US20190287327A1 - System and Method to Streamline Identity Verification at Airports and Beyond - Google Patents

System and Method to Streamline Identity Verification at Airports and Beyond Download PDF

Info

Publication number
US20190287327A1
US20190287327A1 US16/384,526 US201916384526A US2019287327A1 US 20190287327 A1 US20190287327 A1 US 20190287327A1 US 201916384526 A US201916384526 A US 201916384526A US 2019287327 A1 US2019287327 A1 US 2019287327A1
Authority
US
United States
Prior art keywords
person
registration
identity
boarding pass
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/384,526
Inventor
Thiagarajan Saravanan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia Identity and Security USA LLC
Original Assignee
MorphoTrust USA LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to US45839710P priority Critical
Priority to US13/303,851 priority patent/US9501882B2/en
Priority to US15/353,941 priority patent/US10262481B2/en
Application filed by MorphoTrust USA LLC filed Critical MorphoTrust USA LLC
Priority to US16/384,526 priority patent/US20190287327A1/en
Publication of US20190287327A1 publication Critical patent/US20190287327A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • G07C9/00111
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration
    • G07C9/00103
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/28Individual registration on entry or exit involving the use of a pass the pass enabling tracking or indicating presence

Abstract

A system and method of performing identity verification based on the use of mobile phones or mobile computing devices in conjunction with a secure identity authority; said method to be used as an alternative to conventional identity verification using paper-based documents such as driver's licenses and passports. The new method improves speed, accuracy, cost, and reliability of identity verification for entities that need to verify identity, as well as convenience for end-users.

