Security scanning device

ABSTRACT

A method of searching for a threat includes determining a characteristic of a target, determining an allowable dosage based on the characteristic, determining a parameter of a scanning beam based on the allowable dosage with a processing circuit, transmitting the scanning beam toward the target with a scanner, and creating a representation of the target with the processing circuit.

CROSS-REFERENCE TO RELATED PATENT APPLICATIONS

This application is a continuation of U.S. application Ser. No.13/895,596, filed May 16, 2013, which is incorporated herein byreference in its entirety.

BACKGROUND

Security scanning systems (e.g., airport scanning devices, checkpointscanning devices, and other security scanning devices) are used todetermine whether a target (e.g., person, animal, etc.) possessescontraband substances. Contraband substances may include materials,weapons, currency, or other products that may be illegal or may pose arisk to other individuals. Targets may attempt to conceal contrabandsubstances beneath a layer of clothing or internally within a bodycavity or a digestive tract. Scanning systems are intended to identifythose individuals who possess contraband substances before suchindividuals engage in air travel, pass through a checkpoint, or causeharm to others.

Traditional systems for scanning individuals include metal detectors.Metal detectors operate by generating electromagnetic fields thatinteract with metallic objects. Sensors within the metal detectorprovide feedback to an alarm that indicates the presence of a metallicobject. However, these systems may not detect all types of contrabandand may lack the resolution needed to effectively provide comprehensivescreening.

Other systems for scanning individuals include x-ray sources or wavegenerators. Systems employing non-radioactive wave generators (e.g.,millimeter wave scanners) may not consider specific attributes of thetarget when scanning Such a lack of consideration may impact theaccuracy or efficiency of the scanning device. In other systemsemploying an x-ray source, a dosage may be applied without consideringthe unique characteristics of the person. Because traditional x-raysystems do not tailor the scan to the unique attributes of the person,such systems may cause the person to receive an inappropriate dose ofradiation. By way of example, the risks associated with a pregnant womanreceiving a particular dose of radiation may be greater than thoseassociated with a man receiving the same dose. Such risks may includethe risk of exposing the unborn child to an elevated dosage ofradiation, among others.

SUMMARY

One embodiment relates to a method of searching for a threat thatincludes determining a characteristic of a target, determining anallowable dosage based on the characteristic, determining a parameter ofa scanning beam based on the allowable dosage with a processing circuit,transmitting the scanning beam toward the target with a scanner, andcreating a representation of the target with the processing circuit.

Another embodiment relates to a method for scanning an individual with asecurity device that includes providing a scanner, engaging the scannerin a first scanning mode to produce an initial scan with a controller,producing an initial representation based on the initial scan,determining a property of a second scanning mode based on informationfrom the initial representation, and engaging the scanner in the secondscanning mode to produce a second scan.

Still another embodiment relates to a method for scanning a person thatincludes providing a measurement device, determining a characteristic ofthe person with the measurement device, receiving a characteristicsignal from the measurement device with a processing circuit,determining an allowable dosage based on the characteristic signal,producing a beam signal with the processing circuit, and directing ascanning beam relating to the beam signal from a scanner toward theperson.

The foregoing summary is illustrative only and is not intended to be inany way limiting. In addition to the illustrative aspects, embodiments,and features described above, further aspects, embodiments, and featureswill become apparent by reference to the drawings and the followingdetailed description.

BRIEF DESCRIPTION OF THE FIGURES

The invention will become more fully understood from the followingdetailed description taken in conjunction with the accompanying drawingswherein like reference numerals refer to like elements, in which:

FIG. 1 is a schematic view of a detection device and a target, accordingto one embodiment.

FIGS. 2a-2b are elevation views of a target and a correspondingschematic, according to one embodiment.

FIG. 3a is a schematic view of a target having a plurality of scanningregions, according to one embodiment.

FIG. 3b is a schematic view of a detection device including a driver,according to one embodiment.

FIG. 4 is a schematic view of a detection device including an indicator,an identifier, and an input device, according to one embodiment.

FIG. 5 is a schematic view of an input device, according to oneembodiment.

FIG. 6 is a schematic view of an input device, according to anotherembodiment.

FIG. 7 is a flow diagram illustrating a contraband detection scheme,according to one embodiment.

FIG. 8 is a flow diagram illustrating a contraband detection scheme,according to another embodiment.

FIG. 9 is a schematic view of a detection device including a measuringdevice, according to one embodiment.

FIG. 10 is a schematic view of a detection device including a measuringdevice, according to another embodiment.

DETAILED DESCRIPTION

Before turning to the figures, which illustrate the embodiments indetail, it should be understood that the application is not limited tothe details or methodology set forth in the description or illustratedin the figures. It should also be understood that the terminology is forthe purpose of description only and should not be regarded as limiting.

Referring to the embodiment shown in FIG. 1, a detection device, shownas detector 10 directs a scanning beam toward a target, shown as person20. While person 20 is shown in FIG. 1, it should be understood thatdetector 10 may scan other living objects (e.g., animals, plants, etc.)or non-living objects (e.g., laptop computers, etc.). Detector 10employs a scanning beam of electromagnetic waves to facilitate adetermination of whether person 20 is carrying contraband material(e.g., liquids, gels, plastics, powders, metals, ceramics, weapons,explosives, drugs, currency, papers, etc.). Such a determination may beconducted by an operator utilizing detector 10 or may be conductedautomatically by processing electronics within detector 10. In eitherembodiment, detector 10 may reduce the risk of person 20 carryingcontraband material into a secured area by identifying potentialthreats.

