WO2018023190A1 - Système de passage au crible à un poste de contrôle de sécurité et procédés associés - Google Patents

Système de passage au crible à un poste de contrôle de sécurité et procédés associés Download PDF

Info

Publication number
WO2018023190A1
WO2018023190A1 PCT/CA2016/051212 CA2016051212W WO2018023190A1 WO 2018023190 A1 WO2018023190 A1 WO 2018023190A1 CA 2016051212 W CA2016051212 W CA 2016051212W WO 2018023190 A1 WO2018023190 A1 WO 2018023190A1
Authority
WO
WIPO (PCT)
Prior art keywords
items
grouping
specific
security checkpoint
item
Prior art date
Application number
PCT/CA2016/051212
Other languages
English (en)
Inventor
Regis Morin
Erick AUDET
Paul-Andre Barriere
Original Assignee
Optosecurity Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Optosecurity Inc. filed Critical Optosecurity Inc.
Publication of WO2018023190A1 publication Critical patent/WO2018023190A1/fr

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N23/00Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00
    • G01N23/02Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material
    • G01N23/06Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material and measuring the absorption
    • G01N23/10Investigating or analysing materials by the use of wave or particle radiation, e.g. X-rays or neutrons, not covered by groups G01N3/00 – G01N17/00, G01N21/00 or G01N22/00 by transmitting the radiation through the material and measuring the absorption the material being confined in a container, e.g. in a luggage X-ray scanners
    • G01V5/22

