Distributed analysis x-ray inspection methods and systems

Information

  • Patent Grant
  • 11099294
  • Patent Number
    11,099,294
  • Date Filed
    Friday, November 8, 2019
    4 years ago
  • Date Issued
    Tuesday, August 24, 2021
    2 years ago
Abstract
The present specification discloses systems and methods for integrating manifest data for cargo and light vehicles with their X-ray images generated during scanning. Manifest data is automatically imported into the system for each shipment, and helps the security personnel to quickly determine the contents of cargo. In case of a mismatch between cargo contents shown by manifest data and the X-ray images, the cargo may be withheld for further inspection. In one embodiment, the process of analyzing the X-ray image of the cargo in conjunction with the manifest data is automated.
Description
FIELD

The present specification discloses systems for inspecting goods in containers and, more specifically, to systems that integrate cargo manifest data with imaging and/or detection processes to make inspection decisions and/or generate alarms upon detecting the presence of threat items in cargo.


BACKGROUND

Cargo containers need to be inspected at ports and other points of entry or transportation for contraband such as explosives, narcotics, currency, chemical and nuclear weapons and for cargo-manifest verification. A cargo manifest is a physical or electronic shipping document that accompanies the cargo and provides important descriptive information about the cargo, including bills of lading issued by the carrier or its representative(s), the shipment's consignor and/or consignee, cargo description, amount, value, origin, and/or destination. The accurate detection of contraband with a low false alarm is a daunting task, as these materials often have similar physical characteristics as benign cargo. The percentage of cargo to be inspected is increasing, and because of the currently manually intensive nature of inspections, so is the number of operators.


Security systems are thus limited in their ability to detect contraband, weapons, explosives, and other dangerous objects concealed in cargo. Standard and advanced X-ray systems have difficulty detecting contraband in break-bulk cargo. This difficulty is exacerbated when inspecting larger and oftentimes, cluttered pallets and cargo containers. Computed Tomography (CT) based systems have been shown to be more suitable for the difficult task of detecting aviation-threat explosives in luggage and, more recently, in larger objects. However, the configuration of commonly employed CT systems prevents scaling the system up to long objects such as large cargo containers and large skids.


The problem is further compounded by the fact that as a result of the image modulation according to atomic numbers of various materials, it is common for X-ray imaging systems to produce images with dark areas. Although these dark areas might indicate the presence of threat materials, they yield little information about the exact nature of threat. Also, radiographs produced by conventional X-ray systems are often difficult to interpret because objects are superimposed. Therefore, a trained operator must study and interpret each image to render an opinion on whether or not a target of interest, a threat, is present. Operator fatigue and distraction can compromise detection performance, especially when a large number of such radiographs is to be interpreted, such as at high traffic transit points and ports. Even with automated systems, it becomes difficult to comply with the implied requirement to keep the number of false alarms low, when the system is operated at high throughputs.


Therefore, there is a need to provide an automated detection system that further includes assistance tools to help operators improve their throughput by scrutinizing cargo images more efficiently, thereby increasing detection and analysis speed. There is also a need for such systems to operate with reduced false alarm rates.


SUMMARY

The present application discloses a system for associating and integrating manifest data from cargo and light vehicles with their respective X-ray images that are generated during scanning. Manifest data is automatically imported into the system for each shipment, and helps the security personnel to quickly determine the contents of cargo. In case of a mismatch between cargo contents shown by manifest data and the X-ray images, the cargo may be withheld for further inspection.


In one embodiment, manifest data is imported via an application integrated within an X-ray detection system deployed at checkpoints or service posts. In one embodiment, the application works within the framework of a distributed network, wherein the service post is connected to a regional center, where an operator can analyze the X-ray image of the cargo in conjunction with the manifest data. When the X-ray image and manifest data has been analyzed, the service post which performed the non-intrusive X-ray scan will be notified automatically by the application integrated with the X-ray system. This allows the service post operator to make a decision to either release the cargo or to hold the cargo for further inspection.


In one embodiment, the process of analyzing the X-ray image of the cargo in conjunction with the manifest data is automated.


In one embodiment, the present specification discloses a system for scanning cargo and vehicles, comprising: at least one non-intrusive inspection system for performing a non-intrusive X-ray scan, said non-intrusive inspection system further comprising an application for importing manifest data associated with the cargo or vehicle being scanned; and a processing system for receiving scan images and associated manifest data from the non-intrusive inspection system, and determining from the scan images if the contents of the cargo or vehicle are of the same type as specified in the manifest data. In one embodiment, the system further comprises a server that executes an application for allocating images and manifest data from a service post to a regional center. Further, in one embodiment, each X-ray scan image is associated with a unique identifier before transmission from the service post to the regional center.


In one embodiment, the scan images and manifest data are analyzed by an operator at a regional center to determine if the contents match. Further, the scan images and manifest data are automatically analyzed by an application at a regional center to determine if the contents match.


In one embodiment, scan images, their associated unique identifiers and manifest data, and results of analyses at a regional center are stored in a database.


In another embodiment, the present specification discloses a method for inspecting cargo and vehicles, comprising: scanning a cargo container or vehicle at a service post using non-intrusive system; importing manifest data associated with the cargo or vehicle being scanned; and analyzing said scan images and associated manifest data to determine if the contents of the cargo or vehicle correspond to the same cargo type as specified in the manifest data. In one embodiment, the non-intrusive scanning is performed by an X-ray system.


In another embodiment, the step of analyzing further comprises determining whether a threat item or alarm condition is present. Further, the result of the analysis at a regional center is reported to the service post. Still further, each scan image is associated with a unique identifier before transmission from the service post to a regional center. In addition, the scan images, their associated unique identifiers and manifest data, and results of analyses are stored in a database.


In yet another embodiment, the present specification discloses a method for screening cargo, the method comprising: scanning a cargo container using non-intrusive X-ray system to generate a scan image; importing manifest data associated with the cargo or vehicle being scanned; obtaining cargo code information from manifest data; retrieving stored images associated with said cargo code from an image database; and comparing features of said scan image to features of historically stored images to determine if the contents of the cargo or vehicle match the manifest data. In addition, the method further comprises computing features of cargo content from the generated scan image, including but not limited to, attenuation, texture, atomic number, cargo height, density and atomic number. In one embodiment, the step of comparing further comprises comparing the computed features from the scan image with features associated with historically stored images.


In one embodiment, the computed features are associated with said cargo code, wherein the cargo code is indicative of type of cargo. Further, the method comprises segregating the generated scan image according to cargo types, if the cargo is associated with more than one cargo code. Still further, each segregated part of the image is compared to historically stored images associated with the corresponding cargo code. Yet still further, the step of comparing said scan image to historically stored images is performed automatically.


The aforementioned and other embodiments of the present shall be described in greater depth in the drawings and detailed description provided below.





BRIEF DESCRIPTION OF THE DRAWINGS

These and other features and advantages of the present invention will be appreciated, as they become better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:



FIG. 1 illustrates the architecture of a distributed inspection network that uses non-intrusive X-ray scanning, according to one embodiment described in the present specification;



FIG. 2 is a diagram presenting the overall system architecture of the imaging system of described in the present specification, in one embodiment;



FIG. 3 illustrates an exemplary interface for a service post, as employed in one embodiment of the system described in the present specification;



FIG. 4 depicts an exemplary interface for presenting manifest information, as employed in one embodiment of the system described in the present specification;



FIG. 5 shows an exemplary user interface screen for a data center, as employed in one embodiment of the system described in the present specification;



FIG. 6 shows another exemplary user interface screen for a data center, as employed in one embodiment of the system described in the present specification;



FIG. 7 is flowchart illustrating one process for preparing a features database, according to one embodiment of the system described in the present specification;



FIG. 8 illustrates the use of the features database described with respect to FIG. 7 to determine if cargo under inspection matches manifest information;



FIG. 9 illustrates the process of using the features database described with respect to FIG. 7 to determine if cargo under inspection matches the manifest, when there is more than one type of cargo present in the shipment;



FIG. 10 illustrates how currently scanned images may be visually compared with images from the database of the present specification to determine if cargo matches the manifest; and



FIG. 11 illustrates the segregation of cargo into various cargo types based upon scanned images.





DETAILED DESCRIPTION

In one embodiment, the present specification discloses a system for automatically presenting manifest information when a cargo container or a light vehicle is being inspected using non-intrusive X-ray imaging techniques. This allows the operator or inspector to quickly ascertain and verify the contents of the cargo container or vehicle that is currently being inspected.


In one embodiment, manifest data is imported via an application integrated with an X-ray detection system deployed at checkpoints or service posts. In one embodiment, the application works within the framework of a distributed network, wherein a service post is connected to a regional center, whereby an operator can analyze the X-ray image of the cargo in conjunction with the manifest data. When the X-ray image and manifest data has been analyzed, the service post which performed the non-intrusive X-ray scan will be notified automatically by the application integrated with the X-ray system. This allows the service post operator to make a decision to either release the cargo or to hold the cargo for further inspection.


