CN116413821A - Security check method, device and system applying security check method - Google Patents

Security check method, device and system applying security check method Download PDF

Info

Publication number
CN116413821A
CN116413821A CN202111653512.4A CN202111653512A CN116413821A CN 116413821 A CN116413821 A CN 116413821A CN 202111653512 A CN202111653512 A CN 202111653512A CN 116413821 A CN116413821 A CN 116413821A
Authority
CN
China
Prior art keywords
suspicious
security inspection
waiting position
judging
item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111653512.4A
Other languages
Chinese (zh)
Inventor
陈云蛟
唐波
李文涛
党杰
路子恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nuctech Co Ltd
Original Assignee
Nuctech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nuctech Co Ltd filed Critical Nuctech Co Ltd
Priority to CN202111653512.4A priority Critical patent/CN116413821A/en
Publication of CN116413821A publication Critical patent/CN116413821A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • G01V5/22
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N23/00Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00
    • G01N23/02Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material
    • G01N23/06Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material and measuring the absorption
    • G01N23/10Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material and measuring the absorption the material being confined in a container, e.g. in a luggage X-ray scanners
    • G01V5/226

Landscapes

  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Analytical Chemistry (AREA)
  • Biochemistry (AREA)
  • General Health & Medical Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Immunology (AREA)
  • Pathology (AREA)
  • Analysing Materials By The Use Of Radiation (AREA)

Abstract

The security inspection method is applied to security inspection equipment for centralized graph judgment, and comprises the following steps: a plurality of articles to be scanned are scanned sequentially through a scanning unit; the scanned objects sequentially enter a graph judging area to wait for graph judgment, wherein the graph judging area comprises a plurality of graph judging positions sequentially arranged in the moving direction of the objects, and the last graph judging position in the moving direction is a waiting position; dividing each article into a normal article or a suspicious article according to the judgment result; and normal articles pass through the waiting position without stopping and enter the fetching area so as to be fetched; in the event that the suspicious item is moved to the waiting position, it remains in the waiting position until the suspicious item is removed from the waiting position. Also provided is a security inspection device comprising: the device comprises a scanning unit, a graph judging unit, a plurality of transmission modules and a control unit. A security inspection system including the security inspection device is also provided.

