CN113640321A - Security check delay optimization method and device - Google Patents

Security check delay optimization method and device Download PDF

Info

Publication number
CN113640321A
CN113640321A CN202010395274.0A CN202010395274A CN113640321A CN 113640321 A CN113640321 A CN 113640321A CN 202010395274 A CN202010395274 A CN 202010395274A CN 113640321 A CN113640321 A CN 113640321A
Authority
CN
China
Prior art keywords
security
security check
metadata
data
check data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010395274.0A
Other languages
Chinese (zh)
Other versions
CN113640321B (en
Inventor
吴南南
吴凡
马艳芳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuctech Co Ltd
Original Assignee
Nuctech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuctech Co Ltd filed Critical Nuctech Co Ltd
Priority to CN202010395274.0A priority Critical patent/CN113640321B/en
Publication of CN113640321A publication Critical patent/CN113640321A/en
Application granted granted Critical
Publication of CN113640321B publication Critical patent/CN113640321B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N23/00Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00
    • G01N23/02Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material
    • G01N23/04Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material and forming images of the material
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/01Arrangements or apparatus for facilitating the optical investigation
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N2223/00Investigating materials by wave or particle radiation
    • G01N2223/10Different kinds of radiation or particles
    • G01N2223/101Different kinds of radiation or particles electromagnetic radiation
    • G01N2223/1016X-ray

Abstract

The present disclosure proposes a delay optimization method performed at a screening device, a screening device for delay optimization, a delay optimization method performed at a security device, and a security device for delay optimization. The delay optimization method executed at the open-circuit device comprises the following steps: receiving security check data in real time from one or more security check devices bound to the screening device; receiving metadata from a mapping device; and performing a checkin action when the metadata indicates a checkin. The delay optimization method executed at the security inspection equipment comprises the following steps: collecting security inspection data; and transmitting the collected security check data to the open inspection equipment bound with the security inspection equipment in real time while collecting the security check data.