Definitions

  • the present invention relates generally to security systems and, more particularly, to a security screening system for assisting, and in some cases replacing, screening operators in the detection of potential threats in carry-on luggage, and to a method and/or apparatus for improving the efficiency of security screening processes at security checkpoints.
  • a passenger when it comes to checkpoint screening at airports for example, a passenger is required to divest his/her personal belongings (e.g., carry-on luggage, coat, laptop, mobile phone and/or other personal belongings) for screening.
  • a passenger usually places his/her personal belongings in multiple trays which are then directed by a conveyor system to one or more scanning devices (e.g. X-ray devices, CT-devices or other).
  • scanning devices e.g. X-ray devices, CT-devices or other.
  • the passenger may place some of his/her belongings (e.g. larger articles) directly on the conveyor system and use trays to hold smaller articles.
  • the one or more scanning devices scan the tray contents and/or articles placed directly on the conveyor system as they are carried through the scanning areas and the data generated is processed to assess whether the passenger's personal belongings may present a potential security threat.
  • Each item e.g. a tray or an article placed directly on the conveyor system
  • the conveyor system may be configured to automatically dispatch an item identified as presenting a potential security threat, or requiring additional scrutiny, to an area for further scanning and/or manual searching.
  • the system may be configured to cause the movement of the conveyor system to be interrupted when an item identified as presenting a potential security threat, or requiring additional scrutiny, reaches a specific zone so that further scanning and/or manual searching may be performed on that item.
  • Screening a passenger's belongings in the aforementioned manner may raise some challenges. For example, when one tray holding the items of a specific passenger is identified as potentially presenting a security threat, security personnel may want to scan or search some or all of the other trays holding items of that passenger even though such trays may not have been identified as presenting a security threat. Current systems do not provide any suitable and convenient mechanism for facilitating such a process.
  • trays may be placed out of order on the conveyor system that directs the trays to the scanning device (i.e., not all of the trays associated with a specific passenger are placed sequentially on the conveyor system) and trays belonging to multiple passengers may be interleaved with one another. This may be cause by, without be limited to, parallel divesting taking placed at the checkpoint. As a result, trays associated with a specific passenger may be scanned non-sequentially and even, in some instances, trays associated with a specific passenger may be directed by conveyor system to different scanning devices. Such situations exacerbate challenges of the type described above.
  • a method for screening persons' belongings at a security checkpoint includes a scanning area for screening the items to derive data, a pre-scan area lying before the scanning area, at least two post-scan areas lying subsequent to the scanning area and a switching area to direct the persons' belongings to different post-scan areas of the at least two post-scan areas.
  • the method comprises:
  • a grouping of items may refer to one, two or more items which are associated into a logical grouping.
  • a grouping of items refers to items that have been logically grouped together without the items having necessarily being sequentially positioned on the conveyor system.
  • each item in the grouping of items may be (i) a tray assigned to the person newly arrived at the checkpoint to allow the person to place therein belongings to be screened or (ii) an article belonging to the person newly arrived at the checkpoint that is placed directly on the conveyor system of the security checkpoint for screening.
  • the grouping of items is a grouping of trays and each item in the grouping of items is a tray assigned to the person newly arrived at the checkpoint to allow the person to place therein belongings to be screened.
  • items in the grouping of items belonging to the person may be assigned respective clearance statuses so that all items in the grouping of items belonging to the person are directed to a same one of the at least two post-scan areas.
  • items belonging to a common person owner
  • may be directed to a same "post- scan" area e.g., to a reclaim area or to an area for further scanning/search).
  • deriving the specific clearance status associated with the specific item in the grouping of items may include:
  • item specific threat assessment results may be assigned to a specific item at least in part based:
  • selectively adjusting the item specific threat assessment results associated with the specific item may include selectively applying a threat detection process to the data associated with the specific item at least in part by processing the threat assessment results associated with the grouping of items.
  • selectively adjusting the item specific threat assessment results associated with the specific item may include marking the specific item for further inspection irrespective of the item specific threat assessment results if at least one other item in the grouping of items was marked for further inspection.
  • deriving the specific clearance status associated with the specific item in the grouping of items may include:
  • processing data associated with the specific item to derive the item specific threat assessment results, wherein the processing of the data associated with the specific item is selectively adjusted at least in part by processing the threat assessment results associated with the grouping of items;
  • the selective adjustment of the processing of the data associated with the specific item may include selectively modifying a sensitively level of an automated threat detection engine used to process the data associated with the specific item at least in part by processing the threat assessment results associated with the grouping of items.
  • the selective adjustment of the processing of the data associated with the specific item may include selectively applying a threat detection process to the data associated with the specific item at least in part by processing the threat assessment results associated with the grouping of items.
  • the items in said grouping of items have respective computer readable tags associated therewith and conveying item identification information.
  • creating the grouping of items including the two or more items belonging to the person newly arrived at the security checkpoint may include obtaining item identification information from the computer readable tags associated to the two or more items and assigning the two more items to the person newly arrived at the security checkpoint at least in part by using the item identification information obtained from computer readable tags associated to the two or more items.
  • the method may further comprise providing a plurality of trays at the security checkpoint, the trays having respective computer readable tags associated therewith conveying identification information.
  • creating the grouping of trays may include obtaining identification information from computer readable tags associated to the two or more trays and assigning the two more trays to the person newly arrived at the security checkpoint at least in part by using the identification information obtained from computer readable tags associated to the two or more trays.
  • each item may be associated with a respective computer readable tag that may include information in any suitable format including for example bar code(or QR code) information, RFID (Radio Frequency Identification) information, a Near Field Communication (NFC) memory device or any other information format suitable for allowing the items in the plurality of item to be distinguished from one another and preferably to be uniquely identified.
  • a suitable electronic reader may be used to obtain the information from the computer readable tag, such as, for example, a bar-code reader to scan the bar code(or QR code) information, an RFID reader to scan the RFID information, an NFC enabled device for scanning the information stored in the NFC memory device or any other suitable device.
  • the creation of grouping of items including the two or more items belonging to the person newly arrived at the security checkpoint may be performed in absence of information associated with the person and in particular in the absence of information conveying an identity of the person newly arrived at the checkpoint.
  • an ability to create a grouping of items owned by a same person without the identity of the person necessarily being known may be desirable in some practical implementations as it may allow respecting privacy laws/concerns in force in some jurisdictions.
  • detecting the person newly arrived at the security checkpoint includes receiving a signal conveying a new arrival at the security checkpoint.
  • the signal conveying a new arrival at the security checkpoint may be generated in any suitable manner.
  • the signal conveying the new arrival may be generated using a hand held device operated by a screening agent and/or by using a computer implemented user interface including user operable controls for allowing the person newly arrived at the security checkpoint to provide an input conveying arrival at the security checkpoint.
  • the pre-screening area of the security checkpoint may include a tray dispensing module having a detection module for detecting arrival of the person at the security checkpoint and generating the signal conveying this new arrival.
  • the detection module may include a user interface including user operable controls for allowing the person to provide an input conveying arrival at the security checkpoint and/or may include user operable controls for allowing the person newly arrived at the security checkpoint to provide information specifying a number of trays to be provided for holding the belongings to be screened and/or may include user operable controls for allowing the person newly arrived at the security checkpoint to provide information specifying a number of computer readable article tags to be provided to be attached to articles placed directly on the conveyor system.
  • the detection module may include other suitable mechanisms for detecting the arrival of the person at the security checkpoint including for example, without being limited to, a light barrier, a weight activated mat and a computer vision-based system.
  • detecting the person newly arrived at the security checkpoint may include obtaining information associated with the person newly arrived at the security checkpoint.
  • the information may be in different forms including, without being limited to, a picture of the person, a description of physical characteristics of the person (eye color, hair color, height, etc.), biometric information associated with the person (e.g. finger print, retinal scan and the like) and/or information extraction from a personal document (e.g. passport, driver's license, boarding pass, ticket and the like).
  • obtaining information associated with the person newly arrived at the security checkpoint may include scanning an identification document associated with the person, such as a boarding pass, a ticket, a passport and a driver's license for example.
  • an ability to create a grouping of items owned by a same person with some information related to the person may allow using a risk profile associated with the person newly arrived at the security checkpoint to influence the screening process.
  • the method may comprise using the obtained information associated with the person newly arrived at the security checkpoint to obtain information conveying a risk profile associated with the person from a database and using the risk profile when deriving the specific clearance status assigned to items in the grouping of items.
  • the specific clearance status for a specific item may be derived at least in part by processing the item specific threat assessment results, the threat assessment results associated with the grouping of items; and the risk profile associated with the person newly arrived at the security checkpoint.
  • the claimed method may be used in connection with security checkpoints having various suitable configurations.
  • one of the at least two post scan areas may be a baggage reclaim area and another one of the at least two post scan areas may be an area for further inspection.
  • a security checkpoint screening system comprising a screening station and a computing system comprising one or more programmable processors in communication with the screening station.
  • the screening station has a scanning area including one or more scanning device for screening persons' belongings to derive data, a pre-scan area lying before the scanning area, at least two post-scan areas lying subsequent to the scanning area and a switching area to direct the persons' belongings to different post-scan areas of the at least two post- scan areas.
  • the screening station also has a conveyor system for controlling a displacement of the persons' belongings through the security checkpoint screening system.
  • the computing system is programmed with software for:
  • receiving data conveying identification information associated with two or more items belonging to a person newly arrived at the screening station to allow the person to place belongings to be screened in the two or more items;
  • the data being derived at least in part by scanning the items in the grouping of items with penetrating radiation as the conveyor system displaces the items in the grouping of items from the pre-screening area through the scanning area;
  • each item in the grouping of items may be (i) a tray assigned to the person newly arrived at the checkpoint to allow the person to place therein belongings to be screened or (ii) an article belonging to the person newly arrived at the checkpoint that is placed directly on the conveyor system of the security checkpoint for screening.
  • the grouping of items is a grouping of trays and each item in the grouping of items is a tray assigned to the person newly arrived at the checkpoint to allow the person to place therein belongings to be screened.
  • the conveyor system may include mechanical switches in the switching area of the screening station for controlling the displacement of the items through the security checkpoint screening system.
  • the computing system of the security checkpoint screening system may be programmed with software for using the assigned clearance statuses to generate and release signals for controlling the mechanical switch of the conveyor system in the switching area to direct the respective items to the specific ones of the at least two post-scan areas.
  • the signals generated using the assigning clearance statuses may be configured for causing the conveyor system to direct all items in the grouping of items to a same one of the at least two post-scan areas.
  • the data conveying identification information associated to the two or more items is obtained from computer readable tags attached to the two or more items.
  • the security checkpoint screening system may comprise a reader module in communication with the computing system for obtaining tray identification information from the computer readable tags associated to the two or more items and for providing the identification information to the computing system in association with the person newly arrived at the screening station.
  • the type of computer readable tag, and type of associated reader module may vary between specific implementations and many different possibilities may be contemplated by person skilled in the art.
  • the computer readable tags include bar code(or QR code) information and the reader module is a bar- code reader (or QR code reader) configured to scan the bar code (or QR code) information;
  • the computer readable tags include RFID (Radio Frequency Identification) information and the reader module is a RFID reader configured to scan the RFID information;
  • the computer readable tags include an NFC memory and the reader module is a NFC-enabled device.
  • the screening station may further include an input device for generating a signal conveying a new arrival at the security checkpoint and for providing the signal to the computing system.
  • the input device may be embodiment in any suitable form including for example a hand held device operated by a screening agent at the screening station, a computer implemented user interface including user operable controls for allowing the person to provide an input conveying arrival at the security checkpoint.
  • the input device for generating the signal conveying the new arrival at the security checkpoint may include a detection module that is part of a tray dispensing module in the screening area of the screening station.
  • the person detection module may for example include a user interface including user operable controls for allowing the person newly arrived at the screening station to provide an input conveying arrival at the security checkpoint.