Description

Security check method, device and system applying security check method
Technical Field
At least one embodiment of the present disclosure relates to a security inspection method, and in particular, to a security inspection method, and a device and a system applying the security inspection method.
Background
The security inspection system is widely applied to security inspection of civil aviation, rail transit and other public places. The centralized judgment chart is a security check mode different from a local security check mode, the screening judgment of the articles is performed in the chart judgment room in the security check process of the centralized judgment chart, and the articles passing through the judgment chart are respectively transmitted into different downstream transmission channels or circulation channels according to the chart judgment result of release or open check.
Because a plurality of channels are required to be arranged, the security inspection device adopting the centralized graph judging mode generally occupies a large space, and therefore, the security inspection device requiring centralized graph judging cannot be applied to some places with limited space.
Based on the defects, a security inspection method for classifying objects according to a graph judging result under the condition of a single conveying channel, and a device and a system applying the security inspection method are designed.
Disclosure of Invention
Aiming at the prior art problems, the invention provides a security inspection method, and a device and a system applying the security inspection method, which are used for at least partially solving the technical problems.
An aspect of the present disclosure provides a security inspection method, which is applied to a security inspection device for centralized graph judgment, and is characterized in that the security inspection method includes: a plurality of articles to be scanned are scanned sequentially through a scanning unit; the scanned objects sequentially enter a graph judging area to wait for graph judgment, wherein the graph judging area comprises a plurality of graph judging positions sequentially arranged in the moving direction of the objects, and the last graph judging position in the moving direction is a waiting position; dividing each article into a normal article or a suspicious article according to the judgment result; and the normal articles pass through the waiting position without stopping and enter the fetching area so as to be fetched; in the case where the suspicious object is moved to the waiting position, the suspicious object stays in the waiting position until the suspicious object is taken out from the waiting position.
According to an embodiment of the present disclosure, the security inspection method further includes: judging whether the rest graph judging positions have gaps or not under the condition that the suspicious object moves to the waiting position, and if so, continuing to receive the scanned object from the scanning unit; if there is no empty space, the receiving of scanned items from the scanning unit is stopped.
According to an embodiment of the present disclosure, the security inspection method further includes: and under the condition that the suspicious object is positioned at the waiting position, if the suspicious object exists in the rest image judging positions, the suspicious object is taken away at the same time or the suspicious object positioned at the waiting position is taken away and then moved and stays at the waiting position.
According to an embodiment of the present disclosure, the security inspection method further includes: and positioning the map judging position where the suspicious object is located.
According to an embodiment of the present disclosure, locating the map determining position where the suspicious object is located includes: identifying the initial graph judging position where the suspicious object stays; and tracking each judgment map position passed by the suspicious object until the suspicious object stays at the waiting position.
According to an embodiment of the present disclosure, locating the map determining position where the suspicious object is located further includes performing a visualization process on the map determining position.
According to an embodiment of the present disclosure, the security inspection method further comprises establishing a relationship between the item and a controller of the item.
Another aspect of the present disclosure also provides a security inspection apparatus, including: the scanning unit is suitable for scanning the object; the image judging unit is electrically connected with the scanning unit and divides the article into a normal article and a suspicious article according to the scanning information of the article; a plurality of conveying modules, which are sequentially arranged at the downstream of the scanning unit, so as to convey the scanned object passing through the scanning unit in a moving direction far away from the scanning unit, wherein the plurality of conveying modules respectively define a plurality of graph judging positions, and the last graph judging position in the moving direction is a waiting position; and the control unit is respectively and electrically connected with the graph judging unit and the transmission module, and controls the transmission module: passing the normal item through the waiting position without stopping and into an picking zone so as to be picked up; and moving the suspicious object to the waiting position, and staying at the waiting position until the suspicious object is taken out from the waiting position.
According to an embodiment of the disclosure, the security inspection device further includes a plurality of visualization units electrically connected to the control unit and respectively corresponding to the transmission modules, so as to identify the transmission module where the suspicious article is located.
According to an embodiment of the disclosure, the visualization unit includes a plurality of segments of light bands respectively corresponding to the transmission modules, and an operating state of each segment of light band characterizes that a transmission module corresponding to the segment of light band has suspicious articles thereon.
According to an embodiment of the present disclosure, the security inspection device further comprises at least one camera configured to determine whether there is a vacancy in the remaining map determination locations if the suspicious object is in the waiting position.
According to an embodiment of the present disclosure, the camera is further configured to determine the map location at which the suspicious item is located.
