Dynamic identity matching in response to threat levels

ABSTRACT

A dynamic identity matching facility that enables an operator to determine the status of an individual based on identification information contained on an identification record provided by the individual. The operator scans the individual&#39;s identification information from the identification record using a scanning device. The facility decodes the scanned identification information and identifies a number of candidates based on the decoded identification information. For each identified candidate, the facility generates a candidate score. Based on the candidate score of each identified candidate, the facility selects a number of the identified candidates for display. The facility displays the selected candidates to the operator along with the candidate&#39;s criminal or other acts.

BACKGROUND

Identity matching systems have been used in a range of settings tocontrol access to secure locations, protect information against securitybreaches, and to detect individuals who pose a threat to public safety.For example, the National Crime Information Center (NCIC) provides adatabase of criminal records that may be used to assist law enforcementin apprehending fugitives. A law enforcement officer can submit arequest to the NCIC during a traffic stop to determine whether thedriver of the vehicle is wanted under an outstanding warrant orcitation. However, NCIC inquiries frequently result in false positivesthat require the requesting officer to investigate further before anyaction can be taken. Consequently, because the NCIC system requiresadditional time and resources, it is inefficient for use in routinescreening environments where large numbers of individuals need to beprocessed in a short amount of time.

The Computer-Assisted Passenger Prescreening System (CAPPS) is anotherexample of an identity matching system that has been used to detectindividuals who may pose a terrorist-related threat or who haveoutstanding Federal or state warrants for violent crimes. CAPPS assessesthe identity of a passenger by matching passenger name information togovernment databases in order to determine if there is an exact (or nearexact) name match. CAPPS relies on a simple matching algorithm to matchthe passenger's name with a name list. Matching algorithms that relyonly upon a name are likely to generate a high number of falsepositives, such as publicized cases of Transportation Security Agency(TSA) employees stopping famous people or 2-year olds whose name happensto match the same name on a terrorist list.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a scanning device that may be used to scan anidentification record containing machine-readable identificationinformation.

FIG. 2 is a block diagram that illustrates various components orservices that are part of or interact with a dynamic identity matchingfacility.

FIG. 3 is a flow chart of actions performed by the facility to identifypersons of interest based on identification information.

FIGS. 4A, 4B, 4C, and 4D are screenshots of a user interface of thescanning device.

DETAILED DESCRIPTION

Accuracy and efficiency are critical factors to the success and adoptionof an identity matching system. In light of the recent security threatsin the world, there is a large unmet need to provide better accesscontrol at the county's borders, at sensitive installations, and atpublic and private venues. Accordingly, an identity matching facilitythat is highly accurate and allows individuals to be processed in ashort timeframe is disclosed herein. The identity matching facility isdynamic and responsive to environmental information, such as threatlevels issued by the military or the Department of Homeland Security(DHS).

A dynamic identity matching facility is disclosed that enables anoperator to determine the status of an individual based onidentification information contained on an identification recordprovided by the individual. The operator scans the individual'sidentification information from the identification record using ascanning device. The facility decodes the scanned identificationinformation and identifies a number of candidates based on the decodedidentification information. For example, the facility may identify anumber of candidates using a name matching algorithm. For eachidentified candidate, the facility generates a candidate score. Based onthe candidate score of each identified candidate, the facility selects anumber of the identified candidates for display. For each selectedcandidate that the facility recognizes as a person of interest, thefacility selects the candidate's criminal acts (or other acts) fordisplay. The facility displays the selected candidates to the operator.

In some embodiments, the facility employs a fuzzy matching technique toidentify candidates based on the decoded identification information. Forexample, the facility may identify and analyze candidate names that arespelled slightly differently than the name provided by the decodedidentification information.

In some embodiments, the candidate score for each identified candidateis the aggregate result of a multi-factored test. For example, thecandidate score may be the aggregate of one or more scores relating tothe identified candidate's gender, date of birth (DOB), physicaldescription, or other identifying aspect. In some embodiments, fuzzymatching techniques may be used in calculating the candidate score foreach identified candidate. For example, a candidate DOB that exactlymatches the DOB provided by the decoded identification information mayreceive a higher score than a candidate DOB that matches the day andmonth yet does not match the year of the DOB provided by the decodedidentification information.

In some embodiments, the candidate score includes a score that iscalculated according to the frequency of the candidate's name within apopulation. For example, a candidate name having a high frequency withina population (e.g., John Smith) may receive a lower score than acandidate name having a low frequency within the population (e.g.,Walentia Knapek).

