System and Method for Providing Checkpoint Background Checks

ABSTRACT

An improved method for providing checkpoint background checks is described herein. In one embodiment, the pass control method can comprise collecting data related to the identity of a visitor with a checkpoint computer, transferring the data to a pass control server, querying one or more member profiles using the data, and returning a message to the checkpoint computer. In this method, the member profiles can comprise identity information and one or more flags. The flags can be related to an outcome of a previously performed background check performed using the identity information. The message returned to the checkpoint computer can be related to the flags within any of the member profiles comprising identity information that matches the data.

BACKGROUND

This disclosure relates to a system and method for providing checkpointbackground checks.

Before being granted entry to a military installation, a person is oftensubjected to a background check. Guards posted at the entrance of nearlyevery military installation ensure the identifications of every person,military or non-military members, before granting access to thepremises. Many military installations can have hundreds to thousands ofvisitors a day. A background check on every visitor can be done onsitebefore allowing him or her to pass the premise. This can entail searchon the National Criminal Information Center (NCIC), Criminal JusticeInformation Services (CJIS), and/or Texas Criminal Information Center(TCIC), Federal Magistrate Courts, as well as other state and localwarrant databases, to ensure that each person entering has a clearbackground or does not have any criminal records. In addition tocriminal background information, additional sources, such as deserters,and blocked access databases can be searched. However, each individualsecurity check can take up to thirty seconds or more, significantlyslowing down traffic.

Another method used to identify individuals entering military vicinityis through a military ID. A standard military ID or Geneva ConventionsIdentification card issued by the United States Department of Defensecan serve as an identity document, which distinguishes an individual aspersonnel or a service member of the US Military. Moreover, dependentsof military personnel such as a child or a spouse can also hold amilitary ID. Even though a military ID can be presented and cansometimes be sufficient to enter a facility, there are times that otherbackground information may be needed and/or checked. However, a militaryID is not associated with other identification other than a militaryrelationship. As such, additional information may be needed to ensurethat a member is not prohibited from entering said vicinity. Thus, amilitary member and/or his dependents can also be subjected to thestandard background check, which is time-consuming, inefficient, andinconvenient.

Another method of controlling those entering a military installation isthrough government tags such as Department of Defense (DOD) decals,and/or passes. DOD decals are stickers attached to the windshields ofvehicles owned by military personnel, family members, or civilians whoworks on the military installation. It is a driving privilege consentedand issued by the DOD. A driver or an owner of vehicle with decals canbe identified as authorized personnel to enter a military installation.There are instances when driving privileges can be revoked; this canhappen once installation or facility regulations or laws are violated.In such scenario, decal and/or passes, as well as driving privileges canbe revoked or be suspended from any decal or pass holder. Thus, anyperson who is suspended from this privilege can be denied from drivingon the facility or installation. However, military installationrevocation records and/or systems can be a separate entity and are nottied into military's checkpoint systems. Thus, when such individual withrevoked privileges approaches a checkpoint at a military installation itmay not be readily accessible by guard personnel for verification oridentification.

As such, it would be useful to have an improved system and method forproviding checkpoint background checks.

SUMMARY

An improved method for providing checkpoint background checks isdescribed herein. In one embodiment, the pass control method cancomprise collecting data related to the identity of a visitor with acheckpoint computer, transferring the data to a pass control server,querying one or more member profiles using the data, and returning amessage to the checkpoint computer. In this method, the member profilescan comprise identity information and one or more flags. The flags canbe related to an outcome of a previously performed background checkperformed using the identity information. The message returned to thecheckpoint computer can be related to the flags within any of the memberprofiles comprising identity information that matches the data.

In another embodiment, the pass control method can comprise creating oneor more member profiles in a pass control memory on a pass controlserver, performing a first background check, and creating one or moreflags in the one or more member profiles. In this embodiment, the memberprofile can comprise identity information. The background check can beperformed using at least a portion of the identity information, and theflags are created in the member profiles that comprise the identityinformation related to the outcome of the background check.

Lastly, in one embodiment, a system can comprise a computer readablestorage medium having a computer readable program code embodied therein.The computer readable program code can be adapted to be executed toimplement the abovementioned methods.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1A illustrates an aerial view of a facility.

