFID tag provided on the access control card of the staff member, as previously described with the first event.
  • the trolley sensor 102 may also include a weight sensor to capture the payload weight of the trolley for storage as an auxiliary data record.
  • the tracking system in the alternative embodiment monitors and records the trolley 28 and assets transported by it throughout the designated environment of the casino 25.
  • the sensor 102 on the trolley 28 creates an association between the trolley ID and each of the assets it carries.
  • the sensor 102 on the trolley 28 triggers location sensors 104 at fixed points along the trolley path.
  • the location sensors 104 may be triggered by proximity and therefore installed in locations such as doorways and elevators. Triggering a location sensor 104 can in turn trigger the video camera 22 to pan left, right or otherwise change is field of view.
  • a casino pit is typically two adjacent rows of gaming tables arranged back to back so that the public play from the outer sides of the table but the area between the two rows of tables is restricted to casino personnel 1 16.
  • Assets are typically stored in the pit cabinet 33.
  • the pit cabinet 33 is purpose-built, having a series of shelves with multiple recording security sensors 102 in the form of RFID antennae are located at the top and bottom of each cabinet or opposing sides of the cabinet so that the entire contents of the cabinet fall within the prescribed proximity of the sensors. In this manner, all assets located in the pit cabinet 33 are continuously read, typically at a cycle of 1000 times per minute.
  • the pit cabinet 33 having multiple recording security sensors 102 establishes an event when an asset enters the prescribed proximity of any of the sensors 102 by being placed into the cabinet, which is time stamped and another event when an asset exits the prescribed proximity of any of the sensors by being retrieved from the cabinet, which is also time stamped.
  • This periodic and continuous reading of the assets between the events causes the processor 106 to create continuous time stamped records in the look up table associated with the event corresponding to the particular asset tracking code. In this manner, it is possible to verify the entire duration of an asset being stored in the pit cabinet 33.
  • the cartons are removed from the trolley 28 and located in the cabinet.
  • assets being card vaults
  • the card vaults 3 are removed from the trolley 28 and loaded into the pit cabinet 33. In either case, the assets are automatically sensed and the look up table records updated (and created) accordingly.
  • a ministorage unit 35 is a fixed to the underside of the table 17, adjacent the dealer 45 and approximate to the shoe 49 for the purposes of dealing the cards.
  • the mini storage cabinets can come in different designs and sizes, as shown in Fig 7, but each are equipped with a multiple recording security sensor 102 for activating the passive RFID tags 23 of each asset located within the unit at a rate of approximately 1000 times per minute and transferring the identification data associated with the asset to the processor 106 for recording in the look up table of the database 108.
  • each ministorage unit 35 has a locking closure which can be activated by the access control card of a staff member accessing the cabinet for either placing new assets that are in an active state within the cabinet or taking out used assets that are in an inactive state. Accordingly, the identification details of the staff member are recorded with each asset at the time of the event.
  • the dealer 45 is able to separately access the ministorage cabinet 35 using their access control card and in a similar manner are logged alongside the event recorded for each asset detected within the unit at the time of the event.
  • the seal of the card vault 25 is broken, the lid 25b, the asset extracted from the container portion 25a and is placed on the table 17 ready to be cut.
  • the container portion 25b is then placed in a card discharge slot 51 to constitute a discharge receptacle for discarded cards, which technically then changed to a used or inactive status.
  • the barcode and RFID adhesive label 29 forming the seal is separated from the card vault and placed inside the container portion 25b to continue to be read when the container portion 25b is positioned in the discharge slot 51 .
  • the card vault is closed and returned to the ministorage unit 35 by the dealer 45.
  • another event occurs, whereupon its sequence causes the processor 106 to update the status of the asset in the look up table as being inactive. Thereafter, the asset is expected to remain in an inactive state until it is destroyed.
  • the system records a timestamp alongside the event associated with the tracking codes of each asset received during the event along with the identification details of the dealer 45 accessing the ministorage unit 35.
  • mini storage unit 35 is full of used and inactive assets, it is emptied by a staff member and the used assets returned to a used asset section of the pit cabinet 33. Again, returning the used assets to the pit cabinet 33 triggers another event, which is time stamped for each of the inactive assets entering the pit cabinet, which are then continuously tracked until taken from the pit cabinet.
  • this video data becomes an auxiliary data record associated that is recorded as in the previous events for each of the asset tracking codes received by the processor 106 at the instigation of subsequent events on the way to the final destruction of each asset.
  • an event will again be triggered by virtue of the trolley 28 passing through the security door 41 of the used cards store room 18, whereupon the cards become denatured and are unloaded from the trolley 28 into the storage cabinets 37 located in the room.
  • the storage cabinets 37 are equipped with multiple recording security sensors 102, similar to the pit cabinet 33 and ministorage units 35. Consequently, loading of the inactive assets into the storage cabinets 37 triggers another event and appropriate identification data is logged and timestamped within the look up table.
  • the staff identification details are also captured, while the CCTV camera 10 in the store room 18 provide additional auxiliary data.
  • the data logged by the asset tracking system enables the item to be used as an index for accessing video footage of the video surveillance system of the casino 1 1 .
  • the asset tracking system enables an identified asset and its recorded timestamp logs associated with prescribed events as a filter for interrogating the video footage in a controlled and efficient manner.
  • the system includes an interrogation software application that can be invoked by a user interface accessing the processor 106 either from within the surveillance room 21 or remotely.
  • the interrogation software application permits the database 108 and the look up table stored therein to be accessed on an asset by asset basis.
  • Accessing an asset allows all of the events that were logged in connection with its lifetime to be accessed in a time reference manner as a consequence of the time stamping.
  • the timing of particular events arising from the time stamping and sensor location or identity, events tying the asset to proximity to a particular CCTV camera viewing the event enables the video surveillance records of the casino 1 1 to be quickly accessed.
  • the interrogation software is designed with processes to access the video surveillance record data, extract footage occurring during prescribed periods of time before and after the event, e.g. five minutes before in five minutes after, and present this footage to a user selecting the event associated with the asset, provides a very efficient and cost-effective way of investigating an event, without having to store all of the video surveillance data as part of the asset tracking system..
  • FIG. 12 The overall methodology of the asset tracking and interrogation system is shown schematically in Figure 12.
  • Each of the CCTV cameras identified show a sequence number of an event associated with asset movement from the loading dock where a pallet 22 of assets into the casino 1 1 to the card store room 13 or shuffle room, if applicable, where the initial RFID tagging takes place, then out to the gaming room 15 via a trolley 28 to be delivered to the pit store 16.
  • Any number of check points can be installed and each point can be covered with searchable visual and data information such as operator, location and asset identification.
  • the methodology proceeds with the asset tracking continuing as the playing cards of the asset come into play at a table 17 and transported to the used cards store room 18 for temporary storage until ultimate destruction in the card destruction room 19.
  • Each event has video data recorded by the CCTV cameras 1 to 10, which can be conveniently accessed using the interrogation system application.
  • Particularly sophisticated versions of the system may incorporate biometric identity checks to confirm staff ID'S.
  • Video data can be analysed by the processor using facial recognition algorithms to highlight any inconsistencies between the staff ID cards and the biometric analysis.
  • Retinol scan, fingerprint and voice recognition technologies are also easily incorporated into the system if the risks warrant the additional expense.

