Container transport monitoring and analysis
First Claim
1. A method performed by a plurality of interconnected data processing systems, comprising:
- scanning a plurality of hems by a first data processing system to generate x-ray image data of the items, each of the plurality of items having a unique identifier;
performing a computer implemented image recognition process on the x-ray image data to identify the items;
interactively reviewing the x-ray image data with a human operator by a second data processing system, including displaying the x-ray image data to the human operator;
recording the result of the human operator'"'"'s review;
determining, for each item, if the results from the computer implemented image recognition process and interactive review meet criteria for items that are exceptions that should not be shipped; and
storing an exception indicator for each item using the respective unique identifier.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for container analysis and tracking. A method includes scanning a plurality of items by a first data processing system to generate x-ray image data of the items, each of the plurality of items having a unique identifier. The method includes performing a computer implemented image recognition process on the x-ray image data to identify the items. The method includes interactively reviewing the x-ray image data with a human operator by a second data processing system, including displaying the x-ray image data to the human operator. The method includes recording the result of the human operator'"'"'s review. The method includes determining, for each item, if the results from the computer implemented image recognition process and interactive review meet criteria for items that are exceptions that should not be shipped, and storing an exception indicator for each item using the respective unique identifier.
-
Citations
19 Claims
-
1. A method performed by a plurality of interconnected data processing systems, comprising:
-
scanning a plurality of hems by a first data processing system to generate x-ray image data of the items, each of the plurality of items having a unique identifier; performing a computer implemented image recognition process on the x-ray image data to identify the items; interactively reviewing the x-ray image data with a human operator by a second data processing system, including displaying the x-ray image data to the human operator; recording the result of the human operator'"'"'s review; determining, for each item, if the results from the computer implemented image recognition process and interactive review meet criteria for items that are exceptions that should not be shipped; and storing an exception indicator for each item using the respective unique identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system configured to interact with a decentralized container checking device which is provided for local checking of a container, comprising:
-
a central data processing system remote from the container checking device; a first interface configured to provide a data communication between the central data processing system and the decentralized container checking device, wherein the central data processing system processes in at least a first operating mode a data record captured by the decentralized container checking device corresponding to a transport procedure of the container; and at least one second interface configured to make the data record processed by the central data processing system available for calling-up by a decentralized organization, wherein a security measure is initiated according to the data record. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
checking a container using a decentralized container checking device to produce a data record; transmitting the data record to a central check data processing device via an interface unit of the container checking device; processing the data record from the check data processing device with regard to a transport procedure of the container; and making the data record available for retrieval by a decentralized organization, wherein a security measure is initiated according to the data record. - View Dependent Claims (18, 19)
-
Specification