SECURITY CHECKPOINT SYSTEMS AND METHODS
First Claim
Patent Images
1. A security checkpoint system, comprising:
- a camera configured for obtaining a first photographic image of an individual;
a photographic image scanner configured for scanning a second photographic image; and
a comparator mechanism for comparing the first photographic image with the second photographic image to ascertain whether the second photographic image is of the individual.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the invention include a security checkpoint system that has a camera configured for obtaining a first photographic image of an individual, a photographic image scanner configured for scanning a second photographic image, and a comparator mechanism for comparing the first photographic image with the second photographic image to ascertain whether the second photographic image is of the individual. Other embodiments include a method for automatedly developing security-related characteristics for an individual.
52 Citations
32 Claims
-
1. A security checkpoint system, comprising:
-
a camera configured for obtaining a first photographic image of an individual; a photographic image scanner configured for scanning a second photographic image; and a comparator mechanism for comparing the first photographic image with the second photographic image to ascertain whether the second photographic image is of the individual. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A kiosk for autonomous interface by an individual, said kiosk comprising:
-
an identification verification modality, comprising; an image formation system for obtaining a first photographic image of an individual; a scanning system for scanning a second photographic image; and a comparison system for comparing the first photographic image with the second photographic image to ascertain whether the second photographic image is of the individual; and at least one additional security-related modality. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A method for automatedly developing security-related characteristics for an individual, comprising:
-
obtaining a first photographic image of the individual; scanning a second photographic image provided by the individual; and comparing the first photographic image with the second photographic image to ascertain whether the second photographic image is of the individual. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
Specification