Description

    REFERENCE
  • Provisional U.S. Patent application No. 61/458,397 filed on Nov. 23, 2010 by inventor Thiagarajan Saravanan of 4, Olde Stonebridge Path, Westborough, Mass. 01581
  • BACKGROUND OF THE INVENTION
  • The present invention is in the technical field of identity verification. More particularly, the present invention is in the technical field of using mobile phones and other computing devices for identity verification.
  • In the U.S., the Transportation Services Administration (TSA) employs thousands of travel document checkers at airports. Unlike Customs & Immigration officers who are trained extensively in international travel documents and possess sophisticated document checking equipment, the average TSA document checker has a simple UV or black light, loupe magnifier, and limited training on document checking. Even the TSA admits that, given the hundreds, sometimes thousands of documents and multifarious document types a checker has to scrutinize each day, the limited time the document checker has to inspect each document, and fatigue relating to processing hundreds of documents continually, a person with malicious intent could easily forge a document that would get them past a TSA document checker.
  • At the same time, many a business traveler is weary of having to previously print a boarding pass and pull out their driver's license card and boarding pass going through airports. Paperless boarding passes—on mobile devices—are slowly becoming more mainstream now, although their adoption has been somewhat painful for the TSA and the traveler due to the limitations of the scanning mechanisms. The logical next step is for the driver's license, passport, or other identifying document to become adopted on mobile devices as well. Then the wallet can stay in the pocket and the mobile device can be used for ID check and boarding pass check at the same time.
  • If a mobile device-based ID could be verified in a fool-proof way by the TSA document checkers and frequent travelers could be encouraged to adopt mobile device based IDs, the job of verifying regular IDs would be made remarkably easier and more secure at the same time for the TSA document checkers. A number of additional benefits would become available to the TSA as well, because of the automation: automatic checking for or against terrorist watch lists, criminal convictions, etc.
  • End-users would be willing to pay a reasonable fee for the convenience of not having to pull out their wallets to get their IDs at the airports.
  • There are a number of challenges to get such a system put into place, though:
      • How to secure the driver license on the mobile device
      • How to satisfy the needs of the TSA such that they can accept the mobile device version in lieu of paper documents
      • How to ensure travelers of the privacy of their information
      • How to build a viable business out of it
  • ID4Checkin™ is a novel system and service that addresses these challenges. Much of the research on identity documents, document authentication and verification in past few decades has been focused on paper—and plastic card-based identification.
  • There has been some recent adoption of technologies focused on electronic IDs based on smart chips such as the one embedded in the U.S. passport. E-passports typically embed some personally identifying information, such as fingerprint biometrics or portrait, in encrypted form within the smart chips. E-readers can decode the encrypted information for comparison with the passport holder's actual fingerprint or visage, for example.
  • The mobile revolution has simply passed the identification industry by—mainly because the revenues in the identification industry are largely focused on the production and vetting of paper—and plastic card-based identification. Mobile and computing devices now replace almost every card and implement that a person would carry in their wallet, except for the identification card.
  • The present invention (ID4Checkin) allows mobile and computing devices to be used for identification purposes. The focus is not on having all the identification information embedded into the device; rather, it is to provide a means for the traveler to “show” their identification to a TSA document checker or other authority using their mobile or computing device in a manner that inhibits counterfeit measures.
  • SUMMARY OF THE INVENTION
  • Each port or checkpoint that accepts ID4Checkin would have a sign with its own unique check-in code. Using the ID4Checkin system, a traveler can announce his or her self as having arrived at a checkpoint through a mobile phone or other computing device in any one of several ways as outlined below:
      • By taking a photo of the ID4Checkin signpost at the checkpoint;
      • By submitting the checkpoint code in a web form on a mobile browser;
      • By texting the checkpoint code to ID4Checkin;
      • By waving a mobile device that has near-field communications (NFC) capability at the NFC reader in the checkpoint;
      • By using a touchtone or voice-recognition phone service to send in the code;
      • By using an Internet browser application, logging into the ID4Checkin account, and entering the checkpoint code;
      • By sending an email from a registered email account;
      • Or through some other electronic means.
  • The TSA document checker or other authority at each checkpoint would have an ID4Checkin subscriber terminal, which is basically a tablet-, laptop-, or netbook-like computing device that has a secure communications channel to the ID4Checkin website hosting the document checker's web application.
  • When a traveler announces his or her self at a checkpoint through the above means, they are actually sending a request to ID4Checkin's central server, which is hooked up to a central database into which the traveler previously registered their desire to use the ID4Checkin system. ID4Checkin's central server also has the ability to correlate this information with an interstate system containing the drivers' license or passport information for travelers.
  • ID4Checkin's central server in turn sends the traveler's personally identifying details such as photo, name, age, height, and expiration date from the ID document (such as driver's license or passport) to the document checker's screen.
  • One of the unique elements of this system is that the traveler must request for his or her information to be sent to the document checker's screen. The document checker's application cannot be used to fetch the information for a traveler that has not “checked in” to the checkpoint. Also, only the information absolutely required to identify the traveler is sent to the document checker's screen. These measures provide some level of privacy to the traveler and prevent the system from being abused by document checkers.
  • Another aspect of this invention is the ability to correlate travel-related information with the identity-related information of the traveler. Airlines have started sending out mobile boarding passes to travelers.
  • For example, Delta Airlines uses mobile boarding passes from a vendor called Mobiqa. A mobile boarding pass is simply a website link that returns salient boarding pass information such as the name, flight number, flight date and time, gate number, boarding time, origin and destination of travel, plus a scan able barcode that incorporates much of this information. A system is already in place for travelers to request mobile boarding passes. Airlines typically send mobile boarding passes to travelers either directly to their phones using messaging services, or as website links to the travelers' email addresses.
  • ID4Checkin allows travelers to link their mobile boarding passes to their identification. One way in which a traveler could link this information, for example, would be to allow ID4Checkin to read incoming emails to the traveler's email inbox that might contain the mobile boarding pass.
  • When a traveler presents their ID and boarding pass, the following steps outline what a TSA document checker does for identity verification without the aid of the ID4Checkin system:
      • 1. Verify the authenticity of the ID.
      • 2. Compare the name on the ID to the name on the boarding pass.
      • 3. Verify from the flight check in time on the boarding pass that this person is supposed to be at this checkpoint at this particular time.
      • 4. Compare the photo on the ID to the person's face.
      • 5. Make a mark on the boarding pass as having done these verifications and wave the traveler through the line; or, if there is a problem with the verification, pull the traveler aside for further processing.
  • With ID4Checkin, a TSA document checker would skip steps 1, 2, and 3 from the previous paragraph and do the following instead:
      • 1. Compare the photo on the ID to the person's face.
      • 2. Click “OK” and wave the traveler through the line; or “Not OK” to pull the traveler aside for further processing.
