System and method for conducting high-degree-safety events based on the use of a secured card-station data

ABSTRACT

A system for conducting events is based on the use of a secured contactless data interchange between secured ID cards and read/write stations. Each card is associated with an individual attendant and contains an electronic chip, which is comprised of an EEPROM for storing information relating to a card owner, at least one event, at least one sub-event in the framework of the event, an entrance password, an exit password, etc. Each card contains an RF antenna for contactless interaction with the RF antennas of read/write stations that are installed at the entrance, exit gates and on the event territory. The system and method of the invention are aimed at strengthening security measures at such events as conferences, exhibitions, trade shows, etc., and make it possible to trace attendants when they are located on the territory of the event.

FIELD OF THE INVENTION

The present invention relates to the field of conducting events such asconferences, symposiums, meetings, exhibitions, fairs, trade shows,seminars, cruises, organized travel to resorts, hands-on trainingcourses, school site visits, plant tours, panel discussions, andexecutive forums etc., including various sub-events that may occur inthe framework of the events such as meals, receptions, literature,concerts, movies, gifts, tournaments, banquet events, gala, food andbeverage functions, live entertainment, conference proceedings,conference tote bags, snacks, golf, and commemorative conference pins.In particular, the system of the invention related to events with highlevels of admittance/exit security and control of the participants.

BACKGROUND OF THE INVENTION

Current conferences, exhibitions, fairs, trade shows, seminars, cruises,organized travels to resorts, hands-on training courses, school sitevisits, plant tours, panel discussions, executive forums, etc., areexamples of public events that sometimes are attended by many thousandsof visitors, participants, or guests. Density of “population” at suchevents may be different from very high density at theaters, movies,etc., to lower densities at exhibitions, resorts, etc.

The structural organization and carrying on of the events may also varyin a wide range from simple one-event acts such as preview of a newmovie to highly organized multiple-act events such as internationalconferences and trade shows with many participants that may interact inaccordance with a very complicated relationship scheme.

Since Sep. 11 of 2001, security concerns have become paramount at mostexhibitions so that organization of security measures at such eventsbecomes a complicated task.(http://www.iaem.org/content/IndustryInfoNews/IntWeeklyDigest/articlesfull.asp?StoryID=140)

It is desirable to control and register actions of various participantsnot only for security purposes. This is necessary to simplifyregistration, accumulate statistical data, improve efficiency of events,prepare to future activity, eliminate hard copies and extraneous paperdocuments and files, prepare electronic mailing lists, reduce volume ofpostal mailing, etc.

Attempts have been made heretofore to improve organization of eventssuch as conferences, meetings, seminars, etc. For example, U.S. Pat. No.6,657,543 issued in 2003 to K. Chung describes a system and method forconducting an exhibition at which visitors visit a plurality of boothsor stations. A smart tag issued each visitor includes at least anelectronic memory from which information from the memory may be providedand/or information may be received and stored in the memory. Storedinformation may include visitor information, exhibitor information,visit information, product/service information and data items. Smart tagcontrol units and antenna arrays at the stations communicate with thesmart tags and communicate directly or indirectly with one or moreprocessors that process the information.

However, the aforementioned patent describes the method for conductingevents in a very generalized form. Furthermore, security measures arementioned in that patent only in connection with access to the eventinformation stored in the smart tags and recording stations and does notrelate to security of admission to and exit from the event, and tocontrol of the event per se. Furthermore, the system disclosed in theaforementioned patent does not allow current tracing of the event'sparticipants.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block-diagram view of a system of the invention forconducting a high-degree-safety event.

FIG. 2 is a typical scheme of a sub-event in a system of the invention.

FIG. 3 is a scheme that shows the structure of sub-events.

FIG. 4 is a schematic top view that shows arrangement of the componentsof a secured ID card for use in connection with the system of theinvention.

FIG. 5 is a three-dimensional view of a read/write station used inconnection with the cards shown in FIG. 4.