  • the detection module may include a user interface including user operable controls for allowing the person to provide information specifying a number of trays to be provided for holding the belongings to be screened and/or specifying a number of computer readable article tags to be provided to be attached to articles placed directly on the conveyor system.
  • the detection module for detecting the arrival of the person at the security checkpoint includes at least one of a light barrier, a computer vision system, a turnstile and a weight activated mat.
  • the detection module may be part of a tray dispensing module, this need not be the case and it is to be understood that the detection module may be a separate module for detecting arrival of a new person.
  • the screening station may further include an input device for generating a signal conveying information associated with the person newly arrived at the security checkpoint, the input device being in communication with the computing system for providing the signal conveying the information.
  • the information may be in different forms including, without being limited to, a picture of the person newly arrived at the security checkpoint, a description of physical characteristics of the person (eye color, hair color, height and/or any other suitable physical characteristic of the person), biometric information associated with the person (e.g. finger print, facial scan, hand palm scan, retinal scan and/or any other suitable biometric identifier) and/or information extraction from an identification document (e.g. passport, driver's license, boarding pass, ticket and/or any other suitable identification document).
  • an identification document e.g. passport, driver's license, boarding pass, ticket and/or any other suitable identification document.
  • the nature of the input device may vary between practical implementations and may include, for example but without being limited to, one or more of the following: a camera for generating the picture of the person; a biometric reader for generating the biometric information (e.g. a finger print scanner, a face scanner, a hand palm scanner and/or a retinal scanner and/or any other suitable reader); an input device for allowing screening agent to enter information conveying a description of physical characteristics of the person (eye color, hair color, height and/or any other suitable physical characteristic of the person); a scanning device for scanning an identification document associated with the person.
  • a camera for generating the picture of the person
  • a biometric reader for generating the biometric information
  • an input device for allowing screening agent to enter information conveying a description of physical characteristics of the person (eye color, hair color, height and/or any other suitable physical characteristic of the person)
  • a scanning device for scanning an identification document associated with the person.
  • a computer program product comprising one or more tangible non-transitory computer readable storage media storing computer executable instructions for use in screening persons' belongings at a security checkpoint, the security checkpoint including a scanning area for screening the items to derive data, a pre-scan area lying before the scanning area, at least two post-scan areas lying subsequent to the scanning area and a switching area to direct the persons' belongings to different post-scan areas of the at least two post-scan areas.
  • the computer executable instructions when executed, cause a programmable system including at least one programmable processor to perform operations, the operations comprising:
  • a method for screening persons' belongings at a security checkpoint wherein the security checkpoint includes a scanning area for screening the persons' belongings to derive data, a pre-scan area lying before the scanning area, at least two post- scan areas lying subsequent to the scanning area and a switching area to direct the persons' belongings to different post-scan areas of the at least two post-scan areas.
  • the method comprises: receiving data conveying identification information associated with two or more items belonging to a person newly arrived at the screening station;
  • each item in the grouping of items is one of:
  • a computer program product comprising one or more tangible non-transitory computer readable storage media storing computer executable instructions for use in screening persons' belongings at a security checkpoint, the security checkpoint including a scanning area for screening the persons' belongings to derive data, a pre-scan area lying before the scanning area, at least two post-scan areas lying subsequent to the scanning area and a switching area to direct the persons' belongings to different post-scan areas of the at least two post-scan areas.
  • the computer executable instructions when executed, cause a programmable system including at least one programmable processor to perform operations in accordance with the above described method.
  • a method for screening persons' belongings at a security checkpoint including a scanning area for screening the persons' belongings to derive data, a pre-scan area lying before the scanning area and at least one post-scan area lying subsequent to the scanning area.
  • the method comprises:
  • the grouping of items includes two or more items; - using the conveyor system to carry the items in the grouping of items from the pre- screening area through the scanning area to derive data associated with the items in the grouping of items;
  • selectively triggering the alarm module in connection with the specific items may include one or more of the following:
  • the post-scan area may include two or more post-scan areas and a switching area may be provided to direct the items to different post-scan areas of the at least two post-scan areas.
  • selectively triggering the alarm module in connection with the specific item may include using assigned clearance statuses to direct the specific item to a specific one of said at least two post-scan areas.
  • a security checkpoint screening system comprising a screening station having: a scanning area including one or more scanning device for scanning persons' belongings with penetrating radiation to derive data;
  • the security checkpoint screening system also comprises computing system having one or more programmable processors in communication with the screening station, the computing system being programmed with software for implementing the above described method.
  • a computer program product comprising one or more tangible non-transitory computer readable storage media storing computer executable instructions for use in screening persons' belongings at a security checkpoint, the security checkpoint including a scanning area for screening the items to derive data, a pre-scan area lying before the scanning area and at least one post-scan area lying subsequent to the scanning area.
  • the computer executable instructions when executed, cause a programmable system including at least one programmable processor to implement the above described method.
  • Figure 1 shows a non-limiting example of a security checkpoint screening system in accordance with a specific non-limiting example of implementation of the present invention
  • Figure 2 shows a block diagram of a computing system for use with the security checkpoint screening system of Figure 1 in accordance with a specific non-limiting example of implementation of the present invention
  • Figure 3 shows groupings of trays including one, two or more trays that may be assigned to respective passengers (persons) in accordance with a specific non-limiting example of implementation of the present invention
  • FIG 4A is a block diagram showing functional components of a screening agent input device suitable for use with the security checkpoint screening system of Figure 1 in accordance with a specific non-limiting example of implementation of the present invention
  • Figure 4B shows a handheld device incorporating at least some functional elements of the screening agent input device of Figure 4A in accordance with a specific non-limiting example of implementation ;
  • Figure 5A shows a block diagram of a passenger input device that may be suitable for use with the security checkpoint screening system of Figure 1 in accordance with a specific non-limiting example of implementation of the present invention
  • Figure 5B,5C and 5D illustrate specific non-limiting examples of user interfaces that may be suitable for use with the passenger input device depicted in Figure 5A.
  • Figure 6A shows a block diagram of a (passenger) detection module suitable for use with the security checkpoint screening system of Figure 1 in accordance with a specific non-limiting example of implementation of the present invention
  • Figure 6B shows an example of a tray dispenser module incorporating the (passenger) detection module of Figure 6A in accordance with a specific non-limiting example of implementation of the present invention
  • Figure 7 shows a non-limiting example of a security checkpoint screening system incorporating the tray dispensing module of Figure 6B in accordance with an alternative specific non-limiting example of implementation of the present invention
  • Figure 8A shows a non-limiting example of a security checkpoint screening system having a passenger identification input device in accordance with another specific non-limiting example of implementation of the present invention
  • Figure 8B shows a non-limiting example of the passenger identification input device of Figure 8A, where the passenger identification input device includes a camera, in accordance with a specific non-limiting example of implementation of the present invention
  • FIG 8C shows an alternative non-limiting example of the passenger identification input device of Figure 8A, where the passenger identification input device includes biometric readers, in accordance with another specific non-limiting example of implementation of the present invention
  • Figure 8D shows another non-limiting example of the passenger identification input device of Figure 8A, where the passenger identification input device includes a scanning device for scanning a passenger identification document, in accordance with another specific non-limiting example of implementation of the present invention
  • Figure 9 is a perspective view of a tray suitable for use with the security checkpoint screening system of Figure 1 according to a non-limiting example of implementation of the invention.
  • Figure 10 shows a process for screening items at a security checkpoint of the type depicted in Figure 1 in accordance with a non-limiting example of implementation of the invention;
  • Figure 11 shows a process for deriving a clearance status associated with a specific tray in a grouping of trays in accordance with a non-limiting example of implementation of the invention
  • Figure 12 shows a process for deriving a clearance status associated with a specific tray in a grouping of trays in accordance with another non-limiting example of implementation of the invention
  • Figure 13 shows a process for deriving a clearance status associated with a specific tray in a grouping of trays in accordance with another non-limiting example of implementation of the invention
  • Figures 14A and 14B are diagrammatic representations of a grouping of trays illustrating clearance statuses in accordance with non-limiting examples of implementation of the invention.
  • Figure 15A and 15B are diagrammatic representations of a switching area of the security checkpoint screening system in accordance with non-limiting examples of implementation of the invention
  • Figure 16A and 16B are diagrammatic representations of images of trays to illustrate images generated by screening devices that may be by the security checkpoint screening system shown in Figure 1 in accordance with non-limiting examples of implementation of the invention
  • Figure 17 shows a non-limiting example of a security checkpoint screening system in accordance with another specific non-limiting example of implementation of the present invention.
  • Figure 18 is a block diagram of a distributed computing system that may be used with the security checkpoint screening system of Figure 1 in accordance with an alternative specific non-limiting example of implementation of the present invention
  • heating e.g. natural gas, fuel oil, district heating
  • the personal belongings of the passenger are all placed in trays prior to scanning so that the items being scanned are trays holding the passengers' belongings.
  • articles may be placed directly on the conveyor system and so the items being screened include individual articles and/or include a combination of trays holding belongings and articles being placed directly on the conveyor system.
  • the security checkpoint screening system 100 includes a screening station 120.
  • the screening station 120 includes a scanning area 190 having one or more scanning devices 150 for screening passengers' belongings (e.g. with penetrating radiation) to derive data, a pre-scan area 188 lying before the scanning area 190 and at least two post scan areas 192 194 lying subsequent to the scanning area 190.
  • the screening station 120 also includes a switching area 180 to direct the items to different ones of the post-scan areas 192 194 and a conveyor system 185 for controlling displacement of the items through the security checkpoint screening system 100.
  • the one or more scanning devices 150 are depicted in Figure 1 as being comprised of a single scanning device 150 however it is to be expressly understood that, in alternative implementations, multiple scanning devices of the same of different types may be used to scan items at the checkpoint.
  • a single pre-scan area 188 is depicted in the Figure for the purpose of simplicity, in alternative implementations the system may comprise multiple/parallel pre-screening area in which the passenger may divest their belongings for screening.
  • a passenger i.e., a person
  • his/her personal belongings e.g., carry-on luggage, coat, lap-top, mobile phone, and/or other personal belongings
  • the passenger e.g., passenger 200A
  • the pre-scan area 188 places his/her personal belongings in one, two or more trays (e.g., trays 300AI 300 A 2 ) which are then directed by the conveyor system 185 to the one or more scanning devices 150 (e.g. X-ray devices, CT-devices or other).
  • the trays 300 used by the system 100 may be associated with respective computer readable tags attached thereto conveying tray identification information.
  • the security checkpoint screening system 100 is configured to create a grouping of trays (e.g., tray grouping 300A, as shown in Figure 3) comprising multiple trays(e.g., tray grouping 300A includes trays 300AI and 300A 2 ) assigned to a given passenger (e.g., passenger 200A).
  • a grouping of trays e.g., tray grouping 300A, as shown in Figure 3
  • the system 100 may use the tray identification information stored on the computer readable tag associated with the trays alone or in combination with information that may be associated with the passenger.
  • the trays are directed to the scanning area 190 for scanning by the one or more scanning devices 150, and the passenger may pass through one or more passenger screening devices 122 (e.g., a metal detector, full body scanner, etc.) to gain access to the secured side of the security checkpoint (e.g., post scan area 192).
  • the one or more scanning devices 150 scan the trays to derive data, which is then processed to assess whether the items in each tray of the grouping of trays may present a potential security threat.
  • the data may be processed using an automated threat detection engine, may be processed by a human operator using visual inspection or may be processed by a combination of an automated threat detection engine and visual inspection by a human operator.
  • the screening results assigned to the trays may also take into account result from other screening processes including, without being limited to, trace detection, liquid detection devices and body scanning amongst others.
  • screening results obtained for individual trays in a grouping may be used to influence the screening process and/or screening results of other trays belonging to that same grouping.
  • the trays are directed to a switching area 180 where the trays are directed to one of the post-scan areas 192 194.
  • the switching of the trays may be to a first post-scan area 192 for reclaim by the passenger and/or to a second post-scan area 194 for secondary screening, which may include further scanning and/or manual searching for example.
  • the screening results obtained for the one or more trays in the grouping of trays are used to control at least in part the switching of each of the trays in the grouping of trays to direct the tray to either the first post-scan area 192 or the second post-scan area 194.
  • the security checkpoint screening system 100 also includes, or may be in communication with, a computing system 175.
