EP2204783A1 - Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux - Google Patents

Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux Download PDF

Info

Publication number
EP2204783A1
EP2204783A1 EP08291258A EP08291258A EP2204783A1 EP 2204783 A1 EP2204783 A1 EP 2204783A1 EP 08291258 A EP08291258 A EP 08291258A EP 08291258 A EP08291258 A EP 08291258A EP 2204783 A1 EP2204783 A1 EP 2204783A1
Authority
EP
European Patent Office
Prior art keywords
detection
sub
security system
security
corridor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP08291258A
Other languages
German (de)
English (en)
Inventor
Jean-Luc Zolesio
Thierry Lamarque
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thales SA
Original Assignee
Thales SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thales SA filed Critical Thales SA
Priority to EP08291258A priority Critical patent/EP2204783A1/fr
Priority to PCT/EP2009/067717 priority patent/WO2010076261A1/fr
Publication of EP2204783A1 publication Critical patent/EP2204783A1/fr
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/181Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • G08B13/19602Image analysis to detect motion of the intruder, e.g. by frame subtraction
    • G08B13/19613Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
    • G08B13/19615Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion wherein said pattern is defined by the user
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B31/00Predictive alarm systems characterised by extrapolation or other computation using updated historic data

Definitions

  • the present invention relates to a security system to prevent people who are due to enter a sensitive equipment/area from carrying hazardous items. More specifically, security procedures and systems have been implemented at airport facilities to scan persons and luggage for detecting metallic, liquid or powder objects possibly used as weapons or explosives by terrorists to carry out an attack on board an aircraft. Implementing these procedures and systems post 9/11 has created a significant operational burden and cost for the airport authorities, airlines and passengers. The same problems arise at other passenger transportation terminals, such as railway or subway stations, and at facilities which gather a large number of people like department stores, museums, theatres, concert, congress or cult areas.
  • the most common equipment used to detect objects carried by people entering a sensitive area is a dual lane scanning system.
  • the portico lane comprises electro-magnetic detectors positioned at various heights (typically four sources) these detectors being sensitive to metallic objects. Passengers walk across the portico to check that they do not carry any metallic object. In parallel, their hand luggage is submitted to X-Ray scanning in the tunnel lane.
  • the tunnel lane scanner produces an image which is continuously displayed to an operator tasked to check the content of the luggage.
  • the gate scanner produces an alarm in case a metal object is detected on the passenger.
  • belt buckles or shoe soles may trigger an alarm and the passenger will have to be manually searched.
  • some airport authorities implement specific random or targeted manual searches for explosives with detectors to which samples of dust taken from the clothing of selected passengers are applied.
  • international regulations now prohibit transportation of any liquid in hand luggage. Liquids used for personal care have to be hand carried in a specific transparent bag and visually inspected by security personnel. All combined, on average 20% of passengers have to be manually inspected and/or searched. This generates significant operational cost, long queues and disturbance to passengers.
  • Another advantage of the invention is a modular architecture which allows various configurations comprising different types of detectors to be installed at one definite site.
  • Specific modules target biological and epidemiological threats and are only needed in specific locations. These modules are designed to be easily plugged in the system, with stand alone energy supply, and sensor processing.
  • the security system of the invention can easily be coupled with a luggage scanning system using traditional X-Ray scanning and/or partly the same sub-systems as the persons' control system.
  • the scanning system may receive information from the check-in database (check-in may be operated by an airline in case of on-line check-in or an airport authority in case of on-site check-in; it may also be a ticketing office operated on-line or on-site in museums, theatres, stadiums or other event facilities) and/or the cross-border identification database.
  • check-in may be operated by an airline in case of on-line check-in or an airport authority in case of on-site check-in; it may also be a ticketing office operated on-line or on-site in museums, theatres, stadiums or other event facilities
