Movatterモバイル変換


[0]ホーム

URL:


CN111552007A - Inspection system and method - Google Patents

Inspection system and method
Download PDF

Info

Publication number
CN111552007A
CN111552007ACN202010456614.6ACN202010456614ACN111552007ACN 111552007 ACN111552007 ACN 111552007ACN 202010456614 ACN202010456614 ACN 202010456614ACN 111552007 ACN111552007 ACN 111552007A
Authority
CN
China
Prior art keywords
person
inspection
server
area
criterion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202010456614.6A
Other languages
Chinese (zh)
Inventor
薛仁清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Liangqing Technology Co ltd
Original Assignee
Shanghai Liangqing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Liangqing Technology Co ltdfiledCriticalShanghai Liangqing Technology Co ltd
Priority to CN202010456614.6ApriorityCriticalpatent/CN111552007A/en
Publication of CN111552007ApublicationCriticalpatent/CN111552007A/en
Withdrawnlegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

The invention relates to an inspection system and method. The inspection system according to the present technology includes, for example: a server having a processor; a 1 st inspection device which is provided at a boundary between the 1 st area and the outside, inspects a person who enters the 1 st area from the outside, and transmits information for identifying the person and a 1 st inspection result of the person to the server in a case where the 1 st inspection result satisfies a 1 st criterion; and a 2 nd inspection device, the 2 nd inspection device is configured to be arranged at the boundary between a 2 nd area and a 1 st area adjacent to the 1 st area, inspects the person entering the 2 nd area from the 1 st area, transmits information for identifying the person and a 2 nd inspection result of the person to the server when the 2 nd inspection result satisfies a 2 nd reference, and the server transmits a 1 st alarm in response to receiving a condition that the 1 st inspection result satisfies the 1 st reference and the 2 nd inspection result satisfies the 2 nd reference.

