System and method for centralized security screening
First Claim
1. A system for centralized security screening comprising:
- means for associating an object under inspection with the identity of an object owner;
a remote screening facility comprising screening devices, wherein the remote screening facility is adapted for;
associating the object under inspection with the identity of the object owner using the association means;
screening the object under inspection using a screening device in accordance with a first screening procedure to obtain screening data; and
reporting screening data to a centralized screening facility; and
a centralized screening facility connected to the remote screening facility via a network, wherein the centralized screening facility is adapted for;
receiving screening data from the remote screening facility;
reviewing the screening data using a security protocol to determine whether the object under inspection represents a security risk;
if the object under inspection represents a security risk, then using the identity of the object owner to obtain personal information about the object owner associated with the object under inspection;
applying the security protocol to the personal information and the screening data to formulate a remedial action plan with respect to the object under inspection; and
advising the remote screening facility of the remedial action plan.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for centralized security screening of packages including baggage. The system creates images and data concerning baggage to be reviewed, packetizes the data long with additional identification information, and conveys the data packets to a central screening location. All analysis of the baggage information is accomplished in a centralized way with risk assessments being provided to each image. Upon sensing of a package or baggage of concern, alerts may be sent to the screening location for action. Artificial intelligence tools are used to pre-screen images to assist with workload assignment. Baggage may also be associated with the identity of a passenger. The passenger identity is used to acquire passenger information that is incorporated into the baggage screening process. Screening rules that utilize passenger information are implemented to determine a screening response based on a passenger-specific basis.
51 Citations
17 Claims
-
1. A system for centralized security screening comprising:
-
means for associating an object under inspection with the identity of an object owner; a remote screening facility comprising screening devices, wherein the remote screening facility is adapted for; associating the object under inspection with the identity of the object owner using the association means; screening the object under inspection using a screening device in accordance with a first screening procedure to obtain screening data; and reporting screening data to a centralized screening facility; and a centralized screening facility connected to the remote screening facility via a network, wherein the centralized screening facility is adapted for; receiving screening data from the remote screening facility; reviewing the screening data using a security protocol to determine whether the object under inspection represents a security risk; if the object under inspection represents a security risk, then using the identity of the object owner to obtain personal information about the object owner associated with the object under inspection; applying the security protocol to the personal information and the screening data to formulate a remedial action plan with respect to the object under inspection; and advising the remote screening facility of the remedial action plan. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for formulating a remedial action plan with respect to an object under inspection comprising:
-
associating the object with an object identifier; associating an identity of an owner of the object (herein, the “
object owner”
) with an owner identifier;associating the object under inspection with the identity of the object owner using the object identifier and owner identifier; screening the object under inspection at a remote screening facility using a screening device in accordance with a first screening procedure to obtain screening data and the object identifier; reviewing the screening data at a centralized screening facility using a security protocol to determine whether the object under inspection represents a security risk; if the object under inspection represents a security risk, then using the identity of the object owner to obtain personal information about the object owner associated with the object under inspection; applying the securing protocol to the personal information and the screening data to formulate a remedial action plan with respect to the object under inspection; and advising the remote screening facility of the remedial action plan. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification