US 11,940,558 B2
Automatic threat recognition for HD AIT
Melissa Conley, Washington, DC (US); John Fortune, Clifton, VA (US); Michael Chandarlis, Woodbridge, VA (US); William Garrett, Morehead, KY (US); and Brian Lewis, Washington, DC (US)
Assigned to The Government of the United States of America, represented by the Secretary of Homeland Security, Washington, DC (US)
Filed by The Government of the United States of America, as represented by the Secretary of Homeland Security, Washington, DC (US)
Filed on Jun. 17, 2021, as Appl. No. 17/350,926.
Claims priority of provisional application 63/065,214, filed on Aug. 13, 2020.
Prior Publication US 2023/0127343 A1, Apr. 27, 2023
Int. Cl. G01S 7/41 (2006.01); G06F 18/22 (2023.01); G06Q 50/26 (2012.01)
CPC G01S 7/412 (2013.01) [G06F 18/22 (2023.01); G06Q 50/265 (2013.01)] 23 Claims
OG exemplary drawing
 
1. A method to obtain identity information and evaluate electromagnetic energy reflection data in view of the identity information, comprising:
determining whether electronic information of a security scan contains an anomaly;
when the electronic information contains an anomaly, identifying an anomaly location in the electronic information corresponding to the anomaly;
determining a subset of the electronic information corresponding to the anomaly location;
determining anomaly attributes using the subset of the electronic information;
evaluating the anomaly attributes using a database of reference items, a given reference item having:
a respective identifier,
respective reference characteristics, and
a respective match criterion indicating one or more of the respective reference characteristics;
making a comparison between the anomaly attributes and the respective reference characteristics of the given reference item;
when a result of the comparison meets the respective match criterion for the given reference item, assigning to the anomaly the respective identifier as an anomaly identifier;
determining an identity of a subject of the security scan;
communicating, by a processing system via a network connection, with a database of a remote server containing stored personal information, to access identity information pertaining to the identity of the subject;
wherein the identity information includes information about the subject that had been provided by the subject and stored in the database in advance prior to the subject undergoing scanning;
determining that the identity information indicates a permitted device for that subject;
determining whether the anomaly is consistent with the permitted device for that subject; and
when the anomaly is consistent with the permitted device for that subject, assigning to the anomaly a pass status.