Biometric bag check system

ABSTRACT

A biometric bag check system includes one or more bag accepting devices, bag transport devices, and/or bag delivery devices. A bag accepting device is operable to obtain control of a bag from a person, obtain a digital representation of a biometric from the person, use a biometric identification system to determine an identity for the person using the digital representation of the biometric, verify flight information for the person by communicating with an airline system using the identity, and route the bag upon verification of the flight information. A bag transport device is operable to receive the bag from the bag accepting device and transport the bag. A bag delivery device is operable to receive the bag from the bag transport device and deliver the bag to the person.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This application is a continuation patent application of U.S. patentapplication Ser. No. 16/160,431, filed Oct. 15, 2018 and titled“Biometric Bag Check System,” the disclosure of which is herebyincorporated herein by reference in its entirety.

FIELD

The described embodiments relate generally to bailment systems, such asbaggage check systems. More particularly, the present embodiments relateto a biometric bailment system, such as a biometric bag check system.

BACKGROUND

People or entities take possession of the property of others in avariety of different bailment systems. One example of such a bailmentsystem is bag checking at airports or similar arrangements.

At airports, people typically bring their bags to a bag check counter.At such a counter, a clerk typically takes the bags, checksidentification and boarding passes, and places tags on the bags that canbe read by baggage handlers to determine what flights to place the bagson. The clerk then typically delivers the bags to the baggage handlers,who read the tags when necessary to determine where to take the bagsnext. Eventually, the baggage handlers leave the bags at baggagecarousels assigned to the respective flights.

SUMMARY

The present disclosure relates to a biometric bag check system. Thebiometric bag check system includes a number of interconnectedcomponents that obtain a bag, associate the bag with an identity, androute the bag from origin to destination according to the identity. Thisallows for a variety of additional functionality over typical systemswhile improving convenience for users and improving the efficiency ofsuch systems and using fewer resources than were previously possible.Such functionality may include automated bag accepting devices, theability to alter routing if people do not pass security or boardflights, customized and/or secure bag delivery, and so on.

In various embodiments, a biometric bag check system includes a bagaccepting device operable to obtain control of a bag from a person,obtain a digital representation of a biometric from the person, use abiometric identification system to determine an identity for the personusing the digital representation of the biometric, verify flightinformation for the person by communicating with an airline system usingthe identity, and route the bag upon verification of the flightinformation. The biometric bag check system also includes a bagtransport device operable to receive the bag from the bag acceptingdevice and transport the bag. The biometric bag check system furtherincludes a bag delivery device operable to receive the bag from the bagtransport device and deliver the bag to the person.

In some examples, the biometric bag check system uses the identity todetermine whether the person passed a security checkpoint and determineswhether to alter transport of the bag if the person did not pass thesecurity checkpoint. In numerous examples, the biometric bag checksystem uses the identity to determine whether the person boarded aflight associated with the flight information and determines whether toalter transport of the bag if the person did not board the flight. Invarious examples, the biometric bag check system determines whether toscreen the bag based on the identity.

In numerous examples, the bag accepting device tags the bag to associatethe bag with the identity. In other examples, the bag accepting deviceprovides a tag that associates the bag with the identity. In someimplementations of such examples, the bag accepting device monitorswhile the person attaches the tag to the bag. In some examples of suchimplementations, the bag accepting device interrupts routing of the bagif the bag accepting device is unable to monitor the person attachingthe tag to the bag.

In various examples, the biometric bag check system uses the identity totransmit a notification that the bag is ready for delivery from the bagdelivery device. In some such examples, the notification includesinstructions to enable delivery.

In numerous examples, the bag accepting device verifies that control ofthe bag is obtained from a same person who provides the digitalrepresentation of the biometric prior to routing the bag. In someexamples, the person is a first person, the flight informationauthorizes routing of the bag for a second person, and the bag acceptingdevice verifies that the flight information authorizes the first personto check the bag for the second person prior to routing the bag.

In some embodiments, a bag accepting device includes at least onenon-transitory medium that stores instructions, a biometric readerdevice, and at least one processor communicably coupled to the biometricreader device. The at least one processor executes the instructions toobtain control of a bag from a person, obtain an identity for the personusing a digital representation of a biometric obtained via the biometricreader device, communicate with an airline system to verify flightinformation for the person using the identity, and route the bag using abiometric bag check system upon verification of the flight information.

In various examples, the bag accepting device obtains the identity froma biometric identification system. In some examples, the bag acceptingdevice obtains the identity from a biometric identification system inresponse to transmitting the digital representation of the biometric tothe biometric identification system. In numerous examples, the bagaccepting device prevents the person from accessing the bag prior torouting after obtaining control.

In numerous embodiments, a bag delivery device includes at least onenon-transitory medium that stores instructions and at least oneprocessor. The at least one processor executes the instructions toreceive a bag routed via a biometric bag check system wherein thebiometric bag check system associates the bag with an identity of aperson determined using a received biometric, transmits a notificationregarding possession of the bag using the identity, and provides the bagto the person.

In some examples, the bag delivery device further includes a biometricreader device and the at least one processor receives a digitalrepresentation of a biometric from the person using the biometric readerdevice, uses the digital representation of the biometric to verify theidentity of the person with a biometric identification system, andprovides the bag upon verification of the identity. In various examples,the bag delivery device further includes a locker and the at least oneprocessor provides the bag by opening the locker. In numerous examples,the notification specifies a location of the bag.

BRIEF DESCRIPTION OF THE DRAWINGS

The disclosure will be readily understood by the following detaileddescription in conjunction with the accompanying drawings, wherein likereference numerals designate like structural elements.

FIG. 1 depicts an example bailment system.

FIG. 2 depicts a flow chart illustrating a method for operating abailment system. This method may be performed by the bailment system ofFIG. 1.

FIG. 3 depicts example components and functional relationshipstherebetween that may be used in an example implementation of thebailment system of FIG. 1.

FIG. 4A depicts a portion of a first example of a biometric bag checksystem.

FIG. 4B depicts the biometric bag check system of FIG. 4A after theperson places the bag in the bag accepting device.

FIG. 4C depicts the biometric bag check system of FIG. 4B after the bagaccepting device tags the bag.

FIG. 4D depicts the biometric bag check system of FIG. 4C after the bagaccepting device provides the bag to the bag transport device.

FIG. 4E depicts a bag delivery device portion of the biometric bag checksystem of FIG. 4D delivering the bag to the person.

FIG. 5 depicts example communications between devices in an examplebiometric bag check system. The biometric bag check system may be thebiometric bag check system of FIGS. 4A-4E.

FIG. 6 depicts a flow chart illustrating a first example method foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems of FIGS. 4A-4E or FIG. 5.

FIG. 7 depicts a flow chart illustrating a second example method foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems of FIGS. 4A-4E or FIG. 5.

FIG. 8 depicts a flow chart illustrating a third example method foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems of FIGS. 4A-4E or FIG. 5.

FIG. 9 depicts a flow chart illustrating a fourth example method foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems of FIGS. 4A-4E or FIG. 5.

FIG. 10 depicts a flow chart illustrating a fifth example method foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems of FIGS. 4A-4E or FIG. 5.

FIG. 11 depicts a flow chart illustrating a sixth example method foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems of FIGS. 4A-4E or FIG. 5.

FIG. 12A depicts a portion of a second example of a biometric bag checksystem.

FIG. 12B depicts the biometric bag check system of FIG. 12A after theperson places the bag on the conveyor belt of the bag accepting device.

FIG. 12C depicts the biometric bag check system of FIG. 12B after theconveyor belt of the bag accepting device moves the bag to a conveyorbelt of a bag transport device.

FIG. 13A depicts a portion of a third example of a biometric bag checksystem.

FIG. 13B depicts the biometric bag check system of FIG. 13A after theperson opens the locker.

DETAILED DESCRIPTION

Reference will now be made in detail to representative embodimentsillustrated in the accompanying drawings. It should be understood thatthe following descriptions are not intended to limit the embodiments toone preferred embodiment. To the contrary, it is intended to coveralternatives, modifications, and equivalents as can be included withinthe spirit and scope of the described embodiments as defined by theappended claims.

The description that follows includes sample systems, methods, andcomputer program products that embody various elements of the presentdisclosure. However, it should be understood that the describeddisclosure may be practiced in a variety of forms in addition to thosedescribed herein.

Typical bag check and/or other bailment systems are often inefficient,inconvenient, and/or inflexible. People checking bags typically have towait for clerks, have to carry appropriate identification and boardingpasses, and have few options for altering arrangements once the bag ischecked. Similarly, though technology is often used for portions of bagcheck arrangements, technology use is often piecemeal and the variouscomponents used are not interconnected and do not have the ability toadjust to changed circumstances or provide more than the basic bag checkservice.

The following disclosure relates to a biometric bag check system. Thebiometric bag check system includes a number of interconnectedcomponents that obtain a bag, associate the bag with an identity, androute the bag from origin to destination according to the identity. Thisallows for a variety of additional functionality over typical systemswhile improving convenience for users and improving the efficiency ofsuch systems and using fewer resources than were previously possible.Such functionality may include automated bag accepting devices, theability to alter routing if people do not pass security or boardflights, customized and/or secure bag delivery, and so on.

These and other embodiments are discussed below with reference to FIGS.1-13B. However, those skilled in the art will readily appreciate thatthe detailed description given herein with respect to these Figures isfor explanatory purposes only and should not be construed as limiting.

A bailment is when a first person, persons, entity, and/or entitiestakes control and responsibility for one or more items from a secondperson, persons, entity, and/or entities. For example, it is a bailmentwhen an airline or similar entity takes control and responsibility forone or more bags of a passenger in a bag check system. The airlinetypically takes control of a bag upon check, transports the bag, andprovides the bag back to the passenger. The airline may have aresponsibility to the passenger for the bag during their possession andmay have a responsibility to the passenger to return the bag safely. Theairline may also have responsibilities to various authorities regardingsecurity involving the bag. However, this is an example and a bailmentmay occur any time control of an item is undertaken for the benefit ofanother.

FIG. 1 depicts an example bailment system 100. The example bailmentsystem 100 may include one or more bailment accepting devices 101,bailment transport devices 104, and/or one or more bailment deliverydevices 105 that may be interconnected and may be operable tocommunicate with one or more identity or identification systems 102 viaone or more communication networks 103.

The bailment accepting device 101 may obtain control of an item (such asusing one or more mechanisms that secure control of an item including,but not limited to, one or more lockers, closeable apertures, conveyors,locking mechanisms, and so on), communicate with the identificationsystem 102 to determine an identity to associate with the item, and/orroute the item via the bailment transport device 104. Routing the itemmay involve providing the item to the bailment transport device 104,otherwise allowing the bailment transport device 104 to obtain the item,and so on. The bailment transport device 104 may obtain the item fromthe bailment accepting device 101, route the item according toinstructions received from one or more various other devices (such asaccording to status updates or other notifications associated with theidentity that the bailment transport device 104 receives from theidentification system 102 and/or other device), transport the item,and/or provide the item to the bailment delivery device 105. Thebailment delivery device 105 may provide the item.

For example, the bailment delivery device 105 may return the item to theperson who provided the item to the bailment accepting device 101. Insome examples, the bailment delivery device 105 may authenticate thatthe person to whom the item is returned is authorized to claim the item.For example, the bailment delivery device 105 may ensure that the personclaiming the item is the person who provided the item to the bailmentaccepting device 101. In some examples, the bailment delivery device 105may use the identification system 102 to authenticate the identity ofthe person claiming the item. The bailment delivery device 105 mayinclude various mechanisms for securing and/or providing access to items(such as one or more delivery conveyors or carousels, lockers, keypadsor other input mechanisms for receiving authorization codes or digitalrepresentations of biometrics other input, and so on), transmittingnotifications regarding held items (such as one or more locations,pickup instructions, passcodes, and so on), and so on.

In some implementations, the bailment transport device 104 may transportthe item over a distance. For example, the bailment transport device 104may include a variety of transport mechanisms (such as one or moreconveyor belts, conveyors, robotic arms, drones, shuttles, movementpersonnel, and so on) that are operable to route the item from an originto a destination (such as between two points in a facility, betweendifferent cities or other places, and so on). However, in otherexamples, the bailment transport device 104 may control the item betweenacceptance and return of the item. For example, in some implementations,the bailment accepting device 101, bailment transport device 104, andbailment delivery device 105 may all be at a single facility where itemsmay be checked for an amount of time and then returned. In variousimplementations, the bailment accepting device 101, bailment transportdevice 104, and bailment delivery device 105 may even be incorporatedinto a single device. For example, a mobile phone locker may takecontrol of a person's cell phone, guard the mobile phone for a period oftime, and then return the mobile phone to the person. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

By way of illustration, the identification system 102 may be a biometricidentification system. In various implementations, the bailmentaccepting device 101 and/or another device may include a biometricreader device (such as one or more fingerprint sensors, cameras, and/orother devices or components that are operable to capture informationabout a person) that actively or passively obtains one or more digitalrepresentations (such as one or more hashes, encrypted or unencrypteddata structures, and so on) of one or more biometrics (such as one ormore fingerprints, palm prints, facial images, iris images, retinaimages, gaits, and/or any other information regarding a person's body orportion thereof) from a person. The bailment accepting device 101 maytransmit the digital representation of the biometric to theidentification system 102. The identification system 102 may determinean identity of a person by comparing the digital representation of thebiometric to stored biometric data. The identification system 102 mayhave previously stored the stored biometric data upon authenticatingidentities of people being enrolled in a biometric identificationsystem. The identification system 102 may return information regardingthe identity to the bailment accepting device 101. For example, theidentification system 102 may return one or more identifiers (such as aname of the person, a social security number for the person, an accountnumber for the person) that indicate the identity (and may or may notinclude the digital representation of the biometric), one or moreattestations regarding the identity (whether or not the person isauthorized to provide an item, whether or not the person has paid toprovide the item, and so on), and so on. The bailment accepting device101 may then associate the identity with the item (such as by attachinga trackable tag to the item, providing a trackable tag that the personmay attach to the item, programming a trackable component of the itemlike a radiofrequency identification device or RFID, and so on).

Although this describes the bailment accepting device 101 obtaining thedigital representation of the biometric and communicating with theidentification system 102, it is understood that this is an example.Such actions may be performed by other devices (such as the bailmenttransport device 104 and/or the bailment delivery device 105) in otherimplementations without departing from the scope of the presentdisclosure.

The above provides a number of technological improvements over typicalbailment systems. For example, use of the identification system 102 mayseparate information used for identification (such as stored biometrics)from devices, such as the bailment accepting device 101, that useidentification. This may improve security for the stored identificationinformation, allow support of multiple devices that use identificationwithout replicating identification or data storage functions, and/orotherwise add functionality and/or reduce resource consumption. By wayof another example, the technologically interconnected nature of thebailment system 100 may allow functions not otherwise possible, such aspersonally adjusted item delivery or routing based on changedcircumstances. In short, the devices that make up the bailment system100 may be capable of more functions more efficiently while using fewerresources than other bailment systems.

FIG. 2 depicts a flow chart illustrating a method 200 for operating abailment system. This method may be performed by the bailment system 100of FIG. 1.

At 210, a bailment system (such as via a bailment accepting device)establishes control of a bailed item. For example, a bailment acceptingdevice kiosk may include a closeable hatch and may establish control ofa bailed item by closing the hatch after the bailed item is placedinside. By way of another example, a bailment accepting device kiosk mayinclude a robotic clasp that closes around a portion of a bailed item(such as the handle of a bag) to establish control. In still anotherexample, a bailment accepting device kiosk may include a bailed itemplacement area and monitoring devices (such as pressure sensors underthe placement area, cameras that track movement in and/or out of theplacement area, and so on) to establish control by determining that thebailed item is placed into the placement area and not thereafterremoved. Various configurations are possible and contemplated withoutdeparting from the scope of the present disclosure.

At 220, the bailment system determines an identity. In someimplementations, a bailment accepting device may communicate with anidentification system to determine the identity. For example, a bailmentaccepting device may include one or more biometric reader devices thatmay obtain one or more digital representations of one or more biometrics(such as by imaging or scanning a fingerprint using an image sensor, aphosphorescence sensor, a capacitive sensor, and so on; by a cameracapturing one or more images of a face, iris, retina, gait, and so on;or the like). In such an example, the digital representation of thebiometric may be compared to biometric data stored in association withidentity information to determine an identity associated with thedigital representation of the biometric. In other examples, a person mayprovide authentication information associated with a social media orother account (or other aggregate data, such as a provided address andbirth data or other combination of knowledge that a person associatedwith an identity would know) and it may be determined whether or not anidentity can be reliably determined as being associated with the socialmedia or other account. In some implementations of such examples,biometric or other verification may be performed to supplement anidentity determination made using the social media or other account.Various configurations are possible and contemplated without departingfrom the scope of the present disclosure.

At 230, the bailment system associates the bailed item with theidentity. For example, a bailment accepting device may attach a tag tothe item and the tag may specify the identity (such as by includingtext, one or more machine readable codes like a matrix barcode, or moreelectronically readable elements such as an RFID component and so on).Tags may be attached by adhering the tag to the bailed item, clippingthe tag to the bailed item, printing the tag on the bailed item,wrapping the tag around a portion of the bailed item and attaching thetag to itself (such as using adhesive, one or more clasps, and so on),and so on. By way of another example, a bailment accepting device mayinclude a camera or other scanning device that is operable to uniquelyidentify a bailed item based on a captured picture or other scan andassociated the identity with the picture or other scan that uniquelyidentifies the bailed item. Various configurations are possible andcontemplated without departing from the scope of the present disclosure.

At 240, the bailment system (such as using one or more bailmenttransport devices) may transport the item. For example, bailmenttransport devices may include one or more robotic arms, conveyor belts,automated and/or non-automated vehicles, moving carousels, transportpersonnel, routing direction devices, and so on. Various configurationsare possible and contemplated without departing from the scope of thepresent disclosure.

At 250, the bailment system returns the bailed item, such as using oneor more bailment delivery devices. Such bailment delivery devices mayinclude carousels where people may claim bailed items, automated and/ornon-automated delivery vehicles, individual lockers storing bailed itemsthat people may need to verify identity to open, and so on. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

Although the example method 200 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, 240 illustrates and describes transporting the item.However, in some examples, the item may not be transported betweenacceptance and return. In such an example, transport may be omitted.Various configurations are possible and contemplated without departingfrom the scope of the present disclosure.

Further, the method 200 is illustrated and described as determining anidentity and associating the bailed item with the identity. However, itis understood that this is an example. In other implementations, otherapproaches are possible without departing from the scope of the presentdisclosure. For example, in some implementations, a digitalrepresentation of a biometric may be obtained and associated with thebailed item without determining an identity and associating the identitywith the bailed item. In such an example, a person may provide a digitalrepresentation of a biometric when claiming a bailed item and thedigital representation of the biometric may be matched to the previouslyobtained digital representation of the biometric. In variousimplementations of such an example, routing information may beassociated with the bailed item and/or the digital representation of thebiometric to control routing of the bailed item during transport.

In various examples, this example method 200 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed by one or more computing devices, such as the bailmentaccepting device 101, the bailment transport device 104, the bailmentdelivery device 105, and/or the identification system 102 of FIG. 1.

FIG. 3 depicts example components and functional relationshipstherebetween that may be used in an example implementation of thebailment system 100 of FIG. 1.

The bailment accepting device 101 may include one or more processingunits 310 or other processors or controllers, one or more non-transitorystorage media 311 (which may take the form of, but is not limited to, amagnetic storage medium; optical storage medium; magneto-optical storagemedium; read only memory; random access memory; erasable programmablememory; flash memory; and so on), one or more communication units 312,one or more biometric readers 313 or other biometric reader devices(and/or monitoring components operable to monitor a person providing anitem for bailment), one or more item control devices 314, and/or one ormore other components (such as components operable to inspect variousaspects regarding the item like whether or not the dimensions or weightof the item meet requirements, whether or not the item includeshazardous contents, and so on). The processing unit 310 may execute oneor more instructions stored in the storage medium 311 to perform variousbailment accepting device 101 functions, such as accepting control of anitem, communicating with the identification system 102 via thecommunication unit 312, determining an identity, associating an itemwith the identity, and so on.

Similarly, the identification system 102 may include one or moreprocessing units 315 or processors or other controllers, storage media316, communication units 317, and so on. The processing unit 315 mayexecute one or more instructions stored in the storage medium 316 toperform various identification system 102 functions. For example, theprocessing unit 315 may receive one or more digital representations ofbiometrics via the communication unit 317, determine one or moreidentities by comparing the received digital representations ofbiometrics to stored biometric data, determine one or more identifiersassociated with the determined identities, provide information regardingthe determined identities (such as by providing the identifiers,attestations regarding the identities, and so on) via the communicationunit 317, and so on.

As illustrated, the bailment system 100 may also include one or moreother computing devices 318 that may be operable to communicate with thebailment accepting device 101, the identification system 102, and/orother devices via the communication network 103. For example, such othercomputing devices 318 may include one or more governmental and/or otherdatabases, payment processing systems, computing devices belonging tothe person who bailed the item in order to provide notifications and/orreceive instructions regarding the item, devices that are operable toprovide information regarding whether or not bailment is authorizedand/or under what conditions, devices operable to provide status updatesregarding the person (such as whether or not the person passes through asecurity checkpoint, boards a vehicle such as a plane, and so on), andso on.

FIG. 4A depicts a portion of a first example of a biometric bag checksystem 400. The biometric bag check system 400 may be the bailmentsystem 100 of FIGS. 1 and/or 3. The biometric bag check system 400 mayinclude a bag accepting device 401 that is operable to obtain control ofa bag 421 from a person 420. For example, the bag accepting device 401may be a vending machine, kiosk, or other automated device that isoperable to obtain control of the bag 421.

The bag accepting device 401 may include one or more bag controlmechanisms. For example, as illustrated, the bag accepting device 401may include a closeable aperture 414 into which the bag 421 may beinserted. The bag accepting device 401 may also include one or moreidentification mechanisms, such as one or more biometric reader devices413, one or more monitoring mechanisms that monitor the person 420during acceptance of the bag and/or identification, and so on.

The bag acceptance device 401 may also be operably connected to one ormore bag transport devices 404. For example, the bag transport device404 may be a conveyor belt connected to a back of the bag acceptancedevice 401 and otherwise blocked off by a wall. The bag acceptancedevice 401 may be operable to receive control of the bag 421 through thecloseable aperture 414 and then route the bag 421 by providing the bag421 through the back of the bag acceptance device 401 to the conveyorbelt of the bag transport device 404 (and/or otherwise allowing the bagtransport device 404 to remove the bag 421 from the bag accepting device401).

FIG. 4B depicts the biometric bag check system 400 of FIG. 4A after theperson 420 places the bag 421 in the bag accepting device 401. The bagaccepting device 401 closes a hatch 422 to close the closeable aperture414. This allows the bag accepting device 401 to have control of the bag421 and the person 420 to no longer have access to the bag 421. The bagaccepting device 401 may then be operable to receive a digitalrepresentation of a biometric from the person 420 once control of thebag 421 is established. For example, as shown, the biometric readerdevice 413 may be a fingerprint sensor operable to capture one or morefingerprints of the person 420.

The bag accepting device 401 may determine and/or receive an identity ofthe person 420 using the digital representation of the biometric. Forexample, the bag accepting device 401 may transmit an image of afingerprint to a biometric identification system. The bag acceptingdevice 401 may receive a response from the identification systemindicating an identity of the person, such as an identifier for theperson. The bag accepting device 401 may use the identity in someexamples to verify that the person 420 is authorized to check the bag421, such as by communicating the identifier to an airline or othersystem. For example, the bag accepting device 401 may verify that theperson has paid to check a bag for a flight or that a bag check has beenpaid for another person whom the person is authorized to check bags for(such as a parent who may be authorized to check bags for a child'sflight). The bag accepting device 401 may receive a response indicatingwhether or not the person 420 has a flight that day, whether or not theperson 420 is allowed to check the bag 421, the terms under which theperson 420 is allowed to check the bag 421 (such as only one bag withoutadditional payment, no bag over 45 pounds without additional payment,acceptable bag dimensions, and so on), and so on.

The bag accepting device 401 may then associate the bag 421 with theidentity. For example, FIG. 4C depicts the biometric bag check system400 of FIG. 4B after the bag accepting device 401 tags the bag 421 witha tag 423. The bag accepting device 401 may include attachmentmechanisms for attaching the tag 423 once the bag accepting device 401has control of the bag 421.

The biometric bag check system 400 may use the tag 423 and/or identityto track the bag 421 throughout the biometric bag check system 400. Forexample, various components of the biometric bag check system 400 (suchas the bag accepting device 401, the bag transport device 404, a bagdelivery device, and so on) may include components operable to readinformation from the tag 423. In this way, the bag accepting device 401of the biometric bag check system 400 may use the tag 423 and/or theidentity to monitor the location of the bag 421 (and/or perform variousactions regarding the bag 421, such as interrupting routing or transportof the bag 421, rerouting the bag 421, transmitting notifications whenthe bag 421 reaches various points, and so on) throughout the biometricbag check system 400.

In other examples, the bag accepting device 401 may provide the tag 423for the person 420 to attach. In various examples, the bag acceptingdevice 401 may include monitoring mechanisms, such as one or morecameras, for ensuring that the person 420 attaches the tag 423 to thecorrect bag 421, that another person does not provide the bag 421,and/or various other unauthorized actions.

After associating the bag 421 with the identity, the bag acceptingdevice 401 may route the bag 421. The bag 421 may be routed and/ortransported according to the identity, such as in accordance withloading on a flight for which the person is scheduled. For example, FIG.4D depicts the biometric bag check system 400 of FIG. 4C after the bagaccepting device 401 provides the bag 421 to the bag transport device404. The biometric bag check system 400 may then route and/or transportthe bag 421 accordingly until delivering and/or otherwise returning thebag 421 to the person 420.

For example, FIG. 4E depicts a bag delivery device 405 portion of thebiometric bag check system 400 of FIG. 4D delivering the bag 421 to theperson 420. In this example, the bag delivery device 405 is a baggagecarousel. A conveyor of the bag transport device 404 may provide the bag421 (which may have the tag 423 still attached) to the carousel of thebag delivery device 405. The person may pick up the bag 421 from thecarousel.

In some implementations, the biometric bag check system 400 may use theidentification system and/or other identification mechanisms to onlyallow the person 420 or an authorized representative to claim the bag421. For example, the person 420 may only be allowed into a baggageretrieval area (and/or access to a secured locker or other securedmechanism) upon providing a biometric, passcode, and so on.

In some examples, one or more devices of the biometric bag check system400 may communicate with one or more other devices as part of routingand/or transporting the bag 421. For example, the bag delivery device405 and/or another component of the biometric bag check system 400 maytransmit a message to a computing device associated with the identityinforming the person 420 when the bag 421 is at the carousel or otherlocation where the bag 421 can be claimed, and so on.

By way of another example, the biometric bag check system 400 maycommunicate with one or more devices with regards to whether or not theperson passes a security checkpoint and/or boards a flight. For example,the identification system may be used to identify the person 420 at thesecurity checkpoint and/or during boarding and may thus be aware whenthese actions are associated with the identity. If the biometric bagcheck system 400 does not receive an indication that the person passesthe security checkpoint and/or boards a flight as expected, thebiometric bag check system 400 may determine whether to alter transportof the bag 421. Altering transport may include halting routing and/ortransport of the bag 421 and/or rerouting the bag 421 so that the bag421 is not loaded onto a plane without the person 420 and/or transportedto where the person 420 is not. This may prevent unnecessary transportof the bag 421 if the person misses a flight, may enhance security bypreventing the person 420 from loading the bag 421 on a flight theperson 420 does not intend to take, and/or provide other benefits.

In some examples, the biometric bag check system 400 may determine toperform additional security screening on the bag 421 if the person 420misses a flight. Additional security screening may involve additionalinspection, pulling the bag 421 from the flight, leaving the bag 421 onthe flight, delaying the flight in order to be able to perform actionsrelated to the bag 421, and/or a variety of other actions. In variousimplementations, the biometric bag check system 400 may make adetermination whether to perform additional security screening and/orwhat additional security screening to perform upon determination thatthe person 420 missed a flight and/or other circumstances. Such adetermination may be based upon information known about the person 420by the identification system (such as risk factors associated with theperson, whether or not the person is likely to take another flight to asame destination as the first flight within a short time person, and soon), security factors associated with the flight and/or other peopleassociated with the flight, weather conditions, flight schedules, and soon. For example, if the person 420 is a lower risk and the bag 421 isalready on board, the bag 421 may not be pulled and may be rerouted uponarrival. However, if the person 420 is a higher risk, the bag 421 may bepulled. Various configurations are possible and contemplated withoutdeparting from the scope of the present disclosure.

The biometric bag check system 400 may also communicate with one or morecomputing devices associated with identity to provide various offers.For example, the biometric bag check system 400 may upsell delivery ofthe bag 421 directly to the person, may upsell delivery of the bag 421to a secured area instead of an unsecured area, may upsell expedited bag421 delivery, may upsell baggage insurance, may provide offers fordiscounted or free airport services (such as a restaurant or lounge)associated with a rewards account, and so on. The person 420 may be ableto respond to pay for such communications, upsells, or offers via thecomputing device. For example, the biometric bag check system 400 mayreceive a response and use the identification system to process paymentfor a response using payment details (such as a credit card) associatedwith the identity, using a payment processing system via detailsassociated with the identity (such as creating a credit account usingbiographic details associated with the identity), and so on.

In various examples, the person 420 may be associated with a high statusaccount, a loyalty rewards account, or other such account. The accountmay accord the person 420 a “frictionless” experience. The account mayaccord the person 420 such an experience by recording defaultspecifications for the person 420 so that the person 420 is not botheredby prompts to make choices and/or may indicate not to transmit anyupsells to the person 420.