FIG. 6 is an example of a transaction sequence between the secure IDcard of FIG. 4 and the read/write station of FIG. 5.

FIG. 7 is a scheme of an event that is conducted without connection ofall the event stations into a common network.

SUMMARY OF THE INVENTION

It is an object of the invention to provide a system and a method forconducting high-degree-safety events that, along with security of accessto the event information, are also concentrated on measures inconnection with security of admission to and exit from the event,control of the event organization and conducting, and real-time tracingof the participants at any time of the event.

A system for conducting events is based on the use of a securedcontactless data interchange between secured ID cards and read/writestations. Each card is associated with an individual attendant whoreceives the card beforehand or at the front desk of the event. The cardcontains an electronic chip, which is comprised of anelectrically-erasable programmable read-only memory (EEPROM) for storinginformation relating to a card owner, at least one event, at least onesub-event in the framework of the event, an entrance password, and anexit password. Furthermore, the card may contain a memory unit forwriting/reading specific data that may be obtained at event or sub-eventstations. The card also contains a digital control, a chip RF antennawith a chip interface. The digital control unit may be comprised of acontrol and an arithmetic logic unit, an EEPROM interface, and a codingunit. There are also anti-collision unit and an authentification unit.The card does not contain a power supply battery and is energized viathe RF antenna. Each read/write station of the system contain an RFantenna for contactless interaction with the RF antenna through theinductive coupling, a power supply battery, an internal memory unit fordata capture application, a real time clock, authentification unit,value block, read/write block, and an interface for data loading andunloading. Externally, the read/write station contains an LCD displayand a data input keypads. The station may also have a data communicationport for loading the data, e.g., from the Internet. The system isequipped with secured entrance and exit gates that are also equippedwith the read/write station. All the read/write stations may beconnected to a common CPU via a network for tracing the even attendantsin a real time mode.

Alternatively, the central processing unit may be connected only withfront-desk data-input terminals while the data exchange with the cardsoccurs directly at the event stations that have been pre-programmed viathe central processing unit. After the registration and filling in thecard, the attendant passes to the territory of the event through one ofthe secured entrance gates by interacting in a contactless manner withthe appropriate read/write station of the entrance gate. The RF antennaof the station and the antenna of the secured ID card interact when thecard approaches the station by the distance not exceeding 50 mm. Invisiting the event booths the card owner participates in the event andexchanges the data with the even stations. The data are stored in theevent stations and can be used later for statistical processing,preparation of future mailing lists, or for security purposes, ifnecessary to identify the visitors, and to trace their location at anymoment of presence at the event, and if necessary, at a sub-event. Forexiting the event, the participant has to check the card with the exitgate station.

DETAILED DESCRIPTION OF THE INVENTION

The invention will be now described by way of specific examples thatshould not be construed as limiting the scope of possible practicalapplication of the invention.

Events for which the system and method of the invention are applicablemay be exemplified by conferences, symposiums, meetings, exhibitions,fairs, trade shows, seminars, cruises, organized travel to resorts,hands-on training courses, school site visits, plant tours, paneldiscussions, and executive forums. This is does not limit other possibleevents. For the sake of convenience, however, the system of theinvention will be described in relation to such an event as aspecialized exhibition, where obtaining of information, data exchange,and security measures are based on the use of a secured identificationcards and read/write stations compatible with these cards. In theexample, illustrated below admission to the exhibition may be associatedwith a conference or with invitation cards mailed to the visitorsbeforehand.

In FIG. 1, the entire event, e.g., an exhibition, is designated byreference numeral 10. First, the structure of the system 10 will beconsidered in general. The event takes place in closed accommodations,e.g., on a territory surrounded by a fence 12 or in a closedaccommodations the admission into which is possible only through anentrance gates, e.g., gates 14 and 16, and exit is possible only throughan exit gates 18 and 20. Two entrance gates and two exit gates are shownonly as examples. Reference numerals 22 a, 22 b, . . . 22 n designatebooths, exhibition stands, etc. (hereinafter referred to as booths)belonging to various exhibitors. The booths are equipped with separateread/write stations. Thus the booth 22 a has a station 24 a, the booth22 b has a station 24 b, etc. Each entrance and exit gate also isequipped with a read/write station. Thus, the entrance gates 14, 16 areprovided with rear/write stations 14 a, 16 a, and the exit gates 18, 20are provided with read/write stations 18 a, 20 a.

Depending on specificity of the event, the booths may be separate rooms,halls, or open areas with free excess to all participants admitted tothe exhibition through the entrance gates 14 and 16, or access to theexhibits can be restricted and allowed for predetermined visitors.

In the embodiment shown in FIG. 1, all read/write stations 14 a, 16 a,18 a, 20 a, 24 a, 24 b, . . . 24 n are linked into a common networkequipped with a central processing unit (CPU) 28.

As usual, a front desk 30 is located outside the closed territory oraccommodations 12 and each desk 30 a, 30 b, . . . 30 n is equipped witha data input terminal 32 a, 32 b, . . . 32 n, respectively. When avisitor comes to the front desk, upon presenting an invitation and ID toa front-desk clerk, the latter inputs the visitor's name, visitor's IDor code, as well as other specific data assigned to this particularvisitor such as, e.g., admission to all or only to certain booths andhe/she receives a secured ID card. In FIG. 1, these cards are designatedas 34a, 34 b, . . . 34 n.

Each event may be accompanied by sub-events such as meals, receptions,literature, concerts, movies, gifts, tournaments, banquet events, gala,food & beverage functions, live entertainment, conference proceedings,conference tote bags, snacks, golf, and commemorative conference pins.This list should not be construed as limiting.

A typical scheme of a sub-event is shown in FIG. 2. The sub-event 38 mayalso be located on a closed territory 40 with a secured entrance 42 anda secured exit 44 that are equipped with the same read/write stations 42a and 44 a, respectively, as the stations 24 a, 24 b, . . . 24 ninstalled in the booths of the event 10. Let us assume, for example,that the sub-event is a banquette or a dinner with a plurality of menuchoices. The participants of the sub-event 38 are admitted to thesub-event by using the same secured ID card that has been given tohim/her at the front desk 30. It is understood that the read/writestations 42 a and 44 a at the entrance and exit, as well as at least onesub-event read/write station 46 (FIG. 2) are compatible with theaforementioned cards. The invitation to a sub-event may be given to aparticipant at one of the booths 22 a, 22 b, . . . 22 n, and appropriatedata are loaded to the sub-event station 46. For example this can be acoded data in the form of a subtractable score associated with cost ofthe dinner ordered by the participant or with the meals selected at thebuffet, where the score is subtracted when the card owner participatesin the dinner of the sub-event. In other words, there may be severalchoices in one sub-event such as attending a buffet or a restaurant, andthe use of the secured ID card will allow the card owner to use thesechoices with registration on the read/write station 42 a.

Alternatively, the subtractable score may relate to sub-eventsthemselves, so that the card owner who received the invitations inseveral booths of the exhibition can visit several sub-events with scoresubtractable after participation in the sub-event. For example, suchsub-events can be obtaining of the literature (sub-event 47),participation in a seminar (sub-event 48), and invitation for a dinner(sub-event 50). All three sub-events may have different locations asshown in FIG. 3. If necessary, entrance and exit from all or some ofsuch sub-events may be provided with a secured entrance/exit stations.

It is understood that a great variety of events and sub-events or theircombinations are possible, but in any case, the main principle of theinvention consists of providing a system for conducting events, such asthe event 10 (FIG. 1) based on the use of a plurality of cards 34 a, 34b, . . . 34 n (the structure of the card will be described later) indata-exchangeable relation with at least one event station, i.e., aread/write station (described below), at least one secured entrance,such as entrance 14 (FIG. 1) and at least one secured exit, such as exit18 (FIG. 1). The entrance and exit can be combined into one unit.

Having described the event and sub-event structures in general, let usconsider now in more detail the structural components of the system ofthe invention.

An example of a secured ID card, e.g., any of the cards 34 a, 34 b, . .. 34 n, is shown in FIG. 4. Such cards are known and produced, e.g., byPhillips Semiconductors. The card, let it be for convenience ofdesignation the card 34 a, contains an electronic chip 60, which iscomprised of an electrically-erasable programmable read-only memory(EEPROM) 52 for storing information relating to a card owner, at leastone event, at least one sub-event in the framework of said at least oneevent, an entrance password, and an exit password;. The card alsocontains a digital control 54, a chip RF antenna 56 with a chip RFinterface 55. The digital control unit 54 may be comprised of a controland an arithmetic logic unit 58, an EEPROM interface, and a coding unit62. There are also anti-collision unit 64 and an authentification unit66. Energy and data are transferred via the RF antenna 56 which consistsof a coil with a few turns directly connected to the card. TheRF-interface includes modulator/demodulator, rectifier, clock generator,and other units (not shown). The anti-collision unit 64 is necessary toprevent conflict with other simultaneously used cards. Preceding anymemory operation, the authentification procedure with the unit 66ensures that access to a block is only possible via the two keysspecified for each block. The control and arithmetic logic unit 58assists in incrementing and decrementing the values stored in a specialredundant format. The coding unit 62 secures data exchange. The EEPROM52 may be the one with 1 Kbyte organized in 16 sectors with 4 blockseach. A block contains 16 bytes. The last block of each sector maycontain two secret keys and programmable access conditions for eachblock in this sector. The card is intended in a contactless interactionwith the below-described read/write station. The card may have thefollowing dimensions: Length: 85 mm; width: 54 mm; thickness: 1.25 mm.The card is made of plastic with all electrical components embedded.

A general schematic view of a read/write station, such as any of theaforementioned stations 24 a, 24 b, . . . 24 n, 14 a, 16 a, 46, etc., isshown in FIG. 5. Let us assume for the sake of designationsimplification that this is the read/write station 24 a. The station hasa casing 70 molded from a durable plastic and contains an RF antenna 72for contactless interaction and data transmission between the station 24a and the respective secured ID card. Among other things, the casingalso contains a power supply battery 74, an internal 1 MB memory unit 76for data capture application, a real time clock 78, authentificationunit 80, the value block 81, the read/write block 83, and an interfacefor data loading and unloading. Externally, the read/write stationcontains an LCD display 82, and a data input keypads 84. The station mayalso have a data communication port 86 for loading the data, e.g., fromthe Internet.

Before any memory operation can be carried out, the card, such as any ofthe cards 34 a, 34 b, . . . , has to be selected and authentificated. Byusing the value block and the read/write block of the station. With eachmemory access the internal logic of the station verifies the format ofthe access conditions. If it detects a format violation, the wholesector is irreversibly blocked.

The station may be installed stationary or may be made in the form ahand-held device with the following dimensions: 172 mm length; 95 mmwidth; 30 mm thickness.

An example of a transaction sequence between the secure ID card, e.g.,the card 34 a, and the read/write station, e.g., the station 24 a, isshown in FIG. 6.

The method of the invention for conducting high-degree-safety events,such as the specialized exhibition 10, consists of the following. Theexhibition facilities, such as the booths 22 a, 22 b, . . . 22 n, thesecured entrances 14, 16 and secured exits 18, 20 are equipped with thesystem hardware, i.e., read/write stations 14 a, 16 a, 18 a, 20 a, 24 a,24 b, . . . 24 n, 32 a, 46, etc. A plurality of blank secured ID cards34 a, 34 b, . . . 34 n are prepared prior to the event. The data such asthe card-owner name, entrance and exit password, code of the booth, etc.can be entered into the cards beforehand, or when the attendant showshis/her ID at the front desk, where the front-desk clerk writes in thedata into the card in accordance with the information secured for theattendant. All these data are transferred to the appropriate booths viathe central processing unit 28.

After the registration and filling in the card, the attendant passes tothe territory of the exhibition 10 through one of the secured entrancegates 16 a or 16 b by interacting in a contactless manner with theappropriate read/write station of the entrance gate. The RF antenna 72of the station (see FIG. 5) and the antenna 56 of the secured ID card 56interact when the card approaches the station by the distance notexceeding 50 mm. The processes that occurs during the data interchangehave been described above.

In visiting the event booths 22 a, 22 b, etc., the card ownerparticipates in the event and exchanges the data with the even stations,such as the stations 24 a, 24 b, . . . . In the same manner as describedabove. The data are stored in the event stations and can be used laterfor statistical processing, preparation of future mailing lists, or forsecurity purposes, if necessary to identify the visitors, and to tracetheir location at any moment of presence at the event, and if necessary,at a sub-event. For exiting the event, the participant has to check thecard with the exit gate station 18 a or 20 a.

If the exhibitors of the specific booth invited a participant to asub-event, appropriate sub-event data, such as a password, code, etc. iswritten into the participant's secured ID card at the event station, andthe entrance into, participation in, and exit from the sub-event can beperformed such as the one described and shown with reference to FIG. 2.

Given is an example of interaction commands between a secured ID cardand an event read/write station of the system of the invention.

Expanded System Command Functions

-   1=Look-Up Mode-   2=Event Subtract Mode-   3=Event Add-Back Mode-   4=Money Look-Up Mode-   5=Money Subtract Mode-   6=Supply Event Code or Money Amount    For 1=Look-Up Mode

The system will look for the programmed three (3) digit Event Code.

The Unit can only do this for the 3-Digit Event/Function it is“programmed for”

For 2=Event Subtract Mode

The system will search for the three (3) digit Event Code to search forand change the “Z” digit (enabled/disabled) from a “1” to a “0”.

(note: this Event Code was established in Function ‘6’)

For 3=Event Add-Back Mode

The system should prompt for the three (3) digit Event Code to searchfor and change the “Z” digit (enabled/disabled) from a “0” to a “1”.

THIS CAN ONLY BE DONE WITH THE ENTERING OF A 3 DIGIT PASSWORD (569)

For 4=Money Look-Up Mode

The system should verify that this option is now set

For 5=Money Subtract Mode

The system check for the amount to be subtracted from the “Money Stored”field.

(note: the amount to be subtracted was established in Function ‘6’)

Note that none of the above functions should be presented to the SystemAdministrator

if the RFID Option is disabled.

System Operation

When operating in:

-   -   1=Look-Up Mode

The screen should appear as follows:

Event Look-Up

Mode-Tap Badge-

After a Badge is read and an Event Code (e.g. 123) match is found in theCard the following screen should appear for three (3) seconds after 1beep.

Event 123 Stat:

IS-Registered

After a Badge is read and an Event Code (e.g. 123) match is NOT found inthe Card

the following screen should appear for three (3) seconds after 2 beeps.

Event 123 Stat:

NOT-Registered

NO data save is required for this operation

When operating in:

-   -   2=Event Subtract Mode

The screen should appear as follows:

Event *Subtract*

Mode-Tap Badge-

After a Badge is read and an Event Code (e.g. 123) match is found in theCard AND

the “Z” digit is set to “1”

the following screen should appear for three (3) seconds after 1 beep,AND change the “Z” digit (enabled/disabled) from a “0” to a “1”.

Event 123 Stat:

Approved

The ‘Attendee Contact Data Portion’ of the data stream is stored

Note below the format of how the data is currently stored & Exportedfrom the Unit

If after a Badge is read and the Event Code (e.g. 123) is found with the“Z” digit set to “0” the following screen should appear for threeseconds after 2 beeps.

Event 123 Stat:

Already Used

If after a Badge is read and the Event Code (e.g. 123) is NOT found thefollowing screen should appear for three seconds after 3 beeps.

Event 123 Stat:

Not-Registered

Every time a successful “subtraction” is done the “Attendee DataSection” along with

the “Event Code” should be saved

—AS SHOWN ABOVE—

When operating in:

-   -   3=Event Add-Back Mode

The screen should appear as follows:

Event *Add-Back*

Enter Password

THIS CAN ONLY BE DONE WITH THE ENTERING OF A 3 DIGIT PASSWORD (569)

Then Show screen below after correct password entered

Event *Add-Back*

Mode-Tap Badge-

If after a Badge is read and the Event Code (e.g. 123) is found with the“Z” digit set to “0” NOW the “Z” digit should be set to “1” and thefollowing screen should appear for three seconds after 1 beep.

Event 123

Re-Instated

If after a Badge is read and the Event Code (e.g. 123) is found with the“Z” digit set to “1” (do nothing) AND

the following screen should appear for three seconds after 1 beep.

Event 123

Re-Instated

After a Badge is read and an Event Code (e.g. 123) match is NOT found inthe Card

the following screen should appear for three (3) seconds after 2 beeps.

Event 123

Not Found

Every time a successfull “Add Back” is done the “Attendee Data Section”along with

the “Event Code” should be saved

—AS SHOWN ABOVE—

When operating in:

-   -   4=Money Subtract Mode

The screen should appear as follows:

Money *Subtract*

Mode-Tap Badge-

After a Badge is read and the “Money Stored” field should be re-writtenwith the programmed amount subtracted from the original amount providingthat amount

is equal to or greater AND

the following screen should appear for three (3) seconds after 1 beep.

Money Subtracted

$040.00

After a Badge is read and the “Money Stored” field DOES NOT have enoughvalue

for this transaction, i.e. less than the amount programmed to subtractthe following screen should appear for three (3) seconds after 3 beeps.

Insufficient

-   -   Funds

Every time a successfull “subtraction” is done the “Attendee DataSection” along with

the “Amount” subtracted should be saved.

—AS SHOWN ABOVE—

When operating in:

-   -   5=Money Look-Up Mode

The screen should appear as follows:

Money *Look-Up*

Mode-Tap Badge-

After a Badge is read the “Money Stored” field value should be displayedin the following screen AND should appear for three (3) seconds after 1beep.

Amount Remaining

$001.00

NO data save is required for this operation

When operating in:

-   -   6=Supply Event Code or Money Amount

The screen should appear as follows:

-   -   1=Event Code    -   2=Money Amt

When ‘1’ is Selected . . .

-   -   The screen should appear as follows:        Enter        Event Code

This will be used in the Operations detailed above

-   -   When ‘2’ is Selected . . .

The screen should appear as follows:

Enter

Money Amount

-   -   This will be used in the Operation detailed above

The above description related to the case of an event controlled by thesystem for conducting high-degree-safety events wherein all the stationsare connected into a network operating in a real time, i.e., all thestations, including the event stations, front desk station, and securityentrance and exit stations, are connected to a common central processingunit 28 that registers, stores all the transactions, and can transmitthe data to and between all the stations.

However, the system of the invention can be realized in a lesscentralized form, i.e., without connection of all the event stationsinto a common network with the central processing unit so that thesystem can operate in a shared-time mode. An example of such a system isshown in FIG. 7. The system as a whole is designated by referencenumeral 90. The event is carried out on a closed territory or in closedaccommodations 92 with a secured entrance gate 94 and secured exit gate96. The entrance gate 94 and exit gate 96 are equipped with read/writestations 94 a and 96 a, respectively, of the same type as thosedescribed above.

A front desk 98 that may contain at least one data input terminal 100 isconnected to a self-contained central processing unit 102 that is notconnected to any event stations 104 a, 104 b, . . . 104 n of eventbooths 106 a, 106 b, . . , . 106 n located on the territory 92 of theevent. The central processing unit is used only for physical securitypurposes and not for data exchange between the stations 104 a, 104 b, .. . 104 n and the cards 108 a, 108 b, . . . 108 n shown in FIG. 7 byblocks in front of the front desk 98. The main purpose of the centralprocessing unit is to assign entrance codes or passwords to cards 108 a,108 b, . . . 108 n of individual card owners for interaction with theevent stations 104 a, 104 b, . . . 104 n and gate stations 94 a and 96a. Such a system may require for the case of strict internal securitywithout access to the information stored, e.g., in the booth's station,from the central processing unit 102. Responsibility for physicalsecurity of the event attendants is entrusted to the read/write stations94 a and 96 a of the entrance and exit gates 94 and 96, respectively.

Thus, it has been shown that the invention provides a system and amethod for conducting high-degree-safety events that, along withsecurity of access to the event information, are also concentrated onmeasures in connection with security of admission to and exit from theevent, control of the event organization and conducting, and real-timetracing of the participants at any time of the event.

Although the invention has been shown and described with reference tospecific embodiments, it is understood that these embodiments should notbe construed as limiting the areas of application of the invention andthat any changes and modifications are possible, provided these changesand modifications do not depart from the scope of the attached patentclaims. For example, a participant may receive more than one card andfunctions of the card can be separated by security and information data.The card may also contain a magnetic strip and/or bar codes. The cardmay be made in the form of a badge with a picture and name of theparticipant. The read/write stations may be portable, or stationary andconnected to a personal computer at the boost for operative change andprocessing of the information.