According to an embodiment of the present disclosure, the camera is further configured to identify an initial said map location at which the suspicious item is to stay, and to track each said map location at which the suspicious item is to pass until the suspicious item is to stay at the waiting location.
According to an embodiment of the disclosure, the security inspection device further includes an information acquisition unit, which is arranged in front of the scanning unit and is used for inputting information of a controller of the article, and establishing a corresponding relationship between the controller and the article according to the information.
According to an embodiment of the present disclosure, the information acquisition unit includes a code scanner for acquiring an information code including information of the controller and information of the article.
According to an embodiment of the disclosure, the control unit comprises a programmable logic controller to output a control signal to the transfer module.
The disclosure also provides a security inspection system, comprising a security inspection device; the unpacking platform is arranged at the upstream of the security inspection device; and the bag taking platform is arranged at the downstream of the security inspection device.
According to the embodiment of the disclosure, the security inspection system further comprises a detection opening platform which is arranged at a position outside the bag taking platform.
The embodiment of the invention discloses a security inspection method, which divides each article passing through a scanning unit into a normal article or a suspicious article according to a graph judgment result. The normal articles pass through the image judging area to be taken away, and the suspicious articles are conveyed to a waiting position to wait for subsequent processing. On the basis of not adding a conveying channel and adding a functional area, the working state of the graph judging position is adjusted to realize the differentiated treatment of different articles so as to meet the requirements of security inspection equipment with a centralized graph judging function.
The embodiment of the invention discloses a security inspection device, wherein a control unit collects graph judging results output by a graph judging unit and outputs different control signals to a conveying module according to different graph judging results, so that the state of at least one part of conveying modules is changeable, and the security inspection device is used for conveying articles or stopping the articles on the conveying modules respectively.
The embodiment of the invention discloses a security inspection system, which has the advantages of a security inspection method and a security inspection device, realizes a compact layout, and is beneficial to meeting the requirements of a security inspection mode of concentrated graph judgment in a limited space.
Drawings
FIG. 1 is a flow block diagram of a security inspection method according to one illustrative embodiment of the present disclosure;
FIG. 2 is a side view of a security inspection system according to one exemplary embodiment of the present disclosure;
FIG. 3 is a top view of the security inspection system of the illustrative embodiment shown in FIG. 2; and
fig. 4 is a top view of a security inspection system according to one exemplary embodiment of the present disclosure.
Reference numerals
1. A visualization unit;
2. a scanning unit;
21. an output side;
22. a security inspection machine;
23. a baffle;
24. an input side;
3. a central control cabinet;
4. a graph judging area;
41. a first transfer module;
42. a second transfer module;
43. a third transfer module;
5. a bag unloading platform;
6. a transition platform;
7. a start-up platform; and
8. and a bag taking platform.
Detailed Description
The present invention will be further described in detail below with reference to specific embodiments and with reference to the accompanying drawings, in order to make the objects, technical solutions and advantages of the present invention more apparent.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms, including technical and scientific terms, used herein have the meaning commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expression" system having at least one of A, B and C "shall be construed, for example, in general, in accordance with the meaning of the expression as commonly understood by those skilled in the art, and shall include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc. Where a formulation similar to at least one of "A, B or C, etc." is used, such as "a system having at least one of A, B or C" shall be interpreted in the sense one having ordinary skill in the art would understand the formulation generally, for example, including but not limited to systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.
Fig. 1 is a flow diagram of a security inspection method according to an exemplary embodiment of the present disclosure.
The disclosure provides a security inspection method applied to security inspection equipment for centralized graph judgment, as shown in fig. 1, comprising the following steps: a plurality of articles to be scanned, such as a backpack, a trunk, etc., are sequentially scanned by a scanning unit to perform, for example, an X-ray based radiation inspection; the scanned objects enter a graph judging area in sequence to wait for graph judgment, the scanned object images are transmitted to a central control room or an upper computer to conduct centralized graph judgment, namely, whether scanned objects exist in the scanned objects or not is judged manually or not based on the object scanned image computer, the graph judging area comprises a plurality of graph judging positions which are sequentially arranged in the moving direction of the objects, so that a plurality of scanned objects are stored in the graph judging area, wherein the last graph judging position in the moving direction is a waiting position; dividing each article into a normal article or a suspicious article according to the judgment result; and the normal articles pass through the waiting position without stopping and enter the fetching area so as to be fetched; in the case where the suspicious object is moved to the waiting position, the suspicious object stays in the waiting position until the suspicious object is taken out from the waiting position.