Description

Security check delay optimization method and device
Technical Field
The present disclosure relates to the field of security inspection, and more particularly, to a delay optimization method performed at a screening device, a screening device for delay optimization, a delay optimization method performed at a security device, and a security device for delay optimization.
Background
A security inspection system is a detection device for detecting whether there are hidden contraband (e.g., guns, control tools, etc.) in people and/or baggage, and has wide application in public places with large pedestrian streams, such as airports, stations, large conferences, etc. In the scene, image data generated by a local security inspection machine is transmitted to a remote centralized image judging station for judging images, and the local open inspection station is in a standby state when no open inspection task exists. When the remote diagnostician marks a suspected object (e.g., luggage), the information is transmitted back to an inspection station near the security checkpoint site. And after receiving the inspection data, the inspection station acquires corresponding object scanning images and appearance images from corresponding security check point equipment according to the information, the acousto-optic prompt is triggered until all the data are successfully acquired, and all the information related to the inspected object is displayed on the inspection station and is used for assisting a local security inspector to intercept the suspected object and inspect the suspected object.
When the remote image judging personnel draw a conclusion of the examination, the examination starting station receives examination starting information of the image judging station and then starts to acquire appearance and scanning images, and the receiving process has obvious time consumption due to the fact that the scanning image data is large, so that the time for alarming and displaying of the examination starting station is obviously delayed compared with the examination starting time of the image judging personnel.
If the baggage does not finish scanning, a detection conclusion is made, at this time, the detection station needs to wait for the scanning to finish to successfully obtain a scanning image and an appearance photo, and then an alarm is triggered and displayed on a detection station interface, so that the delay of the detection station triggering the alarm is very large, and the detection station is influenced by the detection time.
In security inspection scenes such as urban rail transit and the like with high passenger flow density and high real-time requirement, the time available for a security inspection point local security inspector to identify and intercept luggage is very limited and generally can not exceed 4s, and at the moment, the delay of opening an inspection station can possibly cause that the security inspector can not intercept luggage before the luggage is taken by a passenger, thereby causing potential safety hazards.
Disclosure of Invention
To solve or at least alleviate one or more problems of the prior art, a delay optimization method performed at a screening device, a screening device for delay optimization, a delay optimization method performed at a security device, and a security device for delay optimization are proposed.
In one aspect of the present disclosure, a delay optimization method performed at a openness detection device is presented, which may include: receiving security check data in real time from one or more security check devices bound to the screening device; receiving metadata from a mapping device; and when the metadata indicates a check-in, performing a check-in action.
According to an embodiment of the present disclosure, the open inspection action may include triggering an alarm and/or displaying security inspection data identified by the metadata in the security inspection data.
According to an embodiment of the present disclosure, the method may further include: storing the received security check data in a memory.
According to an embodiment of the present disclosure, the method may further include: deleting the security check data identified by the metadata from the memory when the metadata indicates clearance.
According to an embodiment of the present disclosure, displaying the security inspection data identified by the metadata in the security inspection data may include: determining whether security check data identified by the metadata is present in the memory.
According to an embodiment of the present disclosure, displaying the security inspection data identified by the metadata in the security inspection data may further include: and if the security check data identified by the metadata exist in the memory, displaying the security check data identified by the metadata in the security check data.
According to an embodiment of the present disclosure, displaying the security inspection data identified by the metadata in the security inspection data may further include: if the security check data identified by the metadata does not exist in the memory, receiving the security check data identified by the metadata from a security check device identified by the metadata among the one or more security check devices, and displaying the received security check data in real time.
According to an embodiment of the present disclosure, the security data may include an X-ray scan image and/or an appearance image.
According to an embodiment of the present disclosure, the metadata may include indication information indicating open check or clear, and the metadata includes one or more of: the identification information of the security check data, the identification information of the security check device, and the identification information of the object associated with the security check data.
According to another aspect of the present disclosure, there is provided a delay optimization method performed at a security inspection device, which may include: collecting security inspection data; and transmitting the collected security check data to the open inspection equipment bound with the security check equipment in real time while collecting the security check data.
According to an embodiment of the present disclosure, the method may further include: and transmitting the collected security check data to the graph judging device bound with the security check device in real time while collecting the security check data.
According to an embodiment of the present disclosure, the security data comprises an X-ray scan image and/or an appearance image.
According to yet another aspect of the present disclosure, there is provided a method for delay optimization, comprising: a communication interface configured to: receiving security check data in real time from one or more security check devices bound to the screening device; and receiving metadata from the mapping device; a controller configured to determine whether the metadata indicates a check-in or a clear; an alert device configured to issue an alert when the metadata indicates a detection; and a display device configured to display the security check data identified by the metadata in the security check data when the metadata indicates a check-out.
According to an embodiment of the present disclosure, the open inspection apparatus may further include a memory configured to store the received security inspection data.
According to an embodiment of the present disclosure, when the metadata indicates a pass, the security check data identified by the metadata is deleted from the memory.
According to an embodiment of the present disclosure, the controller may be further configured to: determining whether security check data identified by the metadata is present in the memory.
According to an embodiment of the present disclosure, if the controller determines that security check data identified by the metadata exists in the memory, the controller causes the display device to display security check data identified by the metadata among the security check data.
