Electronic bag locking and unlocking

ABSTRACT

A bag unlocking method includes receiving, by a bag handling system, a bag during a check-in process. The bag handling system identifies, from a travel carrier system, traveler information corresponding to the bag. A securing device of the bag is programmed, using an unlock code pertaining to the traveler information. The bag handling system reads a bag tag of the bag at a baggage inspection station and determines the unlock code pertaining to the bag tag. The bag handling system transmits the unlock code to cause the securing device to unlock at the baggage inspection station.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation of U.S. non-provisional applicationSer. No. 17/479,766 entitled “Electronic Bag Locking and Unlocking,”filed Sep. 20, 2021; which is a continuation of U.S. non-provisionalapplication Ser. No. 17/182,870 entitled “Electronic Baggage Locks,”filed Feb. 23, 2021; which claims the benefit of U.S. ProvisionalApplication No. 62/981,285 entitled “Electronic Baggage Locks,” filed onFeb. 25, 2020; and U.S. Provisional Application No. 63/051,138 entitled“Electronic Baggage Locks,” filed on Jul. 13, 2020; the disclosures ofall of which are incorporated herein by reference in their entireties.

STATEMENT OF GOVERNMENT INTEREST

The present invention was made by one or more employees of the UnitedStates Department of Homeland Security in the performance of officialduties.

FIELD

The discussion below relates generally to methods of improving airlineluggage inspection, particularly the methods of increasing security anddecreasing intrusiveness of such inspections.

BACKGROUND

Since the terrorist attacks of Sep. 11, 2001, the TransportationSecurity Administration (TSA), a division of the United StatesDepartment of Homeland Security (DHS), has increased the security atUnited States airports. This increased security includes the screeningof traveler luggage for suspicious or illegal contents. Prior to Jan. 1,2003, the TSA announced that if a piece of traveler luggage selected foradditional screening was locked, the lock would be broken to allowaccess. The TSA encouraged travelers to leave their baggage unlocked forinspection.

Following this announcement, traveler claims of damaged or lostbelongings increased and the sale of luggage locks decreased. U.S. Pat.No. 7,021,537 (537 Patent) was granted for a method of improving airlineluggage inspection. This method involved the use of combination lockswith a master key lock portion and an identification structure thatallows TSA screeners to identify the lock as having a master key lockportion, which uses a supplied master key to unlock the lock. A secondpatent, U.S. Pat. No. 7,036,728 (728 Patent) uses dial combination locksto accomplish the same method. The locks are generally referred to as“dual function”—meaning they have at least two (2) ways of being opened.The first being by a key or combination associated with the lock, andthe second being through a master key. To avoid bag damage and claims,TSA agents can recognize that a given bag uses a type of lock compatiblewith a master key (by trademark or other lock indicia visible to the TSAagents), then identify the code indicated on the lock, and use themaster key corresponding to that code.

Since the introduction of these dual function locks it is estimated thatover 800 million dual-function locks are in the market. While the systemis effective at providing peace of mind to the travelers who wish topurchase locks, the locks themselves do not offer significantlyincreased security of luggage because master keys have been lost orbroken, so that the locks are forcibly removed by TSA screeners.Additionally, the master keys have been duplicated illicitly, soindividuals are able to gain unauthorized access.

Despite the ongoing security issues, luggage lock technologies continueto use the master key lock portion to permit TSA access even as thelocks themselves become more advanced. Currently, locks exist that allowthe traveler to lock and unlock using Bluetooth or other short-rangewireless technology while utilizing the master key lock portion. Thereare administrative difficulties handling the various aspects of usingmaster keys, e.g., there are not existing TSA procedures about how tohandle adding or removing master keys, or determining when there are toomany master keys, etc., posing cumbersome challenges for systems tomanage physical keys and deal with existing locks in circulation. Theexisting system that relies on a small number of physical master keysshared among multiple travelers verges on the impractical, becausephysical master keys may be lost, damaged, or duplicated.

SUMMARY

The detailed description below discloses approaches that may amelioratethe foregoing issues associated with physical master keys or locks, andthe procedures involved in managing luggage based on such mechanicallocks. Embodiments described herein relate to bag locks (also referredto as securing features or securing devices) that are programmable withunlock codes. In an embodiment, a traveler may provide, to thecommercial entity (travel carrier) that will transport the bag, at leastone unlock code for the bag. In another embodiment, the traveler maypresent a digital identity (DI) or credential, such as a mobile driver'slicense (mDL) or similar identifier as managed by a travel carrier, andthe unlock code is associated with or derived from the DI, e.g., throughthe use of a token. The traveler may present the DI when booking travelreservations, and the carrier's reservation system may retrieve datafrom the DI to automatically populate the booking reservation to avoiddata entry or other errors. The traveler also my present the DI toperform identity verification at a travel venue security checkpoint, orto perform manual verification or automated verification associated withbag drop or bag pickup (e.g., to verify the identity of the traveler whois dropping off or picking up a bag).

The unlock code enables the bag owner to enjoy additional security byallowing the use of customized or unique unlock codes that arepotentially specific to the traveler's bag or its securing device. Lockcodes may have an additional temporal limitation. The traveler providinga custom code to the carrier is an option. In another embodiment,securing devices use unlock codes corresponding to standardized codes ornumbers, such as frequent flyer numbers (or other carrier-assignedtraveler numbers) used by carriers for their corresponding respectivetravelers. Other embodiments enable the travel carrier to receive acustom unlock code from the traveler or prompt the traveler to use adefault standardized unlock code (e.g., based on a traveler identifieretc. specific to the traveler). An aspect of the embodiments includesthe traveler providing bag unlock codes as part of the travelreservation process. The unlock codes can automatically expire or thetraveler can reprogram the unlock codes for each flight or reservation.Another embodiment includes the carrier system generating a bag unlockcode for a given bag or bags (e.g., as derived from the DI or as newlygenerated if consented to by the traveler), and the system generates atime-limited bag unlock code that expires after the bags undergoinspection. In an embodiment, the unlock code to which the travelcarrier is privy becomes useless and no longer able to unlock the bagafter time passes corresponding to an expected duration for inspectionto take place for a given baggage handling procedure. In anotherembodiment, the unlock code expires after the bags proceed beyond apoint in a given bag handling system corresponding to where luggagewould possibly be diverted for inspection. Such limits can beimplemented by including a time-limit feature in the securing device(for one or multiple unlock codes), by causing the system to reprogramthe bag upon completion of bag inspection, or by using other approachesas described herein. These features enhance security, by trusting thecarriers with temporary keys that last, e.g., on the order of minutes(commensurate with a time from bag drop-off to bag inspection where thebag unlock code might be used to open the bag for inspection), then thecode stops working and is unable to be used to unlock the bag.

The unlock code may be tied to a travel reservation (the travelreservation is associated with, also referred to as being tied to, areservation code, which is standardized in travel industry. Thereservation code is specific to a given travel reservation). Thatreservation code serves as the traveler identifier for a flight. Theluggage identifier, tying a bag to a traveler, is also tied to thereservation code. A trip reservation (profile) is associated to the bagor bags. In an embodiment, the travel carrier generates a bag tag withinformation tying the bag tag to a given traveler reservation. Thetravel carrier attaches the bag tag to the bag. In another embodimentthe bag is integrated with a programmable electronic bag tag. In yetanother embodiment, the securing device includes a programmableelectronic bag tag.

Embodiments described herein enhance efficiencies for travel carriers,because the embodiments easily integrate with existing travel carriersystems and processes of check-in, bag tracking, and bag tagging. Thebag tag can be paper with a printed barcode, a printed QR-code, a radiofrequency identification (RFID) tag (whether programmable ornon-programmable), or other technologies to encode traveler information(and unlock code or codes). The embodiments described herein may beadapted for use with existing air-, land-, or sea-based travel carrierinfrastructures using existing components such as scanners (alsoreferred to herein as readers) and transmitters. Most carrier automatedbag or cargo routing systems (bag handling systems) already use scannersand or readers to transmit data to track and route bags. Embodiments canbe integrated into this existing mechanical infrastructure to providegreater security to the bag as it is routed to its destination.

Another aspect of the described embodiments includes using existing bagtags, e.g., by performing a lookup on the existing traveler informationprinted on bag tags, to retrieve an unlock code for a bag. Embodimentsprovide enhancements throughout the bag handling process, which can beused during travel reservation (traveler provides the bag unlock codealong with other traveler information provided when bookingreservations), during check-in or bag drop, such as at a bag at counteror kiosk (traveler confirms that travel carrier has the right bag unlockcode), and when applying the bag tag to the bag (travel carrier encodesthe unlock code into the bag tag, or verifies the travel carrier backend system stores online a bag unlock code corresponding to tokeninformation encoded in the bag tag). The check-in process includes a bagdrop, the last point before a bag tag is created and the traveler isseparated from their bag.

As used herein, the term “bag” is not limited to the traveler baggage ofa commercial carrier, and may be any container capable of containinggoods that is secured by a securing device (also referred to as asecuring feature or “bag lock”) that may be unlocked electronically. Theterm “travel carrier system” includes systems for operation of a travelcarrier, such as a reservation system, a bag handling system, a back endsystem, online website systems, smartphone application (app) systems,and the like. A QR code (abbreviated from Quick Response code) is thetrademark for a type of matrix barcode (or two-dimensional barcode). Abarcode is a machine-readable optical label that contains informationabout the item to which it is attached. In practice, QR codes oftencontain data for a locator, identifier, or tracker. Embodiments aredescribed in a luggage-handling context, and the principles of thisdisclosure apply to other situations and environments. Furthermore, theaspects of the embodiments are not limited to airlines and areapplicable to other systems that have reservations, bag drops, orunlockable bags for inspections. Embodiments are applicable totransportation systems such as trains, ships or cruises, or anythingwith valet service for lockable luggage with a bag tag identifying thecustomer, or which provide an individual trip ID for an individual trip.Accordingly, systems can be implemented so that inspection authoritiesare prevented from having free access to the bag contents, by using a‘master’ unlock code that is just temporary (expires) and will notunlock other peoples' bags. Embodiments thereby enable a “master lock”that is custom-tailored on a per-bag basis. The described embodimentsinclude expiration or valid time limits on the functionality of unlockcodes provided to the travel carrier or other entities that will handlebags. The bag unlock codes can be matched to identifying features of aparticular trip or reservation, and the bag unlock code also can bechanged, e.g., by the traveler using a smartphone app on theirsmartphone. In an embodiment, the traveler presents a digital identityto the travel carrier, and the travel carrier generates a token, hash,or other identifier for locking or unlocking the bag. In anotherembodiment, the traveler presents the digital identity to a smartphoneapp, which generates the token, hash, or other identifier for locking orunlocking the bag. Such approaches can be used at the time of makingtravel reservations or at the time of bag drop to obtain the unlockcode, instead of creating a random or traveler-generated number orunlock code. Thus, the traveler's identity will be used to lock orunlock the bag, and can also be used to ensure safe drop off and pick upof the bag. Such approaches provide security, because the token ismatched to the identity of the traveler who corresponds to the bag,e.g., based on their identity as the traveler checking in for the flightreservation made under their identity. Additionally, the identity isobfuscated through use of a token, hash, or equivalent, so it is notnecessary to reveal the actual mobile driver's license, digitalidentity, or identity information when performing the locking orunlocking. Rather, the token, hash, or equivalent is provided or matchedin order to lock, unlock, drop off, or pick up.