  • The ID4Checkin system would automatically perform the first three of the manual steps a TSA document checker would perform: authenticity verification, boarding pass identity comparison, and boarding pass detail verification. This would provide the following benefits to the TSA and travelers:
      • It's better—problems related to poor training and fatigue won't have a role in determining who flies—the system would take care of it.
      • It's much more reliable and secure because it eliminates the human-based verification for some of the more onerous tasks.
      • It's faster—only takes 2-3 seconds per passenger as opposed to tens of seconds.
      • It's cheaper—the TSA will need fewer agents due to faster lines.
      • It's more convenient—the traveler need not be standing in line with their ID and boarding pass in hand; it's one less indignity to suffer in a bothersome check-in process.
  • In another embodiment of the invention, the TSA could offer self-service check-in turnstiles incorporating the ID4Checkin system. The only manual part of the system described above, i.e., the comparison of the photo on the ID to the person's face, can be automated through the use of a camera in the turnstile and a one-to-one facial recognition system, which would compare the photo captured in the turnstile to the saved photo associated with the ID4Checkin ID, which would be from a driver's license or passport.
  • Similarly, the ID4Checkin system could be used at other locations where identity verification is required—for example, in conjunction with rental car systems, visitor management systems, and so on.
  • BRIEF DESCRIPTION OF THE DRAWING
  • FIG. 1 is a logical overview of the present invention in its broad embodiment;
  • FIG. 2 is a logical overview of the present invention in an expanded embodiment;
  • FIG. 3 is an example of a mobile boarding pass;
  • FIG. 4 is an example implementation of a document checker's subscriber terminal application.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Referring now to the invention in more detail, in FIG. 1 there is shown the ID4Checkin User Registration System 180, the ID4Checkin Traveler Check-in System 190 and Identity Registry 210. Also shown in FIG. 1 are a mobile phone 110, an ordinary (landline) phone 120, a “smart phone” 130, and a computing device 140 which could be in the form of a hand-held, tablet, laptop, or desktop computer. Also shown are a traveler 100, a document checker 150, and a computing device 160 used by the document checker which could be in the form of a hand-held, tablet, laptop, or desktop computer. 180, 190 and 200, as well as software applications that run on 130, 140, and 160 are components of the invention where other components shown in FIG. 1 represent existing systems.
  • Identity Registry 210 represents a computer server and database at an institution such as a state's driver services department that is an Identity Document issuing authority, examples of which include the Massachusetts Registry of Motor Vehicles, which issues drivers licenses, the Department of State, which issues passports, and The International Justice and Public Safety Network (Nlets), which allows access to driver's license demographic and biometric information across jurisdictional boundaries.
  • The ID4Checkin Registration System 180 is a computer server and database that allows a traveler 100 to register his or her intention to use the ID4Checkin system. The registration system 180 would allow for computing and phone devices 110, 120, 130 and 140 to connect to it in a variety of ways, e.g., using a browser (through the HTTP or HTTPS protocols), using a computer or mobile application, through the TCP/IP protocol, using wireless access protocol (WAP), using SMS (short message system) and short message peer-to-peer protocol (SMPP), using the public service telephone network (PSTN), using cellular networks, using VoiceXML, using a near-field communications (NFC) reader, a barcode reader, a magnetic stripe reader, or any other means of connecting an end-user computing device to a computer server such that the traveler 100 can interact with the registration system 180 to provide the essential registration details needed. Such connection is represented by connection 230 in FIG. 1. Some examples of essential details are name, address, date of birth, driver's license number, passport number, green card number, phone or mobile computing device identifier, IP address of the traveler's device, location information (e.g., global positioning system—GPS—coordinates) and so on. Some or all of the essential details may be provided through connection 230.
  • The ID4Checkin Check-in System 190 is a computer server and database that allows a traveler 100 to announce his or her arrival at a specific location. The check-in system 190 would allow for computing and phone devices 110, 120, 130 and 140 to connect to it in a variety of ways, e.g., using a browser (through the HTTP or HTTPS protocols), using a computer or mobile application, through the TCP/IP protocol, using wireless access protocol (WAP), using the public service telephone network (PSTN), using cellular networks, using SMS (short message system) and short message peer-to-peer protocol (SMPP), using VoiceXML, using a near-field communications (NFC) reader, a barcode reader, a magnetic stripe reader, or any other means of connecting an end-user computing device to a computer server such that the traveler 100 can interact with the check-in system 190 to provide the essential check-in details needed. Such connection is represented by connection 240 in FIG. 1. Some examples of check-in details include the traveler's identity (e.g., secure login credentials), phone or mobile computing device identifier, location information (e.g., global positioning system—GPS—coordinates), arrival checkpoint identifier, and so on.
  • The ID4Checkin Document Checker System 200 is a computer server and database that allows a document checker 150 to use a subscriber terminal 160 to receive information regarding the identity and legitimacy of the traveler 100 through a connection 250. Subscriber terminal 160 can be any type of computing device—a hand-held, tablet, notebook, mobile, or desktop computer. Connection 280 represents information sharing between the document checker system 200 and the check-in system 190 and registration system 180. These are logical connections. All three systems, 180, 190, and 200 could exist in the same physical server and network, or they could be on different servers and physical locations.
  • Connection 260 allows for information exchange between the document checker system 200 and the identity registry 210. Connection 270 allows for information exchange between the registration system 180 and the identity registry 210 as well as information exchange between the check-in system 190 and the identity registry 210.
  • Connections 250, 260, 270, and 280 can be through any means of network connectivity, including physical Ethernet connectivity, WiFi, Internet, cellular networks, leased lines, or other conventionally used networking means.
  • In the simplest embodiment of the invention, the system would function as follows:
      • 1. A traveler 100 could use any of the devices 110, 120, 130, or 140 to register with the registration system 180, which is constructed such that legitimate users will be allowed to use the system and illegitimate users will be filtered out.
      •  One potential method through which illegitimate users will be filtered out is as follows. The registration system 180 collects a variety of information from the user, such as name, address, location, the originating phone number for a phone call, IP address of the computing device 110, 130, or 140 from which registration is being done, unique identifier of the computing device (for example, unique phone identifier or MAC address), home phone number, mobile phone number, driver's license, passport, and green card number. The information is then correlated with a variety of sources to determine the legitimacy of the user. Once the user is determined to be legitimate, a token is sent to the user's computing device 110, 120, 130, or 140 (for example, a text code or text message) which would then need to be used to make the final link between the user's computing device and the identity information which is registered in a known identity registry 210.
      •  Other methods of correlation could also be used.
      • 2. A traveler 100 could use any of the registered devices 110, 120, 130, or 140 to check in to the check-in system 190 as they are arriving at an identity checkpoint, which would normally correspond to a particular TSA document checker's station. For example, the Delta Airlines first class checkpoint at Boston Logan International Airport is located in the A Terminal near the entrance to gates A13-A22. Under the system described here, this checkpoint would be assigned a unique numeric code—say 123. The traveler 100 announces his or her arrival at checkpoint 123 to the check-in system 190 using one of a variety of methods:
        • By clicking a button on an ID4Checkin software application (“app”) on the mobile computing device 110, 130, or 140; with the app in turn sending the checkpoint numeric code to the check-in system 190