In an exemplary embodiment, the scanning unit comprises an X-ray based imaging device adapted for checking whether contraband such as drugs, explosives are present in objects such as luggage, packages, handbags, etc. in places where personnel mobility is great, such as stations, airports, stadiums, malls, etc. The scanning unit mainly includes: support frame, transmission mechanism, and actuating mechanism. An inspection space adapted to inspect an object is formed in the support frame, the inspection space having a first opening communicating with the outside. The support frame is provided with a housing made of a shielding material to prevent radiation leakage. The transport mechanism is adapted to carry the object for movement through the examination space. An X-ray emitting and receiving device such as a CT machine is mounted on the support frame to perform an X-ray scanning examination of an object transported to the examination space by the transport mechanism.
According to the security inspection method of the embodiment of the invention, each article passing through the scanning unit is divided into a normal article or a suspicious article according to the image judgment result, and all scanned articles are firstly conveyed to a plurality of image judgment positions capable of storing a plurality of articles, and the image judgment result is waited. The normal articles pass through the image judging area to be taken away, and the suspicious articles are conveyed to a waiting position to wait for subsequent processing. On the basis of not adding a conveying channel and adding a functional area, the working state of the graph judging position is adjusted to realize the differentiated treatment of different articles so as to meet the requirements of security inspection equipment with a centralized graph judging function.
In an exemplary embodiment, a map determining area is provided downstream of the scanning unit, in which three map determining positions are provided. Thus, the image of three articles can be judged at most simultaneously. It should be understood that embodiments of the present disclosure are not limited thereto.
For example, the number of map positions also includes two, four, five, and other numbers. The specific number can be adaptively designed according to the space of the specific application scene. For example, each decision region holds one scanned item.
In an exemplary embodiment, normal items are characterized as items that meet security standards, suspicious items are characterized as items or other items contained in items that do not meet security standards, and a manual inspection should be performed.
In another illustrative embodiment, a normal item is characterized as one type of item and a suspicious item is characterized as another type or types of items (other items than the normal item).
In an exemplary embodiment, the waiting position is characterized as a map position furthest from the scanning unit. Thus, when the suspicious object stays at the image judging position far away from the scanning unit to wait for the operator to take the suspicious object off, other image judging positions can still transmit other objects to pass or wait for image judging. It should be understood that embodiments of the present disclosure are not limited thereto. By setting the waiting position it is ensured that the suspicious item will be brought to the attention of the operator and will not be transported to the next station to be taken away by the controller (or owner) of the item.
For example, the waiting position may be set as the last few map judgment positions. Thus, when a plurality of suspicious articles are continuously arranged, each suspicious article can stay at the corresponding graph judging position to wait for the operator to take down. It should be understood that embodiments of the present disclosure are not limited thereto.
For example, the waiting position may also be located near the scanning unit or any other decision making position or positions for holding the suspicious object and waiting for subsequent processing by the operator.
According to an embodiment of the present disclosure, the security inspection method further includes: in the case that the suspicious object moves to the waiting position, judging whether the rest of the graph judging positions have a vacancy, if so, continuing to receive the scanned object from the scanning unit, for example, moving the object upstream of the graph judging position in the vacancy state to the graph judging position in the vacancy state, thereby allowing receiving more scanned objects; if there is no empty space, the receiving of scanned items from the scanning unit is stopped, waiting for the items to be removed or to enter the next processing station.
According to the embodiment of the disclosure, the security inspection method further comprises the step of taking off the suspicious object or waiting for the suspicious object at the waiting position to be taken off and then moving and staying at the waiting position if the suspicious object exists in the rest of the graph judging positions under the condition that the suspicious object is at the waiting position.
According to an embodiment of the present disclosure, the security inspection method further includes: and positioning the map judging position where the suspicious object is located. Such as displaying the sequence number of the graph judgment position, sending out voice warning, etc.
According to an embodiment of the present disclosure, locating a map location where a suspicious object is located includes: identifying the initial graph judging position where the suspicious object stays; and tracking each graph judging position passed by the suspicious object until the suspicious object stays at the waiting position. Therefore, before the suspicious object stays at the waiting position, operators can find and track the suspicious object so as to shorten the time for taking down the suspicious object by the operators, and the method is favorable for carrying out coherent and faster security check on other objects.
In one illustrative embodiment, identification and tracking of suspicious items is disclosed. The disclosure is characterized in that other personnel in the security check place can know the condition of suspicious articles. For example, by audio or visual alerting.
In another illustrative embodiment, identification and tracking of suspicious items is not disclosed, which is characterized by the fact that other personnel located in the security facility are not aware of the presence of suspicious items, except for operators with corresponding rights. For example, the information containing the suspicious object is sent to the mobile phone or the operation terminal of the operator.
According to an embodiment of the present disclosure, locating the map-determining position where the suspicious object is located further includes performing a visualization process on the map-determining position.
In one illustrative embodiment, the visualization process is characterized by a more intuitive notification to the operator of the location of the decision map where the suspicious item is located.