Abstract

An asset tracking system for monitoring and recording the movement of assets, each having remotely readable identification data associated therewith, within a designated environment. A plurality of sensors disposed within the designated environment include: (i) a multiple recording security sensor for location in an area where the asset is stored or comes into engagement with a user; and (ii) a single recording security sensor for location in an area where the asset is in transit. Each sensor generates an event signal in respect of an event when an asset enters, departs, or both enters and departs, the prescribed proximity of the sensor, the event signal being indicative of the identification data associated with the particular asset causing the event. A processor for continuously receiving the event signals respective identity or location signals generated by sensors creates time-stamped event records in a database associating the asset with the event and the identity or location of the sensor generating the event signal.

Description

ASSET TRACKING AND INTERROGATION SYSTEM AND METHOD
Field of the Invention
[01] The present invention relates to a system for tracking assets during their movement and/or storage within a designated environment and, or alternatively, interrogating long data in respect of the tracking. The invention has particular, but not exclusive, utility to tracking and logging the passage of assets in the form of decks of playing cards within casinos and interrogating captured and logged data in respect of the tracking to investigate an event that may be associated with a departure from scheduled or expected movement and/or storage of the asset.
[02] Throughout the specification, unless the context requires otherwise, the word "comprise" or variations such as "comprises" or "comprising", will be understood to imply the inclusion of a stated integer or group of integers but not the exclusion of any other integer or group of integers.
[03] Furthermore, the following technical terms used in this specification have the prescribed meanings:
'asset' is any piece of data associated with an article that is used in a game and is presented and handled by a participant in the game;
'carton' is a container or box with a closure that holds a prescribed number of packages during transport from one location to another to and within a casino;
'deck' is one or a plurality of sets of playing cards, a set typically comprising 52 cards - in the described mode, referring to modern casino parlance from a casino operators point of view, a deck comprises 8 sets of cards, namely 416 playing cards;
'event' is a moment in time that an asset either enters or exits a prescribed proximity of a sensor, or both enters and exits the prescribed proximity of the sensor;
'package' is a paper or cardboard wrapped deck of shuffled playing cards; 'tray' is an open container for carrying packages or vaults in preference to a carton;
'vault' is a sealable container typically made from plastic that contains a package. Background Art
[04] The following discussion of the background art is intended to facilitate an understanding of the present invention only. It should be appreciated that the discussion is not an acknowledgement or admission that any of the material referred to was part of the common general knowledge as at the priority date of the application.
[05] Machine readable tags are often applied to articles for efficient inventory management. Product barcodes are ubiquitous throughout retailing and wholesaling. Barcodes are cheap and easy to attach to products. However, reading barcodes requires a laser scanner to have direct line of sight to the barcode. Successful scanning can often take multiple swipes and interference from extraneous light sources can affect the scanning accuracy.
[06] Radio frequency identification (RFID) technology provides more sophisticated machine readable tags. Typically, RFID tags are passive devices with a miniature coil antenna and data storage. These may be embedded or attached to labelling or the products themselves for reading with a suitable scanner. The scanner generates a fluctuating electromagnetic field which powers the RFID tag to transmit a response identifying the tag. The scanning range is typically of the order of a few feet but 'line of sight' is not required and successful scans are more reliable.
[07] In light of this, RFID tags are well suited to supply chain and inventory management as goods will typically need to pass through specific portals or control points during the production and distribution process. Scanners at these control points capture the tag identities and immediately update the database. However, RFID tags are significantly more expensive than barcodes and have a physical size and structure making them inappropriate for embedding or attaching to some articles.
[08] An example of where the use of bar codes and RFID tags finds great utility is in casinos and table gambling venues for the purposes of tracking assets, such as playing cards. There are strict regulations and security controls associated with the handling of assets within casinos, especially playing the cards, due to the propensity of persons to otherwise tamper with and defraud the casino. This arises from the current methodology adopted in preparing decks of cards ready for use to play a betting or wagering game at a table in a casino equipped with this modern technology.
[09] In Fig A, the floor plan layout of a modern casino set up to play baccarat is shown illustrating the general methodology adopted for moving playing cards from their entry into the casino to their exit. This drawing is a modification of Fig 2 of the patent specification that is the subject of Australian Patent Application AU2014201757, which includes an accurate description of a methodology deployed in casinos for handling playing cards from the time that they are made up in a factory 1 ready for play, packed in cartons for transporting and entry into the backroom 2 of a casino where they are stored ready to supply tables 3 on the gaming floor 4. From the backroom 2, they are then transported to a pit storage facility 5, from which they are then distributed by staff to replenish stock at table storage facilities 6 adjacent a dealer at each of the tables 3, from where they are introduced into a game, typically via a shoe, as described in AU2014201757. Once the playing cards are used, they are collected from a discard area at each table, and transported to a store room 7 for denaturing and storage, prior to destruction in a card destruction room 8.
[10] As described in AU2014201757 and also in the patent specification that is the subject of Australian Patent Application AU2014210600 and US Patent 7,492,267, due to the propensity of misappropriation of decks of playing cards and the implications arising from such, elaborate systems have been proposed to track the movement of playing cards on a continuous basis, at least to the gaming floor, using identification code tracking and logging of card packages and cartons.
[11] These patent specifications highlight the fact that the supply of the approved playing cards to casinos is strictly controlled and the subject of ever increasing government regulation. Given the potential for skilled card cheats to defraud players and casinos of large sums, casino operators themselves are highly motivated to maintain strict control of their stock of genuine playing cards and are considering the adoption of systems such as those which are the subject of aforementioned patent specifications to quickly identify any breach of normal protocols and any personnel associated with that breach.
[12] While RFID technology is well suited to monitoring valuable assets down to the playing card level to individually log the location of each and every card in the casino, the cost and physical structure of RFID tags make them impractical for embedding in each and every card. Apart from the significant cost, the structure of the tag itself adds localised bulk and stiffness in each card which is unappealing to players familiar with playing cards having a certain thickness and stiffness.
[13] Hence the systems and methodologies described in the aforementioned patent specifications have been proposed as a compromise by applying the identification codes to the packages and/or cartons and/or the trolleys and/or the staff used to transport the playing cards around the casino, and monitoring these assets and transport media continuously. This enables the actual movement of the assets to be tracked in real time against their planned movement, whereupon any unscheduled deviation from their planned movement can trigger an alert to the casino and supplement the existing video surveillance systems operated and monitored from a surveillance room 9 is one's file 12 is all employing CCTV cameras 10 located at strategic locations throughout the casino and adopted to investigate and ascertain the circumstance that led to the deviation.
[14] Although AU2014201757 and AU2014210600 describe installing a dedicated and elaborate camera reading system specifically adapted to read barcodes on the packages or cartons containing the decks of playing cards on a substantially continuous basis, both during transportation from one location to another within the casino, and during storage within the pit storage facility 5 and the table storage facilities 6, to create a data log that can be used in conjunction with the video surveillance system of the casino, the cost and practical inefficacy of such a system makes it unviable for a casino to adopt.
[15] In particular, the volume of data generated and the difficulty associated with correlating the casino video surveillance system data with the package tracking system creates serious logistic problems to effectively investigate a deviation from the scheduled package movement or storage.
[16] With these competing issues in mind, there is a need for a system and method of asset tracking that accurately monitors individual assets within a designated environment that maintains the necessary degree you security integrity in a more practical and cost-effective manner, and which also, or alternatively, may provide a more efficient way of interrogating logged data in respect of the asset tracking to investigate a deviation from the scheduled or expected movement and/or storage of an asset.
Disclosure of the Invention
[17] Accordingly, the present invention provides an asset tracking system for monitoring and recording the movement of assets within a designated environment, the system comprising:
a plurality of assets, each of the assets having remotely readable identification data associated therewith;
a plurality of sensors throughout the designated environment for reading the identification data of an asset when the asset comes into a prescribed proximity of a sensor and generating a signal indicative of the identity or location of the sensor; the sensors including:
(i) a multiple recording security sensor for location in an area of the designated environment where the asset is stored or comes into engagement with a user; and
(ii) a single recording security sensor for location in an area of the designated environment where the asset is in transit;
each sensor generating an event signal in respect of an event when an asset either enters or departs, or both enters and departs, the prescribed proximity of the sensor, the event signal being indicative of the identification data associated with the particular asset causing the event;
the event signal either intrinsically functioning as a signal indicative of the identity or location of the sensor generating the event signal, or the sensor generating the event signal separately generating an identity or location signal; and a processor for receiving the event signal generated by a sensor, and if generated, the identity or location signal, and creating a time-stamped event record in a database associating the asset with the event and the identity or location of the sensor generating the event signal;
wherein the processor creates time stamped event records periodically on a continuous basis in response to event signals generated by a multiple recording security sensor, and a single time stamped event record in response to an event signal generated by a single recording security sensor. [18] An asset tracking system according to the present invention simplifies compliance with any auditing requirements and assists with identifying the cause of any breaches of required protocol. With the collection of auxiliary data and only associating the relevant parts of that auxiliary data with the location data, it is possible to determine when an asset is handled or moved inappropriately, as well as how and why the error happened. In most organisations that handle articles or documents of value, there is an extensive CCTV surveillance system. The present asset tracking system is easily incorporated with the existing CCTV infrastructure at minimal cost to substantially enhance the information captured.
[19] Preferably, the processor is configured to compare the location records and the auxiliary records with predetermined parameters to identify any records not meeting the parameters.
[20] The parameters may include:
• a time period between capturing two successive location records;
• one or more of the location records being captured in non-designated locations for any of the containers;
• failure to capture one or more of the location records for any of the containers designated locations;
• non-authorised personnel at pre-determined locations;
• failed or conflicting personnel ID checks; and
• sensing two or more of the containers with the same identification data.
[21] The processor may be configured to use a history of the location records and the auxiliary records already stored in the database to identify any anomalous location or auxiliary records.
[22] The processor may also be configured to determine a degree of anomaly for any anomalous location or auxiliary records and generate an alarm notification if the degree anomaly exceeds the threshold. Preferably, the processor is configured to generate a list of the anomalous location and auxiliary records ranked according to the degree of anomaly.
[23] Preferably, the conveyance is a wheeled platform such a trolley for manual movement throughout the designated environment, the wheeled platform having at least one of the auxiliary data recorders for generating location records from the tags on the containers placed on the trolley. The trolley sensor may be wirelessly connected of the location records to the processor. A preferred form of trolley includes a staff ID sensor for identifying the personnel manually operating the trolley and transmitting the personnel ID to the processor for storage as one of the auxiliary records. The trolley may also have a payload weight sensor for sensing changes to the payload weight and transmitting weight data to the processor for storage as one of the auxiliary records.
[24] In more sophisticated forms of the system, the trolley is robotic and has a powered drive that avoids the need for manual actuation. The robotic trolley may be controlled by the processor for the system or use on board processing to travel through the designated environment. The trolley may have a secure enclosure for the containers during transit which is unlocked, remotely or locally, at one or more of the locations throughout the designated environment.
[25] Preferably, the auxiliary records include video data of the conveyance at one or more of the locations, and or in transit between locations.
[26] Preferably, the staff ID sensor is a proximity sensor configured to scan ID tags worn by authorised personnel such that the I D tag is within the range of the staff ID sensor when manually moving the trolley such that moving the ID tag into, and out of the range of the staff ID sensor is captured and transmitted to the processor for storage as one of the auxiliary records.
[27] Preferably the auxiliary data recorders used in the system also include biometric sensors for one or more of:
• fingerprint recognition;
• palm print recognition;
• facial recognition;
• retinol scan;
• Voice recognition.
[28] In this way, the staff ID checks can be dual verifications of the ID tag as well as a biometric check. Inconsistent results from the staff ID checks can generate an immediate alarm notification in the new system.