FIG. 5 depicts example communications between devices in an examplebiometric bag check system 500. The biometric bag check system 500 maybe the biometric bag check system 400 of FIGS. 4A-4E and/or the bailmentsystem 100 of FIG. 1. As shown, a baggage check device 501 maycommunicate with one or more identification systems 502, one or moreairline systems 530, and/or other computing devices 518 via one or morecommunication networks 503. The baggage check device 501 may be one ormore components of the biometric bag check system 400 of FIGS. 4A-4Eand/or the bailment system 100 of FIG. 1, such as the bag acceptingdevice 401 and so on.

In various implementations, a biometric bag check system may include abag accepting device operable to obtain control of a bag from a person,obtain a digital representation of a biometric from the person, use abiometric identification system to determine an identity for the personusing the digital representation of the biometric, verify flightinformation for the person by communicating with an airline system usingthe identity, and route the bag upon verification of the flightinformation. The biometric bag check system may also include a bagtransport device operable to receive the bag from the bag acceptingdevice and transport the bag. The biometric bag check system may furtherinclude a bag delivery device operable to receive the bag from the bagtransport device and deliver the bag to the person.

In some examples, the biometric bag check system may use the identity todetermine whether the person passed a security checkpoint and interrupttransport of the bag if the person did not pass the security checkpoint.In numerous examples, the biometric bag check system may use theidentity to determine whether the person boarded a flight associatedwith the flight information and interrupt transport of the bag if theperson did not board the flight. In various examples, the biometric bagcheck system may determine whether to screen the bag based on theidentity.

In numerous examples, the bag accepting device may tag the bag toassociate the bag with the identity. In other examples, the bagaccepting device may provide a tag that associates the bag with theidentity. In some implementations of such examples, the bag acceptingdevice may monitor while the person attaches the tag to the bag. In someexamples of such implementations, the bag accepting device may interruptrouting of the bag if the bag accepting device is unable to monitor theperson attaching the tag to the bag.

In various examples, the biometric bag check system may use the identityto transmit a notification that the bag is ready for delivery from thebag delivery device. In some such examples, the notification may includeinstructions to enable delivery.

In numerous examples, the bag accepting device may verify that controlof the bag is obtained from a same person who provides the digitalrepresentation of the biometric prior to routing the bag. In someexamples, the person may be a first person, the flight information mayauthorize routing of the bag for a second person, and the bag acceptingdevice may verify that the flight information authorizes the firstperson to check the bag for the second person prior to routing the bag.

In some embodiments, a bag accepting device may include at least onenon-transitory medium that stores instructions, a biometric readerdevice, and at least one processor communicably coupled to the biometricreader device. The at least one processor may execute the instructionsto obtain control of a bag from a person, obtain an identity for theperson using a digital representation of a biometric obtained via thebiometric reader device, communicate with an airline system to verifyflight information for the person using the identity, and route the bagusing a biometric bag check system upon verification of the flightinformation.

In various examples, the bag accepting device may obtain the identityfrom a biometric identification system. In some examples, the bagaccepting device may obtain the identity from a biometric identificationsystem in response to transmitting the digital representation of thebiometric to the biometric identification system. In numerous examples,the bag accepting device may prevent the person from accessing the bagprior to routing after obtaining control.

In numerous embodiments, a bag delivery device may include at least onenon-transitory medium that stores instructions and at least oneprocessor. The at least one processor may execute the instructions toreceive a bag routed via a biometric bag check system wherein thebiometric bag check system associated the bag with an identity of aperson determined using a received biometric, transmit a notificationregarding possession of the bag using the identity, and provide the bagto the person.

In some examples, the bag delivery device may further include abiometric reader device and the at least one processor may receive adigital representation of a biometric from the person using thebiometric reader device, use the digital representation of the biometricto verify the identity of the person with a biometric identificationsystem, and provide the bag upon verification of the identity. Invarious examples, the bag delivery device may further include a lockerand the at least one processor may provide the bag by opening thelocker. In numerous examples, the notification may specify a location ofthe bag.

FIG. 6 depicts a flow chart illustrating a first example method 600 foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems 400, 500 of FIGS. 4A-4E or FIG.5.

At 610, a biometric bag check system may establish control of a bag. At620, the biometric bag check system may receive a digital representationof a biometric. At 630, the biometric bag check system may determine anidentity using the digital representation of the biometric. At 640, thebiometric bag check system may obtain flight information using theidentity.

The flow may then proceed to 650 where the biometric bag check systemdetermines whether or not checking of the bag is authorized. Forexample, if the identity is associated with a flight that day at anairport corresponding to the location where the bag is provided, thebiometric bag check system may determine checking is authorized. By wayof another example, the biometric bag check system may determine thechecking is not authorized if the identity is associated with a list ofpeople banned from flying, such as a federal no fly list. If checking isnot authorized, the flow proceeds to 660 where checking may be rejected.Otherwise, the flow may proceed to 670.

At 670, the biometric bag check system may associate the bag with theidentity. The flow may then proceed to 680 where the biometric bag checksystem may transport the bag. Next, at 690, the biometric bag checksystem may deliver the bag.

Although the example method 600 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 600 uses the term “bag.” However, in variousexamples, the biometric bag check system may check, transport, and/ordeliver any kind of bag, baggage, suitcase, garment bag, and/or anyother item. The biometric bag check system may not be restricted tochecking “bags.”

Further, the method 600 is illustrated and described as determining anidentity and associating the bag with the identity. However, it isunderstood that this is an example. In other implementations, otherapproaches are possible without departing from the scope of the presentdisclosure. For example, in some implementations, the bag may bedirectly associated with the digital representation of the biometricwithout determining an identity and associating the identity with thebag. In such an example, a person may provide a digital representationof a biometric when claiming a bag and the digital representation of thebiometric may be matched to the previously obtained digitalrepresentation of the biometric. In various implementations of such anexample, routing information may be associated with the bag and/or thedigital representation of the biometric to control routing of the bagduring transport.

In various examples, this example method 600 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed by one or more computing devices, such as the bagaccepting device 401, the bag transport device 404, and/or the bagdelivery device 405 of FIG. 4 and/or the baggage check device 501 ofFIG. 5.

FIG. 7 depicts a flow chart illustrating a second example method 700 foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems 400, 500 of FIGS. 4A-4E or FIG.5.

At 710, the biometric bag check system may obtain a bag. At 720, thebiometric bag check system may determine whether or not an identity canbe determined to associate with the bag. The identity may be determinedusing a digital representation of a biometric. If not, the flow proceedsto 730 where the biometric bag check system determines that an error hasoccurred and may refuse to check the bag. Otherwise, the flow mayproceed to 740.

At 740, the biometric bag check system may determine whether or notflight information can be associated with the identity. If not, the flowproceeds to 730 where the biometric bag check system determines an errorhas occurred and may refuse to check the bag. Otherwise, the flow mayproceed to 750.

In various implementations, the biometric bag check system may determinethat flight information can be associated with the identity, but that aflight associated with the flight information has been cancelled,rerouted, delayed due to weather, or otherwise changed. In such asituation, the biometric bag check system may refuse to check the bag toprevent bags that cannot be routed from being accepted into thebiometric bag check system. Alternatively, the biometric bag checksystem may provide information regarding the flight status change, checkthe bag but route the bag differently due to the flight status change,hold the bag before rerouting to accommodate delays, and/or perform avariety of different actions in response to detecting the flight statuschange.

At 750, the biometric bag check system may route the bag associated withthe identity. Routing may involve a bag accepting device moving to a bagtransport device, a bag accepting device securing the bag until the bagis obtained from the bag accepting device by a bag transport device, andso on. The flow may then proceed to 760 where the biometric bag checksystem determines whether or not information can be obtained that theperson passes security. If not, the flow may proceed to 730 where thebiometric bag check system may determine that an error has occurred andto interrupt routing of the bag. Otherwise, the flow may proceed to 770.

At 770, the biometric bag check system may determine whether or notinformation can be obtained that the person boards the flight associatedwith the flight information. If not, the flow may proceed to 730 wherethe biometric bag check system may determine that an error has occurredand to interrupt routing of the bag. Otherwise, the flow may proceed to780 where the biometric bag check system may deliver the bag. Forexample, delivery of the bag may include transporting the bag to abaggage delivery carousel.

Although the example method 700 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 700 is illustrated and described as routing thebag if flight information can be obtained. However, in some examples,payment for the bag may first be obtained. For example, a bag drop kioskmay include a credit card reader and routing may be performed after thecredit card reader is used to obtain payment. In other examples, anidentification system may be used to process payment for the bag usingpayment details associated with the identity. Various configurations arepossible and contemplated without departing from the scope of thepresent disclosure.

In various examples, this example method 700 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed by one or more computing devices, such as the bagaccepting device 401, the bag transport device 404, and/or the bagdelivery device 405 of FIG. 4 and/or the baggage check device 501 ofFIG. 5.

FIG. 8 depicts a flow chart illustrating a third example method 800 foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems 400, 500 of FIGS. 4A-4E or FIG.5.

At 810, a biometric bag check system may obtain a bag. The flow mayproceed to 820 where the biometric bag check system may determinewhether or not an identity can be associated with the bag. The identitymay be determined using a digital representation of a biometric. If not,the flow may proceed to 830 where the biometric bag check system maydetermine that an error has occurred and may refuse to route the bag.Otherwise, the flow may proceed to 840.

At 840, the biometric bag check system may determine whether or not oneor more flight checks can be completed. Flight checks may includeverifying whether or not a flight within a time period (such as 4 hours,5 hours, 8 hours, 12 hours, 2 days, and so on) out of an airportcorresponding to a current location is associated with the identity,whether or not bag check payment is associated with the identity,whether or not any flight restrictions are associated with the identity,whether or not the flight associated with the identity has been delayedor cancelled, whether or not the flight has been rerouted, and/or anyother flight checks. If the flight checks cannot be completed, the flowmay proceed to 830 where the biometric bag check system may determinethat an error has occurred and may refuse to route the bag. Otherwise,the flow may proceed to 850.

In some examples, the biometric bag check system may direct a person toassistance and/or summon assistance for the person if one or more flightchecks cannot be completed. The biometric bag check system may alsodirect the person to assistance and/or summon assistance upon theoccurrence of issues with other operations as well, such as failure toassociate an identity with the bag and so on.

At 850, the biometric bag check system may route the bag. Routing mayinvolve a bag accepting device moving to a bag transport device, a bagaccepting device securing the bag until the bag is obtained from the bagaccepting device by a bag transport device, and so on. The flow may thenproceed to 860 where the biometric bag check system determines whetheror not identity can be determined at pickup. For example, a person mayprovide a digital representation of a biometric and/or passcode or otheridentification associated with the identity to obtain access to abaggage carousel or open a baggage locker. If so, the flow may proceedto 870 and the biometric bag check system may return the bag. Otherwise,the flow may proceed to 830 where the biometric bag check systemdetermines an error has occurred and not deliver the bag.

Although the example method 800 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 800 is illustrated and described as proceedingfrom 860 to 830 and determining an error occurred if identity cannot bedetermined at pickup. However, in some implementations, the biometricbag check system may continue to hold the bag at 860 until identity canbe determined. Various configurations are possible and contemplatedwithout departing from the scope of the present disclosure.

In various examples, this example method 800 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed by one or more computing devices, such as the bagaccepting device 401, the bag transport device 404, and/or the bagdelivery device 405 of FIG. 4 and/or the baggage check device 501 ofFIG. 5.

FIG. 9 depicts a flow chart illustrating a fourth example method 900 foroperating a biometric bag check system. The biometric bag check systemmay be the biometric bag check systems 400, 500 of FIGS. 4A-4E or FIG.5.

At 910, a biometric bag check system may obtain a bag. At 920, thebiometric bag check system may tag the bag based on a determinedidentity. At 930, the biometric bag check system may route the bag basedon the identity. Routing may involve a bag accepting device moving to abag transport device, a bag accepting device securing the bag until thebag is obtained from the bag accepting device by a bag transport device,and so on.

At 940, the biometric bag check system may determine whether or not thebag should be screened based on the identity. For example, the biometricbag check system may receive an indication that certain people have beenselected for random bag screening. If the identity matches a name onsuch a list, the biometric bag check system may determine that the bagshould be screened. By way of another example, the biometric bag checksystem may determine that the identity is associated with a high riskcategory. As such, the biometric bag check system may determine that thebag should be screened. In still another example, the biometric bagcheck system may determine that the identity is associated with anexpedited security account and may determine that the bag should not bescreened.

If the biometric bag check system determines not to screen the bag, theflow may proceed to 950 where the biometric bag check system routes thebag to delivery. Otherwise, the flow proceeds to 960 where the biometricbag check system routes the bag to screening before the flow proceeds to950 and the biometric bag check system routes the bag for delivery.

Although the example method 900 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, 920 illustrates and describes the biometric bag checksystem tagging the bag based on the identity. However, in variousexamples, the biometric bag check system may monitor the person who ischecking the bag tagging the bag rather than the biometric bag checksystem tagging the bag itself. Various configurations are possible andcontemplated without departing from the scope of the present disclosure.

In various examples, this example method 900 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed by one or more computing devices, such as the bagaccepting device 401, the bag transport device 404, and/or the bagdelivery device 405 of FIG. 4 and/or the baggage check device 501 ofFIG. 5.

FIG. 10 depicts a flow chart illustrating a fifth example method 1000for operating a biometric bag check system. The biometric bag checksystem may be the biometric bag check systems 400, 500 of FIGS. 4A-4E orFIG. 5.

At 1010, a biometric bag check system obtains a bag. At 1020, thebiometric bag check system tags the bag based on a determined identity.The flow then proceeds to 1030 where the biometric bag check systemroutes the bag according to the determined identity.

Next, at 1040, the biometric bag check system holds the bag for pickup.The biometric bag check system may hold the bag for pickup in a locker,on a baggage carousel, in the possession of an agent who will deliverthe bag upon request, and so on.

The flow then proceeds to 1050 where the biometric bag check systemtransmits hold information. For example, the biometric bag check systemmay transmit a notification to a computing device (such as a mobilephone, an email address, and so on) associated with the identity. Thenotification may include instructions for pickup. Such instructions mayinclude a location for pickup, information such as one or more passcodesor similar identifiers needed for pickup, and so on.

The flow may then proceed to 1060 where the biometric bag check systemreturns the bag.

Although the example method 1000 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 1000 is illustrated and described astransmitting hold information after holding for pickup. However, invarious implementations, the biometric bag check system may transmithold information prior to holding the bag for pickup. For example, thebiometric bag check system may identify a location where the bag will beheld during routing. In such an example, the biometric bag check systemmay transmit the location as soon as the location is known. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 1000 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed by one or more computing devices, such as the bagaccepting device 401, the bag transport device 404, and/or the bagdelivery device 405 of FIG. 4 and/or the baggage check device 501 ofFIG. 5.

FIG. 11 depicts a flow chart illustrating a sixth example method 1100for operating a biometric bag check system. The biometric bag checksystem may be the biometric bag check systems 400, 500 of FIGS. 4A-4E orFIG. 5.

At 1110, a biometric bag check system may obtain a bag. At 1120, thebiometric bag check system may determine an identity to associate withthe bag. At 1130, the biometric bag check system may determine whetheror not a payment for the bag is associated with the identity. If not,the flow may proceed to 1140 where the biometric bag check systemarranges for payment before the flow proceeds to 1150. Otherwise, theflow may proceed directly to 1150.

For example, the biometric bag check system may communicate with anairline system to confirm that a payment for the bag has been made andassociated with the identity. By way of another example, the biometricbag check system may itself obtain payment for the bag, such as using acredit card or bill reader associated with a bag accepting device. Inyet another example, the biometric bag check system communicates with anidentification system to arrange for payment. For example, theidentification system may contact a payment processing system to processa payment using payment details associated with the identity. By way ofanother example, the identification system may create a credit accountusing biographic information (such as a name, address, social securitynumber, and so on) associated with the identity and use the creditaccount to process payment.

At 1150, after the biometric bag check system determines a payment forthe bag is associated with the identity, the biometric bag check systemmay associate the bag with the identity. The flow may then proceed to1160 where the biometric bag check system may route the bag. Next, aftertransport of the bag, the flow proceeds to 1170 where the biometric bagcheck system may deliver the bag.

Although the example method 1100 is illustrated and described asincluding particular operations performed in a particular order, it isunderstood that this is an example. In various implementations, variousorders of the same, similar, and/or different operations may beperformed without departing from the scope of the present disclosure.

For example, the method 1100 is illustrated and described as determiningpayment prior to associating the bag with the identity. However, it isunderstood that this is an example. In various implementations, theorder of these operations may be reversed and/or the operations may beperformed simultaneously and/or substantially simultaneously. Variousconfigurations are possible and contemplated without departing from thescope of the present disclosure.

In various examples, this example method 1100 may be implemented as agroup of interrelated software modules or components that performvarious functions discussed herein. These software modules or componentsmay be executed by one or more computing devices, such as the bagaccepting device 401, the bag transport device 404, and/or the bagdelivery device 405 of FIG. 4 and/or the baggage check device 501 ofFIG. 5.

FIG. 12A depicts a portion of a second example of a biometric bag checksystem 1200. As illustrated, the biometric bag check system 1200 mayinclude a bag accepting device 1201 and a bag transport device 1204. Ascontrasted with the bag accepting device 401 of FIG. 4, the bagaccepting device 1201 does not physically restrict access to the bag1221 upon obtaining the bag 1221. Similarly, physical access between thebag accepting device 1201 and an initial portion of a conveyor of thebag transport device 1204 is not directly restricted.

The bag accepting device 1201 includes a camera 1213, a conveyor belt1214, and a tag dispenser 1231. The camera 1213 obtains one or moreimages (such as one or more images of a face, retina, iris, gait, and soon) of a person 1220 as the person approaches and places the bag 1221 onthe conveyor belt 1214. The bag accepting device 1201 uses these imagesto obtain an identity for the person 1220. For example, the bagaccepting device 1201 may obtain the identity as the person approachesto place the bag 1221 on the conveyor belt 1214.

FIG. 12B depicts the biometric bag check system 1200 of FIG. 12B afterthe person 1220 places the bag 1221 on the conveyor belt 1214 of the bagaccepting device 1201. As illustrated, the tag dispenser 1231 maydispense a tag 1223 once the identity is determined, once the bag 1221is on the conveyor belt 1214, and so on. The bag accepting device 1201may associate the bag 1221 with the identity once the person 1220 placesthe tag 1223 on the bag 1221. The bag accepting device 1201 may use thecamera 1213 to ensure that no other person interferes and/or that theperson 1220 attaches the tag 1223 to the bag 1221.

Once the bag accepting device 1201 determines that the bag 1221 is thusassociated with the identity, the bag accepting device 1201 may routethe bag 1221. For example, FIG. 12C depicts the biometric bag checksystem 1200 of FIG. 12C after the conveyor belt 1214 of the bagaccepting device 1201 moves the bag 1221 to a conveyor belt of the bagtransport device 1204.

FIG. 13A depicts a portion of a third example of a biometric bag checksystem 1300. As compared to the baggage carousel illustrated in FIG. 4E,the biometric bag check system 1300 may include a baggage deliverydevice that includes a number of access controlled lockers 1305A-1305D.The biometric bag check system 1300 may route baggage to the lockers1305A-1305D and then transmit one or more notifications to one or morecomputing devices associated with the appropriate identity regarding thelocation where bags can be claimed.

For example, a person 1320 may have a mobile phone 1332 associated withthe person's identity in an identification system. The biometric bagcheck system 1300 may route the person's bag to a locker 1305B andtransmit a notification to the mobile phone 1332 indicating that theperson 1320 should claim the bag from the locker 1305B. The lockers1305A-1305D may include a biometric reader device 1313 or other inputdevice that the person 1320 can use to verify the person's identity.

Once the person's identity is confirmed, the appropriate locker 1305Bmay open, as illustrated in FIG. 13B. As shown, the locker 1305B is openand the person 1320 can regain control of the bag 1321.

The above illustrates and describes baggage delivery as being performedby devices. For example, FIG. 4E illustrates baggage delivery as beingperformed by a baggage delivery device 405 (shown as a baggage carousel)and FIGS. 13A-13B illustrate baggage delivery as being performed by thelockers 1305A-1305B. However, it is understood that these are examples.In some implementations, personnel may perform baggage delivery. Invarious examples, the personnel may use a variety of different devicesas part of performing baggage delivery.

As described above and illustrated in the accompanying figures, thepresent disclosure relates to a biometric bag check system. Thebiometric bag check system includes a number of interconnectedcomponents that obtain a bag, associate the bag with an identity, androute the bag from origin to destination according to the identity. Thisallows for a variety of additional functionality over typical systemswhile improving convenience for users and improving the efficiency ofsuch systems and using fewer resources than were previously possible.Such functionality may include automated bag accepting devices, theability to alter routing if people do not pass security or boardflights, customized and/or secure bag delivery, and so on.

The present disclosure recognizes that biometric and/or other personaldata is owned by the person from whom such biometric and/or otherpersonal data is derived. This data can be used to the benefit of thosepeople. For example, biometric data may be used to conveniently andreliably identify and/or authenticate the identity of people, accesssecurely stored financial and/or other information associated with thebiometric data, and so on. This may allow people to avoid repeatedlyproviding physical identification and/or other information.

The present disclosure further recognizes that the entities who collect,analyze, store, and/or otherwise use such biometric and and/or otherpersonal data should comply with well-established privacy policiesand/or privacy practices. Particularly, such entities should implementand consistently use privacy policies and practices that are generallyrecognized as meeting or exceeding industry or governmental requirementsfor maintaining security and privately maintaining biometric and/orother personal data, including the use of encryption and securitymethods that meets or exceeds industry or government standards. Forexample, biometric and/or other personal data should be collected forlegitimate and reasonable uses and not shared or sold outside of thoselegitimate uses. Further, such collection should occur only afterreceiving the informed consent. Additionally, such entities should takeany needed steps for safeguarding and securing access to such biometricand/or other personal data and ensuring that others with access to thebiometric and/or other personal data adhere to the same privacy policiesand practices. Further, such entities should certify their adherence towidely accepted privacy policies and practices by subjecting themselvesto appropriate third party evaluation.

Additionally, the present disclosure recognizes that people may blockthe use of, storage of, and/or access to biometric and/or other personaldata. Entities who typically collect, analyze, store, and/or otherwiseuse such biometric and and/or other personal data should implement andconsistently prevent any collection, analysis, storage, and/or other useof any biometric and/or other personal data blocked by the person fromwhom such biometric and/or other personal data is derived.

Although particular methods involving particular operations have beenillustrated and described, it is understood that these are examples. Invarious implementations, various arrangements of the same, similar,and/or different operations may be performed without departing from thescope of the present disclosure. Various configurations are possible andcontemplated.

Aspects of the present disclosure may be performed by one or moredevices, such as one or more computing devices, that may be configuredas part of a system. For example, one or more computing devices thatperform one or more aspects of this disclosure may be part of a cloudcomputing system, cooperative computing arrangement, and so on. Suchdevices may include one or more processors or other controllers orprocessing units, one or more non-transitory storage media (which maytake the form of, but is not limited to, a magnetic storage medium;optical storage medium; magneto-optical storage medium; read onlymemory; random access memory; erasable programmable memory; flashmemory; and so on), and/or other components. The processing unit mayexecute one or more instructions stored in the non-transitory storagemedium to perform one or more processes that utilize one or more of thetechniques disclosed herein.

In the present disclosure, the methods disclosed may be implemented assets of instructions or software readable by a device. Further, it isunderstood that the specific order or hierarchy of steps in the methodsdisclosed are examples of sample approaches. In other embodiments, thespecific order or hierarchy of steps in the method can be rearrangedwhile remaining within the disclosed subject matter. The accompanyingmethod claims present elements of the various steps in a sample order,and are not necessarily meant to be limited to the specific order orhierarchy presented.

The described disclosure may be provided as a computer program product,or software, that may include a non-transitory machine-readable mediumhaving stored thereon instructions, which may be used to program acomputer system (or other electronic devices) to perform a processaccording to the present disclosure. A non-transitory machine-readablemedium includes any mechanism for storing information in a form (e.g.,software, processing application) readable by a machine (e.g., acomputer). The non-transitory machine-readable medium may take the formof, but is not limited to, a magnetic storage medium (e.g., floppydiskette, video cassette, and so on); optical storage medium (e.g.,CD-ROM); magneto-optical storage medium; read only memory (ROM); randomaccess memory (RAM); erasable programmable memory (e.g., EPROM andEEPROM); flash memory; and so on.

The foregoing description, for purposes of explanation, used specificnomenclature to provide a thorough understanding of the describedembodiments. However, it will be apparent to one skilled in the art thatthe specific details are not required in order to practice the describedembodiments. Thus, the foregoing descriptions of the specificembodiments described herein are presented for purposes of illustrationand description. They are not targeted to be exhaustive or to limit theembodiments to the precise forms disclosed. It will be apparent to oneof ordinary skill in the art that many modifications and variations arepossible in view of the above teachings.

What is claimed is:
 1. A biometric bag check system, comprising: anon-transitory storage medium storing instructions; at least one bagtransport device; and a processor that executes the instructions to:receive a bag from a bag accepting device using the at least one bagtransport device, the bag associated with an identity of a person after:the bag is placed by the person in a bag accepting area and notsubsequently removed by the person; the identity of the person isdetermined by comparing a digital representation of a biometric receivedfrom the person to multiple sets of stored biometric data that areassociated with multiple identities and stored in a biometricidentification system; and flight information is obtained for the personby communicating with an airline system using identity information thatis stored in association with the identity; transport the bag using theat least one bag transport device according to the flight information;detect a change to a flight associated with the flight information; andreroute the bag using the at least one bag transport device to a bagdelivery device in response to the change, the bag delivery deviceoperable to open to provide the bag in response to verification of theidentity of the person using the biometric identification system.
 2. Thesystem of claim 1, wherein the change to the flight comprises a flightcancellation, a flight rerouting, or a flight delay.
 3. The system ofclaim 1, wherein the person is a first person and the processor:determines that the bag is for a second person; and determines that thesecond person is a relative of the first person before transporting thebag.
 4. The system of claim 3, wherein the processor determines that thesecond person is a child of the first person.
 5. The system of claim 1,wherein the processor is operable to: determine a risk factor associatedwith the person from information associated with the identity; and routethe bag for security screening based on the risk factor.
 6. The systemof claim 1, wherein the processor is operable to: transmit an offer tothe person to deliver the bag directly to the person; and reroute thebag directly to the person upon receipt of an acceptance from theperson.
 7. The system of claim 1, wherein the bag accepting areaincludes a pressure sensor.
 8. A biometric bag check system, comprising:a non-transitory storage medium storing instructions; and a processorthat executes the instructions to: receive a notification regardingreceipt of a bag from a bag accepting device by at least one bagtransport device, the bag associated with an identity of a person after:the bag is placed by the person in a bag accepting area and notsubsequently removed by the person; the identity of the person isdetermined by comparing a digital representation of a biometric receivedfrom the person to multiple sets of stored biometric data that areassociated with multiple identities and stored in a biometricidentification system; and flight information is obtained for the personby communicating with an airline system using identity information thatis stored in association with the identity; instruct the at least onebag transport device to transport the bag according to the flightinformation; detect a change to a flight associated with the flightinformation; and instruct the at least one bag transport device toreroute the bag to a bag delivery device in response to the change, thebag delivery device operable to open to provide the bag in response toverification of the identity of the person using the biometricidentification system.
 9. The system of claim 8, wherein the processoris operable to: determine a risk factor associated with the person frominformation associated with the identity; and interrupt routing of thebag based on the risk factor.
 10. The system of claim 8, wherein theprocessor is operable to: transmit an offer to the person to deliver thebag to a secured area instead of an unsecured area; and reroute the bagto the secured area upon receipt of an acceptance from the person. 11.The system of claim 10, wherein the processor is operable to process apayment upon receipt of the acceptance.
 12. The system of claim 11,wherein the processor is operable to process the payment using a creditaccount that the processor is operable to create using biographicdetails associated with the identity.
 13. The system of claim 8, whereinthe processor is operable to determine: that the person missed theflight; and to omit instructing the at least one bag transport device toreroute the bag upon determining that the person will take a laterflight.
 14. The system of claim 8, wherein the processor processes apayment for the bag using payment details associated with the identity.15. A biometric bag check system, comprising: a non-transitory storagemedium storing instructions; and a processor that executes theinstructions to: receive a notification regarding receipt of a bag froma bag accepting device by at least one bag transport device, the bagassociated with an identity of a person after: the bag is placed by theperson in a bag accepting area and not subsequently removed by theperson; the identity for the person is determined by comparing a digitalrepresentation of a biometric received from the person to multiple setsof stored biometric data that are associated with multiple identitiesand stored in a biometric identification system; and flight informationis obtained for the person by communicating with an airline system usingidentity information that is stored in association with the identity;detect that a flight associated with the flight information iscancelled, rerouted, or delayed; and instruct the at least one bagtransport device to reroute the bag.
 16. The system of claim 15, whereinthe processor is operable to: transmit an offer to the person forexpedited bag delivery; and provide the expedited bag delivery uponreceipt of an acceptance from the person.
 17. The system of claim 16,wherein the processor is operable to transmit the offer to an electronicdevice specified in information associated with the identity.
 18. Thesystem of claim 15, wherein the processor is operable to interruptrouting of the bag based on a flight restriction indicated ininformation associated with the identity.
 19. The system of claim 15,wherein the processor is operable to route the bag for securityscreening based on an indication to perform the security screening thatis stored in information associated with the identity.
 20. The system ofclaim 19, wherein the processor is operable to transmit a notificationto delay the flight for performance of the security screening.