In some embodiments, the number of identified candidates selected fordisplay by the facility is based on environmental information known orretrieved by the facility. For example the facility may obtain theenvironmental information from an external service, such information mayinclude threat levels issued by the military or DHS. When the threatlevel is high, the facility may display additional candidates to theoperator. In some embodiments, the user interface is configurable. Thefacility may display multiple candidates or acts (criminal or other) tothe operator.

The terminology used in the description presented below is intended tobe interpreted in its broadest reasonable manner, even though it isbeing used in conjunction with a detailed description of certainspecific embodiments of the invention. Certain terms may even beemphasized below; however, any terminology intended to be interpreted inany restricted manner will be overtly and specifically defined as suchin this Detailed Description section.

Various embodiments of the invention will now be described. Thefollowing description provides specific details for a thoroughunderstanding and enabling description of these embodiments. One skilledin the art will understand, however, that the invention may be practicedwithout many of these details. Additionally, some well-known structuresor functions may not be shown or described in detail, so as to avoid anyunnecessarily obscuring the relevant description of the variousembodiments.

FIG. 1 illustrates a scanning device 100 that may be used to scan anidentification record 105 containing machine-readable identificationinformation 110. When an individual provides an operator of scanningdevice 100 with identification record 105, the operator may scan theidentification record and determine the status of the individual. Withscanning device 100, for example, the operator may determine that theindividual is a suspected terrorist, has an outstanding warrant, or isotherwise wanted by the authorities. Further details about the scanningdevice will be provided herein.

Identification record 105 may be a driver's license or other form ofidentification record containing machine-readable identificationinformation 110. In some embodiments, for example, identification record105 may be a military or federal government identification document(“ID”), state or local government ID, passport, RFID chip, or corporateID. In some embodiments, the identification record includes one or moreportions of human-readable information 115. Identification record 105may include information such as the individual's name, address, DOB,signature, or physical characteristics. In some embodiments,identification record 105 includes a photograph 120 of the individual.The information on the identification record may be stored ashuman-readable information, as machine-readable information, or as bothhuman-readable and machine readable information.

FIG. 2 is a block diagram that illustrates various components orservices that are part of or interact with a dynamic identity matchingfacility. A scanning device 100, an identity matching service 200, athreat indicator service 205, and a plurality of data sources 210 mayexchange data through a wired or wireless network 215 in order to enablethe facility to dynamically identify persons of interest.

Scanning device 100 shows some of the components that may beincorporated in a device on which the facility executes. Scanning device100 includes one or more scanning components 220. For example, thescanning device may include a digital scanner, a magnetic reader, aone-dimensional (“1D”) bar code scanner, a two-dimensional (“2D”) barcode scanner, an RFID reader, or other scanning component. The scanningdevice may also include one or more central processing units (CPUs) 225for executing computer programs; a persistent storage component 230,such as a hard drive for persistently storing programs and data; acomputer memory 235 for storing programs and data while they are beingused; a computer-readable media drive 240 for reading programs and datastored on a computer-readable medium; a communications component 245 forconnecting the scanning device to other computer systems; and one ormore input/output components 250, such as a display, keyboard, or touchscreen; all of which may exchange data via a bus 255 or othercommunication path. While scanning devices configured as described aboveare typically used to support the operation of the facility, thoseskilled in the art will appreciate that the facility may be implementedusing devices of various types and configurations, and having variouscomponents.

In some embodiments, scanning device 100 executes an identity matchingprogram 260 to determine the status of an individual based on thescanned identification information. Information records identifyingpersons of interest may be stored locally on scanning device 100 and/orbe accessed remotely by the scanning device. For example, the scanningdevice may include a database (not shown) containing identificationrecords from one or more data sources, such as identification recordsmirrored from a remote data store 265. As another example, the scanningdevice may not maintain a local database and instead may access remotedata store 265 through a public or private network 215. The persons ofinterest data store is a database of individuals having one or morecriminal or other acts that cause them to raise heightened concern forsecurity purposes. In addition to a record of the criminal and otheracts of each individual, the persons of interest data store includestypical characterizing information about the individual, such as apicture, name, DOB, gender, height, weight, eye color, address, etc.