[29] In a particularly preferred form, the designated environment is a casino and the containers are card vaults for holding decks of approved cards, the decks being loaded into the vault upon delivery at the casino receiving dock, stored or transported in the vaults to pit stands on gaming floors in the casino, and following use in the various table based card games, loaded back into the vaults and transported to a designated location for destruction.
[30] Typically the designated environment is defined by a physical or building premises occupied by an organisation such as a casino. However, the designated environment may also be two or more separate buildings or premises such that the containers are moved between the buildings or premises, and the auxiliary include GPS data generated by a GPS locator.
[31] In accordance with another aspect of the present invention, there is provided a method for asset tracking including monitoring and recording the movement of assets within a designated environment, the method comprising:
reading identification data of an asset when the asset comes into a prescribed proximity and generating a signal indicative of the identity or location of the reading;
generating an event signal in respect of an event when an asset either enters or departs, or both enters and departs, the prescribed proximity, the event signal being indicative of the identification data associated with a particular asset causing the event;
the event signal either intrinsically functioning as the signal indicative of the identity or location of the reading, or generating an event signal separately generating an identity or location signal;
receiving the event signal generated, and if generated, the identity or location signal, and creating a time stamped event record associating the asset with the event and the identity or location of the reading that generated the event signal; and time stamping event records periodically on a continuous basis in response to event signal is generated in response to an event signal.
Brief Description of the Drawings
[32] The invention will be better understood having regard to the best mode for carrying out the invention, which is described by way of example only with reference to the accompanying drawings, in which:
Fig A is a schematic diagram showing the typical layout of a casino having a gaming floor dedicated to playing baccarat and showing the typical movement of assets in the form of playing cards from the time that they enter the casino to the time that they exit the casino;
Fig 1 is a schematic diagram, similar to Fig A, but showing the application of the asset tracking system and its methodology in accordance with the preferred embodiment;
Fig 2 is a perspective view of an asset in the form of a deck of playing cards; wrapped in a package and sealed in a vault in accordance with the preferred embodiment;
Fig 3 shows video surveillance of the RFID tag printer and a tray of vaults to which RFID tags are applied in the card storage room of the casino in accordance with the preferred embodiment;
Fig 4 shows a trolley used for conveying assets from the card storage room to the pit store and from the pit store to the used cards store room in accordance with the preferred embodiment;
Fig 5 shows video surveillance of a pit cabinet in accordance with the preferred embodiment;
Fig 6 shows video surveillance of a table with a dealer and a player ready to play a game of baccarat at the table in accordance with the preferred embodiment;
Fig 7 are perspective views of two different forms of ministorage units with their closures removed in accordance with the preferred embodiment;
Fig 8 is a plan view of the table shown in Fig 7;
Fig 9 shows a plurality of storage cabinets in the used cards store room in accordance with the preferred embodiment;
Fig 10 shows a staff member attending a shredder in the card destruction room in accordance with the preferred embodiment;
Fig 1 1 is a schematic diagram showing the process flow with respect to asset identification data capture and login with events as they occur in sequence, and their association with the video surveillance system of the casino.
Best Mode(s) for Carrying Out the Invention
[33] While the present invention has broad ranging application to monitoring with different types of assets, the best mode for carrying out the invention will be described with specific reference to tracking the passage of assets in the form of approved playing cards throughout a casino and interrogating data captured and logged in respect of the assets. However, a skilled addressee will readily understand that the system and methodology described is not limited to the casino environment and may have a multitude of other applications.
[34] A preferred embodiment of the best mode is specifically concerned with the passage of assets associated with decks of playing cards for playing baccarat on tables in the gaming room of a casino. The tables are specifically designed for allowing multiple players to play baccarat involving a single dealer representing the house or banker.
[35] More particularly, the preferred embodiment is directed towards the monitoring and recording of the passage or movement of these assets throughout the casino by an asset tracking system following a prescribed methodology. This methodology employs data capturing of identification data associated with each asset by strategically placed sensors throughout the casino, and logging of events associated with the requisite passage of the assets within a prescribed proximity of the sensors. The particular methodology involved permits subsequent interrogation of the asset in conjunction with the video surveillance system of the casino in a very efficient and convenient way that enables rapid investigation of events that may be associated with the irregular passage or movement of an asset, or unusual occurrence associated with one or more assets at a particular table during a period of time.
[36] As previously described, Fig A showed the typical movement of assets in the form of playing cards from their entry into a casino to their exit. Fig 1 shows how the system and methodology of the present invention is applied to a similar form of casino 1 1 to that shown in Fig A.
[37] In the preferred embodiment, the casino 1 1 has a card store room 13, a gaming room 15 including a pit store 16 and tables 17, a used cards store room 18, a card destruction room 19 and a surveillance room 21 , which is set up to monitor the video surveillance system of the casino that includes the CCTV cameras 10 strategically located to cover all areas of the casino.
[38] As shown in Fig 12, the asset tracking system 100 associated with the casino 1 1 comprises a plurality of sensors, divided into multiple recording security sensors 102 and single recording security sensors 104, an RFID scanner 105, a processor 106 and a database 108, all interconnected to form parts of a local area network 200.
[39] The sensors comprise RFID antennae that transmit an RF field at a prescribed frequency, being 900 MHz under the Australian standard and 31 MHz under the European standard, within a prescribed proximity. This RF field is able to trigger the transponder within an RFID tag to issue an RF signal, which is remotely readable by the sensor, and which includes identification data associated with the RFID tag. The RFID tags are divided into passive RFID tags 23 and active RFID tags 31 . A passive RFID tag 23 does not require any battery power, and can project an RF signal capable of being read within a 6 metre range. An active RFID tag 31 does require battery power and can project an RF signal capable of being read within a 130 metre distance.
[40] Sensors are strategically placed in different locations around the casino 1 1 to record events associated with passage of an asset, transport media conveying an asset and staff members involved with handling and asset. Multiple recording security sensors 102 are located in a pit cabinet 33 functioning as a pit storage facility in the pit store 16, a ministorage unit 35 functioning as the table storage facility at a table 17, within the tables 17 themselves to detect assets at the table and in storage cabinets 37 in the used cards store room 18.