FIG. 1B illustrates a background check system.

FIG. 2A illustrates an embodiment of a checkpoint computer as a mobiledevice.

FIG. 2B illustrates an internal hardware within a checkpoint computer.

FIG. 3A illustrates a front view of an identification card.

FIG. 3B illustrates a back view of an identification card.

FIG. 4A illustrates a schematic diagram of a pass control server.

FIG. 4B illustrates a schematic diagram of a military citation recordserver.

FIG. 5A illustrates member profile further comprising identificationinformation, and flags.

FIG. 5B illustrates a military driver profile comprising personalidentification data, and driving record data.

FIG. 6 illustrates a method for creating member profile and initiallypopulating member profile.

FIG. 7A illustrates an exemplary method for providing pass control at acheckpoint.

FIG. 7B illustrates another exemplary method for providing pass controlat a checkpoint.

FIG. 8 illustrates exemplary identification card information.

FIG. 9 illustrates an exemplary method for enforcing drivingrestrictions on a military base.

DETAILED DESCRIPTION

An improved method for providing checkpoint background checks isdescribed herein. The following description is presented to enable anyperson skilled in the art to make and use the invention as claimed andis provided in the context of the particular examples discussed below,variations of which will be readily apparent to those skilled in theart. In the interest of clarity, not all features of an actualimplementation are described in this specification. It will beappreciated that in the development of any such actual implementation(as in any development project), design decisions must be made toachieve the designers' specific goals (e.g., compliance with system- andbusiness-related constraints), and that these goals will vary from oneimplementation to another. It will also be appreciated that suchdevelopment effort might be complex and time-consuming, but wouldnevertheless be a routine undertaking for those of ordinary skill in thefield of the appropriate art having the benefit of this disclosure.Accordingly, the claims appended hereto are not intended to be limitedby the disclosed embodiments, but are to be accorded their widest scopeconsistent with the principles and features disclosed herein.

FIG. 1A illustrates an aerial view of a facility 100 comprising one ormore checkpoints 101 strategically placed around secured area 102.Facility 100 can refer to any public or private installations designedto restrict unauthorized individuals from accessing, such as a militarybase, and/or a military installation. Secured area 102 can be the areawithin the border of facility 100. Secured area 102 can be the areaprotected and restricted by checkpoints 101. Checkpoints 101 can be astructure or an area within facility 100 that functions as an entrypoint into secured area 102. Vehicles and/or visitors can be subjectedto inspections and background check before passing through checkpoints101. For purposes of this disclosure, the term “visitor” can compriseany person at checkpoint 101 attempting to obtain a pass, permission, orqualification to enter secured area 102.

FIG. 1B illustrates a background check system comprising a plurality ofcheckpoint computers 103, one or more public record databases 104, apass control server 105, and a military citation record server 106connected via a network 107. Checkpoint computer 103 can include, but isnot limited to, a desktop, a laptop and/or a mobile device. Publicrecord data base 104 can be one or more databases connected on a network107 capable of storing files, and data information from differentgovernment office, agencies, National Criminal Information Center(NCIC), Criminal Justice Information Services (CJIS), the Department ofJustice (DOJ), and/or Texas Criminal Information Center (TCIC), as wellas other state and local warrant databases. Pass control server 105 canbe one or more device capable of performing computational task, andstoring data information. Pass control server 105 can provide andperform computational task across network 107. Military citation recordserver 106 can be one or more devices used to store citation and drivingrecord information on individuals that is accessible through network107. Citations can be issued to a service member or civilian for anyviolations of codes committed, such as talking on a cellular phone whiledriving, speeding or failing to stop at a stop sign. These citations canbe recorded, organized, and stored in military citation record server106. Network 107 can be a wide area network (WAN), or a combination oflocal area network (LAN), and/or piconets. Network 107 can behard-wired, wireless, or a combination of both. A LAN can be a networkwithin a single organization while WAN can be the Internet.