1. A method for conducting high-degree-safety events based on the use ofa secured card-station data interchange comprising the steps of:providing a secured system comprising a secured entrance, a securedexit, at least one event station, at least one secured-entrance stationlocated at said secured entrance, at least one secured-exit stationlocated at said secured exit, and plurality of cards, each associatedwith a card owner and storing an entrance password and an exit password,each of said cards being interchangeable with said stations, whereinsaid at least one event station contains stored information relating toan event and to sub-events in the framework of said event, said eventstation having read/write means for reading/writing information from/toeach of said cards via a first RF antenna, each of said cards havingelectrically erasable programmable ROM and a second RF antenna used forcontactless communication in a read/write manner with said read/writemeans when said card is brought to a position in close proximity to saidRF antenna, said read/write means and said electrically erasableprogrammable ROM having a coded access that allows interchange of codeddata between said read/write means and said electrically erasableprogrammable ROM; said at least one secured-entrance station and said atleast one exit station having each an RF antenna and at least aread-only memory that stores an entrance/exist password, respectively,in order to admit entrance of said card owner when said read-only memoryof said at least one secured-entrance station recognizes said entrancepassword and to admit exit when said read-only memory of said at leastone secured-exit station recognizes said exit password; entering saidevent at said secured entrance by bringing said card to a position inclose proximity to said RF antenna of said entrance station for checkingsaid entrance password; selecting at least one event station by saidcard owner and exchanging said coded data between said card and said atleast one event station by bringing said card to a position in closeproximity to said RF antenna of said event station; participating insaid event; and exiting said event at said secured exit by bringing saidcard to a position in close proximity to said RF antenna of said exitstation for checking said exit password.
 2. The method of claim 1,wherein said secured system further comprising at least one more eventstation associated with at least one selected sub-event, said methodfurther comprising the step of exchanging information by card ownersbetween each of said cards and said at least one more event stationregarding said at least one sub-event.
 3. The method of claim 2, whereinsaid coded data comprises a subtractable score associated with said atleast one sub-event and wherein said score is subtracted when said cardowner participates in said sub-event.
 4. The method of claim 3, whereinsaid subtractable score is associated with a predetermined amount ofvalue that is decreased in proportion with the participation in said atleast one sub-event.
 5. The method of claim 3, wherein said subtractablescore is at least one-time used coded information.
 6. The method ofclaim 2, wherein said step of exchanging said coded data between saidcard and said at least one event station comprises a step of checking anaccess of said card to said at least one selected sub-event, and, ifaccess is given, marking said card and/or said event station that saidat least one selected sub-event has been used in order to deny multipleaccess to said at least one selected sub-event.
 7. The method of claim1, wherein said event is selected from the groups consisting ofconferences, symposiums, meetings, exhibitions, fairs, trade shows,seminars, cruises, organized travel to resorts, hands-on trainingcourses, school site visits, plant tours, panel discussions, andexecutive forums.
 8. The method of claim 2, wherein said event isselected from the groups consisting of conferences, symposiums,meetings, exhibitions, fairs, trade shows, seminars, cruises, organizedtravel to resorts, hands-on training courses, school site visits, planttours, panel discussions, and executive forums.
 9. The method of claim3, wherein said event is selected from the groups consisting ofconferences, symposiums, meetings, exhibitions, fairs, trade shows,seminars, cruises, organized travel to resorts, hands-on trainingcourses, school site visits, plant tours, panel discussions, andexecutive forums.
 10. The method of claim 4, wherein said event isselected from the groups consisting of conferences, symposiums,meetings, exhibitions, fairs, trade shows, seminars, cruises, organizedtravel to resorts, hands-on training courses, school site visits, planttours, panel discussions, and executive forums.
 11. The method of claim5, wherein said event is selected from the groups consisting ofconferences, symposiums, meetings, exhibitions, fairs, trade shows,seminars, cruises, organized travel to resorts, hands-on trainingcourses, school site visits, plant tours, panel discussions, andexecutive forums.
 12. The method of claim 6, wherein said event isselected from the groups consisting of conferences, symposiums,meetings, exhibitions, fairs, trade shows, seminars, cruises, organizedtravel to resorts, hands-on training courses, school site visits, planttours, panel discussions, and executive forums.
 13. The method of claim1, wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 14. The method of claim 2,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 15. The method of claim 3,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 16. The method of claim 4,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 17. The method of claim 5,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 18. The method of claim 6,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 19. The method of claim 7,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 20. The method of claim 8,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 21. The method of claim 9,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 22. The method of claim 10,wherein said at least one sub-event is selected from the groupconsisting of meals, receptions, literature, concerts, movies, gifts,tournaments, banquet events, gala, food & beverage functions, liveentertainment, conference proceedings, conference tote bags, snacks,golf, and commemorative conference pins.
 23. A system for conductingevents based on the use of a secured card-station data interchange,comprising: a plurality of cards, each of said cards having anelectronic chip comprising: an electrically-erasable programmableread-only memory for storing information relating to a card owner, atleast one event, at least one sub-event in the framework of said atleast one event, an entrance password, and an exit password; a digitalcontrol unit, and a chip RF antenna with an chip RF interface; and atleast one event station comprising: data storage means for storing aninformation relating at least to said at least one event and to said atleast one sub-event; a read/write means for reading/writing informationfrom/to said chip, an event station RF antenna, an event station RFinterface, data input/output means, and a data communication port; saidinformation stored in said data storage means and relating at least tosaid at least one event and to said at least one sub-event containingaccess/deny data that provides access or denial of access to informationrelating to said event and or/sub-event; at least one secured entrancehaving a secured-entrance station with means for secured admittance ofsaid card owner to said event; and at least one secured exit having asecured-exit station with means for secured exit of said card owner fromsaid event.
 24. The system of claim 23, wherein said at least onesecured-entrance station and said at least one secured-exit stationhaving each an RF antenna and at least a read-only memory that stores anentrance/exist password, respectively, in order to admit entrance ofsaid card owner when said read-only memory of said at least onesecured-entrance station recognizes said entrance password and to admitexit when said read-only memory of said at least one secured-exitstation recognizes said exit password;
 25. The system of claim 23,wherein said digital control unit comprises: an anti-collision means,authentication means, control and arithmetic logic unit,electrically-erasable programmable read-only memory interface, and acoding unit.
 26. The system of claim 24, wherein said digital controlunit comprises: an anti-collision means, authentication means, controland arithmetic logic unit, electrically-erasable programmable read-onlymemory interface, and a coding unit.