Computer system and method for improving security screening
First Claim
1. A computing system comprising:
- at least one processor; and
a non-transitory computer-readable storage medium comprising instructions stored thereon that, when executed by the at least one processor, cause the computing system to;
perform an initial security screening on an object based on (i) a first set of security-related data associated with the object comprising first image data corresponding to a first scan of the object by a detection device communicatively coupled to the computing system and (ii) a first set of security screening parameters, wherein performing the initial security screening comprises;
based on the first image data, executing a neural network in accordance with the first set of security screening parameters; and
based on executing the neural network in accordance with the first set of security screening parameters, generating a first security determination for the object;
perform a supplemental security screening on the object based on (i) a second set of security-related data associated with the object comprising at least one of (a) the first image data or (b) second image data corresponding to a second scan of the object and iii) a second set of security screening parameters, wherein performing the supplemental security screening comprises;
based on at least one of (a) the first image data or (b) the second image data, executing a neural network in accordance with the second set of security screening parameters; and
based on executing the neural network in accordance with the second set of security screening parameters, generating a second security determination for the object; and
provide to a computing device an output notification based on at least one of (i) the first security determination or (ii) the second security determination; and
wherein the first set of security-related data is different from the second set of security-related data, and wherein the first set of security screening parameters is different from the second set of security screening parameters.
2 Assignments
0 Petitions
Accused Products
Abstract
In an example, a computing device comprises at least one processor, a memory, and a non-transitory computer-readable storage medium storing instructions thereon that, when executed, cause the at least one processor to perform functions comprising: performing an initial security screening on an object based on a first set of security-related data associated with the object and a first set of security screening parameters, and performing a supplemental security screening on the object based on a second set of security-related data associated with the object and a second set of security screening parameters. The first set of security-related data may be different from the second set of security-related data, and the first set of security screening parameters may be different from the second set of security screening parameters.
-
Citations
20 Claims
-
1. A computing system comprising:
-
at least one processor; and a non-transitory computer-readable storage medium comprising instructions stored thereon that, when executed by the at least one processor, cause the computing system to; perform an initial security screening on an object based on (i) a first set of security-related data associated with the object comprising first image data corresponding to a first scan of the object by a detection device communicatively coupled to the computing system and (ii) a first set of security screening parameters, wherein performing the initial security screening comprises; based on the first image data, executing a neural network in accordance with the first set of security screening parameters; and based on executing the neural network in accordance with the first set of security screening parameters, generating a first security determination for the object; perform a supplemental security screening on the object based on (i) a second set of security-related data associated with the object comprising at least one of (a) the first image data or (b) second image data corresponding to a second scan of the object and iii) a second set of security screening parameters, wherein performing the supplemental security screening comprises; based on at least one of (a) the first image data or (b) the second image data, executing a neural network in accordance with the second set of security screening parameters; and based on executing the neural network in accordance with the second set of security screening parameters, generating a second security determination for the object; and provide to a computing device an output notification based on at least one of (i) the first security determination or (ii) the second security determination; and wherein the first set of security-related data is different from the second set of security-related data, and wherein the first set of security screening parameters is different from the second set of security screening parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method comprising:
-
performing an initial security screening on an object based on (i) a first set of security-related data associated with the object comprising first image data corresponding to a first scan of the object by a detection device communicatively coupled to the computing system and (ii) a first set of security screening parameters, wherein performing the initial security screening comprises; based on the first image data, executing a neural network in accordance with the first set of security screening parameters; and based on executing the neural network in accordance with the first set of security screening parameters, generating a first security determination for the object; performing a supplemental security screening on the object based on (i) a second set of security-related data associated with the object comprising at least one of (a) the first image data or (b) second image data corresponding to a second scan of the object and (ii) a second set of security screening parameters, wherein performing the supplemental security screening comprises; based on at least one of (a) the first image data or (b) the second image data, executing a neural network in accordance with the second set of security screening parameters; and based on executing the neural network in accordance with the second set of security screening parameters, generating a second security determination for the object; and providing to a computing device an output notification based on at least one of (i) the first security determination or (ii) the second security determination; and wherein the first set of security-related data is different from the second set of security-related data, and wherein the first set of security screening parameters is different from the second set of security screening parameters. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A tangible non-transitory computer-readable storage medium comprising instructions stored thereon that, when executed by at least one processor, cause a computing system to:
-
perform an initial security screening on an object based on (i) a first set of security-related data associated with the object comprising first image data corresponding to a first scan of the object by a detection device communicatively coupled to the computing system and (ii) a first set of security screening parameters, wherein performing the initial security screening comprises; based on the first image data, executing a neural network in accordance with the first set of security screening parameters; and based on executing the neural network in accordance with the first set of security screening parameters, generating a first security determination for the object; perform a supplemental security screening on the object based on (i) a second set of security-related data associated with the object comprising at least one of (a) the first image data or (b) second image data corresponding to a second scan of the object and (ii) a second set of security screening parameters, wherein performing the supplemental security screening comprises; based on at least one of (a) the first image data or (b) the second image data, executing a neural network in accordance with the second set of security screening parameters; and based on executing the neural network in accordance with the second set of security screening parameters, generating a second security determination for the object; and provide to a computing device an output notification based on at least one of (i) the first security determination or (ii) the second security determination; and wherein the first set of security-related data is different from the second set of security-related data, and wherein the first set of security screening parameters is different from the second set of security screening parameters. - View Dependent Claims (17, 18, 19, 20)
-
Specification