Automated security scanning process

a security scanning and automatic technology, applied in the field of terrorist threat detection systems, can solve the problems of no human alternative that can prove efficient and effective, and achieve the effects of reducing the effects of human complacency and loss of attention to detail, empowering the human operator, and increasing the human operator's identification ability

Inactive Publication Date: 2004-10-05
THE GOVERNMENT OF THE US SEC THE AIR FORCE
View PDF2 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This invention automates a portion of the existing process by applying computerized comparative assessment program to the image presented on the operator's viewing screen. This is accomplished by creating a computerized image database of all known weapons and dangerous items. At the same time the scanned container's contents data is converted to the image presented on the operator's viewing screen, the same data is computer compared to the weapons database. Just as the human mentally compares learned weapons database against what he or she sees on the monitor, the computer accomplishes the same process, except much more timely and accurately. When the computer identifies data from the scanned image that correlates to it's prohibited items database, it alerts the security operator by any number of common means and highlights the image on the security operator's monitor.
The invention/process allows mo...

Problems solved by technology

With advent of low cost-high powered computers with extensive data storage capacity, there is no human alternati...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automated security scanning process
  • Automated security scanning process
  • Automated security scanning process

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

This invention automates a portion of the existing process by applying a computerized comparative assessment program to the image presented on the operator's viewing screen. This is accomplished by creating a computerized image database of all known weapons, dangerous articles, and other prohibited items. At the same time the scanned container's contents data is converted to the image presented on the operator's viewing screen, the same data is computer compared to the weapons database. Just as the human mentally compares learned weapons database against what he or she sees on the monitor, the computer accomplishes the same process, except much more timely and accurately. When the computer identifies data from the scanned image that correlates to it's prohibited items database, it alerts the security operator by any number of common means and highlights the image on the security operator's monitor.

FIG. 1 is an illustration of the prior art x-ray luggage inspection system. Referring ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention automates a portion of the existing process by applying computerized comparative assessment program to the image presented on the operator's viewing screen. This is accomplished by creating a computerized image database of all known weapons, dangerous articles, and other prohibited items. At the same time the scanned container's contents data is converted to the image presented on the operator's viewing screen, the same data is computer compared to the weapons database. Just as the human mentally compares learned weapons database against what he or she sees on the monitor, the computer accomplishes the same process, except much more timely and accurately. When the computer identifies data from the scanned image that correlates to it's prohibited items database, it alerts the security operator by any number of common means and highlights the image on the security operator's monitor.

Description

BACKGROUND OF THE INVENTIONThe present invention relates generally to terrorist threat detection systems and more specifically to an airport automated security scanning process. The horror of the World Trade Center devastation and the attack on the Pentagon teaches us that automated security scanning in airports and other locations is a serious endeavor that needs priority. Requirement and process currently exists to inspect the inside of carry-on bags, luggage, and other containers to determine if weapons, dangerous articles, and other prohibited items are hidden within. This is generally accomplished by passing a container through and x-ray scanning machine while a security operator observes the container's contents on a monitor screen (such as the process generally observed at an airport security checkpoint). This is an effective process if / and only if the operator is fully trained, experienced, has the time needed to properly evaluate what he / she sees on the monitor, and last, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G01N23/02G01N23/04G01V5/00
CPCG01N23/04G01V5/0008
Inventor NEWMAN, GEORGE H.
Owner THE GOVERNMENT OF THE US SEC THE AIR FORCE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products