SCANNING SECURITY DETECTOR
First Claim
1. A method of identifying a potential security threat in a space, the method comprising:
- (a) collecting a first scan of the space during a first time interval, comprising(i) illuminating at least a portion of the space with energy from an energy source at an illumination angle, such that the energy is reflected from a surface in the space;
(ii) detecting an incident angle of the reflected energy with a detector disposed at a known distance from the energy source;
(iii) calculating a distance from the surface to the energy source based on the incident angle;
(iv) repeating steps (i)-(iii) for a plurality of different locations in the space;
(v) generating a first map of the space for the first time interval;
(b) collecting a second scan of the space at a second time interval, comprising repeating steps (a)(i)-(a)(v) above during the second time interval to generate a second map of the space;
(c) comparing the first map to the second map to determine a change in the space; and
(d) determining if a potential security threat is present based on the change in the space.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of identifying a potential security threat in a space. A first scan of the space is performed during a first time interval by illuminating at least a portion of the space with energy from an energy source at an illumination angle, such that the energy is reflected from a surface in the space. An incident angle of the reflected energy is detected with a detector located at a known distance from the energy source and a distance from the surface to the energy source is calculated based on the incident angle. The steps are repeated for a plurality of different locations in the space. A first map of the space is generated from the first scan, and a second map is generated from a second scan of the area. The maps are compared to determine a change in the space and to determine if a potential security threat is present.
-
Citations
26 Claims
-
1. A method of identifying a potential security threat in a space, the method comprising:
-
(a) collecting a first scan of the space during a first time interval, comprising (i) illuminating at least a portion of the space with energy from an energy source at an illumination angle, such that the energy is reflected from a surface in the space; (ii) detecting an incident angle of the reflected energy with a detector disposed at a known distance from the energy source; (iii) calculating a distance from the surface to the energy source based on the incident angle; (iv) repeating steps (i)-(iii) for a plurality of different locations in the space; (v) generating a first map of the space for the first time interval; (b) collecting a second scan of the space at a second time interval, comprising repeating steps (a)(i)-(a)(v) above during the second time interval to generate a second map of the space; (c) comparing the first map to the second map to determine a change in the space; and (d) determining if a potential security threat is present based on the change in the space. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of distinguishing false positives from threats in a space, the method comprising:
-
(a) collecting a first scan of the space during a first time interval, comprising (i) illuminating at least a portion of the space with an energy from an energy source such that the energy is reflected from a surface in the space; (ii) detecting the incident angle of the reflected energy with a detector disposed at a known distance from the energy source; (iii) calculating a distance from the surface to the energy source using triangulation; (iv) repeating steps (i)-(iii) for a plurality of portions of the space; (v) generating a first map of the space for the first time interval; (b) collecting a second scan of the space during a second time interval, comprising repeating steps (a)(i)-(a)(v) above during the second time interval to generate a second map of the space; (c) comparing the first map to the second map to determine a change in the space; (d) identifying a potential security threat based on the change in the space; (e) determining if the potential security threat is a false positive based on at least one of a rate of movement, a height, and a location of the threat within the space. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A scanning security system, comprising:
-
a transmitter comprising an energy source and a scanning assembly; a detector configured to detect a direction of energy impinging thereon; a computing system including a processor and a storage medium, the computing system configured to (a) cause a first scan of a space during a first time interval, wherein the first scan includes (i) illuminating at least a portion of the space with energy from the energy source at an illumination angle, such that the energy is reflected from a surface in the space; (ii) detecting an incident angle of the reflected energy with the detector disposed at a known distance from the energy source; (iii) calculating a distance from the surface to the energy source based on the incident angle; (iv) repeating steps (i)-(iii) for a plurality of different locations in the space; (v) generating a first map of the space for the first time interval; (b) cause a second scan of the space at a second time interval, wherein the second scan includes repeating steps (a)(i)-(a)(v) above during the second time interval to generate a second map of the space; (c) compare the first map to the second map to determine a change in the space; and (d) determine if a potential security threat is present based on the change in the space. - View Dependent Claims (24, 25, 26)
-
Specification