Security process and security tower controlling coming vehicles at checkpoint

A technology of safety procedures and checkpoints, which is applied in traffic control systems of road vehicles, traffic control systems, character and pattern recognition, etc. The effect of improving situational awareness

Inactive Publication Date: 2019-09-13
ATOS IT SOLUTIONS & SERVICES IBERIA SL
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the effectiveness of this prior art is limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security process and security tower controlling coming vehicles at checkpoint
  • Security process and security tower controlling coming vehicles at checkpoint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] figure 1 An example of a security program according to an embodiment of the present invention is shown.

[0045] The security program first executes three collection steps at the same time, vehicle information collection step 1, personal information collection step 2, and mobile phone information collection step 3.

[0046] In the vehicle information collection step 1, the collected vehicle information includes: vehicle license plate, vehicle type, vehicle color, vehicle brand, vehicle size and vehicle shape.

[0047] In personal information collection step 2, the collected personal information includes: the number of people entering the vehicle, the facial recognition of the driver entering the vehicle, and the facial recognition of all passengers entering the vehicle, including the driver entering the vehicle.

[0048] In mobile phone information collection step 3, the collected mobile phone information includes: the number of mobile phones entering the vehicle, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a security process, performing real time checking on vehicle coming at checkpoint, comprising: a collection phase (1, 2, 3) performed in checkpoint vicinity, an analysis phase (4, 5, 6, 7), including a step of assessing (7) similarity or not between a catalog of predetermined risk situations and coming vehicle global situation aggregating together collected vehicle and person and mobile phone information, a result phase (8) including triggering an alert being representative of at least one of alert triggering motive(s) having triggered this alert, a decision phase (9)transmitting said triggered alert to a human being in charge of security at checkpoint who will decide to stop or not said coming vehicle at checkpoint, based on said triggered alert.

Description

technical field [0001] The invention relates to the field of security procedures for real-time inspection of vehicles entering checkpoints, and to the field of security towers for implementing such security procedures. A vehicle may be, for example, a car or a truck or a bicycle, or more generally any vehicle that moves on a road and enters a checkpoint. Background technique [0002] When vehicles enter the checkpoint, compared with the in-service personnel who are responsible for the security of the checkpoint, there are a lot of vehicles entering, and most of them do not have any safety risks. [0003] However, those responsible for security at checkpoints will either be understaffed to have at least tentative control of all vehicles, or they will choose to skip most vehicles at a glance, risking overlooking potentially dangerous vehicles. [0004] To help those responsible for checkpoint security, such as border guards, there are automated security procedures that filter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q90/00G08B13/194G07C9/00
CPCG06Q90/00G08B13/196G08B13/19647G06Q50/265G07C9/22G08B19/00G08G1/0175G06V20/52G06V40/166G06V40/172H04N23/56H04N23/90
Inventor 佩德罗·卡萨泰贾达 赫雷拉
Owner ATOS IT SOLUTIONS & SERVICES IBERIA SL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products