FIG. 2A illustrates an embodiment of checkpoint computer 103 as a mobiledevice. Mobile device can include, but is not limited to, a screen 201,a keypad 202, a card reader 203, and/or a fingerprint scanner 204. Otherinput devices can include track balls, joy sticks, or scroll wheels.Screen 201 can be a mere display output, or can also be a touch screen,allowing for capturing of identity information 208. Identity information208 can include a visitor's name, military rank, serial number, grade,military organization, military installation, address, and/or date ofbirth. Keypad 202 can comprise of a plurality of physical buttons onmobile device, however in an embodiment were screen 201 is a touchscreen, keypad 202 can be represented virtually on screen 201. Cardreader 203 can read information from an identification card. Anidentification card can encode information in various ways. Informationcan be printed on the information card. Also, information can be placedon the card in a machine-readable form. Such forms can include magneticstrip, barcode or even radio frequency identification (RFID) chip. Anidentification card can include, but is not limited to, a civilian ormilitary identification card, a passport, a school identification badgeor a credit card. In one embodiment, card reader 203 can read a magneticstrip on an identification card. In another embodiment, card reader 203can read information encoded in a barcode on an identification card. Inanother embodiment card reader 203 comprises a (RFID) chip receiver toread an RFID chip in an identification card. In one embodiment, mobiledevice can read information encoded in a digital fingerprint scannedfrom a fingerprint scanner 204. In another embodiment, card reader 203can read an integrated circuit card such as a Smart Card.

FIG. 2B illustrates internal hardware within checkpoint computer 103.Identity information 208 from screen 201, keypad 202 and/or card reader203 is sent to a checkpoint computer processor 205. Checkpoint processor205 can perform processes on the data according an application stored ina checkpoint memory 206, as discussed further below. Processes caninclude storing identity information 208 to checkpoint computer memory206, verifying identity information 208 conforms to preset standards orensuring all required data has been gathered for an information inquiryto be complete.

FIG. 3A illustrates a front view of an identification card 300comprising identity information. Identification card information can beidentity information 208, and can comprise an identification number,name, address, birthday, rank, serial number, driver license number,social security number, and/or any other information encoded onidentification card 300 whether written, magnetically encoded, orencoded by some other method in the art. ID can be military issued orcivilian issued.

FIG. 3B illustrates a back view of identification card 300 comprising amachine-readable zone 302. Any type of device such as a card reader canread machine-readable zone 302, which is capable of decoding andtranscribing identification card information from machine-readable zone302. Machine-readable zone 302 can be in any form such as a magneticstrip, barcode or RFID chip.

FIG. 4A illustrates a schematic diagram of a pass control server 105according to an embodiment of the present disclosure. Pass controlserver 105 can comprise a pass control processor 401, and a pass controlmemory 402 and a first local interface 403. First local interface 403can be a program that controls a display for the user, which can allowuser to view and/or interact with pass control server 105. Pass controlprocessor 401 can be a processing unit that performs sets ofinstructions stored within pass control memory 402. Pass control memory402 can comprise a pass control application 404, and a member profile405. Pass control application 404 can be a program providing logic forpass control server 105. Member profile 405 can be collections of dataaccessible through pass control application 404. Further, pass controlapplication 404 can perform functions such as adding, transferring, andretrieving information on member profile 405 using first local interface403.

Pass control server 105 includes at least one processor circuit, forexample, having pass control processor 401 and pass control memory 402,both of which are coupled to first local interface 403. To this end, thepass control server 105 can comprise, for example, at least one server,computer or like device. Local interface can comprise, for example, adata bus with an accompanying address/control bus or other bus structureas can be appreciated.

Stored in pass control memory 402 described herein above are both dataand several components that are executable by pass control processor401. In particular, stored in the pass control memory 402 and executableby pass control processor 401 are pass control application 404, andpotentially other applications. Also stored in pass control memory 402can be a member profile 405 and other data. In addition, an operatingsystem can be stored in pass control memory 402 and executable by passcontrol processor 401.

FIG. 4B illustrates a schematic diagram of a military citation recordserver 106 according to an embodiment of the present disclosure.Military citation record server 106 can comprise a military citationprocessor 406, a military citation memory 407, and a second localinterface 410. Second local interface 410 can be a program that controlsa display for the user, which can allow user to view and/or interactwith military citation record server 106. Military citation processor406 can be a processing unit that performs set of instructions storedwithin military citation memory 407. Military citation memory 407 cancomprise a military server application 408, and a military driverprofile 409. Military server application 408 can be a program providingbusiness logic for military citation record server 106. Military driverprofile 409 can be digital collections of data accessible throughmilitary server application 408. Further, military server application408 can perform functions such as transferring and retrievinginformation on military driver profile 409 using a second localinterface 410. In one embodiment, pass control server 105 and militarycitation record server 106 can be the same device or set of devices.

Military citation record server 106 includes at least one processorcircuit, for example, having military citation processor 406 and amilitary citation memory 407, both of which are coupled to a secondlocal interface 410. To this end, the military citation record server106 can comprise, for example, at least one server, computer or likedevice. Local interface can comprise, for example, a data bus with anaccompanying address/control bus or other bus structure as can beappreciated.

Stored in military citation memory 407 described herein above are bothdata and several components that are executable by military citationprocessor 406. In particular, stored in the military citation memory 407and executable by military citation processor 406 are military serverapplication 408, and potentially other applications. Also stored inmilitary citation memory 407 can be a military driver profile 409 andother data. In addition, an operating system can be stored in militarycitation memory 407 and executable by military citation processor 406.

It is understood that there can be other applications that are stored inpass control memory 402 and military citation memory 407 and areexecutable by pass control processor 401 and military citation processor406 as can be appreciated. Where any component discussed herein isimplemented in the form of software, any one of a number of programminglanguages can be employed such as, for example, C, C++, C#, Objective C,Java, Java Script, Perl, PHP, Visual Basic, Python, Ruby, Delphi, Flash,or other programming languages.

A number of software components can be stored in pass control memory 402and military citation memory 407, and can be executable by pass controlprocessor 401 and military citation processor 406. In this respect, theterm “executable” means a program file that is in a form that canultimately be run by pass control processor 401 and military citationprocessor 406. Examples of executable programs can be, for example, acompiled program that can be translated into machine code in a formatthat can be loaded into a random access portion of pass control memory402 and military citation memory 407, and run by pass control processor401 and military citation processor 406, source code that can beexpressed in proper format such as object code that is capable of beingloaded into a random access portion of pass control memory 402 andmilitary citation memory 407, and executed by pass control processor 401and military citation processor 406, or source code that can beinterpreted by another executable program to generate instructions in arandom access portion of pass control memory 402 and military citationmemory 407, to be executed by pass control processor 401 and militarycitation processor 406, etc. An executable program can be stored in anyportion or component of pass control memory 402 and military citationmemory 407 including, for example, random access memory (RAM), read-onlymemory (ROM), hard drive, solid-state drive, USB flash drive, memorycard, optical disc such as compact disc (CD) or digital versatile disc(DVD), floppy disk, magnetic tape, network attached/addressable storageor other memory components.

FIG. 5A illustrates member profile 405 further comprising, one or moreidentity information 208 such as identification card information, andflags 502. Identity information 208 within a profile can be a collectionof information data from a visitor. Flags 502 can comprise anotification that member can receive a pass to enter, can represent anallowance to enter by presence of no flags 502, or can comprise one ormore representations of holds that prevent a member from entering anarea. In such embodiment, flags 502 can be one or more references tocriminal records, warrants, or terrorist ties, found on public recorddatabases 104.

FIG. 5B illustrates a military driver profile 409. Military driverprofile 409 can comprise personal identification data 503 and drivingrecord data 504. Personal identification data 503 can comprise but arenot limited to, name, address, telephone number, and/or governmentissued ID numbers, either military, civilian, or both. Driving recorddata 504 can comprise past citations, adjudication records, and/orpenalties assessed, including suspensions, revocations, or cancellationsof installation driving privileges.

FIG. 6 illustrates a method for creating member profile 405 andinitially populating member profile 405. In a registration scenario, auser or an authorized data personnel can use checkpoint computer 103 togain access in pass control application 404. Once granted access,identity information can be stored in member profile 405. After memberprofile 405 is created, pass control application 404 can use thepersonal information stored, such as name, address, and/or ID numbers,from member profile 405 to query records within public record database104 and/or military citation record server 106 to find out if theregistered member has warrants, criminal record, driving revocation orterrorist watch-list status that would preclude their admission ordriving onto secured area 102. In one embodiment, the revocation cancomprise an expiration. Such expiration tells when the revocation is nolonger in effect. The result of the query can be stored in flags 502. Inanother embodiment, member profile 405 can be stored as either “Cleared”or “Denied”. Further, a regular, periodic, and/or random query by passcontrol application 404 can be made on member profile 405 ensuring thatdata and flags 502 are updated. Such periodic update, for example, canbe done daily, weekly or monthly.

FIG. 7A illustrates an exemplary method for providing pass control atcheckpoints 101. At checkpoints 101, the guards on duty can get anidentification card 300 or other identity information 208 from thevisitor. Using checkpoint computer 103, guard can gather identityinformation 208. In one embodiment, the guard can swipe theidentification card 300 with card reader 203 connected or otherwise apart of checkpoint computer 103. Information entered by the guard can besent as data from checkpoint computer 103, over network 107, to passcontrol server 105. Pass control application 404 can query memberprofiles 405 to determine if the visitor at checkpoint 101 has any flags502 that would preclude entry. If the query produces no flags 502, passcontrol server 105 can send a “clear” message to checkpoint computer103. If flags 502 are present, either pass control server 105 can send a“deny” message to checkpoint computer 103, and/or flags 502 can be sentto checkpoint computer 103. In a scenario wherein the visitor is not aregistered member with pass control application 404, the visitor can berequested to register.

FIG. 7B illustrates another exemplary method for providing pass controlat checkpoint 101. In such embodiment, the guard can swipeidentification card 300 with card reader 203 attached to checkpointcomputer 103 or otherwise collect identity information 208. Identityinformation 208 entered by the guard can be sent as data from checkpointcomputer 103, over network 107 to military citation record server 106.Military server application 408 can query military driver profiles 409to determine if the member at the gate has any driving record data 504that would preclude entry. If the query produces no such data, passcontrol server 105 can send a “clear” message to checkpoint computer103. If flags 502 are present that would preclude pass validation,either military citation record server 106 or pass control server 105can send a “deny” message to checkpoint computer 103, and/or flags 502can be sent to checkpoint computer 103.

FIG. 8 illustrates identification card information 800. In oneembodiment, identity information 208 within pass control memory 402 cancomprise military identification card information 801 and civilianidentification card information 802. For military personnel as well assome civilians, a military ID can be a standard identification card 300on a military installation. Since, military IDs typically containinformation not useful for a query of public records database 104,pairing it with civilian identification card information or otheridentity information can be useful. In such embodiment, a person with amilitary ID can approach a checkpoint 101 with only his military ID. Theguard can enter military ID information 801 into checkpoint computer103, and checkpoint computer 103 can send military ID information 801 topass control application 404. Pass control application 404 can locatemember profile 405 using military ID information 801 to find matchingcivilian ID information 802 and/or flags 502. In one embodiment, uponretrieving civilian ID information 802, pass control application 404 canrun another background check, and return the results to the guard.

FIG. 9 illustrates an exemplary method for enforcing drivingrestrictions on facility 100. Military driver profile 409 can containpersonal identification data 503 and driving record data 504 that caninclude records of military installation driving privilege revocation.In one embodiment, military server application 408 can periodically oras new data is available, transfer personal identification data 503 ofindividuals with driving restrictions to pass control server 105. When aperson approaches checkpoint 101 with an identification card 300, aquery based on information from identification card 300 provided will besent to pass control server 105, and compared against the data sent frommilitary citation record server 106. If a driving restriction orrevocation is found by pass control application 404, the person can berestricted from driving on the installation.