The detailed description below elaborates on the foregoing, non-limitingembodiments, and on other embodiments not mentioned in this summary.Other features and aspects of the embodiments will become apparent tothose of ordinary skill in the art from the following detaileddescription, which discloses, in conjunction with the accompanyingdrawings, examples that explain the features in accordance withembodiments. This summary is not intended to identify key or essentialfeatures, nor is it intended to limit the scope of the invention, whichis defined solely by the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The attached drawings help explain the embodiments described below.

FIG. 1 illustrates a securing device according to an embodiment.

FIG. 2 illustrates a securing device system according to an embodiment.

FIG. 3 illustrates a bag handling system according to an embodiment.

FIG. 4 illustrates a bag unlock method of unlocking a securing deviceaccording to an embodiment.

FIG. 5 illustrates a bag conveyance method of conveying a bag into abaggage inspection station unlocked according to an embodiment.

FIG. 6 illustrates a computing system including logic according to anembodiment.

DETAILED DESCRIPTION

Embodiments described herein present a method of making airline luggageinspection secure while accommodating travelers. Securing device (alsoreferred to as a securing feature or “bag lock”) embodiments may have asecuring feature controlled by wireless communication such as Bluetooth,near frequency communication (NFC), RFID, Wi-Fi, or other near-rangewireless communication protocol. Securing device embodiments may beunlocked through an unlock code (which the traveler conveys to theairline, or which is derived from traveler identity and assigned to thetraveler), and which subsequently may be encrypted and affixed to theluggage (e.g., as a bag tag) when the traveler checks the luggage withthe airline for a flight.

In an embodiment, an airline travel carrier electronically obtains thenon-physical unlock code associated with the traveler for the securingdevice during the flight registration process, e.g., obtained from thetraveler specifying an unlock code, or obtained from a token serving asthe unlock code, which was associated with or derived from a digitalidentification used by the traveler registering for the flight. Inanother embodiment, a reservation system of the travel carrierassociates a unique token or unlock code with the traveler's digitalidentification, and uses the traveler's digital identification toretrieve the token or unlock code for use in programming, locking, orunlocking the securing device. The travel carrier then associates theunlock code with the rest of the traveler's identifying information. Inan embodiment, the traveler uses their digital identity to populatefields of the carrier's travel reservation system, e.g., by swipingtheir phone or reading (also referred to herein as scanning) a QR codeusing the phone or an app in the digital identity infrastructuresupported by the phone. Therefore, travel carrier uses the traveler'sidentity to generate the lock or unlock code encoded to the bag tag orbag identifier. The travel carrier has access to that traveler'sidentity, because that identity will have been used to populate theinitial travel reservation perhaps months prior to travel time. When thetraveler arrives at the bag drop, the traveler presents the sameidentity to drop off the bag, which is encoded with that token-basedunlock code. Accordingly, there is no risk of a traveler forgetting anunlock code, or changing an unlock code, between the time of making atravel reservation and the time of dropping off the bag. Embodimentsalso allow the traveler to present their digital identity at check in(e.g., by swiping or presenting a smartphone running a digital identityapplication or system). The travel carrier's check in system canautomatically generate a bag unlock code based on the presented digitalidentity, at the time of such an automated or carrier-unattended bagdrop. Such an automated system does not need information input from thetraveler, other than by swiping or otherwise presenting their digitalidentity to lock the securing device of their bag, and then again tounlock the securing device.

In an embodiment, a liveness check is performed when the traveler picksup the bag, to ensure the traveler physically presenting the digitalidentity is the person actually depicted in the digital identity. Aliveness check is a biometric scan or other verification (e.g., by anattendant physically looking at the traveler and the digital identity),to determine whether the traveler presenting a digital identity matchesthat digital identity. In an embodiment, such liveness checking ismarketed as an upscale or high-end feature, well-suited for expensivebags whose owners desire a secured bag pick up where bag owners areverified before being allowed to pick up a bag. In an embodiment, theact of allowing a traveler to pick up a bag is verified independently ofthe unlocking of the bag.

In another embodiment, a liveness check is not performed at back pickup. The traveler drops off a bag, and the travel carrier's systemidentifies that traveler by trusting that the traveler matches thedigital identity associated with the bag, without performing a livenesscheck (by virtue of the traveler being in possession of the bag andtherefore presumed to have rightful access to that bag). The travelcarrier's system issues to the traveler, or otherwise associates to thetraveler's digital identity, a token or similar that the traveler canpresent to later open the bag. Such a token can be the same as thetoken, hash, or other indication that is used when the traveler madetravel reservations using their digital identity. In another embodiment,the carrier's system can generate a secondary token for the travelerwhen dropping off the bag, which is used by the traveler to reclaim thebag at back pickup, by the carrier's system performing an electronicmatch with the secondary token. The electronic match of the tokenthereby verifies that the traveler presenting the token matches thetraveler who dropped off the bag, without performing a liveness check onthe traveler. The carrier's system can associate the token with thetraveler's digital identity at drop off, and match the token on the bagwhen the traveler picks up the bag. Such approaches also can be used inautomated verification at bag drop off or pick up. The travel carriermay perform automated verification through checks with the carrier'sbackend systems, which direct automated lockers, cages, or otherprotections to securely receive and release the bag after automaticallymatching or verifying the traveler (e.g., by swiping a smartphone topresent digital identity information or tokens for matching).

When the traveler checks bags with the travel carrier, the identifyinginformation is placed on the luggage, through a bag tag using visual orelectronic coding (e.g., RFID). In an embodiment the unlock code isencrypted before the lock secures the bag. During bag screening, the TSAscreener would use a scanner to read or obtain the encrypted unlockcode, and transmit it to the securing device, unlocking the securingdevice. After inspecting the luggage, the TSA screener would re-lock thesecuring device. In an alternate embodiment, the securing deviceincludes electronics and mechanisms that enable the TSA screener toleave the bag unlocked, and the bag handling system retrieves, scans orreads, and directs the securing device to automatically lock itself.

The securing device embodiments enable manufacturers of the lock or themanufacturers of the bag scanners (whichever is applicable) to supplythe TSA with access to a scanning or reading device. The scanning deviceis capable of decrypting the encrypted unlock code from the bag tag orRFID on the traveler's luggage, and transmitting that unlock code to thesecuring device. As described in further detail below, such unlocking byscanning device enables the TSA screener to open the bag while notdamaging the securing device or the bag. TSA has “access” to thescanning device, which includes having access to any appropriate numberof such scanning devices by its workers or by any appropriate divisionor part of the TSA.

Security processes may or may not select a bag for additional screening.In an embodiment, if a given bag with a securing device or securingfeature is selected for additional screening, the encrypted unlock codeis identified by a scanning device and the unlock code is transmitted tothe securing device or securing feature by a transmitting device. Thetransmitting device may be the same scanning device. Such transmittinginduces the securing feature to unlock itself. In other embodiments thescanning device and transmitting device may be embodied within thefunctionality of one apparatus.

A securing device embodiment is designed to be applied to one piece ofairline-traveler luggage, and have indicia thereon conveying totravelers that the securing device, adapted to store customized unlockcodes, may be non-destructively opened. Such indicia may convey to theexamining authority (e.g., TSA) that the securing device is capable ofbeing unlocked pursuant to input received from a wireless transmittingdevice or scanning device. By providing the inspection entity access tothe scanning device, the TSA screeners no longer break locks to inspectluggage; the screeners are trained to use the scanning device to openlocks affixed with the indicia. The identified process may also beundertaken by representatives of the travel carrier or Airport Authoritywho are authorized to unlock the locking mechanism of the bag before thebag is provided to the inspection authority (e.g., TSA) to open forinspection of contents.

In an embodiment, a method described herein includes making available totravelers a securing device designed to be applied to an individualpiece of bag (e.g., airline luggage). The securing device has a securingfeature controlled by a non-physical key, i.e. a wireless interaction(Bluetooth, phone application, etc.). The traveler conveys to the travelcarrier the unlock code (or the traveler conveys a digital identity fromwhich the travel carrier derives the unlock code), which can beassociated with the traveler and even to individual bags of thetraveler. In an embodiment, the unlock code is encrypted and affixed orassociated to the bag when the traveler checks the bag with the travelcarrier for travel. The securing device also has indicia thereonconveying to the luggage purchasers and to the TSA that the securingdevice is one such that the TSA will have access to the contents thereinand does not need to break the locking mechanism in order to obtainaccess to the contents therein. The indicia can state, in an embodiment,that the securing device is “recognized” or “accepted” by the TSA. Inaddition to making the securing device with unlock code associated withthe traveler more valuable to prospective luggage or lock purchasers,such indicia also inform the TSA screeners that the securing device canbe opened using the encrypted unlock code and is a type of lock that theTSA does not need to forcibly remove.

Embodiments described herein also include providing the TSA with accessto the scanning device. In an embodiment, the access is limited to theTSA, and may include the manufacturer, the provider of the securingdevice to the travelers, and the manufacturer or provider of thescanning device to the TSA. It is anticipated that the manufacturer ofthe securing device will also provide the scanning device, and otherpossibilities also are contemplated by the present embodiments. TSA“access” to the scanning device includes having access to anyappropriate number of such scanning devices by its workers or by anyappropriate division of part of the TSA.

Although methods of improving the inspection of travel bags aredescribed, the methods also make use of apparatuses or systems. Anembodiment of such an apparatus is a securing device. Such a system is abaggage handling system that enables bags to be automatically unlockedfor inspection. These securing devices and baggage handling systems areillustrated by reference to the accompanying drawings. Consequently, thesecuring devices and systems are used in conjunction with the variousmethods described herein.

Electronic, e.g., non-physically controlled, securing devices withunlock codes associated with the traveler have certain advantages overphysical locks with physical keys. First, there is no physical key tolose or damage, which minimizes stress for the traveler and eliminatestime wasted searching for the key. If the bag is to be opened on shortnotice, the retrieval of the key is an inconvenience, as is the recallof the physical passcode (e.g., for a physical combination lock). Atraveler is far more likely to have immediate access to their phone orelectronically available unlock code (stored on the phone or accessibleon a remote server), in contrast to searching for a physical copy of akey or attempting to remember a combination for a physical combinationlock. Hence, improvements to bag screening at airports provideconvenience for travelers, travel carriers, and bag inspectors such asthose employed by the TSA.