        • By using the same app to take a photo of the ID4Checkin signpost at the checkpoint; the signpost having the numeric code for the checkpoint visible in text as well as some machine-readable form such as a 2D barcode or QR code; with the app in turn sending the checkpoint numeric code to the check-in system 190
        • By submitting the checkpoint code in a website form offered by the check-in system 190
        • By texting the checkpoint code to the check-in system 190 from a registered computing device 110, 130, or 140
        • By using a touchtone or voice-recognition phone service from a registered computing or phone device 110, 120, 130, or 140 to send the checkpoint code to check-in system 190
        • By using an Internet browser application, logging into the ID4Checkin account, and entering the checkpoint code.
        • By sending an email from a registered email account.
        • By waving his or her NFC-enabled phone at an NFC reader that is set up to send the information to the check-in system 190
        • Other methods could also be used, as long as the check-in system 190 gets the checkpoint code and a reasonable amount of certainty as to the identity of the person who originated the request
      • 3. Document checker 150 uses a subscriber terminal 160 to login to the document checker system 200 at the beginning of his or her work day. As travelers arrive at the checkpoint and announce their arrivals, subscriber terminal 160 starts receiving photos and identities of those travelers. Document checker 150 then simply-needs to compare the photo of the traveler to the traveler's visage to confirm his or her identity. This basic ability makes the whole system more secure because, in the current system where the TSA document checker first inspects the ID to ensure that it is legitimate, and then compares the photo on the document to the person's visage, the inspection is a weakness to the system due to the reasons mentioned in the Summary section.
  • An enhancement to the basic invention is the ability to automatically compare the identity information to the information in an airline boarding pass, and automatically verify the legitimacy of the traveler to be at the checkpoint. The enhanced system would work as follows:
      • 4. A traveler 100 could use any of the devices 110, 120, 130, or 140 to register with the registration system 180, which is constructed such that legitimate users will be allowed to use the system and illegitimate users will be filtered out.
      •  One potential method through which illegitimate users will be filtered out is as follows. The registration system 180 collects a variety of information from the user, such as name, address, location, the originating phone number for a phone call, IP address of the computing device 110, 130, or 140 from which registration is being done, unique identifier of the computing device (for example, unique phone identifier or MAC address), home phone number, mobile phone number, driver's license, passport, and green card number. The information is then correlated with a variety of sources to determine the legitimacy of the user. Once the user is determined to be legitimate, a token is sent to the user's computing device 110, 120, 130, or 140 (for example, a text code or text message) which would then need to be used to make the final link between the user's computing device and the identity information which is registered in a known identity registry 210.
      •  Other methods of correlation could also be used.
      • 5. A traveler 100 could use the online check-in system 170 offered by most airlines today to check into his or her upcoming flight, typically up to 24 hours prior to the flight takeoff time. The traveler would have the ability to receive a so-called “mobile boarding pass” 300, which is typically sent to the user in the form of an email. The email contains the uniform resource locator (URL) for a web page that contains the mobile boarding pass, an example of which is shown in FIG. 3. The mobile boarding pass contains information such as the traveler's name, flight number, departure time, departure gate, and so on. The traveler 100 would provide access to the ID4Checkin check-in system 190 to emails containing boarding passes such that when a traveler 100 receives an email containing a mobile boarding pass, the check-in system 190 is automatically updated with this information.
      •  Other methods could also be used to update the check-in system 190 with the mobile boarding pass information, such as a direct link with the airlines, the TSA, or a third-party travel services provider such as Triplt.com.
      • 6. A traveler 100 could use any of the registered devices 110, 120, 130, or 140 to check in to the check-in system 190 as they are arriving at an identity checkpoint, which would normally correspond to a particular TSA document checker's station. For example, the Delta Airlines first class checkpoint at Boston Logan International Airport is located in the A Terminal near the entrance to gates A13-A22. Under the system described here, this checkpoint would be assigned a unique numeric code—say 123. The traveler 100 announces his or her arrival at checkpoint 123 to the check-in system 190 using one of a variety of methods:
        • By clicking a button on an ID4Checkin software application (“app”) on the mobile computing device 110, 130, or 140; with the app in turn sending the checkpoint numeric code to the check-in system 190
        • By using the same app to take a photo of the ID4Checkin signpost at the checkpoint; the signpost having the numeric code for the checkpoint visible in text as well as some machine-readable form such as a 2D barcode or QR code; with the app in turn sending the checkpoint numeric code to the check-in system 190
        • By submitting the checkpoint code in a website form offered by the check-in system 190
        • By texting the checkpoint code to the check-in system 190 from a registered computing device 110, 130, or 140
        • By using a touchtone or voice-recognition phone service from a registered computing or phone device 110, 120, 130, or 140 to send the checkpoint code to check-in system 190
        • By using an Internet browser application, logging into the ID4Checkin account, and entering the checkpoint code.
        • By sending an email from a registered email account.
        • By waving his or her NFC-enabled phone at an NFC reader that is set up to send the information to the check-in system 190
        • Other methods could also be used, as long as the check-in system 190 gets the checkpoint code and a reasonable amount of certainty as to the identity of the person who originated the request
      • 7. Document checker 150 uses a subscriber terminal 160 to login to the document checker system 200 at the beginning of his or her work day. As travelers arrive at the checkpoint and announce their arrivals, subscriber terminal 160 starts receiving photos and identities of those travelers. Document checker 150 then simply needs to compare the photo of the traveler to the traveler's visage to confirm his or her identity.
      • 8. Document checker 150 can also verify the legitimacy of the traveler to be at the checkpoint at that particular date and time. Without this invention, such verification is done manually by the document checker. With this invention, the subscriber terminal would automatically use the details from the boarding pass, such as the traveler's flight time, departure gate, and departure time, to determine the legitimacy of the traveler to be at the checkpoint. FIG. 4 shows an example implementation of the document checker application, which would run on the subscriber terminal 160 in conjunction with the document checker's system 200.
  • A variation of this invention could be created by changing the circumstances. For example, the travel/visit check-in system 170 could be the rental reservation system for a car or equipment rental company or the visitor management system of a building or secure facility, for example.
  • The document checker subscriber terminal 160 may or may not be a computing device dedicated to performing the identity verification. By providing a system development kit, the document checking function could be integrated with another application like a rental car reservation system, visitor management system, and so on.
  • The advantages of the present invention include, without limitation, that it is a more secure, reliable, quick, and automated method of performing identity verification at checkpoints.
  • While the foregoing written description of the invention enables one of ordinary skill to make and use what is considered presently to be the best mode thereof, those of ordinary skill will understand and appreciate the existence of variations, combinations, and equivalents of the specific embodiment, method, and examples herein. The invention should therefore not be limited by the above described embodiment, method, and examples, but by all embodiments and methods within the scope and spirit of the invention as claimed.