[41] Single recording security sensors 104 are located in the card store room 13, by virtue of the RFID scanner 105, above the security door 39 allowing access between the card store room 13 and the gaming room 15, above the security door 41 allowing access between the gaming room 15 and the used cards store room 18, at the shredder 43 in the card destruction room 19 and being surveillance room 21 .
[42] The processor 106 and database 108 may physically be located in the surveillance room 21 and be remotely accessed by an administrator 1 10 and a server 1 12 to provide supplementary support.
[43] The scanner 105 is located in the card store room 13 and works in conjunction with a computer terminal 1 14 operated by a staff member 1 16, under the control of an RFID tag dispensing and scanning software application working in conjunction with the processor 106 and database 108. [44] The assets are typically delivered on pallets 22 from a factory, such as factory 1 of Fig A, in different ways depending upon the particular casino. The decks making up each asset are usually pre-shuffled in a random manner under strict security at the factory, wrapped into packages to form an asset and then packed into cartons that are then stacked on a pallet for delivery to the card store room 13 of the casino. Alternatively, approved decks of playing cards are delivered to the casino and shuffled in a controlled and secure manner in the card store room 13 and wrapped in packages on site to form an asset.
[45] In either case, each asset, along with the carton in which it is packed, if applicable, is required to be tagged with a passive RFID tag 23 when it is brought into the card store room 13. Each passive RFID tag 23 has remotely readable identification data associated with it in the form of a unique manufacturing identification code, and an encrypted asset tracking code and a status code which are able to be encoded with it.
[46] Each passive RFID tag 23 has its unique manufacturing identification code and a corresponding asset tracking code and an initial status code, preprogrammed into a look up table stored within the database 108. The look up table may be in the form of a simple flat file database such as Excel™, or alternatively may be implemented in a more complex relational database form , and will be described in more detail later.
[47] The tagging process is performed at an RFID tagging station 24 within the card store room 13 in a manner that is adapted to suit the particular methodology adopted by the casino for delivering assets to the gaming floor. In this respect, there are two principal methodologies employed, one involving the assets being delivered in cartons designed to transfer the assets to the pit store 16 and subsequently to the tables 17, and the other involving the assets being delivered in card vaults 25 disposed upon trays 27 to the pit store 16 and subsequently to the tables 17. A card vault 25 includes a container portion 25a particularly sized to fully accommodate a package comprising a single deck, and a slidable lid 25b which is able to be closed to fully encapsulate the package within the container.
[48] In the first case, the tagging process entails:
(i) a carton being retrieved from a delivered pallet 22; (ii) a passive RFI D tag 23 dedicated to the carton being applied to the carton, scanned and encoded with its applicable codes;
(iii) a passive RFID tag 23 dedicated to each asset being applied to the asset, scanned and encoded with its applicable codes;
(iv) each asset being repacked into its carton; and
(v) the carton located on a trolley 28 for delivery to the pit store 16.
[49] In the second case, the tagging process entails:
(i) an asset being retrieved from a delivered pallet 22;
(ii) a card vault 25 being retrieved from a supply of card vaults;
(iii) the asset being deposited into the card vault 25 and the lid 25b closed;
(iv) a passive RFID tag dedicated to the asset being applied to the card vault 25, scanned and encoded with its applicable codes;
(v) the card vault 25 being deposited on a tray 27; and
(vi) when the tray 27 is fully loaded with card vaults 25 locating the tray on a trolley 28 for delivery to the pit store 16.
[50] In the case of the latter, as can be seen in Fig 3, typically there are five vaults 25 per tray 27.
[51] The tagging of the assets with passive RFID tags 23 is performed by a staff member 1 16 under the guidance of the RFID tag dispensing and scanning software application previously mentioned. The application software functions through a user interface that steps the staff member 1 16 through dispensing a passive RFID tag with an accompanying barcode from an RFID tag and barcode dispenser 26, and operating the RFID scanner 105 to encode and activate the RFID tag.
[52] The RFID tag and barcode is in the form of an adhesive label 29, which when used with a card vault 25, is applied to the card vault to act as a frangible seal between the lid and the side of the card vault. In this manner, the label 29 functions to provide a tamper evident indication that the vault has been opened.
[53] In the case of casinos using packages as assets, the adhesive label 29 is applied directly to the package.
[54] In either case, once the RFID tag 23 is applied to the asset, either directly or indirectly, the RFID tag is read and written to by the RFID scanner 105, which in the present embodiment is a handheld scanner, to perform the following functions: • read the unique manufacturing identification code of the RFID tag and locate this within the look up table of the database 108;
• retrieve the corresponding tracking code in encrypted form from the look up table of the database 108; and
• write an encrypted form of the tracking code to be applied to the asset and an updated status code indicating that the asset is now active.
[55] Importantly, when the RFID scanner 105 is triggered to perform the aforementioned functions, it operates as a single recording security sensor 104. In this manner, it signals the processor 106 to invoke a time stamping process to store a record of the time that be RFID tag 23 was activated in the look up table of the database, associated with the tracking code entry of the particular asset being tagged. This timestamp signifies when the asset became active, ready for passage from the card store room 13 to the gaming room 15.
[56] In terms of the prescribed methodology of the asset tracking system of the present embodiment, the generating of the timestamp at this stage also constitutes the first event in the tracking of the particular asset being tagged in its life cycle within the casino 1 1 .
[57] Activating the time stamping process also prompts the processor 106 to capture and store in the look up table associated with the tracking code of the particular asset, the identification details of the staff member 1 16 performing the tagging process associated with the first event of the particular asset tracking. These details in the present embodiment are derived from the login details entered by the staff member 1 16 into the computer terminal 1 14 for the purposes of invoking the RFID tag dispensing and scanning software application to perform the tagging operation being undertaken. In other embodiments, other means of identifying the staff member 1 16 can be employed, such as recording an RFID tag provided on the access control card of the staff member, which is detected by either a multiple recording security sensor 102 or a single recording security sensor 104 located at the RFID tagging station 24.
[58] In an alternative embodiment, activating the time stamping process also prompts the processor 106 to interact with the incoming stream of the video surveillance system of the casino 1 1 and store a snippet of the video data footage generated by the CCTV camera 10a located above the RFID tagging station 24 in a storage location within the database 108 that is linked with the first event associated with the asset tracking code. In this alternative embodiment, this snippet is five minutes in duration preceding the timestamp, and five minutes in duration subsequent to the timestamp.
