USER INTERFACE FOR USE IN SECURITY SCREENING PROVIDING IMAGE ENHANCEMENT CAPABILITIES AND APPARATUS FOR IMPLEMENTING SAME
First Claim
1. A method for facilitating visual identification of a prohibited object in an image during security screening, said method comprising:
- a. receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation;
b. receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object;
c. processing the image to generate an enhanced image in which portions outside the area of interest are visually de-emphasized;
d. displaying the enhanced image on a display device.
5 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, method and system for facilitating visual identification of a prohibited object in an image during security screening are provided. Data derived from an apparatus that scans the receptacle with penetrating radiation conveying an image of the contents of a receptacle is received. Information from an automated threat detection processor is also received and indicates an area of interest in the image potentially containing a prohibited object. The image is then processed to generate an enhanced image. In a first example, portions of the enhanced image outside the area of interest are visually de-emphasized. In a second example, features appearing inside the area of interest are visually emphasized. The enhanced image is then displayed on a display device. Optionally, thumbnail images associated with previously screened receptacles are displayed and a user is enabled to select one or more thumbnail images. An enhanced image corresponding to the selected thumbnail image is then displayed. In alternative implementations, an apparatus, method and system for use in screening a person for facilitating visual identification of a prohibited object thereon is provided.
-
Citations
95 Claims
-
1. A method for facilitating visual identification of a prohibited object in an image during security screening, said method comprising:
-
a. receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; c. processing the image to generate an enhanced image in which portions outside the area of interest are visually de-emphasized; d. displaying the enhanced image on a display device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. An apparatus for implementing a user interface module for facilitating visual identification of a prohibited object in an image during security screening, said apparatus comprising:
-
a. a first input for receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. a second input for receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; c. a processing unit in communication with the first input and the second input, said processing unit being operative for implementing the user interface module, said user interface module being adapted for; i. processing the image to generate an enhanced image in which portions outside the area of interest are visually de-emphasized; ii. displaying the enhanced image on a display module. - View Dependent Claims (26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47)
-
-
48. A computer readable storage medium storing a program element suitable for execution by a CPU, said program element implementing a graphical user interface module for facilitating visual identification of a prohibited object in the image during security screening, said graphical user interface module being adapted for:
-
a. receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; c. processing the image to generate an enhanced image in which portions outside the area of interest are visually de-emphasized; d. displaying the enhanced image on a display device.
-
-
49. A system for detecting the presence of one or more prohibited objects in a receptacle, comprising:
-
a. an image generation apparatus suitable for scanning a receptacle with penetrating radiation to generate data conveying an image of contents of the receptacle; b. an automated threat detection processor in communication with said image generation apparatus, said automated threat detection processor being adapted for processing the image to identify an area of interest in the image potentially containing a prohibited object; c. a display module; d. an apparatus in communication with said image generation apparatus, said automated threat detection processor and said display module, said apparatus implementing a user interface module for facilitating visual identification of a prohibited object in an image during security screening, said apparatus comprising; i. a first input for receiving the data conveying the image of the contents of the receptacle; ii. a second input for receiving information indicating the area of interest in the image; iii. a processing unit in communication with the first input and the second input, said processing unit being operative for implementing the user interface module, said user interface module being adapted for; 1. processing the image to generate an enhanced image in which portions outside the area of interest are visually de-emphasized; 2. displaying the enhanced image on said display module.
-
-
50. A client-server system for implementing a graphical user interface module for facilitating visual identification of a prohibited object in an image during security screening, said client-server system comprising a client system and a server system, said client system and said server system operative to exchange messages over a data network, said server system storing a program element for execution by a CPU, said program element comprising:
-
a. first program element component executed on said server system for receiving; i. data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; and ii. information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; b. a second program element component executed on said server system for processing the image to generate an enhanced image in which portions outside the area of interest are visually de-emphasized; c. a third program element component executed on said server system for sending messages to said client system for causing said client system to display the enhanced image on a display device. - View Dependent Claims (51)
-
-
52. An apparatus for implementing a user interface module for facilitating visual identification of a prohibited object in an image during security screening, said apparatus comprising:
-
a. means for receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. means for receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; c. means for processing the image to generate an enhanced image in which portions outside the area of interest are visually de-emphasized; d. means for releasing a display signal, the display signal being suitable for causing a display device to display the enhanced image.
-
-
53. A method for facilitating visual identification of a prohibited object in an image during security screening, said method comprising:
-
a. receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; c. processing the image to generate an enhanced image in which features appearing inside the area of interest are visually emphasized; d. displaying the enhanced image on a display device. - View Dependent Claims (54, 55, 56, 57, 58, 59, 60, 61, 62)
-
-
63. An apparatus for implementing a user interface module for facilitating visual identification of a prohibited object in an image during security screening, said apparatus comprising:
-
a. a first input for receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. a second input for receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; c. a processing unit in communication with the first input and the second input, said processing unit being operative for implementing the user interface module, said user interface module being adapted for; i. processing the image to generate an enhanced image in which features appearing inside the area of interest are visually emphasized; ii. displaying the enhanced image on a display module. - View Dependent Claims (64, 65, 66, 67, 68, 69, 70, 71, 72)
-
-
73. A computer readable storage medium storing a program element suitable for execution by a CPU, said program element implementing a graphical user interface module for facilitating visual identification of a prohibited object in the image during security screening, said graphical user interface module being adapted for:
-
a. receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. receiving information from an automated threat detection processor indicating an area of interest in the image potentially containing a prohibited object; c. processing the image to generate an enhanced image in which features appearing inside the area of interest are visually emphasized; d. displaying the enhanced image on a display device.
-
-
74. A method for facilitating visual identification of prohibited objects in images associated with previously screened receptacles, said method comprising:
-
a. providing a plurality of records associated to respective previously screened receptacles, each record including; i. an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; ii. information derived from an automated threat detection processor and indicating an area of interest in the image potentially containing a prohibited object; b. displaying on a displaying device a first viewing space conveying a set of thumbnail images, each thumbnail image in said set of thumbnail images being derived from a record in the plurality of records; c. enabling a user to select at least one thumbnail image in the set of thumbnail images; d. displaying on the display device a second viewing space conveying an enhanced image derived from a certain record in the plurality of records corresponding to the selected at least one thumbnail image. - View Dependent Claims (75, 76, 77, 78, 79, 80, 81, 82, 83)
-
-
84. An apparatus for implementing a user interface module for facilitating visual identification of a prohibited object in an image during security screening, said apparatus comprising:
-
a. a memory suitable for storing a plurality of records associated to respective previously screened receptacles, each record including; i. an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; ii. information derived from an automated threat detection processor and indicating an area of interest in the image potentially containing a prohibited object; b. a processing unit in communication with said memory unit, said processing unit implementing the user interface module, said user interface module being adapted for; i. displaying on a displaying device a first viewing space conveying a set of thumbnail images, each thumbnail image in said set of thumbnail images being derived from a record in the plurality of records; ii. enabling a user to select at least one thumbnail image in the set of thumbnail images; iii. displaying on the display device a second viewing space conveying an enhanced image derived from a certain record in the plurality of records corresponding to the selected at least one thumbnail image. - View Dependent Claims (85, 86, 87, 88, 89, 90, 91, 92, 93)
-
-
94. A computer readable storage medium storing a program element suitable for execution by a CPU, said program element implementing a graphical user interface module for facilitating visual identification of a prohibited object in the image during security screening, said graphical user interface module being adapted for:
-
a. providing a plurality of records associated to respective previously screened receptacles, each record including; i. an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; ii. information derived from an automated threat detection processor and indicating an area of interest in the image potentially containing a prohibited object; b. displaying on a displaying device a first viewing space conveying a set of thumbnail images, each thumbnail image in said set of thumbnail images being derived from a record in the plurality of records; c. enabling a user to select at least one thumbnail image in the set of thumbnail images; d. displaying on the display device a second viewing space conveying an enhanced image derived from a certain record in the plurality of records corresponding to the selected at least one thumbnail image.
-
-
95. A method for displaying information associated to a receptacle for use in detecting the presence of a threat in the receptacle during security screening, said method comprising:
-
a. receiving data conveying an image of the contents of a receptacle derived from an apparatus that scans the receptacle with penetrating radiation; b. receiving data conveying a level confidence that a threat has been detected in the receptacle; c. deriving a perceived level of threat associated with the receptacle at least in part based on the level confidence; d. displaying a screening image derived at least in part based on the data conveying the image of the contents of a receptacle; e. displaying concurrently with the screening image a threat probability scale, the threat probability scale conveying a perceived level of threat associated with the receptacle in graphical format.
-
Specification