Claims (21)

1-2. (canceled)
3. A method for security screening, comprising:
obtaining, at a computing device, data including a biometric of a person at a point of service;
transmitting, from the computing device to a registration system, identity-related information that includes the biometric of the person for the person for registration at the registration system such that in response to successful registration, the identity-related information of the person is stored at the registration system;
receiving, at the computing device, a token linking the person to the identity-related information stored at the registration system, the biometric of the person not included in the token;
transmitting, from the computing device to a check-in system, the token linking the person to the identity-related information stored at the registration system;
receiving, at the computing device, an electronic boarding pass for the person from the check-in system in response to transmitting the token linking the person to the identity-related information stored at the registration system; and
based at least on the electronic boarding pass for the person, determining whether to clear the person for security screening.
4. The method of claim 3, wherein determining whether to clear the person for security screening comprises:
determining whether or not the electronic boarding pass indicates the person has a flight at an airport where the person has arrived.
5. The method of claim 4, wherein determining whether to clear the person for security screening further comprises:
determining whether or not the electronic boarding pass indicates the person has the flight within a time period.
6. The method of claim 3, wherein determining whether to clear the person for security screening comprises:
determining not to clear the person for security screening in response to determining that the electronic boarding pass indicates that a ticket associated with the electronic boarding pass has been cancelled.
7. The method of claim 3, wherein the computing device comprises: a mobile device.
8. The method of claim 3, wherein receiving the electronic boarding pass comprises:
utilizing the token linking the person to the identity-related information stored at the registration system such that the electronic boarding pass is downloaded from an airline computing device by the check-in system.
9. The method of claim 8, wherein the airline computing device utilizes the token as part of a check in or boarding process.
10. A computer-implemented system for security screening, comprising:
a non-transitory storage medium storing software instructions;
a communication component communicably connected to a registration system and a check-in system; and
a processor coupled to the non-transitory storage medium and the communication component such that the software instructions are executed to:
obtain data including a biometric of a person at a point of service;
transmitting, to the registration system, identity-related information that includes
the biometric of the person for the person for registration at the registration system such that in response to successful registration, the identity-related information of the person is stored at the registration system;
receive a token linking the person to the identity-related information stored at the registration system, the biometric of the person not included in the token;
transmit, to a check-in system, the token linking the person to the identity-related information stored at the registration system; and
receive electronic pass information for the person from the check-in system in response to transmitting the token linking the person to the identity-related information stored at the registration system.
11. The computer-implemented system of claim 10, wherein the electronic pass information comprises an electronic boarding pass of a flight.
12. The computer-implemented system of claim 11, wherein the data including a biometric comprises a portrait of the person.
13. The computer-implemented system of claim 11, further comprising:
a display component operable to display the electronic boarding pass.
14. The computer-implemented system of claim 11, further comprising:
a biometric reader operable to detect the biometric of the person.
15. The computer-implemented system of claim 11, wherein the computer-implemented system is a mobile device.
16. The computer-implemented system of claim 11, wherein receiving the electronic pass information comprises:
utilizing the token linking the person to the identity-related information stored at the registration system such that the electronic boarding pass is downloaded from an airline computing device by the check-in system.
17. The computer-implemented system of claim 11, wherein based at least on the electronic boarding pass, a determination is made as to whether to clear the person for security screening.
18. The computer-implemented system of claim 17, wherein the determination comprises: determining whether or not the electronic boarding pass indicates the person has a flight at an airport where the person has arrived.
19. The computer-implemented system of claim 17, wherein the determination comprises: determining whether or not the electronic boarding pass indicates the person has a flight within a time period.
20. The computer-implemented system of claim 17, wherein the determination comprises: determining not to clear the person for security screening in response to determining that the electronic boarding pass indicates that a ticket associated with the electronic boarding pass has been cancelled.
21. The computer-implemented system of claim 11, wherein the electronic boarding pass indicates a real time status of the flight.
22. The computer-implemented system of claim 11, wherein the electronic boarding pass indicates a frequent flyer number of the person.
US16/384,526 2010-11-23 2019-04-15 System and Method to Streamline Identity Verification at Airports and Beyond Abandoned US20190287327A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
US45839710P true 2010-11-23 2010-11-23
US13/303,851 US9501882B2 (en) 2010-11-23 2011-11-23 System and method to streamline identity verification at airports and beyond
US15/353,941 US10262481B2 (en) 2010-11-23 2016-11-17 System and method to streamline identity verification at airports and beyond
US16/384,526 US20190287327A1 (en) 2010-11-23 2019-04-15 System and Method to Streamline Identity Verification at Airports and Beyond

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US16/384,526 US20190287327A1 (en) 2010-11-23 2019-04-15 System and Method to Streamline Identity Verification at Airports and Beyond

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US15/353,941 Continuation US10262481B2 (en) 2010-11-23 2016-11-17 System and method to streamline identity verification at airports and beyond

Publications (1)

Publication Number Publication Date
US20190287327A1 true US20190287327A1 (en) 2019-09-19

Family

ID=46600271

Family Applications (3)