The present specification discloses multiple embodiments. The following disclosure is provided in order to enable a person having ordinary skill in the art to practice the invention. Language used in this specification should not be interpreted as a general disavowal of any one specific embodiment or used to limit the claims beyond the meaning of the terms used therein. The general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the invention. Also, the terminology and phraseology used is for the purpose of describing exemplary embodiments and should not be considered limiting. Thus, the present specification is to be accorded the widest scope encompassing numerous alternatives, modifications and equivalents consistent with the principles and features disclosed. For purpose of clarity, details relating to technical material that is known in the technical fields related to the invention have not been described in detail so as not to unnecessarily obscure the present invention.


One of ordinary skill in the art would appreciate that the features described in the present application can operate on any computing platform including, but not limited to: a laptop or tablet computer; personal computer; personal data assistant; cell phone; server; embedded processor; DSP chip or specialized imaging device capable of executing programmatic instructions or code.


It should further be appreciated that the platform provides the functions described in the present application by executing a plurality of programmatic instructions, which are stored in one or more non-volatile memories, using one or more processors and presents and/or receives data through transceivers in data communication with one or more wired or wireless networks.


It should further be appreciated that each computing platform has wireless and wired receivers and transmitters capable of sending and transmitting data, at least one processor capable of processing programmatic instructions, memory capable of storing programmatic instructions, and software comprised of a plurality of programmatic instructions for performing the processes described herein. Additionally, the programmatic code can be compiled (either pre-compiled or compiled “just-in-time”) into a single application executing on a single computer, or distributed among several different computers operating locally or remotely to each other.



FIG. 1 illustrates the architecture of a distributed inspection network that uses non-intrusive X-ray scanning. The components of system architecture are described as follows:


Service Post and Regional Center


Referring to FIG. 1, service post 101 is the point where a non-intrusive X-ray scan is performed. In one embodiment, manifest data is imported via an application integrated within an X-ray inspection system deployed at a checkpoint or service posts. It should be noted herein that one exemplary scanning and inspection system that may be employed with the systems and methods of the present invention includes, but is not limited to the Rapiscan Eagle Mobile inspection system. Any suitable system for inspecting cargo, cargo containers, and their contents may be employed. As such, U.S. patent application Ser. Nos. 12/780,910; 13/370,941; 13/548,873; 13/532,862; 13/168,440; 13/175,792; 13/433,270; 13/281,622; 13/108,039; 12/675,471; 12/993,831; 12/993,832; 12/993,834; 12/997,251; 12/919,482; 12/919,483; 12/919,484; 12/919,485; 12/919,486; 12/784,630; 12/784,465; 12/834,890; 13/009,765; 13/032,593; 13/368,178; and Ser. No. 13/368,202, all assigned to the assignee of the present invention represent various systems that may be employed with the present invention and are herein incorporated by reference in their entirety. In addition, U.S. Pat. Nos. 5,638,420; 6,542,580; 7,876,879; 7,949,101; 6,843,599; 7,483,510; 7,769,133; 7,991,113; 6,928,141; 7,517,149; 7,817,776; 7,322,745; 7,720,195; 7,995,705; 7,369,643; 7,519,148; 7,876,879; 7,876,880; 7,860,213; 7,526,064; 7,783,004; 7,963,695; 7,991,113; 8,059,781; 8,135,110, 8,170,177; 8,223,919; and 8,243,876 all assigned to the assignee of the present invention represent various screening systems that may be employed with the present invention are herein incorporated by reference in their entirety.


Service post 101 further comprises at least one, and preferably a set, of non-intrusive inspection (NII) servers 111 through which the service post interfaces with other components of the system. After scanning, the operator responsible for controlling or operating service post 101 can verify that the X-ray image produced by the non-intrusive X-ray scan is of sufficient quality to be effectively analyzed. In one embodiment, the image analysis is performed at the regional center 102. In one embodiment, if the image is incomplete, or is corrupted, black (from attenuating cargo) or is unacceptable in any manner, the service post operator may request a rescan. This can happen in cases where the time between the scan and analysis is close and the truck is still available.


The servers 111 at the service post 101 comprise standard non-intrusive inspection software. When a vehicle is about to be scanned, the software at the service post queries a predicative or routing software application 103 to receive an instruction, routing information, or any other data to identify a target regional center for analysis. The regional center 102 comprises servers 121 and inspection monitors 122. As a new X-ray image is generated at the service post 101, it is transmitted onward from service post 101 to at least one server 121 located at a regional center 102, pursuant to routing information received from the software application 103, for analysis by an inspection operator located at that regional center and for subsequent storage. It should be appreciated that, typically, the regional center 102 and service posts 111 are geographically remote from each other.


In one embodiment, the image is allocated to a regional center and/or an operator within that regional center via the predictive or routing software 103, but the work is only allocated after the image transmission is complete. In one embodiment, to streamline the data transmission activity, predictive software 103 allocates an image to a regional center 102 before the image has been completely generated.


In one embodiment, in the event of the operator becoming unavailable, such as due to PC failure, log off, etc., another operator in the local regional center is selected automatically by the predictive software 103.


Further, the system will fall back on an alternative regional center in the event of a transmission error. In one embodiment, images are buffered until a center comes back on line.


In one embodiment, each X-ray inspection image is associated with a GUID (Globally Unique Identifier), which is a unique ID across all systems. The GUID is used for associating each image with its particular manifest data. In one embodiment, identifying information, such as license plate, CCTV images etc. are also associated with the GUID at the time of scanning. In one embodiment, the GUID is a 128-bit number displayed in hexadecimal. This information may be transmitted to the inspection operators at the regional center, if required.


When the X-ray image and manifest data have been analyzed, the service post 101 which performed the non-intrusive X-ray scan is notified automatically by means of a data transmission from a software application referred to herein as CertScan 105. The CertScan application presents an interface to the operator at the service post 101, which shows the operator a rolling status of all non-intrusive X-ray scans performed at that service post, along with relevant data to allow the service post to either release the cargo or to hold it for further inspection. In one embodiment, the relevant data includes license plate number, work order number, and results of scan. The CertScan application system is also responsible for importing the manifest data associated with the cargo or vehicle being scanned. In one embodiment, manifest data can come in one or more of several forms, such as but not limited to a) a hardcopy of the manifest; b) from a computer owned and connected to the customer database; or c) from a customer database accessed directly by CertScan. The format in which manifest data is supplied depends on the customer, and their local requirements and regulations. This is described in greater detail below with respect to the Collection of Manifest Data.


Predictive Software


The predictive software operates to optimally balance the load distribution of image analysis among multiple regional centers and operators. The predictive software processes metadata from the regional centers and service post connectors to analyze and predict the best distribution of images to operators. For example, predictive software 103 uses historical metadata on inspection queue lengths, workload, contention time and a randomization factor to varying degrees, to allocate work to regional centers and individual operators.


Logging and Validation


At various stages of the process, the system provides localized and centralized logging, auditing, and accounting for each X-ray scanning operator and X-ray image inspection analyst action. Centralized logging is provided at the data center 104. During all steps of the process, from scanning, through inspection to search, the system provides a journal of actions for each non-intrusive X-ray scan and X-ray image inspection analysis.


Inspection Performance and Metrics


In one embodiment, the system records several X-ray image inspection metrics, such as image coverage, tools used, mean time to inspect, time pending, among other variables. These metrics can yield information for operators/image analysts such as what tools were used (for example, zoom, contrast, brightness, and other parameters), how long it took to analyze the image, and/or what part of the image was analyzed using tools. This information can then be applied to measure attentiveness and diligence of operators. For example, this information may be reviewed for each X-ray image inspection analyst, and is useful in training, review and performance evaluation. In one embodiment, inspection metrics may be measured quantitatively and be assigned minimum and maximum values, against which the operators' performance may be evaluated.


Besides helping to assess the proficiencies of the analysts, data logs also allow an assessment of inspection volumes at regional centers and the speed at which analyses are performed.


In one embodiment, the system provides for secondary X-ray image inspection, for a percentage of images, or if required on targeted users. That is, if required in certain cases, the X-ray image inspection process is repeated twice to cross-check results. The second X-ray image inspection can be assigned to either a purely random X-ray image scanning operator, or to nominated workstations for quality and training purposes, in various embodiments. The final X-ray image inspection result would not be sent to the service post until both inspections are complete. If either result is “suspicious”, the suspicious result would be recorded, and any disagreement would be flagged.


In one embodiment, training images may be inserted into the workflow to pass on suspicious images to operators as part of their standard workload. The system then carefully segregates the results from these images, without the X-ray scanning operator knowing the difference. This allows for discrete and impromptu training of operators.


If a suspicious finding is communicated back to the service post, the operators can choose to manually open and search the suspicious cargo. In one embodiment, the system allows the operators to record detailed comments about the manual search process, which can provide both useful information about the suspicious cargo and useful feedback to trainers.


