Mobile check-in and user verification for access to secured areas such as lounges

ABSTRACT

A method of verifying that a user is authorized to access a secured area via an entry point includes receiving at a first computer and from a user device associated with the user, check-in request information that includes: a membership number associated with the user and a travel event; and a lounge location. The method also includes generating a time stamp for the receipt of the check-in request; verifying that the membership number is a valid membership number; and verifying that the time stamp is within a predetermined window of time. The method also includes sending, in response to the verification, instructions from the first computer to a second computer positioned near the entry point to display a window that includes user information associated with the user.

CROSS-REFERENCE TO RELATED APPLICATION

This application claims the benefit of the filing date of, and priorityto, U.S. Application No. 62/830,931, filed Apr. 8, 2019, the entiredisclosure of which is hereby incorporated herein by reference.

BACKGROUND

Often, access to a lounge within an airport is restricted to a group ofmembers. Not only is the access restricted to a group of members, butthe access is restricted to a specific duration of time for each member.For example, when a member is planning to travel from the airport on aspecific date, he or she is granted access to the lounge on thatspecific date.

Conventionally, when a member desires to enter the lounge, she presentsher boarding pass and/or identification to a lounge representative.Based on this information, the lounge representative confirms that themember is a member and that the member is traveling on an upcomingflight. The lounge representative then provides the member a physicalkey that unlocks a door to the lounge or otherwise allows the member toenter the lounge. Often, the check-in process can be slow and a check-inqueue forms. This delays the member from entering the lounge, which isdisliked by members. As such, a check-in process that avoids long linesand allows the member to quickly enter the lounge is needed.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a diagrammatic illustration of a system that includes a remoteuser device, a first computer, and a second computer that is locatednear a lounge, according to an example embodiment.

FIG. 2 illustrates a high level conceptual architecture associated withthe system of FIG. 1, according to an example embodiment.

FIGS. 3A and 3B together form a flow chart illustration of a method ofoperating the system of FIG. 1, according to an example embodiment.

FIG. 4 is an illustration of the remote user device of FIG. 1, accordingto an example embodiment, the remote user device including a graphicaluser interface that is displaying a window.

FIG. 5 is an illustration of another embodiment of the window of FIG. 4,according to an example embodiment.

FIG. 6 is an illustration of yet another embodiment of the window ofFIG. 4, according to an example embodiment.

FIG. 7 is an illustration of yet another embodiment of the window ofFIG. 4, according to an example embodiment.

FIG. 8 is an illustration of yet another embodiment of the window ofFIG. 4, according to an example embodiment.

FIG. 9 is an illustration of an embodiment of a window displayed on agraphical user interface of the second computer of FIG. 1, according toan example embodiment.

FIG. 10 is an illustration of another embodiment of the window displayedon the graphical user interface of FIG. 9, according to an exampleembodiment.

FIG. 11 is a diagrammatic illustration of a node for implementing one ormore example embodiments of the present disclosure, according to anexample embodiment.

DETAILED DESCRIPTION

In an example embodiment, referring to FIG. 1, a system 10 includes aremote user device 15; a plurality of data sources 20; a first computer25; and a second computer 30 located at or near a lounge 35, all ofwhich are operably connected via a network 40. In some embodiments, thecomputer 25 includes a computer processor 45 and a computer readablemedium 50 operably coupled thereto. Instructions accessible to, andexecutable by, the computer processor 45 are stored on the computerreadable medium 50. A database 55 is also stored in the computerreadable medium 50. Generally, the computer 25 also includes an inputdevice 60 and an output device 65 with each operably coupled to theprocessor 45. Generally, the remote user device 15 is associated with auser 70 and has a graphical user interface (“GUI”) 75 that can be usedto allow the user 70 to electronically check-in to the lounge 35 whenthe user 70 is a member of a club or otherwise has permission to enterthe lounge 35. Generally, the GUI 75 is configured to display aplurality of windows.

In an example embodiment, the system 10 results in a seamless customerexperience in that the user 70 checks-in using a mobile application onhis or her user device 15 and a photo of the user 70 will be displayedon the computer 30 so that a customer service representative or agent 76that is near the computer 30 can verify that the person entering thelounge 35 matches the photo displayed on the computer 30. Generally,granting permission for the user 70 to access the lounge 35 occurs atthe first computer 25 after the user 70 sends a request from his or herremote user device 15. As no interaction is required by the secondcomputer 30 and the agent 76, the number of users that can besimultaneously granted permission is unlimited. As such, the previousmethod of sequentially processing and granting permission for a group ofusers is no longer required. This improves the experience of the user 70and allows him or her to request permission on demand.

In an example embodiment, the plurality of data sources 20 includes datasources that include data relating to upcoming flight plans of users orcustomers, flight schedules, flight numbers and origination location anddeparture destination for each flight number, passenger data, etc.

In one embodiment, the remote user device 15 is similar to the computer25 in that it includes a computer processor, a computer readable medium,a database, an input device, and an output device. Generally, the inputand output device of the remote user device 15 is the graphical userinterface 75, but the input device and the output device can alsoinclude a speaker, microphone, camera, etc. In several exampleembodiments, the remote user device 15 is, or includes, a telephone, apersonal computer, a tablet, a personal digital assistant, a cellulartelephone or mobile phone, other types of telecommunications devices,other types of computing devices, and/or any combination thereof.Additionally, and in one example embodiment, the remote user device 15is adapted to communicate with a Global Positioning System (GPS) ortriangulation system such that the location of the remote user device 15is automatically detected by the remote user device 15 and/or thecomputer 25. That is, the remote user device 15 is configured for usewith geofencing services and applications.

In one embodiment, the computer 30 is similar to the computer 25 in thatit includes a computer processor, a computer readable medium, adatabase, an input device, and an output device. Generally, the inputand output device of the remote user device 30 is a graphical userinterface 78 (shown in FIGS. 9 and 10) but can also include a speaker,microphone, camera, etc. In several example embodiments, the computer 30is, or includes, a desktop computer, a laptop, a telephone, a personalcomputer, a personal digital assistant, a cellular telephone or mobilephone, other types of telecommunications devices, other types ofcomputing devices, and/or any combination thereof.