Application Number Title Priority Date Filing Date
US13/303,851 Active US9501882B2 (en) 2010-11-23 2011-11-23 System and method to streamline identity verification at airports and beyond
US15/353,941 Active US10262481B2 (en) 2010-11-23 2016-11-17 System and method to streamline identity verification at airports and beyond
US16/384,526 Abandoned US20190287327A1 (en) 2010-11-23 2019-04-15 System and Method to Streamline Identity Verification at Airports and Beyond

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US13/303,851 Active US9501882B2 (en) 2010-11-23 2011-11-23 System and method to streamline identity verification at airports and beyond
US15/353,941 Active US10262481B2 (en) 2010-11-23 2016-11-17 System and method to streamline identity verification at airports and beyond

Country Status (1)

Country Link
US (3) US9501882B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10819704B2 (en) * 2014-05-01 2020-10-27 Global Tel*Link Corporation System and method for authenticating called parties of individuals within a controlled environment

Families Citing this family (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2481191A (en) 2010-02-25 2011-12-21 Sita Information Networking Computing Ireland Ltd Graphical development tool for software application development
US9501882B2 (en) 2010-11-23 2016-11-22 Morphotrust Usa, Llc System and method to streamline identity verification at airports and beyond
SG190038A1 (en) 2010-12-21 2013-06-28 Sita N V Reservation system and method
US9883326B2 (en) 2011-06-06 2018-01-30 autoGraph, Inc. Beacon based privacy centric network communication, sharing, relevancy tools and other tools
CN104025140A (en) 2011-06-06 2014-09-03 恩弗伦斯媒体公司 Consumer driven advertising system
JP2014165916A (en) * 2013-02-21 2014-09-08 Boeing Co Passenger mobile station registration with passenger communications system using near field communications
US20140094143A1 (en) * 2011-06-28 2014-04-03 The Boeing Company Passenger mobile station registration with a passenger communications system using near field communicaitons
CN103999102B (en) 2011-08-03 2017-07-11 Sita信息网络处理美国有限公司 Article treatment and tracking system and its method
GB2499288A (en) 2012-02-09 2013-08-14 Sita Inf Networking Computing Usa Inc Path determination
WO2013121425A1 (en) * 2012-02-14 2013-08-22 Fst21 Ltd. System and method for entrance control to secured premises
US9087204B2 (en) 2012-04-10 2015-07-21 Sita Information Networking Computing Ireland Limited Airport security check system and method therefor
WO2014028060A1 (en) 2012-08-15 2014-02-20 Brian Roundtree Tools for interest-graph driven personalization
US10593003B2 (en) * 2013-03-14 2020-03-17 Securiport Llc Systems, methods and apparatuses for identifying person of interest
US10320908B2 (en) 2013-03-25 2019-06-11 Sita Information Networking Computing Ireland Limited In-flight computing device for aircraft cabin crew
EP2979240A1 (en) * 2013-03-27 2016-02-03 Udviklingsselskabet Af 2014 ApS A method and hand luggage trolley for facilitating a flow of passengers in an airport terminal
GB2515142B (en) * 2013-06-14 2020-12-16 Sita Information Networking Computing Ireland Ltd Portable user control system and method therefor
US9407620B2 (en) 2013-08-23 2016-08-02 Morphotrust Usa, Llc System and method for identity management
US10320778B2 (en) 2013-08-27 2019-06-11 Morphotrust Usa, Llc Digital identification document
US10282802B2 (en) 2013-08-27 2019-05-07 Morphotrust Usa, Llc Digital identification document
US10249015B2 (en) 2013-08-28 2019-04-02 Morphotrust Usa, Llc System and method for digitally watermarking digital facial portraits
US9426328B2 (en) 2013-08-28 2016-08-23 Morphotrust Usa, Llc Dynamic digital watermark
US9497349B2 (en) 2013-08-28 2016-11-15 Morphotrust Usa, Llc Dynamic digital watermark
EP2860950B1 (en) * 2013-10-11 2017-04-12 Nxp B.V. Transferring a descriptive web interface language code between two nearfield communication devices
US10129251B1 (en) 2014-02-11 2018-11-13 Morphotrust Usa, Llc System and method for verifying liveliness
GB2523441A (en) 2014-02-19 2015-08-26 Sita Information Networking Computing Ireland Ltd Reservation system and method therefor
EP3123751B1 (en) 2014-03-28 2019-11-06 AutoGraph, Inc. Beacon based privacy centric network communication, sharing, relevancy tools and other tools
US10001546B2 (en) 2014-12-02 2018-06-19 Sita Information Networking Computing Uk Limited Apparatus for monitoring aircraft position
US10070005B2 (en) * 2015-04-23 2018-09-04 Sonali Deshpande Identification document holding system
US10321317B1 (en) * 2015-06-04 2019-06-11 American Megatrends, Inc. NFC-enhanced firmware security
US9942734B1 (en) * 2015-08-19 2018-04-10 West Corporation SMS check in and check out
US20170213211A1 (en) * 2016-01-25 2017-07-27 Apple Inc. Document importation into secure element
US10348699B2 (en) 2016-02-11 2019-07-09 Evident ID, Inc. Identity binding systems and methods in a personal data store in an online trust system
US10357861B2 (en) 2016-11-28 2019-07-23 Baker Hughes, A Ge Company, Llc Magnetic sample holder for abrasive operations and related methods
US10262191B2 (en) * 2017-03-08 2019-04-16 Morphotrust Usa, Llc System and method for manufacturing and inspecting identification documents
EP3457365A1 (en) * 2017-09-18 2019-03-20 Legic Identsystems Ag Personal identity verification system and method for verifying the identity of an individual
GB201905180D0 (en) * 2019-04-11 2019-05-29 Sita Advanced Travel Solutions Ltd Identity management system and method
US10846383B2 (en) 2019-07-01 2020-11-24 Advanced New Technologies Co., Ltd. Applet-based account security protection method and system

