Ai Video Tickety
Step 1: verify the customers ID
The tickets are sold via smart phone apps. Our solution requires a KYC (know your client) on-boarding process, with which most app users are now familiar because of its wide spread use.
Once the user has downloaded the app, the on boarding user journey will collect their name, address, post-code, mobile phone number (Verified via SMS and PIN) email address (verified via link).
It requires them to upload a photo of themselves and a small video clip selfie.
So now we know who this person is and we know what they look like.
As an option at this point, prior to selling them a ticket, you could run their details against various watch lists of undesirable or dangerous people and refuse them an account, thus enhancing your security. Alternatively you could identify them as a VIP and single them out for special treatment at the venue.
To create a simple secure process to admit people, at scale, to an event, without inconvenience and allowing for much faster venue entry than at present while increasing security
Tickety is a complete end to end solution, from app on-boarding, ticket sale, right through to admittance. Wherever possible we leverage your legacy systems. We apply a modular and bespoke approach to joining up the dots to create the overall solution using a mix of our modules, middle-ware and your legacy solutions.
Currently ticket sales and admission suffer from numerous security drawbacks and often struggle to combat ticket touts.
Admittance is based solely on the person having a valid ticket. There is no security or checking process to eliminate troublemakers or prevent terror suspects from entry. A further issue is that tickets are rarely tied to a specific person thus allowing ticket touts to drive up black market ticket prices.
However in today’s data driven society, by using well proven, mainstream solutions, which the general public are already accustomed to using, all the data that is required, is easy to obtain.
Step 3: Ticket distribution
So far we know the verified identity of the purchaser, we have received their payment, we have allocated their tickets in our system, but we have yet to deliver the tickets.
Our solution aims to control and track each ticket by ensuring that the ticket ID is locked to a specific verified individual and that all transfers of tickets can only occur via authorized parties.
The purchaser allocates who they want to transfer their tickets to in their group and as long as those people also have the app and are verified then the tickets can be transferred between apps on your platform.
In the event that the purchaser or other people in their group cannot attend, they release their ticket back into the pool of available tickets remaining for sale. If their ticket is resold then they can be refunded.
Where an event is fully booked, the app allows people to join a queue for any tickets that become free.
Our solution monitors the app’s physical location. The only way to purchase a ticket is via the app, therefore we know if they are outside the venue and suddenly wishing to transfer their ticket very near show time. A protocol such as requiring them to go to the ticket office and speak to someone, before such a transfer is allowed would frustrate touts.
Analysis of user behavior regarding transfers will make touts easy to identify and block.
Step 2: Ticket sales
The verified user can now purchase ticket in the usual in app purchase process.
The user can also purchase tickets from authorized on line web sites, for themselves and others.
This step is unaltered. We can integrate with your existing systems for ticket sales
Step 5: Security using our Lokator Module
We have previously covered the ability of the Tickity solution to prevent unauthorized entry, using Facial recognition, lanes and the app process.
So what if someone just walks through into the venue? Our solution will instantly alert the nearest security personnel and pop a picture on their smart phone.
It is no longer necessary to have humans watching CCTV in a central control room with radio communications to the security personal in the venue.
This is all automated, far more accurate and it works in real time, avoiding communication delays.