In an example embodiment, the lounge 35 is a secured area or at least anarea reserved for members and other approved visitors. In someembodiments, the lounge 35 is accessible via an entry point 79 or doorthat is monitored by the agent 76 that is associated with the computer30. In some embodiments, the lounge 35 can be any more-secured arearelative to a less-secure area or location, such as an airport terminal.An example of a secured area is an area into which entrance is resisted,monitored, restricted, etc. In some embodiments, the agent 76 opens thedoor 79 to provide entry to the user 70 to the lounge 35 and in otherembodiments the agent 76 provides access to the lounge 35 by notrefusing the user 70 entry to the lounge 35.

In an example embodiment, the network 40 includes the Internet, one ormore local area networks, one or more wide area networks, one or morecellular networks, one or more wireless networks, one or more voicenetworks, one or more data networks, one or more communication systems,and/or any combination thereof.

FIG. 2 illustrates a high level conceptual architecture associated withthe system 10, according to an example embodiment. As illustrated, anapplication 80 is stored within the remote user device 15. In someembodiments, the application 80 is stored in the computer readablemedium of the remote user device 15. In an example embodiment, theapplication 80 is a “stand alone” application in that it is a mobileapplication that is downloaded onto the remote user device 15 for thepurpose of connecting to the computer 25. Generally, the application 80displays a plurality of windows on the GUI 75 of the remote user device15. For example, the application 80 can provide a prompt on the GUI 75so that the user 70 is prompted to enter his or her user identificationand password using the input device of the remote user device 15. Theuser identification and password are sent to the computer 25 forauthentication and/or the remote user device 15 authenticates the useridentification and password. In some embodiments, an (“ESOA”)authentication 85 authenticates the user identification and password.However, the user name and password can be replaced with a fingerprint,a facial scan, or an eye scan, and the remote user device 15 is capableof capturing and recording a fingerprint, facial scan, or eye scan. Insome embodiments, the computer 25 is in communication with a Soleilapplication 90, which provides travel details and user detailsassociated with the user 70. In some embodiments, the travel details anduser details are associated with an upcoming flight. However, the traveldetails and the user details can include any type of information. Forexample, the travel details and the user details may include thepassenger name record (“PNR”), etc. As the Soleil application 90 and/orthe ESOA application 85 may be stored in the computer 25, theapplication 80 uses the network 40 to communicate with the computer 25.In some embodiments, the application 80 includes a map module that candisplay a map on a window displayed on the GUI 75 of the remote userdevice 15. For example, the map module can display a map of a terminalon a window of the GUI 75. As illustrated in FIG. 2, an application 95is stored within the computer 30. In some embodiments, the application95 is similar to the application 80 in its ability to communicate viathe network 40 with the computer 25. In some embodiments, theapplication 95 is a Seamless Check-in application that is configured todisplay a plurality of windows on the GUI 78 (shown in FIGS. 9 and 10)of the computer 30. In some embodiments, the application 95 isconfigured to display a photo and/or user data associated with the user70 on the GUI 78 of the computer 30.

FIGS. 3A and 3B together illustrate a method 100 of granting access tothe lounge 35 using the system 10. The method 100 includes the remoteuser device 15 displaying a first window associated with a search forthe lounge 35 at step 105; the remote user device 15 receivinginstructions to display a second window that is configured to receivecheck-in data at step 110; the remote user device 15 displaying thesecond window that is configured to receive the user check-in data forthe lounge 35 at step 115; the remote user device 15 receiving the usercheck-in data for the lounge 35 via the second window at step 120; thesystem 10 determining whether the user is granted permission to accessthe lounge 35 using the user check-in data at step 125; the remote userdevice 15 displaying a third window that includes check-in confirmationdata for the lounge 35 at step 130; the computer 30 displaying a fourthwindow that includes a photo of the user and/or user data at step 135;the user 70 displaying the third window to the agent at the point ofentry 79 at step 140; and removing the photo of the user 70 and userdata from the fourth window at the step 145.

At the step 105 and as illustrated in FIG. 4, the remote user device 15and/or the application 80 displays a first window 200 associated with asearch for the lounge 35. Generally, the first window is generated bythe application 80 and displayed on the GUI 75. The first window 200includes an illustration or map of a portion of a terminal that includesa representation 205 of the lounge 35. As illustrated, therepresentation 205 of the lounge 35 is positioned relative to otherlocations and stores near the lounge 35. In one embodiment, the firstwindow 200 includes a selectable button 210 such as including a checkmark near the representation 205 of the lounge 35. The selectable button210 is selectable, and selecting the button 210 opens a window 220(illustrated in FIG. 6) that is associated with the lounge 35 and/or amobile check in process for the lounge 35. In some embodiments, theapplication 80 displays the first window 200 upon notification, based onthe GPS capabilities of the remote user device 15, that the remote userdevice 15 has come within a predetermined distance from the lounge 35.That is, the user 70 can be prompted to check-in using GeoFencing. Insome embodiments, the ability to request check-in is dependent upon theuser 70 being within a specific distance of the lounge 35 and/or atleast within an airport in which the lounge 35 is located. In someembodiments, the application 80 displays directions to the user 70 tothe lounge 35 or other instructions on how to access the lounge 35. Insome embodiments, the user 70 can map his or her course to the lounge 35using the application 80 and GeoFencing.

Another example of the first window is identified by the referencenumeral 225 in the FIG. 5. The first window 225 is a listing 230 ofsearch results when the remote user device 15 receives search terms.That is, the user can search for a mobile check-in “location” using atext box 235 that is configured to receive search terms. As illustrated,the text box 235 has received the text “Admir” and the application 80 isdisplaying on the first window 225 the listing 230 of locations and acheck-in location, such as “admirals club check-in.” Selecting theoption of “admirals club check-in” 240 results in the window 220 beingdisplayed on the GUI 75.

At the step 110, the remote user device 15 receives instructions todisplay a second window that is configured to receive check in data,such as the window 220. Generally, the instructions to display thesecond window or window 220 includes selecting the selectable button 210of the window 200 and/or selecting the option of “admirals clubcheck-in” 250 of the window 225. However, the step 110 can include anaudible command (received via a microphone of the remote user device 15)to remotely check-in to the nearest lounge. As such, there are a varietyof ways that the remote user device 15 receives instructions to displaythe window 220.