According to an embodiment of the present disclosure, if the controller determines that the security check data identified by the metadata does not exist in the memory, the controller causes the communication interface to receive the security check data identified by the metadata from the security check device identified by the metadata among the one or more security check devices, and causes the display apparatus to display the received security check data in real time.
According to an embodiment of the present disclosure, the security data may include an X-ray scan image and/or an appearance image.
According to an embodiment of the present disclosure, the metadata may include indication information indicating open check or clear, and the metadata includes one or more of: the identification information of the security check data, the identification information of the security check device, and the identification information of the object associated with the security check data.
According to yet another aspect of the present disclosure, a security inspection apparatus for delay optimization is proposed, including: an imaging device configured to acquire security data; and a controller configured to transmit the collected security check data to a security check device bound to the security check device in real time while collecting the security check data.
According to an embodiment of the present disclosure, the controller may be further configured to: and transmitting the collected security check data to the graph judging device bound with the security check device in real time while collecting the security check data.
According to an embodiment of the present disclosure, the security data may include an X-ray scan image and/or an appearance image.
Drawings
For a better understanding of the present disclosure, reference will be made to the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 shows a block diagram of a security check system for delay optimization according to an example embodiment of the present disclosure;
FIG. 2 shows a block diagram of a security device for delay optimization according to an example embodiment of the present disclosure;
FIG. 3 shows a block diagram of a device for delay-optimized turn-on detection according to an example embodiment of the present disclosure;
fig. 4 shows a flow diagram of a method for delay optimization performed at a security device according to an example embodiment of the present disclosure;
fig. 5 shows a flow diagram of a method for delay optimization performed at a openness detection device according to an example embodiment of the present disclosure; and
fig. 6 shows a flow diagram of a method for delay optimization performed at a openness detection device according to another example embodiment of the present disclosure.
Detailed Description
Specific embodiments of the present disclosure will be described in detail below, with the understanding that the embodiments described herein are illustrative only and are not intended to limit the present disclosure. In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure. However, it will be apparent to one of ordinary skill in the art that: these specific details need not be employed to practice the present disclosure. In other instances, well-known structures or methods are not specifically described in order to avoid obscuring the present disclosure.
Throughout the specification, reference to "one embodiment," "an embodiment," "one example," or "an example" means: the particular features, structures, or characteristics described in connection with the embodiment or example are included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases "in one embodiment," "in an embodiment," "one example" or "an example" in various places throughout this specification are not necessarily all referring to the same embodiment or example. Furthermore, the particular features, structures, or characteristics may be combined in any suitable combination and/or sub-combination in one or more embodiments or examples. Further, those of ordinary skill in the art will appreciate that the drawings provided herein are for illustrative purposes and are not necessarily drawn to scale. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
In view of one or more problems in the related art, a delay optimization method performed at a screening device, a screening device for delay optimization, a delay optimization method performed at a security device, and a security device for delay optimization are proposed.
Embodiments of the present disclosure will be described in more detail below in conjunction with fig. 1-6.
Fig. 1 is a block diagram of a security system 100 according to an example embodiment of the present disclosure. The security inspection system 100 as shown in fig. 1 may include a security inspection apparatus 200, a screening apparatus 300, and a chart apparatus 400. It should be noted, however, that the configuration of the security check system 100 according to the example embodiment of the present disclosure is not limited thereto, but may include more or less units and may replace the units with other units having the same or similar functions, and the like.
The working principle of the security check system 100 is described below by way of example.
To facilitate handling of object interception work at the security checkpoint site, the local screening device 300 may be tied to one or more fixed security devices 200. Here, the object may be baggage or the like. The security device 200 may include a control system (e.g., a computer), a scanning imaging device (e.g., an X-ray machine, a millimeter wave device, etc.), and/or an image capture device (e.g., a camera), among others. As an example, an X-ray machine is used to perform X-ray scanning on an object to obtain scanned image data, and a camera is used to acquire appearance data of the object. When the X-ray machine of the security check device 200 starts scanning an object such as baggage, the security check device 200 transmits the scanned image column data obtained by the X-ray machine and the appearance data captured by the camera (if any) to the screening device 300 and the remote interpretation device 400 bound thereto in real time. Accordingly, both the open inspection apparatus 300 and the remote image judging apparatus 400 receive and buffer the scanned image column data and the appearance data in real time, and the remote image judging apparatus 400 determines whether to open or pass the object based on the received scanned image data and the appearance data.
When the remote mapping apparatus 400 makes a conclusion of the open test, the metadata related to the open test may be transmitted to the open test apparatus 300. The metadata may be, for example, indication information indicating opening or release, identification information of the security check data, identification information of the security check device 200, identification information of an object associated with the security check data, and the like. Since only the metadata is transmitted, the time of this process can be controlled to a small extent under normal network and bandwidth conditions.
Upon receiving the metadata of the job for the job, the censorship device 300 may look for the corresponding scanned image and appearance data, i.e., the scanned image and appearance data identified by the metadata, in the local memory. If the corresponding data exists in the memory, the alarm device is triggered to give an alarm to prompt the inspector and the corresponding data is displayed on the display device of the open-inspection equipment 300. If the object finishes scanning and the appearance photo is acquired at the moment, displaying complete data; if the object is scanning at this time, displaying the image being scanned in a manner of expanding column by column; if the object appearance is not acquired, the appearance data is temporarily not displayed on the display device of the opening device 300, but is additionally displayed on the display device of the opening device 300 immediately after the appearance acquisition is successful.
If the scanned image and appearance data identified by the metadata are not found in the memory of the screening device 300, the screening device 300 can retrieve the scanned image and appearance data from the metadata to the corresponding security device. Upon successful start of acquisition of data, the baggage appearance acquisition device 300 may trigger the alarm device to issue an alarm, start displaying the scanned image on the display device column by column while acquiring data, and additionally display the appearance image of the object after completing the baggage appearance acquisition.
When the diagram judging apparatus 400 makes a release conclusion to the diagram judging task, the corresponding metadata indicating the release is transmitted to the opening inspection apparatus 300 of the corresponding security inspection point. After receiving the metadata indicating the release, the biopsy device 300 may clear the corresponding data if the corresponding scanned image and appearance data are present in the memory. In addition, since all the security inspection map tasks are time-efficient, if the time-efficient is exceeded and the open inspection or release conclusion of the map judgment device 400 is still not received, the open inspection device 300 can recognize that the task is time-out, and even if the open inspection conclusion is made later, the interception and open inspection cannot be normally performed, so that the data corresponding to the task in the memory of the open inspection device 300 can be cleaned.
According to the scheme, the flow of the screening task data acquired by the screening device 300 is optimized, the response speed from the conclusion of screening made by the remote image judging device 400 to the alarm of the screening device 300 and the display of related information is increased, and subsequent baggage interception and screening operations of local security inspectors are facilitated.
In particular, as seen in conjunction with fig. 2, a security check apparatus 200 according to an example embodiment of the present disclosure may include an imaging device 202 and a controller 204. The controller 204 may be, for example, a processor, microprocessor, or the like. It should be noted, however, that the configuration of the security inspection apparatus 200 according to the example embodiment of the present disclosure is not limited thereto, but may include more or less units and may replace the units with other units having the same or similar functions, and the like.
The imaging device 202 may acquire security data of an object such as baggage. In some embodiments, the imaging device 202 may include an X-ray machine for X-ray scanning of the object to obtain scanned image data and a camera for acquiring appearance data of the object. In some embodiments, the security data may include an X-ray scan image and/or an appearance image of the subject. The controller 204 may transmit the acquired security data to the security device 200 in real time while the imaging apparatus 202 acquires the security data. The controller 204 may also transmit the acquired security data to the interpretation apparatus 400 in real time while the imaging device 202 acquires the security data.
As seen in connection with fig. 3, a open-inspection apparatus 300 according to an example embodiment of the present disclosure may include a communication interface 302, a memory 304, a controller 306, an alarm device 308, and a display device 310. It should be noted, however, that the configuration of the open inspection apparatus 300 according to the example embodiment of the present disclosure is not limited thereto, but may include more or less units and may replace the units with other units having the same or similar functions, and the like.
Communication interface 302 may receive security check data in real-time from one or more security check devices 200 bound to the biopsy device 100. In some embodiments, the security data may include an X-ray scan image and/or an appearance image of an object such as baggage. The communication interface 302 may also receive metadata from the mapping device 400. In some embodiments, the metadata may include indication information indicating a check-out or clearance, and include one or more of identification information of the security check data, identification information of the security check device 200, and identification information of an object associated with the security check data. In some embodiments, the indication information may be information indicating a decision drawing conclusion made by the decision drawing device 400 based on the security inspection data received in real time from the security inspection device 200, such as information indicating open inspection or information indicating clearance.
The memory 304 may store data received by the communication interface 302. For example, memory 304 may store security check data received by communication interface 302 in real-time from one or more security check devices 200 bound to the screening device 100, as well as metadata received by communication interface 302 from the mapping device 400. In some embodiments, when the metadata received by the screening device 300 indicates clearance, the screening data identified by the metadata is deleted from the memory 302. In some embodiments, if no metadata is received from the mapping device 400 within a certain period of time from the beginning of the receipt of the security data by the communication interface 302, the mapping task times out and the security data is deleted from the memory 302. The specific time period may be set according to a specific application.
Controller 304 may determine whether the metadata indicates open check or clear. Controller 304 may also determine whether security data identified by the metadata is present in memory 302.
The alarm device 308 may issue an alarm when the controller 304 determines that the metadata indicates a check. In some embodiments, the alert device 308 can issue an alert when the controller 304 determines that the metadata indicates a clear check and the controller 304 determines that security check data identified by the metadata is present in the memory 302. In some embodiments, the alert mechanism 308 can issue an alert when the communication interface 302 begins receiving the security data identified by the metadata from the security device 200 identified by the metadata, in the event that the controller 304 determines that the metadata indicates a security check but the controller 304 determines that the security check data identified by the metadata is not present in the memory 302.
Display device 310 may display the security check data identified by the metadata when the metadata indicates a check-out. In some embodiments, display device 310 may display the security check data identified by the metadata when controller 304 determines that the metadata indicates a check-out and controller 304 determines that the security check data identified by the metadata is present in memory 302. In some embodiments, display apparatus 310 may display the received security check data in real-time while communication interface 302 begins receiving the security check data identified by the metadata from security device 200 identified by the metadata, in the event that controller 304 determines that the metadata indicates a security check but controller 304 determines that the security check data identified by the metadata is not present in memory 302.
The image determination device 400 in the security check system 100 shown in fig. 1 may receive the collected security check data from the security check device 200 in real time while the security check device 200 collects the security check data of the object such as baggage. The mapping apparatus 400 may also make a mapping conclusion, such as a clear check or a pass, based on the security inspection data received in real time from the security inspection apparatus 200, generate information indicating the mapping conclusion, and transmit it to the security inspection apparatus 200. In some embodiments, the information indicating the decision drawing conclusion is, for example, information indicating open inspection or information indicating release.