CertScan Software Application


Still referring to FIG. 1, the primary goal of the CertScan application 105 is to present manifest information clearly for the non-intrusive X-ray image analysis inspector to quickly ascertain the contents of the cargo container or light vehicle that is currently being inspected. The application 105 runs on an application server 151 and interfaces with a master database 152. In one embodiment, the manifest information and related data that the CertScan application 105 provides may be imported into the master database 152 through any suitable means, such as EDI (Electronic Data Interchange), web services, or OCR scanning of manifest documentation. The manifest information that is provided by these sources includes, but is not limited to, the following data elements:


Container Number


Arrival Date


Shipping Line


Bill of Lading Number


Port of Origin


Exporter


Consignee


Container Manifest


Besides use in security inspections, additional related data captured in the CertScan application database 152 may be used for internal statistical analysis, financial forecasting and operational reporting. In one embodiment, application 105 generates various reports, including daily, weekly, and monthly data related to the expected arrival dates of cargo containers and light vehicles, as well as data regarding actual cargo containers and light vehicles scanned. In one embodiment, captured data further includes information such as the number of containers scanned at each site, average to analyze a scan, scans without supporting data, number of scans with threats and without threats, etc. In one embodiment, this data is presented in real time on an user interface, referred to herein as ‘Dashboard.


In one embodiment, the use of the CertScan system is extended to provide reporting through online customer portals or electronic data exchange. Additionally, CertScan may also be extended to provide web services for supporting “cloud” type solutions. In one embodiment, web services include obtaining manifest data and publishing or transmitting results of the scan along with any anomalies noted. These additional features are all value-added services for the security scanning system. Thus, the reports provided by the CertScan application may be coupled with x-ray images (JPG) which are produced by the scanning software, to create a combined reporting package. These reports may be provided to customers for their own analysis and audit purposes.



FIG. 2 is a diagram presenting the overall system architecture of the CertScan application (shown as 105 in FIG. 1), according to one embodiment of the present invention. The hardware for running the CertScan application 200 includes an application server 201 and a master database 202. The CertScan application provides manifest data to the regional center 203, which is used by the operator in conjunction with the scanned X-ray image to analyze and determine the disposition of the cargo or light vehicles. In one embodiment, each regional center has a graphical user interface (GUI), the CertScan Application Dashboard or CertScan Dashboard, which shows the analyst all the non-intrusive X-ray scans ready for analysis. Using the CertScan Application Dashboard, the image analyst can select the X-ray Image to be analyzed. At the time of selection, CertScan Dashboard displays the cargo and light vehicle manifest data along with its X-ray image. Once adjudication has been determined, the image analyst records the result in a database associated with the CertScan Application. The CertScan Dashboard at the service post 204 which performed the X-ray scan is then updated with the result. The result allows the service post operator to take appropriate action of releasing or holding for further inspection the cargo and light vehicles.


As mentioned earlier, scan images are packaged with metadata and sent from service post 204 to a data center 205 and regional center 203. The metadata is also processed and loaded into CertScan master database 202. In one embodiment, the scan images and metadata are packaged together as a scant transaction file 206, with a ‘.stf’ extension, for easy communication between the service post, regional center, data center and the CertScan application database. In one embodiment, metadata includes information such as time of scan, the operator ID, and whether a rescan is required. This data helps establish how long it takes to transmit images and how long it takes to analyze a scan. This information also enables work quality monitoring and statistical reporting.


In one embodiment, the CertScan primary application is a web-based application which resides at the data center 205. The CertScan Dashboard in the data center displays all non-intrusive X-ray scan being performed and all regional centers, as well as all status information. The data center also serves as the storage location for all X-ray images.


In one embodiment, the CertScan Application is externally integrated with web services 207, which may be used to generate reports as described earlier. In one embodiment, the CertScan application is integrated with the inspection software to provide a comprehensive solution for efficient non-intrusive X-ray inspection.


Collection of Manifest Data


As described above, manifest data can come in one or more of several forms, such as but not limited to a) a hardcopy of the manifest; b) from a computer owned and connected to the customer database; or c) from a customer database accessed directly by CertScan. In one embodiment, the CertScan Application accepts cargo and light vehicle manifest data in multiple formats including, but not limited to:


Electronic Data Interchange


Formatted Data Files (Fixed Width or WL)


Transportation Management System Interfaces


2D Bar Code Reader


Manifest Documentation


Some methods, such as Electronic Data Interchange (EDI) of formatted data files may be preferred to facilitate faster import of data into the CertScan master database before the cargo arrives. When using EDI to acquire the cargo container and light vehicle data provided by the customer, data integration is accomplished by importation of a formatted flat file. However the application is designed to support other data exchange formats that are widely accepted by Freight Management Systems (FMS) standards, web services, or OCR scanning of manifest documentation. One of ordinary skill in the art would appreciate that the system may be configured to accept additional or other forms of manifest input.


In one embodiment, a lack of manifest information may be used to detect hidden compartments and contraband such as weapons, nuclear materials, among other contraband. More specifically, in one embodiment, incomplete or otherwise inadequate manifest information may be indicative of cargo that requires further inspection.


Thus, in one embodiment, the present specification includes systems and methods for automatically and rapidly detecting the presence of high-atomic-number (high-Z) materials such as nuclear materials; nuclear weapons; and, shielding materials that may be used to shield radiation emitted by such materials as well as by radiological dispersal devices, which can prevent them from being detected by radiation detectors. The present specification also includes the detection of other types of high-Z materials that may be smuggled in cargo due to their value, such as gold and platinum bullion, and works of art and antiquities containing high-Z materials.


The present specification therefore advantageously employs a threat detection algorithm that uses physical properties such as material density, mass absorption coefficient, and dimension to determine whether high-Z materials are present in the cargo.


The threat detection method and algorithm requires a much shorter analysis time and, thus, allows for higher system throughput compared to a conventional system, which requires an inspector manually reviewing the image or cargo for objects that are highly attenuating. For example, if multiple objects that are highly attenuating are identified, the inspector would need to make contrast enhancements with each object using a computer and input device, such as mouse. Each object has to then be evaluated for its total attenuation (or transmission) value by using the computer to select a region of interest within the object and making an estimate of the average attenuation (or transmission) value, which reflects the total attenuation (or transmission) along the X-ray path through the cargo. Before the net attenuation (or transmission) of the object can be estimated, the attenuation (or transmission) of the surrounding background material has to be analyzed. Then, to generate an average net attenuation (or transmission) of the object, the background must be subtracted from the total attenuation (or added to the transmission). Finally, the inspector must examine the shape and size of the object, and combine these estimates with the estimated net attenuation (or transmission) to reach a conclusion of whether the object represents a threat. This procedure would have to be repeated for each object and, therefore, if performed accurately, would be a very time-intensive procedure.


The threat detection process described in the present specification, in one embodiment, operates by first receiving, on a computing platform, a radiographic image of an object from an X-ray imaging system which typically comprises a radiation source positioned opposite to, or away from, a detector array. At least part of the area bounded by the radiation source and detector array is an inspection region, through which the cargo being inspected passes, or is positioned. In one embodiment, the screening system acquires the original image, which is then processed by the methods described herein. The X-ray imaging system is in electrical communication, either wired or wirelessly, with the computing platform. The threat detection algorithm then performs a first level analysis to generate a first “suspicious object” binary map by measuring a number of physical attributes. Each area on the initial binary map is used as a mask to electronically crop out part of the X-ray radiographic image for analysis, including its surrounding background attenuation (or transmission) and physical characteristics such as attenuation, size, and shape. Then, a decision is made of whether that area or portion could represent a high-Z object. This decision process results in a second binary map, which highlights those regions that represent potential high-Z threats.


In using the threat detection method and algorithm with the methods of the present specification the threat or no-threat decision time ranges from typically less than one second for cargo determined not to have any suspicious objects, to less than approximately 5 seconds for cargo having a plurality of objects or areas of interest. U.S. patent application Ser. No. 12/780,910, entitled “Systems and Methods for Automated, Rapid Detection of High Atomic Number Materials” is herein incorporated by reference in its entirety.


Dashboard for Real-Time Updates


As mentioned earlier, data is presented by the CertScan application in real time through a GUI referred to herein as a “Dashboard”. The CertScan Dashboard preferably runs on all the three components of the system—the service post, the regional centers and the data center. In one embodiment, the CertScan Dashboard displays a rolling list of non-intrusive X-ray scans, with data elements that are appropriate for each of the three locations.


In one embodiment, the CertScan application controls the flow of all X-ray image manifest data to ensure all three components have the content and data necessary to carry out their operations.


Service Post Dashboard



FIG. 3 illustrates an exemplary GUI (Dashboard) for the service post that is provided by the CertScan Application. This GUI has the goal of providing the service post operator with the optimal information to assist in deciding if the cargo being scanned is to be released or held for further inspection. Referring to FIG. 3, the data displayed on the Service Post Dashboard may include the container ID number 301, scan start time 302 and scan end time 303, time of start 304 and time of completion 305 of analysis of image and data at the regional center, the status (result) 306, as conveyed by the regional center, and comments 307, if any from the regional center analyst. In one embodiment, the status or result 306 is indicated visually and by means of color coding. Thus, for example, green 306a may indicate ‘ready to clear’, red 306b may indicate the need for manual or visual inspection, blue 306c may indicated ‘under analysis’, and yellow 306d may represent already ‘cleared’.