The information records contained in the persons of interest data storeare used by the identity matching program to identify individuals ofinterest. In some embodiments, the facility calls a remote identitymatching service 200 to determine the status of an individual based onthe scanned identification information. In some embodiments, thefacility may invoke a local identity matching program 260 to determinethe status of an individual based on the scanned identificationinformation. It will be appreciated that the identity matching serviceand the identity matching program may also work in combination toprocess identity information and identify individuals of interest. Theactions taken by the facility to determine the status of an individualis described further herein.

While various embodiments are described in terms of the environmentdescribed above, those skilled in the art will appreciate that thefacility may be implemented in a variety of other environments includinga single monolithic computer system, as well as various othercombinations of computer systems or similar devices connected in variousways.

FIG. 3 is a flow chart showing actions performed by the facility toidentify persons of interest based on identification information. Atblock 300 the facility receives scanned identification information. Atblock 305, the facility decodes the scanned identification information.In some embodiments, the facility parses the decoded identificationinformation into one or more query fields. For example, when an operatorscans identification record 105 containing machine-readableidentification information 110, the facility may parse the decodedinformation into a query name field, query license number field, queryDOB field, query image field, query gender field, query height field,query weight field, query eye color field, query address field, etcetera.

At block 310, the facility retrieves environmental information.Environmental information may be retrieved from local or remote datasources. For example, the facility may ascertain the threat level issuedby DHS. The Homeland Security Advisory System is a color-coded threatadvisory scale, consisting of five color-coded threat levels: red(severe risk), orange (high risk), yellow (significant risk), blue(general risk), and green (low risk). The different levels triggerspecific actions by federal agencies and state and local governments.Typical actions include increasing police and other security presence atlandmarks and other high-profile targets, more closely monitoringinternational borders and other points of entry, etc. The facility mayascertain environmental information from a number of agencies and/ornews facilities, and is not limited to DHS. As another example, thefacility may retrieve the details of an AMBER Alert.

The environmental information used by the facility may be updated inreal-time, in near real-time, or on a periodic or sporadic basis. Forexample, the facility may send a query to a service to receive thethreat level issued by DHS each time that it receives scannedidentification information. As another example, the facility may receivea periodic (e.g., hourly, daily) data feed from the DHS or from anotherservice that contains the threat level. The threat level is stored bythe facility and continued to be used until an updated threat level isreceived. As yet another example, the threat level may be queried by thefacility on a daily basis and used until a new threat level is obtained.

The environmental information considered by the facility may be a singlethreat level provided by a service, or it may encompass multiple pieceof information derived from a variety of sources. For example, thefacility may take into account a national government threat level, atime of day, a regional warning, and a report of two incidents (e.g.robberies) that took place in proximity to the scanning device. Thefacility may apply various weighting factors to each of the pieces ofinformation to arrive at an overall assessment of the threat level forsubsequent processing.

At block 315, the facility identifies a number of potential candidatesthat match the identity of the individual with the ID based on thedecoded identification information. The facility identifies candidatesbased on how closely the candidate name matches the query name. In someembodiments, the facility identifies the candidates using a fuzzy namematching algorithm. The identified candidates may match the decodedidentification information exactly or approximately. The facility mayuse a number of techniques individually or in combination to identifycandidates. For example, the facility may identify candidates using thebitap algorithm. The bitap algorithm is a fuzzy matching algorithm thatdetermines whether a query string is approximately equal to a selectedstring based on the minimum number of operations necessary to transformone string into the other, where an operation is an insertion, deletion,or substitution of a single character. If the query string and patternare within a predefined distance k of each other, then the bitapalgorithm considers them approximately equal.

In some embodiments, the facility identifies the candidates byphonetically encoding the decoded identification information to captureits phonetic representation. The Soundex algorithm or InternationalPhonetic Alphabet (IPA) algorithm are examples of phonetic algorithmsthat may be used to normalize spelling errors or detect variants. Insome embodiments, the facility selects a phonetic algorithm based on theorigin of the query name. The facility may also identify candidates byconsidering variants of a query name; for example, Finetta is a variantof Josephine.

The number of candidates identified by the facility may be predefined.For example, the facility may be configured to identify a minimum ormaximum number of candidates. In some embodiments, the number ofidentified candidates is based on environmental information known orretrieved by the facility. For example, the facility may identify agreater number of candidate records when the threat level is high, and alesser number of candidates when the threat level is low. By varying thenumber of candidates that are identified for processing by the facility,the facility may increase the likelihood of locating a match. A greaternumber of candidates, however, may result in lengthier processing timesthat could potentially impact the number of individuals that can beprocessed by an operator.

