CN108805236A - A kind of intelligent and safe management integration cloud system and management method - Google Patents
A kind of intelligent and safe management integration cloud system and management method Download PDFInfo
- Publication number
- CN108805236A CN108805236A CN201810558506.2A CN201810558506A CN108805236A CN 108805236 A CN108805236 A CN 108805236A CN 201810558506 A CN201810558506 A CN 201810558506A CN 108805236 A CN108805236 A CN 108805236A
- Authority
- CN
- China
- Prior art keywords
- individual
- characteristic
- intelligent
- cloud system
- database
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract 18
- 230000010354 integration Effects 0.000 title claims abstract 11
- 238000007689 inspection Methods 0.000 claims abstract 11
- 238000004891 communication Methods 0.000 claims abstract 2
- 238000012216 screening Methods 0.000 claims 3
- 238000005516 engineering process Methods 0.000 abstract 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of security checkpoints to manage the stream of people to optimize overall throughput, efficiency and the technology of personnel demand, more specifically, it is related to a kind of intelligent and safe management integration cloud system and management method, including at least one database, include one or more data records corresponding with each of examined individual, the data record indicates the characteristic of each individual;And one or more security checkpoints, including at least one check device, each security checkpoints and the database are into row data communication, the characteristic of the individual of the inspection data and storage of the individual for collecting the check device in the database is compared, if the inspection data are similar to the characteristic, the individual exempts second level safety inspection.
Description
Technical field
The present invention relates to a kind of security checkpoints to manage the stream of people to optimize overall throughput, efficiency and the skill of personnel demand
Art, more specifically to a kind of intelligent and safe management integration cloud system and management method.
Background technology
Public safety often must assure that place safety, to ensure the safety and welfare of the public.For example, such as airport or joy
Happy activity etc. has the place that many people concentrate, the especially important government place such as law court and government building, and such as supervises
The higher place of the threats of violence such as prison is required for containment dangerous or the safety measure of unlawful activities.Main security target is to prevent
Weapon, dangerous substances, illegal article or other contrabands are unauthorized entry into the place, so that it is guaranteed that safety.This is typically logical
It crosses and owner and article is required to enter the position by the checkpoint of definition, and to these people and article in these checkpoints
It carries out thoroughly searching to realize.
Currently, carrying out this seeking using various equipment.Regardless of place to use, these detecting systems are for detecting
Into the presence of the contraband on a human body or luggage of safety zone.Contraband is not limited to weapons and weapon, but includes
Explosive (pyrotechnics, ammunition, spark, match, gunpowder, signal flare);Weapons (rifle, sword, pepper spray, wushu weapons, knife);Pressurization
Container (hair spray, pest repellant, oxygen/propane container);Poison (insecticide, pesticide, arsenic, cyanide);Household items (flammable liquid,
Solvent, bleaching agent);With corrosive agent (acid, alkali, mercury).
The personnel screening systems of such as metal detector are deployed in the checkpoint of definition, to detect threat article, such as
Weapons, explosive and other be hidden in the dangerous goods under clothing and in clothing.Such conventional security system is depended on and is being sieved
The data of separate records assess the possibility of hiding threat article when selecting.There are various threat articles, these objects
Product are difficult that detected automatically and fatefully by the automatic checkout system based on algorithm, to need the physics to personnel to search
It looks into.For Security Officer and inspected object, complete physics or body blade search and usually expend the time, resource-intensive,
It is uncomfortable.Execution whole body blade seeking the consumed time further reduced handling capacity, so that the process is for being lined up
It carries out becoming slow and inconvenient for other objects of safety inspection.
Such as conventional security system of metal detector system is independent of any kind of data-driven artificial intelligence.This
A little equipment are not intelligent, and will not be associated with the past of individual screening history by the seeking result in screening process.With
Identical mode assesses each passenger being screened, the thing usually carried but regardless of him or she or he or she wear
Mode.Typical metal detector system is used to detect in its clothing or article and any conductive body existing for the person of being screened
Presence.In several circumstances, people are usually worn or carried by the conductive material of such as metallic decoration or key or writing implement
Body.Typical metal detector be not sure to distinguish in screening process threaten element and such as writing implement based on metal
Non-threat element, lead to false alarm.This usually requires that Security Officer executes whole body blade to the personnel being screened and searches, and causes
Inconvenience simultaneously reduces handling capacity.
