×

Computer system and method for improving security screening

  • US 10,366,293 B1
  • Filed: 08/23/2018
  • Issued: 07/30/2019
  • Est. Priority Date: 04/24/2018
  • Status: Active Grant
First Claim
Patent Images

1. A computing system comprising:

  • at least one processor; and

    a non-transitory computer-readable storage medium comprising instructions stored thereon that, when executed by the at least one processor, cause the computing system to;

    perform an initial security screening on an object based on (i) a first set of security-related data associated with the object comprising first image data corresponding to a first scan of the object by a detection device communicatively coupled to the computing system and (ii) a first set of security screening parameters, wherein performing the initial security screening comprises;

    based on the first image data, executing a neural network in accordance with the first set of security screening parameters; and

    based on executing the neural network in accordance with the first set of security screening parameters, generating a first security determination for the object;

    perform a supplemental security screening on the object based on (i) a second set of security-related data associated with the object comprising at least one of (a) the first image data or (b) second image data corresponding to a second scan of the object and iii) a second set of security screening parameters, wherein performing the supplemental security screening comprises;

    based on at least one of (a) the first image data or (b) the second image data, executing a neural network in accordance with the second set of security screening parameters; and

    based on executing the neural network in accordance with the second set of security screening parameters, generating a second security determination for the object; and

    provide to a computing device an output notification based on at least one of (i) the first security determination or (ii) the second security determination; and

    wherein the first set of security-related data is different from the second set of security-related data, and wherein the first set of security screening parameters is different from the second set of security screening parameters.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×