Threat scanning with pooled operators
First Claim
1. A security system comprising:
- a controller adapted to receive and route images corresponding to items scanned at one or more scanning machines; and
one or more remote operator pools, each remote operator pool having one or more operator stations, the operator stations adapted to receive the images for threat assessment.
1 Assignment
0 Petitions
Accused Products
Abstract
A dynamically configurable threat scanning machine management system cooperates with a pooled operator image analysis unit to scan items for threats. The central control computer can transmit, among other things, operational software and threat profiles to the threat scanning machines, while the threat scanning machines can transmit, among other things, images and performance data to the central computer that can be distributed to one or more operator stations for review and analysis. The threat scanning machine management system can be arranged in a hierarchical manner, which enables threat scanning machines at various locations to be connected into regional, national or international control centers. The network may be wireless and the control computer may be portable, enabling a supervisor to remotely manage the system while remaining mobile.
-
Citations
20 Claims
-
1. A security system comprising:
-
a controller adapted to receive and route images corresponding to items scanned at one or more scanning machines; and
one or more remote operator pools, each remote operator pool having one or more operator stations, the operator stations adapted to receive the images for threat assessment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method of assessing threats comprising:
-
forwarding an image corresponding to a scanned item to one or more operator stations within one or more remote operator pools; and
receiving information regarding a threat assessment of the scanned item. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A security system comprising:
-
means for receiving and routing images corresponding to items scanned at one or more scanning machines; and
one or more remote operator pools, each remote operator pool having one or more operator stations, the operator stations adapted to receive the images for threat assessment. - View Dependent Claims (20)
-
Specification