For purposes of this disclosure, pass control memory 402 and militarycitation memory 407 is defined herein as comprising volatile memory,nonvolatile memory, and/or data storage components. Volatile componentsare those that do not retain data values upon loss of power. Nonvolatilecomponents are those that retain data upon a loss of power. Thus, passcontrol memory 402 and military citation memory 407 can comprise, forexample, random access memory (RAM), read-only memory (ROM), hard diskdrives, solid-state drives, USB flash drives, memory cards accessed viaa memory card reader, floppy disks accessed via an associated floppydisk drive, optical discs accessed via an optical disc drive, magnetictapes accessed via an appropriate tape drive, networkattached/addressable storage, and/or other memory components, or acombination of any two or more of these memory components. In addition,the RAM can comprise, for example, static random access memory (SRAM),dynamic random access memory (DRAM), or magnetic random access memory(MRAM) and other such devices. The ROM can comprise, for example, aprogrammable read-only memory (PROM), an erasable programmable read-onlymemory (EPROM), an electrically erasable programmable read-only memory(EEPROM), or other like memory device.

Also, pass control processor 401 and military citation processor 406 canrepresent multiple pass control processor 401 and military citationprocessor 406, and pass control memory 402 and military citation memory407 can represent multiple pass control memory 402 and military citationmemory 407 that operate in parallel processing circuits, respectively.In such a case, first local interface 403 and second local interface 410can be an appropriate network, including network 107 that facilitatescommunication between any two of the multiple pass control processor 401and military citation processor 406, between any pass control processor401 and military citation processor 406, and any of the pass controlmemory 402 and military citation memory 407, or between any two of thepass control memory 402 and military citation memory 407, etc. Firstlocal interface 403 and second local interface 410 can compriseadditional systems designed to coordinate this communication, including,for example, performing load balancing. Pass control processor 401 andmilitary citation processor 406 can be of electrical or of some otheravailable construction.

Although pass control application 404 and military server application408, and other various systems described herein can be embodied insoftware or code executed by general purpose hardware as discussedabove, as an alternative the same can also be embodied in dedicatedhardware or a combination of software/general purpose hardware anddedicated hardware. If embodied in dedicated hardware, each can beimplemented as a circuit or state machine that employs any one of or acombination of a number of technologies. These technologies can include,but are not limited to, discrete logic circuits having logic gates forimplementing various logic functions upon an application of one or moredata signals, application specific integrated circuits havingappropriate logic gates, or other components, etc. Such technologies aregenerally well known by those skilled in the art and, consequently, arenot described in detail herein.

The flowcharts of FIG. 6, FIG. 7A, FIG. 7B, and FIG. 9 show thefunctionality and operation of an implementation of portions of passcontrol application 404 and military server application 408. If embodiedin software, each block can represent a module, segment, or portion ofcode that comprises program instructions to implement the specifiedlogical function(s). The program instructions can be embodied in theform of source code that comprises human-readable statements written ina programming language or machine code that comprises numericalinstructions recognizable by a suitable execution system such as passcontrol processor 401 and military citation processor 406 in a computersystem or other system. The machine code can be converted from thesource code, etc. If embodied in hardware, each block can represent acircuit or a number of interconnected circuits to implement thespecified logical function(s).

Although the flowcharts of FIG. 6, FIG. 7A, FIG. 7B, and FIG. 9 show aspecific order of execution, it is understood that the order ofexecution can differ from that which is depicted. For example, the orderof execution of two or more blocks can be scrambled relative to theorder shown. Also, two or more blocks shown in succession in FIG. 6,FIG. 7A, FIG. 7B, and FIG. 9 can be executed concurrently or withpartial concurrence. In addition, any number of counters, statevariables, warning semaphores, or messages might be added to the logicalflow described herein, for purposes of enhanced utility, accounting,performance measurement, or providing troubleshooting aids, etc. It isunderstood that all such variations are within the scope of the presentdisclosure.

Also, any logic or application described herein, including pass controlapplication 404 and military server application 408, that comprisessoftware or code can be embodied in any computer-readable storage mediumfor use by or in connection with an instruction execution system suchas, for example, pass control processor 401 and military citationprocessor 406 in a computer system or other system. In this sense, thelogic can comprise, for example, statements including instructions anddeclarations that can be fetched from the computer-readable storagemedium and executed by the instruction execution system.