During the step 115, the remote user device 15 displays the window 220,which is illustrated in FIG. 6. In some embodiments, the window 220provides information regarding the lounge 35, such as operating hours,amenities, location, etc. In some embodiments, the window 220 includes aselectable tab 245 that, in this example, is labeled “Mobile Entry” withan illustration of a key. Regardless of the label or accompanyingillustration, the selection of the selectable tab 245 providesinstructions to the application 80 and/or the remote user device 15 todisplay another window 250 (illustrated in FIG. 7) on the GUI 75. Insome embodiments, the selection of the tab 245 results in the remoteuser device 15 receiving instructions to display the window 250.

At the step 115, the window 250 is displayed on the GUI 75. Asillustrated in FIG. 7, the window 250 is configured to receive check-indata that is associated with the user 70. The window 250 includes a lastname 255 of the user 70, the advantage number 260 or other membershipnumber of the user 70, a club location input mechanism 265, an inputmechanism for a number of guests 270 and a “check-in” button 275. Insome embodiments, the last name 255 and the advantage number 260 areprepopulated based on the login and password previously provided to theapplication 80. In some embodiments, the club location is prepopulatedbased on the GPS capabilities of the remote user device 15. That is, thewindow 250 prepopulates the nearest lounge 35 in the window 250 based onthe location of the remote user device 15.

At the step 120, the remote user device 15 receives the user check-indata for the lounge 35 via the window 250. That is, the user can use theinput mechanisms to input the number of guests that will accompany theuser 70 and/or select the lounge 35 location. In some embodiments, theselection of the “check-in” button 275 creates a request or query thatis sent from the remote user device 15 to the computer 25. In someembodiments, the request or query also includes a time stamp associatedwith the time at which the “check-in” button 275 was selected. That is,the request or query can include the membership number of the user 70,the number of guests that will accompany the user 70, the location ofthe lounge 35, and a time stamp associated with the request.

At the step 125, the system 10 determines whether the user 70 is grantedpermission to access the lounge 35. Generally, the determination dependson the timing of the request and the travel plans associated with theuser 70. Generally, the check in data or query is sent to the computer25 to determine whether the user 70 should be granted access to thelounge 35. In some embodiments, the user 70 is granted access to thelounge 35 when the user 70 is a member or otherwise approved to enterthe lounge 35 and is waiting on a flight departing from the airport inwhich the lounge 35 is located. As such, the system 10 determineswhether the user 70 is a member, and also determines whether the user 70is waiting on a flight departing from the airport in which the lounge islocated. In some embodiments, the system 10 refers to travel detailsprovided by the plurality of data sources 20 to locate any upcomingflight. The system 10 then determines if the upcoming flight isdeparting from the airport in which the lounge 35 is located and if thedeparture time is within a predetermined period of time from theattempted check-in associated with the time stamp in the query. That is,in some embodiments, the user 70 is granted access to the lounge 35 fortwo hours before the departure time of an upcoming flight or two hoursfrom the boarding time of an upcoming flight. The period of time is notrequired to be two hours and the period of time can change based on thelocation, a level of membership, etc. As such, the computer 25 and/orthe system 10 compares the time stamp associated with the query to thescheduled boarding time or scheduled flight time to determine whetherthe query is received within the predetermined period of time. In someembodiments, the user 70 must be waiting on departure of a flight andcannot access the lounge 35 after arriving at his or her destination.However, in other embodiments a user 70 is granted access to the lounge35 for a period of time after arriving at his or her destination, andthis can be dependent upon the level of membership, etc. Generally,verifying that the user 70 is granted permission to access the lounge 35includes verifying that the membership number is a valid membershipnumber; verifying that the departure location is associated with thelounge location; and verifying that the time stamp is within a window oftime prior to the scheduled departure time

At the step 130, the remote user device 15 displays a third window thatincludes check-in confirmation data for the lounge 35. When the system10 determines that the user 70 is eligible to access the lounge 35, thethird window, or window 280 illustrated in FIG. 8, is displayed on theGUI 75. In some embodiments, the window 280 includes a confirmationidentifier 285. As illustrated in FIG. 8, the confirmation identifier285 is a short letter and number combination. However, the confirmationidentifier can be any symbol, color, video, etc. that is shown on thewindow 280.

At the step 135, the computer 30 displays a fourth window or a window290 on the GUI 78 of the computer 30 as illustrated in FIG. 9. Thewindow 290 includes a photo 300 of the user 70 and user data 305.Simultaneously with or after the step 130, the system 10 causes thewindow 290 to be displayed on the GUI 78. Generally, the GUI 78 issimilar to the GUI 75 in that the GUI 78 is configured to display aplurality of windows. As illustrated in FIG. 9, the photo 300 of theuser 70 is included in the window 290 as well as the user data 305. Theuser data 305 may include an advantage number, a name, etc. In someembodiments, the window 290 also includes input buttons 310 that, uponselection, remove the photo 300 of the user 70 and the user data 305from the window 290. As illustrated in FIG. 9, information (e.g., photoof the user and/or user data) relating to more than one user can bedisplayed simultaneously on the window 290, therefore allowing more thanone user to check-in simultaneously. As illustrated, the photo and userdata for a user named “Mark Smith” is also displayed on the window 290.Each user can be associated with one input button so that the userinformation associated with a user can be removed from the window uponselection of the input button while allowing user information associatedwith other users to remain on the window 290. The agent 76 viewing thecomputer 30 is capable of viewing the window 290 and the photo 300 ofthe user 70 to visually confirm that a person attempting to enter thelounge 35 is the user 70. Generally, the application 95 displays thewindow 290 on the GUI 78 of the computer 30. As illustrated, the window290 is a pop-up window that only covers a small portion of the GUI 78 ofthe computer 30, such that the agent 76 can be working on other itemswhile the window 290 is displayed. Although each of the photos 300 inFIG. 9 includes a censor bar (or black bar or censor box) masking theidentity of a human face, in operation the photo 300 would not includethe censor bar. In several embodiments, the photo 300 is, includes, oris part of, any type of image or rendering that resembles the user insome way. The photo 300 may be, for example, any type of digital imageof the user or the face of the user, a stylized electronic drawing ofthe user or the face of the user, a pixelated image of the user or theface of the user, a vector illustration of the user or the face of theuser, or any combination thereof.