Embodiments achieve numerous objectives and provide numerous advantages,such as:

(1) providing a method of screening bags at airports that avoidsforcible opening of the lock or the bag;

(2) providing a method of screening bags at airports that employssecuring devices that remain viable after being subjected to airport bagscreening and inspection;

(3) providing a method of non-intrusively searching travelers' bags atairports;

(4) providing a bag screening method that does not use a physical masterkey that may be duplicated, lost, or broken;

(5) providing a bag screening method that uses a non-physical andspecific unlock code selected and supplied by the traveler to theairline;

(6) providing a bag screening method at airports that eliminates apotential security threat of tampering with broken-into bags or bagswith broken locks;

(7) providing a method of bag screening that reduces the costs of theTSA;

(8) providing a bag screening method that eliminates the use of lockclippers;

(9) providing a bag screening method that reduces injuries to TSAscreeners that may arise from breaking locks;

(10) providing an improved method of bag screening at airports withminor new training;

(11) providing a method of airport bag screening that reduces theliability to the TSA;

(12) providing an improved method of bag screening that would notinterfere with current policies of the TSA, namely that allows the TSAto break securing devices if they do not display the indicia conveyingthat they are “TSA recognized” or “TSA accepted;”

(13) providing a bag screening method that decreases the labor of TSAscreeners and enables opening the securing device of the presentembodiments with less manual labor than breaking locks;

(14) providing a method of bag screening that provides a publicrelations benefit to the TSA and the airline in that travelers willappreciate the TSA and airline's concern for their personal property;

(15) providing a method of airport bag screening that allows the TSA toscreen bags more efficiently;

(16) providing a method of airport bag screening that allows a thoroughsearch of the traveler's bags while simultaneously providing a lessintrusive and more convenient search to the traveler;

(17) providing a method of screening bags at airports that eliminatesthe danger of tampering with bags that have been broken into subsequentto the screening process;

(18) providing a method that eliminates breaking into the bag in amanner not involving its lock;

(19) creating a convenience for the controller of the bag handlingsystem by way of electronic or digital technology to select suspect bagsfor TSA inspection;

(20) creating efficiencies for rerouting suspect bags for TSAinspection; and

(21) creating efficiencies for suspect bags rerouted to TSA inspectionby transmitting unlock codes associated with the traveler that unlocksthe bags, readying them for TSA inspection.

FIG. 1 illustrates a securing device 10 according to an embodiment. Thesecuring device includes a processor 100, communication unit 110,mechanisms 120, power source 140, and memory 130. The Processor 100 isassociated with programming logic 150, unlocking logic 160, and trackinglogic 170. The memory 130 is associated with unlock code or codes, and aprogrammable bag tag 44 (optional). The power source 140 may be abattery or wireless antenna energized by an external scanning device.

The processor 100 enables the securing device 10 to operate with varioustypes of logic or programming and manipulate the contents of memory 130.Communication unit 110 enables the securing device 10 to interact withexternal systems, such as a travel carrier system or a traveler's smartphone, to receive updated logic or unlock codes 12.

The programming logic 150 enables the securing device 10 to beprogrammed with various unlock codes 12, enabling the securing device 10to be responsive to new and updated unlock codes 12 according to how thesecuring device 10 happens to be programmed. In an embodiment, a travelcarrier has a transmitter that wirelessly programs the securing device10, via the programming logic 150, to accept an unlock code 12. Inanother embodiment, a traveler carries a smartphone running an app thatwirelessly communicates with the securing device 10 and, via programminglogic 150, programs unlock codes 12 into the securing device 10. Suchunlock codes 12 are stored in memory 130.

The unlocking logic 160 is operable to unlock the securing device 10 inresponse to receiving an acceptable unlock code 12. In an embodiment,the unlocking logic 160 compares a received unlock code to an existing(e.g., pre-programmed) unlock code 12 stored in memory 130. Upondetecting a match, the unlocking logic 160 directs the mechanisms 120 tomechanically unlock the securing device 10.

The tracking logic 170 keeps track of the passage of time and the usageof unlock codes 12, including when unlock codes 12 are programmed intothe securing device 10, when candidate unlock codes 12 are transmittedat the securing device 10, and when a matching unlock code 12 is used inthe securing device 10. Such logic enables the securing device 10 to usetemporary unlock codes 12 that expire, such as with the passage of time,or when the unlock code 12 is used one or more times corresponding to aone-time unlocking or a multi-use limited unlock code 12.

The securing device 10 provides functionality that enables variousmethods. The securing device 10 is available for use by travelers assecuring device 10 designed to be applied to an individual piece ofairline luggage (to a “bag”). In an embodiment, the securing device 10has a securing feature (mechanisms 120) controlled by two or moreimplementations. The securing feature, provided by mechanisms 120, iscapable of being unsecured (“unlocked”) through an unlocking mechanismassigned to the securing device 10, by the manufacturer or by the ownerof the lock (e.g., the traveler). The unlocking mechanism may bephysical or non-physical (e.g., electronic). The non-physical mechanismcomprises transmission of the unlock code 12 (an electronic combination,token, or code) through wireless implementations such as Bluetooth, useof a phone app or application, radio frequency identification (RFID),near frequency communication, or other wireless technology. Suchcommunication is received by the communication unit 110 and interpretedby the various logic of the processor 100 to cause the securing deviceor mechanisms 120 to unlock the securing device.

In an embodiment, the securing device 10 includes a physical mechanism,among mechanisms 120, that unlocks the securing device 10 through directphysical interaction with a physical key or physical combination. Theadditional locking device, electronic or physical in nature (by key orcombination), may be incorporated as a secondary lock in the describedlocking device or as a second locking or securing feature associatedwith a bag. In this way, the embodiment may be coupled with a method ofunlocking the securing feature by physical key or application ofcombination to unlock the securing device or feature of the bag.

In an embodiment, the unlock code or codes specific to the bag that islocked (i.e., traveler-secured baggage) with the securing device 10 areconveyed by the traveler to the carrier and subsequently matched oraffixed to the bag (e.g., via a bag tag) when the traveler deposits thebag (e.g., at bag drop) for conveyance to its destination. The travelcarrier 20 is then able to use the unlock code 12 to unlock the securingdevice 10 of the bag when or if the bag is opened for inspection. Inanother embodiment, the traveler produces a digital identity to thecarrier, and the carrier derives the unlock code or codes from thedigital identity of the traveler. The unlock codes may be derived basedon a token, hash, or equivalent derivation that obfuscates the originaldigital identity. The travel carrier 20 matches or affixes the unlockcode or codes to the bag via a bag tag or other programming technique.

The traveler uses mobile device 4, which runs a smartphone app 24. Thesmartphone app 24 allows the traveler to program the securing device 10with an unlock code or codes. In an embodiment, the traveler purchases asecuring device 10, and initially programs the securing device 10 withthe traveler's chosen unlock code. The securing device 10 is thenresponsive to unlocking itself when provided with the programmedtraveler's chosen unlock code. The traveler also configures the securingdevice 10 with another unlock code 12 intended for use by the travelcarrier 20 when unlocking a checked bag (e.g., a bag already droppedoff) that is to be inspected. Such an unlock code 12 can expire after aset time following bag drop, or can serve as a one-time use which causesthe unlock code 12 to become disabled once the bag is unlocked forinspection (in which case, the remaining traveler's chosen unlock coderemains to unlock the bag). In another embodiment, the traveler uses themobile device 4 to generate a token, hash, or equivalent, based on thetraveler's digital identity that is provisioned on the mobile device 4.The traveler then uses the mobile device 4 to program the securingdevice 10 using the token etc. as the unlock code or codes.

An embodiment of the securing device 10 is designed as a securing devicewith a securing feature controlled by a non-physical approach to programlock or unlock codes associated with the traveler, and provide theunlock codes 12, directly or indirectly, to travelers. The securingdevice 10 can include indicia to convey that the lock is “recognized” or“accepted” by the TSA, as a type of lock the TSA screeners will notbreak if additional bag screening is to be performed. The indicia arerecognizable by the TSA screeners, so they are also aware to take noticeof the securing device and employ use of a corresponding scanning deviceor scanner capable of communicating with the communication unit 110 ofthe securing device 10 to unlock the securing device 10. The term“indicia” is a broad term and can include the appearance of the securingdevice 10 itself (or the securing device having separate indiciaassociated therewith). The indicia, in an embodiment, is a distinctive(and in an embodiment, a suitably conspicuous) physical characteristicsuch as shape, color, design, texture, weight, or other characteristicsthat makes the indicia or securing device 10 instantly recognizable byindividuals working for the bag screening authority who are specificallytrained to recognize such characteristics. Alternatively, a distinctivechemical or electronic characteristic can serve as indicia, includingany distinctive characteristic that can be instantly recognized bypersons looking for such indicia.

Like a mechanical combination lock, the securing device 10 can beelectronic and programmed to accept at least one unlock code 12, and inan embodiment, at least two unlock codes 12. A first unlock code 12 isfor use by the bag owner, and the second unlock code 12 is for use bythe entity (such as a travel carrier) to unlock the securing device 10to allow bag inspection when the bag is away from the owner. Thesecuring device 10 also is capable of being programmed by a user ortraveler with at least one customized specific unlock code 12. Thecustomized specific unlock code 12 enables the traveler to maintain fullsituational awareness of the bag and ability to unlock the securingdevice 10 at will. Furthermore, the other unlock code 12 to which thetravel carrier has access enables, when the bag is in the travelcarrier's control, the bag to be diverted to and presented unlocked forTSA inspection or security screening. Afterward, the bag is locked andreturned to the air carrier's control and eventual traveler pickup orretrieval at the travel destination.

FIG. 2 illustrates a securing device system 1 according to anembodiment. The travel carrier 20 is in communication (via network 2)with bag scanner 46, operating as a bag unlocking system of a baghandling system, and a mobile device 4 of a traveler. The bag scanner 46communicates with the bag 8.

The travel carrier 20 includes a reservation system 22 (e.g., with whichthe traveler books travel reservations and optionally provides an unlockcode 12), a bag handling system 40, and traveler information 26 (e.g., aprofile of traveler information, which in embodiments, includes theunlock code or codes corresponding to a bag 8, or more than one bag 8,of the traveler. The travel carrier 20 prints the bag tag 42 for the bag8.