In addition, the screening test point used in security system at present mainly uses single input and single output linear mode to carry out
Operation.Since metal detector can not definitely distinguish the non-threat article for threatening article and being made of an electrically conducting material, so building
Vertical complicated security protocol requires individual to allow their many propertys, such as wallet, mobile phone, key and other articles, by X
Scanner scanning.Usually this is done because when individual passes through metal detector, some in these non-threat articles may
False alarm can be triggered.Individual need, which devotes a tremendous amount of time, removes the property of oneself, and places them individually to screen.This
Kind stripping process is often waited in line continuously to occur into machine until them with individual.Current system is using single conveying
Band, each individually passenger device must necessarily be placed on the conveyer belt, so that article is by X-ray production apparatus, this contributes to and removed
The relevant lag of journey.Once article is scanned, they can be accumulated in the opposite side of scanning machine, " be gathered around to be generated on belt
It is stifled ", it is taken away until by passenger/owner.Operator must often stop conveyer belt to prevent overstocked unclaimed baggage
Pour into X-ray machine.
U.S. Patent Application No. 14/944,067,14/859,647,14/531,485,14/293,233,14/280,774,
14/149,473、14/104,508、13/942,563、13/903,598、13/365,114、13/175,785、12/887,510
With 12/643,021 and U.S. Patent number 9,182,516,8,995,619,8,774,362,8,766,764,8,654,922,8,
638,904,8,576,982,8,199,996,8,135,112,7,826,589,7,796,733,7,660,388 and 7,418,
077 discloses personnel screening systems, and entire contents are all incorporated herein by reference.
Although the prior art makes great efforts to be modified to individuals scanned and carries the methods, devices and systems of luggage, above-mentioned
Problem solves not yet.The method of the prior art is not disclosed in the method and system for rationally alleviating delay in stripping process.Separately
Outside, the prior art cannot improve the whole efficiency and handling capacity of system.
Therefore, it is necessary to the integrated systems and process by the effective administrative staff's flowing of screening sequence.Need one it is improved
The personal stand-by period is reduced, and improves handling capacity and efficiency in security check point.Such system will reduce the super of Security Officer
It compiles, is convenient for the automation of metal detector, shortens the free time of operating staff, and dramatically increase the handling capacity of machine.
A kind of intelligent screening system is needed, the benchmark screening which can be based on past inspection history or any individual
Pattern assessment threatens the possibility of article.A kind of intelligent screening system, plurality of information is needed to be focused on generation pair
The specific output of different user.
Invention content
In view of the deficiencies of the prior art, the present invention intends to provide a kind of intelligent and safe management integration cloud system
System.
The present invention above-mentioned technical purpose technical scheme is that:A kind of intelligent and safe management one
Change cloud system, including at least one database includes one or more data records corresponding with each of examined individual,
The data record indicates the characteristic of each individual;And one or more security checkpoints, including at least one inspection
Device, each security checkpoints and the database are into row data communication, the individual for collecting the check device
Inspection data and the characteristic of the storage individual in the database be compared, if the inspection number
According to similar to the characteristic, then the individual exempts second level safety inspection.
Preferably, each security checkpoints further include label read machine, the identification mark for possessing from the individual
Label read the identification information for the individual being examined, and the identification information is used to obtain the spy of the individual from the database
Levy data.
Preferably, each security checkpoints further include biological reading machine, for reading the identification information for being examined individual,
The identification information is used to obtain the characteristic of the individual from the database.
Preferably, the database is wirelessly connected remotely to each point of safes.
The present invention above-mentioned technical purpose technical scheme is that:A kind of intelligent and safe management one
Change cloud system management method, it is characterised in that:Individual described in prescreening is to obtain the characteristic of the individual;
Store the characteristic;
Check the individual to obtain the inspection data of the individual at the security checkpoints;
The inspection data are compared with the characteristic of storage;And if the inspection data are located at institute
It states in the preset range of characteristic, then exempts the individual at least second level safety inspection.
Preferably, further including obtaining whether the identification of the individual is deposited with the characteristic of the determination individual
Storage.
Preferably, being obtained by using the biometric reader being arranged in the security checkpoints described in the individual
Identification.
Preferably, by include via the label reader reading being arranged in the security checkpoints it is described it is individual only
The label of one identification code obtains the identification of the individual.
Preferably, individual described in prescreening includes when the individual is exposed to sieve with the characteristic for obtaining the individual
It selects and the individual is checked by using the screening system when system, and capture the typical sound generated by the screening system
Induction signal.
In conclusion the invention has the advantages that:The intelligent and safe management integration cloud system and pipe of the present invention
Reason method, the benchmark screening pattern assessment which can be based on past inspection history or any individual threaten the possibility of article
Property, plurality of information is focused on to generate the specific output to different user.
Description of the drawings
Fig. 1 is the block diagram for showing to manage system according to the intelligent and safe of the embodiment of this specification;
Fig. 2 shows the letters that the intelligent and safe being included in described in the embodiment of this specification manages the personnel of system registry
The database of shelves;
Fig. 3 is to show to be used to new individual or passenger being registered in intelligent and safe described in the embodiment of this specification
The flow chart of the illustrative steps sequence of management system;
Specific implementation mode
With reference to the accompanying drawings and examples, the present invention will be described in detail.
With reference to figure, a kind of intelligent and safe management integration cloud system, including at least one database, include with it is examined
Each corresponding one or more data records of individual, the data record indicate the characteristic of each individual;And one
A or multiple security checkpoints, including at least one check device, each security checkpoints carry out data with the database and lead to
The individual of letter, the inspection data of the individual for collecting the check device and storage in the database
The characteristic is compared, if the inspection data are similar to the characteristic, the individual exempts second
Level security inspection.
Each security checkpoints further include label read machine, and the identification label for possessing from the individual reads tested
The identification information for the individual looked into, the identification information are used to obtain the characteristic of the individual from the database.
Each security checkpoints further include biological reading machine, for reading the identification information for being examined individual, the identification
Information is used to obtain the characteristic of the individual from the database.
The database is wirelessly connected remotely to each point of safes.
A kind of intelligent and safe management integration cloud system management method, individual described in prescreening is to obtain the spy of the individual
Levy data;
Store the characteristic;
Check the individual to obtain the inspection data of the individual at the security checkpoints;
The inspection data are compared with the characteristic of storage;And if the inspection data are located at institute
It states in the preset range of characteristic, then exempts the individual at least second level safety inspection.
Further include obtaining whether the identification of the individual is stored with the characteristic of the determination individual.
The identification of the individual is obtained by using the biometric reader being arranged in the security checkpoints.
By the unique identifier for via the label reader reading being arranged in the security checkpoints including the individual
Label obtain the identification of the individual.
Individual described in prescreening includes when the individual is exposed to screening system with the characteristic for obtaining the individual
The individual is checked by using the screening system, and captures the typical response signal generated by the screening system.
The above is only a preferred embodiment of the present invention, protection scope of the present invention is not limited merely to above-mentioned implementation
Example, all technical solutions belonged under thinking of the present invention all belong to the scope of protection of the present invention.It should be pointed out that for the art
Those of ordinary skill for, several improvements and modifications without departing from the principles of the present invention, these improvements and modifications
It should be regarded as protection scope of the present invention.
Claims (9)
1. a kind of intelligent and safe management integration cloud system, it is characterised in that:Including at least one database, including be examined
Each of the corresponding one or more data records of individual, the data record indicate the characteristic of each individual;And
One or more security checkpoints, including at least one check device, each security checkpoints carry out data with the database
Communication, the inspections data of the individual for collecting the check device with store the individual in the database
The characteristic be compared, if the inspection data are similar to the characteristic, the individual exempts the
Secondary safety inspection.
2. intelligent and safe management integration cloud system according to claim 1, it is characterised in that:Each security checkpoints are also
Including label read machine, the identification label for possessing from the individual reads the identification information for the individual being examined, described
Identification information is used to obtain the characteristic of the individual from the database.
3. intelligent and safe management integration cloud system according to claim 1, it is characterised in that:Each security checkpoints are also
Including biological reading machine, for reading the identification information for being examined individual, the identification information is used to obtain from the database
The characteristic of the individual.
4. intelligent and safe management integration cloud system according to claim 1, it is characterised in that:The database is with wireless
Mode be connected remotely to each point of safes.
5. a kind of intelligent and safe management integration cloud system management method, it is characterised in that:Individual is to obtain described in prescreening
State the characteristic of individual;
Store the characteristic;
Check the individual to obtain the inspection data of the individual at the security checkpoints;
The inspection data are compared with the characteristic of storage;And if the inspection data are located at the spy
In the preset range for levying data, then exempt the individual at least second level safety inspection.
6. intelligent and safe management integration cloud system management method according to claim 5, it is characterised in that:Further include obtaining
Take whether the identification of the individual is stored with the characteristic of the determination individual.
7. intelligent and safe management integration cloud system management method according to claim 5, it is characterised in that:By using
Biometric reader in the security checkpoints is set to obtain the identification of the individual.
8. intelligent and safe management integration cloud system management method according to claim 5, it is characterised in that:By via
The label reader being arranged in the security checkpoints reads the label for the unique identifier for including the individual come described in obtaining
The identification of individual.
9. intelligent and safe management integration cloud system management method according to claim 5, it is characterised in that:Prescreening institute
It includes when the individual is exposed to screening system by using the screening that individual, which is stated, with the characteristic for obtaining the individual
It is individual described in systems inspection, and capture the typical response signal generated by the screening system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810558506.2A CN108805236A (en) | 2018-06-01 | 2018-06-01 | A kind of intelligent and safe management integration cloud system and management method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810558506.2A CN108805236A (en) | 2018-06-01 | 2018-06-01 | A kind of intelligent and safe management integration cloud system and management method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108805236A true CN108805236A (en) | 2018-11-13 |
Family
ID=64090314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810558506.2A Pending CN108805236A (en) | 2018-06-01 | 2018-06-01 | A kind of intelligent and safe management integration cloud system and management method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108805236A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150076225A1 (en) * | 2013-09-17 | 2015-03-19 | Michael F. Sweeney | Systems And Methods For Decoding And Using Data On Cards |
WO2017127389A1 (en) * | 2016-01-19 | 2017-07-27 | Rapiscan Systems, Inc. | Integrated security inspection system |
CN107209967A (en) * | 2015-01-30 | 2017-09-26 | 锡克拜控股有限公司 | The checking of security article and the identification of security article user are carried out simultaneously |
CN107251088A (en) * | 2014-11-25 | 2017-10-13 | 拉皮斯坎系统股份有限公司 | Intelligent and safe management system |
-
2018
- 2018-06-01 CN CN201810558506.2A patent/CN108805236A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150076225A1 (en) * | 2013-09-17 | 2015-03-19 | Michael F. Sweeney | Systems And Methods For Decoding And Using Data On Cards |
CN107251088A (en) * | 2014-11-25 | 2017-10-13 | 拉皮斯坎系统股份有限公司 | Intelligent and safe management system |
CN107209967A (en) * | 2015-01-30 | 2017-09-26 | 锡克拜控股有限公司 | The checking of security article and the identification of security article user are carried out simultaneously |
WO2017127389A1 (en) * | 2016-01-19 | 2017-07-27 | Rapiscan Systems, Inc. | Integrated security inspection system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107251088A (en) | Intelligent and safe management system | |
US20170236232A1 (en) | Integrated Security Inspection System | |
CN100504945C (en) | Combined systems user interface for centralized monitoring of a screening checkpoint for passengers and baggage | |
US20070122003A1 (en) | System and method for identifying a threat associated person among a crowd | |
RU2626660C2 (en) | Integrated safety control system | |
US7830254B2 (en) | Screening checkpoint for passengers and baggage | |
CN107958435A (en) | Safe examination system and the method for configuring rays safety detection apparatus | |
Bolton et al. | Application of multiple-instance learning for hyperspectral image analysis | |
Skorupski et al. | A fuzzy model for evaluating metal detection equipment at airport security screening checkpoints | |
CN108805236A (en) | A kind of intelligent and safe management integration cloud system and management method | |
US20230153657A1 (en) | Network of intelligent machines | |
Dalal | Chipping away at the constitution: The increasing use of RFID chips could lead to an erosion of privacy rights | |
Iraola | New Detection Technologies and the Fourth Amendment | |
WO2021186149A1 (en) | Security system | |
Kotter et al. | Detection and classification of concealed weapons using a magnetometer-based portal | |
Cohen | Boom boxes: Containers and terrorism | |
Tryon | Millimeter wave case study of operational deployments: retail, airport, military, courthouse, and customs | |
CN109932757A (en) | A security inspection system and method for high-speed rail logistics dry cargo container | |
Doss et al. | Contraband Detection Technology | |
More et al. | A Comprehensive Survey on INTELLICCTV: An AI based CCTV Camera Surveillance System | |
Kantor | Bayesian estimates and the effectiveness of metal detection devices | |
Sanquist et al. | Human factors aspects of anomaly detection systems | |
Monichetti et al. | Test and Evaluation Plan for Integrating X-ray Screener Assist Technology and Nuclear Quadrupole Resonance | |
JEAN | SAFER SKIES? Aviation Security Remains Under Scrutiny | |
EXPLAINED | CHIPPING AWAY AT THE CONSTITUTION: THE INCREASING USE OF RFID CHIPS COULD LEAD TO AN EROSION OF PRIVACY RIGHTS |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20181113 |
|
WD01 | Invention patent application deemed withdrawn after publication |