System and method for non-law enforcement entities to conduct checks using law enforcement restricted databases
First Claim
1. A process on a computer system for securing critical infrastructure and important facilities, said process comprising:
- receiving, at a computer system resident within a law-enforcement controlled domain, identification indicia that has been input from at least one third party originator;
comparing said identification indicia with criminal records of at least one database of a law-enforcement network that is connected to said computer system resident within said law enforcement-controlled domain, in order to generate a response to said input, said response indicating any existence of a match between said identification indicia and said criminal records; and
outputting said response to at least a location within a law enforcement-controlled domain.
2 Assignments
0 Petitions
Accused Products
Abstract
The present invention relates to a method and a system by which non-law enforcement operator(s) can conduct checks (requests, queries or searches) against CJIS (Criminal Justice Information System), NCIC (National Criminal Information Center) and other law enforcement only secure databases and comply with the rules and regulations for disseminating such data. In doing so, the invention provides for a system and process by which the checks (request, queries or searches) of individuals and/or articles are made against the CJIS/NCIC and/or other “law enforcement only” restricted databases, such that the indicia relating to persons and/or articles is compared with said databases. The resulting information regarding matches (and, in certain embodiments, non-matching results) flows to law enforcement officials so that they may use any results deemed relevant for response thereto. Said responses may vary, but in one embodiment, may provide for at least the notification of non-law enforcement operator who originated the above-described checks.
-
Citations
17 Claims
-
1. A process on a computer system for securing critical infrastructure and important facilities, said process comprising:
-
receiving, at a computer system resident within a law-enforcement controlled domain, identification indicia that has been input from at least one third party originator;
comparing said identification indicia with criminal records of at least one database of a law-enforcement network that is connected to said computer system resident within said law enforcement-controlled domain, in order to generate a response to said input, said response indicating any existence of a match between said identification indicia and said criminal records; and
outputting said response to at least a location within a law enforcement-controlled domain. - View Dependent Claims (2, 3, 4)
-
-
5. A computer program product, for use with a computer system, for securing critical infrastructure and important facilities, the computer program product comprising:
-
a computer readable medium module containing thereon instructions operative to control the operation of a computer system within a law-enforcement controlled domain, to perform the steps of;
receiving, at said computer system, indicia that has been input from at least one third party originator;
comparing said identification indicia with criminal records of at least one database of a law-enforcement network that is connected to said computer system within said law enforcement-controlled domain, in order to generate a response to said input, said response indicating any existence of a match between said identification indicia and said criminal records; and
outputting said response to at least a location within a law enforcement-controlled domain. - View Dependent Claims (6, 7, 8, 9)
-
-
10. A computer based system for securing critical infrastructure and important facilities, said system comprising:
-
a means for receiving, at a computer system resident within a law-enforcement controlled domain, identification indicia that has been input from at least one third party originator;
a means for comparing said identification indicia with criminal records of at least one database of a law-enforcement network that is connected to said computer system resident within said law enforcement-controlled domain, in order to generate a response to said input, said response indicating any existence of a match between said identification indicia and said criminal records; and
a means for outputting said response to at least a location within a law enforcement-controlled domain. - View Dependent Claims (11, 12, 13)
-
-
14. A computer based system for securing critical infrastructure and important facilities, said system comprising:
-
a system controller within a law-enforcement controlled domain;
a memory connected to said controller within a law-enforcement controlled domain, said memory storing instructions operative with said controller to perform the steps of;
receiving, at said computer based system, indicia that has been input from at least one third party originator;
comparing said identification indicia with criminal records of at least one database of a law-enforcement network that is connected to said computer based system, in order to generate a response to said input, said response indicating any existence of a match between said identification indicia and said criminal records; and
outputting said response to at least a location within a law enforcement-controlled domain. - View Dependent Claims (15, 16, 17)
-
Specification