According to the embodiment shown in FIG. 1, detector 10 includes ascanner, shown as scanner 12. In some embodiments, includes a generator(e.g., transducer, x-ray source, a cobalt-60 source, etc.) configured toproduce a scanning beam and a sensor (e.g., detector, antenna, etc.)configured to receive and detect a returned beam that is transmitted,reflected, scattered, or otherwise deflected. The scanner also providesa signal representative of the returned beam. As shown in FIG. 1,scanner 12 directs a scanning beam of incident waves, shown as incidentwaves 14, toward person 20. Scanner 12 may deliver a beam that is static(e.g., having a fixed, non-moving spatial pattern, etc.) or may delivera beam that is dynamic (e.g., having a spatial pattern that varies ormoves) during the examination. It should be understood that suchincident waves 14 may facilitate the imaging of person 20 and thedetection of contraband material.

According to one embodiment, scanner 12 directs incident waves 14 havingparameters (e.g., whether the waves are ionizing radiation, intensity,flux, power level, frequency, image resolution, etc.). In someembodiments, the parameters of incident waves 14 cause a person toreceive a radiation dose (e.g., as measured in millirems, milliseverts,etc.). In other embodiments, the incident waves 14 expose the person tonon-ionizing radiation and the parameters include intensity, frequency,image resolution, or other features of non-ionizing electromagneticwaves.

As shown in FIG. 1, detector 10 includes a controller (e.g., module,command device, processing electronics, processing circuit, etc.), shownas controller 16. According to one embodiment, controller 16 is coupledto scanner 12 with a communication link, shown as data link 17.Controller 16 may communicate with scanner 12 through data link 17. Byway of example, controller 16 may send a signal to engage scanner 12thereby producing a scanning beam. Controller 16 may also receive asignal from scanner 12 relating to a returned beam. According to oneembodiment, controller 16 receives and analyzes the received signal aspart of a contraband detection scheme.

Referring still to the embodiment shown in FIG. 1, detector 10 includesa housing 18. Housing 18 provides structural support for variouscomponents of detector 10. By way of example, housing 18 may includesidewalls (e.g., to prevent person 20 from approaching scanner 12, tootherwise position person 20 relative to scanner 12, etc.) or mayinclude a floor portion (e.g., to provide a platform for person 20 tostand upon, etc.). While shown in FIG. 1 as having a rectangular crosssection and defining a hollow interior, it should be understood thathousing 18 may have various shapes and may include still other portions.As shown in FIG. 1, controller 16 and scanner 12 are coupled to housing18. In some embodiments, housing 18 partially surrounds scanner 12.According to one embodiment, housing 18 includes a shield configured toabsorb ancillary electromagnetic radiation produced by scanner 12.

According to one embodiment, scanner 12 produces x-rays (e.g., an x-raytube, an x-ray source, etc.). In some embodiments, the scanner is alow-power x-ray source (e.g., 50 kV, 100 kV, 120 kV, 200 kV, etc.)configured to produce a low energy x-ray beam. The x-ray beam may bedirected toward person 20, where incident x-rays or photons interactwith tissue of person 20. In some embodiments, the incident x-rays orphotons ionize atoms of person 20 and produce lower-energy fluorescencephotons. It should be understood that reflected waves and scatteredphotons (i.e. a reflected beam) may be detected by scanner 12 tofacilitate detecting contraband (i.e. backscatter x-ray imaging). Inother embodiments, the scanner includes a higher energy source tofacilitate transmissive x-ray imaging. According to still otherembodiments, scanner 12 may include another type of ionizing source(e.g., ultraviolet, gamma, etc.) or may include a non-ionizing source(e.g., a laser transmitter, an ultrasonic wave transmitter, a terahertzwave transmitter, a microwave scanner, a radio wave transmitter, aninfrared wave transmitter, etc.).

It should be understood that person 20 may receive a dose of radiation(i.e. deposited energy) during operation of detector 10. Variousrecommendations have been made regarding a person's preferred maximumexposure to radiation. By way of example, the United States federaloccupational limit of total effective dose equivalent per year (i.e. thetotal allowable dose) may be 5,000 millirems for an adult, 500 milliremsfor a minor working with radiation, and 50 millirems per month ofgestation for an unborn child with a maximum of 500 millirems during theentire gestation. While provided in millirems, doses of radiation may bemeasured in milliseverts or in still another unit. Doses of radiationmay be denoted in units of deposited energy per mass, energy per volume,or in still other units. Individual portions of the body may also havedose limitations. By way of example, a deep-dose equivalent, eye doseequivalent, shallow-dose equivalent to the skin, a shallow-doseequivalent to an extremity, or a dose equivalent for a particular organmay be computed and regulated. Similar to the total effective doseequivalent, these area specific dose limitations may vary for adults,children, pregnant women, or still other categories of individuals.

As shown in FIG. 1, person 20 includes various characteristics. By wayof example, such characteristics include the age, weight, gender, ID,and body structure, among other features. According to one embodiment,such characteristics also include whether person 20 is pregnant, andwhether person 20 has health conditions. These and other characteristicsmay impact whether a scanning beam applied by detector 10 may causeperson 20 to receive a total effective dose equivalent or area-specificdose equivalent in excess of a recommended annual maximum (i.e. theallowable dosage may be measured on an annual basis) or anotherpreferred limit for person 20. By way of example, an elderly person mayhave skin that is thinner than a younger person, and x-rays may achievea reduced penetration depth for a person having an increased body massindex (i.e. a heavier person) than for a slender person. By way ofexample, the allowable dosage may be less for a child or for a pregnantwoman, than for an adult male.