Fig. 4 shows a flowchart of a method 400 for delay optimization performed at the security device 200 according to an example embodiment of the present disclosure. However, it should be noted that: embodiments of the present disclosure are not limited to the delay optimization method 400 shown in fig. 4, which is intended to be illustrative only and not limiting of embodiments of the present disclosure. In other words, in other embodiments, the delay optimization method 400 may include more, fewer, and/or different steps.
As shown in fig. 4, method 400 may include collecting security data in step S401. The security check data includes an X-ray scanned image scanned by an X-ray machine and/or an appearance image captured by a camera.
The method may further include transmitting the collected security data to the screening device 300 bound to the security device 200 in real time while collecting the security data in step S402.
In some example embodiments, the method 400 may further include transmitting the collected security data to the mapping device 400 bound to the security device 200 in real time while collecting the security data.
Fig. 5 shows a flowchart of a method 500 for delay optimization performed at the open-detection device 300 according to an example embodiment of the present disclosure. However, it should be noted that: embodiments of the present disclosure are not limited to the delay optimization method 500 shown in fig. 5, which is only for illustration and not for limiting embodiments of the present disclosure. In other words, in other embodiments, the delay optimization method 500 may include more, fewer, and/or different steps.
As shown in fig. 5, method 500 may include receiving, in step S501, security check data in real-time from one or more security check devices 200 bound to the screening device 300. The security data includes an X-ray scan image and/or an appearance image.
The method may further include receiving metadata from the mapping device 400 in step S502.
The method may further include performing a check-on action when the metadata indicates a check-on in step S503.
Fig. 6 shows a flowchart of a method 500 for delay optimization performed at the open-detection device 300 according to another example embodiment of the present disclosure. However, it should be noted that: embodiments of the present disclosure are not limited to the delay optimization method 600 shown in fig. 6, which is only for illustration and not for limitation of embodiments of the present disclosure. In other words, in other embodiments, the delay optimization method 600 may include more, fewer, and/or different steps.
As shown in fig. 6, method 600 may include receiving, in step S601, security check data in real-time from one or more security check devices 200 bound to a screening device 300.
The method may further include storing the received security check data in the memory 304 in step S602.
The method may further include receiving metadata from the mapping apparatus 400 in step S603.
The method may further include determining whether the metadata indicates open check or clear in step S604.
The method may further include deleting the security data identified by the metadata from the memory 304 when the metadata indicates a pass in step S605.
The method may further include determining whether security data identified by the metadata is present in the memory 304 when the metadata indicates a check-out in step S606.
The method may further include displaying the security check data identified by the metadata among the received security check data when it is determined that the security check data identified by the metadata exists in the memory 304 in step S607.
The method may further include receiving the security check data identified by the metadata from a security check device identified by the metadata among the one or more security check devices and displaying the received security check data in real time when it is determined that the security check data identified by the metadata does not exist in the memory 304 in step S608.
In summary, the present disclosure proposes a delay optimization method performed at a screening device, a screening device for delay optimization, a delay optimization method performed at a security device, and a security device for delay optimization. According to the scheme, the process of acquiring the data of the open inspection task by the open inspection equipment is optimized, the response speed of alarming and displaying relevant information from the open inspection conclusion made by the remote image judging equipment to the open inspection station is increased, and subsequent baggage interception and open inspection operations by a local security inspector are facilitated.
The foregoing detailed description has set forth numerous embodiments via the use of schematics, flowcharts, and/or examples. Where such diagrams, flowcharts, and/or examples contain one or more functions and/or operations, it will be understood by those within the art that each function and/or operation within such diagrams, flowcharts, or examples can be implemented, individually and/or collectively, by a wide range of structures, hardware, software, firmware, or virtually any combination thereof. In one embodiment, portions of the subject matter described in embodiments of the present disclosure may be implemented by Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs), Digital Signal Processors (DSPs), and the like. However, those skilled in the art will recognize that some aspects of the embodiments disclosed herein, in whole or in part, can be equivalently implemented in integrated circuits, as one or more computer programs running on one or more computers (e.g., as one or more programs running on one or more computer systems), as one or more programs running on one or more processors (e.g., as one or more programs running on one or more microprocessors), as firmware, or as virtually any combination thereof, and that designing the circuitry and/or writing the code for the software and or firmware would be well within the skill of one of skill in the art in light of this disclosure. In addition, those skilled in the art will appreciate that the mechanisms of the subject matter described herein are capable of being distributed as a program product in a variety of forms, and that an illustrative embodiment of the subject matter described herein applies regardless of the particular type of signal bearing media used to actually carry out the distribution. Examples of signal bearing media include, but are not limited to: recordable type media such as floppy disks, hard disk drives, Compact Disks (CDs), Digital Versatile Disks (DVDs), digital tape, computer memory, etc.; and a transmission type medium such as a digital and/or an analog communication medium (e.g., a fiber optic cable, a waveguide, a wired communications link, a wireless communication link, etc.).
While the present disclosure has been described with reference to several exemplary embodiments, it is understood that the terminology used is intended to be in the nature of words of description and illustration, rather than of limitation. As the present disclosure may be embodied in several forms without departing from the spirit or essential characteristics thereof, it should also be understood that the above-described embodiments are not limited by any of the details of the foregoing description, but rather should be construed broadly within its spirit and scope as defined in the appended claims, and therefore all changes and modifications that fall within the meets and bounds of the claims, or equivalences of such meets and bounds are therefore intended to be embraced by the appended claims.

