Security screening of electronic devices by device identifier
First Claim
1. A method for security screening of electronic devices, comprising:
- detecting an identifier from an electronic device;
querying a database with said identifier for information about said electronic device; and
responsive to receiving said information about said electronic device from said database, comparing at least one real-time scanned characteristic of said electronic device with said information, wherein if said at least one real-time scanned characteristic and said information match, then the electronic device is considered secure.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, system, and program for security screening of electronic devices by device identifier are provided. A security scanning system detects an identifier from an electronic device. The identifier may be a radio frequency identifier or other type of identifier which is preferably detectable by the security scanning system regardless of the operating status of the electronic device. The security scanning system queries a database with the identifier for information about the electronic device. Responsive to receiving the information about the electronic device from the central database, at least one real-time scanned characteristic of the electronic device is compared with this information. The information includes characteristics of the components of the electronic device and an x-ray overlay of the electronic device. If the real-time scanned characteristics and the information match, then electronic device is designated as secure.
-
Citations
30 Claims
-
1. A method for security screening of electronic devices, comprising:
-
detecting an identifier from an electronic device;
querying a database with said identifier for information about said electronic device; and
responsive to receiving said information about said electronic device from said database, comparing at least one real-time scanned characteristic of said electronic device with said information, wherein if said at least one real-time scanned characteristic and said information match, then the electronic device is considered secure. - View Dependent Claims (2, 3, 4, 5, 6, 8, 9, 10)
-
-
7. The method of claim for security screening wherein comparing at least one real-time scanned characteristic of said electronic device with said information further comprises:
comparing a real-time x-ray scan of said electronic device with a previously recorded x-ray scan returned with said information for said electronic device.
-
11. A system for security screening of electronic devices, comprising:
-
a screening system;
an identification reader connected to said screening system for reading an identifier from an electronic device within a security check area;
said screening system further comprising;
querying means for querying a database with said identifier for information about said electronic device; and
comparative means for comparing at least one real-time scanned characteristic of said electronic device with said information, responsive to receiving said information about said electronic device, wherein if said at least one real-time scanned characteristic and said information match, then the electronic device is considered consistent and secure. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
12. The system of claim 111 for security screening wherein said identification reader further comprises:
-
means for transmitting a radio frequency signal within a particular area for detecting said electronic device; and
means for reading said identifier from said electronic device broadcast from an antenna attached to a memory of said electronic device.
-
-
13. The system of claim 111 for security screening wherein said querying means further comprises:
means for querying said database with said identifier for information comprising physical characteristics of said electronic device.
-
21. A computer program product stored on a computer operable medium for security screening of electronic devices, comprising:
-
means for detecting an identifier from an electronic device;
means for querying a database with said identifier for information about said electronic device; and
means, responsive to receiving said information about said electronic device, for comparing at least one real-time scanned characteristic of said electronic device with said information, wherein if said at least one real-time scanned characteristic and said information match, then the electronic device is considered secure. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28)
-
-
29. A method for facilitating secure screening of electronic devices comprising:
-
receiving a request for information about an electronic device identified by a unique identifier;
searching a database for said unique identifier; and
responsive to locating information for said unique identifier in said database, returning said information formatted according to said request, such that an security screening system requesting said information is enabled to determine whether said electronic device is secure by matching said information to a real-time scanned characteristics of said electronic device. - View Dependent Claims (30)
-
Specification