The CertScan Dashboard located at the service post need not display any information about which regional center performed the X-ray image analysis or the identity of the image analyst who performed the analysis.


Regional Center Dashboard


This CertScan Dashboard aims to provide the regional center image analyst with the information required to quickly and efficiently analyze the X-ray image for potential threats or contraband, and enables the analyst to record the results of the image inspections.


The image analyst uses the CertScan Dashboard to select an X-ray scan ready for analysis. The CertScan Dashboard located at the regional center does not display any information about which service post performed the non-intrusive X-ray scan or the identity of the service post operator who performed the X-ray scan.


In one embodiment, CertScan application interface for the image analyst is designed to be easy to use, and presents manifest information in a manner such that the analyst requires minimal time to evaluate the cargo container and light vehicle manifest data and record scan results.


The CertScan user interface at the regional center is integrated with the inspection software to retrieve the cargo container and light vehicle manifest information once the X-ray scan is complete. An exemplary interface presenting the manifest information to the image analysis inspector is shown in FIG. 4. Referring to FIG. 4, the interface screen provides manifest data such as shipper ID 401, container number 402, expected date of arrival of shipment 403, type (size) of container 404, and names of the exporter 405 and the consignee 406. The screen also includes a manifest table 407 which provides data such as description of item (contents), harmonized tariff schedule (HTS), item unit, and unit quantity.


The X-ray image analysis inspector can thus verify if information about the cargo container and light vehicle matches with the scanned images. The image analysis inspector can then record the inspection result in the interface screen, using the color coded result buttons 408. In most cases the result will be ‘Cleared’, which is represented by a green button in one embodiment. However, there may be instances where certain areas in the X-ray Image cannot be identified clearly or it is identified that contents that could be harmful. In these cases there are two other results which can be recorded—‘Irregularity’ or ‘Possible Threat’, represented by yellow and red respectively, in one embodiment. In one embodiment, blue color is used to indicate ‘Rescan required’ in case the image is unreadable. This may happen, for example, due to an environmental condition which may affect the quality and clarity of the X-ray image. In this case the cargo and vehicle under inspection need to be scanned again.


Data Center Dashboard


The data center uses the CertScan Dashboard to select an X-ray scan at any point of its lifecycle. The CertScan Dashboard located at the data center displays comprehensive information about the service posts performing the non-intrusive X-ray scan and the regional center where analysis of the X-ray image is being performed.


The CertScan application user interface screens for the Data Center provides all the functionality of the regional center, plus other functions. FIG. 5 shows an exemplary user interface screen for the data center. Referring to FIG. 5, the interface allows the dater center personnel to search for past scan records 501 as well as un-scanned cargo 502 whose manifest data is loaded in the system. The operator may also search for specific details of a cargo by container number 503 or by arrival date range 504. The search yields records for the specific container, which include data such as container type 505, shipper name 506, vessel name 507, expected arrival date 508, scan date 509 and scan results 510.



FIG. 6 illustrates another exemplary screen for the data center that shows completed scans. Referring to FIG. 6, scan records may be filtered by shipper name 601, or other attributes, such as consignee name, exporter name, date of arrival, among other parameters. In one embodiment, the completed scan records include container number 602, shipper name 603, vessel name 604, voyage number 605, and expected arrival date 606.


One of ordinary skill in the art would appreciate that all the interface screens may be customized to meet the customer's needs, and data may be selected for display accordingly.


System Logging


In one embodiment, the CertScan application performs logging of all activities throughout the full non-intrusive X-ray scanning operation. The application log provides information and reports such as:


Timings related to the non-intrusive X-ray scan process


CertScan Application performance monitoring


CertScan Application system health


CertScan Application error traps


One of ordinary skill in the art would appreciate that CertScan application log data may be used for internal system monitoring as well as for reporting based on customer needs.


The applications of the present inventions may be extended to security inspection at ports, borders, aviation checkpoints as well as supply chain security. The system can import manifest data from a port, border or aviation data management system, as the case may be, and compare the obtained information with image of container. In one embodiment, the system of present invention automatically applies detection algorithms to the image and provides alerts to operator, if there are any mismatches with the manifest. This ‘Operator Assist’ function enables the security personnel to identify threats or other contraband more efficiently, and they can determine if de-vanning or opening the container is required. In one embodiment, multiple operators work in a matrix or networking environment and review the alarms generated automatically by the system. The operators then decide to clear or further investigate the alarms. The application of the system may be extended to supply chain security, where devices that are capable of sending messages through cell phones or satellite networks, may be attached to pallets and containers. These devices may be used to send alarms remotely to a central monitoring station, along with X-ray and video images if there is an alarm.


One of ordinary skill in the art would appreciate that although the process of an operator inspecting an image to verify that the cargo matches the manifest is much more efficient than manually opening the container, it still requires significant labor. The labor-intensive nature of the problem is even more evident in applications such as inspecting each railcar in a long train with hundreds of railcars and trying to identify thousands of cargo types. Often, it is difficult to identify the cargo from the numerous images in such cases.


To address this problem, in another embodiment, the present invention is directed towards the analysis of images generated by non-intrusive cargo inspection systems with the goal of improving the efficiency of the process to verify that cargo matches the manifest.


For the purpose of this specification, cargo manifest is defined as a manifest that lists all cargo codes carried on a specific shipment. Further, cargo codes may be standard, also known as harmonization codes, or may be provided by various local custom agencies and may be different depending on the jurisdiction.


In one embodiment, predetermined image features of inspected cargo with an associated cargo code are computed and compared with features associated with the same cargo code saved in a database. The comparison results in a probability that the inspected cargo matches the declared cargo in the manifest. If the probability is greater than a predetermined threshold, the cargo will be declared as matching the manifest. Otherwise, the cargo does not match the manifest. In another embodiment, the probability is presented to the operator and the operator makes the decision. These processes are illustrated by means of flowcharts in FIGS. 7, 8 and 9.


Referring to FIG. 7, the process of preparing a features database is shown. In the first step 701, the system obtains the image of the container. The image is obtained through non-intrusive scanning at any of the service posts, as described above. It should be understood by those of ordinary skill in the art that the radiographic images could be generated by low, medium or high-energy X-rays, gamma rays, neutrons or other type of radiation. The images could also contain atomic-number information generated from any modality of dual-energy or dual-species inspection. The images could be generated by one or more views and could be three dimensional reconstructed from the views.


After obtaining the image, the system obtains cargo code associated with the image, as shown in step 702. Cargo codes are obtained from manifest data, as described above. Thereafter, features of the image are computed, in step 703. Computed features and their standard deviation are then saved in the database along with the number of images used to compute the features, and are associated with that cargo code, as shown in step 704.


The features include, but not limited to, attenuation, texture, atomic number, and/or cargo height. For tomographic and multi-view systems, density is also a useful feature. This also would include elemental composition or features derived from the composition for neutron-based interrogation. It should be understood by those of ordinary skill in the art that other features not listed here could be used to match the cargos.


In the next step 705, the system checks if any entries for that cargo code are already stored in the database. If so, the system combines features from the containers with same cargo code. This is shown in step 706. The combination of the feature values takes into account the number of images used to compute the feature value and is weighted accordingly. Also, the user is notified of outlier feature values (values that are outside the three standard deviations or other selected range) for acceptance before the combination takes place. Thereafter the combined set of features for that particular cargo code is saved in the database, as shown in step 707. Thus, the features saved in the database per cargo code are computed from a combination of feature values from a large number of cargo images with same cargo code. The feature values are updated as additional cargo images are collected. Additional features can also be used computed as their usability becomes available.



FIG. 8 illustrates a method for performing cargo-manifest verification for an individual cargo container. In the first step 801, an image captured at a service post is associated with one or more cargo codes, depending on the contents of the shipment as defined in manifest data. Then, the features of the image are computed, in step 802. Thereafter, the system obtains features for that cargo code stored in a database, and compares them to the computed features. This is shown in step 803. The system then determines the probability ‘P’ that cargo matches manifest, in step 804. Probability ‘P’ is then compared to a threshold value in step 805. If ‘P’ is greater than the threshold value, it implies that cargo matches manifest information declared, as shown in step 806. If ‘P’ is less than the threshold value, it indicates that the contents of the cargo are not the same as declared in the manifest, as shown in step 807.


In one embodiment, the threshold value may be determined in accordance with the user's preferences. For example, if custom office is using the system and they want to detect most contraband even at the expense of higher false alarm rate, they may be able to set a high threshold value, such as 90%. Conversely, if the custom agency does not want to have a high false alarm rate, they can choose to set a low threshold value, such as 60%. Further, the customer may decide that some categories of goods are more important, such as those associated with higher duties, than others and place different thresholds for different types of goods.


Further, before flagging cargo, a predetermined minimum set of images may be used to compute the features. The customer may decide that the features database is complete and more images do not need to be used. In this case, there is no need to add more images to the database. However, if the database did not use enough images, or the customer wants to improve the accuracy of detection, an authorized operator can request to add more images to the database. The operator should have a high confidence that the cargo matches the manifest, which is generally achieved with experience with the type of cargo coded in the manifest or a manual inspection and verification of the container contents.


When a shipment contains more than one type of cargo, the image is analyzed for different types of cargo and segregated. This process is illustrated in FIG. 9. Referring to FIG. 9, the system first associates the image of scanned cargo with manifest information in step 901. The image is the analyzed to determine if there are multiple cargos, in step 902. The system then segregates each cargo type, as shown is step 903. The segregation of cargo types is discussed in greater detail with respect to FIG. 11. The features for each cargo type are then computed in step 904 and compared in step 905 with the feature values stored in the database for each cargo type listed in the manifest. A list of probabilities for each segregated cargo is then produced. Thus, ‘Pi’ is the probability that ith cargo matches with the declared manifest. This is shown in step 906.


Each ‘Pi’ is then compared to the threshold value, as shown in step 907. One of ordinary skill in the art would appreciate that since there are more than one type of cargos, there may be more than one threshold value for comparison. The system checks if Pi is more than the threshold value for all “i” in step 908. If Pi is more that the threshold value for all “i”, it is determined that the cargo matches the manifest, as shown in step 909. Otherwise, if one or more segregated cargos do not match features for one of the cargo codes in the manifest, the cargo(s) will be assigned as not matching the manifest and all cargos that do not match the manifest are listed. This is shown in step 910. Alternately, the probabilities for each segregated cargo may be displayed to the operator for decision.


In one embodiment, an operator can separate the cargo visually and/or with the help of tools, such as a “rubber band” type of tool. In another embodiment, cargo may be automatically segmented and features of the different parts of the cargo may be computed, as shown in FIG. 11. Segmented regions with similar features are assumed to be same cargo. Thus, on the basis of features cargo in image 1100 of FIG. 11 may be segregated into Type 11101 and Type 21102.


In another embodiment, the operator inspects the image of a container with associated manifest. The operator then requests to retrieve from the image database a number of images of cargo with same cargo code. The operator compares the images visually and/or aided with various image manipulation tools to determine whether the cargo matches the manifest. If the manifest lists more than one cargo code, the operator would request images for each cargo code for comparison.


Another method to assist the operator for determining whether a cargo image matches the manifest is to retrieve a number of images from the image database that have the same cargo type. This is shown in FIG. 10, wherein the current image 1001 of the cargo can be visually compared by the operator with images 1002 of the same cargo type from database. Additional assistance is provided by displaying values of various cargo features of the current and previously imaged cargo. In the example, shown, and by way of example only, the current image 1001 is different from the database images 1002. Thus, the operator should make a decision that the cargo does not match the manifest, because the current image is different from those in the database.


The above examples are merely illustrative of the many applications of the system of present invention. Although only a few embodiments of the present invention have been described herein, it should be understood that the present invention might be embodied in many other specific forms without departing from the spirit or scope of the invention. Therefore, the present examples and embodiments are to be considered as illustrative and not restrictive, and the invention may be modified within the scope of the appended claims.

Claims
  • 1. A method for inspecting cargo, wherein the cargo is associated with descriptive information about the cargo, comprising: generating a plurality of features, stored in a non-transient computer memory, wherein each of the plurality of stored features is determined by combining values indicative of features acquired from a plurality of scanned images that have been previously generated and stored in the non-transient computer memory;scanning the cargo using at least one X-ray inspection system for performing an X-ray scan, wherein the at least one X-ray inspection system is configured to generate data representative of one or more X-ray scan images from the X-ray scan;receiving, on at least one computing device, data representative of the one or more X-ray scan images from the X-ray scan;analyzing, using at least one computing device, at least a portion of the data representative of the one or more X-ray scan images to determine whether a feature of the cargo sufficiently corresponds to one or more of the plurality of stored features;generating, using the at least one computing device, a status based on whether the cargo sufficiently corresponds to the descriptive information about the cargo; andapplying a threat detection process by generating a first map based on a plurality of attributes and using the first map to electronically alter a portion of the one or more X-ray images.
  • 2. The method of claim 1, wherein the plurality of stored features is associated with one or more cargo codes.
  • 3. The method of claim 2, further comprising using descriptive information about the cargo to determine at least one cargo code of the one or more cargo codes.
  • 4. The method of claim 1, further comprising using at least one of an electronic data interchange, a web service, or a bar code reader to obtain the descriptive information about the cargo.
  • 5. The method of claim 1, further comprising scanning manifest documentation to generate the descriptive information about the cargo.
  • 6. The method of claim 1, further comprising generating the descriptive information about the cargo based upon digital data representative of manifest documentation.
  • 7. The method of claim 1, wherein the descriptive information about the cargo comprises at least one of a container number, arrival date, shipping line, bill of lading number, port of origin, exporter, consignee, or container manifest data.
  • 8. The method of claim 1, further comprising generating, using the at least one computing device, a display of the descriptive information about the cargo together with the data representative of one or more X-ray scan images from the X-ray scan.
  • 9. The method of claim 1, wherein the plurality of stored features comprises data indicative of at least one of density, attenuation, texture, atomic number, or cargo height.
  • 10. The method of claim 1, further comprising creating a file comprising the data representative of one or more X-ray scan images from the X-ray scan and metadata associated with the X-ray scan, wherein the metadata comprises at least one of a time of the X-ray scan, an identifier of an operator or data indicating whether a rescan is required.
  • 11. The method of claim 1 further comprising generating a second map, wherein the second map highlights a region in the one or more X-ray images that may represent a threat.
  • 12. The method of claim 1, further comprising updating values indicative of the plurality of stored features as additional images are obtained.
  • 13. The method of claim 1, further comprising segmenting the one or more X-ray scan images and determining features of a segmented region of the one or more X-ray scan images.
  • 14. A method for inspecting cargo, wherein the cargo is associated with descriptive information about the cargo, comprising: receiving at least a portion of data representative of one or more X-ray scan images generated from an X-ray scan in at least one computing device;receiving, at the at least one computing device, data representative of the descriptive information about the cargo;analyzing, using the at least one computing device, the at least a portion of the data representative of the one or more X-ray scan images to determine whether the cargo comprises more than one type of cargo by applying the values indicative of features to the at least a portion of the data representative of the one or more X-ray scan images;identifying more than one type of cargo present in the at least a portion of the data representative of the one or more X-ray scan images;analyzing the descriptive information about the cargo to determine if the more than one type of cargo is disclosed in the descriptive information about the cargo;generating a status based on whether the more than one type of cargo present in the at least a portion of the data representative of the one or more X-ray scan images sufficiently corresponds to the descriptive information about the cargo; andapplying a threat detection process by generating a first map based on a plurality of attributes and using the first map to electronically alter a portion of the one or more X-ray images.
  • 15. The method of claim 14, further comprising, prior to receiving at least the portion of data representative of the one or more X-ray scan images, generating values indicative of features determined from a plurality of X-ray scanned images.
  • 16. The method of claim 14, further comprising generating the descriptive information about the cargo based upon digital data representative of manifest documentation.
  • 17. The method of claim 14, further comprising scanning manifest documentation to generate the descriptive information about the cargo.
  • 18. The method of claim 14, further comprising using at least one of an electronic data interchange, a web service, or a bar code reader to obtain the descriptive information about the cargo.
  • 19. The method of claim 14, wherein the descriptive information about the cargo comprises at least one of a container number, arrival date, shipping line, bill of lading number, port of origin, exporter, consignee, or container manifest data.
  • 20. The method of claim 14, further comprising generating, using the at least one computing device, a display of the descriptive information about the cargo together with the data representative of the one or more X-ray scan images from the X-ray scan.
  • 21. The method of claim 14, further comprising forming a file comprising the data representative of one or more X-ray scan images from the X-ray scan and metadata associated with the X-ray scan, wherein the metadata comprises at least one of a time of the X-ray scan, an identifier of an operator, or data indicating whether a rescan is required.
  • 22. The method of claim 14, further comprising generating a second map, wherein the second map highlights a region in the one or more X-ray images that may represent a threat.
  • 23. The method of claim 14, further comprising segmenting the one or more X-ray scan images and determining features of a segmented region of the one or more X-ray scan images.
  • 24. A system for inspecting cargo, wherein the cargo is associated with descriptive information about the cargo, comprising: a non-transient computer memory for storing a plurality of features, wherein each of the plurality of stored features is generated by combining values indicative of features acquired from a plurality of scanned images that have been previously generated and stored in the non-transient computer memory;at least one non-intrusive X-ray inspection system for scanning the cargo, wherein the at least one X-ray inspection system is configured to generate data representative of one or more X-ray scan images from an X-ray scan of the cargo; and,at least one computing device configured to: receive data representative of the one or more X-ray scan images from the X-ray scan;analyze at least a portion of the data representative of the one or more X-ray scan images to determine whether a feature of the cargo sufficiently corresponds to one or more of the plurality of stored features;generate a status based on whether the cargo sufficiently corresponds to the descriptive information about the cargo; andapply a threat detection process by generating a first map based on a plurality of attributes and using the first map to electronically alter a portion of the one or more X-ray images.
  • 25. The system of claim 24, wherein the at least one computing device is configured to associate the plurality of stored features with one or more cargo codes.
  • 26. The system of claim 25, wherein the at least one computing device is configured to use descriptive information about the cargo to determine at least one cargo code of the one or more cargo codes.
  • 27. The system of claim 24, wherein the at least one computing device is configured to use at least one of an electronic data interchange, a web service, or a bar code reader to obtain the descriptive information about the cargo.
  • 28. The system of claim 24, wherein the at least one computing device is configured to generate the descriptive information about the cargo using imported manifest data.
  • 29. The system of claim 24, wherein the descriptive information about the cargo comprises at least one of a container number, arrival date, shipping line, bill of lading number, port of origin, exporter, consignee, or container manifest data.
  • 30. The system of claim 24, wherein the at least one computing device is configured to generate a display of the descriptive information about the cargo together with the data representative of one or more X-ray scan images from the X-ray scan.
  • 31. The system of claim 24, wherein the plurality of stored features comprises data indicative of at least one of density, attenuation, texture, atomic number, or cargo height.
  • 32. The system of claim 24, wherein the at least one computing device is configured to create a file comprising the data representative of one or more X-ray scan images from the X-ray scan and metadata associated with the X-ray scan, wherein the metadata comprises at least one of a time of the X-ray scan, an identifier of an operator or data indicating whether a rescan is required.
  • 33. The system of claim 24, wherein the at least one computing device, is configured to generate a second map on a display associated with the at least one computing device, wherein the second map highlights a region in the one or more X-ray images that may represent a threat.
  • 34. The system of claim 24, wherein the at least one computing device is configured to update values indicative of the plurality of stored features as additional images are obtained.
  • 35. The system of claim 24, wherein the at least one computing device is configured to segment the one or more X-ray scan images and determine features of a segmented region of the one or more X-ray scan images.
  • 36. A system for inspecting cargo, wherein the cargo is associated with descriptive information about the cargo, comprising: at least one computing device configured to: generate values indicative of features determined from a plurality of X-ray scanned images that have been previously generated and stored in a non-transient computer memory and store said values indicative of features in the non-transient memory associated with said computing device;receive at least a portion of data representative of one or more X-ray scan images generated from an X-ray scan performed by at least one non-intrusive X-ray inspection system;receive data representative of the descriptive information about the cargo;analyze the at least a portion of the data representative of the one or more X-ray scan images to determine whether the cargo comprises more than one type of cargo by applying the values indicative of features to the at least a portion of the data representative of the one or more X-ray scan images;identify more than one type of cargo present in the at least a portion of the data representative of the one or more X-ray scan images;analyze the descriptive information about the cargo to determine if the more than one type of cargo is disclosed in the descriptive information about the cargo;generate a status based on whether the more than one type of cargo present in the at least a portion of the data representative of the one or more X-ray scan images sufficiently corresponds to the descriptive information about the cargo; andapply a threat detection process by generating a first map based on a plurality of attributes and using the first map to electronically alter a portion of the one or more X-ray images.
  • 37. The system of claim 36, wherein the at least one computing device is configured to generate the descriptive information about the cargo using imported manifest data.
  • 38. The system of claim 36, wherein the at least one computing device is configured to use at least one of an electronic data interchange, a web service, or a bar code reader to obtain the descriptive information about the cargo.
  • 39. The system of claim 36, wherein the descriptive information about the cargo comprises at least one of a container number, arrival date, shipping line, bill of lading number, port of origin, exporter, consignee, or container manifest data.
  • 40. The system of claim 36, wherein the at least one computing device is configured to generate a display of the descriptive information about the cargo together with the data representative of the one or more X-ray scan images from the X-ray scan.
  • 41. The system of claim 36, wherein the at least one computing device is configured to create a file comprising the data representative of one or more X-ray scan images from the X-ray scan and metadata associated with the X-ray scan, wherein the metadata comprises at least one of a time of the X-ray scan, an identifier of an operator or data indicating whether a rescan is required.
  • 42. The system of claim 36, wherein the at least one computing device is configured to generate a second map on a display associated with the at least one computing device, wherein the second map highlights a region in the one or more X-ray images that may represent a threat.
  • 43. The system of claim 36, wherein the at least one computing device is configured to segment the one or more X-ray scan images and determine features of a segmented region of the one or more X-ray scan images.
CROSS-REFERENCE

The present application is a continuation application of U.S. patent application Ser. No. 16/248,547, entitled “Distributed Analysis X-Ray Inspection Methods and Systems” and filed on Jan. 15, 2019, which is a continuation application of U.S. patent application Ser. No. 15/455,436, entitled “X-Ray Inspection System That Integrates Manifest Data With Imaging/Detection Processing”, filed on Mar. 10, 2017, and issued as U.S. Pat. No. 10,422,919 on Sep. 24, 2019, which is a continuation application of U.S. patent application Ser. No. 14/739,329, of the same title, filed on Jun. 15, 2015, and issued as U.S. Pat. No. 9,632,206 on Apr. 25, 2017, which is a continuation application of U.S. patent application Ser. No. 13/606,442, of the same title, filed on Sep. 7, 2012, and issued as U.S. Pat. No. 9,111,331 on Aug. 18, 2015, which, in turn, relies on U.S. Patent Provisional Application No. 61/532,093, entitled “X-Ray Inspection System with Integration of Manifest Data with Imaging/Detection Algorithms” and filed on Sep. 7, 2011, for priority. The above referenced applications are incorporated herein by reference in their entirety.

US Referenced Citations (1073)
Number Name Date Kind
2636619 Alexander Apr 1953 A
3124679 Tittman et al. Mar 1964 A
3240971 Morgan Mar 1966 A
3275831 Martin Sep 1966 A
3374355 Parratt Mar 1968 A
3439166 Chope Apr 1969 A
3670164 Hardy et al. Jun 1972 A
3780291 Stein Dec 1973 A
3784827 Calhoun Jan 1974 A
3790785 Paolini et al. Feb 1974 A
3808444 Schneeberger et al. Apr 1974 A
3832545 Bartko Aug 1974 A
3835324 Weigle Sep 1974 A
3837502 Hornagold Sep 1974 A
3872287 Koeman Mar 1975 A
3904923 Schwartz Sep 1975 A
3980889 Haas Sep 1976 A
3997787 Fearon et al. Dec 1976 A
4020346 Dennis Apr 1977 A
4047036 Smith Sep 1977 A
4064440 Roder Dec 1977 A
4158773 Novak Jun 1979 A
4164138 Burkhart Aug 1979 A
4173010 Hoffmann Oct 1979 A
4217641 Naparstek Aug 1980 A
4229654 Arya Oct 1980 A
4239969 Galetta Dec 1980 A
4247774 Brooks Jan 1981 A
4251726 Alvarez Feb 1981 A
4255659 Kaufman Mar 1981 A
4338626 Lemelson Jul 1982 A
4366382 Kotowski Dec 1982 A
4379348 Haas Apr 1983 A
4379481 Juner Apr 1983 A
4383327 Kruger May 1983 A
4418575 Hundt Dec 1983 A
4430568 Yoshida Feb 1984 A
4470303 ODonnell Sep 1984 A
4480899 Sprague Nov 1984 A
4482958 Nakayama Nov 1984 A
4509075 Simms Apr 1985 A
4535246 Shani Aug 1985 A
4539648 Schatzki Sep 1985 A
4558220 Evans Dec 1985 A
4566113 Doenges Jan 1986 A
4573198 Anderson Feb 1986 A
4580219 Pelc Apr 1986 A
4590558 Glover May 1986 A
4598202 Koechner Jul 1986 A
4599740 Cable Jul 1986 A
4612666 King Sep 1986 A
4637056 Sherman Jan 1987 A
4651297 Schlunt Mar 1987 A
4653109 Lemelson Mar 1987 A
4658408 Amor Apr 1987 A
4697594 Mayo, Jr. Oct 1987 A
4709333 Crawford Nov 1987 A
4722096 Dietrich Jan 1988 A
4724543 Klevecz Feb 1988 A
4725733 Horman et al. Feb 1988 A
4736399 Okazaki Apr 1988 A
4736401 Donges Apr 1988 A
4737650 West Apr 1988 A
4755680 Logan Jul 1988 A
4756015 Doenges Jul 1988 A
4759047 Donges Jul 1988 A
4775895 Traupe Oct 1988 A
4783794 Dietrich Nov 1988 A
4788704 Donges Nov 1988 A
4793261 Schwaemmle Dec 1988 A
4795253 Sandridge Jan 1989 A
4817123 Sones Mar 1989 A
4819188 Matsubara Apr 1989 A
4832447 Javidi May 1989 A
4837733 Shiraishi Jun 1989 A
4838644 Ochoa Jun 1989 A
4841554 Doenges Jun 1989 A
4849912 Leberl Jul 1989 A
4862358 Kimura Aug 1989 A
4869574 Hartman Sep 1989 A
4870670 Geus Sep 1989 A
4873708 Cusano Oct 1989 A
4884289 Glockmann Nov 1989 A
4887899 Hung Dec 1989 A
4893015 Kubierschky Jan 1990 A
4916722 Ema Apr 1990 A
4933961 Rushbrooke Jun 1990 A
4941162 Vartsky Jul 1990 A
4955060 Katsuki et al. Sep 1990 A
4957250 Hararat-Tehrani Sep 1990 A
4973846 Lanza Nov 1990 A
4989229 Negrelli Jan 1991 A
5003616 Orita Mar 1991 A
5012917 Gilbert May 1991 A
5014293 Boyd May 1991 A
5018178 Katsumata May 1991 A
5020111 Weber May 1991 A
5022062 Annis Jun 1991 A
5034812 Rawlings Jul 1991 A
5041728 Spacher Aug 1991 A
5041993 Rawlings Aug 1991 A
5056130 Engel Oct 1991 A
5060249 Eisen Oct 1991 A
5063602 Peppers Nov 1991 A
5065418 Bermbach Nov 1991 A
5070519 Stein Dec 1991 A
5073782 Huguenin Dec 1991 A
5079698 Grenier Jan 1992 A
5091924 Bermbach Feb 1992 A
5098640 Gozani Mar 1992 A
5107351 Leib Apr 1992 A
5109276 Nudelman Apr 1992 A
5109691 Corrigan May 1992 A
5125015 Shimoni Jun 1992 A
5132811 Iwaki Jul 1992 A
5132842 Yeh Jul 1992 A
5132998 Tsutsui Jul 1992 A
5138167 Barnes Aug 1992 A
5150229 Takesue Sep 1992 A
5151588 Kiri Sep 1992 A
5162652 Cohen Nov 1992 A
5175756 Pongratz Dec 1992 A
5179581 Annis Jan 1993 A
5181234 Smith Jan 1993 A
5182764 Peschmann Jan 1993 A
5185778 Magram Feb 1993 A
5195629 Gottstein Mar 1993 A
5197088 Vincent Mar 1993 A
5198669 Namiki Mar 1993 A
5200626 Schultz Apr 1993 A
5202932 Cambier Apr 1993 A
5216541 Takesue Jun 1993 A
5237598 Albert Aug 1993 A
5239595 Takemura Aug 1993 A
5243664 Tuy Sep 1993 A
5247561 Kotowski Sep 1993 A
5257085 Ulich Oct 1993 A
5257322 Matsuoka Oct 1993 A
5259012 Baker Nov 1993 A
5268967 Jang Dec 1993 A
5283641 Lemelson Feb 1994 A
5297222 Mori Mar 1994 A
5298756 McCollum Mar 1994 A
5299116 Owens Mar 1994 A
5308986 Walker May 1994 A
5309244 Katagiri et al. May 1994 A
5309523 Iwaki May 1994 A
5311359 Lucas May 1994 A
5319544 Schmerer Jun 1994 A
5319547 Krug Jun 1994 A
5323004 Ettinger Jun 1994 A
5323472 Falk Jun 1994 A
5327286 Sampsell Jul 1994 A
5339350 Thelosen Aug 1994 A
5345081 Rogers Sep 1994 A
5345173 Bito Sep 1994 A
5363940 Fahrion Nov 1994 A
5365560 Tam Nov 1994 A
5365564 Yashida Nov 1994 A
5367552 Peschmann Nov 1994 A
5371542 Pauli Dec 1994 A
5375156 Kuo-Petravic Dec 1994 A
5376796 Chan Dec 1994 A
5379334 Zimmer Jan 1995 A
5379336 Kramer Jan 1995 A
5388684 Peck Feb 1995 A
5418380 Simon May 1995 A
5420788 Vissers May 1995 A
5425113 Ito Jun 1995 A
5428657 Papanicolopoulos Jun 1995 A
5430787 Norton Jul 1995 A
5434415 Terada Jul 1995 A
5464013 Lemelson Nov 1995 A
5465284 Karellas Nov 1995 A
5481584 Tang Jan 1996 A
5481622 Gerhardt Jan 1996 A
5483569 Annis Jan 1996 A
5485312 Horner Jan 1996 A
5490193 Kuroda Feb 1996 A
5490218 Krug Feb 1996 A
5493444 Khoury Feb 1996 A
5493517 Frazier Feb 1996 A
5493596 Annis Feb 1996 A
5503424 Agopian Apr 1996 A
5506880 Scardino Apr 1996 A
5519225 Mohr May 1996 A
5524133 Neale Jun 1996 A
5528702 Mitsuoka Jun 1996 A
5528703 Lee Jun 1996 A
5541856 Hammermeister Jul 1996 A
5546189 Svetkoff Aug 1996 A
5568256 Korner Oct 1996 A
5580471 Fukumoto Dec 1996 A
5589162 Muraoka Dec 1996 A
5591967 Moake Jan 1997 A
5592561 Moore Jan 1997 A
5595767 Cinquin Jan 1997 A
5600303 Husseiny Feb 1997 A
5600485 Iwaki Feb 1997 A
5600700 Krug Feb 1997 A
5604634 Khoury Feb 1997 A
5606167 Miller Feb 1997 A
5619596 Iwaki Apr 1997 A
5625192 Oda Apr 1997 A
5625717 Hashimoto Apr 1997 A
5629669 Asano May 1997 A
5638420 Armistead Jun 1997 A
5642393 Krug Jun 1997 A
5642394 Rothschild Jun 1997 A
5647018 Benjamin Jul 1997 A
5664574 Chance Sep 1997 A
5668846 Fox Sep 1997 A
5679956 Johnston Oct 1997 A
5680525 Sakai Oct 1997 A
5684565 Oshida Nov 1997 A
5692028 Geus Nov 1997 A
5692029 Husseiny Nov 1997 A
5692446 Becker Dec 1997 A
5698854 Gupta Dec 1997 A
5699400 Lee Dec 1997 A
5703921 Fujita Dec 1997 A