[59] In the alternative embodiment, the trolley also is equipped with a multiple recording security sensor 102 for tracking each of the assets located thereon during transit. The multiple recording security sensor 102 is wirelessly connected to the processor 106. Reading of the identification data of the assets constitutes an event, and each is time stamped for recording in the look up table in connection with the tracking code of the particular asset read.
[60] Returning to the preferred embodiment, the trolley 28 has an active RFID tag 31 associated with it, which has its tracking code pre-recorded into the look up table to identify the trolley to which it is attached and recorded events associated with its passage throughout the casino. The trolley has an active RFID tag 31 as opposed to a passive RFID tag 23, in order to ensure that it is read when it passes under the single recording security sensors of the security doors 39 and 41 and to distinguish it from the passive RFID tag signals. Each reading of the active RFID tag 31 of a trolley 28 passing a security door 39 or 41 constitutes an event which is time stamped by the processor 106 and recorded in the look up table under the event associated with the tracking code of the trolley.
[61] Similarly, the identification details of the staff member driving the trolley will also be recorded alongside the particular event for the trolley 28 and be time stamped, as well as the particular event for each asset disposed on the trolley, by way of an RFID tag provided on the access control card of the staff member, as previously described with the first event.
[62] In the alternative embodiment, a snippet of the video data footage generated by the CCTV 10 approximate to the event would also be recorded in a similar manner as was done with the first event. The trolley sensor 102 may also include a weight sensor to capture the payload weight of the trolley for storage as an auxiliary data record.
[63] Referring to Fig 1 , the tracking system in the alternative embodiment monitors and records the trolley 28 and assets transported by it throughout the designated environment of the casino 25. The sensor 102 on the trolley 28 creates an association between the trolley ID and each of the assets it carries. As the trolley 28 leaves the card store room 13, its path 21 will typically be monitored by one or more of the casinos CCTV video cameras 10. In some circumstances, the sensor 102 on the trolley 28 triggers location sensors 104 at fixed points along the trolley path. The location sensors 104 may be triggered by proximity and therefore installed in locations such as doorways and elevators. Triggering a location sensor 104 can in turn trigger the video camera 22 to pan left, right or otherwise change is field of view.
[64] Returning to the preferred embodiment, eventually the trolley 28 will reach the designated casino pit store 16. A casino pit is typically two adjacent rows of gaming tables arranged back to back so that the public play from the outer sides of the table but the area between the two rows of tables is restricted to casino personnel 1 16. A pit manager or 'pit boss' supervisors the operation of the pit and the supply of chips, cards and so on into and out of the pit. Typically the entire pit is closely monitored by video cameras 10.
[65] Assets are typically stored in the pit cabinet 33. The pit cabinet 33 is purpose- built, having a series of shelves with multiple recording security sensors 102 in the form of RFID antennae are located at the top and bottom of each cabinet or opposing sides of the cabinet so that the entire contents of the cabinet fall within the prescribed proximity of the sensors. In this manner, all assets located in the pit cabinet 33 are continuously read, typically at a cycle of 1000 times per minute.
[66] The pit cabinet 33 having multiple recording security sensors 102 establishes an event when an asset enters the prescribed proximity of any of the sensors 102 by being placed into the cabinet, which is time stamped and another event when an asset exits the prescribed proximity of any of the sensors by being retrieved from the cabinet, which is also time stamped.
[67] This periodic and continuous reading of the assets between the events causes the processor 106 to create continuous time stamped records in the look up table associated with the event corresponding to the particular asset tracking code. In this manner, it is possible to verify the entire duration of an asset being stored in the pit cabinet 33.
[68] In the case of the assets being packages stored in cartons, the cartons are removed from the trolley 28 and located in the cabinet. In the case of assets being card vaults, the card vaults 3 are removed from the trolley 28 and loaded into the pit cabinet 33. In either case, the assets are automatically sensed and the look up table records updated (and created) accordingly.
[69] Once an asset is removed from the pit cabinet 33 it is then transferred to the ministorage unit 35 at a gaming table 17 to replenish playing stock at the table.
[70] As shown in Figs 6 and 7 a ministorage unit 35 is a fixed to the underside of the table 17, adjacent the dealer 45 and approximate to the shoe 49 for the purposes of dealing the cards. The mini storage cabinets can come in different designs and sizes, as shown in Fig 7, but each are equipped with a multiple recording security sensor 102 for activating the passive RFID tags 23 of each asset located within the unit at a rate of approximately 1000 times per minute and transferring the identification data associated with the asset to the processor 106 for recording in the look up table of the database 108.
[71] As was the case with the pit cabinet 33, the entry of an asset into the unit triggers an event, as does the exit of an asset from the unit. Accordingly, each of these events are time stamped for recording alongside the look up table entry corresponding to the asset tracking code in relation to the identified event. Although not shown, each ministorage unit 35 has a locking closure which can be activated by the access control card of a staff member accessing the cabinet for either placing new assets that are in an active state within the cabinet or taking out used assets that are in an inactive state. Accordingly, the identification details of the staff member are recorded with each asset at the time of the event. Similarly the dealer 45 is able to separately access the ministorage cabinet 35 using their access control card and in a similar manner are logged alongside the event recorded for each asset detected within the unit at the time of the event.
[72] The manner in which a dealer 45 handles assets and places them in a shoe 49 on the table and plays a game of with the player 47 is known in the art and will not be described further. In the case of an asset being contained within a card vault 25, however, it is noted that the asset to be played is usually placed on the table 17 while still within the sealed card vault 25, as shown in Fig 6, and is not opened until a game is ready to be played with one or more players 47.
[73] Once again is ready to be played, the seal of the card vault 25 is broken, the lid 25b, the asset extracted from the container portion 25a and is placed on the table 17 ready to be cut. The container portion 25b is then placed in a card discharge slot 51 to constitute a discharge receptacle for discarded cards, which technically then changed to a used or inactive status. In order to facilitate this change of status, the barcode and RFID adhesive label 29 forming the seal is separated from the card vault and placed inside the container portion 25b to continue to be read when the container portion 25b is positioned in the discharge slot 51 .
[74] Once the game is completed and all of the playing cards of the asset are returned to the container portion 25b as used, the card vault is closed and returned to the ministorage unit 35 by the dealer 45. On entering the unit 35, another event occurs, whereupon its sequence causes the processor 106 to update the status of the asset in the look up table as being inactive. Thereafter, the asset is expected to remain in an inactive state until it is destroyed.
[75] As in all previous events, the system records a timestamp alongside the event associated with the tracking codes of each asset received during the event along with the identification details of the dealer 45 accessing the ministorage unit 35.
[76] Once the mini storage unit 35 is full of used and inactive assets, it is emptied by a staff member and the used assets returned to a used asset section of the pit cabinet 33. Again, returning the used assets to the pit cabinet 33 triggers another event, which is time stamped for each of the inactive assets entering the pit cabinet, which are then continuously tracked until taken from the pit cabinet.
[77] When the used assets are collected for disposal, they are taken from the pit cabinet 33, triggering another event and loaded onto a trolley 28 for transfer to the used cards store room 18. CCTV cameras 10 will typically monitor at least some of the journey.
[78] In the alternative embodiment, this video data becomes an auxiliary data record associated that is recorded as in the previous events for each of the asset tracking codes received by the processor 106 at the instigation of subsequent events on the way to the final destruction of each asset.
[79] If the trolley 28 deviates to another area of the casino 1 1 , location sensors and video data will create location and auxiliary data records that are anomalous to the data historically collected during the transfer to the used cards store room 18. If the trolley 28 deviating into an unauthorised area indicates a high risk of card theft, an immediate alarm is generated. This may be an overt audible alarm or a more discreet SMS to the mobile phones of casino security staff.
[80] Returning to the preferred embodiment, an event will again be triggered by virtue of the trolley 28 passing through the security door 41 of the used cards store room 18, whereupon the cards become denatured and are unloaded from the trolley 28 into the storage cabinets 37 located in the room. The storage cabinets 37 are equipped with multiple recording security sensors 102, similar to the pit cabinet 33 and ministorage units 35. Consequently, loading of the inactive assets into the storage cabinets 37 triggers another event and appropriate identification data is logged and timestamped within the look up table. The staff identification details are also captured, while the CCTV camera 10 in the store room 18 provide additional auxiliary data.
[81] Finally, when and asset is taken from a storage cabinet 37 and transferred into the card destruction room 19 for ultimate destruction by shredding at the shredder 43, another event is triggered and identification data associated with the asset movement is recorded at both the multiple recording security sensor 102 located with the cabinet, a single recording security sensor 104 located above the doorway between the used cards store room 18 and card destruction room 19, and finally by a single recording security sensor 104 located at the shredder 43.
[82] Each of these events have the asset look up table tracking codes time stamped, right up until the point when the asset is destroyed.
[83] By creating a timestamp for each asset at each event triggered by the passage and movement of the asset throughout the casino, the data logged by the asset tracking system enables the item to be used as an index for accessing video footage of the video surveillance system of the casino 1 1 . Moreover, the asset tracking system enables an identified asset and its recorded timestamp logs associated with prescribed events as a filter for interrogating the video footage in a controlled and efficient manner.
[84] Accordingly, the system includes an interrogation software application that can be invoked by a user interface accessing the processor 106 either from within the surveillance room 21 or remotely. The interrogation software application permits the database 108 and the look up table stored therein to be accessed on an asset by asset basis.
[85] Accessing an asset allows all of the events that were logged in connection with its lifetime to be accessed in a time reference manner as a consequence of the time stamping. Thus by interrogating the look up table using the tracking code of an asset being investigated, the timing of particular events arising from the time stamping and sensor location or identity, events tying the asset to proximity to a particular CCTV camera viewing the event, enables the video surveillance records of the casino 1 1 to be quickly accessed.
[86] In this manner, the interrogation software is designed with processes to access the video surveillance record data, extract footage occurring during prescribed periods of time before and after the event, e.g. five minutes before in five minutes after, and present this footage to a user selecting the event associated with the asset, provides a very efficient and cost-effective way of investigating an event, without having to store all of the video surveillance data as part of the asset tracking system..
[87] The overall methodology of the asset tracking and interrogation system is shown schematically in Figure 12. Each of the CCTV cameras identified show a sequence number of an event associated with asset movement from the loading dock where a pallet 22 of assets into the casino 1 1 to the card store room 13 or shuffle room, if applicable, where the initial RFID tagging takes place, then out to the gaming room 15 via a trolley 28 to be delivered to the pit store 16. The assets and then moved to table storage within the ministorage units 35. Any number of check points can be installed and each point can be covered with searchable visual and data information such as operator, location and asset identification.
[88] The methodology proceeds with the asset tracking continuing as the playing cards of the asset come into play at a table 17 and transported to the used cards store room 18 for temporary storage until ultimate destruction in the card destruction room 19. Each event has video data recorded by the CCTV cameras 1 to 10, which can be conveniently accessed using the interrogation system application.
[89] In the event, assets are removed from the designated environment of the casino 1 1 or tampered with during the playing of the game, using a combination of tracking data derived from the RFID sensors comprising both multiple recording security sensors and single recording security sensors in an optimum manner, and video data from CCTV video surveillance cameras 10 of the casino will allow quite thorough investigation of the circumstance, much more quickly at a significantly reduced cost to prior art systems using the asset tracking system and methodology of the subject invention and described in the best mode. As the CCTV infrastructure already exists in the vast majority of casinos, the ease with which the asset tracking system incorporates the CCTV data to substantially improve the tracking records at minimal cost has strong appeal for casino operators.
[90] Regulation in the gaming and casino industry is ever-increasing. In some jurisdictions, compliance requires the casino to demonstrate adequate security measures are in place. One part of this requirement is the secure management and tracking of the playing cards. Referring to Fig 13, the system allows audit logs to be generated which detail every aspect of a card vaults movement through the casino as well as compile relevant auxiliary data to help explain any problems or concerns the auditor may have. Using specified parameters and algorithms, the processor can also flag or highlight any anomalous data entries such as unusually prolonged transit times between two locations in the casino. With a series of anomaly thresholds in place, the seriousness or degree of anomaly will vary which in turn may escalate an alert into an alarm requiring immediate attention.
[91] Particularly sophisticated versions of the system may incorporate biometric identity checks to confirm staff ID'S. Video data can be analysed by the processor using facial recognition algorithms to highlight any inconsistencies between the staff ID cards and the biometric analysis. Retinol scan, fingerprint and voice recognition technologies are also easily incorporated into the system if the risks warrant the additional expense.
[92] The invention has been described here by way of example only. Skilled workers in this field will readily recognise the variations and modifications which do not depart from the spirit and scope of the board inventive concept.