Family Cites Families (64)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5841886A (en) 1993-11-18 1998-11-24 Digimarc Corporation Security system for photographic identification
US7770013B2 (en) 1995-07-27 2010-08-03 Digimarc Corporation Digital authentication with digital and analog documents
US20090097695A9 (en) 1995-05-08 2009-04-16 Rhoads Geoffrey B Personal document authentication system using watermarking
US5835061A (en) * 1995-06-06 1998-11-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US6259405B1 (en) * 1995-06-06 2001-07-10 Wayport, Inc. Geographic based communications service
US8606851B2 (en) * 1995-06-06 2013-12-10 Wayport, Inc. Method and apparatus for geographic-based communications service
US7821926B2 (en) 1997-03-10 2010-10-26 Sonicwall, Inc. Generalized policy server
US20040258274A1 (en) * 2002-10-31 2004-12-23 Brundage Trent J. Camera, camera accessories for reading digital watermarks, digital watermarking method and systems, and embedding digital watermarks with metallic inks
US20020056043A1 (en) 1999-01-18 2002-05-09 Sensar, Inc. Method and apparatus for securely transmitting and authenticating biometric data over a network
US6898706B1 (en) 1999-05-20 2005-05-24 Microsoft Corporation License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
US7711950B2 (en) * 2000-03-17 2010-05-04 United States Postal Services Methods and systems for establishing an electronic account for a customer
US7502937B2 (en) 2001-04-30 2009-03-10 Digimarc Corporation Digital watermarking security systems
US7607016B2 (en) 2001-04-20 2009-10-20 Digimarc Corporation Including a metric in a digital watermark for media authentication
US6414635B1 (en) * 2000-10-23 2002-07-02 Wayport, Inc. Geographic-based communication service system with more precise determination of a user's known geographic location
US20020073310A1 (en) 2000-12-11 2002-06-13 Ibm Corporation Method and system for a secure binding of a revoked X.509 certificate to its corresponding certificate revocation list
US6965683B2 (en) 2000-12-21 2005-11-15 Digimarc Corporation Routing networks for use with watermark systems
US20030023858A1 (en) 2001-07-26 2003-01-30 International Business Machines Corporation Method for secure e-passports and e-visas
EP1308864A1 (en) * 2001-11-02 2003-05-07 Hewlett-Packard Company Passenger management system and method and electronic device
JP2003216908A (en) * 2002-01-22 2003-07-31 Hitachi Electronics Service Co Ltd Passport forgery detecting apparatus
AU2003207972A1 (en) * 2002-02-01 2003-09-02 Dorian Basow Personalized boarding pass
US7231657B2 (en) 2002-02-14 2007-06-12 American Management Systems, Inc. User authentication system and methods thereof
US7646425B2 (en) 2003-09-15 2010-01-12 L-I Secure Credentialing, Inc. Multifunction all in one capture station for creating identification documents
CA2502232C (en) 2002-10-15 2013-10-01 Trent J. Brundage Identification document and related methods
US7076083B2 (en) 2002-12-12 2006-07-11 Eastman Kodak Company Personnel access control system
JP2004295197A (en) * 2003-03-25 2004-10-21 Nec Corp Electronic ticket vending system and method
US7356332B2 (en) * 2003-06-09 2008-04-08 Microsoft Corporation Mobile information system for presenting information to mobile devices
US7275689B2 (en) * 2003-09-05 2007-10-02 Bcode Pty Ltd Baggage check-in using short message device
US7805614B2 (en) 2004-04-26 2010-09-28 Northrop Grumman Corporation Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
WO2006094271A2 (en) 2005-03-02 2006-09-08 Markmonitor, Inc. Distribution of trust data
US20060206351A1 (en) * 2005-03-09 2006-09-14 First Data Corporation Registered traveler systems and methods
US8570586B2 (en) 2005-05-02 2013-10-29 Digimarc Corporation Active images through digital watermarking
BRPI0503697A (en) * 2005-09-15 2007-05-15 Itautec Philco Sa automatic ticket counter system and method for transaction in automatic ticket counter
US20070083915A1 (en) 2005-10-06 2007-04-12 Janani Janakiraman Method and system for dynamic adjustment of computer security based on personal proximity
US8671143B2 (en) 2007-04-04 2014-03-11 Pathfinders International, Llc Virtual badge, device and method
US20080261510A1 (en) * 2007-04-20 2008-10-23 Bo-In Lin Wireless communication system for monitoring and managing client interface for area-specific process
WO2008146353A1 (en) 2007-05-28 2008-12-04 Mitsubishi Electric Corporation Digital watermark embedding device and method, and digital watermark detection device and method
US8031207B2 (en) 2008-06-04 2011-10-04 Mastercard International, Inc. Card image description format to economize on data storage
US8385590B1 (en) 2008-11-05 2013-02-26 Adobe Systems Incorporated Video watermarking with temporal patterns
US8496169B2 (en) * 2009-01-02 2013-07-30 At&T Mobility Ii Llc System and method for electronic ticket verification, identification, and authorization with a wireless communication device
JP5742057B2 (en) 2009-03-03 2015-07-01 ディジマーク コーポレイション Narrow casting from public displays and related arrangements
US20110077983A1 (en) * 2009-09-30 2011-03-31 Suzann Hua Flight check-in via a telecommunication network
US8615520B2 (en) * 2010-01-07 2013-12-24 Idelan, Inc. Computer based methods and systems for establishing trust between two or more parties
WO2011112752A1 (en) * 2010-03-09 2011-09-15 Alejandro Diaz Arceo Electronic transaction techniques implemented over a computer network
US20110275360A1 (en) * 2010-05-10 2011-11-10 Nokia Siemens Networks Oy Privacy gateway
US9501882B2 (en) 2010-11-23 2016-11-22 Morphotrust Usa, Llc System and method to streamline identity verification at airports and beyond
JP5760438B2 (en) 2010-12-28 2015-08-12 富士通株式会社 Digital watermark embedding apparatus, digital watermark embedding method, digital watermark embedding computer program, and digital watermark detection apparatus
US8627096B2 (en) 2011-07-14 2014-01-07 Sensible Vision, Inc. System and method for providing secure access to an electronic device using both a screen gesture and facial biometrics
CA2865587A1 (en) 2012-02-27 2013-09-06 L-1 Secure Credentialing, Inc. Method and apparatus for the detection of digital watermarks for instant credential authentication
WO2013138589A1 (en) 2012-03-16 2013-09-19 L-1 Secure Credentialing, Inc. Ipassport method and apparatus
US8973102B2 (en) 2012-06-14 2015-03-03 Ebay Inc. Systems and methods for authenticating a user and device
US8777109B2 (en) 2012-10-04 2014-07-15 Hand Held Products, Inc. Customer facing imaging systems and methods for obtaining images
US9003196B2 (en) 2013-05-13 2015-04-07 Hoyos Labs Corp. System and method for authorizing access to access-controlled environments
US10467531B2 (en) * 2013-06-18 2019-11-05 Microsoft Technology Licensing, Llc Server-managed, triggered device actions
US20150012307A1 (en) * 2013-07-05 2015-01-08 Radioactive Development, LLC Electronic reservation system and method
US9407620B2 (en) 2013-08-23 2016-08-02 Morphotrust Usa, Llc System and method for identity management
US10282802B2 (en) 2013-08-27 2019-05-07 Morphotrust Usa, Llc Digital identification document
US10320778B2 (en) 2013-08-27 2019-06-11 Morphotrust Usa, Llc Digital identification document
US9497349B2 (en) 2013-08-28 2016-11-15 Morphotrust Usa, Llc Dynamic digital watermark
US9426328B2 (en) 2013-08-28 2016-08-23 Morphotrust Usa, Llc Dynamic digital watermark
US10249015B2 (en) 2013-08-28 2019-04-02 Morphotrust Usa, Llc System and method for digitally watermarking digital facial portraits
US10129251B1 (en) 2014-02-11 2018-11-13 Morphotrust Usa, Llc System and method for verifying liveliness
US9386400B2 (en) * 2014-11-03 2016-07-05 Verizon Patent And Licensing Inc. Automatic implementation of preferences based on detection of a mobile device
US9942816B2 (en) * 2014-11-27 2018-04-10 Blackberry Limited Method for selecting a cellular network
US10492163B2 (en) * 2015-08-03 2019-11-26 Jpmorgan Chase Bank, N.A. Systems and methods for leveraging micro-location devices for improved travel awareness

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10819704B2 (en) * 2014-05-01 2020-10-27 Global Tel*Link Corporation System and method for authenticating called parties of individuals within a controlled environment

Also Published As

Publication number Publication date
US20170069151A1 (en) 2017-03-09
US9501882B2 (en) 2016-11-22
US10262481B2 (en) 2019-04-16
US20120200390A1 (en) 2012-08-09

Similar Documents

Publication Publication Date Title
US10764044B1 (en) Personal digital key initialization and registration for secure transactions
US9667627B2 (en) Airport security check system and method therefor
RU2711464C2 (en) Multiple-device transaction verification
US10455419B2 (en) System and method for mobile identity protection for online user authentication
EP3257222B1 (en) Authentication of web content
US9864987B2 (en) Account provisioning authentication
US9959542B2 (en) System and method for the automated processing of physical objects
EP3557831A1 (en) Two-dimensional barcode processing method, device, and system
CA2939377C (en) Biometric solution enabling high throughput fare payments and system access
KR20160009698A (en) Two-Factor Authentication Systems and Methods
US8855312B1 (en) Mobile trust broker
EP2515497B1 (en) Method for performing authentication in a distributed authentication system and authentication system
US20150221149A1 (en) Wifi wallet payments and entry keys
US9734643B2 (en) Accessing secure areas based on identification via personal device
EP2378451B1 (en) User authentication in a tag-based service
US6850147B2 (en) Personal biometric key
US8215546B2 (en) System and method for transportation check-in
US20140279516A1 (en) Authenticating a physical device
CN104303483B (en) For the recognition system based on user of social networks
US20170017947A1 (en) Trusted nfc ticketing
RU2608002C2 (en) Handling encoded information
US8913725B1 (en) Residence-based calling rates, system and method
US20120330769A1 (en) Electronic transaction techniques implemented over a computer network
US20130217365A1 (en) Automatic profile update in a mobile device with transactional and social intelligence capabilities
AU2010251351B2 (en) Distribution and printing of travel documents

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STCB Information on status: application discontinuation

Free format text: FINAL REJECTION MAILED

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION