WO2010076261A1 - Système de sécurité comprenant des capteurs placés dans un couloir pour découvrir des articles interdits - Google Patents
Système de sécurité comprenant des capteurs placés dans un couloir pour découvrir des articles interdits Download PDFInfo
- Publication number
- WO2010076261A1 WO2010076261A1 PCT/EP2009/067717 EP2009067717W WO2010076261A1 WO 2010076261 A1 WO2010076261 A1 WO 2010076261A1 EP 2009067717 W EP2009067717 W EP 2009067717W WO 2010076261 A1 WO2010076261 A1 WO 2010076261A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- detection
- sub
- security system
- security
- corridor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/181—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using active radiation detection systems
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
- G08B13/194—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
- G08B13/196—Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
- G08B13/19602—Image analysis to detect motion of the intruder, e.g. by frame subtraction
- G08B13/19613—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion
- G08B13/19615—Recognition of a predetermined image pattern or behaviour pattern indicating theft or intrusion wherein said pattern is defined by the user
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B31/00—Predictive alarm systems characterised by extrapolation or other computation using updated historic data
Definitions
- the present invention relates to a security system to prevent people who are due to enter a sensitive equipment/area from carrying hazardous items. More specifically, security procedures and systems have been implemented at airport facilities to scan persons and luggage for detecting metallic, liquid or powder objects possibly used as weapons or explosives by terrorists to carry out an attack on board an aircraft. Implementing these procedures and systems post 9/1 1 has created a significant operational burden and cost for the airport authorities, airlines and passengers. The same problems arise at other passenger transportation terminals, such as railway or subway stations, and at facilities which gather a large number of people like department stores, museums, theatres, concert, congress or cult areas.
- the most common equipment used to detect objects carried by people entering a sensitive area is a dual lane scanning system.
- the portico lane comprises electro-magnetic detectors positioned at various heights (typically four sources) these detectors being sensitive to metallic objects. Passengers walk across the portico to check that they do not carry any metallic object. In parallel, their hand luggage is submitted to X-Ray scanning in the tunnel lane.
- the tunnel lane scanner produces an image which is continuously displayed to an operator tasked to check the content of the luggage.
- the gate scanner produces an alarm in case a metal object is detected on the passenger.
- belt buckles or shoe soles may trigger an alarm and the passenger will have to be manually searched.
- some airport authorities implement specific random or targeted manual searches for explosives with detectors to which samples of dust taken from the clothing of selected passengers are applied.
- international regulations now prohibit transportation of any liquid in hand luggage. Liquids used for personal care have to be hand carried in a specific transparent bag and visually inspected by security personnel. All combined, on average 20% of passengers have to be manually inspected and/or searched. This generates significant operational cost, long queues and disturbance to passengers.
- Another advantage of the invention is a modular architecture which allows various configurations comprising different types of detectors to be installed at one definite site.
- Specific modules target biological and epidemiological threats and are only needed in specific locations. These modules are designed to be easily plugged in the system, with stand alone energy supply, and sensor processing.
- the security system of the invention can easily be coupled with a luggage scanning system using traditional X-Ray scanning and/or partly the same sub-systems as the persons' control system.
- the scanning system may receive information from the check-in database (check-in may be operated by an airline in case of on-line check-in or an airport authority in case of on-site check-in ; it may also be a ticketing office operated on-line or on-site in museums, theatres, stadiums or other event facilities) and/or the cross-border identification database.
- check-in may be operated by an airline in case of on-line check-in or an airport authority in case of on-site check-in ; it may also be a ticketing office operated on-line or on-site in museums, theatres, stadiums or other event facilities
- the cross-border identification database may be operated by an airline in case of on-line check-in or an airport authority in case of on-site check-in ; it may also be a ticketing office operated on-line or on-site in museums, theatres, stadiums or other event facilities.
- FIG. 1 represents a schematic view of a security system of the prior art for controlling passengers
- - Figure 2 represents a top view of the physical architecture of a security system in an exemplary embodiment of the invention
- - Figure 3 represents a top view of the physical architecture of a security system in a compact embodiment of the invention
- - Figure 4 represents an axonometric view of the physical architecture of a security system in an embodiment of the invention comprising a luggage screening chain
- - Figure 5 represents a view of the logical architecture of a security system in an exemplary embodiment of the invention
- FIG. 6A represents a front view of an explosive trace detection subsystem in an exemplary embodiment of the invention
- FIG. 6B represents a detailed axonometric view of a laser sensor of an explosive trace detection sub-system in an exemplary embodiment of the invention
- FIGS. 7A and 7B represent a front half view of a hidden object detection sub-system in two embodiments of the invention
- FIG. 8 represents a lateral view of a hidden object detection sub- system in one exemplary embodiment of the invention with an array antenna radar;
- - Figure 9A represents a front view of a hidden object detection subsystem in operation in one exemplary embodiment of the invention with an array antenna radar
- - Figures 9B and 9C represent respectively the formed beams without and with detection of a hidden object detection sub-system in one embodiment of the invention with an array antenna radar;
- - Figure 10 represents a top view of an abnormal behaviour detection sub-system in one embodiment of the invention
- - Figure 1 1 represents the flow chart of a risk assessment algorithm in an embodiment of the invention
- FIG. 12a, 12b, 12c, 12d and 12e represent an example of a logical decision table to calculate an aggregate risk level in an embodiment of the invention
- FIG. 13 represents the value domains of an heuristic function of a risk assessment algorithm in an embodiment of the invention.
- a security system for controlling persons entering a sensitive area can be built around a traditional portico approach, one side (the left side on figure 1 ) of the portico comprising bulk identification detectors while the other side (the right one on figure 1 ) comprises trace identification detectors.
- Bulk identification uses imaging sensors capable of locating certain types of objects.
- Trace identification uses molecular laser absorption analysis to determine the type of substance carried by an individual.
- Radio Frequency IDentification (RFID) - Detection is there to identify the passenger passing through the portico: an RFID tag is given to each passenger at check-in and he/she can be tracked on the airport premises; other types of machine readable ticket such as one carrying a bar code can also be used, but needs more cooperation from the passenger; Ray - Detection can be either X or y - Ray imaging.
- X-Ray imaging is routinely used to scan luggage because of its ability to see through most materials used for suitcases or bags, y - Ray imaging allows classification of the detected objects. Current regulations applicable in Europe forbid the use of X-Ray imaging for scanning human beings because of the intrusive character of such imaging
- Metal - Detection is the classical sensor present in a portico to detect metallic weapons.
- TeraHertz (THz) - Detection is a new type of detection in the microwave band. TeraHertz detection is capable of identifying solid objects which are carried in contact with the body and mask the natural radiation of the body while the same radiation traverses the clothes; therefore a "spot" is detected by this system even when the object is concealed under the clothes.
- Nuclear Quadrupole Resonance (NQR) - Detection is based on neutron detection. If targeted at nitrogen, this type of detection can detect explosives, most of which contain a high concentration of this type of molecule.
- CWA Chemical Warfare Analysis
- Each detection system brings an individual score related to the threat it is supposed to detect; this score is compared with a pre-determined threshold in order to eventually raise an alarm; as a result, whenever a passenger produces several alert scores but each less than its corresponding threshold, a potentially dangerous case due to a high risk combination will not raise an alarm;
- This invention has been designed to address eight operational goals commonly accepted as key to better address the security concerns at sensitive facilities, notably airports. These eight goals are:
- the security system of the invention uses a multi-sensor approach and adapted information fusion algorithms. Its implementation is scalable, from one to N modules or sub-systems depending on any operational requirements.
- the system is made up of a corridor shown on figure 1 , with different embodiments which will be further described further down in the specification of the invention in relation with figures 2 and 3.
- This corridor is therefore modular.
- a corridor is made up of a succession of physical modules shown on figure 1 , each module having two walls perpendicular to the ground, each wall of each module comprising elements of said module as further described.
- Each module can be topped by a roof or by part of a roof to hold some of the sensors, namely the fish-eye camera which is a component of the abnormal behavior detection sub-system, as described further down in the specification.
- the physical appearance of the modules can be designed so that the corridor is seamlessly integrated in the environment of the control area.
- the corridor has an entrance and an exit, one or both of which having an axis which may be non parallel to the axis of the corridor so that the flow of persons passing through the corridor may be regulated more easily. Additionally, a turnstile can be provided at the entrance of the corridor if there is a specific need to better regulate the flow. This configuration is also fit for optimization of the efficiency of one of the detection sub-system, namely the hidden object detection sub-system, as described further down in the specification.
- each module is independent and autonomous and communicates with the other using an ESB architecture (Enterprise Services Bus).
- the corridor is organized to include several modules totally independent in terms of power management and software systems as described in the specification of this invention. These modules are then easily linkable using a plug and play facility for power management and for software supervision.
- Each of the modules contains three kinds of sensors, a dedicated computer and interfaces dedicated to power management and plugging with a supervisory sub-system.
- a definite module performs a specific detection function and comprises: - At least one video camera; for instance one may use a device of the same type as a PhilipsTM webcam SPC1300NC (CMOS - 1 ,3Mpixels - ⁇ Mpixels interpolated); this camera has some features which are useful for this application (a wide-angle lens, motion detection and automatic face tracking); this video camera is used to identify the person passing in the corridor by matching his/her face to a picture taken either at a check-in facility or at the first module of the security system; in the first case, it is possible to fully identify the person going through the security system; in the second case, it is only possible to make sure that the sensors measurements of each sub-system are attributed to the correct person, matching is achieved by face recognition algorithms which are performed locally; the processing computer can be for example a personal computer like DELLTM T5400 - XENONTM E5405 QuadCore 3,16 GHz / Windows XP running image analysis algorithms of CognitecTM.
- Processing power needed is not excessive since recognition is performed against a small number of persons present in a local database and not against a massive number of persons present in a homeland security database. It is also possible to do the processing centrally (at the supervisory sub-system level described further down in the specification) provided that the number of sub-systems is not too high;
- the first cell is located at the entrance of the module and triggers a first time top which is recorded both in the video stream and in the captured sensor data
- the second cell is located at the exit of the module and triggers a second time top which is also recorded both in the video stream and in the captured sensor data; therefore, the identification of the person passing through the module and the captured sensor data can be matched without ambiguity, provided however that a single person passes through the module at the same time;
- a processing card connected to the system bus (ESB format) which processes the signals from the sensors and delivers data which are then interpreted by the supervisory module; a standard personal computer has sufficient processing capability to ensure this function.
- ESD format system bus
- the combination of the video camera and the photoelectric cells with the specific risk sensor of a detection sub-system allows complete tracking of persons who have to be checked within the security system of the invention.
- Other types of sensors than photoelectric cells could also be used.
- Another kind of identification could also be used such as an RFID tag (or a bar coded ticket, though this implementation needs more cooperation from the passenger) delivered to the persons to be controlled when checking-in.
- this sub-system is alike a classical electromagnetic portal; this sub-system, integrated in the walls (or behind); it is also possible to distribute the elements of the metal detection sub-system in the physical structures of the other modules, each part performing part of the detection at a specified height; this will allow a better decoupling of the magnetic flux created by the sources of the detectors; in this sub-system delivers (in real time) a file containing four information: o objects and body location assessment; o an evaluation of objects volumes; o temporal stop and go flags a as a result of a person passing through the photoelectric cells; o the captured image of the face of the person passing through the sub-system.
- the radiation measurement sub-system is based on COTS (Commercial of the shelf) equipment. It delivers in real time a file containing three pieces of information: o A radiation level score; o temporal stop and go flags as a result of a person passing through the photoelectric cells; o the captured image of the face of the person passing through the sub-system;
- This sub-system like shown in figure 5 for explosive precursor trace detection, is made of a ducted airflow system, integrated in a wall (or behind), and grouping several fans and producing a transverse wind from this wall to the one in front. On the second wall, facing the ventilation system and integrated in it (or behind), a collecting tunnel sucks in this wind and passes it through to a measurement cell; for industrial reason this module could also be associated with the explosive precursor trace detection system using the same ducted airflow system; a spectroscopic recording of the different compounds in the cell is compared to a data base of biological agents.
- This sub-system delivers in real time: o a measurement of the concentration of biological agents; o temporal stop and go flags as a result of a person passing through the photoelectric cells; o the captured image of the face of the person passing through the sub-system;
- this sub-system is made of at least one infrared camera, integrated in the module walls (or behind); body temperature is measured and compared to different sources of normal/abnormal values to detect an abnormal increase of temperature; in the present implementation of the system, these cameras are COTS (Commercial of the shelf) ; this sub-system delivers in real time: o A measurement of the body temperature; o temporal stop and go flags as a result of a person passing through the photoelectric cells; o the captured image of the face of the person passing through the sub-system;
- a display 900 can be located on a wall near the exit to present information to the persons passing through the corridor. This information can be made specific to the person who is identified by the recognition of his/her face by the video camera of the first detection sub-system located nearest to the entrance of the corridor. This specific information may for example be: boarding gate number, expected time of departure for his/her flight, expected time of arrival, specific security, health requirements on arrival, luggage transfer information, etc... Also, this display may be useful in drawing the attention of the person entering the corridor to a point located at the distal end of the corridor, thus smoothly inducing a cooperative attitude of the person along the passage to the exit of the corridor.
- Some detection sub-systems may be absent, for instance the epidemiologic detection sub-system when the corresponding risk is null. Some other kind of functions may be added, for instance a RFID detection sub-system, to supplement or replace the video camera tracking, and a NQR detection subsystem to correlate with the main explosive trace detection sub-system. Alternatively, some detection sub-systems can be grouped in a single physical module as shown for example on figure 3. In this manner the corridor will be made more compact, possibly more suitable to certain types of airports or other facilities (theatres, museums, department stores...) and more economical.
- the hand luggage scanning chain can be positioned on one side of a wall of the corridor.
- this chain can use some of the detection sub-systems of the corridor.
- the explosive trace detection sub-system can be adapted to detect the hand-luggage of the person going through the corridor at the same time: to achieve this result, i) the speed of the luggage chain should be adapted to the speed of the person; ii) the collecting tunnel should be placed behind the luggage chain.
- Each of the detection sub-systems represented described above is connected to a communication bus 1000, for instance an Enterprise Service Bus (ESB).
- ESB allows communication between heterogeneous applications using a web protocol and a Java Messaging System (JMS).
- JMS Java Messaging System
- the ESB provides the following functions
- Routing - sensor start and endpoint are listed with associated services
- Transformation - a sensor request or output can be transformed from one format to another (such as XML - extensible Mark-up Language - to XML using XSLT - extensible Stylesheet
- Adaptation - messages in the ESB follows the standard SOAP (Simple Object Access Protocol) format; some sensors output may not support SOAP format and an encapsulation is designed to transform the message;
- SOAP Simple Object Access Protocol
- Messaging - the ESB provides asynchronous reliable messaging transport (sensor to sensor, sensor to supervisory sub-system)
- Orchestration - the supervisory sub-system manages an orchestration system that manages the overall workflow from one service to another, as well as the output to the control officer;
- Registry - services (sensors start, stop, output value test) are registered in a registry for applications to discover them (local LDAP - Lightweight Direct Access Protocol - on VLAN - Virtual Local Area Network - is a potential implementation).
- a WSDL (Web Services Description Language) file could be use to collect details about the service; Registry could be used at run time to locate the valid endpoint for a service; any equivalent system depending on performance could also be implemented;
- Security - authentication and authorization of sensors data are controlled through the ESB infrastructure services.
- User validation users are able to lookup the endpoint of a delivered alarm and redirect the service request to the right endpoint or another one in case of failure.
- Service integration new services are validated and new policies are designed to implement secure service invocation.
- the standard interfaces from a sensor to the ESB are the following:
- HTTPR Reliable HTTP
- WS-Reliability Web
- BPEL Business Process Execution Language
- BPML Business Process Modeling Language
- a security system comprises the following sub-systems:
- a supervisory sub-system 1 100 integrated in the wall of a module, processes all the information delivered by the detection sub-systems and other sub-systems described hereunder; a personal computer with a dual-core can be used as the processor of this supervisory subsystem; the supervisory sub-system provides an aggregate risk level assessment and triggers adequate alarms in a manner which will be further described in relation with figure 10; the supervisory sub-system also perform system management (hardware and software configuration management, settings, etc .);
- control display 1200 which may be located near the corridor or centralized in an operation centre; the control display allows visualization of synthetic information delivered by the supervisory system with the possibility for the control officer to focus on a specific detection sub-system by visualizing partial or complete sub-system results; - The control officer sub-system 1300 is used to set the different parameters of the system and to dispatch alarms, as explained in more details in relation with figure 10;
- a dynamic check-in database 1400 is connected to the ESB and managed by the supervisory sub-system; this database is populated by information from the check-in system 1500 which comprises full identification and status (passenger or visitor; crew, airport personnel with their accreditations, etc ..) of the persons who will be then submitted to security controls in the corridor; a reference photograph of the person is taken at the time of check-in or collected from his/her electronic passport; when it is not the case, the reference photograph for further matching in the other detection sub-systems is the one taken by the video camera located in the first detection sub-system at or after the entrance of the corridor; this information may be supplemented by airline information 1600 about the persons (frequent flyer status, VIP status, etc ..) and flight information (expected time of departure and arrival, connections, etc .).
- the supervisor sub-system may be integrated in the walls of 3 physical modules like shown in figure 3.
- one supervisory sub- system may monitor more than one corridor system, and control officer displays may be grouped in one common operation centre but from a risk level assessment point of view, it is currently preferable to keep one supervisory sub-system dedicated to a single corridor, while it may be envisaged to amend this architecture; for instance, the control of each corridor could be managed by a dedicated control display and and a dedicated control officer but an additional control facility served by a dedicated officer could be added to present to this control officer the alarms observed on all corridors during a preset time.
- the explosive trace detection sub-system 200 as shown on figures 6A and 6B.
- This sub-system is made of a ducted airflow system, integrated in a wall (or behind), grouping several fans and producing a transverse wind from one wall to the other.
- a collecting tunnel sucks in this wind and passes it through in a multi pass laser cell.
- a spectrometer analyzes the absorption of the laser beam and delivers a measure of the concentration of the detected compound.
- the laser system could be a multi wave lengths one. Each wave length is predefined to detect a specific chemical compound.
- the laser is a quantum cascade laser that sweeps slightly to either side of a specific predetermined value; this value will be between 4 and 10 ⁇ for the compounds of interest.
- a specific predetermined value will be between 4 and 10 ⁇ for the compounds of interest.
- This sub-system delivers in real time: - a measurement of the concentration of the analyzed chemical compounds; temporal stop and go flags as a result of a person passing through the photoelectric cells; the captured image of the face of the person passing through the sub-system.
- the 77 GHz wavelength is preferred over other wavelengths because:
- a millimeter wave camera commercialized by BRIJOTTM. This camera functions at 100 GHz and is capable of detecting metallic and non metallic objects and liquids, even hidden under clothes. A similar camera from another supplier could also be used.
- a radar receiver rotates around the transmitter at a frequency which is determined by the speed and distance of the target so as to simplify processing
- the transmitter antenna is in the middle of the module wall.
- the receiver antenna elements are located in a non regular array (see figure 8) such as a virtual antenna could be computed in real time and then several adaptive beams be formed such as the object surface is covered like shown on figure 9A, with details on figure 9B.
- figure 9C the details of the objects detected (a gun and a knife) by the formed radar beams are shown. Different possibilities to implement these elements are available, for instance a randomized array or an multi regular k. ⁇ mesh pattern where ⁇ is the wave length of the radar and k is the number of mesh patterns.
- An implementation of such an array antenna radar is given in patent FR2875912 for a linear array.
- the array antenna should cover a square of from 30 by 30 centimeters to 60 by 60 centimeters and include between a few tens up to a few hundreds of receivers, depending on the level of the secondary lobes.
- the array antenna can be constructed as a network of antennas having holes which are located at points the positions of which are calculated using the method disclosed in patent FR 2902935. With this method, the number of receivers can be reduced to a few tens and the array can be formed with a network of patch antennas which can be integrated in the painting of the wall.
- This sub-system delivers in real time: an objects body location evaluation; an evaluation of objects size and shape; temporal stop and go flags as a result of a person passing through the photoelectric cells; - the captured image of the face of the person passing through the sub-system.
- This sub-system is made of at least one fish-eye camera integrated into the walls of the module.
- One equipment which may be used is a network AXISTM 221 camera with a CCD image sensor and a FUJINONTM lens ICAFYV2.2X1.4A-SA2 - 1 /3" with variable focal length from 1.4 to 3.1 mm with automatic DC iris and a fish-eye of 185° aperture and the following mounting and physical specifications: CS F:1 .4 MOD O.2m L:54.7mm x 0:41 mm 8Og.
- the AXISTM camera demonstrates features well suited for this application, specifically a progressive scanning capability which delivers clearer pictures of moving elements than interlaced scanning, thus facilitating image processing.
- Image processing is performed by a dual-core personal computer.
- Video streaming is continuously delivered to detect abnormal behavior inside the corridor such as U-turn, people running or trying to conceal something, people being nervous...
- This sub-system delivers in real time: the camera video streaming; temporal stop and go flags as a result of a person passing through the photoelectric cells; the captured image of the face of the person passing through the sub-system.
- the data used to calculate an aggregate risk level for a definite individual are:
- a first manner of determining an aggregate risk level is to compound the outputs of the detection sub-systems in a discrete manner using a logical decision table.
- the metal detection sub-system delivers a body location evaluation and an object volume evaluation
- the hidden object detection sub-system delivers a body location evaluation and an object surface evaluation.
- the two sensor detections and the possible two body localizations are compared with a decision table: o two detections, the two localizations are compatible, the same object is detected, it's a metallic one hidden under clothes o two detections, the two localizations are not compatible, two objects have been detected, a metallic one and a non metallic one, the second being hidden under clothes; o only metallic detection occurs, the object is a metallic one, it is not hidden under clothes, confirmation could be obtained by the video camera of the different modules and/or by the fish-eye camera; o only hidden object detection occurs, the object is a non metallic one, hidden under clothes.
- FIG. 12a, 12b, 12c, 12d and 12e A more detailed view of a logical decision table is shown on figures 12a, 12b, 12c, 12d and 12e where the crosses in the "Detection” columns stand for a positive reading, the "Detection confirmation” column indicates which type of confirmation is performed, the “Recognition” column indicates if there is or not a need to precisely identify the object and, if so, the result; then the "Alert type” and “Aggregate risk level” are indicated. These five sub-tables present different combinations of positive readings as examples only.
- a second manner of determining an aggregate risk level is to compound the outputs of the detection sub-systems using a continuous function.
- An example of an aggregate risk level calculation using a continuous function is given on figure 13 where only two detection sub-systems are taken into account and where the relationship between the variations of the two individual risk levels is linear: the "diffuse alarm" area would not trigger an alarm in a system of the prior art where only individual detection trigger alarms. After more experimentation, the linear relationship will be easily changed to optimize the detection/false alarm rate.
- a third manner of computing the aggregate risk level is to calculate an "a priori" probability using the Bayes rules considering the probabilities of alarms P(Vi>Ti) adjusted during an experimentation phase of the system.
- a security system detects metallic objects, plastic objects, ceramic objects, liquids, explosive materials, radioactive components (even if those different things are hidden under clothes), explosive precursor traces, pre-determined biological components, epidemiological risks (fever, known viruses%) while systems of the prior art only detect metallic object;
- a security system via the supervisory system, is able to deliver a true risk assessment indicator regarding a multi-criteria analysis. This indicator is much more efficient than the state of the art as it takes into account all the potential threats and does not overestimate the level of influence due to a specific individual profile; For instance in an airport, a frequent flyer person is less safe than normal passengers regarding epidemiological aspects; a security system according to the invention delivers an aggregate risk level assessment taking into account all these aspects;
- a security system gives a more elaborate alarm than prior art systems as it delivers information concerning the object location on the body, characteristics of this object ( metallic or non metallic, shape, surface, volume) while prior art systems generally only deliver an alarm for metallic objects;
- a security system does not need cooperative actions from people, who only need to walk through. This feature is advantageous over systems of the prior art as the one of figure 1 , where there is a need to stop during many seconds, hands up. As all objects, even non metallic ones, are detected despite the fact that they could be hidden, percentage of random body search should largely decrease compared to prior art systems;
- a security system controls on the move and reduces body searches because hidden objects are detected without these body searches;
- a security system could use (depending of the deployed type of system) enrolment information collected pre hand or some time before (for instance some minutes or hours before from airport boarding check in), or pre-established into data bases for specific secured zones like nuclear centers;
- the passenger display which can be included in a security system according to the invention informs users in real time, possibly with personalized information taken from the dynamic check-in data base.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Emergency Management (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Alarm Systems (AREA)
Abstract
L'invention concerne un système de sécurité destiné à découvrir des personnes interdites et des objets transportés par ces personnes entrant dans des zones sensibles. Ledit système comprend un ensemble de capteurs de détection et un sous-système de supervision connecté à une base de données de vérification. Les capteurs peuvent, par exemple, détecter des objets métalliques cachés ou non, des téléphones mobiles, des indices indiquant la présence de substances radiologiques, biologiques ou épidémiologiques explosives ainsi qu'un comportement anormal, et sont agencés en modules le long d'un couloir. Les personnes empruntant le couloir sont surveillées par des caméras vidéo qui permettent une mise en correspondance continue avec les données de capteurs et l'identité de l'individu qui passe le contrôle. Les niveaux de risque individuel sont mis en corrélation entre les capteurs et un niveau de risque groupé est calculé à partir d'au moins deux capteurs, prenant en compte des seuils d'alarme personnalisés établis par les autorités.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP08291258.5 | 2008-12-31 | ||
| EP08291258A EP2204783A1 (fr) | 2008-12-31 | 2008-12-31 | Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2010076261A1 true WO2010076261A1 (fr) | 2010-07-08 |
Family
ID=41102128
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2009/067717 Ceased WO2010076261A1 (fr) | 2008-12-31 | 2009-12-22 | Système de sécurité comprenant des capteurs placés dans un couloir pour découvrir des articles interdits |
Country Status (2)
| Country | Link |
|---|---|
| EP (1) | EP2204783A1 (fr) |
| WO (1) | WO2010076261A1 (fr) |
Cited By (11)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8457401B2 (en) | 2001-03-23 | 2013-06-04 | Objectvideo, Inc. | Video segmentation using statistical pixel modeling |
| US8564661B2 (en) | 2000-10-24 | 2013-10-22 | Objectvideo, Inc. | Video analytic rule detection system and method |
| US8711217B2 (en) | 2000-10-24 | 2014-04-29 | Objectvideo, Inc. | Video surveillance system employing video primitives |
| US9020261B2 (en) | 2001-03-23 | 2015-04-28 | Avigilon Fortress Corporation | Video segmentation using statistical pixel modeling |
| US9407546B2 (en) | 2014-02-24 | 2016-08-02 | Red Hat, Inc. | Routing a message using a routing table in a dynamic service mesh |
| US9892606B2 (en) | 2001-11-15 | 2018-02-13 | Avigilon Fortress Corporation | Video surveillance system employing video primitives |
| CN108734368A (zh) * | 2017-04-25 | 2018-11-02 | 鸿富锦精密电子(天津)有限公司 | 风险预警管控系统及方法 |
| WO2019212428A1 (fr) * | 2018-05-03 | 2019-11-07 | Havelsan Hava Elektroni̇k Sanayi̇ Ve Ti̇caret Anoni̇m Şi̇rketi̇ | Système de surveillance, de commande et de transit sécurisé biométrique autonome avec imagerie thz active |
| CN111274724A (zh) * | 2020-01-13 | 2020-06-12 | 西南交通大学 | 一种能揭示元件灵敏度的接触网运行风险评估方法 |
| CN116990883A (zh) * | 2023-09-27 | 2023-11-03 | 北京中科太赫兹科技有限公司 | 基于多频谱传感融合技术的远距离人携危险物探测系统 |
| US11880013B2 (en) | 2018-05-11 | 2024-01-23 | Carrier Corporation | Screening system |
Families Citing this family (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2954846B1 (fr) * | 2009-12-30 | 2012-07-13 | Thales Sa | Detecteur de menace generique |
| NL2007140C2 (nl) * | 2011-07-19 | 2013-01-22 | Vanderlande Ind Bv | Transportsysteem voor bagagestukken, check-in systeem voorzien van een dergelijk transportsysteem en werkwijze voor toepassing van een dergelijk transportsysteem. |
| FR3004573B1 (fr) | 2013-04-11 | 2016-10-21 | Commissariat Energie Atomique | Dispositif et procede de suivi 3d video d'objets d'interet |
| CN103353615B (zh) * | 2013-06-26 | 2016-01-20 | 深圳黎明镒清图像技术有限公司 | 车载式x射线人体全身透视安全检查系统 |
| WO2015111312A1 (fr) * | 2014-01-23 | 2015-07-30 | 株式会社日立国際電気 | Système et procédé de recherche d'image |
| US9990664B2 (en) * | 2016-05-06 | 2018-06-05 | Wal-Mart Stores, Inc. | Methods and systems for monitoring a facility |
| CN107393246A (zh) * | 2017-08-12 | 2017-11-24 | 宋彦震 | 物联网智能家居监控系统 |
| NO343993B1 (en) * | 2017-10-30 | 2019-08-12 | Hypervig As | A security system |
| CN110110638B (zh) * | 2019-04-29 | 2019-12-17 | 江苏省人民医院(南京医科大学第一附属医院) | 用于医院消毒室的控制命令解析系统 |
| CN112612066B (zh) * | 2019-09-18 | 2023-06-30 | 同方威视技术股份有限公司 | 人员安检方法及人员安检系统 |
| US11734975B2 (en) | 2020-03-10 | 2023-08-22 | Cubic Corporation | Short range radar use in transportation access systems |
| WO2022072010A1 (fr) * | 2020-09-29 | 2022-04-07 | Ident Llc | Systèmes et procédés permettant l'entrée dans des locaux à distance, sans contact et de façon automatisée |
| CN114694285B (zh) * | 2022-03-29 | 2023-09-01 | 重庆紫光华山智安科技有限公司 | 人流量告警方法、装置、电子设备和存储介质 |
| JP7788977B2 (ja) | 2022-09-20 | 2025-12-19 | 株式会社東芝 | セキュリティ検査システム |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO1999021148A1 (fr) * | 1997-10-22 | 1999-04-29 | Ids Intelligent Detection Systems, Inc. | Systeme integre de detection personnelle a traverser pour portiques de securite |
| US20040190757A1 (en) * | 2003-03-28 | 2004-09-30 | Murphy Kevin Sj | Integrated passenger management system |
| WO2005066912A1 (fr) * | 2004-01-12 | 2005-07-21 | Elbit Systems Ltd. | Systeme et procede d'identification d'une personne associee a une menace parmi la foule |
| FR2875912A1 (fr) | 1991-08-13 | 2006-03-31 | Thomson Applic Radars Ct | Procede et reconstruction d'echantillonnage non ambigu a partir de l'echantillonnage ambigu d'un signal et applications notamment aux radars doppler |
| WO2007061331A1 (fr) * | 2005-11-28 | 2007-05-31 | Closed Joint Stock Company 'afrus' | Procede de controle de personnes avec bagages et systeme d'examen de personnes avec bagages |
| FR2902935A1 (fr) | 2006-06-23 | 2007-12-28 | Thales Sa | Procede de fabrication d'une antenne a diagramme de rayonnement optimise selon les contraintes |
-
2008
- 2008-12-31 EP EP08291258A patent/EP2204783A1/fr not_active Withdrawn
-
2009
- 2009-12-22 WO PCT/EP2009/067717 patent/WO2010076261A1/fr not_active Ceased
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2875912A1 (fr) | 1991-08-13 | 2006-03-31 | Thomson Applic Radars Ct | Procede et reconstruction d'echantillonnage non ambigu a partir de l'echantillonnage ambigu d'un signal et applications notamment aux radars doppler |
| WO1999021148A1 (fr) * | 1997-10-22 | 1999-04-29 | Ids Intelligent Detection Systems, Inc. | Systeme integre de detection personnelle a traverser pour portiques de securite |
| US20040190757A1 (en) * | 2003-03-28 | 2004-09-30 | Murphy Kevin Sj | Integrated passenger management system |
| WO2005066912A1 (fr) * | 2004-01-12 | 2005-07-21 | Elbit Systems Ltd. | Systeme et procede d'identification d'une personne associee a une menace parmi la foule |
| WO2007061331A1 (fr) * | 2005-11-28 | 2007-05-31 | Closed Joint Stock Company 'afrus' | Procede de controle de personnes avec bagages et systeme d'examen de personnes avec bagages |
| FR2902935A1 (fr) | 2006-06-23 | 2007-12-28 | Thales Sa | Procede de fabrication d'une antenne a diagramme de rayonnement optimise selon les contraintes |
Cited By (17)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US10645350B2 (en) | 2000-10-24 | 2020-05-05 | Avigilon Fortress Corporation | Video analytic rule detection system and method |
| US8564661B2 (en) | 2000-10-24 | 2013-10-22 | Objectvideo, Inc. | Video analytic rule detection system and method |
| US8711217B2 (en) | 2000-10-24 | 2014-04-29 | Objectvideo, Inc. | Video surveillance system employing video primitives |
| US9378632B2 (en) | 2000-10-24 | 2016-06-28 | Avigilon Fortress Corporation | Video surveillance system employing video primitives |
| US10026285B2 (en) | 2000-10-24 | 2018-07-17 | Avigilon Fortress Corporation | Video surveillance system employing video primitives |
| US10347101B2 (en) | 2000-10-24 | 2019-07-09 | Avigilon Fortress Corporation | Video surveillance system employing video primitives |
| US9020261B2 (en) | 2001-03-23 | 2015-04-28 | Avigilon Fortress Corporation | Video segmentation using statistical pixel modeling |
| US8457401B2 (en) | 2001-03-23 | 2013-06-04 | Objectvideo, Inc. | Video segmentation using statistical pixel modeling |
| US9892606B2 (en) | 2001-11-15 | 2018-02-13 | Avigilon Fortress Corporation | Video surveillance system employing video primitives |
| US9407546B2 (en) | 2014-02-24 | 2016-08-02 | Red Hat, Inc. | Routing a message using a routing table in a dynamic service mesh |
| CN108734368A (zh) * | 2017-04-25 | 2018-11-02 | 鸿富锦精密电子(天津)有限公司 | 风险预警管控系统及方法 |
| WO2019212428A1 (fr) * | 2018-05-03 | 2019-11-07 | Havelsan Hava Elektroni̇k Sanayi̇ Ve Ti̇caret Anoni̇m Şi̇rketi̇ | Système de surveillance, de commande et de transit sécurisé biométrique autonome avec imagerie thz active |
| US11880013B2 (en) | 2018-05-11 | 2024-01-23 | Carrier Corporation | Screening system |
| CN111274724A (zh) * | 2020-01-13 | 2020-06-12 | 西南交通大学 | 一种能揭示元件灵敏度的接触网运行风险评估方法 |
| CN111274724B (zh) * | 2020-01-13 | 2021-08-27 | 西南交通大学 | 一种能揭示元件灵敏度的接触网运行风险评估方法 |
| CN116990883A (zh) * | 2023-09-27 | 2023-11-03 | 北京中科太赫兹科技有限公司 | 基于多频谱传感融合技术的远距离人携危险物探测系统 |
| CN116990883B (zh) * | 2023-09-27 | 2023-12-15 | 北京中科太赫兹科技有限公司 | 基于多频谱传感融合技术的远距离人携危险物探测系统 |
Also Published As
| Publication number | Publication date |
|---|---|
| EP2204783A1 (fr) | 2010-07-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP2204783A1 (fr) | Système de sécurité comportant des capteurs dans un corridor pour découvrir les articles dangereux | |
| US20070122003A1 (en) | System and method for identifying a threat associated person among a crowd | |
| US11164415B1 (en) | Touchless, automated and remote premise entry systems and methods | |
| EP1430449B1 (fr) | Procede de securisation d'acces, dispositif de controle d'acces, ascenseur | |
| US8031903B2 (en) | Networked security system | |
| US20100111377A1 (en) | Method for Incorporating Facial Recognition Technology in a Multimedia Surveillance System | |
| CN109214274A (zh) | 一种机场安保管理系统 | |
| US20100148946A1 (en) | Surveillance System | |
| US20170236232A1 (en) | Integrated Security Inspection System | |
| US20220262185A1 (en) | Identity Determination Using Biometric Data | |
| Sharma et al. | Intervenor: intelligent border surveillance using sensors and drones | |
| Borrion et al. | Threat detection: a framework for security architects and designers of metropolitan rail systems | |
| WO2022072465A1 (fr) | Système et procédé d'entrée dans un lieu | |
| JP7380698B2 (ja) | 処理装置、処理方法及びプログラム | |
| Sujkowski et al. | Artificial intelligence systems for supporting video surveillance operators at international airport | |
| US8519838B2 (en) | Method and system for on-board vehicle detection of harmful material | |
| US7629885B2 (en) | Security screening and support system | |
| Elias | Airport passenger screening: Background and issues for Congress | |
| WO2010140943A1 (fr) | Système de filtrage de sécurité multi-personne simultané | |
| CN214309133U (zh) | 测温安检系统 | |
| Al-Hilli et al. | Contemporary Technologies for Promoting Safe Cities: The Case of Al-Salheya Compound in Iraq | |
| Tryon | Millimeter wave case study of operational deployments: retail, airport, military, courthouse, and customs | |
| Ward et al. | Sport Security Technology Trends and Solutions | |
| EP3839802A1 (fr) | Suivi de personnes multi-capteur anonymisé | |
| CN222812949U (zh) | 安检机器人和安检系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 09795999 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 09795999 Country of ref document: EP Kind code of ref document: A1 |