At the step 140, the user 70 shows the third window or the window 280 tothe agent 76 that is located at the point of entry 79 to the lounge 35.As the window 280 includes a confirmation identifier 285, the agent 76can quickly verify that the user approaching the point of entry 79 isauthorized to enter the lounge 35. In some embodiments, the confirmationidentifier 285 forms a portion of the other user data 305 displayed onthe window 290. Thus, the agent 76 can quickly match the confirmationidentifier 285 displayed on the window 280 and a confirmation identifierdisplayed on the window 290. When the user 70 approaches the computer 30and/or the point of entry 79 to the lounge 35, the agent 76 can greetthe user 70 by name using the photo 300 and the other user data 305 toimprove the experience of the user 70.

At the step 145, the photo of the user 70 and the other user data isremoved from the window 290. Upon confirming that the user 70 hasentered the lounge 35, the agent 76 can select the input button 310 toremove the photo 300 of the user 70 and the other user data 305 from thewindow 290, as illustrated in FIG. 10. This allows the window 290 todisplay only users that have electronically checked-in to the lounge 35but that have not yet arrived. In other embodiments, the system 10 canremove the photo 300 of the user 70 and the other user data 305 uponreceiving confirmation via GPS that the user has entered the lounge 35.That is, in some embodiments, the agent 76 does not select the inputbutton 310. Instead, the system 10 determines that the user 70 hasentered the lounge 35 due to a GPS location of the remote user device 15of the user 70, and the system 10 removes the photo 300 of the user 70and the other user data 305 automatically. In some embodiments, thesystem 10 determines that the user 70 has entered the lounge 35 due to aBluetooth or Wi-Fi pairing that occurs within the lounge 35. Althoughthe photos 300 in FIG. 10 includes a censor bar (or black bar or censorbox) masking the identity of a human face, in operation the photo 300would not include the censor bar. As illustrated in FIG. 10, selectionof the input button 310 removes the photo 300 of the user 70 and theother user data 305 associated with the user 70, but the photo and otheruser data associated with “Mark Smith” remains displayed on the window290.

There are many variations to the method 100 and/or the system 10. Forexample, in some embodiments, the confirmation identifier 285 acts as atime sensitive PIN number that is entered on a keypad coupled to thedoor 79, which generally remains locked. Upon entering the confirmationidentifier 285 using the keypad, the locked door 79 is opened such thatthe user 70 can enter the lounge 35. In other embodiments, theconfirmation number 285 is displayed in the window 290 in place orand/or in addition to the photo 300. In some embodiments and when theconfirmation number 285 is displayed on the window 290 and the window280, verification or validation that the user 70 should be grantedaccess to the lounge 35 is based on the user 70 displaying or speakingthe confirmation number 285 to the user 76 to verify that theconfirmation numbers match.

In some embodiments, the membership number may be or include a frequentflyer number, an industry specific identification number, a socialsecurity number, a Transportation Security Administration (“TSA”)identifier, and a pre-check or other known traveler number.

In some embodiments, using the system 10 and/or completing at least aportion of the method 100 allows the user 70 to use his or her remoteuser device 15 as a credential for entering a secured access location,such as an airport lounge. When using the system 10 and/or completing atleast a portion of the method 100, the computer 30 does not query thecomputer 25 to determine whether the user 70 is an active member andwhether the user 70 is granted permission to enter the lounge 35.Instead, the query is generated by the remote user device 15 and look-upis performed by the computer 25, which prevents the computer 30 fromneeding to use memory and processing power to create and send the query.As such, the available memory and processing power of the computer 30are increased when compared to the available memory and processing powerof the computer 30 when the computer 30 is required to create and send aquery as to the permission of the user 70. Considering the availablememory and processor power of the computer 30 are increased, the system10 and/or the method 100 improves the functioning of the computer 30itself.

In some embodiments, using the system 10 and/or completing at least aportion of the method 100 creates a streamlined experience for the user70. With conventional systems in the technical field of customerservice, users or members are required to physically wait in a line tospeak to an agent so that the agent can create and send a queryregarding whether the user 70 is granted permission to access the lounge35. This is not ideal for customers. The system 10 and/or the method 100provides an improvement in the technical field of customer service inthat the user 70 is capable of creating and sending his or her own queryregarding permission to access the lounge 35. As the creation and queryof the request is independent of the computer 30, the system 10 iscapable of processing a larger number of queries from a larger number ofusers. This greatly increases the number of queries processed andincreases check-in speed for the members, as the conventional systemsrequire a sequential processing of members. In some embodiments, the useof the system 10 enables more accurate entry of user information andmore efficient processing of validation requests (e.g. request to enterthe lounge 35).

In one or more example embodiments, each of the applications is storedin the computer readable medium. In some embodiments, the applicationincludes and/or executes one or more web-based programs, Intranet-basedprograms, and/or any combination thereof. In an example embodiment, theapplication includes a computer program including a plurality ofinstructions, data, and/or any combination thereof. In an exampleembodiment, the application is written in, for example, HyperText MarkupLanguage (HTML), Cascading Style Sheets (CSS), JavaScript, ExtensibleMarkup Language (XML), asynchronous JavaScript and XML (Ajax), iOS,xCode, Swift, Android for mobile, and/or any combination thereof. In anexample embodiment, the application is a web-based application writtenin, for example, Java or Adobe Flex, which pulls real-time informationfrom another computer and/or a plurality of data sources. In an exampleembodiment, the application pulls real-time information from theplurality of data sources, upon the execution, opening or start-up ofthe application. In an example embodiment, the application is stored onthe computer readable medium and/or in the database.

In an example embodiment, as illustrated in FIG. 14 with continuingreference to FIGS. 1-10, an illustrative node 1000 for implementing oneor more of the example embodiments described above and/or illustrated inFIGS. 1-10 is depicted. The node 1000 includes a microprocessor 1000 a,an input device 1000 b, a storage device 1000 c, a video controller 1000d, a system memory 1000 e, a display 1000 f, and a communication device1000 g all interconnected by one or more buses 1000 h. In severalexample embodiments, the storage device 1000 c may include a thumbdrive, hard drive, CD-ROM, optical drive, any other form of storagedevice and/or any combination thereof. In several example embodiments,the storage device 1000 c may include, and/or be capable of receiving, afloppy disk, CD-ROM, DVD-ROM, or any other form of computer-readablemedium that may contain executable instructions. In several exampleembodiments, the communication device 1000 g may include a modem,network card, or any other device to enable the node to communicate withother nodes. In several example embodiments, any node represents aplurality of interconnected (whether by intranet or Internet) computersystems, including without limitation, personal computers, mainframes,PDAs, smartphones and cell phones.