Description

Inspection system and method
Technical Field
The present technology relates to a security-related inspection system and method.
Background
Security systems in airports are used for security checks of airports, mainly for passengers and luggage of aircraft, so that it is ensured that they cannot be brought into the passenger cabin of the aircraft or loaded into the cargo compartment of the aircraft for dangerous objects such as explosives, flammable liquids, high-pressure gases, and for objects such as knives and guns, which may be used as weapons in terrorist activities.
Disclosure of Invention
Technical problem to be solved by the invention
The above-described security system is intended for a person who gets on the aircraft and his/her luggage, and allows a person who does not get on the aircraft or a person who is not getting on the aircraft to get on/off the airport relatively freely without receiving security check.
A system and method for constructing an epoch-making and more advanced crime prevention system and providing facilities such as an airport that are safe and safe for users are desired.
In addition, a system and method that reliably prevents terrorist activities and crimes not only within the aircraft, but also at entrances and lobbies of airports, is desired.
In addition, a system and method for preventing terrorist activity from being generated by bringing dangerous objects such as heavy weapons and explosives into the airport is desired.
Moreover, a system and method of identifying, monitoring, tracking, and closely inspecting suspect personnel is desired.
Further, a system and method that does not only bring dangerous objects and weapons into the aircraft, but also brings dangerous objects and weapons into the airport is desired.
Further, a system and method of constructing an epoch-making and more advanced crime prevention system to realize an airport that is safe and safe for users is desired.
Further, a system and method for improving the efficiency of security screening and reducing the waiting time of passengers is desired.
Moreover, a system and method that can also call the attention of the staff at the boarding counter at the airport is desired.
Further, a system and method for preventing the spread of infection due to the movement and the exit of a patient suffering from an infectious disease are desired.
Further, a system and a method for calling attention to the outbound examination of suspicious persons and the inbound examination of outbound destinations are desired.
Further, a system and method that can be applied to facilities other than airports are desired.
Technical scheme for solving technical problem
The present technology, for example, comprises an inspection system comprising: a server having a processor; a 1 st inspection device which is provided at a boundary between the 1 st area and the outside, inspects a person who enters the 1 st area from the outside, and transmits information for identifying the person and a 1 st inspection result of the person to the server in a case where the 1 st inspection result satisfies a 1 st criterion; and a 2 nd inspection device, the 2 nd inspection device is configured to be arranged at the boundary between a 2 nd area and a 1 st area adjacent to the 1 st area, inspects the person entering the 2 nd area from the 1 st area, transmits information for identifying the person and a 2 nd inspection result of the person to the server when the 2 nd inspection result satisfies a 2 nd reference, and the server transmits a 1 st alarm in response to receiving a condition that the 1 st inspection result satisfies the 1 st reference and the 2 nd inspection result satisfies the 2 nd reference.
Drawings
Fig. 1 is a diagram showing an inspection system according to an embodiment of the present technology.
Fig. 2 is a flowchart illustrating an inspection method according to an embodiment of the present technology.
Detailed Description
Fig. 1 shows aninspection system 100 according to an embodiment of the present technology. The following example is described as a security system of an airport, but may be an arena such as a railway, a theater, a concert hall, an olympic games, or a world cup, an event venue such as a lecture or an meet, a lodging facility, a government facility, an agenda, a court, a business, a factory, a school, a kindergarten, or a nursery, where a plurality of persons gather, or a facility where important persons stay, or may be a facility that may be a target of terrorist activities or crimes, or a facility where infection may be expanded.
In the embodiment of fig. 1,inspection system 100 includes aserver 120 communicably connected to anetwork 110, ahuman body scanner 130, asurveillance camera 140, aboarding check 150, and asecurity check 160, either wirelessly or wirelessly.
The Network 110 may be the Internet, a Private Network, a VPN (Virtual Private Network), a LAN (Local Area Network), a WAN (Wide Area Network), an LTE (Long term Evolution) Network, or a combination thereof. Thenetwork 110 may be a network capable of bidirectional communication, may be a network capable of only unidirectional communication, or may be a network capable of bidirectional communication using different lines. For example, a dedicated network and a line capable of only one-way communication may be used as a hacking countermeasure. Further, the communication line can be duplicated to be used as a backup for power failure or the like.
Theserver 120 is a computer including a processor and a memory and having a function of communicating with thehuman body scanner 130, themonitoring camera 140, theboarding check 150, and thesecurity check 160 via thenetwork 110. Theserver 120 may also include an input/output device such as a keyboard, a display, etc.
The human body scanner 130 checks whether the person as the object carries a dangerous object or prohibits carrying an object. Specifically, metal such as a gun or a cutter hidden under clothing or in a bag, or powder such as explosive, narcotic, or stimulant is detected as a dangerous object or a prohibited object. The detection of the hazardous material can be carried out by the following method: a millimeter wave radar is irradiated on a person or a portable object to be imaged, and a reflected signal is captured by utilizing the characteristics of being transmitted through clothes, reflected by metal, and absorbed by powder, thereby generating an imaged image. The detection of the dangerous object may also be performed by irradiating a submillimeter-wave radar in place of or together with the millimeter-wave radar to generate an imaged image.
In addition, thehuman body scanner 130 may measure the body temperature of a subject person by a thermal infrared imager, and check the possibility of the presence of an infectious disease caused by influenza, COVID-19(SARS-CoV-2), or the like.
Further, thehuman body scanner 130 may include a mental state analysis device (not shown) that may detect whether a person as a subject shows a specific mental state, thereby detecting a suspicious person who is likely to be a crime. The mental state analysis device measures vibration of the whole body from a moving image obtained by imaging a subject person, and detects a specific mental state such as a state of feeling stress, a state of feeling fear, or a state of increased aggressiveness, by using a property that a vibration component has a correlation with the specific mental state (emotion).
Thehuman body scanner 130 may include an imaging device and a face recognition device (not shown), and may recognize a person as a target from an image captured by the imaging device by the face recognition device and transmit identification information for recognizing the person to theserver 120 in association with the examination result. The identification information may be face identification information or personal information determined based on the face identification information. The data transmitted to the person-identifyingserver 120 may be a case where the face recognition information and the inspection result of the subject person satisfy a predetermined criterion. The predetermined reference may be any one or more of (1) carrying a dangerous object or prohibiting carrying of an object, (2) body temperature exceeding a predetermined value, and (3) detection of a specific mental state. The predetermined criterion may be a plurality of criteria arranged in rank according to the contents and degrees of (1) to (3).
