This invention relates to air travel security, and more particularly to security methods and systems aimed at preventing the hijacking and terrorism of passenger flights.
Recently, and most notably since the Sep. 11, 2001 hijackings and terrorist attacks, security has become an ever growing concern at airports around the world. Security measures at major airports have increased significantly, in a variety of ways. The number of security checkpoints and personnel at these airports has grown, and security procedures are routinely implemented and universally applied. Individual passengers are being inspected thoroughly, along with their personal belongings, before they are allowed to board their flights. These and other precautions acts as both a protection and a deterrence against possible hijacker or terrorist activity, while also increasing vigilance among the passengers themselves.
Dispite these precautions, commercial airlines continue to face hijacking and terrorist threats, including the danger that a secret plot involving more than one conspirator may be initiated during the flight itself in an attempt to take over or damage the aircraft, or to harm its passengers. While airport security measures may succeed in thwarting one potential hijacker or terrorist in his or her attempt to board a flight with the means to carry out some ill intent, such security measures may not stop a whole group of accomplices who have planned together to coordinate their efforts. Coconspirators acting in concert may evade flight security personnel, while passengers remain unaware of the perpetrators' wrongful intentions. Therefore, the potential still remains that several hijackers or terrorists may successfully conspire together to seriously disrupt or take over a commercial flight, or otherwise put pasengers' lives at risk.
Bathrooms on board commercial flights allow individual passengers complete privacy. Hijackers or terrorists can take advantage of that privacy in order to assemble a bomb, or prepare some other device or means to aid their efforts. Although one potential hijacker or terrorist alone may not have all of the components necessary to prepare such device or means, several potential hijackers or terrorists, pooling their resources together, may indeed have all of the requisite components. Therefore, there exists a need for a security system that will restrict the possibility of several potential hijackers or terrorists gaining access to the same bathroom, thus minimizing the risk of a successful conspiracy to hijack or terrorize the flight. Without such a system, there remains a significant possibility that several parties may act together in secrecy, ultimately causing a significant, and potentially dangerous, disturbance to the flight.
The invention offers advantages over existing prior art by providing a preventive security system that limits the likelihood of more than one airline passenger gaining access to a particular bathroom at the same time, or several passengers using the same bathroom towards a common purpose. This system includes distributing alternating bathroom keys to passengers as they board their flight, and only allowing passengers access to the bathroom that corresponds to their key. The restriction of passenger bathroom use to one bathroom per passenger diminishes the possibility that several potential hijackers or terrorists will be able to act together to take over or terrorize the flight.
The effectiveness of this system does not require flight security personnel to identify or apprehend potential hijackers or terrorists before any suspicious activity has taken place. Rather, the system itself is designed to inhibit the plans of potential hijackers or terrorists, by preventing them from meeting together in private. Furthermore, by forcing potential hijackers or terrorists to act more conspicuously in attempting to coordinate their activities, this system helps identify potential hijackers and terrorists to flight security personnel, while also alerting observant passengers to the threat of imminent danger.
More specifically, embodiments disclosed herein provide that bathroom keys are to be distributed to passengers as they board their flight. One such key would act as a means of identifying a passenger and providing him or her with specific bathroom entry. With each key providing one passenger with access to one, and only one, bathroom on board the flight, the keys effectively restrict bathroom access to one bathroom per passenger. The identifier bathroom keys may be metal lock keys that can be used manually by passengers to open their respective bathroom doors, or the keys may be devices of more sophisticated technology. For example, the keys may be optical technology devices, such as Universal Product Code (UPC) barcodes. As another option, the keys may be electromagnetic technology devices, such as radio-frequency identification (RFID) transponders. Broadly speaking, a key may simply be defined as a means for enabling a passenger to enter the bathroom. As an example, one such means may be a discreetly listed combination, which a passenger might refer to in order to unlock a combination lock.
The keys shall be distributed according to a pattern, such that a first passenger receives a key for a bathroom at the front of the aircraft, a second passenger receives a key for a bathroom at the back of the aircraft, and if the aircraft is so equipped, a third passenger receives a key for a bathroom at the middle of the aircraft. This process is repeated for all passengers, as they line up to board the flight. In this manner, every passenger is given a bathroom key, to be returned at the end of the flight. Flight security personnel that are present during the distribution of bathroom keys may use their discretion concerning the order in which bathroom keys are distributed.
Along with a bathroom key, an instruction manual, such as a paper pamphlet, is to be distributed to each of the passengers, detailing the purpose of the security system, and explaining the importance of passenger awareness and active participation in the identification of suspicious behavior. Passengers are further instructed to cooperate with flight security personnel, and to alert them to any perceived security threats, so that flight security personnel can help prevent a possible hijacking or terrorist act.
This invention includes the ordered distribution of identifier keys, preferably barcodes affixed to passengers' boarding passes, along with communicated instructions and information, such as in a printed pamphlet, explaining the proper usage of the keys and the importance of proactive compliance with the instructions. Other embodiments, advantages and aspects of the invention may become apparent by reading the following detailed description, and by reference to the drawings. It is understood that changes may be made to particular embodiments described in the detailed description, without departing from the spirit of the invention.
The invention will be more fully understood from the following detailed description, in conjunction with the accompanying figures, wherein:
In the following detailed description of exemplary embodiments of the invention, reference is made to the accompanying drawings, which illustrate specific preferred embodiments in which the invention may be practiced. These embodiments are described in sufficient detail to enable those skilled in the art to practice the invention. It is to be understood that other embodiments may be utilized, and that logical and technical changes may readily be made without departing from the scope of the invention. Therefore, the following detailed description is not to be taken in a limiting sense, and the scope of the invention is to be limited only by the appended claims.
As used in this application, the terms “hijacker” and “terrorist” are used broadly, together referring to anyone who would deliberately seek to disrupt a commercial flight, or harm the flight's passengers, in any way. The term “airport security personnel” refers to any commercial airline employee responsible for the orderly boarding of passengers onto an aircraft for a safe and secure flight. The term “flight security personnel” refers to any personnel on board a commercial flight that are responsible for the safe and secure transportation of the flight's passengers. This includes, but is not limited to, undercover sky marshals, pilots, and flight attendants.
Referring to
Other alternatives to manually operable lock keys may include, but are not limited to, radio-frequency identification (RFID) transponders, also known as RFID tags or “proximity cards”. For example, passengers may be given proximity cards with which they can unlock their designated bathroom by bringing their card into sufficiently close proximity to a detecting antenna. One such antenna may be installed at each bathroom, and connected to a locking device that unlocks the bathroom door when the correct tag is detected by the antenna. Still other alternatives will become apparent to those skilled in the art of security systems for selective controlled access, such as the present invention.
In certain embodiments, including, for example, the manually operable lock key illustrated in
Alternatively, airport security personnel 400, 405 may have cause to be concerned about an entire group, and may therefore decide to change the distribution of keys in accordance with those concerns. Observant passengers may also aid airport security personnel 400, 405, by notifying them of any peculiar or otherwise suspicious behavior on the boarding line.
A master computer program can be implemented to enable the bathroom scanner and lock system, and also to update barcodes for each new flight. Furthermore, the computer program's central processing unit 550 can switch and rotate the bathroom letters, such that former bathroom “A” 520 becomes bathroom “C”, former bathroom “B” 530 becomes bathroom “A”, and former bathroom “C” 540 becomes bathroom “B”, for example. Each of the scanners 522, 532, 542 at the bathrooms 520, 530, 540 will then be set to read for a new barcode, and will signal to unlock their respective bathroom door only for that new barcode. For example, after one such switch, the scanner installed at former bathroom “B” 530 will then become the scanner for new bathroom “A”, and will function in the same manner that the scanner installed at former bathroom “A” 520 had been functioning, including prompting the bathroom lock 534 to unlock the bathroom door only for passengers who scan in a barcode designated for bathroom “A”. This switching mechanism can be implemented periodically during the flight, so that a passenger may be required to use a different bathroom during one trip to a bathroom area location than he or she used during a previous trip to that bathroom area location.
For each bathroom 520, 530, 540, a monitor 526, 536, 546 connected to the central processing unit 550 of the computer program may be used to display the letter of that bathroom at any given time. When the program switches and rotates the bathroom letters for the bathrooms, the monitors 526, 536, 546 can indicate the changes accordingly. For example, referring to
Passengers are also instructed to cooperate with flight security personnel in situations where a passenger exhibits suspicious behavior during a trip to the bathroom 650. Suspicious behavior during a trip to the bathroom 650 may include, but is not limited to: entering an unlocked bathroom door 652; interacting with another passenger while near the bathroom 654 or attempting to let another passenger into the bathroom 656; or leaving the bathroom door unlocked upon exiting the bathroom 658. If a passenger exhibits any or similar such behavior 650, other passengers witnessing such behavior once again should immediately alert a flight attendant or other flight security personnel 630, who will confiscate the passenger's bathroom key and boarding pass, and note the bathroom that the passenger was attempting to gain access to 620.
In each of the situations mentioned in connection with the accompanying flowchart in
Although specific embodiments have been illustrated and described herein, it will be appreciated by those of ordinary skill in the art that any arrangement that is calculated to achieve the same purpose may be substituted for the specific embodiments shown. This application is intended to cover any adaptations or variations of the present invention. Therefore, it is manifestly intended that this invention be limited only by the following claims, and equivalents thereof.