In several example embodiments, one or more of the components of thesystems described above and/or illustrated in FIGS. 1-10 include atleast the node 1000 and/or components thereof, and/or one or more nodesthat are substantially similar to the node 1000 and/or componentsthereof. In several example embodiments, one or more of theabove-described components of the node 1000, the system 10, and/or theexample embodiments described above and/or illustrated in FIGS. 1-10include respective pluralities of same components.

In several example embodiments, one or more of the applications,systems, and application programs described above and/or illustrated inFIGS. 1-10 include a computer program that includes a plurality ofinstructions, data, and/or any combination thereof; an applicationwritten in, for example, Arena, HyperText Markup Language (HTML),Cascading Style Sheets (CSS), JavaScript, Extensible Markup Language(XML), asynchronous JavaScript and XML (Ajax), and/or any combinationthereof; a web-based application written in, for example, Java or AdobeFlex, which in several example embodiments pulls real-time informationfrom one or more servers, automatically refreshing with latestinformation at a predetermined time increment; or any combinationthereof.

In several example embodiments, a computer system typically includes atleast hardware capable of executing machine readable instructions, aswell as the software for executing acts (typically machine-readableinstructions) that produce a desired result. In several exampleembodiments, a computer system may include hybrids of hardware andsoftware, as well as computer sub-systems.

In several example embodiments, hardware generally includes at leastprocessor-capable platforms, such as client-machines (also known aspersonal computers or servers), and hand-held processing devices (suchas smart phones, tablet computers, personal digital assistants (PDAs),or personal computing devices (PCDs), for example). In several exampleembodiments, hardware may include any physical device that is capable ofstoring machine-readable instructions, such as memory or other datastorage devices. In several example embodiments, other forms of hardwareinclude hardware sub-systems, including transfer devices such as modems,modem cards, ports, and port cards, for example.

In several example embodiments, software includes any machine codestored in any memory medium, such as RAM or ROM, and machine code storedon other devices (such as floppy disks, flash memory, or a CD ROM, forexample). In several example embodiments, software may include source orobject code. In several example embodiments, software encompasses anyset of instructions capable of being executed on a node such as, forexample, on a client machine or server.

In several example embodiments, combinations of software and hardwarecould also be used for providing enhanced functionality and performancefor certain embodiments of the present disclosure. In an exampleembodiment, software functions may be directly manufactured into asilicon chip. Accordingly, it should be understood that combinations ofhardware and software are also included within the definition of acomputer system and are thus envisioned by the present disclosure aspossible equivalent structures and equivalent methods.

In several example embodiments, computer readable mediums include, forexample, passive data storage, such as a random-access memory (RAM) aswell as semi-permanent data storage such as a compact disk read onlymemory (CD-ROM). One or more example embodiments of the presentdisclosure may be embodied in the RAM of a computer to transform astandard computer into a new specific computing machine. In severalexample embodiments, data structures are defined organizations of datathat may enable an embodiment of the present disclosure. In an exampleembodiment, a data structure may provide an organization of data, or anorganization of executable code.

In several example embodiments, any networks and/or one or more portionsthereof may be designed to work on any specific architecture. In anexample embodiment, one or more portions of any networks may be executedon a single computer, local area networks, client-server networks, widearea networks, internets, hand-held and other portable and wirelessdevices and networks.

In several example embodiments, a database may be any standard orproprietary database software. In several example embodiments, thedatabase may have fields, records, data, and other database elementsthat may be associated through database specific software. In severalexample embodiments, data may be mapped. In several example embodiments,mapping is the process of associating one data entry with another dataentry. In an example embodiment, the data contained in the location of acharacter file can be mapped to a field in a second table. In severalexample embodiments, the physical location of the database is notlimiting, and the database may be distributed. In an example embodiment,the database may exist remotely from the server, and run on a separateplatform. In an example embodiment, the database may be accessibleacross the Internet. In several example embodiments, more than onedatabase may be implemented.

In several example embodiments, a plurality of instructions stored on anon-transitory computer readable medium may be executed by one or moreprocessors to cause the one or more processors to carry out or implementin whole or in part the above-described operation of each of theabove-described example embodiments of the system, the method, and/orany combination thereof. In several example embodiments, such aprocessor may include one or more of the microprocessor 1000 a, anyprocessor that are part of the components of the system, and/or anycombination thereof, and such a computer readable medium may bedistributed among one or more components of the system. In severalexample embodiments, such a processor may execute the plurality ofinstructions in connection with a virtual computer system. In severalexample embodiments, such a plurality of instructions may communicatedirectly with the one or more processors, and/or may interact with oneor more operating systems, middleware, firmware, other applications,and/or any combination thereof, to cause the one or more processors toexecute the instructions.

