Security inspection device and method for identifying forbidden objects using same

A technology for equipment and articles, applied in the field of detection equipment, can solve the problems of inability to effectively detect explosives, prohibited drugs, labor costs, cumbersome and other problems, and achieve the effects of enhancing applicability, expanding scope and simple operation.

Inactive Publication Date: 2014-07-16
史崇政
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] That is to say, the existing security inspection equipment can only display the two-dimensional perspective image of the ray penetrating the inspected item, and this image needs professional image analysis personnel

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security inspection device and method for identifying forbidden objects using same
  • Security inspection device and method for identifying forbidden objects using same
  • Security inspection device and method for identifying forbidden objects using same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] figure 1 A schematic diagram of the composition of the security inspection equipment provided in this embodiment. Such as figure 1 As shown, in this embodiment, the security inspection equipment for identifying prohibited items includes: a detection unit 10, which is used to detect the items to be inspected; a data processing unit 20, which is used to receive the detection signal sent by the detection unit 10, and Analyzing and processing the detection signal to obtain an analysis result; the alarm unit 30 is configured to activate when the analysis result shows that the item to be inspected is a prohibited item, and alarm to remind relevant security personnel for further inspection.

[0025] Specifically, such as figure 1 As shown, the above-mentioned data processing unit 20 includes: a signal acquisition module 201, which is used to receive the above-mentioned detection signal; a signal analysis module 202, which is used to analyze the received detection signal and ...

Embodiment 2

[0032] image 3 A schematic diagram of the composition of the security inspection equipment provided in this embodiment, Figure 4 Then it is a flow chart of the identification method for identifying prohibited items by using the security inspection equipment of this embodiment. Such as image 3 As shown, the difference between the security inspection equipment provided in this embodiment and the first embodiment is that in this embodiment, the data processing unit 40 also includes a data correction module 405, which can be used to output the signal analysis module 402 The characteristic data is corrected according to the calibration standard and then output to the comparison module 403 for comparison.

[0033] Correspondingly, as Figure 4 As shown, the data processing step S2' in the identification method in this embodiment adds the operation of "correcting the above characteristic data according to the calibration standard" compared with the data processing step S2 in th...

Embodiment 3

[0036] This embodiment can be obtained by expanding on the basis of Embodiment 1 or 2; and in order to better explain the technical solution, the following takes Embodiment 2 as an example, and specifically describes the solution of this embodiment on the basis of it.

[0037] Figure 5a and 5b are respectively the disassembled schematic diagram and the overall appearance schematic diagram of the security inspection equipment provided in this embodiment, Figures 6a-6c It is the front view, side view and bottom view of the security inspection equipment. Among them, such as Figure 5a As shown, in addition to the components described in Embodiment 1 or Embodiment 2, the security inspection equipment also includes: a moving part 1, which can be composed of a conveying mechanism such as a conveyor belt, and is used to move the items to be inspected to the inspection area for inspection; The rolling part 2 rolls around the moving part 1 at a certain constant speed, and the dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a security inspection device used for identifying forbidden objects. The device comprises an inspection unit used for inspecting an object to be inspected, a data processing unit used for receiving an inspection signal of the inspection unit and analyzing and processing the inspection signal to obtain a result of comparison between the inspection signal and pre-stored reference data, and an alarm unit used for giving an alarm to remind people when the comparison result shows that the inspected object is a forbidden object. Furthermore, the invention provides a method for identifying forbidden objects using the security inspection device. By the adoption of the security inspection device and the identifying method, the problems of existing security inspection devices that only two-dimensional perspective images generated after rays penetrate through objects to be inspected can be displayed and forbidden objects such as explosives and drugs can not be inspected effectively are solved, objects to be inspected can be inspected and compared automatically and efficiently, the alarm unit can be started to remind security inspection staff when suspicious objects are found out, the object inspection range is widened, and applicability to different occasions is improved.

Description

technical field [0001] The present invention relates to a detection device, in particular to a security inspection device in the field of security inspection for detecting prohibited items and a method for identifying prohibited items using the security inspection device. Background technique [0002] With the continuous advancement of science and technology and the gradual deepening of international anti-terrorism operations, a relatively complete and comprehensive security system has been widely used in the security field of airports, docks, stations and other places. However, the current common security inspection equipment cannot meet the random needs of ordinary occasions. This is because: existing security inspection equipment generally only includes a conveyor belt for moving items, a security inspection scanner for scanning items, and a display screen for displaying scanning results. [0003] That is to say, the existing security inspection equipment can only displa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01V5/00
Inventor 史崇政
Owner 史崇政
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products