  • the cross-border identification database may be operated by an airline in case of on-line check-in or an airport authority in case of on-site check-in; it may also be a ticketing office operated on-line or on-site in museums, theatres, stadiums or other event facilities.
  • a security system for controlling persons entering a sensitive area can be built around a traditional portico approach, one side (the left side on figure 1 ) of the portico comprising bulk identification detectors while the other side (the right one on figure 1 ) comprises trace identification detectors.
  • Bulk identification uses imaging sensors capable of locating certain types of objects.
  • Trace identification uses molecular laser absorption analysis to determine the type of substance carried by an individual.
  • Radio Frequency IDentification (RFID) - Detection is there to identify the passenger passing through the portico: an RFID tag is given to each passenger at check-in and he/she can be tracked on the airport premises; other types of machine readable ticket such as one carrying a bar code can also be used, but needs more cooperation from the passenger; Ray - Detection can be either X or ⁇ - Ray imaging.
  • X-Ray imaging is routinely used to scan luggage because of its ability to see through most materials used for suitcases or bags.
  • ⁇ - Ray imaging allows classification of the detected objects. Current regulations applicable in Europe forbid the use of X-Ray imaging for scanning human beings because of the intrusive character of such imaging.
  • Metal - Detection is the classical sensor present in a portico to detect metallic weapons.
  • TeraHertz (THz) - Detection is a new type of detection in the microwave band. TeraHertz detection is capable of identifying solid objects which are carried in contact with the body and mask the natural radiation of the body while the same radiation traverses the clothes; therefore a "spot" is detected by this system even when the object is concealed under the clothes.
  • Nuclear Quadrupole Resonance (NQR) - Detection is based on neutron detection. If targeted at nitrogen, this type of detection can detect explosives, most of which contain a high concentration of this type of molecule.
  • CWA Chemical Warfare Analysis
  • Nuclid detection module is targeted at certain types of nuclids
  • an Explosive detection module and a Biological detection module are targeted at other defined types of molecules/agents.
  • This invention has been designed to address eight operational goals commonly accepted as key to better address the security concerns at sensitive facilities, notably airports. These eight goals are:
  • FIG. 2 The physical architecture of the system according to one embodiment of the invention is depicted in figure 2 .
  • the security system of the invention uses a multi-sensor approach and adapted information fusion algorithms. Its implementation is scalable, from one to N modules or sub-systems depending on any operational requirements.
  • the system is made up of a corridor shown on figure 1 , with different embodiments which will be further described further down in the specification of the invention in relation with figures 2 and 3 .
  • This corridor is therefore modular.
  • a corridor is made up of a succession of physical modules shown on figure 1 , each module having two walls perpendicular to the ground, each wall of each module comprising elements of said module as further described.
  • Each module can be topped by a roof or by part of a roof to hold some of the sensors, namely the fish-eye camera which is a component of the abnormal behavior detection sub-system, as described further down in the specification.
  • the physical appearance of the modules can be designed so that the corridor is seamlessly integrated in the environment of the control area.
  • the corridor has an entrance and an exit, one or both of which having an axis which may be non parallel to the axis of the corridor so that the flow of persons passing through the corridor may be regulated more easily. Additionally, a turnstile can be provided at the entrance of the corridor if there is a specific need to better regulate the flow. This configuration is also fit for optimization of the efficiency of one of the detection sub-system, namely the hidden object detection sub-system, as described further down in the specification.
  • Each module is independent and autonomous and communicates with the other using an ESB architecture (Enterprise Services Bus).
  • the corridor is organized to include several modules totally independent in terms of power management and software systems as described in the specification of this invention. These modules are then easily linkable using a plug and play facility for power management and for software supervision.
  • Each of the modules contains three kinds of sensors, a dedicated computer and interfaces dedicated to power management and plugging with a supervisory sub-system.
  • a definite module performs a specific detection function and comprises:
  • the combination of the video camera and the photoelectric cells with the specific risk sensor of a detection sub-system allows complete tracking of persons who have to be checked within the security system of the invention.
  • Other types of sensors than photoelectric cells could also be used.
  • Another kind of identification could also be used such as an RFID tag (or a bar coded ticket, though this implementation needs more cooperation from the passenger) delivered to the persons to be controlled when checking-in.
  • a display 900 can be located on a wall near the exit to present information to the persons passing through the corridor. This information can be made specific to the person who is identified by the recognition of his/her face by the video camera of the first detection sub-system located nearest to the entrance of the corridor. This specific information may for example be: boarding gate number, expected time of departure for his/her flight, expected time of arrival, specific security, health requirements on arrival, luggage transfer information, etc... Also, this display may be useful in drawing the attention of the person entering the corridor to a point located at the distal end of the corridor, thus smoothly inducing a cooperative attitude of the person along the passage to the exit of the corridor.
  • Some detection sub-systems may be absent, for instance the epidemiologic detection sub-system when the corresponding risk is null. Some other kind of functions may be added, for instance a RFID detection sub-system, to supplement or replace the video camera tracking, and a NQR detection sub-system to correlate with the main explosive trace detection sub-system. Alternatively, some detection sub-systems can be grouped in a single physical module as shown for example on figure 3 . In this manner the corridor will be made more compact, possibly more suitable to certain types of airports or other facilities (theatres, museums, department stores...) and more economical.
  • the hand luggage scanning chain can be positioned on one side of a wall of the corridor.
  • this chain can use some of the detection sub-systems of the corridor.
  • the explosive trace detection sub-system can be adapted to detect the hand-luggage of the person going through the corridor at the same time: to achieve this result, i) the speed of the luggage chain should be adapted to the speed of the person; ii) the collecting tunnel should be placed behind the luggage chain.
  • FIG. 5 The logical architecture of a security system according to an exemplary embodiment of the invention is shown on figure 5 .
  • Each of the detection sub-systems represented described above is connected to a communication bus 1000, for instance an Enterprise Service Bus (ESB).
  • ESB allows communication between heterogeneous applications using a web protocol and a Java Messaging System (JMS).
  • JMS Java Messaging System
  • the ESB provides the following functions
  • the standard interfaces from a sensor to the ESB are the following:
  • a security system comprises the following sub-systems:
  • the supervisor sub-system may be integrated in the walls of 3 physical modules like shown in figure 3 .
  • one supervisory sub-system may monitor more than one corridor system, and control officer displays may be grouped in one common operation centre but from a risk level assessment point of view, it is currently preferable to keep one supervisory sub-system dedicated to a single corridor, while it may be envisaged to amend this architecture; for instance, the control of each corridor could be managed by a dedicated control display and and a dedicated control officer but an additional control facility served by a dedicated officer could be added to present to this control officer the alarms observed on all corridors during a preset time.
  • This sub-system is made of a ducted airflow system, integrated in a wall (or behind), grouping several fans and producing a transverse wind from one wall to the other.
  • a collecting tunnel sucks in this wind and passes it through in a multi pass laser cell.
  • a spectrometer analyzes the absorption of the laser beam and delivers a measure of the concentration of the detected compound.
  • the laser system could be a multi wave lengths one. Each wave length is predefined to detect a specific chemical compound.
  • the laser is a quantum cascade laser that sweeps slightly to either side of a specific predetermined value; this value will be between 4 and 10 ⁇ for the compounds of interest.
  • This sub-system delivers in real time:
  • the 77 GHz wavelength is preferred over other wavelengths because:
  • a millimeter wave camera commercialized by BRIJOTTM. This camera functions at 100 GHz and is capable of detecting metallic and non metallic objects and liquids, even hidden under clothes. A similar camera from another supplier could also be used.
  • a radar receiver rotates around the transmitter at a frequency which is determined by the speed and distance of the target so as to simplify processing
  • the transmitter antenna is in the middle of the module wall.
  • the receiver antenna elements are located in a non regular array (see figure 8 ) such as a virtual antenna could be computed in real time and then several adaptive beams be formed such as the object surface is covered like shown on figure 9A , with details on figure 9B .
  • FIG 9C the details of the objects detected (a gun and a knife) by the formed radar beams are shown.
  • Different possibilities to implement these elements are available, for instance a randomized array or an multi regular k. ⁇ mesh pattern where ⁇ is the wave length of the radar and k is the number of mesh patterns.
  • An implementation of such an array antenna radar is given in patent FR2875912 for a linear array.
  • the array antenna should cover a square of from 30 by 30 centimeters to 60 by 60 centimeters and include between a few tens up to a few hundreds of receivers, depending on the level of the secondary lobes.
  • the array antenna can be constructed as a network of antennas having holes which are located at points the positions of which are calculated using the method disclosed in patent FR 2902935 .
  • the number of receivers can be reduced to a few tens and the array can be formed with a network of patch antennas which can be integrated in the painting of the wall.
  • This sub-system delivers in real time:
  • This sub-system is made of at least one fish-eye camera integrated into the walls of the module.
  • One equipment which may be used is a network AXISTM 221 camera with a CCD image sensor and a FUJINONTM lens ICAFYV2.2X1.4A-SA2 - 1/3" with variable focal length from 1.4 to 3.1mm with automatic DC iris and a fish-eye of 185° aperture and the following mounting and physical specifications: CS F:1.4 MOD:0.2m L:54.7mm x ⁇ :41 mm 80g.
  • the AXISTM camera demonstrates features well suited for this application, specifically a progressive scanning capability which delivers clearer pictures of moving elements than interlaced scanning, thus facilitating image processing.
  • Image processing is performed by a dual-core personal computer.
  • Video streaming is continuously delivered to detect abnormal behavior inside the corridor such as U-turn, people running or trying to conceal something, people being nervous... This sub-system delivers in real time:
  • the flow chart of the processing performed by the supervisory sub-system is described on figure 11 .
  • the data used to calculate an aggregate risk level for a definite individual are:
  • a first manner of determining an aggregate risk level is to compound the outputs of the detection sub-systems in a discrete manner using a logical decision table. To achieve this goal, a spatial correlation between detected objects is performed. As an example:
  • a second manner of determining an aggregate risk level is to compound the outputs of the detection sub-systems using a continuous function.
  • An example of an aggregate risk level calculation using a continuous function is given on figure 13 where only two detection sub-systems are taken into account and where the relationship between the variations of the two individual risk levels is linear: the "diffuse alarm" area would not trigger an alarm in a system of the prior art where only individual detection trigger alarms. After more experimentation, the linear relationship will be easily changed to optimize the detection/false alarm rate. More generally, let's consider the mathematical space R n where n is equal to the number of independent detections.
  • the risk assessment algorithm provides different types of alarm:
  • a third manner of computing the aggregate risk level is to calculate an "a priori" probability using the Bayes rules considering the probabilities of alarms P(Vi ⁇ Ti) adjusted during an experimentation phase of the system.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Emergency Management (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Alarm Systems (AREA)
EP08291258A 2008-12-31 2008-12-31 Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux Withdrawn EP2204783A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP08291258A EP2204783A1 (fr) 2008-12-31 2008-12-31 Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux
PCT/EP2009/067717 WO2010076261A1 (fr) 2008-12-31 2009-12-22 Système de sécurité comprenant des capteurs placés dans un couloir pour découvrir des articles interdits