The present disclosure introduces a method of verifying that a firstuser is authorized to access a secured area via an entry point that ispositioned between a first area and the secured area, wherein the methodcomprises: receiving at a first computer and from a first remote userdevice that is associated with the first user, information relating to afirst check-in request; wherein the information relating to the firstcheck-in request comprises: a first membership number associated withthe first user; and a lounge location; wherein the first membershipnumber is associated with a first future travel plan; and wherein thefirst future travel plan comprises a first travel event that departsfrom a departure location at a scheduled departure time; generating afirst time stamp for the receipt of the information relating to thefirst check-in request; verifying, using the information relating to thefirst check-in request and the first computer, that the first user isauthorized to enter the secured area; wherein verifying that the firstuser is authorized to enter the secured area comprises: verifying thatthe first membership number is a valid membership number; verifying thatthe departure location is associated with the lounge location; andverifying that the first time stamp is within a window of time prior tothe scheduled departure time; and sending, in response to theverification that the first user is authorized to enter the securedarea, instructions from the first computer to a second computerpositioned near the entry point to display a first window on the secondcomputer, wherein the first window includes user information associatedwith the first user. In one embodiment, the first remote user devicecomprises a graphical user interface that is configured to display aplurality of windows; wherein receiving the information relating to afirst check-in request comprises: displaying a second window on thegraphical user interface of the first remote user device, wherein thesecond window is configured to receive the information relating to afirst check-in request; receiving, by the first remote user device, theinformation relating to a first check-in request. In one embodiment, thefirst travel event is a flight; and wherein the departure location is anairport; and wherein the departure location is associated with thelounge location when the lounge location is within the airport. In oneembodiment, the method further comprises: receiving at the firstcomputer, a plurality of check-in requests from a plurality of remoteuser devices; wherein the first check-in request is one of the pluralityof check-in requests; wherein the first remote user device is one of theplurality of remote user devices; and verifying, using the firstcomputer and based on the plurality of check-in requests, that aplurality of users is authorized to enter the secured area; wherein thefirst user is one of the plurality of users that is authorized to enterthe secured area; and wherein the window displayed on the secondcomputer includes user information associated with each user in theplurality of users authorized to enter the secured area. In oneembodiment, the first remote user device comprises a graphical userinterface that is configured to display a plurality of windows; whereinthe method further comprises displaying, after verifying that the firstuser is authorized to enter the secured area, a third window on thegraphical user interface of the first remote user device; and whereinthe third window includes a confirmation of remote check-in of the firstuser to the secured area. In one embodiment, the method also includesgranting the first user access to the secured area based on the userinformation associated with the first user displayed on the secondcomputer and further based on the third window being displayed thatincludes the confirmation of remote check-in of the first user; whereinthe user information associated with the first user comprises a photo ofthe first user. In one embodiment, the first window further includes afirst tab, the selection of which removes the user informationassociated with the first user from the first window; and wherein themethod further comprises removing the user information associated withthe first user from the first window in response to selection of thefirst tab. In one embodiment, the method also includes displaying afourth window on the first remote user device, wherein the fourth windowdisplays an illustration of a map of an area in which the first remoteuser device is located; wherein the map comprises an illustration of thesecured area and a second selectable tab associated with a remotecheck-in of the first user; receiving an indication that the secondselectable tab associated with the remote check-in of the first user hasbeen selected; and displaying the second window in response to thereceipt of the indication that the second selectable tab associated withthe remote check-in of the first user has been selected. In oneembodiment, the illustration of the map of the area is generated basedon the located of the first remote user device. In one embodiment, themethod also includes: displaying a fifth window on the first remote userdevice, wherein the fifth window displays a listing of search results;wherein the listing of search results comprises a third selectable tabassociated with remote check-in of the first user to the secured area;receiving an indication that the third selectable tab has been selected;and displaying the second window in response to the receipt of theindication that the third selectable tab has been selected.

The present disclosure introduces a system for verifying that a firstuser is authorized to access a secured area via an entry point that ispositioned between a first area and the secured area, the systemcomprising: a first computer associated with the entry point, whereinthe first computer comprises a graphical user interface that isconfigured to display a first window; one or more processors operablycoupled to a non-transitory computer readable medium; and a plurality ofinstructions stored on the non-transitory computer readable medium,wherein when the instructions are executed with at least one processor,the following steps are executed: receiving at a second computer andfrom a first remote user device that is associated with the first user,information relating to a first check-in request; wherein theinformation relating to the first check-in request comprises: a firstmembership number associated with the first user; and a lounge location;wherein the first membership number is associated with a first futuretravel plan; and wherein the first future travel plan comprises a firsttravel event that departs from a departure location at a scheduleddeparture time; generating a first time stamp for the receipt of theinformation relating to the first check-in request; verifying, using theinformation relating to the first check-in request and the secondcomputer, that the first user is authorized to enter the secured area;wherein verifying that the first user is authorized to enter the securedarea comprises: verifying that the first membership number is a validmembership number; verifying that the departure location is associatedwith the lounge location; and verifying that the first time stamp iswithin a window of time prior to the scheduled departure time; andsending, in response to the verification that the first user isauthorized to enter the secured area, instructions from the secondcomputer to the first computer to display a first window on the firstcomputer, wherein the first window includes user information associatedwith the first user. In one embodiment, the first remote user devicecomprises a graphical user interface that is configured to display aplurality of windows; wherein receiving the information relating to afirst check-in request comprises: displaying a second window on thegraphical user interface of the first remote user device, wherein thesecond window is configured to receive the information relating to afirst check-in request; receiving, by the first remote user device, theinformation relating to a first check-in request. In one embodiment, thefirst travel event is a flight; and wherein the departure location is anairport and wherein the departure location is associated with the loungelocation when the lounge location is within the airport. In oneembodiment, when the instructions are executed with at least oneprocessor, the following steps are also executed: receiving at thesecond computer a plurality of check-in requests from a plurality ofremote user devices; wherein the first check-in request is one of theplurality of check-in requests; and wherein the first remote user deviceis one of the plurality of remote user devices; and verifying, using thesecond computer and based on the plurality of check-in requests, that aplurality of users is authorized to enter the secured area; wherein thefirst user is one of the plurality of users that is authorized to enterthe secured area; and wherein the window displayed on the secondcomputer includes user information associated with each user in theplurality of users authorized to enter the secured area; wherein atleast one of the one or more processors is part of the first computerassociated with the entry point; and wherein the execution ofinstructions improves available memory of the first computer. In oneembodiment, the first remote user device comprises a graphical userinterface that is configured to display a plurality of windows; whereinwhen the instructions are executed with at least one processor, thefollowing step is also executed: displaying, after verifying that thefirst user is authorized to enter the secured area, a third window onthe graphical user interface of the first remote user device; andwherein the third window includes a confirmation of remote check-in ofthe first user to the secured area. In one embodiment, when theinstructions are executed with at least one processor, the followingstep is also executed: granting the first user access to the securedarea based on the user information associated with the first userdisplayed on the first computer and further based on the third windowbeing displayed that includes the confirmation of remote check-in of thefirst user; wherein the user information associated with the first usercomprises a photo of the first user. In one embodiment, the first windowfurther includes a first tab, the selection of which removes the userinformation associated with the first user from the first window; andwherein when the instructions are executed with at least one processor,the following step is also executed: removing the user informationassociated with the first user from the first window in response toselection of the first tab. In one embodiment, when the instructions areexecuted with at least one processor, the following steps are alsoexecuted: displaying a fourth window on the first remote user device,wherein the fourth window displays an illustration of a map of an areain which the first remote user device is located; wherein the mapcomprises an illustration of the secured area and a second selectabletab associated with a remote check-in of the first user; receiving anindication that the second selectable tab associated with the remotecheck-in of the first user has been selected; and displaying the secondwindow in response to the receipt of the indication that the secondselectable tab associated with the remote check-in of the first user hasbeen selected. In one embodiment, the illustration of the map of thearea is generated based on the located of the first remote user device.In one embodiment, when the instructions are executed with at least oneprocessor, the following steps are also executed: displaying a fifthwindow on the first remote user device, wherein the fifth windowdisplays a listing of search results; wherein the listing of searchresults comprises a third selectable tab associated with remote check-inof the first user to the secured area; receiving an indication that thethird selectable tab has been selected; and displaying the second windowin response to the receipt of the indication that the third selectabletab has been selected.