  • the computing system 175 includes one or more input/output interfaces 300 in communication with the screening station 120, one or more programmable processors 302 and one or more computer readable memory units 306 (e.g., one or more tangible non-transitory computer readable storage media for storing computer executable instruction anaVor computer readable data).
  • the one or more programmable processors 302 may be implemented using any suitable CPU (central processing unit), IC (integrated circuit), ASIC (application specific integrated circuit), DSP (digital signal processor), FPGA (field programmable gate array) and/or other suitable hardware device.
  • the one or more computer readable memory units 306 may include RAM (random access memory), ROM (read only memory), flash memory, hard disk drive(s) and/or any other suitable memory device.
  • the computing system 175 may be located proximate to the screening station 120 or may be remotely located from the screening station ] 20.
  • the computing system 175 may alternatively be distributed in nature where different devices that may be located in different locations to implement various parts of the processing and/or communication functions described in the present document.
  • computing system 175 may include more than one computing entity, where one computing entity may be located proximate to the screening station 120 and another computing entity may be located remote from the screening station 120, the computing entities being in communication with one another over a computer network. It will be appreciated by the person skilled in the art in view of the present description that the specific configuration of the computing system 175 may vary between implementations.
  • FIG. 1 Five passengers 200A 200B 200C 200D 200E are shown at the screening station 120.
  • the passenger 200A and the passenger 200B are located in the pre-scan area 188.
  • two trays 300AI 300 A2 are assigned to the passenger 200A such that the passenger 200A places his/her personal belongings in the two trays 300AI 300A 2 and the security checkpoint screening system 100 is configured to associate the two trays 300AI 300 A2 to one another to create a grouping of trays 300A. Examples of manners in which grouping of trays may be created will be discussed later one in this document.
  • the three trays 300B I 300B 2 300B 3 are assigned to the passenger 200B such that the passenger 200B places his/her personal belongings into the three trays 300BI 300B 2 300B 3 and the security checkpoint screening system 100 is configured to associate to one another the three trays 300B i 300 ⁇ 2 300B 3 to create a grouping of trays 300B- Looking back to Figure 1, the trays 300A i 300A 2 of the passenger 200A and the trays 300B I 300B 2 300 B3 of the passenger 200B may be directed by the conveyor system 185 to the scanning area 190.
  • the passenger 200c shown to be located at the scanning area 190 has placed his/her personal belongings in a single tray 300 C i (see Figure 3).
  • the grouping of trays 300c for that passenger is comprised of a single tray, namely 300ci-
  • a grouping of trays refers to one, two or more trays which are associated into a logical tray grouping.
  • a grouping of trays refers to trays that have been logically grouped together without the trays having necessarily being sequentially positioned on the conveyor system 185.
  • tray 300AI assigned to passenger 200A is following by two trays assigned to passenger 200B before another tray 300A2 appears in the sequence of trays.
  • the passenger 200D has placed his/her personal belongings in four trays 300DI 300D 2 300D 3 300D 4 , which in Figure 1 are shown to be located in the switching area 180 and in post scan area 192.
  • the four trays 300 D1 300D 2 300D 3 300o 4 would have been assigned to the passenger 200p in the pre-scan area 188 and the security checkpoint screening system 100 would have associated the four trays 300DI 300D 2 300D 3 300D 4 to one another in order to create a grouping of trays 300D-
  • the passenger 200E has placed her personal belongings in two trays 300EI 300E2, which in Figure 1 are shown to be located in post scan area 194.
  • the trays 300 used at the security checkpoint screening system 100 have respective computer readable tags attached thereto conveying tray identification information.
  • the computer readable tags may including information in any suitable format including for example bar code (or QR code) information, RFID (Radio Frequency Identification) information, a Near Field Communication (NFC) memory device or any other information format suitable for allowing the trays in the plurality of tray to be distinguished from one another and preferably to be uniquely identified.
  • a suitable electronic reader may be used to obtain the information from the computer readable tag, such as, for example, a bar-code reader to scan the bar code (or QR code) information, an RFID reader to scan the RFID information, an NFC enabled device for scanning the information stored in the NFC memory device or any other suitable device.
  • FIG. 9 illustrates a perspective view of non-limiting example of implementation a tray 300' that may be used in connection with the security checkpoint screening system 100.
  • the tray 300' may be made of any durable material (e.g., plastic and/or any other suitable non-metallic material) that penetrating radiation is able to pass through.
  • the tray 300' includes a tray body 302, where the tray body 302 may include a base portion and sidewalls extending from the base such that the tray body 302 defines an area for receiving belongings to be screened.
  • the tray 300' also includes a computer readable tag 304.
  • the computer readable tags 304 may be attached and/or embedded to/with the tray 300' .
  • Each computer readable tag 304 of each respective tray 300' at the screening station 102 stores identification information.
  • the identification information of each computer readable tag 304 may include a unique identifier.
  • the unique identifier may be used by the computing system 175 to distinguish from each other trays in a plurality of trays and/or to create groupings of trays.
  • the computer readable tag 304 includes bar code information 308.
  • the bar code information 308 of each tray at the screening station 120 includes identification information.
  • some articles to be screened may be placed directly on the conveyor system (rather than being placed in trays), computer readable tags including identification information may be attached to these articles themselves.
  • a temporary RFID tag may be attached to articles placed directly on the conveyor system in the pre-screening area and/or a unique code may be embedded in an RFID tag within the article(the code may optionally be assigned to the passenger himself and embedded in the RFID tag in the article).
  • the security checkpoint screening system 100 may be configured such that, in the pre-scan area 188 of the screening station 120, functional components are provided for detecting arrival of new passengers.
  • the security checkpoint screening system 100 may be configured to create a grouping of trays (including one, two or more trays) at least in part based on detection of a passenger newly arrived at the security checkpoint, where the trays in the grouping of trays are assigned to the newly arrived passenger to allow the newly arrived passenger to place belongings to be screened in the trays of the grouping of trays.
  • the specific approach used for creating a grouping of trays at the security checkpoint may vary between implementations and some specific non-limiting examples for creating a grouping of trays will be described in the present document.
  • the screening station 120 may include an input device 354 for generating a signal informing the computing system 175 of new arrivals at the security checkpoint.
  • a "new arrival” or a passenger “newly arrived” is used in this document to refer to a passenger that has arrived at the pre-scan area 188 of the security screening station 120 and that will be undergoing a screening process.
  • the input device 354 may be utilized to convey to the computing system 175 that the passenger 200A s a new arrival at the security checkpoint.
  • the input device 354 is configured to generate a signal conveying a new arrival at the security checkpoint and for providing the generated signal to the computing system 175.
  • the input device 354 may also be configured to obtain and provide to the computing system 175 tray identification information obtained from computer readable tags attached to the one or more trays to be used by the newly arrived passenger.
  • the signal generated may be transmitted from the input device 354 to the computing system 175 over any suitable communication link including a wired or wireless link.
  • Input device 354 may include device for operation by screening agent
  • a first non-limiting example of implementation of the input device 354 for generating the signal conveying the new arrival is shown in Figure 4A as including a screening agent input device 400 to be operated by a screening agent 10 (shown in Figure 4A) and may include user operable controls 410 for allowing the screening agent 10 to provide an input conveying the new arrival at the security checkpoint and an input/output interface 412 for exchanging signals with the computing system 175.
  • the screening agent input device 400 may also include a reader module 450 suitable for obtaining information from the computer readable tag attached to the trays, such as, for example, a bar-code (or QR code) reader to scan the bar code (or QR code) information, an RFID reader to scan the RFID information, an NFC enabled device for scanning the information stored in the NFC memory device or any other suitable device.
  • a reader module 450 suitable for obtaining information from a passenger's boarding pass, passport and/or other passenger document as will be illustrated by way of specific non-limiting examples later on in the present document.
  • the user operable controls 410 may also allow the screening agent 10 to provide a command for causing the reader module 450 to obtain tray identification information in connection with one or more trays to be used by the new arrival.
  • the screening agent input device 400 may further include a processor and/or computer readable memory in communication with the controls 410, the input/output interface 412 and the optional electronic/optical reader module 450, wherein the computer readable memory stores instructions for the operation of the screening agent input device 400.
  • Figure 4B illustrates a non-limiting practical implementation of the screening agent input device 400 of Figure 4A in the form of a hand-held device 400' for generating the signal conveying the new arrival and, optionally, for obtaining tray identification information in connection with one or more trays to be used by the new arrival.
  • the reader module 450 for obtaining tray identification information in connection with one or more trays to be used by the new arrival is shown as including an electronic/optical reader 450' in the form of an infra-red bar-code reader.
  • a push button 410 a ' is provided as a user operable control, wherein the screening agent 10 may actuate the push button 410a' each time a newly arrived passenger arrives at the screening station 120.
  • the actuation of push button 410 a ' may cause the electronic/optical reader module 450' to read a computer readable code on a document associated with the new passenger, for example a boarding pass, passport, driver's license or any other suitable document, in order to obtain passenger information.
  • Another push button 410 b ' is provided as a user operable control, wherein the screening agent 10 may actuate the push button 410 b ' for each new tray taken by the newly arrived passenger at the screening station 120.
  • actuation of the push button 410 b ' m ay cause the electronic/optical reader module 450' to read a computer readable code associated with a tray used by the newly arrived passenger.
  • the reader module may be separate from the handheld device 400' and may be located elsewhere in the pre-scan area 188.
  • the reader module may include sensors located in the pre-scan area configured for obtained tray identification information in connection with one or more trays to be used by the new arrival.
  • At least some of the user operable controls 410 of the screening agent input device 400 of figure 4A may be implemented as part of a graphical user interface displayed on a display device of a computing device.
  • the user operable controls may include one of more touch sensitive areas on the display device to allow the agent 10 to provide an input conveying arrival at the security checkpoint of a passenger.
  • the computing system 175 of the security checkpoint screening system 100 may receive data from the input device 354 conveying identification information associated with the one, two or more trays (e.g., trays 300AI 300 A 2 ) assigned to a passenger (e.g., passenger 200A) newly arrived at the screening station 120.
  • the data conveying identification information associated to the trays may be obtained from computer readable tags 304 attached to the trays (e.g., trays 300AI 300 A2 ).
  • the screening agent 10 marks the arrival of the new passenger by actuating user input 410 a '. This actuation generates a signal that is transmitted to the computing system 175 to convey that a new arrival has been detected and that a new grouping of trays is to be created.
  • identification information associated with passenger 200 A may be obtained by scanning an identification document associated with the passenger (e.g. boarding pass, ticket, passport, travel document, driver's license).
  • the passenger information may also be provided to the computing system 175.
  • the screening agent 10 assigns two trays 300AI 300 A 2 to the passenger 200A.
  • the assignment of the two trays 300 A i 300 A 2 in this specific example is done by the screening agent 10 pressing twice the control user input 410b' of the handheld device 400' and scanning each of the computer readable tags associated with the two trays 300AI 300A 2 with the reader module 450 of the handheld device 400' .
  • the handheld device 400' transmits data to the computing system 175 conveying the tray identification information of the two trays 300AI 300A 2 .
  • the computing system 175 processes the tray identification information of the two trays 300AI 300 A2 to create a new grouping of trays, namely grouping of trays 300A.
  • the screening agent 10 again marks the arrival of that new passenger by actuating user input 410 a ' and the process begins again.
  • Input device 354 may include a device for operation bv a passenger
  • the input device 354 for generating the signal conveying the new arrival may be configured as a passenger input device and be essentially implement in a manner similar to the screening agent input device 400 described with reference to Figures 4A and 4B with some adjustments and will be apparent to the person skilled in the art in light of the present description.
  • Another non-limiting example of implementation of the input device 354 for generating the signal conveying the new arrival is shown in Figure 5A as including a passenger input device 500.
  • the passenger input device 500 is shown to be operated by passenger 200A to be screened by the security checkpoint system 100. It is to be appreciated that the passenger input device 500 shown in Figure 5A may in some implementations be used as an alternative to the screening agent input device 400 shown in Figure 4A or, alternatively, as an additional component of the input device 354.
  • the passenger input device 500 includes a computer implemented user interface 505 having one or more user operable controls 510 for allowing the passenger to provide an input conveying arrival at the security checkpoint and, optionally, to allow the passenger to request one or more trays in which to place his/her items.
  • the passenger input device 500 also includes one or more programmable processors (not shown in the figures) for implementing the functionality of the passenger input device 500.
  • the passenger input device 500 may be located in the pre-scan area 188 of the screening station 120 and be in communication with the computing system 175 such that signals conveying the user inputs provided by a passenger arriving at the security checkpoint through the passenger input device 500 may be transmitted to the computing system 175.
  • Shown in Figures 5B, 5C and 5D are three non-limiting examples of passenger input devices 500' , 500" and 500" ' (analogous to passenger input device 500) including respective user interfaces 505', 505" and 505" ' (analogous to user interface 505) with user operable controls 510', 510" and 510" ' (analogous to user operable controls 510) for allowing the passenger to provide an input conveying arrival at the security checkpoint and, optionally, to allow the passenger to request one or more trays in which to place his/her items.
  • passenger input devices 500' , 500" and 500" ' analogous to passenger input device 500
  • respective user interfaces 505', 505" and 505" ' analogous to user interface 505
  • user operable controls 510', 510" and 510" ' analogous to user operable controls 510 for allowing the passenger to provide an input conveying arrival at the security checkpoint and, optionally, to allow the passenger to request one or
