Systems and methods for facilitating remote security threat detection
First Claim
1. A system for detecting security threats, the system comprising:
- at least one canine detection unit comprising one or more canines and one or more handlers that inspect items at screening locations to detect potential security concerns;
a plurality of screening devices, wherein the screening devices include imaging systems comprising sensors for inspecting the items at the screening locations and wherein inputs received through the sensors are transformed into scanning data for display on workstations located at the screening locations; and
a server device that includes a processor and a non-transitory storage device that stores instructions which cause the processor to;
receive a first set of selections for creating expert groups, wherein each of the expert groups defines a set of experts equipped to manage potential security threats;
receive a second set of selections for creating dialing plans that are used to route requests received from the workstations at the screening locations to the expert groups, wherein each dialing plan specifies a sequential ordering of expert groups for handling requests originating from the screening locations;
store data that associates at least one of the dialing plans with at least one of the screening locations;
in response to receiving a request submitted by an operator located at one of the screening locations, retrieve a dialing plan associated with that screening location;
select an expert group identified in the retrieved dialing plan to receive the request based, at least in part, on the sequential ordering of expert groups specified in the retrieved dialing plan;
establish a connection between the operator and an expert in the selected expert group in response to the request being accepted by the expert;
transmit the transformed screening data to the expert for assistance in resolving the request;
receive an assistance request from the expert in the selected expert group for requesting assistance from a second remote expert in resolving the request submitted by the operator;
establish a second connection between the expert and a second remote expert in response to the second remote expert accepting the assistance request; and
transmit the transformed scanning data to the second remote expert to permit the second remote expert to provide assistance with resolving the request;
wherein communications between the expert and the second remote expert via the second connection are private and are not visible to the operator on the operator'"'"'s workstation.
9 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for detecting security threats in a network environment. A canine detection unit may initially inspect items at a screening location. A local workstation is used to further inspect the items that are identified as raising potential security concerns. Requests for assistance are submitted to remote experts for assistance with resolving the potential security concerns. One or more servers receive the requests over a network and retrieve dialing plans associated with the origins of the requests. The one or more servers utilize the dialing plans to route the requests to expert groups assigned to dialing plans. In response to the requests being accepted by remote expert devices in one of the expert groups, the one or more servers establish connections between the local workstations and the remote expert devices that accept the requests.
-
Citations
21 Claims
-
1. A system for detecting security threats, the system comprising:
-
at least one canine detection unit comprising one or more canines and one or more handlers that inspect items at screening locations to detect potential security concerns; a plurality of screening devices, wherein the screening devices include imaging systems comprising sensors for inspecting the items at the screening locations and wherein inputs received through the sensors are transformed into scanning data for display on workstations located at the screening locations; and a server device that includes a processor and a non-transitory storage device that stores instructions which cause the processor to; receive a first set of selections for creating expert groups, wherein each of the expert groups defines a set of experts equipped to manage potential security threats; receive a second set of selections for creating dialing plans that are used to route requests received from the workstations at the screening locations to the expert groups, wherein each dialing plan specifies a sequential ordering of expert groups for handling requests originating from the screening locations; store data that associates at least one of the dialing plans with at least one of the screening locations; in response to receiving a request submitted by an operator located at one of the screening locations, retrieve a dialing plan associated with that screening location; select an expert group identified in the retrieved dialing plan to receive the request based, at least in part, on the sequential ordering of expert groups specified in the retrieved dialing plan; establish a connection between the operator and an expert in the selected expert group in response to the request being accepted by the expert; transmit the transformed screening data to the expert for assistance in resolving the request; receive an assistance request from the expert in the selected expert group for requesting assistance from a second remote expert in resolving the request submitted by the operator; establish a second connection between the expert and a second remote expert in response to the second remote expert accepting the assistance request; and transmit the transformed scanning data to the second remote expert to permit the second remote expert to provide assistance with resolving the request; wherein communications between the expert and the second remote expert via the second connection are private and are not visible to the operator on the operator'"'"'s workstation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method for detecting security threats, the method comprising:
-
inspecting items at a screening location to detect potential security concerns with a canine detection unit comprising one or more canines and one or more handlers; in response to the canine detection unit determining that an item raises a potential security concern, inspecting the item with a screening device located at the screen location, wherein the screening device includes an imaging system comprising sensors for inspecting the item and wherein inputs received through the sensors are transformed into scanning data for display on a workstation located at the screening location; and creating a session with an expert over a network to resolve the potential security concern, wherein creating a session with an expert over a network includes; receiving, at a server device, a first set of selections for creating expert groups, wherein each of the expert groups defines a set of experts equipped to manage security threats; receiving, at the server device, a second set of selections for creating a dialing plan that is utilized to route requests received from the workstation at the screening location to the expert groups, wherein the dialing plan specifies a sequential ordering of expert groups for handling requests originating from the screening location; storing data that associates the dialing plan with the screening location; in response to receiving a request submitted by an operator utilizing the workstation, retrieving the dialing plan associated with the screening location; selecting an expert group identified in the retrieved dialing plan to receive the request based, at least in part, on the sequential ordering of expert groups specified in the retrieved dialing plan; establishing a connection between the operator and the expert in the selected expert group in response to the request being accepted by the expert; transmitting the transformed screening data to the expert for assistance in resolving the request; receiving an assistance request from the expert in the selected expert group for requesting assistance from a second remote expert in resolving the request submitted by the operator; establishing a second connection between the expert and the second remote expert in response to the second remote expert accepting the assistance request; and transmitting the transformed scanning data to the second remote expert to permit the second remote expert to provide assistance with resolving the request; wherein communications between the expert and the second remote expert via the second connection are private and are not visible to the operator on the workstation. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for detecting security threats, the method comprising:
-
receiving an indication that a canine detection unit has detected an item that raises a potential security concern at a screening location; inspecting the item with a screening device located at the screen location in response to the received indication, wherein the screening device includes an imaging system comprising sensors for inspecting the item and wherein inputs received through the sensors are transformed into scanning data for display on a workstation located at the screening location; and initiating a request for a session with an expert over a network to resolve the potential security concern, wherein the session creation comprises; receiving, at a server device, a first set of selections for creating expert groups, wherein each of the expert groups defines a set of experts equipped to manage security threats; receiving, at the server device, a second set of selections for creating a dialing plan that is utilized to route requests received from the workstation at the screening location to the expert groups, wherein the dialing plan specifies a sequential ordering of expert groups for handling requests originating from the screening location; storing data that associates the dialing plan with the screening location; in response to receiving a request submitted by an operator utilizing the workstation, retrieving the dialing plan associated with the screening location; selecting an expert group identified in the retrieved dialing plan to receive the request based, at least in part, on the sequential ordering of expert groups specified in the retrieved dialing plan; establishing a connection between the operator and the expert in the selected expert group in response to the request being accepted by the expert; transmitting the transformed screening data to the expert for assistance in resolving the request; receiving an assistance request from the expert in the selected expert group for requesting assistance from a second remote expert in resolving the request submitted by the operator; establishing a second connection between the expert and the second remote expert in response to the second remote expert accepting the assistance request; and transmitting the transformed scanning data to the second remote expert to permit the second remote expert to provide assistance with resolving the request; wherein communications between the expert and the second remote expert via the second connection are private and are not visible to the operator on the workstation. - View Dependent Claims (21)
-
Specification