Claims

Claims
1 . An asset tracking system for monitoring and recording the movement of assets within a designated environment, the system comprising: a plurality of assets, each having remotely readable identification data associated therewith; a plurality of sensors throughout the designated environment for reading the identification data of an asset when the asset comes into a prescribed proximity of a sensor and generating a signal indicative of the identity or location of the sensor; the sensors including:
(i) a multiple recording security sensor for location in an area of the designated environment where the asset is stored or comes into engagement with a user; and
(ii) a single recording security sensor for location in an area of the designated environment where the asset is in transit; each sensor generating an event signal in respect of an event when an asset either enters or departs, or both enters and departs, the prescribed proximity of the sensor, the event signal being indicative of the identification data associated with the particular asset causing the event; the event signal either intrinsically functioning as the signal indicative of the identity or location of the sensor generating the event signal, or the sensor generating the event signal separately generating an identity or location signal; and a processor for receiving the event signal generated by a sensor, and if generated, the identity or location signal, and creating a time-stamped event record in a database associating the asset with the event and the identity or location of the sensor generating the event signal; wherein the processor creates time stamped event records periodically on a continuous basis in response to event signals generated by a multiple recording security sensor, and a single time stamped event record in response to an event signal generated by a single recording security sensor.
2. An asset tracking system according to claim 1 , wherein the processor is configured to compare the asset records and video data records of a video surveillance system covering the activity associated with each logged event with predetermined parameters to identify any records not meeting the parameters.
3. An asset tracking system according to claim 2, wherein the parameters may include:
(a) a time period between capturing two successive location records;
(b) one or more of the location records being captured in non-designated locations for any of the containers;
(c) failure to capture one or more of the location records for any of the containers designated locations;
(d) non-authorised personnel at pre-determined locations;
(e) failed or conflicting personnel ID checks; and
(f) sensing two or more of the containers with the same identification data.
4. An asset tracking system according to claim 3, wherein the processor may be configured to use a history of the asset records and the video data records already stored in a database to identify any anomalous location or auxiliary records.
5. An asset tracking system according to claim 4, wherein the processor may also be configured to determine a degree of anomaly for any anomalous asset movement or video data records and generate an alarm notification if the degree anomaly exceeds the threshold.
6. An asset tracking system according to claim 5, wherein the processor is configured to generate a list of the anomalous location and video data records ranked according to the degree of anomaly.
7. An asset tracking system according to claim 6, wherein the conveyance is a wheeled platform such a trolley for manual movement throughout the designated environment, the wheeled platform having at least one of the video data data recorders for generating location records from the tags on the containers placed on the trolley.
8. An asset tracking system according to claim 7, wherein the trolley sensor may be wirelessly connected of the location records to the processor.
9. An asset tracking system according to claim 8, wherein includes a staff ID sensor for identifying the personnel manually operating the trolley and transmitting the personnel ID to the processor for storage as one of the auxiliary records.
10. An asset tracking system according to claim 9, wherein the trolley may also have a payload weight sensor for sensing changes to the payload weight and transmitting weight data to the processor for storage as one of the auxiliary records.
1 1 . An asset tracking system according to claim 10, wherein the trolley is robotic and has a powered drive that avoids the need for manual actuation.
12. An asset tracking system according to claim 1 1 , wherein the robotic trolley may be controlled by the processor for the system or use on board processing to travel through the designated environment.
13. An asset tracking system according to claim 12, wherein the trolley may have a secure enclosure for the containers during transit which is unlocked, remotely or locally, at one or more of the locations throughout the designated environment.
14. An asset tracking system according to claim 13, wherein the auxiliary records include video data of the conveyance at one or more of the locations, and or in transit between locations.
15. An asset tracking system according to claim 14, wherein the staff ID sensor is a proximity sensor configured to scan ID tags worn by authorised personnel such that the ID tag is within the range of the staff ID sensor when manually moving the trolley such that moving the ID tag into, and out of the range of the staff I D sensor is captured and transmitted to the processor for storage as one of the auxiliary records.
16. An asset tracking system according to claim 15, wherein the auxiliary data recorders used in the system also include biometric sensors for one or more of:
(a) fingerprint recognition;
(b) palm print recognition;
(c) facial recognition;
(d) retinol scan;
(e) Voice recognition.
17. An asset tracking system according to claim 16, wherein the staff ID checks can be dual verifications of the I D tag as well as a biometric check.
18. An asset tracking system according to claim 17, wherein the designated environment is a casino and the containers are card vaults for holding decks of approved cards, the decks being loaded into the vault upon delivery at the casino receiving dock, stored or transported in the vaults to pit stands on gaming floors in the casino, and following use in the various table based card games, loaded back into the vaults and transported to a designated location for destruction.
19. An asset tracking system according to claim 18, wherein the designated environment may also be two or more separate buildings or premises such that the containers are moved between the buildings or premises, and the auxiliary include GPS data generated by a GPS locator.
20. A method for asset tracking including monitoring and recording the movement of assets within a designated environment, the method comprising: reading identification data of an asset when the asset comes into a prescribed proximity and generating a signal indicative of the identity or location of the reading; generating an event signal in respect of an event when an asset either enters or departs, or both enters and departs, the prescribed proximity, the event signal being indicative of the identification data associated with a particular asset causing the event; the event signal either intrinsically functioning as the signal indicative of the identity or location of the reading, or generating an event signal separately generating an identity or location signal; receiving the event signal generated, and if generated, the identity or location signal, and creating a time stamped event record associating the asset with the event and the identity or location of the reading that generated the event signal; and time stamping event records periodically on a continuous basis in response to event signal is generated in response to an event signal.
PCT/CA2016/050981 2015-08-19 2016-08-19 Asset tracking and interrogation system and method WO2017027981A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2015903358A AU2015903358A0 (en) 2015-08-19 Asset tracking system
AU2015903358 2015-08-19

Publications (1)

Publication Number Publication Date
WO2017027981A1 true WO2017027981A1 (en) 2017-02-23

Family

ID=58050516

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2016/050981 WO2017027981A1 (en) 2015-08-19 2016-08-19 Asset tracking and interrogation system and method

Country Status (1)

Country Link
WO (1) WO2017027981A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10387442B2 (en) * 2017-02-21 2019-08-20 Sap Se Connected space
CN111882603A (en) * 2020-05-14 2020-11-03 无锡北斗星通信息科技有限公司 Wireless notification system using cloud computing and corresponding terminal
US11222293B2 (en) * 2020-01-24 2022-01-11 Registrar Corp Systems and methods for analyzing product movement information and generating compliance profiles

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040113786A1 (en) * 2001-06-26 2004-06-17 Key-Trak, Inc. Object tracking method and system with object identification and verification
US20090105866A1 (en) * 2007-10-18 2009-04-23 Siemens Aktiengesellschaft Method of Controlling a Production Process
US20140009284A1 (en) * 2009-05-18 2014-01-09 Alarm.Com Incorporated Moving asset location tracking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040113786A1 (en) * 2001-06-26 2004-06-17 Key-Trak, Inc. Object tracking method and system with object identification and verification
US20090105866A1 (en) * 2007-10-18 2009-04-23 Siemens Aktiengesellschaft Method of Controlling a Production Process
US20140009284A1 (en) * 2009-05-18 2014-01-09 Alarm.Com Incorporated Moving asset location tracking

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10387442B2 (en) * 2017-02-21 2019-08-20 Sap Se Connected space
US11222293B2 (en) * 2020-01-24 2022-01-11 Registrar Corp Systems and methods for analyzing product movement information and generating compliance profiles
US11699119B2 (en) 2020-01-24 2023-07-11 Registrar Corp. Systems and methods for analyzing product movement information and generating compliance profiles
CN111882603A (en) * 2020-05-14 2020-11-03 无锡北斗星通信息科技有限公司 Wireless notification system using cloud computing and corresponding terminal
CN111882603B (en) * 2020-05-14 2021-02-19 中富通集团股份有限公司 Wireless notification system using cloud computing and corresponding terminal

Similar Documents

Publication Publication Date Title
KR102632650B1 (en) A method for administrating a package of shuffled playing cards
CN110559641A (en) Packaged product tracking system, packaged product tracking method, management system, storage device, and management method
WO2017027981A1 (en) Asset tracking and interrogation system and method

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16836328

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16836328

Country of ref document: EP

Kind code of ref document: A1