The travel carrier 20 receives the unlock code or codes from the mobiledevice 4. In an embodiment, the travel carrier 20 stores the unlock codeor codes with traveler information 26 that is received when the travelerbooks travel reservations. The traveler drops off the bag 8 at the baghandling system 40, e.g., during a bag drop process at which time thetravel carrier 20 generates and prints the bag tag 42 and attaches thebag tag 42 to the bag 8.

The bag 8 includes a securing device 10 responsive to the unlock codesor codes. In an embodiment, the bag 8 also includes programmable bag tag44, which is electronically programmed as an optional implementation ofthe bag tag 42. In other embodiments, the programmable bag tag 44 isincluded as part of the securing device 10. The securing device 10 orthe programmable bag tag 44 can be integrated into the bag 8.

Bag scanner 46 reads the bag tag 42 (or programmable bag tag 44) of thebag 8, such as when the bag 8 is undergoing the bag drop process, andwhen the bag 8 is routed throughout the bag handling system 40. The bagscanner 46 scans or reads the bag tags and provides unlock codes 12 tothe securing device 10. In an embodiment, the bag scanner 46 retrievesthe unlock code 12 directly from the bag tag 42. In another embodiment,the bag scanner 46 reads the token 14, passes the token 14 to the travelcarrier 20, and receives the unlock codes 12 corresponding to the token14.

The smartphone app 24 running on the mobile device 4 integrates withtravel carrier systems, e.g., to program the bag unlock codes 12 intothe securing device 10. In an embodiment, the smartphone app 24communicates to the travel carrier 20 systems to provide the bag unlockcode 12 to the travel carrier 20, which matches the bag unlock code 12to the reservation of that traveler. The smartphone app 24 and travelcarrier 20 systems can communicate bi-directionally. In an embodiment,when exchanging information from the travel carrier 20 to the smartphoneapp 24 (e.g., travel carrier 20 sends a standardized or suggested bagunlock code 12, such as a carrier frequent flier number or otherspecific traveler number, to the traveler's smartphone app 24 which thenprograms the securing device 10 with the suggested unlock code 12). Inanother embodiment, when exchanging information from the smartphone app24 to the travel carrier 20, the travel carrier 20 (e.g., thereservation system 22 of the travel carrier) requests a bag unlock code12 from the traveler, and queries the traveler's smartphone app 24 toautomatically download from the smartphone app 24 whatever unlock code12 the traveler approved in the smartphone app 24 to be shared with thetravel carrier 20 as the temporary ‘master’ unlock code. In anembodiment, the unlock code 12 to be retrieved from the smartphone app24 is generated as a token, hash, or equivalent that is associated withor derived from the traveler's digital identity. The digital identitymay be accessible to the smartphone app 24, because the digital identityhas been provisioned to that smartphone and the traveler has grantedpermission to the smartphone app 24 to access the digital identity.

In greater detail, there are generally two opportunities, prior toingestion of the bag 8 into the bag handling system, for the traveler toinitially provide the lock or unlock code 12 to the entity that unlocksthe bag by applying the unlock code to the securing device. The first isat time of travel reservation (ticket purchase) and the second is whenthe bag is provided to the carrier (check-in, and bag drop). Theseopportunities may be temporally separated in time or take place at thesame time. In an embodiment, these opportunities arise through thereservation of a ticket for a future travel opportunity, and thesubsequent check in with the carrier for the boarding of the conveyance.These two events may take place months or years apart or within secondsof one another.

Reservation systems may be directly carrier controlled. Reservationsystems also may be third-party controlled, which feed reservation datato the carrier reservation system. Accordingly, an embodiment adds anadditional data set to the information received by the carrierreservation system, in order to associate the unlock code of a securingdevice with the profile within the reservation attached to the bag tagof the bag to be conveyed (i.e., the information on or within the tag ofthe bag). The profile may be of the traveler with whom the bag will beassociated, or of the bag itself. Also, the profile attached to the bagtag will associate the physical bag with the party that owns the bag oris responsible for the bag (generally the traveler that has made thereservation and “checked” the bag). An aspect of the embodiments tiesthe unlock code of the securing device of the bag (may also be referredto as bag unlock code) to the reservation code. The bag unlock codeworks with one of the bags tied to the trip. The unlock code is tied toa bag tag, the bag tag has the reservation and traveler information oridentifier. An embodiment adds the unlock code to the bag tag (encodedor encrypted), or identifies (e.g., performs a lookup to retrieve) theunlock code by using the traveler information on the bag tag. Anotherembodiment derives the unlock code from a digital identity of thetraveler, enabling the travel carrier (who has access to the digitalidentity information provided by the traveler) to use the unlock code tolock and unlock the securing device of the bag, whether for check-inaspects or pick-up aspects of travel. For check-in, the travel carriermay identify and divert bags for secondary screening inspection, and usethe unlock codes derived from traveler digital identities to unlock thebags before handing over the bags unlocked for inspection. For pick-up,the travel carrier may identify bags for secure pick-up, and divert suchbags to automated or attended secure pick-up areas. The travel carriermay hold such bags until a traveler presents a digital identity (ormatching token) corresponding to the digital identity or token used whenthe bag was dropped off.

In another embodiment, multiple unlock codes (e.g., two or more) areassigned to a reservation, which can be done when the traveler books viathe online flight reservation or profile. When the flight reservationsystem asks for a frequent flyer number, the flight reservation systemis able to store or provide the unlock codes within the reservationsystem. The system can present information identifying the bag or bagsto be brought on that flight, and present the unlock codes tied to thebag or bags.

In yet another embodiment, travelers do not need to provide unlock codesduring the travel reservation process. Instead, the travel carriermatches the traveler's digital identity to a travel reservation, andtracks the traveler and their bag at drop off. The carrier generates anunlock code and associates that unlock code with the traveler's digitalidentity or travel reservation. The carrier may generate the unlock coderandomly, or may derive the unlock code from the traveler's digitalidentity. The unlock code may be encoded into the bag tag. In anotherembodiment, the unlock code is stored at a back end of the travelcarrier, and associated with a token or lookup code that is encoded intothe bag tag. The travel carrier can then read the bag tag, extract thetoken or lookup code from the bag tag, and use the token or lookup toretrieve and use the stored unlock code from the back end. The unlockcode can be applied to or programmed into the securing device of the bagat the time of bag drop off, because the traveler uses their digitalidentity to make the travel reservation, and then uses their digitalidentity again to drop off the bag at the time of check in. Associatingor deriving the unlock code from the traveler's digital identityeliminates a risk of the traveler mixing up or forgettingmanually-provided unlock codes. Rather, in such embodiments, the samedigital identity is used for locking or unlocking the securing device ofthe bag. Accordingly, the traveler does not need to organize or rememberunlock codes for their bags, and the traveler does not need to come upwith an unlock code. The traveler presents their digital identity whenmaking travel reservations, and when checking or picking up bags.

For travel reservations, in an embodiment, the traveler's digitalidentity is a mobile driver's license (mDL), and the travel carrier'sreservation system interacts with the traveler (e.g., via a website,kiosk, or attended reservation desk) to request the release of anidentity dataset or identity information from the traveler's mDL. Thetraveler approves the request to release identity information. Thetravel carrier's reservation system uses the identity information toautomatically populate fields of the reservation form requestingtraveler information. The traveler may choose to manually enter theiridentity information into the travel carrier's reservation system. Thetravel carrier may generate an unlock code and associate with code withthe traveler's identity information as received. The travel carrier maygenerate the unlock code based on the traveler's identity information,whether automatically received from the mDL, or manually provided by thetraveler. Because manual data entry can be subject to user error, theautomated approach using the mDL helps avoid the risk of manual usererrors.

In an embodiment, bag drop off is automated. The traveler uses a digitalidentity such as an mDL to establish their identity to the travelcarrier, and to establish that their identity corresponds to thetraveler who is dropping off the bag. The travel carrier may generate apaper tag to be placed on the bag, including a tracker number or othertracking technology (e.g., RFID) embedded in the tag. In otherembodiments, the travel carrier may program the tracking number into anelectronic tracker, such as an RFID bag tag, that may be added orintegrated into the bag for bag tracking purposes. The travel carrierencodes the unlock code into the bag tag or electronic trackerassociated with the bag. The traveler may use their digital identity,such as their mDL, to generate an unlock code (derived from or otherwiseassociated with or tied to the traveler's digital identity information)that is used to lock the bag. The traveler may then generate ananonymous token corresponding to the unlock code or digital identity.The travel carrier may encode the token into the bag tag that isassociated with the unlock code. The travel carrier may read the bagtag, extract the token, and use the token to look up and retrieve acorresponding unlock code from a travel carrier back end. Thus, thetravel carrier unlocks the securing device of the bag in response topresentation of that mDL or digital identity information presented whenthe bag was dropped off and locked. Use of the token enables the travelcarrier to lock and unlock the bag, without the traveler needing to givetheir digital identity information to the travel carrier, keeping thetraveler's mDL information safe.

Embodiments support online and offline bag locking and unlocking. Anoffline embodiment involves providing a token that is encoded into a bagtag attached to the bag or programmed into the bag, and which isavailable for scanning or reading by baggage routing systems. The tokenmay be used to derive the unlock code directly, without needing toobtain authentication, such as from an authorizing source. In anembodiment, the token is an encrypted code that a reader may decrypt toobtain the unlock code for that bag.

An online embodiment involves accessing the unlock code through the useof an authorizing source or other entity. In an embodiment, a travelcarrier reads the traveler's digital identity to retrieve a token,corresponding to the traveler's identity or travel account information.The travel carrier sends a copy of the token to a commercial entity,such as a security provider or a server operated by the travel carrier.The travel carrier also sends a copy of the token to an authorizingsource, such as an issuer of the traveler's digital identity (e.g., aDepartment of Motor Vehicles). The commercial entity and the authorizingsource then compare tokens, and upon matching, the authorizing sourceverifies that the transaction is trusted and authorizes the commercialentity to release to the travel carrier the unlock code corresponding tothat traveler's digital identity. Here, the token passes from thedigital identity to the travel carrier for that bag, and then the travelcarrier matches the token to the authorizing source, and retrieves theunlock code. In embodiments, the DMV or other issuer of identities canserve as a trusting source. The travel carrier also can issue and useits own form of identity, such as a frequent flyer account, and such atravel carrier online system can serve as the authorizing sourceperforming the authorization in this online context. Thus, the travelcarrier may serve as the authorizing authority that matches the tokenread from a bag tag against the passenger identity as stored by thetravel carrier's online system. In other embodiments, the travel carriermay also rely on other authorizing sources or authorizing authorities,by virtue of using tokens that can be matched or exchanged by otherauthorizing sources or authorities performing such serves for the travelcarrier, independent of the underlying traveler digital identityinformation.

In another online embodiment, bag security involves a data file fortracking security details of the bag. The travel carrier, or otherentities involved in verifying tokens or bag unlock codes (e.g.,authorizing source or authorizing authority, bag scanners, etc.), maygenerate and update a data file used to indicate actions such as thoserelated to transportation or unlocking of the bag. In an embodiment, thetravel carrier stores the data file in a back end server. In otherembodiments, the authorizing authority stores a version of the datafile. The data file tracks and indicates various events, such as whetherthe digital identity information and corresponding token presented by atraveler attempting to pick up a bag matches the token generated whenthe bag was initially dropped off or locked. The data file trackswhether and when the bag was unlocked or opened, e.g., for enhancedsecurity screening. The data file tracks whether verification of anonline transaction was carried out to verify the traveler's identitywhen opening the bag. Embodiments use the data file to track suchdetails, and can use the data file to log exactly what events occurredrelating to the bag, such as when the securing device of the bag wasopened and how often, as well as any other information for purposes oftracking custody and ensuring that the bag was not improperly handled orunnecessarily opened. The data file also can be used to verify that thebag was not even opened between drop off and pick up.

Embodiments would not disrupt or burden existing check-in or drop-offsystems. Embodiments that automatically lock or unlock, or that do nottest or reassign codes in a manner that is disruptive to the check-inprocess, enable check-in or drop off systems to proceed smoothly whilenot causing travelers to perform time-consuming steps during check-in.However, it is beneficial for the system to verify that the unlock codethat was provided at reservation matches the unlock code of the bagbeing dropped off (note that a bag can have multiple unlock codes, e.g.,an owner unlock code, a guest unlock code, a child or spouse unlockcode, a temporary or master unlock code, a valet unlock code, etc.). Thelast opportunity for association of the unlock code of the bag securingdevice by the carrier under whose control the bag will be wheninspection is performed, is at the point in time when the bag isreleased from the traveler's control to the carrier. Check-in ordrop-off time is the last opportunity a traveler will interact withtheir bags, such as changing the bag unlock code (e.g., via a smartphoneapp or physical interface of the bag). An embodiment of the system isnot encumbered with asking the traveler to provide, enter, or updatetheir specific lock or unlock code to verify the bag's unlock code atthe time of check-in or drop-off. Quick and efficient ways are employedto confirm the bag unlock code at the time of check-in or drop-off. Inan embodiment, the unlock code is derived from the traveler's digitalidentity, and the traveler does not need to manually enter or remember aspecific unlock code. Rather, the traveler presents the digital identity(e.g., via a smartphone app) to program the unlock code into thesecuring device, or to unlock the securing device. In an embodiment, thetraveler presents the digital identity to the travel carrier or otherentity that derives the unlock code or programs the securing device withthe derived unlock code on behalf of the traveler.

In some embodiments, the traveler may create their own unlock code andmanually program a securing device with the unlock code, and may providethat selected unlock code to the travel carrier at the time of makingtravel reservations (e.g., potentially long before the time of travel).The travel carrier may eventually unlock the bag at the time of travel,if the bag is selected for secondary screening. However, as time passesafter making travel reservations and providing an unlock code to thecarrier, human nature may potentially cause the traveler to change theunlock code, or even change which bag (having a corresponding securingdevice) the traveler ultimately presents at the time of travel and bagcheck. Despite the traveler's intentions at the time of reservation whenproviding an unlock code to the carrier in such embodiments, thetraveler ultimately may travel with a different bag or securing device.The different bag or securing device is transferred to the carrier atthe time of check-in or at the transfer of possession of the bag fromthe traveler to the carrier. In this situation, the unlock code or codesthe traveler initially provided to the carrier (at the time of carrierreservation), no longer corresponds to the unlock code or codes actuallyused with the bags that are dropped off at check-in or drop-off. It isthe nature of modern travel that significant time may pass, betweenplacing the reservation for a trip or flight (at which time the travelerwould provide the unlock code to the carrier), and actually taking theconveyance or trip. In embodiments, it does not matter if the travelerhas forgotten the unlock code at bag drop-off. It does matter if thecarrier has unlock codes that will not unlock the securing device of abag dropped off with the carrier. This can happen if the traveler haschanged the unlock code accepted by the securing device, so that theunlock code provided at reservation will no longer unlock the securingdevice, or if the traveler transfers to the carrier a bag having adifferent securing device (likely a different bag). Various embodimentsdescribed herein address this issue by using carrier-generated unlockcodes, or digital identity derived unlock codes. The carrier can encodesuch codes in the bag tag, thereby ensuring at bag drop off that thecarrier has verification that the carrier-held unlock code will secureor unlock the securing device associated with a bag. The unlock codegenerated by the travel carrier may be a random code or may beassociated with the traveler's carrier identification number, travelreservation number, booking reservation number, or other alphanumericnumber associated with the conveyance of the traveler or bag. Inembodiments, unlock codes may be associated with such numbers byderiving from the numbers a token, hash, or equivalent, to serve as theunlock codes.

An embodiment of a carrier system can be designed so that the travelerprovides the unlock code at the time of making a reservation. If thetraveler dislikes, forgets, or otherwise does not want to use the codeprovided at the time of making the reservation, then the carrier systemcan be used to update or change the unlock code at the time of flightcheck-in or bag drop-off. The carrier system can check whether theunlock code that was previously provided at reservation matches with thebag actually being checked. This system check can address situationswhere, e.g., the traveler has decided to bring a different bag that hascode different from the code of the other bag whose code was entered atreservation. It can also serve as a reminder to the traveler as to acode the traveler can use to unlock his or her own bag. The carriersystem updates the unlock code as needed, to ensure the carrier has anunlock code that can be used to unlock the bag. In an embodiment, thecarrier system programs the bag securing device with an unlock codederived from the traveler's digital identity.

To recap, in an embodiment, the traveler provides the bag unlock code atthe time of flight reservation to the carrier. The traveler may providethe unlock code at the carrier's flight reservation web site, e.g., whenproviding other traveler details requested by the carrier reservationwebsite as part of the travel reservation process. The traveler entersan unlock code of the securing device into a data entry field of thecarrier reservation website. In an embodiment, the securing deviceand/or the data entry field may default to a standardized KTN number,airline frequent flyer number, etc. Thus, the entered unlock code istreated as another piece of traveler information that travelers provideto the carrier at reservation. Subsequently, at the time of check-in,the carrier reservation system confirms the unlock code, e.g., byverifying the same code that was provided at the time of reservation, orby changing or otherwise updating the code to a new code, e.g., pertraveler choice or as derived from the traveler's digital identity. Thecarrier system then generates the bag tag encoded with the unlock codeor tokenization of the unlock code, which is attached to the bag toidentify the bag.

In an embodiment, at bag check-in the carrier can request or verify thetraveler's bag unlock code (for the securing device). In anotherembodiment, the carrier can notify the traveler and request travelerapproval to apply a carrier-generated (e.g., as derived from thetraveler's digital identity) or carrier-suggested unlock code. Thesystem can remind the traveler to add such unlock codes to the bag, orcan automatically program the securing device with such unlock codes. Byway of efficiency, the travel carrier can then provide a QR code thatthe traveler can scan or read using a smartphone app. The QR codecontains the encoded unlock code. The traveler can scan or read the QRcode to retrieve the suggested unlock code, and use that scan-obtainedunlock code to program the bag (e.g., via a smartphone app to programthe securing device). In an embodiment, at check-in, the carriercheck-in system shows the traveler the code or codes associated with thebag (e.g., three proffered codes), and prompts the traveler to keep orchange the code or codes.

The carrier system can use, or prompt the traveler to use, a master bagunlock code, which is separate from the traveler's chosen bag unlockcode. The master bag unlock code can be system-generated, and can betemporary so that it expires after a given duration. In anotherembodiment, a master bag unlock code is temporary and is the airlinecode tied to the reservation for that traveler. The securing device isprogrammed so that the traveler has their own customized and specificcode to unlock the securing device. The securing device can be unlockedwith a temporary master code that expires, unlike current physicalsystems relying on permanent physical master keys.

A bag has attached to it a bag tag, to identify the physical bag withthe traveler or traveling profile which the bag will follow. The bag tagcan be on-board (integrated with) the bag, or attached externally to thebag. Currently there is no consensus on how to implement RFID on bagtags. An embodiment involves a paper tag with RFID capability, with theRFID inside the paper similar to existing loss-prevention security tags(similar to those loss-prevention tags encountered in a shopping store,used for security tagging of items at risk of theft). The bag tag canalso be integrated into the baggage.

The bag tag may electronically store the securing device unlock code(such as a master unlock code, or a temporary unlock code) in the “tag”information. The electronically tag-stored codes are usable (e.g., by ascanner or other unlocking device) to electronically unlock the bag. Inan embodiment, a scanner can read (optically or electronically) the bagtag, extract the unlock code from the bag tag, and generate anelectronic signal to transmit the unlock code to a securing device. Thesecuring device verifies that the electronic signal corresponds to avalid unlock code with which the securing device has been programmed,and if so, the securing device unlocks.

Various implementations are used to store the unlock code (e.g., encodethe unlock code in a bag tag) while not revealing what the code is,unless read or scanned by a scanner designed to extract the tag-storedunlock codes. In an embodiment, the securing device unlock code isprinted on the tag (e.g., in an encrypted version or an otherwiseobfuscated version), so the electronic bag tag scanner or reader readsthe tag, extracts the unlock code, and uses the unlock code to unlockthe securing device. In an embodiment, the bag handling system printsthe tag with encoded unlock code, or prints the tag for visual check andelectronically encodes an RFID included in the tag, thereby effectively“printing” the code into the RFID tag. Thus, simply affixing such a bagtag to the bag also adds the unlock code to the bag, encoded, to enablethe carrier to unlock the securing device of the bag for inspection.Embodiments also may add the unlock code to the bag by programming orotherwise associating an integrated electronic or RFID tag, containingthe unlock code, internal to the bag.

Other embodiments do not store the securing device unlock code in thebag tag. The unlock code is stored on a remote server, e.g., a serveroperated as a back end by the carrier. The bag tag has an identifier ortoken (e.g., traveler reservation code, or other identifier includingthose currently in use to track bags). The reader reads the identifieror token and queries the airline or carrier server using the identifieror token to look up the server information for the bag, including a bagunlock code to open the securing device of the bag. The server passesthe unlock code to the reader, which uses that code to unlock thesecuring device of the bag.

In an embodiment, the unlocking of the secured bag may be performedusing a technique similar to how a mobile driver's license (mDL) systemverifies entities requesting mDL source data from an issuing authorityof the mDL (this capability is known as an “online transaction”).Embodiments can perform verification using a token associated with themDL (or digital identity) credential to serve as the unlock key to thesecured bag, and not the mDL credential itself (or the personalinformation contained within the mDL data). The associated traveler towhom the mDL and baggage belong, will have a traceable data stream ofwhen the online transaction to unlock the bag was performed, based onthe verifications or other interactions between the travel carrier backend, travel venue kiosks, bag scanners, issuing authorities of the mDLs,and other communications.

Embodiments also enable the token to be delivered in an offline systemor offline transaction, where the travel carrier receives the tokenassociated with the mDL at reservation or check-in, and the travelcarrier uses the token to open the securing feature of the bag beforethe bag is delivered for inspection, without needing a check-back to theissuing authority.

The carrier can determine whether to have the unlock code encrypted orencoded onto the tag as described above, or can use a lookup to accessthe unlock code stored on a server, by using the traveler profileinformation associated with the bag tag to access a database containingtraveler records and look up the unlock code in the database, andtransmit the unlock code to an unlocking device after the carrier systemhas identified the bag for inspection and made a request for the code tounlock that bags securing device.

Also, an embodiment prevents the airline system from being able tochange the bag unlock code (“recode”), ensuring that the traveler hassuch an ability to recode. The carrier will have the capability tounlock the bag using the unlock code made available by the traveler(which code has been programmed into the bag by the traveler, or whichcode is otherwise assigned to the bag).

Embodiments can use a standardized unlock code (e.g., as the primary ormaster or secondary unlock code), such as a traveler number (frequentflyer number) or KTN (known traveler number i.e. TSA number), as the bagunlock code.

Embodiments can allow the traveler to add, or prompt the traveler to add(e.g., via a kiosk check-in prompt), such a standardized code into thebag at check-in or drop-off. In an embodiment, the kiosk can email ordisplay the traveler number (e.g., in plain text or via QR code orother), and the traveler can relay that number to a smartphone app(e.g., by manually typing or by using the smartphone to visually capturethe QR code or other encoded version of the unlock code). The smartphoneapp then directs the smartphone to program the bag securing device,e.g., by directing the smartphone to use its Bluetooth, RFID, Wi-Fi, orother built-in transmission capabilities to communicate the unlock codefrom the smartphone to the securing device, along with instructionsauthorizing the securing device to accept the programming from thesmartphone.

In another embodiment, the traveler can authorize the carrier to programthe bag with a new unlock code, e.g., at the check-in kiosk or whenplacing the bag on the scale at bag drop-off, or other options thatallow the traveler to authorize another system to program the securingdevice, through near-frequency wireless communication or othershort-range forms of electronic information exchange. In an embodiment,the traveler presents digital identity information to the carrier, andthe carrier derives an unlock code from the traveler's digital identity,and programs the securing device using the derived unlock code. Inanother embodiment, the traveler authorizes the carrier to derive theunlock code using the traveler's digital identity information as alreadypresented earlier when making travel reservations via the carrier'sreservation system or website.

In an embodiment, the airline will lock the securing device for thetraveler. The traveler keeps the unlock code. The carrier system wouldconfirm that the carrier has the right unlock code, by ensuring that thesecuring device unlock code is known by the traveler at check-in ordrop-off, whether the unlock code was specified by the traveler atreservation and verified at check-in or drop-off, or was programmedlast-minute, right at the time of check-in or drop-off. The system toapply or verify the unlock code with the securing device thereby avoidsburdening or encumbering the check-in process.

A variety of implementations can be used to associate a bag unlock codeto a traveler. The travel carrier system can link a bag unlock code to abiometric record such as a facial scan of the traveler and encode thelock with that code responsive to confirming the facial scan or otherbiometric record. In an embodiment, the unlock code is derived (e.g., byusing a hash operation or other algorithmic transformation) from thebiometric record itself. Various approaches are available to efficientlyand quickly encode the lock with the new code, such as with currentelectronic locks that use smartphone apps.

The unlock code is used to unlock the securing feature of the bag, whenor if the bag is to be opened for inspection. An inspecting entityretrieves the unlock code by utilizing a scanning device that can detectthe bag tag that is encoded with the unlock code, and transmit theunlock code to the securing feature, causing it to unlock.

As for physical equipment implementation, the bag tag readers (as usedby agents or automatic bag routing systems) would include a transmitfunction to unlock the electronic securing devices. Such transmitfunctionality is likely already available in off-the-shelf readers. Inan embodiment, a travel carrier deploys a mix of receive (RX) orreceive/transmit (RX/TX) readers for scanning bag tags. Suchfunctionality may include the ability to communicate electronically withsecuring devices to transmit bag unlock codes to the securing devices.In an embodiment, employees in a bag inspection station carry handheldscanners that scan or read and unlock securing devices. In anotherembodiment, fixed scanners (such as a baggage handling scanner) scan orread and unlock (or re-lock) bags as they pass into (and out of) a baginspection station.

A further aspect of implementation is the scanning devices or readerscan include the ability to decrypt or decode. In an embodiment, thereader scans or reads the bag tag including an encrypted master bagunlock code, and decrypts the encrypted master bag unlock code. Thereader transmits, as a local signal, the decrypted master bag unlockcode to the securing device to unlock the bag. In another embodiment,the reader scans or reads the bag tag including a reservation identifieror other lookup token, transmits the reservation identifier to adatabase as a master bag unlock code request, receives a responseincluding a master bag unlock code corresponding to the reservationidentifier, and transmits as a local signal the master bag unlock codeto unlock the bag. In an embodiment, at check-in, the system prompts thetraveler to confirm the number of bags being checked, and also providesinformation about which codes are on the bags, and prompts the travelerwhether to keep the unlock codes. For example, the system prompts: “Doyou want to keep these codes, Yes/No?”

The scanning device may be utilized directly by the inspecting entity,or the scanning device may be incorporated into the cargo system used totrack and route bags. Accordingly, embodiments may use an automatedprocess to scan or read the bag, detect the unlock code, and transmitthe unlock code to the securing feature to unlock the bag, beforepresentation of the bag to the inspecting entity. In an embodiment,after release from inspection, the utilized unlock code is renderedobsolete or unusable, thus protecting the securing feature or securingdevice of the bag from being opened again with the same unlock code,fulfilling the traveler's expectation of personal security. The unlockcode may be rendered obsolete automatically through the use of temporaryunlock codes that expire, by programming the securing device to stopusing the unlock codes, or by directing a back-end system to no longerprovide unlock codes in response to unlock code requests for those codesrendered obsolete.

In an aspect of the invention, by way of a front-end process, thetraveler provides a bag unlock code to the carrier, and the carrierpasses that code to the scanning device for opening the bag (if the bagis selected for opening or screening). The code information that getspassed between carrier and the entity unlocks the bag for inspection.

In another aspect of the invention, by way of a back-end process, theunlock code information is carried by the bag itself by way of the bagtag through being printed or otherwise encoded within the bag tag thatis attached or transmitted to the bag at the bag drop where the travelerdeposits the bag for conveyance to a destination. The unlock code isidentified or received from the bag tag by the scanning device, andsubsequently transmitted to the securing device to unlock the securingdevice.

FIG. 3 illustrates a bag handling system 40 according to an embodiment.Multiple bags 8 are shown progressing along various stages of a conveyorbelt 52, including bags diverted by bag diverter 50 past bag scanners 46through the bag inspection station 54. The bags 8 remain locked, and areunlocked when at the bag scanner 46 at the bag inspection station 54prior to the bag being passed inside, at which point the bags areunlocked. In an embodiment, the unlocked bag 8 is manually re-locked andreturned to the conveyor belt 52. In another embodiment, the unlockedbag is returned unlocked to the conveyor belt 52, and the bag scanner 46re-locks the bag upon exiting the bag inspection station 54.

In another embodiment, the inspecting entity (the bag inspection station54 and its employees) does not receive the unlock code, because theunlock code is transmitted to the bag by way of a scanning device (e.g.,bag scanner 46) that is operated by the travel carrier, or a facilityoperator on behalf of the travel carrier (such facility operator alsoreferred to herein as travel carrier). By way of example, the travelcarrier can be an airline, bus or train passage provider. The airport,bus, depot or train station can be owned publicly, privately or througha public or private partnership with the facilities operated on behalfof the public that travel through the private operators, or that conveypeople and goods (bags) to and from the facilities. Example facilitiesof these types are, Hartsfield-Jackson Atlanta International Airport,Washington Dulles International Airport, Union Station in the Districtof Columbia (Washington, D.C.) and Pennsylvania Station in New YorkCity.

Another embodiment involves a system that automatically unlocks bagsbefore delivering the unlocked bags to inspectors at the bag inspectionstation 54, as illustrated in FIG. 3 . This embodiment does not rely onagents or hand-held scanners or readers to unlock the bags. Thisembodiment removes the agent unlockers, and the hand-held scanners orreaders used by such agents, from the unlocking aspects of the securingdevices. In an embodiment, the majority of airports worldwide use abarcode scanner or reader to track bags. The IATA (www.iata.org) andsome airport-related companies have created standards to simplify theconnection of hardware and software used on airports. Some standardsused are: Common Use for Terminal Equipment (CUTE), Common Use forPassenger Processing Systems (CUPPS), and Common Use for Self Service(CUSS) kiosks. Such standards enable the positioning of the bag scanner46 at entry or exit of the conveyor belt 52 through the bag inspectionstation 54. Some airports are beginning to integrate RFID readers intothese barcode scanners or readers, although RFID readers are not incommon usage.

Note that the airport or other back-checking facility or venue hasfully-automated systems to handle and route checked bags, where theluggage goes around various routing and gets read by automated systemsalong the way to achieve a given bag routing, corresponding to thetravel info associated with the bag as indicated on the bag tag (whichis automatically read by the routing system).

Accordingly, an embodiment involves incorporating the securing deviceunlock function into the automated bag routing system, enabling therouting system to read the bag tag on a bag flagged for or otherwisediverted by bag diverters 50 to inspection (by TSA). The automated bagrouting system may include bag scanning devices to extract or otherwiseobtain the securing device unlock code associated with that bag andunlock the bag before presenting the bag to the bag inspection station54 for (TSA) inspection. This provides a benefit of not having the (TSA)inspector perform the action of unlocking the securing device of thebag, as well as application of the unlock code to the securing device ofthe bag before the bag is presented for (TSA) inspection. In thisembodiment, the unlock code is not transmitted to the inspector of thebag and remains with the travel carrier (the bag unlock code is notpassed to, extracted by, or used by the (TSA) inspection entity, becausethe inspector will receive an already-unlocked bag). This embodimentwould ensure that the securing device unlock code is not transmittedbeyond the carrier, which was the direct recipient of the unlock codetransmitted by the traveler or owner of the bag. In this embodiment thebag inspector would not use the handheld device (barcode or RFID scanneror reader) to unlock the securing device. The carrier bag routing systemwould unlock the securing device and relay an unlocked bag forinspection of contents.