  • the user operable controls 510' and 510" are in the form of push-buttons on a keypad and/or a touch sensitive area on a graphical user interface for facilitating entry of information by the passenger.
  • each actuation of the control labelled "Push to receive tray(s)" by the passenger results in a tray being dispensed and assigned to the passenger.
  • the passenger input device may include a device for scanning a boarding pass of the passenger, such as for example control 510" ' shown in Figure 5D, to allow the passenger to provide an input conveying arrival at the security checkpoint.
  • the control 510" ' may include any suitable type of electronic reader.
  • the information obtained by scanning the board pass may be used to associate the passenger to trays in the grouping.
  • the passenger input device 500 may include user operable controls for allowing the passenger to provide information specifying a number of computer readable article tags to be provided to be attached to articles placed directly on the conveyor system.
  • the configuration of such alternate passenger input device may be similar to the examples depicted in Figures 5B, 5C and/or 5D.
  • ⁇ device 354 may include a (passenger) detection module
  • a third non-limiting example of implementation of the input device 354 for generating the signal conveying the new arrival is shown in Figure 6A as including a (passenger) detection module 610.
  • the (passenger) detection module 610 may in some implementations be used as an alternative to the screening agent input device 400 shown in Figure 4A and/or passenger input device 500 of the type described with reference to Figure 5A or, alternatively, as an additional component of the input device 354 used in combination with one or more other devices.
  • the (passenger) detection module 610 is configured for detecting the presence of a new passenger at the pre-scan area 188 and for generating a signal conveying a new arrival at the security checkpoint to the computing system 175.
  • the (passenger) detection module 610 may be embodied in many different suitable forms including, without being limited to, weight sensitive mats/surface optical sensors, turnstiles, light barriers, computer vision systems and/or any other suitable tool that may allow detecting the presence of a person at the screening station 120.
  • the (passenger) detection module 610 may include devices for allowing the passenger to request trays.
  • the (passenger) detection module 610 may include a user interface 615 including user operable controls 625 for allowing a passenger to provide an input conveying arrival at the security checkpoint.
  • the user interface 615 of the (passenger) detection module 610 may alternatively, or additionally, include user operable controls 625 for allowing the passenger to provide information specifying a number of trays to be provided for holding the belongings to be screened.
  • the user interface 615 of the (passenger) detection module 610 may alternatively, or additionally, include user operable controls for allowing the passenger to provide information specifying a number of computer readable article tags to be provided to be attached to articles placed directly on the conveyor system.
  • Input device 354 ma y be pan of trax dispensing module
  • the input device 354 for generating the signal conveying the new arrival may be part of a tray dispensing module configured for dispensing trays to passengers at the security checkpoint.
  • the input device 354 may include a passenger input device 500 of the type described with reference to Figure 5A and/or a screening agent input device 400 of the type described with reference to Figure 4A and/or (passenger) detection module 610 of the type described with reference to Figure 6A for detecting the presence of the passenger at the pre- scan area 188.
  • FIG. 6B shows an example of a tray dispensing module 605 for dispensing trays to passengers in accordance with a specific embodiment in which a (passenger) detection module 610 is integrated.
  • the tray dispensing module 605 may be located in the pre-scan area 188 of the screening station 120.
  • the tray dispensing module 605 may include a casing for enclosing a plurality of trays and, optionally, a mechanism (not illustrated) for providing trays from the plurality of trays to the passenger.
  • the tray dispensing module 605 may also include a reader module (not shown in the figure) suitably located in the tray dispensing module 605 for reading computer readable tags attached to the trays 300 as they are being dispensed to a given passenger.
  • the reader module may be in communication with the (passenger) detection module 610 such that the (passenger) detection module 610 may transmit the tray identification information of the trays obtained by the reader provided to a specific passenger via the tray dispenser 605 to the computing system 175.
  • the (passenger) detection module 610 for detecting the arrival of the passenger at the security checkpoint includes (or is in communication with) a light barrier 704 and a weight activated mat 352.
  • the light barrier 704 is positioned in this example at the pre-scan area 188 to detect the passenger 200A newly arriving at the pre-scan area 188.
  • the weight activated mat 352 may be used to detect that the passenger is still in the pre-scan area 188 and has not yet left to proceed to be scanned by the passenger screening device 122.
  • the (passenger) detection module 610 may communicate the tray identification information of the two trays 300AI 300A2 to the computing system 175, such that the computing system 175 is able to process this information to create the grouping of trays 300A. More specifically, in this example, when the passenger 200A enters the pre-scan area 188 and passes through the light barrier 704, the light barrier 704 generates a signal that is communicated to the (passenger) detection module 610 indicating that a new passenger has arrived.
  • the weight activated mat 352 may also send a signal indicating that a passenger is also presently standing on the weight activated mat 352.
  • the reader module 450 reads the computer readable tags 304 of the trays 300A i 300A 2 which is communicated to the (passenger) detection module 610 or, alternatively, directly to the computational system 175.
  • the weight activated mat 352 sends a signal to the (passenger) detection module 610 indicating that the passenger 200A is no longer presently on the weight activated mat 352.
  • the (passenger) detection module 610 sends to the computing system 175 the tray identification information of the trays 300A i 300 A 2 provided to the passenger 200A from the tray dispensing module 605 during the timeframe the passenger was in the pre-scan area 188.
  • the computing system 175 may then generate the grouping of trays 300A.
  • the weight activated mat 352 may be omitted and an additional light barrier (not illustrated) may be placed subsequent to the area where the passenger divests his/her trays onto the conveyor system 185 (e.g., at the exit way of the pre-scan area 188) to detect that the passenger is leaving the pre-scan area 1 88 and moving towards the scanning area 190.
  • an additional light barrier (not illustrated) may be placed subsequent to the area where the passenger divests his/her trays onto the conveyor system 185 (e.g., at the exit way of the pre-scan area 188) to detect that the passenger is leaving the pre-scan area 1 88 and moving towards the scanning area 190.
  • the (passenger) detection module 610 may include (or be in communication with) one or more turnstiles (not illustrated) in addition, or alternately, to the light barrier 704.
  • the turnstile may include a mechanical gate consisting of revolving horizontal arms fixed to a vertical post for allowing only one passenger at a time to pass through the turnstile to the pre- scanning area 188.
  • One or more turnstiles may be positioned at the entrance way and/or the exit way of the pre-scan area 188.
  • the turnstiles may communicate with the (passenger) detection module 610 such that the (passenger) detection module 610 is able to determine the presences of a newly arrived passenger in the pre-scan area 188 upon actuation of the turnstile and may identify trays assigned to that passenger.
  • a turnstile may be positioned at the entrance way to the pre-scan area 1 88 to communicate the detection of a passenger newly arrive to the computer system 175 and a light barrier 704 may be positioned at exit way of the pre-scan area 188 to communicate the departure of the passenger newly arrive from the pre-scan area 188 to the computer system 175.
  • the input device 354 for communicating with the computing system 175 of a new passenger arrival at the security checkpoint may include the use of computer vison technology (not illustrated).
  • the computer vision technology may include one or more cameras connected to an imaging sensing system that is configured to detect a new passenger arrival at the security checkpoint, where the imaging sensing system is in communication with the computing system 175.
  • the computing system 175 may be configured to detect and track when a new passenger arrives and/or is assigned trays and associated the assigned trays to the passenger in a grouping of trays. Ojiiion l passenger information associated with trav groupings
  • the computing system 175 may group the trays in the absence of passenger information (i.e., any information regarding the passenger such as a picture, name, etc.).
  • an ability to create a grouping of trays owned by a same passenger without the identity of the passenger necessarily being known may be desirable in some practical implementations as it may allow respecting privacy laws/concerns in force in some jurisdictions.
  • the security checkpoint screening system 100 may be configured such that, in the pre-scan area 188, the security checkpoint screening system 100 obtains passenger information for the passenger newly arrived at the security checkpoint.
  • the input device 354 shown in Figure 1 may be configured with a suitable electronic device for obtaining passenger information.
  • passenger information may be used in lieu of a signal conveying a new arrival at the security checkpoint. In other words, it may not be necessary for all implementations to have two different signals namely one for conveying a new arrival and another signal conveying passenger information.
  • Figure 8 A shows a non-limiting example of the security checkpoint screening system 100 where the security checkpoint screening system 100 includes a passenger identification input device 800 in accordance with a specific non-limiting example of implementation.
  • the screening station 120 includes the input device 800, where the input device 800 is for generating a signal conveying passenger information associated with a passenger (e.g., passenger 200A) newly arrived at the security checkpoint.
  • the input device 800 may be in communication with the computing system 175 for providing a signal conveying passenger information.
  • the passenger information may then be associated with the grouping of trays assigned to the passenger newly arrived at the security checkpoint.
  • Figure 8B shows a specific and non-limiting example of the passenger identification input device 800, identified as passenger identification input device 800' in the figure, where the passenger identification input device 800' includes a camera 810 (which could be a video camera, still-shot camera, IR camera or any other suitable type of camera) for generating a picture of a passenger.
  • the camera 810 may capture the picture of the passenger 200A when the passenger 200A newly arrives at the checkpoint so that the picture may be communicated to the computing system 175.
  • the computing system 175 may store the picture of the passenger 200A in association with the grouping of trays 300A such that a screening agent in the scanning area 190 and/or the post scanning areas 192 194 may be able to associate the passenger 200A with the trays 300AI 300 ⁇ 2 ⁇
  • a screening agent in the scanning area 190 and/or the post scanning areas 192 194 may be able to associate the passenger 200A with the trays 300AI 300 ⁇ 2 ⁇
  • the screening agent may be presented (e.g., on a display device) the image of the passenger 200A and/or the images of the scanned trays 300AI 300A 2 in the grouping of trays 300A.
  • the image of the passenger 200A may be sent to a screening agent along with the images of the scanned trays from the one or more scanning devices 150, such that the screening agent may take the picture of the passenger into account when reviewing the images of the trays 300AI 300A 2 .
  • the computing system 175 may process the picture of the passenger and generate a computer readable description of the passenger (e.g., the approximate height, age, hair colour, eye colour and the like) such that the computer readable description is associated with the grouping of trays 300A-
  • a computer readable description of the passenger e.g., the approximate height, age, hair colour, eye colour and the like
  • FIG 8C shows another specific and non-limiting example of the passenger identification input device 800, identified as passenger identification input device 800" in the figure, including a biometric reader for generating passenger information including biometric information associated with the passenger.
  • the biometric reader may include for example a finger print scanner 825 and/or a retinal scanner 820 and/or face recognition and/or hand palm recognition and/or any other suitable type of biometric reader system.
  • the biometric reader may capture biometric information (e.g., finger print and/or retina information, etc.) associated with the passenger 200A newly arrived at the checkpoint prior to the passenger 200A being assigned the trays 300AI 300 A2 ⁇
  • the passenger identification input device 800" may communicate the biometric information of the passenger 200A to the computing system 175.
  • the computing system 175 may also/instead process the biometric information of the passenger 200A against one or more reference databases to determine if the passenger 200A is part of a registered/trusted travel program (e.g., Pre-Check, Nexus, etc.). Additionally, or alternatively, the biometric information of the passenger 200A may be processed against other types of databases (e.g., a counterterrorism database contain biometric information of known terrorists, a criminal database, etc.) to determine if the passenger 200A may pose a security threat. The computing system 175 may process the biometric information of the passenger 200A to determine the identification information of the passenger 200A, such as the passengers name, addresses, etc.
  • a registered/trusted travel program e.g., Pre-Check, Nexus, etc.
  • the biometric information of the passenger 200A may be processed against other types of databases (e.g., a counterterrorism database contain biometric information of known terrorists, a criminal database, etc.) to determine if the passenger 200A may pose a security threat.
  • the biometric information of the passenger 200A or any information derived from the biometric information may be stored in association with the grouping of trays 300A-
  • the computing system 175 may store the biometric information of the passenger 200A or any information derived from the biometric information (e.g., that the passenger 200A is member of a trusted travel program, the passenger's name, that the passenger may have known terrorist connections, etc.) in association with the trays in the grouping of trays 300A such that the processing conducted in the scanning area 190 and/or the post scanning areas 192 194 may be able to take such information into account when assigning a threat assessment result.
  • the screening agent may be presented (e.g., on a display device) with the information derived from the biometric information (e.g., that the passenger 200A is member of a trusted travel program, the passenger's name, that the passenger may have known terrorist connections, etc.) and/or the images of the scanned trays 300AI 300A 2 in the grouping of trays 300A.
  • the information derived from the biometric information e.g., that the passenger 200A is member of a trusted travel program
  • the information derived from the biometric information may be used to influence the threat detection process applied at the security checkpoint, for example by increasing and/or decreasing the level of scrutiny applied by an automated threat detection algorithm (for example by modulating the sensitivity level of the algorithm) when processing images of the trays to assigning threat assessment results in accordance.
  • Figure 8D shows another non-limiting example of the passenger identification input device 800, identified as passenger identification input device 800" ' in the figure, including a scanning device 860 for scanning a passenger identification document 855 associated with the passenger 200A-
  • the passenger identification document 855 may include a boarding pass, a ticket, a passport, a driver's license and/or any other document suitable for providing passenger information in connection with the passenger.