Thebody scanner 130 may be disposed at a boundary between the outside and the inside of the airport terminal, such as an entrance or a doorway. Thebody scanner 130 may be installed along a ceiling or a wall surface of a passage near an entrance or a doorway, and may check all persons passing through a predetermined point by using a walk-through type that does not obstruct passage. Thehuman body scanner 130 can reduce the load on theinspection system 100 by setting a person or a portable object entering the building as an object to be inspected and excluding a person or a portable object leaving the building. Thehuman body scanner 130 may be configured to perform a concealed inspection without being conspicuous to a passer, or may be configured to be conspicuous to a passer, so that an effect of suppressing crimes and the like can be expected.
Themonitoring camera 140 is provided to photograph a predetermined area in an area (dirty area) that a general guest can enter in a building, and to transmit a photographed image to theserver 120. The monitoring cameras may be respectively disposed in a plurality of different areas. The monitoring camera may include the above-described face recognition device or a contour recognition device that recognizes a person as an object from a contour (outline), and may transmit the recognition information to theserver 120. Face recognition or contour recognition may also be performed by theserver 120.
Further, a plurality ofmonitoring cameras 140 and face recognition devices or contour recognition devices may be used so that theserver 120 can successively track recognized persons and grasp a movement route, an action, while relaying. Theserver 120 may store the action of the target person as a suspicious action in association with the identification information of the person when the action satisfies a predetermined criterion. The predetermined criterion may be, for example, entering an area such as a backyard or a prohibited area (red area), entering an attention area (yellow area) a predetermined number of times or more, sudden running, or the like, or a combination of these.
Theserver 120 can store the identification information based on the image received from themonitoring camera 140, the identification information received from thehuman body scanner 130, and the inspection result or the inspection result satisfying a predetermined criterion in association with each other, and can grasp the inspection result or the action of the same person in a unified manner.
Theboarding check 150 collects boarding information on the passport of the person as the subject and the boarding flight at the time of the boarding procedure of the aircraft, and also checks baggage deposited as check-in baggage. Theboarding check 150 may include an imaging device and a face recognition device (not shown), and may recognize a person as a target from an image captured by the imaging device by the face recognition device and transmit identification information for identifying the person to theserver 120 in association with the boarding information. Further, the result of the inspection of the subject person may be received from the server 120 (which may be the case where the result of the inspection satisfies a prescribed reference.
The security inspection device (security inspection) 160 is installed at a boundary between an area (dirty area) where general guests can enter and an area (clean area) adjacent to the dirty area where general guests other than passengers cannot enter, and inspects passengers, baggage in the aircraft, crew members, airport staff, and the like of the aircraft to prevent dangerous objects and prohibited objects from being taken into the clean area.
Thesecurity check device 160 can measure the body temperature of the subject person in the same manner as thehuman body scanner 130.
Further, thesecurity check device 160 may include a mental state analysis device as in the case of thehuman body scanner 130, and may check whether or not the subject person shows a specific mental state to check that the person is a suspicious person.
Thesecurity inspection device 160 may include an imaging device and a face recognition device (not shown), and may recognize a person as a target from an image captured by the imaging device by the face recognition device and transmit identification information for identifying the person to theserver 120 in association with the security inspection result. The data transmitted to theserver 120 may be a case where the face recognition information of the person as the object and the security check result satisfy a prescribed criterion. The predetermined reference may be any one or more of (1) carrying a dangerous object or prohibiting carrying of an object, (2) body temperature exceeding a predetermined value, and (3) detection of a specific mental state. The predetermined criterion may be a plurality of criteria arranged in rank according to the contents and degrees of (1) to (3). Identification information identifying the person may be sent to theserver 120. Further, the result of the inspection of the subject person, the presence or absence of suspicious activity, and the like can be received from theserver 120, and attention can be called to perform security inspection more strictly.
Further, thesecurity inspection device 160 may include a display device that displays the image received from theserver 120. Theserver 120 may transmit, to the display device, an image obtained by adding a display emphasizing a person whose inspection result satisfies a predetermined criterion to the image captured by the imaging device, or may transmit an alarm when the person approaches thesecurity inspection device 160.
Theserver 120 may transmit an alarm to thesecurity inspection apparatus 160 to prevent the suspicious person from entering the clean zone if the inspection result of the person as the object and the security inspection result (may be a case where the security inspection result satisfies a predetermined reference.
Theserver 120 may transmit information such as inspection results received from thehuman body scanner 130, themonitoring camera 140, theboarding check 150, thesecurity check device 160, and the like, and analysis results thereof to an outbound examination (not shown) and an inbound examination (not shown) of an outbound destination.
Theserver 120 can receive data of a target person from other databases such as information of criminals and terrorists owned by police, public security agencies, and the like, and information of criminal defenders owned by inspection agencies, and can further inspect the person. Further, information of the person to be the target may be provided from theserver 120 to another database. In addition, it is also possible to cooperate with a system that recognizes all nations by face authentication, so that individuals can be determined immediately.
Fig. 2 shows a flow diagram representing aninspection method 200 according to an embodiment of the present technology.
After theexamination method 200 is started in theserver 120 instep 210, theserver 120 receives the 1 st examination result in the 1 st examination device instep 220. In the embodiment of fig. 1, theserver 120 receives the inspection result in thehuman body scanner 130.
After receiving the 1 st inspection result instep 220, theserver 120 receives the 2 nd inspection result in the 2 nd inspection device instep 230. In the embodiment of fig. 1,server 120 receives the security check result fromsecurity check device 160.
Upon receiving the 2 nd inspection result instep 230, theserver 120 determines whether the 1 st inspection result satisfies the 1 st reference and the 2 nd inspection result satisfies the 2 nd reference instep 240.
If theserver 120 determines instep 240 that the 1 st inspection result satisfies the 1 st criterion and the 2 nd inspection result satisfies the 2 nd criterion, theserver 120 transmits an alarm instep 250, and theinspection method 200 ends instep 260.
If theserver 120 determines instep 240 that the 1 st inspection result does not satisfy the 1 st criterion or the 2 nd inspection result does not satisfy the 2 nd criterion, theinspection method 200 ends instep 260.
Industrial applicability of the invention
The present technology can provide facilities such as an airport that are safe and safe for users.
Description of the reference symbols
100 inspection system
110 network
120 server
130 body scanner
140 monitoring camera
150 boarding check
160 security check device.