As described above, conveyor systems including conveyor belts, bagscanners or readers, and bag diverters are used to route bags. A travelcarrier pulls a bag out of airplane compartment, and places it on theconveyor system. The conveyor system scans or reads the bag, looks upbag information for the bag, and determines whether the bag should bediverted for enhanced screening. In another embodiment, the conveyorsystem determines whether a scanned bag is designated for secure pickup.If so, instead of just sending the bag on to the pickup carousel withall the other unsecured bags, the conveyor system can automaticallydivert such bags to, e.g., a luxury or attended secure pickup area, oran automated secure pickup area such as an electronic locker system.Such pickup areas securely hold the bag for the traveler, and do notrelease the bag without verification. Such embodiments ensure that,e.g., a luxury bag with expensive items is released only to the intendedowner.

FIG. 4 illustrates a bag unlock method 400 of unlocking a securingdevice according to an embodiment. In block 410, a travel carrierreceives a bag during a check-in process. In an embodiment, the bagincludes a securing device designed to be applied to an individual pieceof airline luggage, the securing device having a securing featurecontrolled by non-physical technologies (Bluetooth, phone application,radio frequency identification (RFID) etc.).

In block 420, the travel carrier identifies traveler informationcorresponding to the bag. In an embodiment, the travel carrier looks upbooked travel reservations using the traveler's identity, and accessessuch travel information. The travel information includes an unlock codeprovided by the traveler when booking the travel reservations. Theunlock codes may be associated with the traveler, conveyed to the travelcarrier system, and subsequently encrypted and affixed to the bag, e.g.,when the traveler checks the luggage with the airline for a flight.

In block 430, the securing device of the bag is programmed (whether bythe traveler using a smartphone app, or in some embodiments, by thetravel carrier using a bag drop scanner or reader) using the unlock codefrom the traveler information. In an embodiment, the travel carrierdisplays a QR code including a coded version of the unlock code, so thatthe traveler can scan or read the QR code using a smartphone app. Thesmartphone app then compares the code on file with the travel carrier(as presented in the QR code) with the code actually stored in thesecuring device. If the codes do not match, the smartphone app alertsthe traveler to update the securing device code, e.g., by programmingthe securing device to additionally include the unlock code that waspresented in the QR code. In another embodiment, the travel carrierderives the unlock code from a digital identity of the traveler, whetherpresented when making travel reservations, or as presented at check inor bag drop.

In block 440, the bag tag is read by a scanner or reader located at thebaggage inspection station. In an embodiment, the bag has been droppedoff by the traveler and ingested into the bag handling system. A seriesof conveyor belts transfer the bag through the bag handling system. Ifflagged for inspection, a bag diverter redirects the bag toward thebaggage inspection station. At the baggage inspection station, justoutside, a bag scanner or reader is installed to scan or read the bagtag as it passes along the diverted conveyor belt toward the entranceinto the baggage inspection station.

In block 450, the bag scanner or reader determines the unlock codepertaining to the bag tag. In an embodiment, the bag scanner or readerdirectly decodes the unlock code from the bag tag, because the bag tagwas encoded into the bag tag. In another embodiment, the bag scanner orreader reads a token from the bag tag and communicates the token to atravel carrier back end. The back end looks up the token, and retrievesan unlock code stored by the carrier corresponding to the token. Theback end then transmits the unlock code to the bag scanner or reader.

In block 460, the bag scanner or reader transmits the unlock code to thesecuring device to unlock the securing device at the baggage inspectionstation. In an embodiment, the bag scanner or reader transmits theunlock code to the securing device, unlocking it. In another embodiment,the bag scanner or reader is hand-held, and operated by an employee thatmanually scans or reads the bag code and unlocks the bag. The unlockcode is used to unlock the securing device or securing feature, enablingthe bag to be presented for luggage screening inspection and subsequentrelease from inspection. Alternatively, the travel carrier systemprovides the TSA with access to a scanning or reading device that candetect the unlock codes associated with the traveler's encryptedpasscode (as stored in the bag tag) and transmit the unlock codes to thesecuring device, causing it to unlock. In an embodiment, after releasefrom the baggage inspection station, the unlock code is renderedobsolete or unusable, thus protecting the luggage and fulfilling thetraveler's expectation of personal security.

FIG. 5 illustrates a bag conveyance method 500 of conveying a bag into abaggage inspection station unlocked according to an embodiment. In block510, the bag tag is read by a scanner or reader located at the baggageinspection station. In an embodiment, a bag diverter redirects the bagtoward the baggage inspection station. At the baggage inspectionstation, just outside, a bag scanner or reader is installed to scan orread the bag tag as it passes along the diverted conveyor belt towardthe entrance into the baggage inspection station.

In block 520, the bag scanner or reader determines the unlock codepertaining to the bag tag. In an embodiment, the bag scanner or readerdirectly decodes the unlock code from the bag tag, because the bag tagwas encoded into the bag tag. In another embodiment, the bag scanner orreader reads a token from the bag tag and communicates the token to atravel carrier back end. The back end looks up the token, and retrievesan unlock code stored by the carrier corresponding to the token. Theback end then transmits the unlock code to the bag scanner or reader.

In block 530, the bag scanner or reader transmits the unlock code to thesecuring device to cause the securing device to unlock at the baggageinspection station. In an embodiment, the bag scanner or readertransmits the unlock code to the securing device, unlocking it. Inanother embodiment, the bag scanner or reader is hand-held, and operatedby an employee that manually scans or reads the bag code and unlocks thebag.

In block 540, the bag handling system conveys the unlocked bag into thebaggage inspection station. In an embodiment, the baggage inspectionstation is staffed by TSA employees, who are concerned with baginspection and are not concerned with unlocking bags. Accordingly, theresponsibility of unlocking bags falls on the bag handling system priorto conveying the bags to the baggage inspection station.

In block 550, the bag handling system receives the bag from the baggageinspection station, the securing device being locked. In an embodiment,the bag handling system includes an exit scanner or reader, installed atan exit of the baggage inspection station. The exit scanner transmits a“lock” signal to the securing device, causing it to automatically lockthe bag upon exiting the baggage inspection station. Accordingly, thebaggage inspection station is not concerned with the locking of thebags. In another embodiment, the baggage inspection station includes, asan operational function, the locking of the bag when returned to the baghandling system's conveyor belt exiting the baggage inspection station.Accordingly, the baggage inspection station ensures that bags are lockedwhen exiting and is not concerned with the unlocking of the bags.

FIG. 6 illustrates an apparatus or a computer system 600, or apparatus,including logic according to an embodiment. The computer system 600includes a processing system 610 having a hardware processor 625 toperform a predefined set of basic operations 630 by loadingcorresponding ones of a predefined native instruction set of codes 635as stored in the memory 615.

Here, the term computer system includes a processing system such asprocessing system 610 and a memory such as memory 615 accessible to theprocessing system. Such systems serve, in an embodiment, as theprocessor 100 and memory 130 of the securing device 10 illustrated inFIG. 1 .

The processing system includes at least one hardware processor, and inother embodiments includes multiple processors or multiple processorcores. In one embodiment, a computer system is a standalone device. Theprocessing system in another embodiment includes processors fromdifferent devices working together. In embodiments, a computer systemincludes multiple processing systems that communicate cooperatively overa computer network.

The following discussion explains how the logic, that implements theforegoing operations (e.g., programming logic 150, unlocking logic 160,and tracking logic 170 illustrated in FIG. 1 ), transforms the hardwareprocessor of computer system 600 into a specially-programmed electroniccircuit.

A hardware processor is a complex electronic circuit designed to respondto certain electronic inputs in a predefined manner. The inputs to ahardware processor are stored as electrical charges. The hardwareprocessor interprets the electrical charge of a given memory circuit ashaving one of two binary values, namely, zero or one.

A given hardware processor has electrical circuitry designed to performcertain predefined operations in response to certain ordered sets ofbinary values. The electrical circuitry is built of electronic circuitsthat respond to one set of ordered binary values one way and to anotherset of ordinary values another way, in accordance with the hardwaredesign of the hardware processor. A given set of ordered binary valuesto which the hardware processor is designed to respond, in a predefinedmanner, is an instruction.

The collection of valid instructions to which a given hardware processoris designed to respond, in a predetermined manner, is the nativeinstruction set of the processor, also referred to as a nativeinstruction set of codes. The native instruction set for one hardwareprocessor may be different from the native instruction set for anotherhardware processor, depending on their manufacture. To control a givenhardware processor, an instruction or a sequence of instructions isselected from the predefined native instruction set of that hardwareprocessor.

A sequence of codes that a hardware processor is to execute, in theimplementation of a given task, is referred to herein as logic. Logic ismade up of, in contrast to software, a sequence of codes orinstructions, selected from the predefined native instruction set ofcodes of the hardware processor, and stored in the memory.

Returning to FIG. 6 , the memory 615 is accessible to the processingsystem 610 via the bus 670. The processing system controls also theinput output unit 620 via the bus 670. The input output unit 620includes a user interface controller 650, a display unit controller 655,a communications unit controller 660, and storage controller 665.

The memory 615 includes the predefined native instruction set of codes635, which constitute a set of instructions 640 selectable for executionby the hardware processor 625. In an embodiment, the set of instructions640 include various logic 645 representing the securing device 10 asillustrated in FIG. 1 , including the programming logic 150 (a firstrespective sequence of instructions), the unlocking logic 160 (a secondrespective sequence of instructions), and the tracking logic 170 (athird respective sequence of instructions). The terms first throughthird in this paragraph do not imply any order of operation or use andare used for discrimination of one sequence of instructions fromanother.

The various logic 645 is stored in the memory 615 and comprisesinstructions 640 selected from the predefined native instruction set ofcodes 635 of the hardware processor 625, adapted to operate with theprocessing system 610 to implement the process or processes of thevarious logic 645.

CONCLUSION

The various networks are illustrated throughout the drawings anddescribed in other locations throughout this disclosure and can compriseany suitable type of network such as the Internet or a wide variety ofother types of networks and combinations thereof. In an embodiment, thenetwork may include a wide area network (WAN), a local area network(LAN), a wireless network, an intranet, the Internet, a combinationthereof, and so on. Further, although a network is shown, a network caninclude multiple networks.

Computer storage media or memory includes volatile and non-volatile,removable and non-removable media and memory implemented in any methodor technology for storage of information such as computer readableinstructions, data structures, program modules, or other data. Computerstorage media include, and are not limited to, random access memory(RAM), non-programmable memory (ROM), electrically erasable programmablememory (EEPROM), flash memory or other memory technology, compact discnon-programmable memory (CD-ROM), digital versatile disc (DVD) or otheroptical storage, magnetic cassettes, magnetic tape, magnetic diskstorage or other magnetic storage devices, or any other medium which canbe used to store the information and which can be accessed by a mobiledevice, computer, server, and so forth. In an embodiment, instructionsembodying an application or program are included in one or morecomputer-readable storage media, such as tangible media, that store theinstructions in a non-transitory manner.