In several example embodiments, the elements and teachings of thevarious illustrative example embodiments may be combined in whole or inpart in some or all the illustrative example embodiments. In addition,one or more of the elements and teachings of the various illustrativeexample embodiments may be omitted, at least in part, and/or combined,at least in part, with one or more of the other elements and teachingsof the various illustrative embodiments.

The phrase “at least one of A and B” should be understood to mean “A, B,or both A and B.” The phrase “one or more of the following: A, B, and C”should be understood to mean “A, B, C, A and B, B and C, A and C, or allthree of A, B, and C.” The phrase “one or more of A, B, and C” should beunderstood to mean “A, B, C, A and B, B and C, A and C, or all three ofA, B, and C.”

Any spatial references such as, for example, “upper,” “lower,” “above,”“below,” “between,” “bottom,” “vertical,” “horizontal,” “angular,”“upwards,” “downwards,” “side-to-side,” “left-to-right,”“right-to-left,” “top-to-bottom,” “bottom-to-top,” “top,” “bottom,”“bottom-up,” “top-down,” etc., are for the purpose of illustration onlyand do not limit the specific orientation or location of the structuredescribed above.

In several example embodiments, while different steps, processes, andprocedures are described as appearing as distinct acts, one or more ofthe steps, one or more of the processes, and/or one or more of theprocedures may also be performed in different orders, simultaneouslyand/or sequentially. In several example embodiments, the steps,processes and/or procedures may be merged into one or more steps,processes and/or procedures.

In several example embodiments, one or more of the operational steps ineach embodiment may be omitted. Moreover, in some instances, somefeatures of the present disclosure may be employed without acorresponding use of the other features. Moreover, one or more of theabove-described embodiments and/or variations may be combined in wholeor in part with any one or more of the other above-described embodimentsand/or variations.

Although several example embodiments have been described in detailabove, the embodiments described are example only and are not limiting,and those skilled in the art will readily appreciate that many othermodifications, changes and/or substitutions are possible in the exampleembodiments without materially departing from the novel teachings andadvantages of the present disclosure. Accordingly, all suchmodifications, changes and/or substitutions are intended to be includedwithin the scope of this disclosure as defined in the following claims.In the claims, any means-plus-function clauses are intended to cover thestructures described herein as performing the recited function and notonly structural equivalents, but also equivalent structures. Moreover,it is the express intention of the applicant not to invoke 35 U.S.C. §112(f) for any limitations of any of the claims herein, except for thosein which the claim expressly uses the word “means” together with anassociated function.

What we claim is:
 1. A method of verifying that a first user isauthorized to access a secured area via an entry point that ispositioned between a first area and the secured area, wherein the methodcomprises: receiving at a first computer and from a first remote userdevice that is associated with the first user, information relating to afirst check-in request; wherein the information relating to the firstcheck-in request comprises: a first membership number associated withthe first user; and a lounge location; wherein the first membershipnumber is associated with a first future travel plan; and wherein thefirst future travel plan comprises a first travel event that departsfrom a departure location at a scheduled departure time; generating afirst time stamp for the receipt of the information relating to thefirst check-in request; verifying, using the information relating to thefirst check-in request and the first computer, that the first user isauthorized to enter the secured area; wherein verifying that the firstuser is authorized to enter the secured area comprises: verifying thatthe first membership number is a valid membership number; verifying thatthe departure location is associated with the lounge location; andverifying that the first time stamp is within a window of time prior tothe scheduled departure time; and sending, in response to theverification that the first user is authorized to enter the securedarea, instructions from the first computer to a second computerpositioned near the entry point to display a first window on the secondcomputer, wherein the first window includes user information associatedwith the first user.
 2. The method of claim 1, wherein the first remoteuser device comprises a graphical user interface that is configured todisplay a plurality of windows; wherein receiving the informationrelating to a first check-in request comprises: displaying a secondwindow on the graphical user interface of the first remote user device,wherein the second window is configured to receive the informationrelating to a first check-in request; receiving, by the first remoteuser device, the information relating to a first check-in request. 3.The method of claim 2, wherein the first travel event is a flight; andwherein the departure location is an airport and wherein the departurelocation is associated with the lounge location when the lounge locationis within the airport.
 4. The method of claim 1, wherein the methodfurther comprises: receiving at the first computer, a plurality ofcheck-in requests from a plurality of remote user devices; wherein thefirst check-in request is one of the plurality of check-in requests; andwherein the first remote user device is one of the plurality of remoteuser devices; and verifying, using the first computer and based on theplurality of check-in requests, that a plurality of users is authorizedto enter the secured area; wherein the first user is one of theplurality of users that is authorized to enter the secured area; andwherein the window displayed on the second computer includes userinformation associated with each user in the plurality of usersauthorized to enter the secured area.
 5. The method of claim 1, whereinthe first remote user device comprises a graphical user interface thatis configured to display a plurality of windows; wherein the methodfurther comprises displaying, after verifying that the first user isauthorized to enter the secured area, a third window on the graphicaluser interface of the first remote user device; and wherein the thirdwindow includes a confirmation of remote check-in of the first user tothe secured area.
 6. The method of claim 5, further comprising grantingthe first user access to the secured area based on the user informationassociated with the first user displayed on the second computer andfurther based on the third window being displayed that includes theconfirmation of remote check-in of the first user; wherein the userinformation associated with the first user comprises a photo of thefirst user.
 7. The method of claim 1, wherein the first window furtherincludes a first tab, the selection of which removes the userinformation associated with the first user from the first window; andwherein the method further comprises removing the user informationassociated with the first user from the first window in response toselection of the first tab.
 8. The method of claim 2, furthercomprising: displaying a fourth window on the first remote user device,wherein the fourth window displays an illustration of a map of an areain which the first remote user device is located; wherein the mapcomprises an illustration of the secured area and a second selectabletab associated with a remote check-in of the first user; receiving anindication that the second selectable tab associated with the remotecheck-in of the first user has been selected; and displaying the secondwindow in response to the receipt of the indication that the secondselectable tab associated with the remote check-in of the first user hasbeen selected.
 9. The method of claim 8, wherein the illustration of themap of the area is generated based on the located of the first remoteuser device.
 10. The method of claim 2, further comprising: displaying afifth window on the first remote user device, wherein the fifth windowdisplays a listing of search results; wherein the listing of searchresults comprises a third selectable tab associated with remote check-inof the first user to the secured area; receiving an indication that thethird selectable tab has been selected; and displaying the second windowin response to the receipt of the indication that the third selectabletab has been selected.
 11. A system for verifying that a first user isauthorized to access a secured area via an entry point that ispositioned between a first area and the secured area, the systemcomprising: a first computer associated with the entry point, whereinthe first computer comprises a graphical user interface that isconfigured to display a first window; one or more processors operablycoupled to a non-transitory computer readable medium; and a plurality ofinstructions stored on the non-transitory computer readable medium,wherein when the instructions are executed with at least one processor,the following steps are executed: receiving at a second computer andfrom a first remote user device that is associated with the first user,information relating to a first check-in request; wherein theinformation relating to the first check-in request comprises: a firstmembership number associated with the first user; and a lounge location;wherein the first membership number is associated with a first futuretravel plan; and wherein the first future travel plan comprises a firsttravel event that departs from a departure location at a scheduleddeparture time; generating a first time stamp for the receipt of theinformation relating to the first check-in request; verifying, using theinformation relating to the first check-in request and the secondcomputer, that the first user is authorized to enter the secured area;wherein verifying that the first user is authorized to enter the securedarea comprises: verifying that the first membership number is a validmembership number; verifying that the departure location is associatedwith the lounge location; and verifying that the first time stamp iswithin a window of time prior to the scheduled departure time; andsending, in response to the verification that the first user isauthorized to enter the secured area, instructions from the secondcomputer to the first computer to display a first window on the firstcomputer, wherein the first window includes user information associatedwith the first user.
 12. The system of claim 11, wherein the firstremote user device comprises a graphical user interface that isconfigured to display a plurality of windows; wherein receiving theinformation relating to a first check-in request comprises: displaying asecond window on the graphical user interface of the first remote userdevice, wherein the second window is configured to receive theinformation relating to a first check-in request; receiving, by thefirst remote user device, the information relating to a first check-inrequest.
 13. The system of claim 12, wherein the first travel event is aflight; and wherein the departure location is an airport and wherein thedeparture location is associated with the lounge location when thelounge location is within the airport.
 14. The system of claim 11,wherein when the instructions are executed with the at least oneprocessor, the following steps are also executed: receiving at thesecond computer, a plurality of check-in requests from a plurality ofremote user devices; wherein the first check-in request is one of theplurality of check-in requests; and wherein the first remote user deviceis one of the plurality of remote user devices; and verifying, using thesecond computer and based on the plurality of check-in requests, that aplurality of users is authorized to enter the secured area; wherein thefirst user is one of the plurality of users that is authorized to enterthe secured area; and wherein the window displayed on the secondcomputer includes user information associated with each user in theplurality of users authorized to enter the secured area; wherein one ofthe one or more processors is part of the first computer associated withthe entry point; and wherein the execution of the instructions improvesavailable memory of the first computer.
 15. The system of claim 11,wherein the first remote user device comprises a graphical userinterface that is configured to display a plurality of windows; whereinwhen the instructions are executed with the at least one processor, thefollowing step is also executed: displaying, after verifying that thefirst user is authorized to enter the secured area, a third window onthe graphical user interface of the first remote user device; andwherein the third window includes a confirmation of remote check-in ofthe first user to the secured area.
 16. The system of claim 15, whereinwhen the instructions are executed with the at least one processor, thefollowing step is also executed: granting the first user access to thesecured area based on the user information associated with the firstuser displayed on the first computer and further based on the thirdwindow being displayed that includes the confirmation of remote check-inof the first user; wherein the user information associated with thefirst user comprises a photo of the first user.
 17. The system of claim11, wherein the first window further includes a first tab, the selectionof which removes the user information associated with the first userfrom the first window; and wherein when the instructions are executedwith the at least one processor, the following step is also executed:removing the user information associated with the first user from thefirst window in response to selection of the first tab.
 18. The systemof claim 12, wherein when the instructions are executed with the atleast one processor, the following steps are also executed: displaying afourth window on the first remote user device, wherein the fourth windowdisplays an illustration of a map of an area in which the first remoteuser device is located; wherein the map comprises an illustration of thesecured area and a second selectable tab associated with a remotecheck-in of the first user; receiving an indication that the secondselectable tab associated with the remote check-in of the first user hasbeen selected; and displaying the second window in response to thereceipt of the indication that the second selectable tab associated withthe remote check-in of the first user has been selected.
 19. The systemof claim 18, wherein the illustration of the map of the area isgenerated based on the located of the first remote user device.
 20. Thesystem of claim 12, wherein when the instructions are executed with theat least one processor, the following steps are also executed:displaying a fifth window on the first remote user device, wherein thefifth window displays a listing of search results; wherein the listingof search results comprises a third selectable tab associated withremote check-in of the first user to the secured area; receiving anindication that the third selectable tab has been selected; anddisplaying the second window in response to the receipt of theindication that the third selectable tab has been selected.