Claims (10)

CN202010456614.6A2020-05-262020-05-26Inspection system and methodWithdrawnCN111552007A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202010456614.6ACN111552007A (en)2020-05-262020-05-26Inspection system and method

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202010456614.6ACN111552007A (en)2020-05-262020-05-26Inspection system and method

Publications (1)

Publication NumberPublication Date
CN111552007Atrue CN111552007A (en)2020-08-18

Family

ID=72005044

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010456614.6AWithdrawnCN111552007A (en)2020-05-262020-05-26Inspection system and method

Country Status (1)

CountryLink
CN (1)CN111552007A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2016141641A1 (en)*2015-03-112016-09-15中兴通讯股份有限公司Method and device for recognizing suspicious person
US20180061159A1 (en)*2016-08-292018-03-01Panasonic Intellectual Property Management Co., Ltd.Suspicious person report system and suspicious person report method
CN108629322A (en)*2018-05-112018-10-09中国联合网络通信集团有限公司Monitoring method, device and the computer readable storage medium of a suspect
CN108664608A (en)*2018-05-112018-10-16中国联合网络通信集团有限公司Recognition methods, device and the computer readable storage medium of a suspect
AU2017279806A1 (en)*2017-05-292018-12-13Saltor Pty LtdMethod and system for abnormality detection
CN109551500A (en)*2019-01-292019-04-02南京奥拓电子科技有限公司Supervisory control of robot alarm system
CN109643376A (en)*2018-11-022019-04-16金湘范 Video capture emotion generation method
JP6525229B1 (en)*2019-01-252019-06-05株式会社 テクノミライ Digital search security system, method and program
CN109902574A (en)*2019-01-242019-06-18北京元和新通科技有限公司The high-risk personnel detection device and method of human body presentation variation measurement human body mood

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
WO2016141641A1 (en)*2015-03-112016-09-15中兴通讯股份有限公司Method and device for recognizing suspicious person
US20180061159A1 (en)*2016-08-292018-03-01Panasonic Intellectual Property Management Co., Ltd.Suspicious person report system and suspicious person report method
AU2017279806A1 (en)*2017-05-292018-12-13Saltor Pty LtdMethod and system for abnormality detection
CN108629322A (en)*2018-05-112018-10-09中国联合网络通信集团有限公司Monitoring method, device and the computer readable storage medium of a suspect
CN108664608A (en)*2018-05-112018-10-16中国联合网络通信集团有限公司Recognition methods, device and the computer readable storage medium of a suspect
CN109643376A (en)*2018-11-022019-04-16金湘范 Video capture emotion generation method
CN109902574A (en)*2019-01-242019-06-18北京元和新通科技有限公司The high-risk personnel detection device and method of human body presentation variation measurement human body mood
JP6525229B1 (en)*2019-01-252019-06-05株式会社 テクノミライ Digital search security system, method and program
CN109551500A (en)*2019-01-292019-04-02南京奥拓电子科技有限公司Supervisory control of robot alarm system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
姬娜: "乘坐飞机要进行二次安检 最好提前两小时到达机场", 《HTTPS://WWW.SXDAILY.COM.CN/2019-09/17/CONTENT_8041529.HTML?FROM=TIMELINE》*
皮埃尔: "DEFENDER-X价格是多少?个人也能购买?", 《HTTPS://TIGG.CC/T/#BING‖HTTPS://WWW.ELSYSJ.NET/DEFENDER-X》*

Similar Documents

PublicationPublication DateTitle
US7634662B2 (en)Method for incorporating facial recognition technology in a multimedia surveillance system
US20070122003A1 (en)System and method for identifying a threat associated person among a crowd
US7109869B2 (en)Method and system for facility security
US8031903B2 (en)Networked security system
EP2204783A1 (en)Security system comprising sensors in a corridor for uncovering hazardous items
US20060055512A1 (en)Method and system for monitoring the movement of people
CN111694065B (en) Mobile
US11164415B1 (en)Touchless, automated and remote premise entry systems and methods
CN109214274A (en)A kind of airport security management system
US20030210139A1 (en)Method and system for improved security
US20170236232A1 (en)Integrated Security Inspection System
JP7235325B2 (en) Suspicious object detection system
Nowacki et al.Security requirements for new threats at international airports
Michalski et al.THE IMPLEMENTATION OF SELECTIVE PASSENGER SCREENING SYSTEMS BASED ON DATA ANALYSIS AND BEHAVIORAL PROFILING IN THE SMART AVIATION SECURITY MANAGEMENT–CONDITIONS, CONSEQUENCES AND CONTROVERSIES.
Milbredt et al.Aviation security automation: The current level of security automation and its impact
EliasAirport passenger screening: Background and issues for Congress
Wood et al.The impact of security scanners at airports and ethnic minority travellers’ experience
CN111552007A (en)Inspection system and method
ZhangSmart solutions to airport security in post-COVID-19 era
BrownScreening
DeGraveAirline Passenger Profiling and the Fourth Amendment: Will CAPPS II be Cleared for Takeoff?
TryonMillimeter wave case study of operational deployments: retail, airport, military, courthouse, and customs
Kraus et al.Using sensor network for passengers prescreening in air transport
EnerstvedtAviation security technologies
Pairot et al.Smart border for disease control

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WW01Invention patent application withdrawn after publication
WW01Invention patent application withdrawn after publication

Application publication date:20200818


[8]ページ先頭

©2009-2025 Movatter.jp