Various techniques are described herein in the general context ofsoftware or program modules. Generally, software includes routines,programs, objects, components, data structures, and so forth thatperform particular tasks or implement particular abstract data types. Animplementation of these modules and techniques may be stored on ortransmitted across some form of computer readable media. Computerreadable media can be any available medium or media that can be accessedby a computing device. By way of example, and not limitation, computerreadable media may comprise “computer storage media.”

Certain attributes, functions, steps of methods, or sub-steps of methodsdescribed herein are associated with physical structures or components,such as a module of a physical device, that in implementations inaccordance with this disclosure make use of instructions (e.g., computerexecutable instructions) that are embodied in hardware, such as anapplication specific integrated circuit, computer-readable instructionsthat cause a computer (e.g., a general-purpose computer) executing theinstructions to have defined characteristics, a combination of hardwareand software such as processor implementing firmware, software, and soforth such as to function as a special-purpose computer with theascribed characteristics.

In an embodiment, a module comprises a functional hardware unit (such asa self-contained hardware or software or a combination thereof) designedto interface the other components of a system such as through use of anapplication programming interface (API). In embodiments, a module isstructured to perform a function or set of functions, such as inaccordance with a described algorithm. That this disclosure implementsnomenclature that associates a particular component or module with afunction, purpose, step or sub-step is used to identify the structure,which in instances includes hardware or software that function for aspecific purpose. Invocation of 35 U.S.C. § 112(f) will be accomplishedthrough use of ubiquitous and historically-recognized terminology forthis purpose. The structure corresponding to the recited function beingunderstood to be the structure corresponding to that function and theequivalents thereof permitted to the fullest extent of this writtendescription, which includes the accompanying claims and the drawings asinterpreted by one of skill in the art.

Although the subject matter has been described in language specific tostructural features or methodological steps, it is to be understood thatthe subject matter defined in the appended claims is not necessarilylimited to the specific features or steps described. The specificfeatures and steps are disclosed as example forms of implementing theclaimed subject matter.

In accordance with some embodiments, information is stored in memory (atleast temporarily) during performance of the methods for a variety ofreasons. Example rationales include, and are not limited to, dataprocessing convenience, communication convenience, permit batchvalidation or review, records maintenance, and so on, and combinationsthereof.

Although headings are used for the convenience of the reader, these arenot to be taken as limiting or restricting the systems, techniques,approaches, methods, devices to those appearing in any particularsection. The teachings and disclosures herein can be combined orrearranged with other portions of this disclosure and the knowledge ofone of ordinary skill in the art. It is the intention of this disclosureto encompass and include such variation.

What is claimed is:
 1. A bag-securing method, comprising: receiving,into a travel carrier system of a travel carrier, traveler informationfrom a traveler who is booking a travel reservation via an onlineinternet interface of a reservation system of the travel carrier;generating, by the travel carrier, an unlock code for a securing devicethat is a bag lock associated with a bag of the traveler, the unlockcode being based on the traveler information received from the traveler;storing the unlock code at the travel carrier system; receiving the bagfrom the traveler during a check-in process temporally separated from,and at some time after, booking the travel reservation; checkingidentification of the traveler to retrieve the unlock code stored forthe traveler; programming the bag lock of the bag using the unlock codeto secure the bag lock; and generating, by the travel carrier system, abag tag associated with the unlock code for the bag.
 2. The method ofclaim 1, further comprising requesting, by the travel carrier, releaseof the traveler information as identity information from a mobiledriver's license (mDL) digital identity of the traveler.
 3. The methodof claim 2, further comprising: validating the mDL of the traveler, andautomatically populating relevant fields of the travel reservation forthe traveler using the traveler information obtained via the mDL.
 4. Themethod of claim 2, further comprising: reading, by the travel carrier,the mDL of the traveler; generating an identity token corresponding tothe mDL of the traveler; sending a copy of the identity token to anauthorizing source; receiving verification of the mDL from theauthorizing source; and retrieving, from a travel carrier back endstorage responsive to receiving verification of the mDL, the unlock codecorresponding to the mDL of the traveler.
 5. The method of claim 1,wherein travel carrier generates the unlocking code by deriving theunlock code from a digital identity of the traveler by generating atoken based on the digital identity of the traveler.
 6. The method ofclaim 1, further comprising encoding into the bag tag, by the travelcarrier, a token associated with the traveler, wherein the bag tag isreadable to extract the token and use the token to look up and retrievefrom a travel carrier back end the unlock code corresponding to thetraveler.
 7. The method of claim 6, wherein the token comprises at leastone of: a random code, a carrier identification number associated withthe traveler, a travel reservation number associated with the traveler,or a booking reservation number associated with the traveler.
 8. Themethod of claim 6, wherein the token comprises a hash of at least oneof: a random code, a carrier identification number associated with thetraveler, a travel reservation number associated with the traveler, or abooking reservation number associated with the traveler.
 9. The methodof claim 1, wherein the traveler information comprises at least one of:a frequent flyer number, a carrier-assigned traveler identifier number,a travel reservation number, or a travel reservation code.
 10. Themethod of claim 1, further comprising: associating, by the travelcarrier, the unlock code with a biometric record of the traveler;storing the unlock code at a travel carrier back end storage; verifyingthat the traveler matches the biometric record; and responsive toverifying the traveler, retrieving the unlock code corresponding to thetraveler.
 11. The method of claim 10, further comprising deriving, bythe travel carrier, the unlock code from the biometric record based onan algorithmic transformation of the biometric record itself.
 12. Themethod of claim 1, further comprising: during the check-in process or abag check process, requesting confirmation from the traveler whether tokeep the unlock code as previously booked; and responsive to thetraveler desiring to change the unlock code, changing, by the travelcarrier, the unlock code.
 13. The method of claim 1, further comprising:during a bag check process, checking, by the travel carrier, whether abag's unlock code of the bag lock of the bag being checked matches theunlock code stored at the travel carrier system; and responsive to amismatch between the bag's unlock code and the unlock code stored at thetravel carrier system, prompting the traveler to select whether to 1)update the unlock code stored at the travel carrier system to match thebag's unlock code, 2) update the bag's unlock code to match the unlockcode stored at the travel carrier system, or 3) request from thetraveler a new unlock code and program the bag lock with the new unlockcode.
 14. The method of claim 1, further comprising: during a bag checkprocess, requesting, by the travel carrier, that the traveler confirm anumber of bags being checked; displaying information about any existingunlock codes stored in bag locks of the bags; and prompting the travelerwhether to keep or overwrite the existing unlock codes, or add newunlock codes.
 15. The method of claim 1, further comprising: generating,by the travel carrier, a token corresponding to the unlock code; anddisplaying the token encoded as a Quick Response (QR) code readable by acamera of a smartphone of the traveler, wherein an application on thesmartphone of the traveler offers to update the bag lock of the bag ofthe traveler to match the unlock code presented via the QR code.
 16. Themethod of claim 1, further comprising displaying the unlock code to thetraveler via the reservation system of the travel carrier.
 17. Themethod of claim 1, further comprising sending the unlock code to asmartphone application of the traveler.
 18. The method of claim 1,further comprising: receiving, from a smartphone application of thetraveler in communication with the travel carrier, the unlock code;matching the unlock code to a reservation of that traveler; and storingthe unlock code at the travel carrier system.
 19. The method of claim 1,further comprising: sending, from the travel carrier to a smartphoneapplication of the traveler in communication with the travel carrier,the unlock code; and sending an instruction to the traveler to use thesmartphone application to program the bag lock with the unlock code. 20.The method of claim 1, further comprising: requesting, by the travelcarrier, the unlock code from the traveler; and querying a smartphoneapplication of the traveler to automatically download from thesmartphone application the unlock code that the traveler approved in thesmartphone application to be shared with the travel carrier.
 21. Themethod of claim 1, further comprising: wirelessly programming, via atransmitter of the travel carrier, the bag lock to accept the unlockcode.
 22. The method of claim 1, further comprising generating andupdating, by the travel carrier, a data file associated with thetraveler, to log unlocking instances of the bag lock.
 23. The method ofclaim 1, further comprising prompting, via a kiosk at a check-inlocation of the travel carrier, the traveler with a status of the baglock and the unlock code of the bag the traveler is dropping off withthe travel carrier.
 24. A bag-securing method, comprising: receiving,into a travel carrier system of a travel carrier, traveler informationfrom a traveler who is booking a travel reservation via an onlineinternet interface of a reservation system of the travel carrier, thetraveler information comprising an unlock code for a securing devicethat is a bag lock associated with a bag of the traveler; storing theunlock code at the travel carrier system; receiving the bag from thetraveler during a check-in process temporally separated from, and atsome time after, booking the travel reservation; checking identificationof the traveler to retrieve the unlock code stored for the traveler; andcommunicating the unlock code to the traveler.
 25. The method of claim24, further comprising querying the traveler whether to continue usingor replace the unlock code.
 26. The method of claim 24, furthercomprising: generating, by the travel carrier, a candidate unlock code;and prompting for traveler consent to use the candidate unlock code toprogram the bag lock.
 27. A method for secure bag pick up, comprising:reading, by a travel carrier during a bag drop process, a mobiledriver's license (mDL) digital identity of a traveler associated with abag being dropped off; generating an identity token corresponding to themDL of the traveler; storing an association between the identity tokenand the bag of the traveler at a travel carrier system; sending a copyof the identity token to an authorizing source; receiving verificationof the mDL from the authorizing source; reading, by the travel carrierduring a bag pick up at a secure pick up area, the mDL of the traveler;generating the identity token corresponding to the mDL of the traveler;retrieving the association between the identity token and the bag of thetraveler; determining the bag corresponding to the mDL, based on theassociation; scanning the bag at the secure pick up area that is to besecurely picked up; and verifying that the bag to be securely picked upcorresponds to the bag of the traveler attempting to pick up the bag.28. The method of claim 27, further comprising performing a livenesscheck of the traveler, to verify that the traveler attempting to pick upthe bag at the secure pick up area matches the traveler of the mDL fromthe association stored and retrieved.
 29. The method of claim 27,further comprising: determining, by the travel carrier, that thetraveler has designated the bag for secure pick up; diverting the bag tothe secure pick up area; securely holding the bag for the traveler atthe secure pick up area; prompting the traveler to provide a bag unlockcode; and releasing the bag to a traveler, responsive to verifying thebag unlock code provided by the traveler unlocks a bag lock of the bag.30. The method of claim 27, wherein the secure pick up area comprises anautomated secure pick up area including an electronic locker system.