According to one embodiment, the scanning beam applied by scanner 12 ofdetector 10 may vary based on the allowable dosage and/or at least onecharacteristic of person 20. In some embodiments, the scanning beamapplied by scanner 12 may vary based on a physical characteristic ofperson 20 (e.g., height, weight, body mass index, a pregnancy status,etc.). The relation between allowable dose and the characteristic of theperson can be determined from a database, a lookup table, an algorithm,or similar relationships. In other embodiments, the scanning beamapplied by scanner 12 may vary based on a total effective doseequivalent limit for person 20. According to one embodiment, thescanning beam may also be varied based on at least one of a previousdose (e.g., a dose received during a current travel itinerary, a dosereceived during recent travels, a dose received during medical or othernon-travel related scanning, etc.), an anticipated future dose (e.g., adose to be received during a current travel itinerary, a dose to bereceived during future travels, a dose to be received during medical orother non-travel related scanning, etc.), and based on the likelihoodthat person 20 may be exposed to the total allowable dose (e.g., basedon lifestyle, occupation, residence, other features of the individual'slifestyle, etc.). In some embodiments, controller 16 utilizes at leastone of the total allowable dose, a previous dose, an anticipated futuredose, a cumulative dosage over a time period, a cumulative dosage over anumber of scanning sessions, and the likelihood that person 20 may beexposed to the total allowable dose to determine the output of scanner12.

Referring next to the embodiment shown in FIGS. 2a-2b , a controller ofa detection device provides a command signal to a scanner. The commandsignal includes specified information relating to the operation of thescanner. By way of example, the command signal may include informationregarding the desired resolution and a signal to noise ratio of thescanner. It should be understood that the desired resolution, signal tonoise ratio, or other feature of the command signal may impact the dosereceived by the target. According to one embodiment, an increaseddesired resolution similarly increases the dose received by the target.In some embodiments, the controller may tailor the command signal basedon a characteristic of the individual.

According to one embodiment, the desired resolution may be reduced toreduce the dose received by an elderly person or by a child. Accordingto another embodiment, the desired resolution may be reduced to reducethe dose received by a pregnant woman due to the risk of radiationexposure to the unborn child. According to still another embodiment,various other features of the command signal may be varied based oncharacteristics of the target. It should be understood that thecontroller may alternatively transmit the command signal to anadditional device (e.g., processor, compiler, modulator, transceiver,control device, etc.) in communication with the scanner. Such anadditional device may be coupled to or integrated with the scanner andmay decode or otherwise interpret the command signal.

Referring to FIG. 2a , the detector may direct the scanning beam towardthe target, shown as person 30. As discussed above, the detector mayinclude a sensor (e.g., detector, antenna, etc.) configured to receivewaves. According to one embodiment, the detector includes processingelectronics, and the sensor provides a signal indicative of the receivedwaves to the processing electronics. In some embodiments, the processingelectronics may receive the signal and produce a schematic (i.e.mannequin, dummy, outline, figure, etc.) of person 30. Such a schematic,shown in FIG. 2b as schematic 35, may include only a two-dimensionaloutline of person 30. In other embodiments, schematic 35 comprises athree-dimensional model of person 30. According to one embodiment, thedetector displays schematic 35 to an operator (e.g., for review).According to another embodiment, the detector displays a more detailedrepresentation of person 20 to an operator (e.g., an image as compiledby the processing electronics and showing the outline or other featuresof person 30).

Referring next to FIG. 3a , a target, shown as person 40, may include aplurality of scanning regions. As discussed above, different portions ofperson 40 may have different maximum effective dose limits. According toone embodiment, person 40 includes an entire body region, shown as totalbody area 42, an upper region, shown as head area 44, and a chestregion, shown as chest area 46. As shown in FIG. 3, person 40 alsoincludes an upper extremity region, shown as upper extremity area 48, anabdominal region, shown as abdominal area 50, a pelvic region, shown aspelvic area 52, and a lower extremity region, shown as lower extremityarea 54. Various factors may impact a previous or anticipated futureexposure for at least a portion of person 40. For example, person 40 mayhave recently had a mammogram or chest x-ray thereby causing chest area46 to receive an effective dose of radiation. In another example, person40 may have underwent a computed tomography head scan thereby causinghead area 44 to receive an effective dose of radiation. In anotherexample, anticipated future surgeries, travels, or other activities mayimpact an anticipated future exposure of at least a portion of person40.

According to the embodiment shown in FIG. 3b , a detector, shown asdetector 55 includes a scanner, shown as scanner 56 coupled to acontroller 57 with a data link, shown as cable 58. As shown in FIG. 3b ,detector 55 includes a driver, shown as actuator 59. According to oneembodiment, actuator 59 is a stepper motor. According to anotherembodiment, actuator 59 is another device configured to facilitaterelative movement between scanner 56 and person 40. In some embodiments,actuator 59 is also coupled to controller 57 with cable 58. Suchcoupling may allow controller 57 to simultaneously control both scanner56 and actuator 59 to, by way of example, facilitate associating aparticular orientation of scanner 56 with particular waves. According toone embodiment, actuator 59 is configured to direct scanner 56 toward aportion of person 40. As shown in FIG. 3b , actuator 59 directs scanner56 toward head area 44 of person 40. Such direction may occur as part ofa total body scan of person 40 (e.g., an initial scan, an entire bodyrescan, etc.) or may facilitate detector 55 scanning of only a portionof person 40 (e.g., due to poor image quality of an initial scan, wherea detector identifies potential contraband, etc.).

According to one embodiment, a historical or anticipated future exposurefor at least one portion of person 40 may be considered as part of acontraband detections scheme. Such consideration may result in reducingthe intensity, signal to nose ratio, resolution, or other feature with acommand signal based on the historical or anticipated future exposure.According to one embodiment, the detector initially scans only a portionof person 40 (e.g., may not scan abdominal area 50 where person 40 ispregnant, etc.). According to another embodiment, the detector initiallyscans total body area 42 (e.g., to produce an initial schematic ofperson 40). In some embodiments, the detector may thereafter scan totalbody area 42 to, by way of example, improve the quality of the schematicof person 40 (i.e. apply a uniform scanning beam to person 40). In otherembodiments, the detector may thereafter scan only a portion (e.g.,abdominal area 50, pelvic area 52, etc.) of total body area 42 or maythereafter scan different portions of total body area 42 with differentscanning beams (i.e. apply a non-uniform scanning beam). Such additionalpartial scanning may correspond to areas of person 40 where, by way ofexample, the image quality of the initial scan is below a thresholdlevel or where the detector finds an indication of contraband, amongother reasons warranting additional scanning.

In some embodiments, the detector includes processing circuits havinglogic configured to employ a contraband detection scheme that considersthe costs of scanning person 40. According to one embodiment, thecontraband detection scheme also considers the benefits of scanningperson 40. As discussed above, the costs of scanning a person mayinclude previous or future doses, whether the person is pregnant,medical conditions, or still other factors. Such costs may be impactedby a characteristic or physical condition of person 40.

According to one embodiment, the detector associates reduced risks withscanning an organ of a person 40 having an increased body mass index(i.e. waves may be absorbed by outer layers of fatty tissue therebyinsulating internal organs), whereas a detector may associate increasedrisks with scanning an organ of a thin elderly person 40 (i.e. the thinskin of an elderly person may allow more waves to pass through andinteract with internal organs). Such reduced risks may reduce the costof scanning person 40 having a larger body mass index relative to thecost of scanning a thin elderly person 40. By way of an additionalexample, a detector may associate a higher cost to scanning chest area46 for a woman who recently had a mammogram than for a woman who did notrecently have a mammogram. As still another example, a detector mayassociate a higher cost to scanning abdominal area 50 of a pregnantwoman. Various benefits of scanning or rescanning person 40 includedetection of contraband, improving the quality of the initial scan,improving a confidence in whether person 40 is carrying contraband, andimproving a confidence in the identity of the contraband, and amongother potential benefits.

It should be understood that the contraband detection scheme mayassociate various numerical values to potential characteristics ofperson 40 and compare a cost total with a benefit total associated withthe reason for scanning or rescanning a portion of person 40 (e.g., avalue associated with a certainty of contraband located within the area,a value associated with the danger of such contraband, etc.). In someembodiments, the contraband detection scheme may scan or rescan aportion of person 40 (e.g., chest area 46) after weighing the costs andbenefits of scanning that portion of person 40. According to oneembodiment, such scanning or rescanning may occur automatically.According to another embodiment, the detector may wait for operatorinput before performing an initial scan. According to still anotherembodiment, the detector may rescan person 40 only after receiving anoperator input (e.g., an approval of the cost versus benefit analysis).

Referring next to the embodiment shown in FIG. 4, a detection device,shown as detector 60, includes a plurality of components configured tofacilitate targets (e.g., persons, individuals, etc.) for contraband. Asshown in FIG. 4, detector 60 includes a scanner, shown as scanner 70positioned within a housing, shown as housing 62. In some embodiments,scanner 70 emits and receives waves that interact with the target.According to the embodiment shown in FIG. 4, detector 60 includes acontroller (i.e. module, command device, processing electronics, etc.),shown as controller 75. Controller 75 may be coupled to scanner 70 witha data link, shown as data cable 72. In some embodiments, controller 75may be configured to send command signals to, by way of example, agenerator within scanner 70 and receive data signals from, by way ofexample, a sensor within scanner 70.

According to the embodiment shown in FIG. 4, detector 60 includes anindicator, shown as contraband notification device 80, configured toalert an operator (e.g., a person operating detector 60, a remote personmonitoring detector 60, etc.) of the potential that the person beingscanned possesses contraband. In one embodiment, contraband notificationdevice 80 includes a signal light coupled to an outer surface of housing62. According to another embodiment, contraband notification device 80may include another visual indicator. According to still anotherembodiment, contraband notification device 80 includes an audible alarm(e.g., a speaker configured to emit a sound as detector 60 determinesthat the person may possess contraband).

According to yet another embodiment, contraband notification device 80includes a display screen (e.g., a liquid crystal display, a lightemitting diode display, etc.) configured to indicate to the operatorthat the person may possess contraband. By way of example, such adisplay may show a schematic of the person and indicate the presence(and location) of contraband. According to one embodiment, the displayuses an icon in the shape of the potentially detected contraband on aschematic of the person to show the operator the nature and location ofthe potential contraband. In some embodiments, the display is configuredto show several types of contraband (e.g., a knife shape to indicate apotential knife, a drop to indicate a potential liquid, etc.).Contraband notification device 80 may operate at a first level (e.g., afirst pitch, a first volume, a first color, indicate an first alarm onthe display, etc.) to indicate the presence of a first class ofcontraband (e.g., drugs, currency, etc.) and may operate at a secondlevel (e.g., a second pitch, a second volume, a second color, indicate asecond alarm on the display, etc.) to indicate the potential presence ofa second class of contraband (e.g., explosives, liquids, weapons, etc.).It should be understood that contraband notification device 80 mayinclude still other components to indicate the potential presence ofcontraband.

Referring still to the embodiment shown in FIG. 4, detector 60 includesan identifier, shown as information acquisition device 90. According toone embodiment, information acquisition device 90 is configured toacquire information about the target. Such information may include, byway of example, age, gender, a pregnancy status, a medical condition(e.g. the presence of a hip implant, a pacemaker, or another medicalcondition, etc.), past travel activity, future travel activity, or stillother information that may be used as part of a contraband detectionscheme. Such information may include identification information aboutthe target (e.g., name, social security number, ticket number, etc.)that facilitates retrieval of other information (e.g., the informationdiscussed above, other information, etc.) from a database or otherrecord.

According to one embodiment, the information includes historical datarelating to the number of times a scanner has detected potentialcontraband on the target. The information may also include historicaldata relating to the location and identity of contraband detected by ascanner. Such historical data may allow detector 60 to more effectivelydetermine whether the target possesses contraband (e.g., detector 60 mayscan a portion of the target where a previous scanner identifiedpotential contraband with a greater dosage, rescan the area, etc.).According to another embodiment, the information may be used to create asummary (e.g., a numerical “threat value,” an overview of previouslydetected contraband, the locations of previously detected contraband,etc.) of the target for use as part of a contraband detection scheme. Byway of example, detector 60 may initially scan or rescan a target havinga more concerning summary with a scanning beam having intensifiedparameters (e.g., intensity, etc.).

In some embodiments, information acquisition device 90 includes a dataentry device, the data entry device configured to allow an operator(e.g., an attendant, etc.) to enter the name or other identifyinginformation of the target. A database of information may storehistorical data associated with the target, which may be provided todetector 60 for use as part of a contraband detection scheme. It shouldbe understood that the name or other identifying information of thetarget may be provided using another device (e.g., a keyboard, retrievedfrom a database along with current travel itineraries, etc.).

Information acquisition device 90 may include a barcode scannerconfigured to interface with a barcode associated with the target. Byway of example, the barcode may be printed on the boarding pass of anairline passenger. According to another embodiment, informationacquisition device 90 includes a radiofrequency antenna configured tointerface with a radiofrequency tag associated with the target. Such aradiofrequency tag may be located in the identification (e.g., adriver's license, passport, etc.) of the target, among other potentiallocations. According to still another embodiment, informationacquisition device 90 includes a quick response scanner configured tointerface with a quick response code associated with the target (e.g.,printed on the passenger's boarding pass, printed on an article ofclothing, etc.).

In some embodiments, information acquisition device 90 facilitates thetimely processing of targets through detector 60. While retrievinginformation from a database by inputting the target's name at detector60 may reduce the need for barcodes, quick reference codes, orradiofrequency tags, such retrieval may take time to conduct therebyincreasing processing time. Including barcode, quick reference codes, orradiofrequency tags containing a summary of the target on boardingpasses or other associated materials may reduce processing time. Itshould be understood that the barcode, quick reference code,radiofrequency tag, or other system configured to interface withinformation acquisition device 90 may include an encryption technique orother system to prevent targets from altering their correspondingsummary.

As shown in FIG. 4, detector 60 includes an input device (e.g., operatorinterface, etc.), shown as user interface 100. According to oneembodiment, an operator may provide characteristics or other informationabout a target with user interface 100. In another embodiment, thecharacteristics or information may be acquired from a network orinformation acquisition device 90, as discussed above. According tostill another embodiment, both user interface 100 and informationacquisition device 90 may be utilized to determine characteristics orother information about the target.

Referring next to the embodiments shown in FIGS. 5-6, a detector mayallow an operator to provide characteristics of the target using varioustypes of user interfaces. Allowing the operator to providecharacteristics may simplify the operation of a detector, may improvethe likelihood that the characteristics apply to the target, may keepthe operator engaged in the scanning activity, or may provide stillother benefits. As shown in FIG. 5, an input device, shown as userinterface 200, allows an operator to provide various characteristics ofthe target. According to one embodiment, user interface 200 displaysvarious potential characteristics of the target (e.g., male, female,age, weight, etc.).

As shown in FIG. 5, user interface 200 includes a switch, shown asswitch 210, that allows an operator to toggle between male (indicated as“M”) and female (indicated as “F”) to select the appropriate categoryfor the target. According to one embodiment, user interface 200 furtherincludes a dial, shown as dial 220, configured to allow an operator toselectively indicate a weight of the target (e.g., by turning a point onthe dial toward a corresponding marking on a face of user interface200). In other embodiments, a scale may be used to allow an operator toobtain the weight of the target. As shown in FIG. 5, user interface 200includes a slide 230, configured to allow an operator to actuate ahandle to a corresponding age of the target. According to oneembodiment, switch 210, dial 220, and slide 230 are coupled to ahousing, shown as housing 202 of user interface 200.

In various embodiments, at least one characteristic of the target isautomatically determined by the detector (e.g., weight, etc.) and atleast one characteristic of the target may be provided by the operator(e.g., gender, etc.). According to one embodiment, user interface 200provides a characteristic signal to another component of a detector(e.g., a controller, a processing circuit, etc.) that corresponds to theoperator's selection. Other components of the detector may utilize thecharacteristic signal as part of a contraband detection scheme (e.g., todetermine the parameters of the scanning beam, etc.).

As shown in FIG. 6, an input device, shown as user interface 300, allowsan operator to input various characteristics of the target. According toone embodiment, user interface 300 includes a touch screen (i.e.graphical user interface), shown as display 302. It should be understoodthat an operator may interact with (e.g., touch, look at, etc.) variousportions of display 302 to make or confirm a selection. As shown in FIG.6, user interface 300 includes a plurality of indicators (i.e. icons,text, etc.) corresponding to various potential characteristics of thetarget.

According to one embodiment, user interface 300 includes a firstportion, shown as gender selection 310, defining buttons relating to thegender of the target. As shown in FIG. 6, user interface 300 alsoincludes a portion, shown as weight portion 320, configured to show aweight of the target and operator buttons (e.g., a plus symbol to allowan operator to increase the displayed weight and a minus symbol to allowan operator to decrease the displayed weight). According to oneembodiment, a portion, shown as age portion 330, displays the age of thetarget and operator buttons. As shown in FIG. 6, user interface includesa portion, shown as pregnancy indication 340, having buttons to allow anoperator to select whether the target is pregnant (i.e. whether theperson indicates that they are pregnant, whether the person appearspregnant, etc.).

According to one embodiment, user interface 300 may propagate variousdefault selections (e.g., the shaded buttons shown in FIG. 6) forapproval by the operator. In some embodiments, the default selectionsmay be generated using information (e.g., information gathered throughan information acquisition device or other identifier) for approval bythe operator. In either embodiment, an operator may also initiate orcease operation of a detector using buttons positioned with a commandportion, shown as command portion 350. According to one embodiment, userinterface 300 provides a characteristic signal to another component of adetector (e.g., a controller, a processing circuit, etc.) thatcorresponds to the operator's selection. Other components of thedetector may utilize the characteristic signal as part of a contrabanddetection scheme (e.g., to determine the parameters of the scanningbeam, etc.).

As discussed above with regard to information acquisition device 90,information about the target may be acquired from a database (e.g., adatabase positioned on detector 60 or coupled to detector 60 with anetwork). In some embodiments, information about the target may beemployed as part of a contraband detection scheme without revealing theinformation to an operator. By way of example, information obtained overa network (e.g., upon entry of the target's name) or otherwise obtainedby information acquisition device 90 may be provided to a processingcircuit of detector 60.

Such a technique of direct usage may provide the benefit of maintainingas confidential the information of the target (i.e. a target may have aprivacy interest, such as a protected privacy interest in personalmedical information, in at least a portion of the information, etc.).However, automatic use of the information may present the risk that atarget will receive an inappropriate dose where the summary includesincorrect or outdated information. A scanning beam may cause the targetto receive an inappropriate dose where, by way of example, the targethas recently lost weight. Detector 60 may utilize the previous weight ofthe target and determine that a scanning beam that will cause the targetto receive a larger dose may be appropriate (e.g., fatty tissue absorbswaves and photons more than skin alone) where such a scanning beam maynot be appropriate given the current body mass of the target.

According to another embodiment, all of the information from the summaryis presented on a user interface for review by the operator. After theoperator verifies the information, a detector may utilize theinformation as part of a contraband detection scheme. According toanother embodiment, a portion of the information may be presented on auser interface for review by the operator and a portion of theinformation may be directly incorporated into the contraband detectionscheme. Such information provided to the operator for verification mayinclude data not protected by health privacy laws (e.g., weight, height,age, gender, etc.) or may include other information (e.g., whether theperson is pregnant, etc.).

Referring next to the embodiment shown in FIGS. 7-8, a detector isconfigured to perform a first scan (i.e. an initial scan) and thereafterperform a second scan (i.e. a secondary scan). As shown in FIG. 7, thedetector operates in a first scanning mode to produce the initial scanand operates in a second scanning mode to produce the second scan.According to one embodiment, the detector includes a photon generator.In some embodiments, the photon generator comprises an x-ray device(e.g., a backscatter x-ray source). In other embodiments, the photongenerator includes a non-radioactive device (e.g., an optical scanner, amillimeter wave scanner, etc.). A photon generator may operate at afirst level (e.g., frequency, intensity, amount of radiation, etc.) inthe first scanning mode and operate at a second level in a secondscanning mode.

According to another embodiment, the detector includes a first wave orphoton generator and a second wave or photon generator. In someembodiments, at least one of the first wave or photon generator and thesecond wave or photon generator includes an x-ray device. According toone embodiment, the detector operates a non-ionizing wave or photongenerator during the first scanning mode and operates an x-ray device inthe second scanning mode. Such operation may allow the detector toconduct an initial scan without causing the target to receive a dose.Thereafter, the target may receive a dose during the second scanningmode (e.g., where the detector identifies potential contraband, wherethe quality of the initial scan is below a threshold value, etc.). Inother embodiments, neither of the first wave or photon generator and asecond wave or photon generator includes an x-ray source. According toone embodiment, the detector operates the first wave or photon generator(e.g., a radio wave optical scan, a biometric identification scanner)during the first scanning mode and operates the second wave or photongenerator (e.g., a millimeter scanner, etc.) during the second scanningmode.

Referring to FIG. 7, a controller is configured to operate a detectoraccording to a method, shown as contraband detection scheme 400.Controller engages the first scanning mode (step 402), and waves areemitted (e.g., from a generator) toward a target. The detector receiveswaves (e.g., with a sensor, etc.), and the controller receives data(step 404) relating to the received waves. Using the received data, thecontroller determines a characteristic of the target (step 406) andengages the second scanning mode (step 408) to conduct a second scan ofthe target. The controller utilizes the characteristic determined instep 406 to determine a parameter of the second scanning mode to, by wayof example, reduce the risk that the target may receive an inappropriatedose. The detector again receives waves (step 410) and the data is thenanalyzed the data (step 412).

According to one embodiment, the controller produces a representation(i.e. a scan, an image, a profile, a schematic) that may be presented tothe operator (step 414). Based on the representation and a module havinginstructions for determining whether the representation includescontraband, the controller may determine whether a danger (i.e. thepresence of contraband) exists (step 416). Where a danger exists, thecontroller may send a signal (step 418) to identify the contraband,indicate to the operator that contraband may be present (e.g., with anindicator), or may provide an indication of the contraband on a displayfor the operator's review. Where no contraband is detected, thecontroller may indicate that the target is clear (step 419). Thecontroller may alternatively indicate the presence of contraband (step418) without indicating the absence of contraband.

Referring to FIG. 8, a controller is configured to operate a detectoraccording to another method. The controller engages the first scanningmode (step 450), receives data (step 452), and the data is analyzed toproduce a representation of the target (step 454). The controllerevaluates the representation (step 456) and determines whether thequality (i.e. resolution, etc.) of the representation is above athreshold value (i.e. a value sufficient for the controller to determinewhether the target possesses contraband). Where the representation is ofsufficient quality, the controller determines whether the representationindicates the presence of contraband (step 458). The controllerindicates the presence of contraband (step 460) or the absence ofcontraband (step 462). Where the quality of the representation is notabove a threshold level, the controller engages the second scanning mode(step 464), receives data in step 466, and the data is analyzed (step468) to produce a representation (step 470). The controller determineswhether the representation indicates the presence of contraband (step472). The controller indicates the presence of contraband (step 474) orthe absence of contraband (step 478). The controller may alternativelyindicate the presence of contraband (step 474) without indicating theabsence of contraband. According to another embodiment, the controlleriteratively evaluates the quality of the representation and performsadditional scans until the quality of the representation reaches thethreshold level. According to still another embodiment, the controllerboth determines the quality of the representation and determines acharacteristic of the target to, by way of example, improve the accuracyof the detector while reducing the likelihood that a target may receivean inappropriate dose.

Referring next to the embodiments shown in FIGS. 9-10, a detector, shownas detector 500, includes a scanner, shown as scanner 510. A controller,shown as controller 520 is coupled to scanner 510 with a data link,shown as cable 525. As discussed above, the detector may be configuredto direct waves toward a target, shown as person 530. According to oneembodiment, detector 500 includes a measuring device, shown as scale540. In some embodiments, scale 540 may facilitate the use of acharacteristic (e.g., weight) of person 530 as part of a contrabanddetection scheme. As shown in FIG. 9, person 530 may be directed ontoscale 540. According to one embodiment, scale 540 is configured toproduce a weight signal to controller 520 of detector 500. According toanother embodiment, the scale 540 may indicate the weight of person 530to an operator, who may enter the weight into an operator interface. Asdiscussed above, controller 520 may utilize the weight of person 530 todetermine (e.g. based on data, with algorithms, etc.) a feature ofperson 530 (e.g., the thickness of fatty tissue). Including a feature aspart of the contraband detection scheme may reduce the likelihood thatperson 530 may receive an inappropriate dose from detector 500.

According to the embodiment shown in FIG. 10, detector 500 includes ameasuring device, shown as height indicator 550. In some embodiments,height indicator 550 may facilitate the use of a characteristic (e.g.,height) of person 530 as part of a contraband detection scheme. As shownin FIG. 10, person 530 may be directed to stand near height indicator550. According to one embodiment, height indicator 550 is configured toproduce a height signal (e.g., using a plurality of proximity sensors, alaser measurement system, a camera, etc.) and provide the height signalto controller 520 of detector 500. According to another embodiment, theheight indicator 550 may indicate the height of person 530 to anoperator, who may enter the height into an operator interface. Asdiscussed above, controller 520 may utilize the height of person 530 todetermine (e.g. based on data, with algorithms, etc.) a feature ofperson 530 (e.g., the thickness of fatty tissue, a body mass index,etc.). Including a feature as part of the contraband detection schememay reduce the likelihood that person 530 may receive an inappropriatedose from detector 500. According to still another embodiment, detector500 may include a scale and a height indicator or still other systems todetermine a characteristic of person 530.

In some embodiments, detector 500 includes an imaging measurement device(e.g., a visible wavelength camera, a non-visible wavelength camera, amulti-spectral camera, etc.). The imaging measurement device may provideone or more still images or may provide video imagery. The imagingmeasurement device may produce three-dimensional image information(e.g., by using stereoscopic imaging, by using range data combined witha conventional camera, by determining range from image focal quality,etc.). In other embodiments, a processor is configured to producethree-dimensional image information using image information receivedfrom the imaging measurement device. According to one embodiment, theimaging measurement device uses ultrasound or radio frequency radiation.The imaging measuring device may use techniques such as radiofrequencythermometry or IR radiation to determine a thermal image of the person.

An image recognition system (e.g., implemented in software or inhardware) may utilize the image information from the imaging measurementdevice to automatically determine characteristics of the target (e.g.,height, gender, pregnancy status, body structure, etc.). The imagerecognition system may be used in conjunction with population-widecorrelations, machine-learning algorithms, or still other systems toestimate characteristics such as age, weight, physiological stress,medical condition, or still other features of the target. In someembodiments, the image recognition system includes a facial recognitionsystem. The facial recognition system may utilize a database (e.g., aglobal database, a situation-specific database, etc.) to determine anidentity of the target. The identity of the target may be used toretrieve other characteristics of the person from an informationdatabase.

According to one embodiment, the methods, and contraband detectionschemes described herein are implemented as part of a security-scanningdevice. By way of example, the security-scanning device may include theProVision® ATD or the ProVision® 2 body scanners manufactured by L-3Communications. In another example, the security-scanning device mayinclude the Rapiscan Secure 1000 SP or the Rapiscan Secure 1000 DP bodyscanners manufactured by Rapiscan Systems. The scanners or othercomponents disclosed herein may be implemented into these or othersecurity scanning devices.

It is important to note that the construction and arrangement of theelements of the systems and methods as shown in the embodiments areillustrative only. Although only a few embodiments of the presentdisclosure have been described in detail, those skilled in the art whoreview this disclosure will readily appreciate that many modificationsare possible (e.g., variations in sizes, dimensions, structures, shapesand proportions of the various elements, values of parameters, mountingarrangements, use of materials, colors, orientations, etc.) withoutmaterially departing from the novel teachings and advantages of thesubject matter recited. For example, elements shown as integrally formedmay be constructed of multiple parts or elements. It should be notedthat the elements and/or assemblies of the enclosure may be constructedfrom any of a wide variety of materials that provide sufficient strengthor durability, in any of a wide variety of colors, textures, andcombinations. Additionally, in the subject description, the word“exemplary” is used to mean serving as an example, instance, orillustration. Any embodiment or design described herein as “exemplary”is not necessarily to be construed as preferred or advantageous overother embodiments or designs. Rather, use of the word exemplary isintended to present concepts in a concrete manner. Accordingly, all suchmodifications are intended to be included within the scope of thepresent inventions. The order or sequence of any process or method stepsmay be varied or re-sequenced according to other embodiments. Anymeans-plus-function clause is intended to cover the structures describedherein as performing the recited function and not only structuralequivalents but also equivalent structures. Other substitutions,modifications, changes, and omissions may be made in the design,operating conditions, and arrangement of the preferred and otherembodiments without departing from scope of the present disclosure orfrom the spirit of the appended claims.

The present disclosure contemplates methods, systems, and programproducts on any machine-readable media for accomplishing variousoperations. The embodiments of the present disclosure may be implementedusing existing computer processors, or by a special purpose computerprocessor for an appropriate system, incorporated for this or anotherpurpose, or by a hardwired system. Embodiments within the scope of thepresent disclosure include program products comprising machine-readablemedia for carrying or having machine-executable instructions or datastructures stored thereon. Such machine-readable media can be anyavailable media that can be accessed by a general purpose or specialpurpose computer or other machine with a processor. By way of example,such machine-readable media can comprise RAM, ROM, EPROM, EEPROM, CD-ROMor other optical disk storage, magnetic disk storage or other magneticstorage devices, or any other medium which can be used to carry or storedesired program code in the form of machine-executable instructions ordata structures and which can be accessed by a general purpose orspecial purpose computer or other machine with a processor. Wheninformation is transferred or provided over a network or anothercommunications connection (either hardwired, wireless, or a combinationof hardwired or wireless) to a machine, the machine properly views theconnection as a machine-readable medium. Thus, any such connection isproperly termed a machine-readable medium. Combinations of the above arealso included within the scope of machine-readable media.Machine-executable instructions include, for example, instructions anddata, which cause a general-purpose computer, special purpose computer,or special purpose processing machines to perform a certain function orgroup of functions.

Although the figures may show a specific order of method steps, theorder of the steps may differ from what is depicted. Also, two or moresteps may be performed concurrently or with partial concurrence. Suchvariation will depend on the software and hardware systems chosen and ondesigner choice. All such variations are within the scope of thedisclosure. Likewise, software implementations could be accomplishedwith standard programming techniques with rule-based logic and otherlogic to accomplish the various connection steps, processing steps,comparison steps, and decision steps.

What is claimed is:
 1. A method for searching for a threat, comprising:determining a characteristic of a target; determining a maximumallowable dosage for the target based on the characteristic of thetarget and a maximum dose exposure limit for the target; determining aparameter of a scanning beam based on the allowable dosage with aprocessing circuit; transmitting the scanning beam toward the targetwith a scanner; and creating a representation of the target with theprocessing circuit.
 2. The method of claim 1, wherein the characteristicincludes body structure.
 3. The method of claim 1, wherein thecharacteristic includes a pregnancy status.
 4. The method of claim 1,further comprising receiving the characteristic of the target with theprocessing circuit from at least one of a database, a ticket, and ameasurement device.
 5. The method of claim 1, further comprisingdisplaying a potential characteristic of the target on an operatorinterface, wherein the operator interface comprises a graphical userinterface.
 6. The method of claim 5, further comprising displaying anicon corresponding to the potential characteristic of the target on thegraphical user interface.
 7. The method of claim 6, further comprising:providing a characteristic signal from the operator interface to theprocessing circuit in response to an operator selection associated withthe potential characteristic; and determining the parameter of thescanning beam with the processing circuit using the characteristicsignal.
 8. The method of claim 7, further comprising indicating whetherthe potential characteristic applies to the target using a selector ofthe operator interface.
 9. The method of claim 7, wherein the potentialcharacteristic includes at least one of an age, a gender, a weight, abody structure, a pregnancy status, and a medical condition of thetarget.
 10. The method of claim 1, further comprising: providing anidentifier; and receiving a signal with the identifier, the signalincluding data indicative of the characteristic of the target, whereindetermining the characteristic of the target includes evaluating thesignal received by the identifier.
 11. The method of claim 1, furthercomprising alerting an operator of at least one of an error and a threatwith an indicator.
 12. The method of claim 11, wherein the indicatorincludes a display, wherein alerting the operator of the at least one ofthe error and the threat includes illustrating the representation of thetarget on the display.
 13. The method of claim 12, wherein alerting theoperator of the at least one of the error and the threat includesillustrating the representation of the target and a plurality of shapeson the display, wherein the plurality of shapes correspond to potentialcontraband.