In detail, the visualization process includes, but is not limited to, audio, video and vibration representation of the map location where the suspicious object is located.
According to an embodiment of the present disclosure, further comprising establishing a relationship between the item and a controller of the item.
In one illustrative embodiment, the relationship of the item and the controller of the item is established before the item passes through the scanning unit.
In detail, the article and the controller of the article may include an owner of the article or a temporary custodian, and the controller may include one or several digits. In detail, information of the extractable controller includes, but is not limited to, name, phone number, identity information, and boarding pass information code.
FIG. 2 is a side view of a security device according to an exemplary embodiment of the present disclosure; fig. 3 is a top view of the exemplary embodiment security device shown in fig. 2.
Embodiments of the present disclosure provide a security inspection device, as shown in fig. 2 and 3, including: the device comprises a scanning unit 2, a graph judging unit, a plurality of transmission modules and a control unit. The scanning unit is used for scanning the object, for example, performing radiation scanning based on X rays, and generating a scanning image; the image judging unit is electrically connected with the scanning unit 2 and divides the articles into normal articles and suspicious articles according to the scanning information of the articles. In detail, the scanned image of the object is transmitted to a graph judging unit arranged in a central control room or a host computer to conduct centralized graph judgment, namely, whether the scanned object exists in the scanned object is judged by the scanned image computer or the human.
Further, a plurality of conveying modules, such as a plurality of belt conveyors, are sequentially disposed downstream of the scanning unit 2, for conveying the articles passing through the scanning unit 2 in a moving direction away from the scanning unit 2, the plurality of conveying modules respectively defining a plurality of map determining positions, wherein a final map determining position in the moving direction is a waiting position; the control unit is respectively and electrically connected with the graph judging unit and the transmission module, and controls the transmission module: passing the normal articles through the waiting position without stopping and into the picking area so as to be picked up; and moving the suspicious item to the waiting position, staying in the waiting position until the suspicious item is removed from the waiting position.
According to the security inspection device of the embodiment of the invention, each article passing through the scanning unit is divided into normal articles or suspicious articles according to the image judgment result, and all scanned articles are firstly conveyed to a plurality of image judgment positions (conveying modules) capable of storing a plurality of articles, and the image judgment result is waited. The normal articles pass through the image judging area to be taken away, and the suspicious articles are conveyed to a waiting position to wait for subsequent processing. On the basis of not adding a conveying channel and adding a functional area, the working state of the graph judging position is adjusted to realize the differentiated treatment of different articles so as to meet the requirements of security inspection equipment with a centralized graph judging function.
In an exemplary embodiment, baffles 23 arranged in the vertical direction are mounted on both sides of the input side 24 and/or the output side 21 of the scanning unit 2, respectively. To prevent the items from falling off when entering or exiting the scanning unit 2 and to guide them in the conveying direction of the items.
In an exemplary embodiment, the security inspection device further includes a central control cabinet 3 for accommodating at least a part of components in the scanning unit 2, the graph judging unit, and the control unit, and circuits, switches, and other electrical components required for connecting the components.
In an exemplary embodiment, scanning unit 2 includes, but is not limited to, a security check machine 22. It should be understood that embodiments of the present disclosure are not limited thereto.
For example, the scanning unit 2 may employ any other type of device that irradiates an object and acquires a radiation signal or image.
In an exemplary embodiment, the number of transfer modules is three, with the three transfer modules being arranged in a column-like sequence.
In detail, the map determining area 4 includes a first transmission module 41, a second transmission module 42, and a third transmission module 43. It should be understood that embodiments of the present disclosure are not limited thereto.
For example, a plurality of transfer modules are arranged in a corner.
For example, the number of transfer modules is two, four, five or other number.
In detail, the specific arrangement and/or number of the transmission modules should be designed in combination with specific application scenarios.
In an exemplary embodiment, the transfer module includes a tape machine with an RFID antenna for communication and an indicator light for displaying the operating status. In an alternative embodiment, the transfer module includes a plurality of rollers arranged side-by-side.
In an exemplary embodiment, the image determining unit is disposed in an image determining chamber remote from the scanning unit 2, and the image determining unit and the scanning unit 2 can perform remote communication. Remote communication may employ wired, wireless, and radio frequency or any other device or component operable for signal transmission.
In another exemplary embodiment, the picture determining unit is provided on the scanning unit 2. Therefore, local security inspection can be realized, and centralized graph judgment security inspection can be performed.
According to an embodiment of the disclosure, the security inspection device further comprises a visualization unit 1 electrically connected with the control unit, wherein the visualization unit and the control unit are electrically connected and respectively correspond to the transmission modules so as to identify the transmission module where the suspicious object is located.
According to an embodiment of the present disclosure, the visualization unit 1 includes, but is not limited to, multiple sections of light bands corresponding to the transmission modules respectively, and an operating state of each section of light band indicates that the transmission module corresponding to the section of light band has suspicious articles thereon.
Further, the visualization is schematic and is not understood to visually embody the position information of the transfer module. For example, the visualization unit 1 may use audio broadcasting, and when the object is located in a certain transmission module, the number of the corresponding transmission module is played through audio.
In an exemplary embodiment, a light strip spans multiple conveyor modules, the light strip including, but not limited to, an array of LED light groups, at least a portion of which may be illuminated. So that when an article is located on a certain conveyor module, a portion of the light strip in the corresponding location is illuminated. When the article moves to the next conveying module, part of the lamp groups at the previous position are extinguished, and the lamp groups at the corresponding positions of the new conveying module are lighted. It should be understood that embodiments of the present disclosure are not limited thereto.
For example, the light strip may embody different transport modules in different colors. In detail, red characterizes the article as being on a first conveyor module, green characterizes the article as being on a second conveyor module, and blue characterizes the article as being on a third conveyor module.
According to an embodiment of the present disclosure, the security inspection device comprises at least one camera configured to determine whether there is a vacancy in the remaining map determination locations in the event that the suspicious object is in the waiting position.
In accordance with an embodiment of the present disclosure, the camera is further configured to determine a map location at which the suspicious object is located.
In accordance with an embodiment of the present disclosure, the camera is further configured to identify an initial map location at which the suspicious item is to stay, and to track each map location at which the suspicious item is to pass until the suspicious item is to stay at the wait location.
In an exemplary embodiment, the visualization unit 1 may employ a light strip and/or a camera.
According to an embodiment of the disclosure, the security inspection device further comprises an information acquisition unit, which is arranged in front of the scanning assembly 2 and is used for inputting information of a controller of the article and establishing a corresponding relationship between the controller and the article according to the information.
According to an embodiment of the present disclosure, the information acquisition unit includes a code scanner to acquire an information code containing information of a controller and information of an article.
In one exemplary embodiment, an operator scans a passenger boarding pass through a code scanner to establish a relationship between the passenger, boarding pass, and the passenger's baggage.
According to an embodiment of the present disclosure, the control module includes, but is not limited to, a Programmable Logic Controller (PLC) to output a control signal to the tape machine.
In an exemplary embodiment, a Programmable Logic Controller (PLC) is electrically connected to the motor control end of the tape dispenser for programming and controlling the motor start, stop, and rotational speed operating conditions.
In detail, the motor includes, but is not limited to, a servo motor. The servo motor is beneficial to constructing a servo system and is convenient to control the security inspection device.
Furthermore, a Programmable Logic Controller (PLC) can be used for locally controlling the security inspection device, and the Programmable Logic Controller (PLC) can be electrically connected with other upper computers (such as an industrial personal computer).
In an exemplary embodiment, a control panel may also be mounted on the security device to control the various parts of the security device at the operational level.
In an exemplary embodiment, an emergency stop button may also be mounted on the security device to effect an emergency shutdown of the security system.
Furthermore, an operation device for enabling the security inspection device to recover to the working state from the emergency stop state needs to be configured.
Fig. 4 is a top view of a security inspection system according to one exemplary embodiment of the present disclosure.
The present disclosure also provides a security inspection system, as shown in fig. 4, comprising a security inspection device; a unpacking platform 5 arranged at the upstream of the security inspection device; and a bale taking platform 8 arranged downstream of the security inspection device. The checked articles are placed on the unpacking platform, and the checked normal articles are taken out from the unpacking platform.
In an exemplary embodiment, the bale breaking platform 8 and/or the bale breaking platform 5 are arranged at the same height as the transport modules of the security inspection device in order to facilitate the transport of the articles.
In an exemplary embodiment, a transition platform 6 is also provided between the security inspection device and the drive platform 8.
In detail, the transition platform 6 includes, but is not limited to, a plurality of rotatably mounted guide rollers to facilitate pushing of the articles output by the security device onto the retrieval platform 8.
According to an embodiment of the present disclosure, the security inspection system further includes a tamper evident platform 7 disposed at a location other than the bag retrieval platform 8. The security inspection personnel take the suspicious articles out of the waiting position and open the articles on the inspection opening platform for further manual inspection.
In an exemplary embodiment, the inspection opening platform 7 and the bag taking platform 8 are integrally provided to form a corner structure. It should be understood that embodiments of the present disclosure are not limited thereto.
For example, the open inspection platform 7 and the bag taking platform 8 may be provided separately. The specific implementation should be designed according to the actual use situation.
Those skilled in the art will appreciate that the features recited in the various embodiments of the invention and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the invention. In particular, the features recited in the various embodiments of the invention and/or in the claims can be combined in various combinations and/or combinations without departing from the spirit and teachings of the invention. All such combinations and/or combinations fall within the scope of the invention.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (18)

1. The security inspection method is applied to security inspection equipment for intensively judging graphs, and is characterized by comprising the following steps of:
a plurality of articles to be scanned are scanned sequentially through a scanning unit;
the scanned objects sequentially enter a graph judging area to wait for graph judgment, wherein the graph judging area comprises a plurality of graph judging positions sequentially arranged in the moving direction of the objects, and the last graph judging position in the moving direction is a waiting position;
dividing each article into a normal article or a suspicious article according to the judgment result; and
the normal articles pass through the waiting position without stopping and enter the article taking area so as to be taken away; in the case where the suspicious object is moved to the waiting position, the suspicious object stays in the waiting position until the suspicious object is taken out from the waiting position.
2. The security inspection method of claim 1, further comprising: judging whether the rest graph judging positions have empty positions or not under the condition that the suspicious object moves to the waiting position,
if there is a void, continuing to receive scanned items from the scanning unit;
if there is no empty space, the receiving of scanned items from the scanning unit is stopped.
3. The security inspection method of claim 1, further comprising: and under the condition that the suspicious object is positioned at the waiting position, if the suspicious object exists in the rest image judging positions, the suspicious object is taken away at the same time or the suspicious object positioned at the waiting position is taken away and then moved and stays at the waiting position.
4. A security inspection method according to any one of claims 1 to 3, further comprising: and positioning the map judging position where the suspicious object is located.
5. The security inspection method of claim 4, wherein locating the map-determining location where the suspicious item is located comprises:
identifying the initial graph judging position where the suspicious object stays; and
and tracking each judgment map position passed by the suspicious object until the suspicious object stays at the waiting position.
6. The security inspection method of claim 5, locating the map location where the suspicious item is located further comprising visualizing the map location.
7. A security method according to any one of claims 1 to 3, further comprising establishing a relationship between the item and a controller of the item.
8. A security device, comprising:
a scanning unit (2) adapted to scan an article;
the image judging unit is electrically connected with the scanning unit (2) and divides the articles into normal articles and suspicious articles according to the scanning information of the articles;
a plurality of conveying modules, which are sequentially arranged downstream of the scanning unit (2) to convey the scanned object passing through the scanning unit (2) in a moving direction away from the scanning unit (2), the plurality of conveying modules respectively defining a plurality of map judging positions, wherein the last map judging position in the moving direction is a waiting position; and
the control unit is respectively and electrically connected with the graph judging unit and the transmission module, and controls the transmission module:
passing the normal item through the waiting position without stopping and into an picking zone so as to be picked up; and is also provided with
And moving the suspicious object to the waiting position, and staying at the waiting position until the suspicious object is taken out from the waiting position.
9. The security inspection device of claim 8, further comprising a plurality of visualization units (1) electrically connected to the control unit and respectively corresponding to the transfer modules to identify the transfer module in which the suspicious item is located.
10. A security inspection device according to claim 9, wherein the visualization unit (1) comprises a plurality of sections of light bands respectively corresponding to the conveying modules, and the working state of each section of light band represents that the conveying module corresponding to the section of light band has suspicious articles.
11. The security device of any one of claims 8 to 10, further comprising at least one camera configured to determine if there is a void in the remaining map determination locations if the suspicious item is in a wait position.
12. The security device of claim 11, wherein the camera is further configured to determine the map location at which the suspicious item is located.
13. The security device of claim 12, wherein the camera is further configured to identify an initial said map location at which the suspicious item is to reside and to track each said map location at which the suspicious item is to pass until the suspicious item is to reside in the waiting location.
14. A security device according to any one of claims 8 to 10, further comprising an information acquisition unit arranged in front of the scanning unit (2) for entering information of a controller of the item and establishing a correspondence between the controller and the item in dependence of the information.
15. The security device of claim 14, wherein the information acquisition unit comprises a code scanner to acquire an information code comprising information of the controller and information of the item.
16. A security device according to any one of claims 8 to 10, wherein the control unit comprises a programmable logic controller to output control signals to the transmission module.
17. A security inspection system, characterized in that:
comprising a security device according to any one of claims 8 to 16;
the unpacking platform (5) is arranged at the upstream of the security inspection device; and
and the bag taking platform (8) is arranged at the downstream of the security inspection device.
18. The security inspection system of claim 17, further comprising a tamper evident platform (7) disposed at a location other than the bag removal platform (8).
CN202111653512.4A 2021-12-30 2021-12-30 Security check method, device and system applying security check method Pending CN116413821A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111653512.4A CN116413821A (en) 2021-12-30 2021-12-30 Security check method, device and system applying security check method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111653512.4A CN116413821A (en) 2021-12-30 2021-12-30 Security check method, device and system applying security check method

Publications (1)

Publication Number Publication Date
CN116413821A true CN116413821A (en) 2023-07-11

Family

ID=87051562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111653512.4A Pending CN116413821A (en) 2021-12-30 2021-12-30 Security check method, device and system applying security check method

Country Status (1)

Country Link
CN (1) CN116413821A (en)

Similar Documents

Publication Publication Date Title
JP6162208B2 (en) Integrated security inspection system
CN104700058B (en) Detection method and device for hand baggage
CA2575969A1 (en) Increased throughput inspection station
US7720194B2 (en) High throughput baggage inspection system
KR20070014934A (en) Remote manipulating apparatus of crane device, crane device and remote manipulating system of crane device
EP3273394A1 (en) Package inspection system and package inspection program
CN111783915B (en) Security check system and baggage tracking system thereof
JP2009075941A (en) Process management method, system, and device
CN213825996U (en) Airport luggage departure rotary table system based on RFID identification
CN112771565A (en) Baggage management system and server used in the system
CN108140164B (en) Access management system, access management method, and program
CN116413821A (en) Security check method, device and system applying security check method
JP6367255B2 (en) Delivery support device and delivery support program
CA3193988A1 (en) Screening device and method for screening a person
CN204314950U (en) Customs tests place system
JPH10194411A (en) Merchandise inventory control device
CN218037382U (en) Security check system convenient to register
CN113399293A (en) Luggage safety inspection sorting system based on image comparison
JP2018005491A (en) Inspection system and entrance management facility
WO2021006808A1 (en) Integrated high throughput baggage inspection system and method thereof
US8831878B2 (en) Ground location of work truck
CN216835784U (en) Automatic loading device for luggage
CN218824729U (en) Security check system
CN214225454U (en) Intelligent security inspection terminal based on cloud platform data analysis function
CN219978869U (en) Bar code scanning device and security inspection system for security inspection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination