Scanning security detector
First Claim
1. A method of distinguishing false positives from threats in a space, the method comprising:
- (a) collecting a first scan of the space during a first time interval, comprising(i) illuminating at least a portion of the space with an energy from an energy source such that the energy is reflected from a surface in the space;
(ii) detecting the incident angle of the reflected energy with a plurality of detectors, each disposed at a known distance from the energy source;
(iii) calculating a distance from the surface to the energy source using triangulation and the incident angle detected by each of the plurality of detectors and distances between the plurality of detectors;
(iv) repeating steps (i)-(iii) for a plurality of portions of the space;
(v) generating a first three-dimensional map of the space for the first time interval;
(b) collecting a second scan of the space during a second time interval, comprising repeating steps (a)(i)-(a)(v) above during the second time interval to generate a second three-dimensional map of the space;
(c) comparing the first three-dimensional map to the second three-dimensional map to determine a change in the space;
(d) identifying a potential security threat based on the change in the space; and
(e) determining, based on the change in the space, if the potential security threat is a false positive based on a rate of movement, a height, and a location of the threat within the space.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of identifying a potential security threat in a space. A first scan of the space is performed during a first time interval by illuminating at least a portion of the space with energy from an energy source at an illumination angle, such that the energy is reflected from a surface in the space. An incident angle of the reflected energy is detected with a detector located at a known distance from the energy source and a distance from the surface to the energy source is calculated based on the incident angle. The steps are repeated for a plurality of different locations in the space. A first map of the space is generated from the first scan, and a second map is generated from a second scan of the area. The maps are compared to determine a change in the space and to determine if a potential security threat is present.
-
Citations
11 Claims
-
1. A method of distinguishing false positives from threats in a space, the method comprising:
-
(a) collecting a first scan of the space during a first time interval, comprising (i) illuminating at least a portion of the space with an energy from an energy source such that the energy is reflected from a surface in the space; (ii) detecting the incident angle of the reflected energy with a plurality of detectors, each disposed at a known distance from the energy source; (iii) calculating a distance from the surface to the energy source using triangulation and the incident angle detected by each of the plurality of detectors and distances between the plurality of detectors; (iv) repeating steps (i)-(iii) for a plurality of portions of the space; (v) generating a first three-dimensional map of the space for the first time interval; (b) collecting a second scan of the space during a second time interval, comprising repeating steps (a)(i)-(a)(v) above during the second time interval to generate a second three-dimensional map of the space; (c) comparing the first three-dimensional map to the second three-dimensional map to determine a change in the space; (d) identifying a potential security threat based on the change in the space; and (e) determining, based on the change in the space, if the potential security threat is a false positive based on a rate of movement, a height, and a location of the threat within the space. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A scanning security system, comprising:
-
a transmitter comprising an energy source and a scanning assembly; a plurality of detectors, each configured to detect a direction of energy impinging thereon; a computing system including a processor and a storage medium, the computing system configured to (a) cause a first scan of a space during a first time interval, wherein the first scan includes (i) illuminating at least a portion of the space with energy from the energy source at an illumination angle, such that the energy is reflected from a surface in the space; (ii) detecting an incident angle of the reflected energy with each detector disposed at a known distance from the energy source; (iii) calculating a distance from the surface to the energy source using triangulation based on the incident angle detected by each of the plurality of detectors and distances between the plurality of detectors; (iv) repeating steps (i)-(iii) for a plurality of different locations in the space; (v) generating a first three-dimensional map of the space for the first time interval; (b) cause a second scan of the space at a second time interval, wherein the second scan includes repeating steps (a)(i)-(a)(v) above during the second time interval to generate a second three-dimensional map of the space; (c) compare the first three-dimensional map to the second three-dimensional map to determine a change in the space; and (d) determine if a potential security threat is present based on the change in the space, and (e) determine, based on the change in the space, if the potential security threat is a false positive based on a rate of movement, a height, and a location of the threat within the space. - View Dependent Claims (9, 10, 11)
-
Specification