At block 320, for each identified candidate, the facility generates acandidate score based on the sum of scores calculated at blocks 320 a,320 b, . . . , 320 z. Each of the scores calculated at blocks 320 a, 320b, . . . 320 z may be weighted depending on how strongly the score iscorrelated with a potential candidate match. The overall candidate scoreindicates how likely the candidate record and the scanned identificationrecord identify the same individual.

At block 320 a, the facility calculates a gender score based on howclosely the candidate's gender matches the query gender. For example,when the candidate's gender matches the query gender, the facility mayassign a higher score than when the there is no match or when the genderof the candidate is unknown. In some embodiments, when a candidaterecord indicates that a candidate uses gender disguises or aliases, thefacility may assign the same score regardless of whether the querygender is male, female, or unknown.

At block 320 b, the facility calculates a DOB score based on how closelythe candidate's DOB matches the query DOB. The candidate's DOB may matchthe query DOB exactly or approximately. In some embodiments, thefacility uses a fuzzy matching algorithm to calculate the DOB score. Forexample, when the candidate's DOB matches a portion of the query DOB(e.g., day and month), the facility may assign a higher score than whenthere is no match. In some embodiments, the facility may assume a matchfor a portion of the query DOB when the query DOB is not within anacceptable range. For example, when the query DOB is Mar. 32, 1980, thefacility may assign the same score to all identified candidates having aDOB in March 1980.

At block 320 c, the facility calculates a population score based on thefrequency of the query name within the population. For example, a queryname having a high frequency within a population (e.g., John Smith) maybe scored lower than a query name having a low frequency within thepopulation (e.g., Walentia Knapek). In some embodiments, the populationfrom which the frequency data is derived may be the persons of interestdata store from which the candidate records are identified.

At block 320 d, the facility calculates a physical description scorebased on how closely the candidate's physical description matches thequery physical description. For example, the facility may compare thecandidate's height, weight, eye color, hair color, etc. In someembodiments, when calculating the candidate physical description score,the facility values certain characteristics over others. For example, amatch relating to height may be assigned a higher score than a matchrelating to hair color because hair color (unlike height) is easilychanged. In some embodiments, the facility uses fuzzy matchingtechniques to calculate the physical description score. For example,when the candidate height is within 2-3 inches of the query height, thefacility may assign a higher score than when the candidate heightoutside of an acceptable range. As another example, the facility mayassign a high score when the query hair color is red and an identifiedcandidate's hair color is indicated as blonde and/or red.

Other scores may be calculated for the individual. In some embodiments,each candidate score may also include a name matching score indicatinghow closely the candidate's name matches the query name. The namematching score may be based in whole or in part on the methodology usedby the facility at block 315, or it may be generated independently fromthe facility's identification of candidate records.

At block 325, the facility determines whether there are remainingcandidates for which candidate scores have not been calculated. If thereare remaining candidates, the facility returns to block 320 to generatethe next candidate's score. Otherwise, the facility continues to block330 to select the candidates for display. In some embodiments, thefacility selects candidate for display based on the candidate scores.For example, the facility may select only candidate records scoringabove a predefined threshold candidate score. When very few (or no)candidate records are selected for display, the operator may elect tolower the threshold candidate score to select candidates for display. Insome embodiments, the number of candidates selected for display ispredefined. For example, the facility may be configured to select aminimum or maximum number of candidates for display (with or withoutregard to a threshold candidate score).

In some embodiments, the number and type of candidates that are selectedfor display may be based on the retrieved environmental information. Byvarying the number of candidates that are displayed to the operator, thefacility allows a greater or lesser degree of scrutiny to be applied tothe individual being verified. In times of an increased threat level,operators may desire to see a greater number of candidates even thoughit may slow down processing of a particular individual. In times of areduced threat level, operators may desire to see a lesser number ofcandidates to increase the number of individuals that can be processed,provided that overall security is not unreasonably lowered. The facilitymay also select the candidates to display based on the type of threatpresented. For example, when the facility detects an AMBER Alert, it mayprioritize the selection of records identifying candidates suspected,charged, or convicted of kidnapping or other crimes involving children.As another example, when the facility detects a threat level indicatinga severe risk of a terrorist attack, the facility may prioritize thesection of records identifying candidate suspected, charged, orconvicted of acts involving terrorism.

At block 335, if a selected candidate has more than one criminal orother act, the facility prioritizes the display of the criminal or otheracts associated with the selected candidate. In some embodiments, thefacility ranks the candidate's criminal or other acts according to apredetermined order. For example, if a record indicates that a candidateis both a terrorist (Terrorist BOLO) and has an outstanding arrestwarrant for felony embezzlement (Non-Violent BOLO), the facility mayselect for display first an indication that the candidate is a TerroristBOLO and second an indication that the candidate is a Non-Violent BOLO.In some embodiments, candidate's acts are ranked according to thehighest threat presented by the candidate. This rank order may beconfigured dynamically in some circumstances, and/or it may be based inpart on environmental information known to the facility. After block335, the facility returns.

Those skilled in the art will appreciate that the blocks shown in FIG. 3may be altered in a variety of ways. For example, the order of blocksmay be rearranged; substeps may be performed in parallel; shown blocksmay be omitted; or other blocks may be included; etc.

FIGS. 4A, 4B, 4C, and 4D show sample screenshots presented as part ofthe user interface. In particular, displays 400 a, 400 b, 400 c, and 400d are representative screen images that may be displayed by the facilityafter the scan of an identification record 105 by an operator ofscanning device 100. Candidate records 405 a, 405 b, 405 c, . . . 405 zhave been identified and selected for display by the facility based atleast in part on the scanned machine-readable identification information110. An image of each candidate may be displayed, along with one or morepieces of data that may be used to identify the candidate. For example,the first name, last name, date of birth, age, sex, and other featuresmay be displayed to the operator. In addition, the highest prioritycriminal or other act selected by the facility is displayed to theoperator. The operator may select other acts associated with thecandidate by selecting a forward control 425 or backward control 430.

The operator can navigate among various candidate records that arechosen for display by the facility using controls 410 and 415. Pressingthe next control 410 causes the operator to see the next candidateselected for display by the facility. Pressing the back control 415causes the operator to see the previous candidate selected for display.One skilled in the art will appreciate that the user interface could beimplemented in a variety of ways to enable an operator to navigate amongrecords. Scroll bars, for example, could be provided. FIGS. 4A and 4Bshow how an operator navigated from a first record 405 a shown indisplay 400 a to a second record 405 b shown in display 400 b using thecontrol 410 of display 400 a.

In some embodiments, the operator establishes preferences by providingan operator profile indicating the operator's preferred display viewsand/or display controls. For example, an operator may indicate that heor she prefers to view a single matching candidate record and a singleact per display (as is shown in FIGS. 4A and 4B). As another example,the operator may indicate that he or she prefers to view multiplematching candidate records and a single act for each candidate perdisplay (as shown in FIG. 4C), or a single matching candidate record andmultiple acts per display (as shown in FIG. 4D). One skilled in the artwill understand that an operator may establish a variety of viewingpreferences. Some operators may prefer to switch between views, suchthat the first display provides an overview of matching records (asshown in FIG. 4C), while subsequent views permit the operator to drilldown into the details of each record (as shown in FIGS. 4A, 4B, and 4D).

In some embodiments, the operator can add (or delete) display fields,such as a field that shows the candidate score (not shown). The operatormay also establish a display preference that does not display fields forwhich the information in unknown to the facility. For example, if thisdisplay preference were activated for display 400 a, the ID# field forrecord 405 a would not display because the facility does not have an IDnumber associated with that candidate.

In some embodiments, additional information describing the threat orthreats presented by a candidate may be provided by the facility. Forexample, the operator may learn additional details regarding thecriminal or other acts of a candidate by using a control 435 to navigateto a detailed record display (not shown). In some embodiments, thesedetails are retrieved dynamically by the facility from a remote servicewhen they are requested by the operator. In other embodiments, thesedetails (or details for particular types of threats) are stored locallyon the scanning device.

In some embodiments, an operator may take an action after viewing thecandidate record, such as detaining the individual or taking a pictureof the individual. When the operator takes an action based upon thequery results, the operator may record the actions taken by navigatingto a display that provides an input mode (not shown) using control 440.For example, the operator may record a description of the circumstancesunder which he or she has detained Joe Doe. In some embodiments, thefacility may inform the relevant authorities of the actions taken by theoperator. In some embodiments, the facility automatically informs someor all relevant authorities when the operator indicates that actionshave been taken with respect to a particular candidate record. Forexample, when the operator indicates that Joe Doe has been detained, thefacility may transmit a message to the FBI agencies in Buffalo andDetroit if Joe Doe is on a list of parties wanted by the FBI.

From the foregoing, it will be appreciated that specific embodiments ofthe invention have been described herein for purposes of illustration,but that various modifications may be made without deviating from thespirit and scope of the invention. Accordingly, the invention is notlimited except as by the appended claims.

1. A method in a computing system of identifying one or more persons ofinterest that may reflect the identity of an individual, comprising:receiving identification information associated with an individual froma portable identification device; receiving environmental information,wherein the environmental information is indicative of a level ofscrutiny that is to be applied to the received identificationinformation for a location in which the portable identification deviceis operating; identifying a plurality of candidates by matching thereceived identification information with candidate informationassociated with each of the plurality of candidates; generating acandidate score for each of the plurality of identified candidates, thecandidate score based on a comparison of the candidate information andthe received identification information; and identifying one or more ofthe plurality of candidates as persons of interest that may reflect theidentity of the individual based on the generated candidate score andthe received environmental information.
 2. The method of claim 1 furthercomprising displaying one or more of the identified persons of interest.3. The method of claim 2 wherein two or more identified persons ofinterest are displayed on a single display screen of the portableidentification device.
 4. The method of claim 2 wherein an operator ofthe portable device can configure the number of displayed candidates. 5.The method of claim 1 further comprising: selecting one or more actsassociated with each identified person of interest for which the personof interest is suspected, charged, or convicted; and ranking the one ormore selected acts.
 6. The method of claim 5 wherein the selected actsare ranked based upon the received environmental information.
 7. Themethod of claim 5 further comprising displaying the one or moreidentified persons of interest, wherein each displayed person ofinterest includes an indication of at least one of the selected actsassociated with the person of interest.
 8. The method of claim 1 whereinthe comparison of the candidate information and the received informationcomprises comparing at least a portion of the candidate information witha portion of the individual identification information.
 9. The method ofclaim 8 wherein the portion of the candidate information matches theportion of the individual identification information.
 10. The method ofclaim 1 further comprising identifying the plurality of candidates basedin part by the received environmental information.
 11. The method ofclaim 1 wherein the environmental information is received via a webservice.
 12. The method of claim 1 wherein the environmental informationis received by retrieving the environmental information from a memory ofthe portable device.
 13. The method of claim 1 wherein the environmentalinformation comprises an alert issued by a government authority.
 14. Themethod of claim 13 wherein the alert indicates a probability of aterrorist attack.
 15. The method of claim 13 wherein the alert is anAMBER Alert.
 16. The method of claim 1 wherein generating a candidatescore comprises: parsing the received identification information intoone or more portions of identification information; comparing the one ormore portions of parsed identification information to corresponding oneor more portions of categorized candidate information and calculating aportion score based on the comparison; and summing each calculatedportion score to generate the candidate score.
 17. The method of claim16 wherein the one or more portions of identification informationcomprise at least one of a name, an identification number, a date ofbirth, a image, an address, an alias, a nationality, a height, a weight,a hair color, an eye color, a gender, a race, or an act.
 18. The methodof claim 16 wherein generating the candidate score for each of theplurality of identified candidates further comprises comparing thereceived environmental information to one or more acts associated witheach candidate.
 19. The method of claim 18 wherein the candidate scoreis increased when the received environmental information relates to atleast one act associated with each candidate.
 20. The method of claim 16wherein the candidate score for each identified candidate further takesinto account a population score, and wherein the population score isgenerated by determining a frequency of at least one name of thecandidate within a population.
 21. The method of claim 1 wherein thenumber of identified candidates is based in part on the receivedenvironmental information.
 22. A system for identifying one or morepersons of interest that may reflect the identity of an individual,comprising: a receiver for: receiving identification informationassociated with an individual from a portable identification device; andreceiving environmental information, wherein the environmentalinformation is indicative of a level of scrutiny that is to be appliedto the received identification information for a location in which theportable identification device is operating; and a processing componentfor: identifying a plurality of candidates by matching the receivedidentification information with candidate information associated witheach of the plurality of candidates; generating a candidate score foreach of the plurality of identified candidates, the candidate scorebased on a comparison of the candidate information and the receivedidentification information; and identifying one or more of the pluralityof candidates as persons of interest that may reflect the identity ofthe individual based on the generated candidate score and the receivedenvironmental information.
 23. The system of claim 22 further comprisinga display screen for displaying one or more of the identified persons ofinterest.
 24. The system of claim 23 wherein two or more identifiedpersons of interest are displayed on the display screen.
 25. The systemof claim 23 wherein an operator of the portable device can configure thenumber of displayed candidates.
 26. The system of claim 22 wherein theprocessing component further selects one or more acts associated witheach identified person of interest for which the person of interest issuspected, charged, or convicted, and ranks the one or more selectedacts.
 27. The system of claim 26 wherein the selected acts are rankedbased upon the received environmental information.
 28. The system ofclaim 26 further comprising a display screen for displaying the one ormore identified persons of interest, wherein each displayed person ofinterest includes an indication of at least one of the selected actsassociated with the person of interest.
 29. The system of claim 22wherein the comparison of the candidate information and the receivedinformation comprises comparing at least a portion of the candidateinformation with a portion of the individual identification information.30. The system of claim 29 wherein the portion of the candidateinformation matches the portion of the individual identificationinformation.
 31. The system of claim 22 wherein the processing componentfurther identifies the plurality of candidates based in part by thereceived environmental information.
 32. The system of claim 22 whereinthe environmental information is received via a web service.
 33. Thesystem of claim 22 further comprising a memory, wherein theenvironmental information is received by retrieving the environmentalinformation from the memory.
 34. The system of claim 22 wherein theenvironmental information comprises an alert issued by a governmentauthority.
 35. The system of claim 34 wherein the alert indicates aprobability of a terrorist attack.
 36. The system of claim 34 whereinthe alert is an AMBER Alert.
 37. The system of claim 22 wherein theprocessing component generates a candidate score by: parsing thereceived identification information into one or more portions ofidentification information; comparing the one or more portions of parsedidentification information to corresponding one or more portions ofcategorized candidate information and calculating a portion score basedon the comparison; and summing each calculated portion score to generatethe candidate score.
 38. The system of claim 37 wherein the one or moreportions of identification information comprise at least one of a name,an identification number, a date of birth, a image, an address, analias, a nationality, a height, a weight, a hair color, an eye color, agender, a race, or an act.
 39. The system of claim 37 wherein theprocessing component further generates the candidate score for each ofthe plurality of identified candidates by comparing the receivedenvironmental information to one or more acts associated with eachcandidate.
 40. The system of claim 39 wherein the candidate score isincreased when the received environmental information relates to atleast one act associated with each candidate.
 41. The system of claim 37wherein the candidate score for each identified candidate further takesinto account a population score, and wherein the population score isgenerated by determining a frequency of at least one name of thecandidate within a population.
 42. The system of claim 22 wherein thenumber of identified candidates is based in part on the receivedenvironmental information.
 43. A method in a computing system ofidentifying one or more persons of interest that may reflect theidentity of an individual, comprising: receiving identificationinformation associated with an individual; receiving environmentalinformation, wherein the environmental information is indicative of alevel of scrutiny that is to be applied to the received identificationinformation; identifying information associated with one or morecandidates, wherein the identified candidate information is similar tothe received identification information; and identifying one or morecandidates as persons of interest that may reflect the identity of theindividual, wherein the identified persons of interest are based on thereceived environmental information and a comparison of the receivedidentification information and the candidate information of eachcandidate.
 44. The method of claim 43 wherein the identificationinformation is received from a scanning component of a computing system.45. The method of claim 44 wherein the scanning component comprises adigital scanner, a camera, a magnetic strip reader, an optical characterreader, a bar code scanner, or an RFID reader.
 46. The method of claim44 wherein the received identification information was scanned from anidentification record.
 47. The method of claim 46, wherein theidentification record is a state ID, a military ID, a passport, acorporate ID, or an RFID chip.
 48. The method of claim 44 wherein anoperator of the computing system can configure the number of identifiedpersons of interest.
 49. The method of claim 43 further comprisingidentifying one or more acts associated with each identified person ofinterest.
 50. The method of claim 49 further comprising displaying twoor more identified persons of interest and displaying at least one ofthe one or more acts associated with each displayed persons of interest.51. The method of claim 50 wherein the two or more persons of interestare displayed sequentially.
 52. The method of claim 50 wherein the twoor more persons of interest are displayed side-by-side.
 53. The methodof claim 50 wherein the displayed one or more acts are ranked based onseverity.
 54. The method of claim 50 wherein the displayed one or moreacts are further ranked based on the received environmental information.55. The method of claim 43 wherein the one or more candidates areidentified based on the received environmental information.
 56. Themethod of claim 43 wherein the environmental information comprises analert.
 57. The method of claim 43 wherein the comparison of the receivedidentification information and the candidate information of eachcandidate comprises measuring a difference between the interpretedidentification information and the corresponding candidate information.58. The method of claim 57 wherein the candidate information comprisesat least one of a name, an identification number, a date of birth, animage, an address, an alias, a nationality, a height, a weight, a haircolor, an eye color, a gender, a race, or an offense.
 59. A portablesystem for identifying one or more persons of interest that may reflectthe identity of an individual, comprising: a receiving component forreceiving identification information associated with an individual andenvironmental information, wherein the environmental information isindicative of a level of scrutiny that is to be applied to the receivedidentification information; and a matching component for: identifyinginformation associated with one or more candidates, wherein theidentified candidate information is similar to the receivedidentification information; and identifying one or more candidates aspersons of interest that may reflect the identity of the individual,wherein the identified persons of interest are based on the receivedenvironmental information and a comparison of the receivedidentification information and the candidate information of eachcandidate.
 60. The portable system of claim 59 further comprising ascanning component for scanning identification information and providingthe identification information to the receiving component.
 61. Theportable system of claim 60 wherein the scanning component comprises adigital scanner, a camera, a magnetic strip reader, an optical characterreader, a bar code scanner, or an RFID reader.
 62. The portable systemof claim 60 wherein the received identification information was scannedfrom an identification record.
 63. The portable system of claim 62,wherein the identification record is a state ID, a military ID, apassport, a corporate ID, or an RFID chip.
 64. The portable system ofclaim 60 wherein an operator of the portable system can configure thenumber of identified persons of interest.
 65. The portable system ofclaim 59 wherein the matching component further identifies one or moreacts associated with each identified person of interest.
 66. Theportable system of claim 65 further comprising a display component thatdisplays two or more identified persons of interest and at least one ofthe one or more acts associated with each displayed persons of interest.67. The portable system of claim 66 wherein the two or more persons ofinterest are displayed sequentially.
 68. The portable system of claim 66wherein the two or more persons of interest are displayed side-by-side.69. The portable system of claim 66 wherein the displayed one or moreacts are ranked based on severity.
 70. The portable system of claim 66wherein the displayed one or more acts are further ranked based on thereceived environmental information.
 71. The portable system of claim 59wherein the one or more candidates are identified based on the receivedenvironmental information.
 72. The portable system of claim 59 whereinthe environmental information comprises an alert.
 73. The portablesystem of claim 59 wherein the comparison of the received identificationinformation and the candidate information of each candidate comprisesmeasuring a difference between the interpreted identificationinformation and the corresponding candidate information.
 74. Theportable system of claim 73 wherein the candidate information comprisesat least one of a name, an identification number, a date of birth, animage, an address, an alias, a nationality, a height, a weight, a haircolor, an eye color, a gender, a race, or an offense.
 75. A method in acomputing system of displaying one or more persons of interest that mayreflect the identity of an individual on a display of a computingsystem, comprising: receiving identification information about anindividual; receiving environmental information, wherein theenvironmental information is indicative of a level of scrutiny that isto be applied to the received identification information; identifyinginformation associated with one or more candidates, wherein at least aportion of the identified candidate information is similar to a portionof the received identification information; ranking the one or moreidentified candidates based on the similarity between one or moreportions of the candidate information for each candidate and thereceived identification information; and displaying a number of theranked candidates as persons of interest based on the ranking of eachidentified candidate and the received environmental information.
 76. Themethod of claim 75 further comprising displaying one or more actsassociated with each of the identified persons of interest, wherein anact is an event in which the corresponding person of interest issuspected, charged, or convicted.
 77. The method of claim 76 wherein theacts are ranked based on predetermined criteria and the receivedenvironmental information.
 78. The method of claim 75 wherein thepersons of interest are displayed sequentially.
 79. The method of claim75 wherein a plurality of the persons of interest are displayedside-by-side.
 80. The method of claim 75 further comprising allowing anoperator to select one or more types of candidate information to displayfor each displayed person of interest.