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
EP08291258A EP2204783A1 (fr) 2008-12-31 2008-12-31 Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux

Publications (1)

Publication Number Publication Date
EP2204783A1 true EP2204783A1 (fr) 2010-07-07

Family

ID=41102128

Family Applications (1)

Application Number Title Priority Date Filing Date
EP08291258A Withdrawn EP2204783A1 (fr) 2008-12-31 2008-12-31 Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux

Country Status (2)

Country Link
EP (1) EP2204783A1 (fr)
WO (1) WO2010076261A1 (fr)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2954846A1 (fr) * 2009-12-30 2011-07-01 Thales Sa Detecteur de menace generique
CN103353615A (zh) * 2013-06-26 2013-10-16 深圳黎明镒清图像技术有限公司 车载式x射线人体全身透视安全检查系统
CN103842254A (zh) * 2011-07-19 2014-06-04 万德兰工业有限公司 用于行李件的传送系统、包括这种传送系统的登记系统和用于使用这种传送系统的方法
WO2014166823A1 (fr) 2013-04-11 2014-10-16 Commissariat A L'energie Atomique Et Aux Energies Alternatives Dispositif et procede de suivi 3d video d'objets d'interêt
EP3099061A4 (fr) * 2014-01-23 2017-08-23 Hitachi Kokusai Electric Inc. Système et procédé de recherche d'image
WO2017192943A1 (fr) * 2016-05-06 2017-11-09 Wal-Mart Stores, Inc. Procédés et systèmes de surveillance d'une installation
CN107393246A (zh) * 2017-08-12 2017-11-24 宋彦震 物联网智能家居监控系统
WO2019088845A1 (fr) * 2017-10-30 2019-05-09 Hypervig As Système de contrôle d'accès basé sur la reconnaissance faciale ayant un niveau d'alerte pouvant être défini par l'utilisateur
CN110110638A (zh) * 2019-04-29 2019-08-09 江苏省人民医院(南京医科大学第一附属医院) 用于医院消毒室的控制命令解析系统
CN112612066A (zh) * 2019-09-18 2021-04-06 同方威视技术股份有限公司 人员安检方法及人员安检系统
WO2021183671A1 (fr) * 2020-03-10 2021-09-16 Cubic Corporation Utilisation de radar à courte portée dans des systèmes d'accès au transport
WO2022072010A1 (fr) * 2020-09-29 2022-04-07 Ident Llc Systèmes et procédés permettant l'entrée dans des locaux à distance, sans contact et de façon automatisée
CN114694285A (zh) * 2022-03-29 2022-07-01 重庆紫光华山智安科技有限公司 人流量告警方法、装置、电子设备和存储介质
EP4343378A1 (fr) * 2022-09-20 2024-03-27 Kabushiki Kaisha Toshiba Système d'inspection de sécurité et procédé d'inspection de sécurité

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9892606B2 (en) 2001-11-15 2018-02-13 Avigilon Fortress Corporation Video surveillance system employing video primitives
US8564661B2 (en) 2000-10-24 2013-10-22 Objectvideo, Inc. Video analytic rule detection system and method
US8711217B2 (en) 2000-10-24 2014-04-29 Objectvideo, Inc. Video surveillance system employing video primitives
US7424175B2 (en) 2001-03-23 2008-09-09 Objectvideo, Inc. Video segmentation using statistical pixel modeling
CN101443789B (zh) 2006-04-17 2011-12-28 实物视频影像公司 使用统计像素建模的视频分割
US9407546B2 (en) 2014-02-24 2016-08-02 Red Hat, Inc. Routing a message using a routing table in a dynamic service mesh
CN108734368A (zh) * 2017-04-25 2018-11-02 鸿富锦精密电子(天津)有限公司 风险预警管控系统及方法
WO2019212428A1 (fr) * 2018-05-03 2019-11-07 Havelsan Hava Elektroni̇k Sanayi̇ Ve Ti̇caret Anoni̇m Şi̇rketi̇ Système de surveillance, de commande et de transit sécurisé biométrique autonome avec imagerie thz active
US11880013B2 (en) 2018-05-11 2024-01-23 Carrier Corporation Screening system
CN111274724B (zh) * 2020-01-13 2021-08-27 西南交通大学 一种能揭示元件灵敏度的接触网运行风险评估方法
CN116990883B (zh) * 2023-09-27 2023-12-15 北京中科太赫兹科技有限公司 基于多频谱传感融合技术的远距离人携危险物探测系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999021148A1 (fr) 1997-10-22 1999-04-29 Ids Intelligent Detection Systems, Inc. Systeme integre de detection personnelle a traverser pour portiques de securite
US20040190757A1 (en) 2003-03-28 2004-09-30 Murphy Kevin Sj Integrated passenger management system
WO2005066912A1 (fr) 2004-01-12 2005-07-21 Elbit Systems Ltd. Systeme et procede d'identification d'une personne associee a une menace parmi la foule
WO2007061331A1 (fr) 2005-11-28 2007-05-31 Closed Joint Stock Company 'afrus' Procede de controle de personnes avec bagages et systeme d'examen de personnes avec bagages

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2875912A1 (fr) 1991-08-13 2006-03-31 Thomson Applic Radars Ct Procede et reconstruction d'echantillonnage non ambigu a partir de l'echantillonnage ambigu d'un signal et applications notamment aux radars doppler
FR2902935A1 (fr) 2006-06-23 2007-12-28 Thales Sa Procede de fabrication d'une antenne a diagramme de rayonnement optimise selon les contraintes

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1999021148A1 (fr) 1997-10-22 1999-04-29 Ids Intelligent Detection Systems, Inc. Systeme integre de detection personnelle a traverser pour portiques de securite
US20040190757A1 (en) 2003-03-28 2004-09-30 Murphy Kevin Sj Integrated passenger management system
WO2005066912A1 (fr) 2004-01-12 2005-07-21 Elbit Systems Ltd. Systeme et procede d'identification d'une personne associee a une menace parmi la foule
WO2007061331A1 (fr) 2005-11-28 2007-05-31 Closed Joint Stock Company 'afrus' Procede de controle de personnes avec bagages et systeme d'examen de personnes avec bagages

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2954846A1 (fr) * 2009-12-30 2011-07-01 Thales Sa Detecteur de menace generique
EP2341374A1 (fr) * 2009-12-30 2011-07-06 Thales Dispositif pour estimer le niveau de menace que répresente un individu
CN103842254A (zh) * 2011-07-19 2014-06-04 万德兰工业有限公司 用于行李件的传送系统、包括这种传送系统的登记系统和用于使用这种传送系统的方法
WO2014166823A1 (fr) 2013-04-11 2014-10-16 Commissariat A L'energie Atomique Et Aux Energies Alternatives Dispositif et procede de suivi 3d video d'objets d'interêt
US10225523B2 (en) 2013-04-11 2019-03-05 Commissariat A L'energie Atomique Et Aux Energies Alternatives Device and method for the 3D video monitoring of objects of interest
CN103353615A (zh) * 2013-06-26 2013-10-16 深圳黎明镒清图像技术有限公司 车载式x射线人体全身透视安全检查系统
CN103353615B (zh) * 2013-06-26 2016-01-20 深圳黎明镒清图像技术有限公司 车载式x射线人体全身透视安全检查系统
EP3099061A4 (fr) * 2014-01-23 2017-08-23 Hitachi Kokusai Electric Inc. Système et procédé de recherche d'image
GB2565470A (en) * 2016-05-06 2019-02-13 Walmart Apollo Llc Methods and systems for monitoring a facility
US9990664B2 (en) 2016-05-06 2018-06-05 Wal-Mart Stores, Inc. Methods and systems for monitoring a facility
WO2017192943A1 (fr) * 2016-05-06 2017-11-09 Wal-Mart Stores, Inc. Procédés et systèmes de surveillance d'une installation
GB2565470B (en) * 2016-05-06 2019-07-31 Walmart Apollo Llc Methods and systems for monitoring a facility
CN107393246A (zh) * 2017-08-12 2017-11-24 宋彦震 物联网智能家居监控系统
WO2019088845A1 (fr) * 2017-10-30 2019-05-09 Hypervig As Système de contrôle d'accès basé sur la reconnaissance faciale ayant un niveau d'alerte pouvant être défini par l'utilisateur
CN110110638A (zh) * 2019-04-29 2019-08-09 江苏省人民医院(南京医科大学第一附属医院) 用于医院消毒室的控制命令解析系统
CN112612066A (zh) * 2019-09-18 2021-04-06 同方威视技术股份有限公司 人员安检方法及人员安检系统
WO2021183671A1 (fr) * 2020-03-10 2021-09-16 Cubic Corporation Utilisation de radar à courte portée dans des systèmes d'accès au transport
US11734975B2 (en) 2020-03-10 2023-08-22 Cubic Corporation Short range radar use in transportation access systems
WO2022072010A1 (fr) * 2020-09-29 2022-04-07 Ident Llc Systèmes et procédés permettant l'entrée dans des locaux à distance, sans contact et de façon automatisée
CN114694285A (zh) * 2022-03-29 2022-07-01 重庆紫光华山智安科技有限公司 人流量告警方法、装置、电子设备和存储介质
CN114694285B (zh) * 2022-03-29 2023-09-01 重庆紫光华山智安科技有限公司 人流量告警方法、装置、电子设备和存储介质
EP4343378A1 (fr) * 2022-09-20 2024-03-27 Kabushiki Kaisha Toshiba Système d'inspection de sécurité et procédé d'inspection de sécurité

Also Published As

Publication number Publication date
WO2010076261A1 (fr) 2010-07-08

Similar Documents

Publication Publication Date Title
EP2204783A1 (fr) Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux
US20070122003A1 (en) System and method for identifying a threat associated person among a crowd
EP1430449B1 (fr) Procede de securisation d'acces, dispositif de controle d'acces, ascenseur
US10288737B2 (en) LiDAR sensing system
US8031903B2 (en) Networked security system
US20100111377A1 (en) Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System
CN109214274A (zh) 一种机场安保管理系统
US20100148946A1 (en) Surveillance System
US20090236538A1 (en) Mobile radiation threat identification system
JP2006202062A (ja) 施設監視システム
CA2670916A1 (fr) Systeme et procede de detection et de classement d'objets, de preference caches, dans des flux d'objets et/ou de personnes
US10098432B2 (en) System and method for tracking baggage
US7629885B2 (en) Security screening and support system
US20220215708A1 (en) Touchless, automated and remote premise entry systems and methods
Elias Airport passenger screening: Background and issues for Congress
CA2933212A1 (fr) Systeme et methode d'analyse intelligente d'incident dans un systeme de commande au moyen de plans de plancher
WO2010140943A1 (fr) Système de filtrage de sécurité multi-personne simultané
Ho et al. Public space behavior modeling with video and sensor analytics
Tryon Millimeter wave case study of operational deployments: retail, airport, military, courthouse, and customs
CN214309133U (zh) 测温安检系统
RU2731032C1 (ru) Сетевая система видеонаблюдения с возможностью контроля поведенческих факторов и биометрических параметров объектов наблюдения
Dmochowska Threat prevention at the airports using detection systems
Sujkowski et al. Artificial Intelligence Systems for Supporting Video Surveillance Operators at International Airport
CN111552007A (zh) 检查系统及方法
Al-Hilli et al. Contemporary Technologies for Promoting Safe Cities: The Case of Al-Salheya Compound in Iraq

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

AK Designated contracting states

Kind code of ref document: A1

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA MK RS

17P Request for examination filed

Effective date: 20110105

17Q First examination report despatched

Effective date: 20110124

AKX Designation fees paid

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MT NL NO PL PT RO SE SI SK TR

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20180109