Claims (24)

1. A delay optimization method performed at a openness inspection device, comprising:
receiving security check data in real time from one or more security check devices bound to the screening device;
receiving metadata from a mapping device; and
and when the metadata indicates the open inspection, performing an open inspection action.
2. The method of claim 1, the open inspection action comprising triggering an alarm and/or displaying security inspection data identified by the metadata in the security inspection data.
3. The method of claim 1 or 2, further comprising: storing the received security check data in a memory.
4. The method of claim 3, further comprising: deleting the security check data identified by the metadata from the memory when the metadata indicates clearance.
5. The method of claim 3, wherein displaying the security check data identified by the metadata in the security check data comprises: determining whether security check data identified by the metadata is present in the memory.
6. The method of claim 5, wherein displaying the security check data identified by the metadata in the security check data further comprises: when it is determined that the security check data identified by the metadata exist in the memory, displaying the security check data identified by the metadata in the security check data.
7. The method of claim 5, wherein displaying the security check data identified by the metadata in the security check data further comprises: when the security check data identified by the metadata does not exist in the memory, receiving the security check data identified by the metadata from the security check device identified by the metadata among the one or more security check devices, and displaying the received security check data in real time.
8. The method of claim 1 or 2, wherein the security data comprises an X-ray scan image and/or an appearance image.
9. The method of claim 1 or 2, wherein the metadata comprises indication information indicating a check-in or a clear, and the metadata comprises one or more of: the identification information of the security check data, the identification information of the security check device, and the identification information of the object associated with the security check data.
10. A delay optimization method performed at a security check device, comprising:
collecting security inspection data; and
and transmitting the collected security check data to the open inspection equipment bound with the security check equipment in real time while collecting the security check data.
11. The method of claim 10, further comprising:
and transmitting the collected security check data to the graph judging device bound with the security check device in real time while collecting the security check data.
12. The method of any of claims 10-11, wherein the security data comprises an X-ray scan image and/or an appearance image.
13. A device for delay optimization, comprising:
a communication interface configured to:
receiving security check data in real time from one or more security check devices bound to the screening device; and
receiving metadata from a mapping device;
a controller configured to determine whether the metadata indicates open check or clear, and to instruct an open check action to be performed when it is determined that the metadata indicates open check.
14. The biopsy device of claim 13, further comprising:
an alert device configured to issue an alert when it is determined that the metadata indicates a false positive; and/or
A display device configured to display the security check data identified by the metadata in the security check data when it is determined that the metadata indicates a check-out.
15. The screening device of claim 14, further comprising a memory configured to store the received security check data.
16. The screening device of claim 15, wherein the security data identified by the metadata is deleted from the memory when it is determined that the metadata indicates clearance.
17. The open-inspection device of claim 15, wherein the controller is further configured to: determining whether security check data identified by the metadata is present in the memory.
18. The device of claim 17, wherein when it is determined that security check data identified by the metadata exists in the memory, the display means is caused to display security check data identified by the metadata among the security check data.
19. The screening device of claim 17, wherein when it is determined that the security data identified by the metadata is not present in the memory, the communication interface is caused to receive the security data identified by the metadata from the security device identified by the metadata of the one or more security devices and the display means is caused to display the received security data in real-time.
20. A screening device according to claim 13 or 14, wherein the security data comprises X-ray scan images and/or appearance images.
21. The open inspection apparatus of claim 13 or 14, wherein the metadata includes indication information indicating open inspection or clearance, and the metadata includes one or more of: the identification information of the security check data, the identification information of the security check device, and the identification information of the object associated with the security check data.
22. A security device for delay optimization, comprising:
an imaging device configured to acquire security data; and
a controller configured to transmit the acquired security data to a security inspection device bound to the security inspection device in real time while the imaging apparatus acquires the security inspection data.
23. The security device of claim 22, wherein the controller is further configured to:
and transmitting the acquired security check data to a graph judging device bound with the security check device in real time while the imaging device acquires the security check data.
24. A security device according to claim 22 or 23, wherein the security data comprises an X-ray scan image and/or an appearance image.
CN202010395274.0A 2020-05-11 2020-05-11 Security inspection delay optimization method and equipment Active CN113640321B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010395274.0A CN113640321B (en) 2020-05-11 2020-05-11 Security inspection delay optimization method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010395274.0A CN113640321B (en) 2020-05-11 2020-05-11 Security inspection delay optimization method and equipment

Publications (2)

Publication Number Publication Date
CN113640321A true CN113640321A (en) 2021-11-12
CN113640321B CN113640321B (en) 2024-04-02

Family

ID=78415589

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010395274.0A Active CN113640321B (en) 2020-05-11 2020-05-11 Security inspection delay optimization method and equipment

Country Status (1)

Country Link
CN (1) CN113640321B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114113164A (en) * 2021-12-08 2022-03-01 北京航星机器制造有限公司 Centralized image interpretation method for security inspection equipment
CN115457398A (en) * 2022-11-14 2022-12-09 成都智元汇信息技术股份有限公司 Centralized graph judging client based on dual visual angles and display method

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001358919A (en) * 2000-06-13 2001-12-26 Matsushita Electric Ind Co Ltd Image display system, image display device and recording medium
US20020176531A1 (en) * 2001-04-03 2002-11-28 Mcclelland Keith M. Remote baggage screening system, software and method
JP2003122518A (en) * 2001-10-18 2003-04-25 Canon Inc Information processor, image recording apparatus, image recording system using it and control method for it
US20090232417A1 (en) * 2008-03-14 2009-09-17 Sony Ericsson Mobile Communications Ab Method and Apparatus of Annotating Digital Images with Data
US20130034268A1 (en) * 2010-04-21 2013-02-07 Optosecurity, Inc. Method and system for use in performing security screening
CN103210636A (en) * 2010-11-16 2013-07-17 汤姆逊许可公司 Method and apparatus for automatic film restoration
CN104345350A (en) * 2013-07-23 2015-02-11 清华大学 Human body safety check method and human body safety check system
CN104932841A (en) * 2015-06-17 2015-09-23 南京邮电大学 Saving type duplicated data deleting method in cloud storage system
CN105372715A (en) * 2015-12-14 2016-03-02 同方威视技术股份有限公司 Cargo transportation security check method, system and security check apparatus
CN205656319U (en) * 2016-04-13 2016-10-19 同方威视技术股份有限公司 Control system and safety inspection monitoring terminal are kept watch on in safety inspection
CN107607562A (en) * 2017-09-11 2018-01-19 北京匠数科技有限公司 A kind of prohibited items identification equipment and method, X-ray luggage security check system
CN107656695A (en) * 2016-07-25 2018-02-02 杭州海康威视数字技术股份有限公司 A kind of data storage, delet method, device and distributed memory system
CN107688884A (en) * 2016-08-04 2018-02-13 同方威视技术股份有限公司 Safety check centralized management system
CN107871122A (en) * 2017-11-14 2018-04-03 深圳码隆科技有限公司 Safety check detection method, device, system and electronic equipment
CN108877141A (en) * 2017-05-09 2018-11-23 同方威视科技江苏有限公司 Safety zone monitoring system and method
CN109212618A (en) * 2018-08-15 2019-01-15 顺丰科技有限公司 Rays safety detection apparatus and safety inspection method
CN109975332A (en) * 2019-02-25 2019-07-05 北京声迅电子股份有限公司 A kind of intelligent quality testing system applied to X-ray machine
CN110163191A (en) * 2019-06-17 2019-08-23 北京航星机器制造有限公司 A kind of dangerous material intelligent identification Method, system and dangerous material safe examination system
CN110515543A (en) * 2019-08-02 2019-11-29 星辰天合(北京)数据科技有限公司 Object bucket-based snapshot method, device and system
CN110749933A (en) * 2019-07-18 2020-02-04 中云智慧(北京)科技有限公司 Method and system for inspecting luggage safety of inbound passenger

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001358919A (en) * 2000-06-13 2001-12-26 Matsushita Electric Ind Co Ltd Image display system, image display device and recording medium
US20020176531A1 (en) * 2001-04-03 2002-11-28 Mcclelland Keith M. Remote baggage screening system, software and method
JP2003122518A (en) * 2001-10-18 2003-04-25 Canon Inc Information processor, image recording apparatus, image recording system using it and control method for it
US20090232417A1 (en) * 2008-03-14 2009-09-17 Sony Ericsson Mobile Communications Ab Method and Apparatus of Annotating Digital Images with Data
US20170357857A1 (en) * 2010-04-21 2017-12-14 Optosecurity Inc. Method and system for use in performing security screening
US20130034268A1 (en) * 2010-04-21 2013-02-07 Optosecurity, Inc. Method and system for use in performing security screening
CN103210636A (en) * 2010-11-16 2013-07-17 汤姆逊许可公司 Method and apparatus for automatic film restoration
CN104345350A (en) * 2013-07-23 2015-02-11 清华大学 Human body safety check method and human body safety check system
CN104932841A (en) * 2015-06-17 2015-09-23 南京邮电大学 Saving type duplicated data deleting method in cloud storage system
CN105372715A (en) * 2015-12-14 2016-03-02 同方威视技术股份有限公司 Cargo transportation security check method, system and security check apparatus
CN205656319U (en) * 2016-04-13 2016-10-19 同方威视技术股份有限公司 Control system and safety inspection monitoring terminal are kept watch on in safety inspection
CN107656695A (en) * 2016-07-25 2018-02-02 杭州海康威视数字技术股份有限公司 A kind of data storage, delet method, device and distributed memory system
CN107688884A (en) * 2016-08-04 2018-02-13 同方威视技术股份有限公司 Safety check centralized management system
CN108877141A (en) * 2017-05-09 2018-11-23 同方威视科技江苏有限公司 Safety zone monitoring system and method
CN107607562A (en) * 2017-09-11 2018-01-19 北京匠数科技有限公司 A kind of prohibited items identification equipment and method, X-ray luggage security check system
CN107871122A (en) * 2017-11-14 2018-04-03 深圳码隆科技有限公司 Safety check detection method, device, system and electronic equipment
CN109212618A (en) * 2018-08-15 2019-01-15 顺丰科技有限公司 Rays safety detection apparatus and safety inspection method
CN109975332A (en) * 2019-02-25 2019-07-05 北京声迅电子股份有限公司 A kind of intelligent quality testing system applied to X-ray machine
CN110163191A (en) * 2019-06-17 2019-08-23 北京航星机器制造有限公司 A kind of dangerous material intelligent identification Method, system and dangerous material safe examination system
CN110749933A (en) * 2019-07-18 2020-02-04 中云智慧(北京)科技有限公司 Method and system for inspecting luggage safety of inbound passenger
CN110515543A (en) * 2019-08-02 2019-11-29 星辰天合(北京)数据科技有限公司 Object bucket-based snapshot method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖中正 等: "一种面向海量存储系统的高效元数据集群管理方案", 《计算机研究与发展》, no. 04, 15 April 2015 (2015-04-15) *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114113164A (en) * 2021-12-08 2022-03-01 北京航星机器制造有限公司 Centralized image interpretation method for security inspection equipment
CN114113164B (en) * 2021-12-08 2023-08-08 北京航星机器制造有限公司 Image concentrated interpretation method for security inspection equipment
CN115457398A (en) * 2022-11-14 2022-12-09 成都智元汇信息技术股份有限公司 Centralized graph judging client based on dual visual angles and display method

Also Published As

Publication number Publication date
CN113640321B (en) 2024-04-02

Similar Documents

Publication Publication Date Title
JP6203208B2 (en) Road structure management system and road structure management method
US7542588B2 (en) System and method for assuring high resolution imaging of distinctive characteristics of a moving object
CN109374631B (en) Tunnel state evaluation method
CN113640321A (en) Security check delay optimization method and device
WO2015010531A1 (en) Human body security screening method and system
CN105785472B (en) Device and method for being checked vehicle hiding people
US20100002142A1 (en) System and method for video-processing algorithm improvement
CN110956104A (en) Method, device and system for detecting overflow of garbage can
CN110910415A (en) Parabolic detection method, device, server and computer readable medium
JP2005086626A (en) Wide area monitoring device
CN101626493A (en) Method for judging forward motion direction of pedestrian by combining laser scanning and videos
CN105592301A (en) Image capturing apparatus, method of controlling the same, monitoring camera system
US10922826B1 (en) Digital twin monitoring systems and methods
CN114113165A (en) Luggage interpretation method for security inspection equipment
JP3361399B2 (en) Obstacle detection method and device
CN113945990A (en) Safety inspection method, device and system for passenger car
JP3500425B2 (en) Road surface condition judgment method in visible image type road surface condition grasping device
CN111753587B (en) Ground falling detection method and device
US11557133B1 (en) Automatic license plate recognition
WO2022001821A1 (en) Inspection method and system based on millimetre wave security inspection device, and server
CN107356821B (en) A kind of device and vehicle checking method of information of vehicles safety detection
KR102260559B1 (en) Method for monitoring facility using tablet PC
CN211904213U (en) Vehicle bottom checking system
CN109900794A (en) Fault detection system, method and computer readable storage medium
JP2021086451A (en) Generation device, data analysis system, generation method, and generation program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant