Fully automated screening system and method

ABSTRACT

Various embodiments of the present invention are directed toward systems and methods relating to security screening. For example, a screening system includes a chamber configured to accommodate a user to be screened, and a chamber scanner. The chamber scanner is configured to scan the user to identify whether the user is carrying an undivested item that needs to be divested. The chamber is configured to release the user to proceed from the chamber to a secure area, upon confirmation that no undivested items are to be divested.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of priority from U.S. ProvisionalApplication No. 62/829,987 entitled “Automated Screening,” filed on Apr.5, 2019, and U.S. Provisional Application No. 62/935,370 entitled “FullyAutomated Screening System and Method,” filed on Nov. 14, 2019, thedisclosures of which are incorporated by reference in their entirety.

STATEMENT OF GOVERNMENT INTEREST

The claimed subject matter was partially made by one or more employeesof the United States Department of Homeland Security in the performanceof official duties.

FIELD

The present subject matter relates generally to the field of security,and more specifically to the field of security screening.

BACKGROUND

Security screening lanes today are labor intensive to operate. In anexample, the TSA Pre-Check® program provides a risk-based securityapproach, through the use of dedicated security lanes having dedicatedstaffing, separate from those security lanes that are not TSAPre-Check®. The TSA Pre-Check® lanes, and thus the entire checkpoint,have the potential to operate more efficiently, when there is asufficient user population to maximize the utilization of the space andstaffing dedicated to the TSA Pre-Check® lanes. However, this physicalsegmentation into dedicated lanes can lead to operational deficiencywhen the available passenger population is insufficient to warrant thededicated space and staffing. Furthermore, reliance on dedicatedscreening lanes for various risk populations inherently limitsrisk-stratification opportunities to existing checkpoint spaceavailability and can result in compounding degradation of resourceutilization if the various risk pools cannot be equitably dispersed toall available screening locations.

SUMMARY

Example embodiments described herein provide a screening environmentthat deploys variable screening parameters consistent with a risk-basedsecurity approach, while simultaneously increasing passenger throughput,improving passenger experience, reducing checkpoint staffingrequirements, and enabling the equitable dispersion of risk pools toavailable screening locations while efficiently utilizing availableresources. For example, as described herein, airport securityin-property or on-person screening systems are configured to providealgorithmic development of automated threat detection. On-personself-screening and intuitive detection technology alarm feedback isavailable directly to a passenger or user being screened, to facilitateself-resolution at a divestiture station. The screening of users can beself-completed without the need for a human operator or agent toinitiate scans or provide passenger instructions.

Example systems include detection technologies deployed around aproperty divestment point fitted with instructional displays, enclosedin an ingress/egress access control system chamber. The chamberintegrates with the divestment point and a property or item screeningsystem (X-Ray or Computed Tomography or Future Capability) that isfitted with bin return capabilities. In another example, the divestmentpoint is not within the chamber, but is accessible from an ingress pathinto the chamber. In yet another example, the chamber releases the userback into an unsecure area carrying undivested items, allowing the userto self-divest outside of the chamber, and return to the chamber forre-scanning.

Such systems provide a platform for dynamic risk-based variation inscreening protocols, thereby decreasing secondary screening resolutionpat-downs, increasing passenger throughput, and reducing securitystaffing needs. Intelligent scan initiation and creation of alarminformation feedback loops enable real-time alarm resolution by thepassenger or user during the divestment process. Example chambersprovide access control to secure areas, do not need an operator toinitiate screening, and reduce situations that need secondary resolutionprocesses by allowing passengers to self-resolve alarms. Such featuresresult in reduced need for onsite security screening personnel or agentsfor equipment operation and secondary screening.

Example embodiments of a screening system include a chamber configuredto accommodate a user to be screened, a divestment interface accessiblefrom within the chamber and configured to receive an item divested fromthe user, and a chamber scanner configured to scan the user to identifywhether the user is carrying an undivested item that is to be divestedto the divestment interface. The chamber is configured to release theuser upon confirmation that no undivested items are to be divested.

In another example embodiment, a method for screening a user includesadmitting a user into a chamber of a screening system responsive toestablishing an identity of the user, prompting the user to divest anitem into a divestment interface accessible from within the chamber,scanning the user via a chamber scanner disposed in the chamber toidentify whether the user is carrying an undivested item that is to bedivested to the divestment interface, confirming that no undivesteditems are to be divested, and releasing the user.

In yet another example embodiment, a system includes a divestmentscanner configured to obtain a detailed item characterization of itemsto be divested from users to be screened, and a plurality of screeningsystems coupled to the divestment scanner. A given screening systemincludes a chamber configured to accommodate a user to be screened, anda divestment interface coupled to the divestment scanner and accessiblefrom within the chamber. The divestment interface is configured toreceive an item divested from the user. A chamber scanner is configuredto scan the user to identify whether the user is carrying an undivesteditem that is to be divested to the divestment interface. The chamber isconfigured to release the user upon confirmation that no undivesteditems are to be divested.

Other features and aspects will become apparent from the followingdetailed description, which taken in conjunction with the accompanyingdrawings illustrate, by way of example, the features in accordance withembodiments of the claimed subject matter. This summary is not intendedto identify key or essential features of the claimed subject matter, noris it intended to limit the scope of the claimed subject matter, whichis defined solely by the claims attached hereto.

BRIEF DESCRIPTION OF THE DRAWINGS

One or more example embodiments of the subject matter are described indetail with reference to the following drawings. These drawings areprovided to facilitate understanding of the present subject matter andshould not be read as limiting the breadth, scope, or applicabilitythereof. For purposes of clarity and ease of illustration, thesedrawings are not necessarily made to scale.

FIG. 1 illustrates a screening system including a chamber scanneraccording to an example embodiment.

FIG. 2 illustrates a system including a plurality of screening systemsand a divestment scanner according to an example embodiment.

FIG. 2A illustrates a system including a plurality of screening systemsand an isolated divestment interface according to an example embodiment.

FIG. 2B illustrates a system including a screening system and anexternal divestment interface according to an example embodiment.

FIG. 2C illustrates a system including a plurality of screening systemsand divestment interfaces according to an example embodiment.

FIG. 3 illustrates a screening system including a divestment interfaceaccording to an example embodiment.

FIGS. 4A-4G illustrate an example operation of a screening systemincluding a divestment interface according to an example embodiment.

FIG. 5 illustrates a screening system operating in a lockdown modeaccording to an example embodiment.

FIG. 6 illustrates a system layout including a plurality of screeningsystems and divestment scanners according to an example embodiment.

FIG. 7 illustrates a method of scanning and releasing a user accordingto an example embodiment.

FIG. 8 illustrates a method of automatically scanning a user accordingto an example embodiment.

FIG. 9 illustrates a method of performing a detailed itemcharacterization according to an example embodiment.

These drawings are not intended to be exhaustive or to limit the subjectmatter to the precise form or forms disclosed. It should be understoodthat the present subject matter can be practiced with modification andalteration, and that the subject matter is limited only by the claimsand the equivalents thereof.

DETAILED DESCRIPTION

Example embodiments described herein make use of an automatedarchitecture, to minimize labor needed to staff a given securitycheckpoint, and to provide fully-automated, completely unstaffedsecurity checkpoints. The automated architecture is capable ofautomatically clearing a scanned passenger or user, or initiating analarm condition for the user, so that available staff is able to focuson clearing alarm conditions detected by the automated architecture. Theautomated architecture is built into gates providing access control,helping to control passenger or user flow as well as reducing the riskof a threat or alarm user breaking through a security lane. Theautomated gate provides access for cleared persons or users and canguide users to a specific path or paths to allow further or secondaryscreening and/or self-resolution by self-divestment of items. Suchexample system embodiments also may be referred to herein as“Self-Screening Portals” and/or Fully Automated Screening & TailoredExplanatory Resolution (FASTER) systems. Such example embodimentsprovide dynamic risk-based protocol detection, instruction or feedbackto the user, self-divestiture or resolution, access control ordirection, and other benefits and efficiencies as described herein.

Example embodiments implement a scanner configured to enable thepassenger or user to self-analyze to assess risk, and/or embodimentsconsult a database to assess a user risk score, used for dynamicallyadjusting security thresholds to be applied to the user. The user isallowed to divest items, including divestment at the scanner itself, toensure no prohibited items are carried into secure areas. Examplesystems are configured to receive and scan divested items for enhancingthe intelligence of the scanning (e.g., learning feedback) to build upona library of knowledge including whitelists and/or blacklists of allowedand/or prohibited items, leveraging confirmation feedback provided byoperating agents, all done on-the-fly in the field without a need fordedicated lab resources to train the systems how to recognize threats orinnocent items because they are self-learning while deployed. Systemsallow a user or passenger to remedy issues and retry the scan, retrievedivested items following the scan, and direct the user or passenger to aparticular next stage, or hold or securely lock up the user or passengerif needed.

FIG. 1 illustrates a screening system 100 including a chamber scanner120 according to an example embodiment. The screening system 100 alsoincludes a chamber 110 configured to accommodate a user 104 to bescreened. A divestment interface is not included in the embodiment ofFIG. 1, although other embodiments include a divestment interface ordrop box accessible from within the chamber 110 and configured toreceive an item 102 that is to be divested from the user 104. The screensystem 100 enables the user 104 to exit the chamber 110 and self-divest(e.g., drink remaining beverages, throw away unwanted items, place itemsin the user's vehicle or checked luggage, or otherwise divest items 102detected by the chamber scanner 120). The chamber scanner 120 is coupledto the chamber 110 and configured to scan the user 104 to identifywhether the user 104 is carrying an undivested item 102 that is to bedivested before the user is permitted to proceed to the secure area 134.The chamber 110 is configured to release the user 104 to the secure area134 upon confirmation that no undivested items 102 remain to be divested(e.g., the item 102 is divested into a divestment interface or drop boxwithin the chamber, or divested outside of the chamber), or uponconfirmation that any items remaining with the user 104 are notprohibited in the secure area 134.

In a preferred embodiment, the divestment interface is within thechamber (e.g., as a slot, tray, or door accessing a divestment scannersuch as a luggage x-ray scanner), or is anywhere in an ingress path,e.g. 460, to the chamber. In the embodiment with the divestmentinterface in the ingress path to the chamber, the chamber may optionallycontinue to be open to the ingress path during a scan or open to theingress path upon detection of an object for divestment. The chamber isconfigurable to allow the user 104 to leave the chamber (e.g., via theingress path or entrance door to the chamber) to proceed to an unsecureor upstream area, where the user 104 is free to divest prior tore-entering the chamber 110. In such an embodiment, the divestmentinterface may optionally be a garbage can, a drop box, a locker, checkedluggage, the user's vehicle, a conveyor belt into an luggage scannerexternal to the chamber 110 that is presented to the user 104 prior toentering the chamber 110, or other such options to which the user 104can divest item 102. In another example, the user 104 divests a beverageitem 102 by exiting the chamber 110, drinking the item, and re-enteringthe chamber 110 for a follow-up scan to confirm the item 102 no longerneeds to be divested.

The word “chamber” in this invention means any partial or completeenclosure or portal that impedes the user to be scanned from reaching asecure area until they have been cleared. “Chamber” is not limited tosystems that are fully enclosed. For example, a chamber of thisinvention may have ingress doors as shown in FIG. 4 that slide back andforth, preventing the user from returning to the ingress path 460 duringthe scan. However, a chamber may also be completely open to ingresspaths into the chamber 460. An advantage of a chamber open to ingresspaths is that the divestment interface may be integrated with theluggage scanning drop provided to the users upstream of the chamberalong the ingress path (e.g., see FIG. 2B). Similarly, an egress door414 need not completely enclose a wall of the chamber so long as itimpedes the user from entering the secure area. For example, an egressdoor may be two swinging doors that swing in from either side of thecavity. In another embodiment with less automation, there may be noegress door 414 but a security person may prevent a user from exitinguntil given a signal of clearance from the system. A chamber may also beopen or partially open above, or below the user as shown in FIG. 4. Asused herein, the term “chamber scanner” includes sensors or otherscanning equipment included in a chamber, and also includes equipmentthat is exterior to or outside of the chamber. In an example, thechamber scanner is a screening scanner, and the chamber scanner itself,or a portion thereof, can serve as or otherwise provide the chamber 110.

FIG. 2 illustrates a system 201 including a plurality of screeningsystems 200 and a divestment scanner 250 according to an exampleembodiment. The divestment scanner 250 is coupled to the chamber 210 ofthe screening system 200 via a divestment interface 230. The divestmentscanner 250 is configured to receive items 202 and obtain detailed itemcharacterizations of items 202 divested from users 204. The divestmentscanner 250 is shared between a plurality of screening systems 200. Thedivestment scanner 250 includes a series of conveyances (e.g., belts,rollers, or the like) configured to carry the items 202 from thedivestment interface 230, through the divestment scanner 250, and thenback to a waiting or recomposure station proximate to the chamber 210,for convenient pickup upon exiting the chamber 210. In an embodiment,the series of conveyances are enclosed to prevent user access to items202, until advanced to an open area after the user 204 is cleared torecover items.

The availability of multiple chambers 210 enables the system 201 tocoordinate availability of each chamber, and selectively direct users204 to enter a given chamber 210. In an example, the system 201 verifiesthe identity of a first user and confirms that the first user is awalk-up who is not prescheduled to undergo screening at the time. Thesystem 201 also verifies the identity of a second user and confirms thatthe second user is prescheduled to undergo screening at this time. Thesystem 201 then instructs the first user to wait and instructs thesecond user to proceed to an available chamber to undergo screening. Thesystem 201 also directs a third user (unscheduled walk-up) to wait, eventhough a chamber is available, so that the system 201 reserves anavailable chamber for the next expected prescheduled user, which thesystem 201 is aware of and expecting, by accessing prescheduledscreening information for yet-to-arrive users.

A given screening system 200 includes the chamber 210 to accommodate theuser 204 to be screened. The example divestment interface 230 isaccessible from within the chamber 210 and configured to receive items202 divested from the user 204. At least one chamber scanner 220 (threescanners per chamber are shown) is configured to scan the user 204 toidentify whether the user 204 is carrying an undivested item 202 that isto be divested, e.g., to the divestment interface 230 (or by leaving thechamber 210 via ingress door 212 to divest in an unsecure area). Thechamber 210 also includes automated ingress door 212 and automatedegress door 214. The egress door 214 is configured to release the user204 upon confirmation that no undivested items 202 are to be divested.Although two doors are shown, other example embodiments use differentnumbers of doors (e.g., to direct the user 204 through a selected one ofa plurality of doors, corresponding to one of several possible pathways,according to scan results).

The illustrated system 201 is based on a deployment configuration suitedfor security screening locations in which staffing resource optimizationis a consideration. For example, the system 201 can operate in anunstaffed configuration, whereby users 204 are able to performcompletely unattended self-screening (an agent can be summoned to handlespecific issues or other anomalies, or such users can be directed toexit back out along the ingress path to the unsecure area, and proceedto another security checkpoint that is staffed). The illustrateddeployment configuration leverages relatively smaller spaces to conductscreening, which spaces would otherwise not be conducive to traditionalcheckpoint infrastructure. Example applications include, but are notlimited to, small airport locations, TSA Pre-Check® and/or prioritypassenger screening locations, employee screening locations, and so on.The example layout increases the utilization of the divestment scanner250, e.g., by scanning a first user's divested item as soon as it isready from a first chamber, without sitting idle while a second user isstill preparing to divest in a second chamber. Such multiplexing of thedivestment scanner 250 is capable of being increased, by addingadditional chambers 210 which feed divested items to the divestmentscanner 250 (e.g., via conveyor belts).

FIG. 2A illustrates a system 201 including a plurality of screeningsystems 200 and an isolated divestment interface 230 according to anexample embodiment. The isolated divestment interface 230 is walled-off,preventing the public from accessing divested items 202. Users 204 ineach chamber 210 of the screening systems 200 divest their items onto aconveyor belt which feeds the divestment scanner 250. The walling-off ofthe isolated divestment interface 230 provides another example of howthe various components of system 201 separate secure and unsecure areas,where the area to the left of the wall is unsecure, and the area to theright of the wall is also unsecure but isolated from the unsecure areato prevent access by the unsecure public, and the area to the right ofthe chambers and/or divestment scanner 250 is secure.

FIG. 2B illustrates a system 201 including a screening system 200 and anexternal divestment area or divestment interface 230 according to anexample embodiment. The user 204 performs divesting outside of thechamber 210, because the area of divesting is not within the chamber210. In the illustrated embodiment, the area of divesting is along aningress path into the chamber 210. The ingress door 212 is formed as afixed opening of the chamber 210, such that the chamber is a partialenclosure that is not fully enclosed but serves to impede the user fromreaching a secure area beyond the chamber 210 via controlled egress door214. The user 204 is shown in the chamber 210 and is free to move alongthe ingress path to divest at the divestment interface 230. Accordingly,upon receiving feedback from the user interface 240 (e.g., a display)that additional items need to be divested, the user 204 exits thechamber 210 via the ingress door 212 to access the area of divesting toperform additional divesting, placing additional items 202 on theconveyor belt to the divestment scanner 250. The conveyor belt itself isillustrated serving as a divestment interface 230. The user 204 can thenre-enter the chamber 210 via the ingress door 212 for re-scanning (thisprocess is repeatable, depending on a given configuration of the system201). The egress door 214 is shown closed and provides controlled orselective exit for the user 204 upon confirmation that all items thatneed to be divested have been divested, and the user 204 is otherwisecleared for exit.

FIG. 2C illustrates a system 201 including a plurality of screeningsystems 200 and divestment interfaces 230 according to an exampleembodiment. The user 204 performs self-divesting at the divestmentinterface 230 into the divestment scanner 250, which services multiplechambers 210. In an example usage scenario, the user 204 divests item oritems 202 into the divestment scanner 250, which confirms that the items202 are not prohibited. The user 204 then collects the divested item oritems 202 and exits the chamber 210. In the illustrated embodiment, thesystem 201 is configured to occupy a relatively reduced space footprintcompared to other embodiments, allowing the user 204 to better maintaincontrol of their items 202 at all times, while eliminating the need fora complex bin return system and reducing the need for bag-checking staffor agents.

In an example, the user 204 divests and retrieves items 202 from thesame divestment interface 230 accessible from within the chamber 210,without the user 204 needing to exit the chamber 210 to retrievedivested items 202. An embodiment of the system 201 includes a singleconveyor belt to alternatively service both divestment interfaces of thetwo chambers 210 being used by two users 204, the belt operating toselectively retrieve from and return to a user divested items 202 to bescanned. In another embodiment, the system 201 does not include aconveyor belt, and instead the user 204 directly accesses the divestmentscanner 250 via the divestment interface 230 to place items 202 directlyfrom the chamber 210 into the divestment scanner 250.

The illustrated drop box 225 is shown accessible within the chamber 210and is also deployable outside chamber 210. The drop box 225 providesone-way disposal of items, such as prohibited items, that once inserted,are no longer retrievable by the user 204. Accordingly, rather than exitthe chamber 210 to dispose of prohibited items, the user 204 is free todispose of prohibited items (such as razor blades) into the box 225 andbe re-scanned.

In an example, the system 201 includes a divestment interface 230 havingan actuated compartment and lid assembly, with a mechanical coupling tocause the actuated compartment to extend toward the user upon opening ofthe lid. Embodiments can employ various different compartments, similarto a fishing tackle box, to provide various compartments suitable forcorresponding items 202 to be divested, and which extend outward to theuser 204 as part of the mechanism for opening and closing the divestmentinterface 230. An example includes compartments for cell phones,tablets, laptops, loose change, keys, and/or other items typicallycarried by users 204. Such compartments are configured and arranged toautomatically cause the divested items to be positioned in a desirableorientation suitable for efficient and effective scanning by thedivestment scanner 250. For example, the tablet compartment causes thetablet to orient its screen toward the scanner, to avoid an edge-onscan.

Example systems 201 include safety features, such as barriers orcompartments to prevent entry of people into the divestment scanner 250,and/or interlocks to prevent operation of the divestment scanner 250until its lid is fully closed. An example system 201 includes an x-rayblocking shield that selectively deploys, e.g., automatically as part ofthe mechanism of the divestment interface 230. An example system 201 ismodularized and includes a module that is specifically configured toreceive a particular type of item 202. For example, the system 201includes a liquid explosives detection screening module (notspecifically shown; can be incorporated into the divestment interface230). Liquid explosives detection screening is typically associated withan extended item scanning duration. Accordingly, the system 201 includesa notice informing users 204 that the system 201 is capable of scanningliquids carried by the user 204. The system 201 therefore enables users204 to be free to choose whether to incur a longer scanning durationand/or wait line, in order to bring liquids through the system 201 intothe sterile portion of the airport. The user 204 is also free to accessanother system 201 that does not include the liquid explosives detectionscreening module, and therefore enjoy a relatively faster screeningthroughput. Other embodiments include various other modules, enablingoptions to allow users 204 to fully self-screen according to advancedinteractive screening procedures provided by the system 201 to the user204, enabling the user 204 to divest into specialized receptaclescorresponding to the various modularized systems. In an exampleinstallation, a plurality of systems 201 operate completely unstaffedfor a given site in the airport. The system 201 allows the user 204 toproceed to the sterile portion of the airport if the self-scanning issuccessful but informs the user 204 to exit and retry and/or getassistance in scanning at a staffed site in the airport, if theself-scanning is unsuccessful.

During operation of an example embodiment, the system 201 determinesthat the user 204 has fully divested from their person (e.g., see FIG.4D). The system 201 allows the user 204 to insert their items 202 intothe divestment scanner 250. The system 201 then scans the items 202,automatically searching for prohibited objects among the items 202(e.g., sharp objects, weapons, etc.). If a prohibited object isidentified or alarmed, an example embodiment of the system 201 returnsthe prohibited object to the user 204, and relays information about thedetected prohibited object and its location in the user's property. Forexample, the system 201 displays an abstract representation of theuser's carry-on luggage on an engagement monitor, such as the userinterface 340 shown in FIG. 3, along with an icon overlaid on theluggage representation, with a label such as “prohibited object locatedin this area of bag,” or even more specific such as “razor blade locatedhere,” “firearm located here” (a similar approach is used in embodimentsto display specific locations on the user's body where items are found,and explanatory information as to why the item is prohibited). Thesystem 201 instructs the user 204 to dispose of the prohibited object,e.g., into a divestment object drop box 225. The user 204 is free tointeract with the system 201 to request assistance in finding an alarmedprohibited object detected by the system 201. An example system 201includes drop box 225 within the chamber 210 and/or located in front ofthe system or checkpoint. The illustrated system 201 includes interiorand exterior drop boxes 225. The user 204 resubmits themselves and/ortheir property for screening in the system 201. If the system 201 clearsthe user 204 and their property, the system 201 advances the property tothe sterile side of the system (e.g., via a divestment scanner output ordoor 252), and/or returns the property to the user 204 inside thechamber 210, allowing the user 204 to carry the property out to asterile side of the system 201.

If, in response to scanning the items 202 described above, the system201 detects a high-threat object (such as a firearm and/or explosive),the system 201 holds the high-threat object internally so that thehigh-threat object is inaccessible to the user 204 (e.g., behind thedivestment interface 230 and/or within the divestment scanner 250). Thesystem 201 alerts and/or otherwise summons an agent or officer to takecustody of the high-threat object and/or the user 204.

Embodiments provide various options for users 204 to dispose ofprohibited objects that are not allowed in carry-on luggage or on-personcarry. For example, system 201 identifies that the prohibited object isnot a high-threat object and is otherwise permitted back in the airportor checked luggage (but not as a carry-on), and instead of opening theegress door 214, the system 201 opens ingress door 212 to allow the user204 to exit the chamber 210 back into the unsecure area while carryingthe prohibited object, passing into the non-sterile portion of theairport. The user 204 is free to check the prohibited object in checkedluggage (or place the prohibited object in carry-on luggage and checkthe carry-on luggage as checked luggage), and then re-enter the system201 without the prohibited object. Similarly, the user 204 is free tomail the prohibited object, place the prohibited object in a locker,leave the prohibited object with another person and/or in the user'svehicle at the parking garage, or otherwise have the freedom to disposeof the prohibited object in a manner that is permissible according toairport and other relevant rules or laws pertaining to the prohibitedobject. Thus, example systems 201 enable users 204 to avoid needing toforfeit the prohibited object.

An example system 201 includes a checked luggage module, to print achecked tag with relevant user information as known by the system 201for that identified user 204. The checked luggage module enables thesystem 201 to directly receive the prohibited object or objects androute the objects destined for checked bags for that user/user's flight.An example system 201 notifies the user 204 (e.g., via a user interface340) of relevant options available for disposing of the prohibitedobject, custom tailored in view of the type of prohibited object. Forexample, the system 201 notifies the user 204 whether the prohibitedobject must be retained inside the divestment interface 230 and/ordivestment scanner 250, must be forfeited into the drop box 225,qualifies to be checked as checked luggage, qualifies to be carried outof the system 201 freely, qualifies to be received into a module of thechamber 210 appropriate for the prohibited object, or other options(e.g., based on an item library lookup of the detected characteristicsof the prohibited obj ect).

FIG. 3 illustrates a screening system 300 including a divestmentinterface 330 according to an example embodiment. The system 300includes an ingress interface 308 along an ingress path 360 throughingress door 312 leading to the chamber 310. Users exit from the chamber310 along one of a plurality of egress paths via the egress door 314, oralong the ingress path 360. The egress door 314 and/or the ingress door312 are operable to open in a manner that prevents access to thenon-selected path or paths, while granting access to the selected pathor paths. A chamber environmental control 318 adjusts an environmentwithin the chamber 310. A user interface 340 provides visual and/orauditory guidance or feedback to the user in the chamber 310. An opticalsystem 326 collects optical and other information about the user of thesystem 300, and a plurality of four (or more, such as including aceiling, table, or other scanner deployment) scanners 320 collectscanner information about the user. The divestment interface 330 enablesthe user to divest items, which are then scanned by divestment scanner350 coupled to the divestment interface 330. The user interface 340disposed in the chamber is configured to prompt the user to divestundivested items. For example, the user interface 340 provides generaladvice to remove heavy coats prior to being scanned. The user interface340 also provides specific divestment instructions, e.g., responsive toidentifying that the user is carrying an undivested item that needs tobe divested.

Prior to entering the chamber 310, the example system 300 uses ingressinterface 308 to confirm passenger or user identities. Optionally, theexample system may have an ingress interface 308 to determine useridentities at a location that is not in the ingress path. Such anoptional interface is more generally referred to in this invention as anidentification interface. In another embodiment, the system 300 isintegrated with other systems configured to identify the user, such asan identity verification technology or process upstream of and innetwork communication with the system 300 in the security screeningprocess. The user identity established by system 300 includes pertinentpassenger information, risk score information, and other relevantscanning information. In embodiments, the user identity includesinformation obtained by the system 300, as well as information that isrelayed to the system 300 from other systems (including other systemlocated onsite with the system 300, or externally, such as remotelylocated identification services, or government agencies such as theDepartment of Motor Vehicles). Embodiments also obtain information fromdocuments carried by the user, such as a passport or driver's license.Example embodiments also determine whether the user is an unscheduledwalk-up (directing the user to wait, giving priority access to thechamber 310 to prescheduled users, and/or keeping a threshold number ofchambers 310 unoccupied or available corresponding to a number ofexpected prescheduled users during a given window of time), or whetherthe user is prescheduled for a particular screening location or time(giving the user priority access over walk-up users). It will beunderstood that the exact identity of a user need not be fullydetermined to be useful. For example, as discussed more specificallybelow, the user's gestures or gait may identify the user as a threatwithout fully identifying the user. Such a system may be necessary wherea user fails to provide his government issued identification to theidentification interface or where the interface has an unresolved errorin scanning the identification.

Embodiments of the system 300 adjust detection criteria and securityscreening procedures to be applied to a given user or passenger as he orshe enters the system, e.g., pursuant to an assigned risk score.Divestiture instructions, concept of operation parameters, detectionalgorithms, and other aspects of the scanning procedure are varied basedon the user's profile and risk information. The deployed scanningdetection technologies 320 enable the system 300 to make materialdiscrimination and object recognition assessments to determine thepresence of everyday or innocuous items. The system 300 also makes arisked-based determination on whether a passenger or user needs todivest an identified property item (e.g., based on whether the item isrecognized and whitelisted, unrecognized, recognized and blacklisted,recognized and compatible or incompatible with the user's risk score,and so on). Additionally, embodiments of the system 300 vary securityscreening parameters to maintain a dynamically variable screeningenvironment, which changes on a random and continual basis as desired,e.g., to thwart bad actors by preventing them from recognizing anemergence of patterns of scanning procedures. Thus, example systemsintroduce pseudo-random variations into the procedures, even on anautomatic basis.

Example embodiments of system 300 also adjust the information displayedon the user interface 340, e.g., a passenger engagement display andaudio system. Such user instructions and guidance are based on knownuser characteristics, which are provided by the passenger or obtainedfrom other sources, including the user's preferred language ordisability information. The system 300 also infers such information toperform scanning procedure customizations, e.g., based on informationthe user provided during an airline reservation or identity verificationprocess (which may have occurred even days before the user's scan atsystem 300). Such inferred customization information includes primarylanguage or languages used in the issuing country of the passenger'sidentification, and the like. The system also customizes the screeningprocesses and technologies applied based on known disabilities of thepassenger or user, such as limb amputation, and/or sight orhearing/mobility limitations. Embodiments of the system 300 directlyobserve and identify such user features based on the use of opticalsystem 326. Examples of system 300 apply modifications to enableaccessibility for individuals such as children or individuals withdisabilities that need assistance through the screening process, and/orwho utilize mobility aids (such as wheel chairs or scooters). System 300is capable of summoning an agent (via external indicators,communications, or other example techniques as described herein) to aidor otherwise facilitate accessibility of individuals, and in the case ofunstaffed systems 300, can direct the user to another system locationthat is staffed. Thus, system 300 provides a custom-tailored screeningexperience, capable of varying procedures for each passenger or user,thereby maximizing the effectiveness and ease of the security process.

The system 300 also provides enhanced care for a user's items, such ascarry-on property. The system 300 is configured to internally hold auser's property, preventing other individuals from accessing the user'sitems while the user is inside the chamber 310 (e.g., until such time asthe passenger is cleared and ready to collect their items). Furthermore,the system 300 holds or diverts alarming items, to prevent the itemsfrom being accessible to the user (or other users) until resolutionprocesses are performed to clear the user. The system 300 alsocommunicates to other systems information about scanning the user, e.g.,to influence security procedures applied to other aspects related to theuser, such as scanning of that user's carry-on baggage and checkedbaggage.

Accordingly, example embodiments of system 300 dynamically adjust anentire interconnected grouping of systems that handle the user and/orthe user's items, capable of using information from one system toinfluence another system. The chamber 310 to scan the user adjoins thedivestment interface 330 and divestment scanner 350 system, integratedto enable divested items from the chamber 310 to be directly receivedfrom the user, including larger items such as carry-on bags. Thedivestment interface 330 is compatible with providing and returning binsfor receiving and ingesting the divested items to the divestment scanner350. Biometric confirmation or linking an individual user to a user“session” or other identifier, enables the system 300 to keep track ofthat individual user without needing to retain the user's personalinformation. Accordingly, the system 300 identifies the user upon entryinto the chamber 310, and the equipment of system 300 is calibrated tospecifically scan that user to a particular threshold customized to thatuser's security risk score or other identity factors, which arecross-checked by an external database lookup, or assessed or determinedvia the system 300 itself, e.g., using video recording analytics ofoptical system 326, or other means to observe the user and generate arating of a security score for the user, and/or continually update theuser's security score (e.g., based on observed user characteristics suchas level of perspiration, shiftiness of movement, patterns or changes togaze direction, irregular gaits, and the like). The on-propertyexamination is thereby linked to the user's security risk score, and ascore for the user can be influenced or adjusted by an outcome of thescan of the user's items, and vice versa.

Variations in the scanning procedures for the user and/or items are alsolinked, such as how to instruct the user and what the user is to expectin the scanning procedure for the user and/or items, based onpre-existing info (e.g., whether the user is registered for TSAPre-Check®). The system 300 accordingly provides suitable uniquelytargeted divestment instructions for that user, compared to another userwho may not share the same characteristics (e.g., users not registeredfor TSA Pre-Check®). The system 300 provides a high-risk user withdifferent instructions than a low-risk user, and in an example, providesprobing, bold and/or shocking instructions to purposely trigger aresponse from that user, and check for types of changes in the user(e.g., sweat, heart rate, or other changes in behavior, movement,concealing of items, and so on) as confirmation or disconfirmation of arisk that can be inferred from the shocking instructions.

Examples of system 300 selectively apply and combine scanningtechnologies differently, depending on a risk score of the user to bescanned. The system 300 obtains the risk score in various ways,including the use of biometrics (biometric key or independentassessment) and/or a scan and check of user identification provided atthe ingress interface 308. In an example, the system 300 evaluates arisk score along a spectrum of scores, and then categorized a givenuser's score as being a high, medium, or low risk score. For usershaving a low risk score, the system 300 is more lenient and increasesits ability to place less weight on, or even disregard, an indicationthat has a likelihood of being a false alarm. In contrast, for a userwith a medium or high security risk score, the system 300 does notdisregard, and places more weight on, any alarms for that user (e.g.,even if the alarm has a 90% likelihood of being a false alarm). Thesystem 300 adjusts accordingly in view of the security risk score basedon the user identity, placing different weight on even the same type ofalarms for various items in view of the user's risk score, to allow oneuser to pass with a given item, while holding another user (or directingthe user to secondary screening) for that same item, even if triggeringthe same alarm, whether it be a legitimate or a false alarm.

The example ingress door 312 and the egress door 314 of system 300 areillustrated as automated entry/exit sliding doors. Other types ofswinging, folding, hinged, rotating, or other technology doors arecompatible with system 300, and in some open embodiments, the doors areomitted (whereby notifications or lighted indicators serve toselectively guide users). Automated doors enable the system 300 toselectively allow or deny physical access to the chamber 310, e.g., on aper-user basis. In an example embodiment, prior to a scan, the system300 validates whether the user is permitted into the chamber 310, andalso validates whether the user is permitted to exit the chamber 310 toproceed to a secure area, e.g., along egress paths 362 and/or to an areabeyond the system 300, prior to opening. For embodiments without doors,the system 300 exercises influence over the user by selectivelyactivating or deactivating various aspects of itself, such as theingress interface 308, the user interface 340, the divestment interface330, selectively illuminated arrows, and other indicators that canremain dormant or activate, and/or provide instructions such as “accessdenied see agent” or the like. Example embodiments of system 300including doors are able to maintain positive control of a user, e.g.,physically denying entry into the chamber 310 until access is granted,and/or physically denying exit from the chamber 310 until an alarm oralarms is resolved or an agent is ready to take control of the user uponexit from the chamber 310, e.g., for escorting the user to and/orapplying enhanced screening and/or further resolution processes for theuser. The system 300 is configured to direct the user to a selected oneof a plurality of different egress paths 362 according to a result ofthe scan of the user. For example, responsive to the scan resulting inno unresolved alarms, the system 300 directs the user along a second oneof the egress paths 362 to a secure area (e.g., the airport terminals).Responsive to an unresolved alarm, the system 300 directs the user alonga first one of the egress paths 362 to secondary screening, or back outalong the ingress path 360 to an unsecure area (e.g., to allow the userto self-divest a prohibited item by disposing of it before returning tothe chamber 310 to re-scan). In example embodiments, the egress door 314and/or the chamber 310 are structured to physically channel the useralong a particular path according to the identity and/or scan resultsand prevent the user from deviating from the channeled path or accessingother paths.

The chamber 310 establishes a controlled chamber environment, based oncontrolling various aspects including temperature, humidity, airflow,electromagnetic or other forms of radiation, sound, light, or othercharacteristics. An example system 300 controls the chamber environmentbased on construction of the chamber walls/ceilings/floors/doors, e.g.,by using a wire mesh to block electromagnetic radiation, by usingthermal insulation to minimize sound and/or heat transfer, by usingrubber seals to prevent airflow, and so on. The example embodiment ofsystem 300 additionally controls the chamber environment by usingchamber environment control 318, such as an air filter, (de)humidifier,and/or air conditioner, to alter an environmental characteristic withinthe chamber 310. The system 300 controls the internal environment ofchamber 310 to enable various different deployed observation/detectiontechnologies to perform under desired or ideal conditions. For example,the chamber 310 is climate controlled to maximize the performance ofscanners 320, such as those based on thermal/terahertz imaging systems.In another example, chamber 310 is climate controlled and designed toeliminate background frequencies, radiation, electromagneticinterference, and the like in the chamber 310, to maximize theperformance of scanners 320, such as those based onmillimeter/backscatter/Nuclear Quadrupole Resonance (NQR) detectionsystems. For those example chamber scanners 320 based on technologyincluding backscatter, NQR, and/or millimeter wave scanning (forexample), the chamber 310 includes a faraday cage structure to minimizeor completely block external electromagnetic radiation, to provide anisolated electromagnetic (EM) spectrum environment in the chamber 310.Such environment is capable of blocking fifth-generation (5G) cell phonedeployment signals, which otherwise might also impact scanningperformance. In some embodiments, security scans may be timed or tunedto avoid interference from EM waves.

Example embodiments of the system 300 establish optimal temperatureranges in the chamber 310 for corresponding scanning technology used inchamber scanners 320. An example system 300 also adjusts environmentalconditions in the chamber 310 in view of a condition of the user, e.g.,as observed via optical system 326. Such adjustments are performed forimproving user comfort, and also are performed for improving scanningperformance. For example, millimeter wave scanning performance areworsened when the user is covered by perspiration. The system 300 usesthe chamber environment control 318 to compensate for a user who appearswith perspiration, to cool and/or dry out the user to combatperspiration. In other embodiments, the system 300 performs an initialscan using chamber scanners 320, analyzes the results, identifies poorresults due to perspiration, and adjusts the chamber climate to improvescanner performance by dehumidifying, blowing, cooling, or otherwisecausing the user to become more amenable to scanning. An example system300 proactively maintains a baseline chamber climate that enhancesscanning performance.

Example embodiments of chamber 310 are hardened to contain an explosionor biological threat. The chamber environment control 318 is configuredto provide airflow conducive for explosive analysis, e.g., puffing aironto the user and drawing chamber air for analysis by system 300.Examples of chamber environment control 318 are configured to purge airfrom the chamber after one user and introduce a fresh charge of filteredair before the next user. An example chamber 310 is configured toselectively seal/lock the air inside the chamber, to contain a biohazardor other airborne item.

FIGS. 4A-4G illustrate an example operation of a screening system 400including a divestment interface 430 according to an example embodiment.The scanning system 400 is coupled to divestment scanner 450 via thedivestment interface 430. The chamber 410 is positioned to selectivelyenable users 404 to transition between at least one ingress path 460 andat least one egress path 462. Although not specifically shown in FIGS.4A-4G, embodiments can include a drop box for self-divesting and/ordiscarding of items, external to and/or within the chamber 410 (e.g.,see box 225 in FIG. 2C).

FIG. 4A illustrates a user 404 approaching the screening system 400. Theuser 404 approaches via the ingress path 460 to interact with theingress interface 408 and present user identification 405, such as apassport, driver's license, identification token based on a barcode orradio-frequency identification, or similar to establish the user'sidentity. The user is carrying two items 402. An optical system 426detects the user 404, and performs visual analysis of the user 404,which, in embodiments, includes facial analysis, gait analysis, and/orother visual recording/evaluation. The user interface 440 displays awelcome message, and bins at divestment interface 430 are readied foruse (e.g., empty bins are automatically returned from the divestmentscanner 450 via conveyor belt).

The screening system 400 is configured to, prior to scanning the user404, establish the user identity 406 and adjust an aspect of the scanbased on the user identity 406. For example, the system 400 identifies acountry of origin of the user based on information available on apresented passport and determines a suitable language for verbally andvisually prompting or interacting with the user to engage with the userin his/her native language during the scanning process. In anotherexample, the system 400 identifies whether the user is unscheduled as awalk-up (directing the user to wait) or is prescheduled for thislocation and window of time (directing the user to proceed to chamber410 which the system 400 has kept unoccupied in anticipation of theprescheduled user). In another example, the system 400 is unstaffed andidentifies that the user 404 will need assistance from an agent anddirects the user 404 to another screening location that is staffed,prior to the user 404 being scanned. The ingress interface 408 includesa reading device to scan the user identification 405. In other examples,the ingress interface 408 allows voice entry, or collection of otheruser identifying information such as data entry typing of passwords orbiometric collection (fingerprints, retina scan, facial recognition),and the ingress interface 408 delivers a passenger identification suchas a barcode or other token to serve as user identification throughoutthe scanning process (e.g., a passenger identity token). The screeningsystem 400 uses optical system 426, or retrieves information fromavailable identity databases, to identify specific user information ofpossible missing body parts or specific security screeningsensitivities, which are used to optimize and enhance the detectionprocess (e.g., generate specific user prompts and guidance to assist inscanning an artificial limb or mobility device, inquire whether the userdesires agent assistance, and the like). Thus, system 400 is capable ofanticipating the user's preferred language based on user identity, andfurther customizing the scanning process by adjusting various aspects ofguiding the user, breaking down instructions into simpler steps, orcombining steps for more complex but faster dissemination of userinstructions, and the like. System 400 learns personal physicallimitations of the passenger, such as blindness or deafness, todynamically customize the user instructions to accommodate such useraspects and make the scanning process easier for the passenger (e.g.,increase a font size of displayed instructions, increase volume level ofthe instructions, provide audio instructions to accompany visualinstructions, etc.) and efficiently process the user according to atruly customized experience for each user, based on risk score and knownpersonal characteristics. Additionally, aspects of the scan aredynamically adjusted for the sake of creating variation in the scanningprocess, thereby avoiding a predictable repetitious procedure tointroduce a randomness element and prevent bad actors from learningpatterns or other details of the scanning procedure in an attempt to tryto evade aspects of the scan.

In an example, an embodiment of system 400 establishes a biometric key(e.g., a passenger identity token) agnostic to the user's personal infoto serve as user identifier. The established biometric key is unique toat least one biometric indicator of the user and contains riskinformation and security risk assessment information for that user.Accordingly, the example system 400 avoids needing to store sensitiveidentification user information into the user identifier in order touniquely identify the user in the scanning process. For example, theoptical system 426 obtains a facial scan and/or retina scan of the user404, and the ingress interface 408 obtains a fingerprint and/or palmscan to validate the user's identity. System 400 accesses riskinformation corresponding to the validated user identity, and ties thatestablished risk information to the secure biometric token serving asthe user's identity identifier and discards personal information of theuser.

Example systems 400 access a risk database, such as the TransportationSecurity Administration (TSA) Secure Flight Program or other riskdatabase, to implement Risk Based Security (RBS) approaches to userscreening methodologies, improving the effectiveness and efficiency ofairport security operations. System 400 adjusts, based on user riskscore, detection algorithms used by the system 400 to analyze results ofchamber scanners 420 (based on, e.g., advanced imaging technology(AIT)/X-Ray/computed tomography (CT)/etc.). In an embodiment, the system400 makes these adjustments to the entire system (e.g., adjusts thecharacteristics of the scan of the user, and the characteristics of thescan of the on-person/carry-on bags or other items) corresponding to orotherwise associated with the user. In an example, the system 400obtains risk information from another upstream security system (e.g.,relayed to the system 400 via an encrypted biometric token), and/orindependently establishes a user's identity and corresponding riskinformation through the use of biometric matching to a “ground truth”identity database (such as that provided by the Department of HomelandSecurity (DHS)/Department of Motor Vehicles (DMV)/etc.). The system 400additionally can make changes to what kind of screening is generallyapplied to the user 404, based on the user's risk score. Furthermore,the system 400 similarly applies a variable security level of holdingthe user, corresponding to the risk score of the user. For example, thesystem 400 closes and secures the doors using a deadbolt to preventhigh-risk users from physically escaping from the chamber 410. Incontrast, the system 400 can leave doors open and merely use directionalinstructions displayed on user interface 440 (or other indicator, suchas illuminated floor/wall arrows) to provide helpful guidance for alow-risk user (e.g., a user already approved by TSA Pre-Check®). Examplesystems 400 also access the databases and other systems to determinewhether a given user has prescheduled (e.g., in conjunction with makingflight reservations) for a particular location and/or window of time forarriving at the system 400, such as by communicating with a flightreservation system. Example systems 400 use such preschedulinginformation to identify and prepare for expected traffic, e.g., byadjusting how long to instruct walk-up user to wait, how long to holdopen a given chamber or chambers for expected prescheduled users, and/orwhat percentage of chambers in a given system to hold open, i.e., howmuch slack-space to create in the system in order to accommodate surgesor other variations in user traffic.

Example embodiments of system 400 dynamically adjust scanning andinstructing the user 404 on a per-user basis, providing a granular,individualized level of screening experience. An example embodimentprovides discrete buckets or sets of scanning procedures (e.g., a givenbucket or procedure set may include the procedure of instructing theuser to remove shoes, or the like) in which the system classifies users,and then applying that user's corresponding procedure set, of aparticular combination or combinations of scanning strategies, guidance,operation of system 400. Any number of discrete procedure sets can beemployed, to adjust for different body morphologies (e.g., differentscanning procedure sets for given body types or attire, or whateverother factors) and system performance variation based on known bodyfeatures/characteristics. Similarly, gender may be important fordetermining the precise detection algorithms to be used for a particularuser. An embodiment associates a given procedure set with an independentrisk calculation for that user, how well the system 400 is capable ofscreening that user, and how much risk is associated with that user, anddynamically adjusts the risk level of the user in view of the applicableprocedure set. Such discrete procedure set approaches are combinablewith variably adjustable features in any given embodiment, e.g., using agrouping of instructional procedures, while including an infinitelyvariable application of scanning intensity. Embodiments take intoaccount the known disabilities of users, and whether that impacts theuser's risk calculation and/or how to approach the user's scanning,whether to screen the user in a different manner based on that knowndisability, whether the user has a prosthetic, whether to add someparticular divestment steps or instructions, whether to target thescanning of the user more on explosive detection versus user'ssurface-based details, whether to focus more on surface-based details,or other features that are adjustable on a per-user basis. Examplesystems account for items the user discloses to the system and which arevetted as acceptable for screening, as well as accounting for items thatare known by the system to be associated with the disability or otheruser information. For example, the user notifies the system of a walkingimpairment, and the system allows the user to proceed carrying crutches,which are known by the system to be associated with a walking impairment(even though the user did not specifically inform the system ofcrutches). Example systems include libraries of items known tocorrespond to known disabilities or other characteristics of users. Inthe above example, the system also knows to allow a wheelchair, forexample, in addition to allowing crutches, accommodating users withwalking impairments regardless of what type of items are used to assistthe user with walking impairment.

Known disabilities, country of origin, languages spoken, bodymorphology, security risk information, risk score, known past crimes,gender, gait evaluation, and facial expression detection are examples ofrelevant scanning information that may dynamically change an aspect ofthe scan including instructions, scanning thresholds, and white listedand black listed items.

Thus, the system 400 is capable of varying the instructions toaccommodate a user 404, and also is capable of varying the scanningstrategy and/or technology deployed to accommodate that user, resultingin synergistic effects in view of the available types of scanningtechnology deployed in the system 400, e.g., installed at scanners 420.For example, system 400 can include, or adjust, the screening applied,e.g., as applied by various different discrete procedure sets applied tousers, or as variably adjusted per user, to accommodate the types ofscanning technology available in that example system 400. Examplesystems 400 include a modularized implementation, to accommodatemodularized changes or the addition/removal of modules of scanningtechnology, which enables the system 400 to modify and/or create newprocedure sets for accommodating different users. The system 400analyzes scanning usage patterns, and calculates how much time could besaved by the system 400 based on which available scanning modules areused, including a suggestion to add new modules. The system 400similarly calculates what synergistic scanning effects can be leveragedbased on existing installed scanning technology, and in view of whatscanning technology/modules can be added.

Example system 400 leverages synergistic scanning, by which differentscanning technologies are applied to provide an enhanced overallscanning effect. A given type of scanning technology is deployable bysystem 400 in multiple scanning modes, depending on what needs are beingmet or which procedure set is being applied for scanning a given user.For example, a millimeter (mm) wave scanner 420 is operable in areflective mode, whereby a scanner 420 emits a mm wave pulse that isreflected by the user or other object back to that panel (multiplepanels are usable emit and/or receive). The backscatter x-ray scanner420 is also operable in a pass-through mode, in which a stronger signalis emitted from one panel, to pass through the user and be received atanother panel (revealing details beyond a surface of the user).Radiation used for either mode is similar, and one mode is usable forexternal scanning, and the other mode for internal scanning, using thesame scanner technology. The different operational modes are enabled bythe structural configuration of the chamber 410 and the arrangement ofthe scanners 420 deployed at the system 400. Accordingly, the samescanner technology is usable in different modes according to a givenuser, e.g., to probe whether a high-risk passenger is carrying concealedexplosives, to accommodating medical devices of a user based on medicalprofile information, or other customization information as determined bythe system 400 based on user information such as risk score and/oridentity. Based on such information, the system 400 adjusts theapplication and combination of scanning technology to be used forscanning the user, to ensure needed scanning information is obtained,while avoiding any potential negative outcomes or medical conflicts, ina fast scanning experience that is transparent to the user.

The screening system 400 is configured to update the user's identitybased on the scan. For example, the screening system 400 uses opticalsystem 426 to perform facial recognition to determine that the user 404has a particular style of facial hair and a new tattoo. Accordingly, thesystem 400 updates a database of the user's identity information toinclude facial hair and tattoo identity information details.

Example embodiments of the screening system 400 are also configured tocommunicate a result of screening the user to other systems, such as acentral data repository, a secondary screening system, and so on. Forexample, the system 400 transmits scanning results from the system 400to a secondary screening area, such as a screening area with agentsusing pat-down or hand-held wands. Example embodiments of the system 400are communicatively linked to stations/resolution tools at the secondaryscreening resolution area, including a direct communication to thehand-held millimeter wave (HHMW) scanners/wands. An example secondaryscreening area is shown in FIG. 6, secondary screening 670. The HHMW isusable to conduct secondary screening under the direction and advice ofthe system 400, as communicated to the HHMW, e.g., to direct focus toareas of the user that alarmed the primary scanner 420 in the system400. In an example, the system 400 identifies a specific area of theuser as triggering an alarm, such as the upper left torso, andcommunicates that specific area information to the secondary screeningso that an agent can focus the secondary screening to resolve the issueat the specific area of the user's body (see FIGS. 4C and 4D for moredetails). During the alarm resolution process, an agent can receive thealarm information from the system 400, and request the additionaldivestment of alarmed areas and then, if items are removed, confirm thatthese areas are clear through the use of the HHMW unit (reducing oreliminating the need for physical pat-downs). Additionally, the system400 is configured to communicate to other systems, including those thatdo not directly scan the user. For example, other systems, even thoseremotely located, which might scan user's carry-on and/or checkedluggage, in addition to the divestment scanner 450.

The system 400 is capable of performing scans including the use of areal-time video analytics system, e.g., based on optical system 426,configured to identify an indicator of the user (such as type of gait,facial recognition, body movements, missing/artificial body parts, andthe like), and adjust the scan according to the indicator. In additionto the scanners 420 and detection systems deployed for screening theuser's person, the real-time video analytics technologies are configuredto assess the user's movements in the chamber 410 of the system 400.Accordingly, the system 400 monitors user movements (via optical system426) and triggers various security scans (via scanner or scanners 420)as the user is appropriately positioned to be scanned. Thus, system 400interprets user movement and non-verbal communication to better engagewith the user, and ensures that the passenger does not try to “game,”cheat, or otherwise attempt to circumvent security screening systems andprocedures. The system 400 applies real-time video analytics to enablebehavioral/biological indicator monitoring of the user 404, includingbody language/non-verbal cues, micro facial expressions, heart ratepatterns/variations that system 400 uses to identify abnormalitiescorrelated with deception or hostile intent, which the system 400factors into screening assessments and/or axillary riskindicators/scoring.

Embodiments of system 400 implement video analytics using humanoperators, artificial intelligence (AI), and/or deep learningalgorithms, which system 400 trains and improves based on real-worldusage (e.g., where an agent provides positive or negative reinforcement,or multiple systems are configured to provide feedback/reinforcement toeach other). Such training includes teaching the system 400 how toidentify behavioral indicators, e.g., based on subconscious bodylanguage movements, micro-aggressions, irregular gaits, thermal imagingof heart rate, and the like. Example systems 400 treat such behavioraland other analyses as auxiliary threat indicators, taken intoconsideration by the system 400 in conjunction with other security riskscore or scanner/video analytic information, to provide a well-roundedcombination of various factors to indicate a threat/risk score for theuser 404. An embodiment of system 400 implements audio or visual aspectsof the user interface 440 to probe the user 404 with a pressing/shockingquestion, to trigger feedback behavior in the user 404. For example, thesystem 400 asks the user 404 directly whether the user is in possessionof a gun or explosive, to monitor the user's reaction for gettingnervous or otherwise incites a biological reaction from the user 404(perspiration, heart rate) that is consistent with guilt or deception,and thereby incorporated into the user's overall risk score, or eventriggering an alarm.

Example embodiments of the chamber 410 are configured to cause the user404, while entering, advancing through, and/or exiting the chamber 410,to assume at least one scanning position for a sufficient scanningduration. The chamber 410 is configured to automatically initiate a scanvia one or more scanners 420 appropriate for the automatically detectedscanning position, in response to automatically detecting that the user404 has assumed the scanning position (e.g., based on optical system426, scanners 420, interaction with the ingress/egress door or doors412/414, and/or interaction with the divestment interface 430. In anexample automated scan initiation, the system 400 tracks the user 404through the use of optical/thermal systems 426, automatically initiatingone or more scans when the user 404 is appropriately positioned. Suchscans by system 400 are targeted, continual, and/or opportunistic,taking advantage of a user's natural movements to achieve automated scaninitiation, continual scanning, and/or targeted placement of millimeterwave scan technologies, during divestiture and the loading of carry-onproperty into the divestment interface, to partly or completely screen auser's person.

In an example embodiment, once the passenger enters the system 400, thesystem 400 is configured to enable the natural movements and time spentby the user during the divestment process to allow the system 400 tocapture scan data and conduct automated analysis of the user 404. Suchmovements, which are leveraged to generate scan data, include but arenot limited to: walking into the chamber 410; turning to face theingress interface 408, user interface 440, and/or divestment interface430; bending to remove footwear as appropriate/directed; lifting of armsto remove jackets/sweaters as appropriate/directed; and lifting ofcarry-on baggage or other items into the divestment interface 430 and/orother property screening systems such as a table or divestment scanner450.

Aspects of the example system 400 are designed and configured to ensurethat a user completes the necessary range of motion and spends therequired amount of time in the system 400 to capture sufficient scandata to make an accurate assessment. Such design and configurationaspects include but are not limited to: total distance/angle of approachfrom chamber entrance to a table or an upper interface section locatedat the divestment interface 430; height of the divestmenttable/receptacle; height of a bin return system (e.g., a lower interfacesection) of the divestment interface 430; and placement of the userinterface 440 (e.g., display monitors to direct the user's line ofsight/gaze). If the system 400 is unable to scan/capture a specific areaof the user's body during the divestment process, the system 400 caninstruct the passenger to assume a specific pose or poses (see FIG. 4E)to obtain sufficient scanning information and ensure minimal unnecessaryalarms resulting from insufficient data. In an example, the divestmentinterface 430 includes a door mechanism having two handles, which theuser 404 is directed to hold in order to activate the door mechanismusing both hands while assuming a desirable scan position as well as adesirable range of motion in the user when moving the two handles tooperate the door mechanism.

An example system 400 initiates scans and achieves user trackingautomatically using video analytics by the system 400 analyzing videofeed from optical system 426 to identify an identity of the user 404,and their body posture/limb position, to build a motion wireframe fortracking and comparing against a dynamically learned/updated database ofwireframe body positions that are known to be suitable for a given typeof scan. Systems 400 can incorporate motion capture and movement ofclothing in real time, and the identification and scanning ofsurface/shallow blood vessels. Accordingly, for example, if the userreaches up to divest their carry-on bag, the system 400 scans the user'sstomach area and underarms. If the user reaches down to untie shoes, thesystem 400 scans the user's back, and so on. The chamber 410 isphysically structured and configured, based on the scanners 420,divestment interface 430, and so on, to cause the user 404 to beparticularly positioned relative to the panels of the scanner 420, theoptical system 426, or other system equipment, to achieve a synergy withthe positioning and natural usage of the divestment interface 430,including the accomplishment of a pre-orchestrated range of motionswhich the physical structure/environment of the system 400 is set up tonecessitate. The system 400 prompts the user 404 to removeclothing/items, and checks if the user 404 has complied. The system 400monitors whether the user does something unusual, such as dropping anitem onto the floor (e.g., the system ensures that nothing is on thefloor via checking for changes in the video capture corresponding to thefloor area), and tracking whether the user 404 performs the requestedactions, and does not disobey instructions or perform unrelated actions(unbuckling pants and reaching behind toward a body cavity, attemptingto break into an in-chamber drop box, and the like). Thus, the system400 gives a simple instruction (via user interface 440) such as “placecell phone in box #3,” and the user 404 reaches up a certain way toposition their body specifically for a scanner relative to the bodyposition and location of that divestiture box #3, to achieve effortlessand quick scanning of the user 404. Such scanning is also accomplishedwithout specifically directing the passenger to assume a given position,by allowing the user to self-divest certain items while the system 400accomplishes the scanning on-the-fly while the user divests, accordingto the posing and other divesting instructions that are seeminglyunrelated to the user assuming a position for scanning. Accordingly, theuser 404 enjoys a more pleasing and non-intrusive scanning experience.

FIG. 4B illustrates the screening system 400 with user 404 inside thechamber 410 with ingress door 412 and egress door 414 closed. The user404 is divesting item 402 into a bin at the divestment interface 430,but has forgotten another item (scissors) in a breast pocket. The user404 has naturally positioned his/her face close to lower optical system426, and has naturally positioned his/her body toward panel scanner 420.The user interface 440 is presenting divestment instructions (visuallyand/or audibly).

As illustrated, the divestment interface 430 is configured to cause theuser 404, while divesting the item 402, to assume a scanning positionfor a scanning duration, and the chamber scanner 420 is configured toautomatically scan the user 404 in response to detecting (via opticalsystem 426 and/or sensing by scanner 420) that the user 404 has assumedthe scanning position.

In an example embodiment, the chamber scanner 420 includes multipledifferent scanning technologies configured to perform a cross-detectionsystem analysis scan, based on scanning technologies such asAIT/X-Ray/CT/etc. The system 400 uses multiple detection technologies toperform the cross-detection system analysis of the user 404, by havingthe various system scanning technologies compensate for any individualshortfalls of a given technology. For example, millimeter wave scanningtechnology achieves high resolution, while being prone to false alarmsdue to user sweatiness or certain types of clothing. Accordingly, thesystem 400 cross-references the millimeter wave scanning technology witha thermal or terahertz scanner (which has a lower detection resolution,but has good performance for larger-scale items regardless of sweat orclothing), using those complementary technologies to enable the system400 to self-verify a false alarm from a given one of the technologies,by referring to the other technology/technologies. The system 400 alsoinfluences the cross-referencing and/or combining of multiple differenttypes of scanning with the user's risk score, to further evaluate how toweight different scanning technologies to address a given likelihood offalse alarms associated with a given scanning technology and acombination of different scanning technologies. For example, the system400 deploys nuclear resonance scanning and dielectric scanning systems,which have vulnerabilities and/or difficulties regarding metals, whilecombining those technologies with metal detecting scanning technology,combine the different detection/scanning technologies to leverage theadvantages of each. The modularized scanning system approach used inexample systems 400 enable different combinations or subsets oftechnology to be used, to address the scanning goals for a givendeployment of the system 400. The system 400 handles the operation ofthe various different types of technology, freeing up personnel toaddress resolution of alarms, without needing to concentrate on, e.g.,machine/technology operation. The system 400 is automated and handlesdirecting the user 404 onward to the airport or to further screening/patdown resolution areas, enabling the user 404 to self-resolve by usingthe divestment interface 430.

Example systems 400 take the results of the various scanningtechnologies to make security determinations based on a totality ofscanning results, factoring the known vulnerabilities and/or strengthsof the incorporated detection/scanning systems, and/or the user's riskscore. Detection/scanning technologies can be deployed into the walls,floor, ceiling, tables, and other surfaces of the system 400 as needed.Security screening technologies that can be incorporated into system 400include, but are not limited to: millimeter (mm) wave scanners;backscatter X-ray scanners; nuclear quadrupole resonance (NQR) scanners;dielectrometry systems; metal detection systems; terahertz imagingsystems; thermal imaging systems; explosive trace/odor detection viaairflow sampling; and/or future on-person screening technologies. Thetotality of incorporated security screening technologies provides thesystem 400 the ability to function under a wide range of operationalparameters, from low-risk users 404 who are allowed to keepfootwear/outerwear on through the screening process, to high-risk users404 that trigger a more detailed assessment under fully-divestedconditions. In yet another embodiment, the above technologies and othersare combined with thermal/polarized thermal/other passive imagingtechnologies and mm wave AIT for false alarm reduction and improveddetection. By pairing the thermal imaging (or other imaging systems)with AIT technologies, system 400 reduces certain “false” alarms(clothing embellishments, sweat, etc.) to which some AIT systems areprone, while also potentially improving detection thoughcross-assessment of users 404 through a multitude of scanningtechnologies.

FIG. 4C illustrates the screening system 400 in an alarm state followingthe detection of the forgotten scissors item 402 carried in the user'sbreast pocket, the detection based on the automated scan shown in FIG.4B. The user 404 had been unaware of the presence of item 402, but theuser interface 440 is configured to display a body representation 442 ofthe user 404 overlaid with an item indication 444 of the undivested item402 positioned corresponding to the undivested item's location on theuser's person. Accordingly, the user 404 is able to self-locate andself-resolve the alarm state, even after forgetting the presence of theitem and otherwise insisting by the user that no items were carried thatneeded to be divested. Furthermore, embodiments of the system 400provide explanatory information on the type of item 402 and why it isprohibited or otherwise needs to be divested. Such explanatoryinformation, e.g., instructs the user to temporarily divest the itemthat is otherwise not prohibited and allowed to be carried by the userto the secure area after resolving an anomaly with the item, orinstructs the user to surrender the prohibited item which cannot becarried into the secure area. In an example, the system 400 explains tothe user that a detected beverage item is prohibited, but the user isfree to drink or otherwise dispose of the beverage before beingre-scanned and allowed to proceed to the secure area without thebeverage. The system 400 also can provide explanatory informationrelating to dangerous/hazardous/unlawful items that require holding theuser to be taken into custody by agents.

The user interface 440 facilitates a guided user alarm resolution. Thesystem 400 displays or otherwise relays alarm information to the user404, visually and/or audibly, to direct additionaldivestiture/rescanning of the user 404 to resolve alarm conditionswithout need for agent involvement (when practical/safe). For instance,responsive to the system 400 detecting an item 402 in the user's pocketduring a scan, the system 400 advises via the user interface 440 thatthe user 404 is carrying an item, and directs the user 404 to performadditional divestment of that area of the user's body. The system 400then automatically directs the user 404 to remove/divest any items fromthat area of the user's person, allowing the system to perform furtherX-Ray/CT screening of the item, direct the user 404 to be rescanned, and(barring additional unresolved alarms) enable the user 404 to besubsequently and automatically cleared. In an example, the system 400identifies that an item is prohibited, and allows the user 404 todiscard the item in a drop box, exit the chamber via the ingress path toself-divest in an unsecure area upstream of the chamber, or prompt theuser to acknowledge that the divestment interface 430 will confiscatethe item if divested into the divestment interface.

Embodiments of the system 400 visually and/or audibly advise the user tomove and/or get into position for better scanning, as well as performunannounced opportunistic scanning without specifically notifying theuser 404. System 400 leverages the divestment instructions, and deploysbold or prompting questions, including questions that serve multiplepurposes such as getting the user 404 into appropriate position forscanning, or eliciting a user response while observing how the user 404responds. As illustrated in FIG. 4C, the system 400 has provided analarm question about carrying a sharp weapon, which elicits a shruggingresponse by the user 404, which the optical system 426 detects andidentifies consistent with a non-threatening situation in which the userhas merely forgotten he/she was carrying scissors.

FIG. 4D illustrates the screening system 400 holding user 404, who isdivesting item 402 into the divestment interface 430. The system 400 hasdetected the anomaly caused by item 402 carried by the user 404 (seescan depicted in FIG. 4B), and has informed the user 404 of the alarmlocation and has instructed the user 404 to perform additionaldivestment or divestments of the area or areas identified in the userinterface 440. As the user 404 continues to divest, the system 400 iscapable of repeatedly scanning the user to determine if all alarms areresolved. In the illustrated embodiment, the system 400 is waiting fordetection via optical system 426 of the illustrated divestment, beforere-scanning the user 404. In another example, the divestment interface430 includes a user-operated door mechanism which the system canmonitor, and/or the divestment interface 430 includes sensors to detectwhether the user 404 has deposited an item into the divestment interface430 (and similarly for divestment into a drop box, in embodiments whichinclude an in-chamber drop box).

FIG. 4E illustrates the screening system 400 holding and re-scanning theuser 404 following divestment. The user interface 440, responsive toidentifying that scanning information is needed, is prompting the user404 to assume a scanning position conducive to obtaining the scanninginformation that is needed. The system 400 is using a different one ofthe plurality of chamber scanners 420 to achieve the scan compared tothe scanner 420 shown in FIG. 4B, based on detecting via optical system426 that the user 404 happens to be positioned in a manner that issuitable for that scanner 420.

Within the chamber 410 of system 400, the user interface 440 is capableof offering visual/audio feedback clarifying which zones of the user 404have been scanned, as well as the zones needing morescanning/visibility. Accordingly, the user 404 can interactively move inview of the real-time feedback, to ensure all zones are scanned to allowthe system 400 to obtain sufficient scanning information to resolvealarms and/or come to a decision on a status of the user 404 (e.g.,determine that directing the user 404 to secondary screening isjustified, or that the user 404 may proceed onward to the airportgates). This eliminates the need for an agent to intervene for manuallyinstructing the user 404, e.g., to assume a proper stance or adjustmentto posture. Embodiments of system 400 achieve a final decision on statusof the user 404 based on an accumulation of multiple detection resultscollected by the system 400, including scanning and other results suchas behavioral analysis.

An example system 400 offers the user 404 the possibility to self-clearthe alarms, and be subject to repetitive scans as needed. The examplesystem 400 opens the entrance/ingress door 412, multiple times ifneeded, to allow the user 404 to perform further divesting and/orfurther interaction with the ingress interface 408 or unsecure areas ofthe security process upstream from the chamber 410 without permittingthe user 404 to proceed beyond the chamber 410 to a secure area,enabling the user 404 to remove forgotten items or perform other tasksthat the user 404 might need to do (retrieve a forgotten document at theingress interface 408, etc.). A similar iterative approach is used withthe system 400 allowing the user 404 to repeatedly interact with/divestto the divestment interface 430. An example system 400 limits the numberof iterations, e.g., based on the user exceeding a threshold time,threshold number of iterations, or other limitation for ensuring smoothsystem operation (e.g., how busy or slow the security line is). Thesystem 400 determines that a user 404 has fully divested their carry-onand on-person property (e.g., based on iterative scans and userguidance), the items are advanced to property screening, e.g., at thedivestment scanner 450. In other example embodiments, a given item 402is advanced to the divestment scanner 450 upon being divested, withoutwaiting until additional items are divested and/or until the user 404has fully divested.

FIG. 4F illustrates the screening system 400 holding the user 404 insidethe chamber 410 waiting at the egress door 414 with items 402 at thedivestment scanner 450. The divestment scanner 450 is configured toobtain detailed item characterizations of the items 402 divested fromthe user 404. The screening system 400 is configured to update adatabase with the detailed item characterizations obtained by thedivestment scanner 450. In example embodiments, such detailed itemcharacterizations include instructions/guidance for informing users asto why the item is prohibited. In other examples, the system 400 usesone or more scanners 420 of the chamber 410 to perform detailed itemcharacterizations. The illustrated example includes a conveyor belt, toconvey the items into the divestment scanner 450 located away from thein-chamber divestment interface. In other examples, the divestmentscanner 450 is located at the divestment interface, which also includesa door mechanism and shield to protect the user from emissions generatedby the divestment scanner 450. In such examples, the items remain at thedivestment interface, conveniently located for the user to open the doormechanism and retrieve the items following a successful (non-alarming)scan of the divested items. Such example embodiments allow the user tocarry such allowed items from the chamber onward to secure areas beyondthe egress door. Examples can selectively approve some divested items,while disallowing some divested items, which the user is free to discard(in an unsecure area and/or in a drop box) prior to being released toproceed to the secure areas carrying the approved/allowed items.

System 400 incorporates data capturing for detection algorithm updatesand upgrades, from data sources local to the system 400 as well as fromremote data sources. For example, the equipment at the system 400(AIT/X-Ray/CT/etc.) and also at a secondary screening resolution stationwith HHMW scanners (e.g., see secondary screening 670 of FIG. 6) captureand “tag” (e.g., categorize and associate with information based onautomatic or agent-assisted scanning and/or verification) information onitems 402, such as items that resulted in screening equipment alarms. Anexample system 400 uses that scanning information to update detectionalgorithm “white lists” (innocuous items) and/or “black lists” (threatitems). In an example deployment of multiple chambers 410, a designatedstation/chamber, or other designated scanning device, is designated toserve as a scanning service that an agent uses to capture detailedinformation on alarming items. This designated device/station enablesthe scanning of an item 402 (both innocuous and threat) with a multitudeof scanning technologies to obtain a detailed characterization of theitem 402. The agent can provide input into the designated device/stationto confirm automatically detected information and/or otherwise assist inthe collection or classification of the type of information tagged tothe item, or assist with other details of the item (includingre-orienting the item in the designated device/station for additionalscanning iterations based on feedback from the designated device/stationsimilar to that provided to users 404 being scanned). The system 400uses the detailed characterization information, and/or the input fromthe agent, to create a feedback loop for the updating of detectionalgorithms to reduce false alarms and/or improve detection of threatitems 402 (as innocuous or dangerous). In alternate embodiments, any/allof the various chambers 410 and/or divestment scanners 450 are operableas a designated device/station, to obtain a detailed itemcharacterization.

Such designated device/stations make use of various sensor technologies,including: millimeter wave scanners; backscatter x-ray scanners; nuclearquadrupole resonance (NQR) scanners; dielectrometry systems; metaldetection systems; terahertz imaging systems; thermal imaging systems;3D laser measurement/scanning systems; high-resolution camera systems;and/or future screening and material/dimensional characterizationtechnologies, and the like.

In an example, after the user's property/items 402 have advanced intothe property screening system such that they are no longer accessible bythe user 404 (e.g., including even immediately after being ingested bythe divestment interface but before arriving at the divestment scanner450) the egress door 414 will open and allow the user to exit, e.g., toproceed to a recompose area and/or onward through the airport torecollect the items 402, or to a secondary screening area, and so on.The system 400 is also configured to prevent access by other travelersto a user's property/items 402 while the user 404 is in the chamber 410of the system 400. Such prevention ensures that the user'sproperty/items 402 remain under the supervision of the user 404 withoutproviding an opportunity for another traveler to interact with thoseitems 402 of the user 404. In an example, the items 402 are held in thesecure area of the divestment scanner 450 until the user 404 is releasedfrom the chamber 410. If the user's property/items 402 alarm thescreening system/divestment scanner 450, the system 400 can internallyhold the alarming property until an agent responds to take control ofthe items 402 for further resolution, without allowing access by othertravelers.

FIG. 4G illustrates the screening system 400 releasing the user 404 fromthe chamber 410. The user interface 440 provides instructional guidanceto direct the user 404 along a specific one of the plurality of egresspaths 462 (e.g., toward the terminals or recompose area, and not thesecondary screening, based on positive outcome of the automatedscreening by system 400). The types of controls and indications used bysystem 400 to control and/or direct the user 404 along a given path 462can be varied (from very minor audio/visual indicators, up to heavilyhardened and reinforced mechanical barriers) based on configuration ofthe access control hardware forming part of the chamber 410 itself,and/or based on variation in the software and interface indications. Inan example, the system 400 is configured with hardware and software tomeet security standards developed by the Transportation SecurityAdministration (TSA). For example, the system 400 is compliant with TSArequirements documentation specifying a desired level of security, ableto withstand forces sufficient to physically hold a user, and deploy acombination of capabilities such as visual/audible indications to directthe user. Example embodiments of system 400 employ a safety feature withan emergency override to allow the user 404 to force open the ingressand/or egress doors as a safety measure. The system 400 is capable ofselectively disabling the emergency override, to have a safe mode forguiding users and allowing them to override the physical holding aspectsof the system (similar to an alarmed emergency exit), and also alock-down mode, to prevent dangerous users from escaping the chamber410, and/or to contain a blast or otherwise be hardened against bombs orother threats. The system 400 can selectively disable the emergencyoverride based on various scanning or observational results, as well asbased on manual input from an agent.

Embodiments of system 400 use physical doors or other physical barriers,as illustrated in FIG. 4G. In other embodiments, system 400 does not usephysical doors, and includes visual indications or other feedback (e.g.,via user interface 440) to guide users 404. Physical doors or barriersare configurable to allow being pushed open, or locked down to resistuser interaction. Although the various walls, doors, and other aspectsof the system 400 are illustrated as being transparent, this is for thesake of illustrative convenience. Other example embodiments use opaquedoors, walls, and/or other aspects of the system 400.

In the example of FIG. 4G, the user 404 was directed down the secondegress path 462, based on the physical egress door 414 opening in amanner that blocks the first egress path and allows passage only alongthe second egress path 462. Upon failure to clear all alarms, the system400 directs the user 404 along a dedicated path for resolution, orproduces a printout/token that instructs the user 404 to proceed tosecondary screening or to a further clearance process. In otherembodiments, one or more of the egress paths 462 are shared amongseveral automated systems 400, in order to further reduce labor thatmight be needed to attend to those multiple systems 400 (e.g., seeexample configuration layout shown in FIG. 6).

FIG. 5 illustrates a screening system 500 operating in a lockdown modeaccording to an example embodiment. In the illustrated exampleembodiment, the user interface 540 displays a lockdown notice, and anaudible alarm is sounded to summon the agents 509. In other embodiments,the system 500 notifies the agents 509 of an alarm condition viaelectronic communication, such as a text message or alert. The user 504is held in the chamber 510 with the ingress door 512 and the egress door514 locked. An agent 509 reviews the ingress interface 508 for statusinformation, and the agent 509 decides whether to open the chamber 510(e.g., open the egress door 514 after additional agents 509 arepositioned to take custody of the user 504).

The chamber 510 is configured to hold the user 504 and summon the agentsto resolve an anomaly, e.g., in response to the system 500 identifyingan anomaly that is unresolvable by the automated/unstaffed screeningprocess. The system 500 notifies on-site security personnel agents thatassistance is needed at the chamber 510, and the system 500 maintainscontrol of the user in the chamber 510 until agents 509 respond to thealarm condition. The system 500 sends pertinent alarm information and/orcollected information to other systems, such as a secondary screeninglocation, for resolution and further analysis (including updating ofscanning and/or identity databases to which the system 500 iscommunicatively coupled, e.g., via networked ingress interface 508). Inan example, the system 500 notifies a checked-baggage system tosegregate and/or retain checked bags associated with the user 504 whohas generated an alarm condition.

Example embodiments of system 500 include an indicator lamp disposed onan outside of the chamber 510, visible from a distance to indicate analarm condition or other unresolved condition, or otherwise indicatethat agent intervention is needed. Examples of system 500 include anintegrated approach, by generating electronic alert indications andtransmitting the alerts to wearables carried by agents. The system 500includes wireless or wired networked embodiments, to send alerts orother information to a central distribution location for agents to view,or to send information directly to agents. For example, a clusteredlayout of multiple systems 500 (see FIG. 6), is attended by a number ofroaming agents 509, any or all of which are equipped to receive alertsfrom any of the multiple systems 500. The system 500 allows the“unlocking” or resolution of an alarm condition, e.g., by having theagent 509 insert a key, swipe a security card, or provide other forms ofagent authentication (biometric or other security token/device), toenable a secure release of the alarmed passenger by an authorized agent509. Such agent authentications can be accepted at a central interface,and/or can be accepted locally at the chamber 510, or required locallyat the chamber 510 in some embodiments to guarantee the presence of theagent 509 at the time of release. The agent 509 is able to providemanual verification (e.g., by viewing the user 504 through awindow/door, and/or by viewing results at a central location incommunication with the system 500, and/or locally via the interface 508at the exterior of the chamber 510), to confirm that conditions warrantrelease of the user, whether by identifying an alarm item or user asbeing benign, or by ensuring that sufficient backup agents 509 are inposition to secure the user 504. This approach to securing users formanual release also can be implemented at a divestment scanner, tosecurely hold for scrutiny by the agent 509 those divested items/bagsthat triggered an alarm condition, for the agent 509 to decide whetherto release the alarmed item.

In an example embodiment, the system 500 applies cross-detection systemanalysis to an anomalous item, user, or other anomaly. Responsive todetecting an anomaly at an initial screening system (e.g., chamber 510and/or a divestment scanner), the system 500 identifies what scanningsystem technology has been applied to the anomaly which led toidentification of the alarm condition. The system 500 uses a secondscreening system to again examine the anomaly, the examination which canbe performed automatically or in conjunction with agentparticipation/input. The second system uses sensor types and/or scanningtechnologies, or manual agent observation/evaluation, to identifycharacteristics of the anomaly that are orthogonal to characteristics ofthe anomaly that were obtained by the initial sensor examination (aswell as to optionally obtain the same type of characteristics forredundancy checking). Data from the second examination is analyzed bythe system 500, and if the orthogonally obtained characteristics confirmthe initially obtained characteristics which triggered the alarmcondition, the agent 509 may (among other options) provide the passengerwith additional opportunities to divest the confirmed item. In contrast,if the orthogonally obtained characteristics do not match, the system500 and/or the agent 509 can treat the alarm condition as a false alarmthat needs to be re-scanned or manually examined to see whether to addthe item to a whitelist or blacklist. Different systems can be used tocross-check each other automatically based on this approach, withoutneed for agent input. If anomalous or prohibited items are removed fromthe user 504 and/or the chamber 510 (whether by self-directed userdivestment at the divestment interface, confiscation by the agent, orother removal), the chamber 510 may be rescanned for validation that thealarming item was properly identified and removed (via the lack of arepeat alarm condition). Accordingly, the system 500 enables the agent509 to resolve initial detection system alarms, e.g., by an iterativeapproach of removing item or items and re-scanning until the alarmcondition is resolved. The secondary system, used for scanning alarmitems for cross-checking purposes, is also configured to share anomalycharacterization information, along with information describing how theanomaly was resolved by the agent 509, e.g., by electronicallytransmitting the information to be stored in a centralized database,which serves to further improve initial and secondary detectionalgorithm performance based on iterative feedback and learning.

The illustrated system 500 is capable of applying a variable securitylevel of holding the user 504, corresponding to a risk score of the user504. For example, under normal operational circumstances, the chamber510 is configured to enable ingress doors 512 and/or egress doors 514 tobe pushed open (triggering the sounding of an audible and/or visiblealarm) in case of emergencies such as power failures or malfunctions, toallow an innocent user 504 to exit the chamber 510. However, insituations where the system 500 detects an imminent threat (such as thepassenger having a firearm on their person or the system 500 identifyingthat an improvised explosive device (IED) is present) the system 500causes the chamber 510 to go into lock-down mode to prevent the user 504from exiting the chamber 510, in addition to notifying securitypersonnel/agents 509 of the identified threat. For example, the chamber510 is equipped with deadbolts that default to an open state, unless thesystem 500 triggers an imminent threat condition and causes thedeadbolts to move to a closed position locking the ingress/egress doors512/514. Alternate examples, such as high-risk or high-securitylocations, implement deadbolts (or other mechanisms) that default to anengaged/locked position, unless the system 500 positively acts todisengage the deadbolts upon confirmation that the user 504 does notpose a threat.

FIG. 6 illustrates a layout of a system 601 including a plurality ofscreening systems 600 and divestment scanners 650 according to anexample embodiment. The illustrated layout is attended and operated by asmall group of agents 609, i.e., fewer agents than there are chambers610 or divestment scanners 650. Similar to the system 201 shown in FIG.2, the layout shown in FIG. 6 is based on a plurality of systems wherebymultiple chambers 610 share a given divestment scanner 650. The egressdoors 614 of the chambers 610 are oriented to facilitate a user exitingto a secure/recompose area 634 to collect items 602, or to direct theuser onward toward an agent 609. Furthermore, a chamber 610 is orientedto open the ingress door 612 to admit a user from the unsecure area 636,close the ingress door 612 and scan the user, and if the user needssecondary screening, to open the ingress door 612 and direct the userback to an agent 609 and secondary screening 670 (which enables multiplechambers 610 to share the services provided by a single area forsecondary screening 670, based on the routing and other configurationaspects of the illustrated layout).

In another example embodiment, the system 601 is unstaffed and fullyautomated to allow self-screening, capable of scanning users without anyagents 609. Such fully automated systems are configured to receive userswho self-divest under direction of the system 601. If the systemencounters a condition that cannot be automatically resolved, the useris instructed by the system 601 to return to the unsecure area andproceed to a staffed processing system located elsewhere (which includesagents 609), or the system 601 can summon an agent to arrive at theunstaffed fully automated embodiment to address the unresolvedcondition.

The illustrated self-screening “cluster” set up is particularlyconducive to the metering of passengers (i.e., processing users atchambers in other than first-come-first-served immediate access), whichprovides a synergistic effect in combination with the features describedabove relating to prescheduling of locations and windows of times duringwhich the user self-screens. More specifically, the system 601communicates with and intelligently directs users to wait or proceed toavailable chambers 610 to ensure efficient routing within the system601. The system 601 achieves process efficiency by varying the arrivalcurve of users, e.g., to avoid surges that exceed capacity, as well aslow capacity times that do not fully utilize the capacity of the system601. In an example, the system 601 incentivizes users to arrive forscreening by offering scheduled appointments based on screeningavailability, e.g., based on expected demand, flight times, and otherfactors. The system 601 schedules appointments to level the arrivalcurve and reduce peak screening demand. In an example, the system 601extends various service level agreements/promises to users who arrangeand/or accept scheduled appointments. For example, the system 601identifies past trends in traffic and throughput through the system 601,which the system 601 uses as a baseline to extrapolate a predictedprocessing time. Thus, the system 601 extends a promised processingspeed associated with a given type of prescheduled screeningarrangement, e.g., if the user accepts a first prescheduled screeningwindow of time, the user is guaranteed to complete screening in fiveminutes or less, and if the user arrives at a second screening window oftime, the user is guaranteed to complete screening in 15 minutes orless. The system 601 determines a user's identity (e.g., via ingressinterface 408) and accesses flight reservation information correspondingto the user identity, and assigns a corresponding screening chamber.Screening times are selectable by the passenger, within multiple optionsprovided. The system 601 determines screening times while accounting forconsiderations for screening users having disabilities or special needs,and includes adjustments to screening protocols automatically. Thesystem 601 also interfaces with Known Crew Member (KCM) and/or LawEnforcement Officer (LEO) databases to provide protocol-adjustedscreening for those known user populations, incorporating such expectedadjustments to predicted screening time completion. Each phase ofscreening performed by system 601 (e.g., identity management, on-personscreening, carry-on property screening, and alarm resolution) is capableof being automatically and dynamically adjusted by system 601, e.g.,according to passenger risk type, procedure set, or other individualizedconsiderations.

The system 601 determines expected processing time and resources for agiven user, and factors the information into how to manage availablescanning resources between prescheduled users and/or unscheduled walk-upusers. For example, the system 601 seamlessly creates a few seconds oflag between the time one chamber becomes available, and when the user atthe front of the queue is directed to proceed to the available chamber.Accordingly, the lag time at any given moment ensures that aself-screening chamber is available for walk-ups, and the system 601adjusts the number of seconds of lag incurred by walk-up users, toaccount for the anticipated prescheduled users (or any Pre-Check® users)in accommodating walk-up users while remaining capable of processingprescheduled and Pre-Check® users according to their scheduled times.Users who arrive at a designated prescheduled time are directed by thesystem 601 directly to an open chamber.

In another example embodiment, system 601 assigns a user a selectscreening window of time and location, during the passenger reservationand/or check-in process (online/on mobile device/at airport kiosk. Forexample, the system 601 instructs the user to please arrive atCheckpoint X, Self-Screening Station Y between 10:00 am and 10:05 am toreceive expedited access. If the user fails to arrive during theprescheduled window of time, the system 601 relegates the user towalk-up status. The system 601 guarantees service availability toprescheduled users that participate and arrive within their window oftime, by metering the processing of unscheduled “walk-up” users who didnot preschedule or otherwise arrive outside of their assigned window.Such metering, or introduction of lag time, enables the system 601 tointelligently create slack in the utilization and availability ofself-screening chambers, ensuring the immediate availability of aself-screening chamber for prescheduled users. By providing suchbenefits, the system 601 incentivizes users to arrive at prescheduledtimes, helping to level out arrival curves, creating greater efficiencyin the scheduling and utilization of screening resources, and avoiding aneed for checkpoint space that would have previously been set aside forqueueing. Such space is not needed by system 601, and can be reclaimedor otherwise repurposed for additional screening equipment.

Such scheduling enhancements work in conjunction with the existingPre-Check® systems. For example, the system 601 offers the describedautomated metering strategy (manage processing of users) to offerimmediate chamber access as an additional perk for users who are signedup in the Pre-Check® program. The example system 601 allows Pre-Check®passengers to arrive at any time, even outside of a pre-selected windowof time, and still enjoy immediate access to an open chamber (e.g., bydirecting users to wait before entering a chamber, while directingPre-Check® users to proceed). In addition, system 601 adjusts suchscheduling enhancements during the passenger reservation and/or check-inprocess, where a user may choose to indicate any special screening needsthat the user may have (disability/preferred language), and which thesystem 601 accesses. If the user agrees to participate, the system 601adjusts divestment/screening procedures of self-screening stations toaccount for this special user information. In an example, the system 601identifies in advance that the user will need staff assistance duringscreening, and the system 601 requests screening staff be standing bywhen the user first arrives at the checkpoint, and/or directs the userto proceed to a system location at the airport including customizedconfigurations of the self-screening stations. Such customizedconfigurations are specifically configured to meet the user's specificscreening needs (such as a special configuration of the self-screeningsystem to screen users in wheel chairs).

In the illustrated system deployment configuration of FIG. 6, systems600 are deployed in a vertical pattern (as oriented relative to thesheet in FIG. 6), to maximize utility of available space in thedeployment area. Multiple systems 600 allow access from the unsecurearea 636, and selectively permit users to the secure area 634. Such anexample configuration is well-suited for medium to large securityscreening locations, in which passenger volume and resource optimizationhave increased consideration, as well as to unstaffed deploymentswhereby users can self-screen at a plurality of available chambers 610.The illustrated clustered configuration is well-suited to employchambers 610 fitted with external lights or other indicators, toindicate the availability of an unoccupied chamber 610 to the nextwaiting user (e.g., waiting in a common/shared feeder line of users tobe screened). Multiple feeder lines are compatible with variousembodiments of system 601, such as including a first feeder line forPre-Check® users, a second feeder line for prescheduled users, and athird feeder line for unscheduled walk-up users. At an airportdeployment site, systems 600 can be integrated as a portion of thesecurity scanning experience, or can be used to fully upgrade the siteto the illustrated clustered configuration, as mission needs andavailable space considerations dictate for a given deployment site. Forexample, a hybrid installation includes the illustrated shared/groupedsystems 600, alongside traditional staffed gates and baggage scanners.Although an example staffing arrangement of agents 609 is illustrated,any number of agents 609, including no agents, can be used indeployments of system 601.

The illustrated system 600 is capable of deploying and making availablean always-open TSA Pre-Check® line, whether as one or more dedicatedsystem or systems 600, or by dynamically re-configuring any of thesystems 600 on-the-fly in response to that system 600 authenticating orotherwise establishing the identity of an authorized TSA Pre-Check® userabout to be admitted into that system's corresponding chamber 610. Suchestablishing of TSA Pre-Check® identity can be accomplished as set forthabove with reference to FIG. 4A. Accordingly, deployments such as theillustrated configuration of FIG. 6 are capable of processing regularusers and TSA Pre-Check® users efficiently, while using on the order ofhalf the agents as compared to more traditional configurations not basedon example system 601. The illustrated deployment configurations areoperable in unstaffed configurations, as well as with agents 609 roamingto attend to a suite of multiple systems 600, resulting in maximizedpersonnel efficiency. Furthermore, unlike some existing TSA Pre-Check®operations that might be confined to dedicated security lanes withdedicated assigned personnel (which can become underutilized), anyscreening system 600 in the deployment of system 601 is operable in acustomizable fashion, on-the-fly, to cater to the specific needs of astandard or TSA Pre-Check® user, maximizing the utilization of availablespace and staffing. The system 601 maximizes resource utilization byequitably dispersing the various type of users and/or user risk pools(e.g., different types of risk categories in which users can becategorized) to up to all available screening locations of the pluralityof screening systems 600. Such freedom of dispersion across multiplesystems 600 enables effective and customized variation of securityscreening per user, in view of user risk score, while simultaneouslyaccommodating those users who participate in vetting programs (such asTSA Pre-Check®) by providing them a consistent and positive experience,seamlessly along with accommodating other users regardless of whetherthey participate.

The illustrated example area of secondary screening 670 is attended byagents 609 carrying hand-held scanners 672 that are usable to conductthe secondary screening of users, and/or perform pat-downs, to a neededdegree of detail based on the type of situation that resulted in theuser being designated as needing to report to the secondary screening670. In an example embodiment, the system 601 relays the detectionresults (e.g., determined by scanning systems 600 based on useridentity, risk score, scanning results, and so on as described above) tothe agents 609 at the secondary screening 670, e.g., via an agentterminal and/or directly to the hand-held scanners 672 or otherelectronic communication device carried by the agents 609.

The system 601 is compatible with any type of approach for secondaryscreening 670, to resolve alarm conditions associated with a user asdetermined by a scanning system 600. The example system 601automatically directs users to an appropriate area of secondaryscreening 670, including other areas not specifically illustrated inFIG. 6. In other examples, a given chamber 610 holds an alarming userand summons an agent 609 to escort the user, and/or perform anevaluation at the site of the chamber 610. In the illustrated clusteredlayout of system 601, many individual scanning systems 600 areconfigured to “funnel” users to the same secondary screening 670 area(e.g., regardless of whether a user exits the chamber 610 via theingress door 612 or the egress door 614), thereby multiplexing the usageof the secondary screening 670 across multiple chambers 610. In anotherexample embodiment, the system 601 includes multiple different tiers ofsecondary screenings 670, and the system 601 directs user to proceed toa designated one of the different secondary screenings 670 via a givencorresponding one of multiple doors/paths, including access-controlleddoors which, under coordinated and automated direction of system 601,prevent the user from deviating from a designated path. Suchpathway/door controls are customizable, based on availablepersonnel/agents 609 and available screening space in which the system601 has been deployed.

FIG. 7 illustrates a method 700 of scanning and releasing a useraccording to an example embodiment. Flow starts at block 705. In block710, the screening system admits a user into a chamber of the screeningsystem responsive to establishing an identity of the user. For example,a system determines whether the user is prescheduled to receivescreening at that time, or whether the user is a member of thePre-Check® program. If so, the system directs the user to the nextavailable scanning chamber. If not, the system treats the user as anunscheduled walk-up, and introduces a lag time during which the systemdirects the user to wait. During the lag time, the system allows anotheruser (prescheduled or Pre-Check®), if applicable, to take the nextavailable scanning chamber with priority over the unscheduled user. Theuser may have divested an item at a divesting area along an ingress pathto a partially enclosed chamber that has an open side to receive theuser. For example, the user may have previously undergone scanning, andwas released from the chamber to self-divest in the unsecure portion ofthe airport before re-entering the chamber. In another embodiment, thechamber includes an ingress door that selectively admits the user, basedon the screening system including a kiosk to prompt the user foridentification. Upon verification of the identification, the systemaccesses local and/or remote databases to establish a security score forthe user, and/or whether the user is prescheduled or a member ofPre-Check®. The system then opens an ingress door to the chamber, andcloses the ingress door to hold the user in the chamber. In block 720,the screening system prompts the user to divest an item. For example,the chamber includes a user interface to display visual instructions anda video or still image depicting an example of the divestment procedure,such as a video showing the depositing of a coat and a mobileelectronics device into a bin at the divestment interface.Alternatively, the system opens the ingress door to allow the user toself-divest outside the chamber, and/or directs the user to forfeititems into a secure drop box (within the chamber or outside thechamber). In block 730, the screening system scans the user via achamber scanner disposed in the chamber to identify whether the user iscarrying an undivested item that is to be divested. For example, thesystem monitors the user via an optical system to determine which of aplurality of scanners in the chamber to energize for scanning the user,based on a position and posture of the user. In an example, based on therisk score of the user, the system can operate the scanners according toa first mode for a low-risk user (e.g., reflective mode), and operatethe scanners according to a second mode for high-risk users (e.g.,transmissive mode). In block 740, the screening system confirms that noundivested items are to be divested. For example, the screening systemperforms multiple scans using different scanning technologies as part ofa cross-detection system analysis scan of the user to confirm that noalarming items are found. If an alarming item is found, the systemprompts the user to self-resolve the alarm, by divesting the item intothe divestment interface of the chamber, and then re-scans the user.This procedure can be iterated a number of times, with the number ofiterations being adjustable according to how busy the airport is, a riskscore of the user, or other factors. Additionally, the system can allowthe user to exit the chamber if needed, as part of the self-resolutionprocess of resolving alarm conditions or other anomalies. In block 750,the screening system releases the user to proceed from the chamber to asecure area. For example, the screening system unlocks and opens a firstegress door of the chamber, and displays instructions with helpfulguidance to direct the user along the next path to collect divesteditems from an external divestment scanner interface and proceed towardthe airport terminals. In another example, the screening systemactivates an external indicator to summon an agent, and unlocks andopens a second egress door of the chamber which leads to a secondaryscreening area. In yet another example, the screening system determinesthat items divested into the chamber's divestment interface are notprohibited, and instructs the user to collect the allowed divested itemsfrom the divestment interface and carry the items from the chamber tothe secure area.

FIG. 8 illustrates a method 800 of automatically scanning a useraccording to an example embodiment. Flow starts at block 805. In block810, the system establishes a user identity. For example, a chamberincludes an ingress door that is closed until the user scans a useridentification at a kiosk at the chamber. In another embodiment, thesystem does not include a kiosk at the chamber, and relies on a separateidentification interface to establish the user identity. Theidentification interface can reside on site, and/or can include a remoteserver accessible via an online interface. The system queries localand/or remote databases to lookup information about the user, andestablish a risk score for the user. Upon verifying the presented useridentification, the system opens the ingress door allowing the user intothe chamber. In block 820, the system adjusts an aspect of applying ascan to the user based on the established user identity. For example,the system determines a risk score for the user corresponding to a lowrisk, and adjusts the user guidance instructions presented to the userby instructing the user that it is not necessary to remove shoes orother items of clothing, nor is it necessary to divest belts or watches.Furthermore, the example system adjusts the chamber scanners to operatein a reflective mode, instead of a transmissive mode, corresponding to alow risk user security score. In another example, the system identifieswhether the user is unscheduled as a walk-up (directing the user towait), or is prescheduled for this location and window of time or is amember of Pre-Check® (directing the user to proceed to a chamber whichthe system has kept available in anticipation of theprescheduled/Pre-Check® user). In block 830, the system scans the user.For example, the system monitors the gestures and gait of the user basedon video analytics of the recorded video from an optical system in thechamber, and determines that the user has assumed a scanning posturenear one of the chamber scanners (e.g., grasping dual handles to actuatea divestment scanner interface door). The system analyzes that thegestures, facial expressions, and gait of the user do not pose a risk,and activates the corresponding chamber scanner near the user. Thesystem also identifies, based on a combined analysis of the gestures andgait of the user, and cross-checking those results against the resultsof the reflective mode scan of the user, that the user is equipped withan artificial limb. In block 840, the system updates the user identitybased on the scan. For example, the system updates a record for the userto add the information indicating that the user is equipped with anartificial limb and corresponding details. In block 850, the systemcauses the user to assume a scanning position. For example, the systeminstructs the user to divest a mobile phone, identified during the scanof the user, into a specifically located bin of the divestment interfaceof the chamber. The system has already determined the height anddimensions of the user based on the earlier scan, and calculates that inorder to obtain a desired position for scanning the user, the user willneed to reach toward a certain height, and the system is configured withmultiple divestment bins and correspondingly different heights, andchooses the appropriate bin to cause the user to reach in the desiredmanner that positions the user's body appropriate for the scan to obtainneeded scanning information of the user. In another embodiment, thesystem includes handles of a divestment interface, whose mechanismconfiguration automatically adjusts to accommodate the dimensions of theuser (e.g., upon verifying the identity of the user, prior to the userentering the chamber), while ensuring that the user assumes a desiredscanning position upon grasping the handles. In block 860, the systemautomatically scans the user in response to detecting that the user hasassumed the scanning position. For example, the system has motion andweight detectors at the bins of the divestment interface, to detect thatthe user is interacting with the divestment interface. The systemincludes grip sensors to ensure that the user is safely gripping bothhandles of a divestment interface door before allowing the door to beopened. The system also uses video analytics of user activity capturedby the optical system installed in the chamber. Accordingly, the systemcaptures the automatic scan, enabling the system to confirm whether allitems that need to be divested are divested, and allows the user toproceed.

FIG. 9 illustrates a method 900 of performing a detailed itemcharacterization according to an example embodiment. By way ofintroduction, an expansive library of threat articles, including threatcharacteristics/material discrimination (Z-eff/density), can be used tohelp identify whether an item matches a known threat. A system can alsobe designed to alarm on all detected objects/material that meetdesignated criteria, e.g., as identified in the library. The library canbe used by systems to check whether a scanned item is in a threatlibrary, or “blacklist,” during the screening process, to generateautomated alarms. Building and updating such libraries of data forthreat articles can be very time/cost intensive, e.g., based onacquiring and validating large amounts of data in a controlledlaboratory environment, processing and capturing thousands (or more)scans of various objects/material/individuals to update the librarydatabases and/or detection algorithms. Additionally, the chemicalcomposition/material density or other characteristics for a given itemcan vary among threat items of the same type (particularly fornon-commercial/homemade explosives (HMEs)). This results in a large andcomplex dataset for libraries of threat items, resulting in a widetarget range when attempting material discrimination for detection,which can contribute to a high false-alarm rate.

The aviation security threat environment is constantly evolving, leadingto a need to update algorithms with new threat characteristics inreal-time. With respect to item identification, new technologies such as3-D printing allow for virtually limitless threat configuration,presenting challenges for systems that are based on blacklist objectrecognition for threat identification, and increased challenges forsystems to respond in real-time to new threats or those threats that arenot already contained in a threat library/database.

However, in contrast to such approaches, example embodiments describedherein enable the development of software and secondary screeninghardware that enables systems to achieve real-time data collection, oneveryday live stream-of-commerce at security checkpoints during thescreening process, to achieve continual deep-learning algorithmdevelopment. Example systems collect data on all items and continuallyrefine, in the field, a library of known everyday objects (e.g., a“Whitelist”) to complement a traditional “Blacklist” library of threats.

Training item detection and recognition algorithms in a lab setting, andbuilding libraries/databases of “blacklists,” is time consuming andcostly. However, example systems described herein use a livestream-of-commerce of items encountered in the field, where an item thatwas encountered is put through a detailed quantification system (e.g.,by using chamber scanners, divestment scanners, or other types ofscanners deployed onsite) as described above, and the system capturesand stores detailed characterization information for that item, therebydynamically building a library of known and related items. Accordingly,the system learns to recognize items, within a given error rate, thatenables the system to avoid falsely alarming on that item in the future.Example systems enable libraries/databases of items to be cyclicallydeveloped and iterated upon, learning and revalidating item assumptionsmultiple times through live stream-of-commerce items, freeing the systemto exceed the capabilities associated with lab-based closed systems.Furthermore, example systems are not confined to checking for prohibiteditems on a blacklist. Rather, example systems build item librariesrobust enough to support whitelists, even with millions or more items,based on automated learning and/or daily input from agents, as performedin systems deployed for active use the field. Thus, rather than beingconfined to a relatively small blacklist of types of known threats,example systems can build, update, and leverage a whitelist of, e.g., 10billion types of safe items, based on dynamic learning. Agents areinvolved in confirming that a given item, such as one that has beensubjected to a detailed item characterization by a divestment scanner,is a safe item to enable systems to take advantage of human interactionand guidance in building and maintaining item databases/libraries.

If an example system encounters an unrecognized item, the system alarmson the item and incorporates feedback, discrimination loops, and resultsof secondary screening resolution, to classify the item as confirmedsafe. The item also is fully characterized in, e.g., using a dedicateditem characterization system, such as a cabinet x-ray, laser scanner,video/photography capture, or other analysis tool or tools, to obtaindetailed/specific item information analysis in the field. Thus, ratherthan rely on positively matching a blacklist, example systems can err onthe side of safety by attempting to positively identify an item as beingon a safe whitelist. If the item is not found on the safe whitelist, thesystem assumes the item is bad/unsafe, without needing to positivelymatch the item as being on a blacklist. In an example, a new laptop isreleased on the market, unlike previous laptops. Initially, a scanningsystem might alarm upon encountering the new laptop, because it does notrecognize the laptop, which is then subjected to detailed itemcharacterization and added to the systems database by (optionally) beingverified by an agent as a whitelist candidate. Example systemscommunicate with an agent/operator, or a centralized database, to signalthat the system has learned and incorporated the detailed itemcharacterization for the newly released laptop, which is to be added tothe whitelist database/library (with optional agent confirmation soughtby the system), so that other systems will no longer alarm on thelaptop. Such detailed item characteristic systems are incorporated intothe system's chamber and/or divestment scanners, to create as much of adetailed item characteristic “fingerprint” for items encountered in thefield.

Conducting alarm resolution enables example systems to obtain feedbackfrom agents to reduce the occurrence of unnecessary/false alarms,resulting in vetted and robust libraries/databases for whitelists andblacklists. The example systems and their use of self-resolution ofalarms, prunes out the likelihood of false alarms, allowing forresources to be focused on meaningful errors, not false alarms.Furthermore, example systems described herein leverage the time spent bypassengers in divesting carry-on items, e.g., by automatically scanningthe users during such activities. Thus, example systems achieve synergyin the elimination of a need for secondary alarms/resolution, whilemoving the user's divestiture activities into the scanner chamber, toenable the systems to perform scanning while a passenger is divesting,saving time and increasing efficiency in multiple ways.

Referring back to FIG. 9, flow starts at block 905. In block 910, thesystem scans a divested item using a divestment scanner coupled to achamber of a screening system. For example, the divestment scannerincludes multiple scanning technologies that are usable to perform across-detection system analysis scan, deploying technologies such as:millimeter wave scanners; backscatter x-ray scanners; nuclear quadrupoleresonance (NQR) scanners; dielectrometry systems; metal detectionsystems; terahertz imaging systems; thermal imaging systems; explosivetrace/odor detection via airflow sampling; 3D laser measurement/scanningsystems; high-resolution camera systems; ramen laser analyzationsystems; and/or future screening and material/dimensionalcharacterization technologies. Such technologies can be deployed at thedivestment scanner in series, e.g., deployed as an add-on alongfollowing the x-ray scanner along the x-ray belt.

In block 920, the system performs a detailed item characterization ofthe divested item. The detailed item characterization of the datacapture system also can serve as a secondary screening alarm resolutionsystem. For example, the item screening system uses various technologiesto make a detailed characterization of objects that triggered an alarmin a scanning chamber configured to hold a user who carried the alarmitem. Such items are individually loaded into an example objectcharacterization/threat detection system, which carries out a two-foldstep of performing the secondary screening action (such as explosivedetection) while also capturing detailed characterization informationabout the item for use in algorithm development. The system alsovalidates that the identified item is in fact that item which had beenflagged by the primary detection system (user scanning chamber) forsecondary screening, minimizing a chance that an unrelated item wouldinadvertently be mistaken as being the source of an alarm.

In block 930, the system updates a database with the detailed itemcharacterization. For example, an alarming item is scanned by the datacapture/resolution system and, along with the original primary securitysystem data, is cataloged for utilization in algorithm development bysending the information to a database for storage. This allows theprocess of secondary screening to conduct item data capture cataloging,allowing the detection algorithm to receive information on the validityof its assessment. As new items are cataloged by these secondaryscreening systems, they are incorporated into a “secondary” detectionalgorithm that runs in addition to the “primary” detection algorithm onsecurity screening systems. This secondary algorithm does not need tomake security decisions (but can be used to make security decisions),and seeks to validate its ability to positively identify new items ascandidates for whitelist/blacklist additions into the primaryalgorithm/database/library.

In block 940, the system classifies the detailed item characterizationbased on input from an agent. For example, the system uses the secondarydetection algorithm to statistically validate its own ability topositively identify new blacklist and whitelist objects/items, andresponsive to so validating, automatically incorporates the items intothe primary detection algorithm, and/or recommends the items to a systemmanager for primary algorithm incorporation. In this manner, throughiterative algorithm cycle development, the detection algorithm improvesorganically, as a byproduct of the screening process. Such featuresresult in self-learning, such as in cases of false alarms (e.g., due toencountering clothing made of uncommon cloths/materials) whereby anagent provides feedback to the system after verifying a status of thealarming item (e.g., verifying whether the uncommon cloths/materials aresafe for whitelisting or unsafe for blacklisting). The automated systemuses the agent feedback information, to fine-tune its algorithmsensitivities for encountering future operations. The divestmentscanning system and/or other scanners described herein collect and senddetailed anomaly characterization information of the items, along withinformation describing how the agent resolved the anomaly (e.g., viaagent guidance/input/feedback), to a database usable to further improvedetection algorithm performance (initial and/or secondary). Such anapproach is similarly used to identify which items are known tocorrelate with which types of user characteristics, such as knowndisabilities or medical conditions, and the items known to be allowablefor accompanying the user to secure areas.

Over time the system increases its capabilities for positivelyidentifying (e.g., via a whitelisting approach) the majority of itemssubmitted to the scanning systems, whether via user scanners and/oron-property/on-person scanner detection systems. Accordingly, scanningsystems are operable in a variety of modes (whitelist approach,blacklist approach, mixed approach, and so on), and include thecapability of transitioning between modes over time, in view ofavailable database item information, in view of the degree of agentknowledge and experience available (locally or remotely) to providefeedback to the scanning systems, how busy or backup the securityprocessing lines are, whether it is desirable to adjust an averagethroughput of the security lines, and other factors. For example, asystem can default to a hybrid approach, by erring on the side ofalarming on all items that match a blacklist, and also erring on allitems that are not specifically recognized. Over time, the systemaccumulates feedback from agents clearing the alarm conditions, and thesystem adds more items to a whitelist database, and accesses sharedwhitelists from other systems and/or central databases/libraries whichthe system accesses via computer networks. The system thereby learns theability to identify the majority of items encountered by positivelymatching them to the whitelist or whitelists, wherein the system'sprimary detection algorithm converts from a primarily blacklist hybridapproach to one an approach that primarily relies on whitelistidentification for security assessment. Under this exampleconfiguration, the system reduces the initial likelihood of alarming onall items/objects/materials that it cannot positively identify asinnocuous, as the whitelist grows through usage. Accordingly, the systemidentifies a potential threat without needing to rely on positivelyfinding a threat item in its blacklist library. This example approachenables the system to detect new/emerging threats in real-time, withoutneeding to know any threat-specific information, due to the system'saccumulated knowledge. Such detection capabilities exponentially improvedetection algorithm performance and reduce false alarm rates in theprimary security screening technologies incorporated into the examplesystems described herein.

Additionally, example systems described herein collect market/trendinformation based on the various items encountered in the field. Thevarious databases of detailed item scan characterization informationcollected and built upon by example systems (whether managed by asecurity agency, deploying vendor, or other custodian of) representsuseful, marketable information regarding user preferences for items,captured by the systems and usable for academic/market or other researchpurposes. Such information represents product utilization/consumptionpatterns of the traveling public, and includes correlating informationregarding the specific geographic regions and user information (whichcan be anonymized), collected in real time. Such information is usableby industry to better understand product market share and refineregional product marketing strategies. Example systems described hereinare customizable to obtain and/or retain such information as desired fora given study/research program or other uses.

While a number of example embodiments of the present subject matter havebeen described, it should be appreciated that the present subject matterprovides many applicable inventive concepts that can be embodied in awide variety of ways. The example embodiments discussed herein aremerely illustrative of ways to make and use the subject matter and arenot intended to limit the scope of the claimed subject matter. Rather,as will be appreciated by one of skill in the art, the teachings anddisclosures herein can be combined or rearranged with other portions ofthis disclosure and the knowledge of one of ordinary skill in the art.

Terms and phrases used in this document, unless otherwise expresslystated, should be construed as open ended as opposed to closed—e.g., theterm “including” should be read as meaning “including, withoutlimitation” or the like; the term “example” is used to provide exampleinstances of the item in discussion, not an exhaustive or limiting listthereof; the terms “a” or should be read as meaning “at least one,” “oneor more” or the like; and adjectives such as “conventional,”“traditional,” “normal,” “standard,” “known” and terms of similarmeaning should not be construed as limiting the item described to agiven time period or to an item available as of a given time, butinstead should be read to encompass conventional, traditional, normal,or standard technologies that may be available or known now or at anytime in the future. Furthermore, the presence of broadening words andphrases such as “one or more,” “at least,” “but not limited to,” orother similar phrases, should not be read to mean that the narrower caseis intended or required in instances where such broadening phrases maybe absent. Any headers used are for convenience and should not be takenas limiting or restricting. Additionally, where this document refers totechnologies that would be apparent or known to one of ordinary skill inthe art, such technologies encompass those apparent or known to theskilled artisan now or at any time in the future.

What is claimed is:
 1. A screening system comprising: a chamberconfigured to accommodate a user to be screened; a chamber scannerconfigured to scan the user to identify whether the user is carrying anundivested item that is to be divested; and the chamber being configuredto release the user to proceed from the chamber to a secure area uponconfirmation that no undivested items are to be divested.
 2. Thescreening system of claim 1, wherein the chamber is configured to:prevent the user from accessing the secure area; release the user toproceed from the chamber to an unsecure area upon detection of anundivested item that is to be divested; and permit the user to re-enterthe chamber for re-scanning the user.
 3. The screening system of claim1, wherein the chamber further comprises a divestment interfaceconfigured to receive divested items.
 4. The screening system of claim1, further comprising a user interface disposed in the chamber andconfigured to prompt the user to divest the undivested item, responsiveto identifying that the user is carrying the undivested item that is tobe divested.
 5. The screening system of claim 4, wherein the userinterface is configured to display a body representation of the useroverlaid with an item indication of the undivested item positionedcorresponding to a location of the undivested item on the user.
 6. Thescreening system of claim 1, further comprising a user interfacedisposed in the chamber and configured to, responsive to identifyingthat scanning information is needed, prompt the user to assume ascanning position conducive to obtaining the scanning information. 7.The screening system of claim 1, further comprising a divestmentinterface configured to receive an item divested from the user, whereinthe divestment interface is coupled to a divestment scanner configuredto scan the item divested from the user.
 8. The screening system ofclaim 1, wherein the chamber includes a sensor to determine when a useris present and provide information to the chamber scanner toautomatically begin the scan when a user or the user's property is in anacceptable position.
 9. The screening system of claim 1, wherein thescreening system is configured to, prior to applying the scan, establisha user identity and adjust an aspect of the scan based on the useridentity.
 10. The screening system of claim 9, wherein the screeningsystem is configured to update the user identity based on the scan. 11.The screening system of claim 1, wherein the chamber scanner comprises aplurality of different scanning technologies configured to perform across-detection system analysis scan.
 12. The screening system of claim1, wherein the scan comprises use of a real-time video analytics systemto identify an indicator of the user and adjust the scan according tothe indicator.
 13. The screening system of claim 1, wherein the chamberis configured to cause the user, while advancing through the chamber, toassume a scanning position for a scanning duration, and the chamberscanner is configured to automatically scan the user in response todetecting that the user has assumed the scanning position.
 14. Thescreening system of claim 1, further comprising a divestment interfaceconfigured to receive an item divested from the user, wherein thedivestment interface is configured to cause the user, while divestingthe item, to assume a scanning position for a scanning duration, and thechamber scanner is configured to automatically scan the user in responseto detecting that the user has assumed the scanning position.
 15. Thescreening system of claim 1, wherein the chamber is configured tocontrol a chamber environment based on altering an environmentalcharacteristic within the chamber.
 16. The screening system of claim 1,wherein the chamber is configured to hold the user and summon anoperator to resolve an anomaly.
 17. The screening system of claim 16,wherein the chamber is configured to apply a variable security level ofholding the user corresponding to a risk score of the user.
 18. Thescreening system of claim 1, wherein the screening system is configuredto communicate a result of screening the user to a secondary screeningsystem.
 19. The screening system of claim 1, wherein the chamber isconfigured to release the user to a selected one of a plurality ofdifferent ingress and egress paths according to a result of the scan.20. A method for screening a user, comprising: admitting a user into achamber of a screening system responsive to establishing an identity ofthe user; prompting the user to divest an item; scanning the user via achamber scanner disposed in the chamber to identify whether the user iscarrying an undivested item that is to be divested; confirming that noundivested items are to be divested; and releasing the user to proceedfrom the chamber to a secure area.
 21. The method of claim 20, whereinconfirming that no undivested items are to be divested comprisesidentifying that undivested items are not prohibited and allowing theuser to continue carrying the undivested items from the chamber to thesecure area.
 22. The method of claim 20, further comprising releasingthe user to a selected one of a plurality of different ingress andegress paths according to a result of the scanning.
 23. A screeningsystem comprising: an identification interface with at least one sensorto determine aspects of an identity of a user to be screened; a databasehaving user identities and relevant scanning information associated withthose user identities; a chamber configured to accommodate the user tobe screened; a screening scanner configured to scan the user todetermine whether the user is carrying an undivested item; and thescreening system being configured to adjust an aspect of applying a scanto the user based on the user's relevant scanning information.
 24. Thesystem of claim 23, wherein the aspect of applying a scan that isadjusted is one of: instructions for the user prior to entering thechamber; a threshold of detection of a scanning algorithm foridentifying the undivested item to reduce false positives; the scanningalgorithm selected; or an item the user must divest prior to releasingthe user to proceed from the chamber to a secure area.
 25. The system ofclaim 23, wherein the screening system comprises use of a real-timevideo analytics system that evaluates the user at or before the chamberto identify relevant scanning information for the user and adjust thescan according to an indication of the relevant scanning information.26. The system of claim 25, wherein the aspect of applying a scan to theuser is based on facial expressions, gait and gestures of the user. 27.The system of claim 23, wherein the screening system providesinstructions for the user based on a known disability of the user andallows the user to proceed from the chamber to a secure area with itemsknown to be associated with the known disability.
 28. The system ofclaim 23, wherein the at least one sensor includes a government-issuedidentification scanner.
 29. The system of claim 23, wherein the at leastone sensor includes a fingerprint scanner, infrared signature scanner,retina scanner, or camera coupled with facial recognition software. 30.The system of claim 23, wherein for a user with a heightened risk scorethe aspect adjusted is instructions for the user prior to entering thechamber.
 31. The system of claim 23, wherein the identificationinterface determines the identity of the user and their gender, andwherein the aspect of applying the scan that is adjusted is scanningalgorithms that are tailored for each gender.
 32. The system of claim23, wherein the identification interface determines the identity of theuser and their body-type, and wherein the aspect of applying the scanthat is adjusted is scanning algorithms that are associated with thatbody-type.
 33. The system of claim 23, wherein the database includes therelevant scanning information for groups of users whose unique identityis not uniquely determined, but for whom aspects of their identity aredetermined by the at least one sensor.
 34. The system of claim 23,wherein the database adjusts the relevant scanning information for theuser based upon live information about the user that is determined bythe identification interface.