  • the scanning device 860 may scan the passenger identification document 855 (e.g., boarding pass, a ticket, a passport and/or a driver's license, etc.) associated with the passenger 200A newly arrived at the checkpoint prior to the passenger 200A being assigned the trays 300AI 300A 2 .
  • the passenger identification input device 800" ' may communicate the identification information of the passenger 200A obtained from the passenger identification document 855 to the computing system 175.
  • the computing system 175 may process the identification information of the passenger 200A against one or more reference databases to determine if the passenger 200A is part of a registered/trusted travel program (e.g., Pre-Check, Nexus, etc.).
  • a registered/trusted travel program e.g., Pre-Check, Nexus, etc.
  • the identification information of the passenger 200A may be processed against other types of databases (e.g., a counterterrorism database contain biometric information of known terrorists, criminal database, etc.) to determine if the passenger 200A may pose a security threat.
  • the identification information of the passenger 200A obtained from the passenger identification document 855 or any information derived therefrom may be stored in association with the grouping of trays 300A-
  • the computing system 175 may store the passenger information of the passenger 200A (e.g., the name, age, etc.
  • flight information that the passenger 200A is member of a trusted travel program, that the passenger may have known terrorist connections, etc.
  • flight information that the passenger 200A is member of a trusted travel program, that the passenger may have known terrorist connections, etc.
  • processing conducted in the scanning area 190 and/or in the post scanning areas 192 194 may be able to take such information into account when assigning a threat assessment result.
  • the screening agent may be presented (e.g., on a display device) the information derived from the identification information of the passenger 200A and/or the images of the scanned trays 300AI 300A2 in the grouping of trays 300A-
  • the identification information of the passenger 200A may be sent to a remote screening agent along with the images of the scanned trays 300AI 300A 2 from the one or more scanning devices 150.
  • the information derived from the identification information may be used to influence the threat detection process applied at the security checkpoint, for example by increasing and/or decreasing a level of scrutiny applied by an automated threat detection algorithm (for example by modulating the sensitivity level of the algorithm) when processing images of the trays to assigning threat assessment results.
  • an automated threat detection algorithm for example by modulating the sensitivity level of the algorithm
  • the conveyor system 185 includes conveyors for directing items placed thereon in the pre-scan area 188, through the scanning area 190 and onto one of the post scan areas 192 194.
  • the conveyor system 185 is configured to allow items to be placed thereon and to direct trays placed on the conveyor system 185 to the scanning area 190. More specifically, the width of the conveyor system 185 is sufficient to accommodate the placement of trays within which the items to be scanned are placed.
  • the conveyor system 185 includes mechanical switches in communication with the computing system 175 such that the computing system may be able to control the conveyor system 185 so as to control the displacements of items placed thereon to direct items to one or the other of the post scan areas 192 194.
  • the scanning area 190 includes one or more scanning devices 150; although, for example purposes only a single scanning device 150 is illustrated in Figure 1.
  • the scanning device 150 is configured to scan items with penetrating radiation directed from one or more sources, where the penetrating radiation has a wavelength, frequency and energy that is sufficient to penetrate the tray 300 and its contents.
  • the scanning device may be any suitable device using penetrating radiation to scan items in order to generate data including, without being limited to, X-ray scanners (single or multi-view) and CT scanners.
  • the specific manner in which the images are generated using penetrating radiation is not critical and may vary between implementations. As such, the generation of data will not be described in further details here.
  • the data is provided to a processor module (not shown in the Figures) which processes the data to generate images (e.g., X-ray image or CT-image or CT reconstructed image) of the contents being scanned.
  • images e.g., X-ray image or CT-image or CT reconstructed image
  • the generated images of the items may be processed and/or analyzed further by human and/or automated means (e.g., processed by an automated threat detection (ATD) and/or image enhancement engine and visually reviewed by a screening agent, etc.) in order to assign threat assessment results to the trays.
  • ATD automated threat detection
  • the processor module for processing the image data to generate an image may be proximate to the scanning devices 150 or alternatively may be located remotely from the scanning devices 150 (e.g., at a remote processing facility elsewhere inside or outside of the airport).
  • the image data may be transmitted over a data network to the computing system 175 for processing to derive an image from the image data.
  • the one or more scanning devices 150 may be configured to be in communication with the computing system 175.
  • the computing system 175 may be programmed with software for receiving the image data associated with respective trays holding items being scanned via the input/output interface 412, the image data being derived by scanning the trays with penetrating radiation as the conveyor system 185 displaces the trays from the pre-screening area 188 through the scanning area 190.
  • the scanning device 150 may include a reader module (not illustrated) that is able to read the computer readable tag 304 of the tray 300.
  • the reader module associated with the one or more scanning devices 150 for reading the computer readable tags 304 of the trays 300 may be similar to the reader module 450 discussed elsewhere in this document.
  • the image data associated with the trays 200AI 00A 2 and the tray identification information obtained from the computer readable tags 304 associated with the trays 200AI 200A 2 are processed by the computer system 175. More specifically, in this example the scanning device 150 scans the first tray 200AI to obtain image data associated with the first tray 200AI and the computer readable tag 304 associated with the trays 200AI is also read to obtain the tray identification information associated with the trays 200AI. Then, image data associated with the first tray 200AI and the tray identification information associated with the trays 200AI is communicated to the computer system 175.
  • the computer system 175 may process and/or store the image data associated with the first tray 200AI and the tray identification information associated with the trays 200A- In this example, the computer system 175 previously received from input device 354 information that the trays 200AI 200 A 2 form a grouping of tray 200A. The computer system 175 may proceed to derive a threat assessment result and/or clearance status associated with the first tray 200AI- Threat assessment results and clearance status are further discussed below.
  • the scanning device 150 also scans the second tray 200A 2 to obtain image data associated with the second tray 200A 2 and the computer readable tag 304 associated with the trays 200A2 is read to obtain the tray identification information associated with the tray 200A 2 - Then, image data associated with the second tray 200A 2 and the tray identification information associated with the trays 200A 2 is communicated to the computer system 175.
  • the computer system 175 may process and/or store the image data associated with the second tray 200A2 and the tray identification information associated with the tray 200A 2 .
  • the computer system 175 may proceed to derive a threat assessment result and/or clearance status associated with the second tray 200A2 which may include taking into account the threat assessment result and/or clearance status associated with the first tray 200AI and/or update the threat assessment result and/or clearance status associated with the first tray 200AI based on the threat assessment result and/or clearance status associated with the second tray 200 A 2 .
  • the security checkpoint screening system 100 may be configured to processes image data associated with trays in a grouping of trays to assign a respective clearance status to respective trays in the grouping of trays. Specific manners in which clearance statuses may be assigned may vary and some practical examples for assigning clearance status will be described herein in order to illustrate this aspect.
  • the specific clearance status assigned to a specific tray in a grouping of trays may be derived by the computing system 175 at least in part by processing tray specific threat assessment results associated with the specific tray in the grouping of trays and threat assessment results associated with the grouping of trays.
  • the security checkpoint screening system 100 is configured to use the assigned clearance status to cause the conveyor system 185 to direct the tray to a specific one of the two post-scan areas 192 194. More specifically, and in accordance with a practical embodiment, the conveyor system 185 is configured to control displacement of the items through the security checkpoint.
  • the conveyor system 1 85 may include one or more mechanical switches 181 in the switching area 180 of the screening station 120 for controlling the displacement of the items through the security checkpoint screening system 100.
  • the computer system 175 may control the mechanical switches 181.
  • the computing system 175 may process assigned clearance statuses associated with respective trays to generate and release signals for controlling the mechanical switch 181 of the conveyor system 185 in the switching area 180 of the screening station 120 to direct respective trays to the specific ones of said at least two post-scan areas 192 194 .
  • a specific and non-limiting example of a process 1100 that may be implemented by the system depicted in Figure 1 for screening items belonging to a common passenger placed in multiple trays will now be described with reference to Figure 10 and to Figure 1.
  • a passenger 200B arrives at the pre-scan area 188 of the security checkpoint and the security checkpoint screening system 100 detects the new arrival of the passenger 200B (step 1102).
  • the detection of the arrival of the passenger 200B may be performed according to one or more of the embodiments and/or examples described elsewhere in this document.
  • the passenger 200B is then assigned trays 300B i 300B 2 300B 3 in which he/she places his/her personal belongings.
  • the assignment of the trays 300B i 300 B2 300B 3 may be performed according to one or more of the embodiments and/or examples described elsewhere in this document.
  • the computing system 175 receives tray identification information in connection with, the trays assigned to the passenger 200B and creates a grouping of trays 300 B based on the detection of the passenger 200B newly arrived (step 1104).
  • the grouping of the trays 300B may be created in accordance with the one or more of the embodiments and/or examples described elsewhere in this document.
  • the conveyer system 185 is used to carry the trays 300B I 300B 2 300B 3 in the grouping of trays 300B from the pre-scan area 188 though a scanning area 190 to derive image data associated with trays 300 B i 300 b2 300B3 in the grouping of trays 300 B (step 1106).
  • the derived image data associated with trays 300B I 300B 2 300B 3 in the grouping of trays 300B is then processed to assign respective clearance statuses to respective trays 300B i 300B 2 300B 3 in the grouping of trays 300B (step 1108).
  • the image data may be processed using an automated threat detection engine, may be processed by a human operator using visual inspection or may be processed by a combination of an automated threat detection engine and visual inspection by a human operator.
  • FIG. 16A example of images 19B I 19B 2 19B3 of the trays 300 B i 300B2 300B 3 derived from the image data are shown. As shown:
  • an automated threat detection (ATD) engine may have been used to process images 19B I 19B 2 19B3 of the trays 300B i 300B 2 300B 3 derived from the image data to derive the tray specific threat assessment results of the trays 300B I 300B 2 300B 3 .
  • the tray specific threat assessment results may be assigned by a human operator (e.g., a remote screening agent or a screening agent positioned proximate to the scanning device 150) based on a visual inspection of the images 19B I 1 B2 19B3 of the trays 300B I 300B 2 300B3.
  • the tray specific threat assessment results may be assigned by a combination of an ATD process and a visual inspection performed by a human operator.
  • image 19B3 may have been processed by an automated ATD engine and image 19B I may have been subjected to visual inspection by a human operator.
  • image 19B I may have been subjected to visual inspection by a human operator.
  • the clearance status of a specific tray (e.g., 300B 2 ) in the grouping of trays 300B may be derived by taking into account the tray specific threat assessment results associated with the specific tray (e.g., 300B 2 ) and the threat assessment results associated with the grouping of trays (e.g., the threat assessment results of one or more of the trays 300B I 300B3, as well).
  • the clearance status of a particular tray in the grouping of trays 300B may be assigned so that if any one tray in the grouping is marked as "not cleared”, all trays in the grouping are assigned a clearance status of "not cleared” or "marked for further inspection” irrespective of actual threat assessment results of the other individual trays.
  • all trays in the grouping are marked as "cleared”
  • all trays in the grouping can be assigned a clearance status of "cleared”.
  • trays holding items belonging to a common passenger (owner) may be directed to a same "post-scan" area (e.g., to a reclaim area 192 or to an area for further scanning/search 194).
  • the clearance status of the other trays in the grouping of trays may be derived in part using results obtained by applying an additional threat assessment process to the images 19B I 1 B2 19B 3 , for example an automated process having a higher sensitivity value and/or by causing an additional visual inspection of the image to be performed by a human operator.
  • an additional threat assessment process for example an automated process having a higher sensitivity value and/or by causing an additional visual inspection of the image to be performed by a human operator.
  • the conveyor system 185 uses the clearance statuses assigned to the trays in the grouping of trays 300B (namely trays 300B i 300B2 and 300B 3 ) to control switches in the switching area 180, the conveyor system 185 directs the trays 300B I 300B 2 300B 3 to specific ones of at least two post-scan area 192 194 (step 1 1 10).
  • the two post-scan area 192 194 are a baggage reclaim area 192 and an area for further inspection and/or screening 194.
  • selectively triggering the alarm module in connection with the specific items may include selectively releasing an audio signal and/or visual signal when the specific tray reaches a specific area in the security checkpoint (for example but without being limited to when the tray exits the scanning area).
  • This may also/instead include selectively causing the conveyor system to cease displacing the specific item through the security checkpoint (to essentially "stop") when the specific item reaches a specific area in the security checkpoint, in some cases to allow the specific item to be displaced by a human operator to a specific post-scan area for further inspection or, alternatively, to allow the specific item to undergo inspection by security personnel prior to the conveyor system resuming displacing the specific item.
  • This other practical embodiment may be used in connection with security checkpoints having two or more post-screening areas of the type depicted in Figure 1 where the conveyor system may be configured to automatically dispatch an item identified as presenting a potential security threat, or requiring additional scrutiny, to an area for further scanning and/or manual searching.
  • the conveyor system includes mechanical switches that may be controlled by the derived clearance status to dispatch items to specific post scan areas.
  • This other practical embodiment may also be used in connection with security checkpoints that may have one or more post-screening areas but where the conveyor system does not have mechanisms for dispatching items to different post scan areas.
  • the system may be configured to cause the movement of the conveyor system to be interrupted when an item reaches a specific zone when the clearance status identifies the item as presenting a potential security threat, or requiring additional scrutiny.
  • the interruption in the displacement of an item by the conveyor system provides time for a human operator to take the item and process it as appropriate.
  • the image data associated with tray 300BI is obtained from the scanning device 150 to derive a tray specific threat assessment result, which in this specific example is "cleared" as there was no identification of a potentially threat in the tray 300BI .
  • the threat assessment results associated with a grouping of trays 300B is derived by processing image data associated with at least one tray in the grouping of trays 300B other than the specific tray 300B I (namely tray 300B 2 in this example).
  • the image data associated with tray 300B 2 obtained from the scanning device 150 is processed to derive a tray specific threat assessment result, which in this case would be "not cleared”.
  • the tray specific threat assessment results associated with the specific tray 300B I are selectively adjusted at least in part by processing the threat assessment results associated with the grouping of trays 300B -
  • the specific clearance status associated with the specific tray 300B I is derived at least in part by processing the adjusted tray specific threat assessment results associated with the specific tray 300B i.
  • the selective adjustment at step 1406 of the tray specific threat assessment results associated with a specific tray may include selectively applying a threat detection process to the image data associated with the specific tray, for example by selectively using one or more automated threat detected engines to process the image data and or by selectively subjecting the image conveyed by the image data to visual inspection by a human operator.
  • the adjusted tray specific threat assessment result would be based at least in part on results obtained by the selective application of the threat detection process to the image data associated with the specific tray.
  • tray specific threat assessment results assigned to a specific tray in a grouping conveys that the tray was "not cleared”
  • the system may be configured to select not to apply a threat detection process to image data associated with some or all the other trays in the grouping (for example tray 300B 3 ) and instead assign an adjusted tray specific threat assessment result to tray 300B3 as "not cleared”. In some cases, this may allow to save computational processing pertained to image data and/or save screening operator time.
  • the selective adjustment of the tray specific threat assessment results associated with a specific tray may include marking the specific tray (e.g., tray 300B i) for further inspection irrespective of the tray specific threat assessment results of at least one other tray (e.g., 300B 2 ) in the grouping of trays is marked for further inspection.
  • tray 300B 2 assigned a tray specific threat assessment result of "cleared” has already reached post-scan area 192 by the time tray 300 B3 is scanned in the scanning area 190 and assigned a tray specific threat assessment result of "not cleared” (or "further inspection required").
  • a specific tray e.g., tray 300 B2
  • the system may be configured so that some of the other trays in the grouping (e.g., tray 300B 3 ), which may not yet have been scanned by the scanning device 150, may altogether by-pass scanning by the scanning device 150 and be marked for further inspection without requiring any processing of image data associated with such trays.
  • tray 300 ⁇ 3 has been assigned a clearance status of "marked for further inspection” even though it has not yet been scanned in the scanning area 190.
  • the threat assessment results may be conveyed as a numerical value within a range of potential numerical values (e.g., between 0 and 10, where 0 is low risk and 10 is high risk).
  • the selective adjustment of a specific tray threat assessment result may include increasing or decreasing the numerical value of the assessment result.
  • the threat assessment of tray 300BI may be selectively adjusted by increasing the tray specific threat assessment result of 300B I to a higher value, for example "7".
  • the threat assessment result for a specific tray may be a graded classification (e.g., low risk, medium risk, high risk) and the selective adjustment of a specific tray threat assessment result may be changing the classification of the specific tray.
  • the threat assessment of tray 300B I may be selectively adjusted by updating the classification of tray specific threat assessment result of 300B l to "medium risk”.
  • step 1502 information conveying the threat assessment results associated with a grouping of trays of which a specific tray is part is received (e.g., grouping of trays 300D), wherein the threat assessment results associated with the grouping of trays were derived at least in part by processing image data associated with at least one tray (e.g., tray 300DI ) in the grouping of trays other that the specific tray (e.g., tray 300D 2 ).
  • image data associated with the specific tray (e.g., tray 300D I) is processed to derive the tray specific threat assessment results, wherein the process applied to the image data associated with the specific tray in order to assign a threat assessment result is selectively adjusted at least in part by processing the threat assessment results associated with the grouping of trays (e.g., grouping of trays 300 D ).
  • the selective adjustment of the processing of the image data associated with the specific tray at step 1504 may include, without being limited to, choosing to apply (or to not apply) an automated threat assessment process to the image; selectively modifying a sensitively level of an automated threat detection engine used to process the image data associated with the specific tray and/or choosing to subject an image conveyed by the image data to visual inspection by one or more human operators at the checkpoint or at a remote screening location.
  • tray 300EI image 19EI
  • the sensitivity level may be increased.
  • the specific clearance status associated with the specific tray (e.g., tray 300E 2 ) in the grouping of trays (e.g., grouping of trays 300E) is derived at least in part by processing the derived tray specific threat assessment results associated with the specific tray at step 1504.
  • FIG. 16 Another specific and non-limiting example of a practical process 1600 that may be implemented for deriving a clearance status associated with a specific tray in a grouping of trays at step 1108 (shown in Figure 10) will now be described with reference to Figure 13 and Figure 1 .
  • passenger information is obtained and used by the computing system 175 in order to modulate the threat assessment results assigned to trays in grouping of trays.
  • the computing system 175 receives from the input device 354 a signal conveying passenger information associated with a passenger newly arrived at the security checkpoint.
  • the identification information associated with the passenger newly arrived at the security checkpoint may be obtained according to one or more of the embodiments and/or examples described elsewhere in this document.
  • the computing system 175 uses the passenger information associated with the passenger newly arrived at the security checkpoint to access a database and obtain information conveying a risk profile associated with the newly arrived passenger.
  • the computing system 175 may communicate over a computer network with a passenger risk database to provide the passenger risk database with the passenger information associated with the passenger newly arrived at the security checkpoint.
  • the passenger risk database may process the passenger information against its records to extract a risk profile associated with the passenger newly arrived at the security checkpoint.
  • the specific manner in which a risk profile in connection with a passenger is determined is not critical, is beyond the scope of the present disclosure and will therefore not be described further here.
  • the risk profile associated with the newly arrived passenger is then communicated to the computing system 175.
  • the specific clearance status assigned to the specific tray in the grouping of trays is the derived at least in part by processing:
  • an ability to create a grouping of trays owned by a same passenger with some information related to the identity of the passenger may allow using a risk profile associated with the passenger newly arrived at the security checkpoint to influence the screening process of the grouping of trays.
  • the trays assigned to the passenger newly arrived at the security checkpoint may be subjected to reduced processing and/or review.
  • the risk profile associated with the passenger newly arrived at the security checkpoint indicates a high risk
  • all of the trays of a grouping of trays assigned to the passenger newly arrived at the security checkpoint may be automatically directed to the area for further inspection and/or scanning 194 regardless of the results from the scanning device 150 or without scanning the trays assigned to the passenger newly arrived at the security checkpoint with the scanning device 150.
  • the system may be configured to allow a screening operator to display on a display device in communication with the system 175 an image of the tray concurrently with images of other trays in the grouping of trays so that the screening operator may view all images at the same time.
  • Figure 17 shows an example of a security checkpoint screening system 100' for use at a security checkpoint in accordance with an alternative embodiment.
  • the security checkpoint screening system 100' is shown as including a screening station 120' (analogous to screening station 120 shown in Figure 1) having two scanning devices 150, 150 2 (analogous to scanning device 150 shown in Figure 1) in the scanning area 190' (analogous to scanning area 1 0 shown in Figure 1) for scanning items with penetrating radiation to derive image data.
  • the security checkpoint screening system 100' also includes a pre-scan area 188' (analogous to pre-scan area 188 shown in Figure 1 ) lying before the scanning area, four post scan areas 192i 194i 192 2 194 2 (analogous to post-scan areas 192 and 194 shown in Figure 1) lying subsequent to the scanning area 190', switching areas 180i 180 2 (analogous to switching area 180 shown in Figure 1) to direct the items to different post- scan areas 192
  • a pre-scan area 188' analogous to pre-scan area 188 shown in Figure 1
  • four post scan areas 192i 194i 192 2 194 2 analogous to post-scan areas 192 and 194 shown in Figure 1 lying subsequent to the scanning area 190'
  • switching areas 180i 180 2 ana
  • An input device 354' (analogous to input device 354 shown in Figure 1) is also provided in the pre-scan area 188' for generating a signal conveying a new arrival at the security checkpoint 100' and, optionally for obtaining tray identification information associated with one or more trays to be used by the new arrival. While the input device 354' has been shown in Figure 17 has being a single module, it is to be appreciated that in practical implementations functionality pertaining to the input device 354' may be implemented by multiple devices interconnected with various components of the system 100' .
  • a computing system 175' (analogous to computing system 175 shown in Figure 1), is in communication with the two scanning devices 150
  • a passenger may divest his/her personal belongings for screening by the scanning devices 150i 150 2 .
  • the same passengers 200A and 200B as well as the same trays 300AI 300A 2 and 300BI 300B 2 300B3 referred to in Figures 1 and 3 will be used to illustrate the functionality of the system 100' depicted in Figure 17.
  • the passenger e.g., passenger 200A
  • the pre-scan area 188' may place his/her personal belongings in multiple trays (e.g., trays 300AI 300A 2 ) which are then directed by the conveyor system 185' to the scanning devices 150i 150 2 (e.g. X-ray devices, CT-devices or other).
  • the scanning devices 150i 150 2 e.g. X-ray devices, CT-devices or other.
  • the security checkpoint screening system 100' is configured to create groupings of trays for the multiple trays assigned to respective passengers.
  • the passenger 200A has been assigned trays 300AI 300A 2 associated with the grouping of trays 300A (as shown in Figure 3) and the passenger 200B has been assigned trays 300B 1 300B2 300B3 associated with the grouping of trays 300B (as shown in Figure 3).
  • the trays 300AI 300 A2 300B 1 300B 2 300B 3 are directed to one or more of the scanning devices 150j 150 2 .
  • trays belonging to a same passenger may be directed to a same scanning device.
  • the trays 300AI 300A 2 in the grouping of trays 300A may be directed to the first scanning device 150i and the trays 300B I 300B 2 300B 3 in the grouping of trays 300B may be directed to the second scanning device 150 2 .
  • a reader module (not shown) may be provided and be located prior to the scanning devices 150i 150 2 to read the computer readable tags associated with the trays 300AI 300 A2 300 B I 300B 2 300B 3 to control the movement of a mechanical switch I8I 3 to direct trays in respective groupings of trays to one of the scanning devices 150i 150 2 .
  • the scanning devices 150] 150 2 scan the trays and the image data derived is processed to assess whether the items in each tray of the grouping of trays may present a potential security threat. After the trays are scanned at the scanning area 190', the trays exiting the first scanning device 150i are directed to a switching area 180 1 and the trays exiting the second scanning device 150 2 are directed to a switching area 180 2 .
  • the trays from the switching area 180i may then be directed to one of the two post-scan areas 192j 194i (e.g., by the mechanical switch 181 1 ) and the trays from the switching area 180 2 may then be directed to one of the two post-scan areas 192 2 194 2 (e.g., by the mechanical switch 181 2 ).
  • the post-scan areas 192i 194[ are a reclaim area and an area for further inspection and/or scanning, respectively
  • the post- scan areas 192 2 194 2 are a reclaim area and an area for further inspection and/or scanning, respectively.
  • the trays 300AI 300A2 300B I 300B 2 300B 3 may be directed to either the post-scan areas 192i 194i 192 2 194 2 based at least on the screening results obtained in connection with one or more trays in the grouping of trays in a similar fashion as described elsewhere in this document in relation to the security checkpoint screening system 100.
  • the security checkpoint screening system 100' may have two post scan areas 192 and 194 similar to that of the security checkpoint screening system 100 and a suitable conveyor system may be configured to route the trays from each of the scanning devices 150i 1 0 2 to one of the post-scan areas 192 and 194.
  • Figure 18 illustrates a non-limiting network-based system for screening items at a security checkpoint in accordance with some specific examples of implementation.
  • one or more scanning devices 150 ⁇ ' 150 2 ' may communicate with a computing system 2175 over a network 2102.
  • Computing system 2175 may implement functionality that is analogous to the functionality implemented by computing systems 175 and 175' described earlier in the present document.
  • the communication links between the various components, systems and/or devices shown in Figure 18 may be comprised of metallic conductors, optical fibers, wireless links or any other suitable type of communication link.
  • the network 2102 may be any suitable network including for example, but not limited to a global public network such as the Internet, a private network and/or a wireless network.
  • the ATD engine 2104 may be used to process image data originating from the one or more scanning devices 150i 150 2 , as described elsewhere in this document.
  • the passenger risk database 2106 may include a non-transitory computer readable memory and may store data conveying a passenger risk profiles.
  • threat assessment results as being derived by processing data obtained by scanning the trays using scanning devices
  • other factors may also being taken into account when deriving threat assessment results associated to a tray including, without being limited to: body scanning results associated with the passenger, trace detection, metal detectors, origin/destination/itinerary of the passenger, behavioral information associated with the passenger that may be provided by security agents, flight number, airline, number of transits, how the ticket was booked, level of security alert, results obtained from other screening device and other suitable information that may be useful.
  • phrases “connected to” and “in communication with” refer to any form of interaction between two or more entities, including mechanical, electrical, magnetic, and electromagnetic interaction. Two components may be connected to each other even though they are not in direct contact with each other and even though there may be intermediary devices between the two components.
  • the terms “around”, “about” or “approximately” shall generally mean within the error margin generally accepted in the art. Hence, numerical quantities given herein generally include such error margin such that the terms “around”, “about” or “approximately” can be inferred if not expressly stated.

Abstract

L'invention porte sur un procédé et sur un système associé de passage au crible d'objets personnels de personnes au niveau d'un poste de contrôle de sécurité. Le poste de contrôle comprend une zone de balayage, une zone de prébalayage, une ou plusieurs zones de postbalayage et un système transporteur. Le système permet à des articles appartenant à une même personne d'être examinés ensemble lors de l'attribution d'états d'autorisation aux articles respectifs. Les articles peuvent comprendre un ou plusieurs plateaux portant des objets personnels de la personne et/ou un ou plusieurs articles qui sont placés directement sur le système transporteur. Les données dérivées par passage au crible des deux articles sont reçues et utilisées pour attribuer à chaque article un état d'autorisation respectif. Les états d'autorisation attribués sont dérivés en traitant des résultats d'évaluation de menace spécifiques d'article et des résultats d'évaluation de menace associés au groupement d'articles de telle sorte que les états d'autorisation peuvent prendre en compte différents articles appartenant à une même personne. Les états d'autorisation attribués peuvent être utilisés de différentes manières par le système, par exemple pour générer des signaux destinés à amener le système transporteur à diriger des articles vers des zones de postbalayage spécifiques et/ou à déclencher sélectivement un module d'alarme.
PCT/CA2016/051212 2016-08-01 2016-10-19 Système de passage au crible à un poste de contrôle de sécurité et procédés associés WO2018023190A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201662369399P 2016-08-01 2016-08-01
US62/369,399 2016-08-01

Publications (1)

Publication Number Publication Date
WO2018023190A1 true WO2018023190A1 (fr) 2018-02-08

Family

ID=61072177

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2016/051212 WO2018023190A1 (fr) 2016-08-01 2016-10-19 Système de passage au crible à un poste de contrôle de sécurité et procédés associés

Country Status (1)

Country Link
WO (1) WO2018023190A1 (fr)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109821751A (zh) * 2019-03-22 2019-05-31 合肥三益江海智能科技有限公司 一种基于ct机快件自动查验分拣系统
WO2020236015A1 (fr) * 2019-05-22 2020-11-26 D-Tx Group Limited Partnership Procédé et système de traitement de données de machine d'exploration électromagnétique
CN112093442A (zh) * 2020-09-02 2020-12-18 顺丰科技有限公司 小型快件自动化快速批量扫码流水线及其处理方法
CN113848591A (zh) * 2020-06-28 2021-12-28 同方威视技术股份有限公司 基于毫米波安检设备的查验方法和系统以及服务器
CN114289324A (zh) * 2022-01-28 2022-04-08 上海韦斯杰实业有限公司 双线空框回传结构及双线空框回转方法
US11336674B2 (en) 2018-06-20 2022-05-17 Chertoff Group, LLC Transportation security apparatus, system, and method to analyze images to detect a threat condition
WO2022117770A1 (fr) * 2020-12-02 2022-06-09 Utterberry Ltd Systèmes de surveillance de sécurité
US11631152B2 (en) * 2016-10-17 2023-04-18 Nuctech Company Limited Security check system and method for configuring security check device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050248450A1 (en) * 2004-05-04 2005-11-10 Lockheed Martin Corporation Passenger and item tracking with system alerts
US20070132580A1 (en) * 2002-07-03 2007-06-14 Ambrefe Joseph T Jr Trays for use in security screening
US20070280502A1 (en) * 2001-10-01 2007-12-06 L-3 Communications Security And Detection Systems, Inc. Networked security system
EP3040741A1 (fr) * 2014-12-29 2016-07-06 Nuctech Company Limited Système d'inspection de sécurité intégrée

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070280502A1 (en) * 2001-10-01 2007-12-06 L-3 Communications Security And Detection Systems, Inc. Networked security system
US20070132580A1 (en) * 2002-07-03 2007-06-14 Ambrefe Joseph T Jr Trays for use in security screening
US20050248450A1 (en) * 2004-05-04 2005-11-10 Lockheed Martin Corporation Passenger and item tracking with system alerts
EP3040741A1 (fr) * 2014-12-29 2016-07-06 Nuctech Company Limited Système d'inspection de sécurité intégrée

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11631152B2 (en) * 2016-10-17 2023-04-18 Nuctech Company Limited Security check system and method for configuring security check device
US11336674B2 (en) 2018-06-20 2022-05-17 Chertoff Group, LLC Transportation security apparatus, system, and method to analyze images to detect a threat condition
US11846746B2 (en) 2018-06-20 2023-12-19 Chertoff Group, LLC Transportation security apparatus, system, and method to analyze images to detect a threat condition
CN109821751A (zh) * 2019-03-22 2019-05-31 合肥三益江海智能科技有限公司 一种基于ct机快件自动查验分拣系统
WO2020236015A1 (fr) * 2019-05-22 2020-11-26 D-Tx Group Limited Partnership Procédé et système de traitement de données de machine d'exploration électromagnétique
CN113848591A (zh) * 2020-06-28 2021-12-28 同方威视技术股份有限公司 基于毫米波安检设备的查验方法和系统以及服务器
CN112093442A (zh) * 2020-09-02 2020-12-18 顺丰科技有限公司 小型快件自动化快速批量扫码流水线及其处理方法
WO2022117770A1 (fr) * 2020-12-02 2022-06-09 Utterberry Ltd Systèmes de surveillance de sécurité
GB2616776A (en) * 2020-12-02 2023-09-20 Utterberry Ltd Security monitoring systems
CN114289324A (zh) * 2022-01-28 2022-04-08 上海韦斯杰实业有限公司 双线空框回传结构及双线空框回转方法

Similar Documents

Publication Publication Date Title
WO2018023190A1 (fr) Système de passage au crible à un poste de contrôle de sécurité et procédés associés
US10713914B2 (en) Intelligent security management system
US7286634B2 (en) Method and apparatus for improving baggage screening examination
EP3040741B1 (fr) Système d'inspection de sécurité intégrée
US20040190757A1 (en) Integrated passenger management system
US20130285806A1 (en) Travel situation detection system
EP1685574A2 (fr) Procede et dispositif permettant d'ameliorer le controle des bagages
CN106548263A (zh) 一种智能安全检查系统和方法
US20210225106A1 (en) Information processing apparatus, information processing method, and storage medium
CN111783915B (zh) 安检系统及其行李跟踪系统
US20170236232A1 (en) Integrated Security Inspection System
CA2531587A1 (fr) Point de controle de securite
WO2007109607A2 (fr) Système de criblage et de vérification
US11443576B2 (en) System and method for baggage control
JP2017091498A (ja) ゲート装置
CN106503761A (zh) 物品安检判图系统及方法
CN109313281B (zh) 用于筛查物品的系统及方法
NL2026564B1 (en) screening device for screening a person
Milbredt et al. Aviation security automation: The current level of security automation and its impact
JP2021056869A (ja) 施設利用者管理システム
WO2021199158A1 (fr) Dispositif de traitement d'informations, procédé de traitement d'informations et support d'enregistrement
Kondori et al. Smart baggage in aviation
Boussadia The evolution of airport screening technology
US20230334927A1 (en) Information processing apparatus, information processing method, and storage medium
RU2009106829A (ru) Система для управления и контроля за перемещением людей и/или предметов в оборудованных зонах

Legal Events

Date Code Title Description
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16910797

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16910797

Country of ref document: EP

Kind code of ref document: A1