In the context of the present disclosure, a “computer-readable storagemedium” can be any medium that can contain, store, or maintain the logicor application described herein for use by or in connection with theinstruction execution system. The computer-readable storage medium cancomprise any one of many physical media such as, for example,electronic, magnetic, optical, electromagnetic, infrared, orsemiconductor media. More specific examples of a suitablecomputer-readable storage medium would include, but are not limited to,magnetic tapes, magnetic floppy diskettes, magnetic hard drives, memorycards, solid-state drives, USB flash drives, or optical discs. Also, thecomputer-readable storage medium can be a random access memory (RAM)including, for example, static random access memory (SRAM) and dynamicrandom access memory (DRAM), or magnetic random access memory (MRAM). Inaddition, the computer-readable storage medium can be a read-only memory(ROM), a programmable read-only memory (PROM), an erasable programmableread-only memory (EPROM), an electrically erasable programmableread-only memory (EEPROM), or other type of memory device.

It should be emphasized that the above-described embodiments of thepresent disclosure are merely possible examples of implementations setforth for a clear understanding of the principles of the disclosure.Many variations and modifications can be made to the above-describedembodiment(s) without departing substantially from the spirit andprinciples of the disclosure. All such modifications and variations areintended to be included herein within the scope of this disclosure andprotected by the following claims.

Various changes in the details of the illustrated operational methodsare possible without departing from the scope of the following claims.Some embodiments may combine the activities described herein as beingseparate steps. Similarly, one or more of the described steps may beomitted, depending upon the specific operational environment the methodis being implemented in. It is to be understood that the abovedescription is intended to be illustrative, and not restrictive. Forexample, the above-described embodiments may be used in combination witheach other. Many other embodiments will be apparent to those of skill inthe art upon reviewing the above description. The scope of the inventionshould, therefore, be determined with reference to the appended claims,along with the full scope of equivalents to which such claims areentitled. In the appended claims, the terms “including” and “in which”are used as the plain-English equivalents of the respective terms“comprising” and “wherein.”

1. A pass control method comprising collecting data related to theidentity of a visitor with a checkpoint computer; transferring said datato a pass control server; querying one or more member profiles usingsaid data, each of said member profiles comprising identity informationand one or more flags, said flags related to an outcome of a previouslyperformed background check performed using said identity information;and returning a message to said checkpoint computer related to saidflags within any of said member profiles that comprises said identityinformation that matches said data.
 2. The method of claim 1 furthercomprising the step validating a pass into a facility based on saidflags sent to said local checkpoint computer.
 3. The method of claim 2wherein said facility is a military installation.
 4. The method of claim1 wherein said data collected is entered by keying-in said data on saidcheckpoint computer
 5. The method of claim 1 wherein said data iscollected from an identification card using a card reader.
 6. The methodof claim 1 wherein said previously performed background check,determines one or more matching query results from one or more publicrecord databases and said identity information.
 7. The method of claim 6wherein said identity information comprises information from a driver'slicense.
 8. The method of claim 6 wherein said identity informationcomprises information from a social security card.
 9. The method ofclaim 6 wherein said identity information comprises information from apassport.
 10. The method of claim 6 wherein said identity cardinformation comprises information from a military identification card.11. The method of claim 6 wherein said public record databases comprisesthe National Criminal Information Center database.
 12. The method ofclaim 6 wherein said public record databases comprises the CriminalJustice Information Services database.
 13. The method of claim 6 whereinsaid public record databases comprise state warrant databases and localwarrant databases.
 14. The method of claim 1 wherein said outcome aresaid matching query results from a military citation record server andsaid identity information.
 15. The method of claim 14 wherein saidmilitary citation record server comprises a military citation anddriving record information.
 16. The method of claim 1 wherein saidbackground check comprises checking for outstanding warrants.
 17. Themethod of claim 1 wherein said background check comprises checking forknown terrorists and suspected terrorists.
 18. The method of claim 1wherein said background check comprises checking for suspensions andcancellations of installation driving privileges.
 19. A pass controlmethod comprising creating one or more member profiles in a pass controlmemory on a pass control server, said member profile comprising identityinformation; performing a first background check using at least aportion of said identity information; creating one or more flags in saidmember profile that comprises said identity information related to theoutcome of said first background check.
 20. The method of claim 19further comprising performing a second background check after a periodof time; and updating said one or more flags based on the result of saidsecond background check
 21. A computer readable storage medium having acomputer readable program code embodied therein, wherein the computerreadable program code is adapted to be executed to implement the methodof claim 1.