top of page

Ai Video Tickety

contact

The Process

Step 1: verify the customers ID

The tickets are sold via smart phone apps. Our solution requires a KYC (know your client) on-boarding process, with which most app users are now familiar because of its wide spread use.

Once the user has downloaded the app, the on boarding user journey will collect their name, address, post-code, mobile phone number (Verified via SMS and PIN) email address (verified via link).

It requires them to upload a photo of themselves and a small video clip selfie.

So now we know who this person is and we know what they look like.

As an option at this point, prior to selling them a ticket, you could run their details against various watch lists of undesirable or dangerous people and refuse them an account, thus enhancing your security. Alternatively you could identify them as a VIP and single them out for special treatment at the venue.

To create a simple secure process to admit people, at scale, to an event, without inconvenience and allowing for much faster venue entry than at present while increasing security

Tickety is a complete end to end solution, from app on-boarding, ticket sale, right through to admittance. Wherever possible we leverage your legacy systems. We apply a modular and bespoke approach to joining up the dots to create the overall solution using a mix of our modules, middle-ware and your legacy solutions.

Currently ticket sales and admission suffer from numerous security drawbacks and often struggle to combat ticket touts.

Admittance is based solely on the person having a valid ticket. There is no security or checking process to eliminate troublemakers or prevent terror suspects from entry. A further issue is that tickets are rarely tied to a specific person thus allowing ticket touts to drive up black market ticket prices.

However in today’s data driven society, by using well proven, mainstream solutions, which the general public are already accustomed to using, all the data that is required, is easy to obtain.

The Challenge

The Process

Step 3: Ticket distribution

So far we know the verified identity of the purchaser, we have received their payment, we have allocated their tickets in our system, but we have yet to deliver the tickets.

Our solution aims to control and track each ticket by ensuring that the ticket ID is locked to a specific verified individual and that all transfers of tickets can only occur via authorized parties.

The purchaser allocates who they want to transfer their tickets to in their group and as long as those people also have the app and are verified then the tickets can be transferred between apps on your platform.

In the event that the purchaser or other people in their group cannot attend, they release their ticket back into the pool of available tickets remaining for sale. If their ticket is resold then they can be refunded.

Where an event is fully booked, the app allows people to join a queue for any tickets that become free.

Our solution monitors the app’s physical location. The only way to purchase a ticket is via the app, therefore we know if they are outside the venue and suddenly wishing to transfer their ticket very near show time. A protocol such as requiring them to go to the ticket office and speak to someone, before such a transfer is allowed would frustrate touts.

Analysis of user behavior regarding transfers will make touts easy to identify and block.

The Process

Step 2: Ticket sales

The verified user can now purchase ticket in the usual in app purchase process.

The user can also purchase tickets from authorized on line web sites, for themselves and others.

This step is unaltered. We can integrate with your existing systems for ticket sales

The Process

Step 4: Ticket-less entry admittance

and security

At the time of purchasing the tickets the ticket holder is told the address of the venue and the main entrance to go to (North East, South West for instance)

Inside each main entry point, the open area is subdivided into queue lanes separated by rails.

When the ticket holder approaches the facility, our system pops an audio visual message with the lane ID (A,B,C or D etc.)

This final entry information is not provided until just a short time prior to entry.

So we know the verified ID of the ticket holder, their ticket number and which of the lanes they are about to enter.

By using their real time location information together with facial recognition, within a lane, the ID of which we have only just informed them of, accuracy reach the highest possible level.

All the ticket holder need do is to walk through the lane and straight into the venue, without stopping to tap, scan, or do anything else.

Using this approach it is very hard to see how anyone unauthorized can gain access to the venue, given that they do not know the lane to use to enter, nor are their face or phone details in our system, so they will be flagged instantly.

Tickety is also designed to offer flexible ways of controlling season ticket holders who wish to lend their tickets to someone else on days when they cannot attend.

The Process

Step 5: Security using our Lokator Module

We have previously covered the ability of the Tickity solution to prevent unauthorized entry, using Facial recognition, lanes and the app process.

So what if someone just walks through into the venue? Our solution will instantly alert the nearest security personnel and pop a picture on their smart phone.

It is no longer necessary to have humans watching CCTV in a central control room with radio communications to the security personal in the venue.

This is all automated, far more accurate and it works in real time, avoiding communication delays.

bottom of page