5706816 Mochizuki Jan 1998 A
5726449 Yoshiike Mar 1998 A
5739539 Wang Apr 1998 A
5740221 Norman Apr 1998 A
5745542 Gordon Apr 1998 A
5748305 Shimono May 1998 A
5748697 Tam May 1998 A
5754617 Itoh May 1998 A
5754621 Suzuki May 1998 A
5756875 Parker May 1998 A
5757981 Kawakubo May 1998 A
5761334 Nakajima Jun 1998 A
5764683 Swift Jun 1998 A
5764719 Noettling Jun 1998 A
5768334 Maitrejean Jun 1998 A
5777742 Marron Jul 1998 A
5778046 Molloi Jul 1998 A
5779641 Hatfield Jul 1998 A
5784429 Arai Jul 1998 A
5786597 Lingren Jul 1998 A
5787145 Geus Jul 1998 A
5794788 Massen Aug 1998 A
5796802 Gordon Aug 1998 A
5796868 Dutta-Choudhury Aug 1998 A
5799100 Clarke Aug 1998 A
5800355 Hasegawa Sep 1998 A
5802133 Kawai Sep 1998 A
5805660 Perion Sep 1998 A
5809171 Neff Sep 1998 A
5815198 Vachtsevanos Sep 1998 A
5815264 Reed Sep 1998 A
5828722 Ploetz Oct 1998 A
5828774 Wang Oct 1998 A
5834153 Hasegawa Nov 1998 A
5835558 Maschke Nov 1998 A
5835561 Moorman Nov 1998 A
5838758 Krug Nov 1998 A
5838759 Armistead Nov 1998 A
5841828 Gordon Nov 1998 A
5841907 Javidi Nov 1998 A
5842578 Cordeiro Dec 1998 A
5850465 Shimura Dec 1998 A
5862198 Samarasekera Jan 1999 A
5862258 Taylor Jan 1999 A
5864598 Hsieh Jan 1999 A
5866907 Drukier Feb 1999 A
5870449 Lee Feb 1999 A
5877849 Ramer Mar 1999 A
5881123 Tam Mar 1999 A
5893095 Jain Apr 1999 A
5894345 Takamoto Apr 1999 A
5895073 Moore Apr 1999 A
5901196 Sauer May 1999 A
5901198 Crawford May 1999 A
5903623 Swift May 1999 A
5909285 Beaty Jun 1999 A
5909477 Crawford Jun 1999 A
5909478 Polichar Jun 1999 A
5910765 Slemon Jun 1999 A
5910973 Grodzins Jun 1999 A
5911139 Jain Jun 1999 A
5917190 Yodh Jun 1999 A
5926568 Chaney Jul 1999 A
5933471 Kalvin Aug 1999 A
5936249 Eisen Aug 1999 A
5940468 Huang Aug 1999 A
5943388 Tuemer Aug 1999 A
5951474 Matsunaga Sep 1999 A
5953452 Boone Sep 1999 A
5958336 Duarte Sep 1999 A
5960104 Conners Sep 1999 A
5974111 Krug Oct 1999 A
5978440 Kang Nov 1999 A
5981949 Leahy Nov 1999 A
5987095 Chapman Nov 1999 A
5994706 Allen Nov 1999 A
6005916 Johnson Dec 1999 A
6008496 Winefordner Dec 1999 A
6009142 Sauer Dec 1999 A
6011266 Bell Jan 2000 A
6011620 Sites Jan 2000 A
6014628 Kovarik, Jr. Jan 2000 A
6018561 Tam Jan 2000 A
6018562 Willson Jan 2000 A
6031890 Bermbach Feb 2000 A
6035014 Hiraoglu Mar 2000 A
6043870 Chen Mar 2000 A
6049381 Reintjes Apr 2000 A
6056671 Marmer May 2000 A
6057761 Yukl May 2000 A
6057909 Yahav May 2000 A
6058158 Eiler May 2000 A
6058159 Conway May 2000 A
6060677 Ulrichsen May 2000 A
6070583 Perelman Jun 2000 A
6075591 Vokhmin Jun 2000 A
6075880 Kollhof Jun 2000 A
6076400 Bechwati Jun 2000 A
6078638 Sauer Jun 2000 A
6080994 Carrott Jun 2000 A
6081580 Grodzins Jun 2000 A
6084939 Tamura Jul 2000 A
6088423 Krug Jul 2000 A
6094472 Smith Jul 2000 A
6097427 Dey Aug 2000 A
6097483 Komatsu Aug 2000 A
6118850 Mayo Sep 2000 A
6149300 Greenway Nov 2000 A
6151381 Grodzins Nov 2000 A
6153873 Wolf Nov 2000 A
6155179 Aust Dec 2000 A
6157730 Roever Dec 2000 A
6163403 Carrott Dec 2000 A
6163591 Benjamin Dec 2000 A
6175417 Do Jan 2001 B1
6175613 Boutenko Jan 2001 B1
6188747 Geus Feb 2001 B1
6195413 Geus Feb 2001 B1
6195444 Simanovsky Feb 2001 B1
6198795 Naumann Mar 2001 B1
6205195 Lanza Mar 2001 B1
6205243 Migdal Mar 2001 B1
6216540 Nelson Apr 2001 B1
6218943 Ellenbogen Apr 2001 B1
6220099 Marti Apr 2001 B1
6222902 Lin Apr 2001 B1
6229872 Amos May 2001 B1
6233303 Tam May 2001 B1
6236704 Navab May 2001 B1
6236708 Lin May 2001 B1
6246778 Moore Jun 2001 B1
6249341 Basiji Jun 2001 B1
6249567 Rothschild Jun 2001 B1
6252929 Swift Jun 2001 B1
6255654 Verbinski Jul 2001 B1
6256370 Yavuz Jul 2001 B1
6256404 Gordon Jul 2001 B1
6263044 Joosten Jul 2001 B1
6263231 Reitter Jul 2001 B1
6266393 Ein-Gal Jul 2001 B1
6271510 Boxen Aug 2001 B1
6272204 Amtower Aug 2001 B1
6272230 Hiraoglu Aug 2001 B1
6272233 Takeo Aug 2001 B1
6278760 Ogawa Aug 2001 B1
6282258 Stein Aug 2001 B1
6285030 Williams Sep 2001 B1
6288974 Nelson Sep 2001 B1
6289235 Webber Sep 2001 B1
6292260 Lin Sep 2001 B1
6292530 Yavus Sep 2001 B1
6292533 Swift Sep 2001 B1
6301327 Martens Oct 2001 B1
6317509 Simanovsky Nov 2001 B1
6324243 Edic Nov 2001 B1
6324245 Tam Nov 2001 B1
6345113 Crawford Feb 2002 B1
6347132 Annis Feb 2002 B1
6353673 Shnitser Mar 2002 B1
6366638 Hsieh Apr 2002 B1
6370222 Cornick Apr 2002 B1
6373916 Inoue Apr 2002 B1
6373970 Dong Apr 2002 B1
6373979 Wang Apr 2002 B1
6380540 Maor Apr 2002 B1
6381297 Hsieh Apr 2002 B1
6388788 Harris May 2002 B1
6403960 Wellnitz Jun 2002 B1
6404841 Pforr Jun 2002 B1
6407390 Rozsa Jun 2002 B1
6408042 Hsieh Jun 2002 B1
6415012 Taguchi Jul 2002 B1
6418184 Wang Jul 2002 B1
6418189 Schafer Jul 2002 B1
6418194 McPherson Jul 2002 B1
6424692 Suzuki Jul 2002 B1
6430255 Fenkart Aug 2002 B2
6438577 Owens Aug 2002 B1
6442288 Haerer Aug 2002 B1
6445765 Frank Sep 2002 B1
6448545 Chen Sep 2002 B1
6453003 Springer Sep 2002 B1
6459755 Li Oct 2002 B1
6459761 Grodzins Oct 2002 B1
6459764 Chalmers Oct 2002 B1
6463181 Duarte Oct 2002 B2
6473489 Bani-Hashemi Oct 2002 B2
6477221 Ning Nov 2002 B1
6479826 Klann Nov 2002 B1
6480285 Hill Nov 2002 B1
6480564 Kim Nov 2002 B1
6483894 Hartick Nov 2002 B2
6487307 Hennessey Nov 2002 B1
6502984 Ogura Jan 2003 B2
6507025 Verbinski Jan 2003 B1
6507278 Brunetti Jan 2003 B1
6515285 Marshall Feb 2003 B1
6525331 Ngoi Feb 2003 B1
6526120 Gray Feb 2003 B1
6532276 Hartick Mar 2003 B1
6542574 Grodzins Apr 2003 B2
6542578 Ries Apr 2003 B2
6542579 Takasawa Apr 2003 B1
6542580 Carver Apr 2003 B1
6542628 Muller Apr 2003 B1
6545281 McGregor Apr 2003 B1
6549683 Bergeron Apr 2003 B1
6552346 Verbinski Apr 2003 B2
6552809 Bergeron Apr 2003 B1
6559769 Anthony May 2003 B2
6570177 Struckhoff May 2003 B1
6570708 Bergeron May 2003 B1
6570951 Hsieh May 2003 B1
6570956 Rhee May 2003 B1
6574296 Stierstorfer Jun 2003 B2
6574297 Tam Jun 2003 B2
6580777 Ueki Jun 2003 B1
6580778 Meder Jun 2003 B2
6583895 Kuwahara Jun 2003 B1
6584170 Aust Jun 2003 B2
6586193 Yguerabide Jul 2003 B2
6587575 Windham Jul 2003 B1
6587595 Henkel Jul 2003 B1
6597760 Beneke Jul 2003 B2
6603536 Hasson Aug 2003 B1
6608921 Inoue Aug 2003 B1
6611575 Alyassin Aug 2003 B1
6614872 Bueno Sep 2003 B2
6618466 Ning Sep 2003 B1
6621887 Albagli Sep 2003 B2
6621888 Grodzins Sep 2003 B2
6621925 Ohmori Sep 2003 B1
6628745 Annis Sep 2003 B1
6628982 Thomas Sep 2003 B1
6628983 Gagnon Sep 2003 B1
6636581 Sorenson Oct 2003 B2
6637266 Froom Oct 2003 B1
6644853 Kantor Nov 2003 B1
6654443 Hoffman Nov 2003 B1
6661867 Mario Dec 2003 B2
6663280 Doenges Dec 2003 B2
6665373 Kotowski Dec 2003 B1
6671508 Mitsuoka Dec 2003 B1
6702459 Barnes Mar 2004 B2
6707879 McClelland Mar 2004 B2
6713773 Lyons Mar 2004 B1
6714623 Sako Mar 2004 B2
6721387 Naidu Apr 2004 B1
6721391 McClelland Apr 2004 B2
6724922 Vilsmeier Apr 2004 B1
6727506 Mallette Apr 2004 B2
6731819 Fukushima May 2004 B1
6735274 Zahavi May 2004 B1
6735279 Jacobs May 2004 B1
6738450 Barford May 2004 B1
6744909 Kostrzewski Jun 2004 B1
6746864 McNeil Jun 2004 B1
6751349 Matama Jun 2004 B2
6754374 Miller Jun 2004 B1
6763148 Sternberg Jul 2004 B1
6768421 Alioto Jul 2004 B1
6785357 Bernardi Aug 2004 B2
6785410 Vining Aug 2004 B2
6791089 Caffrey Sep 2004 B1
H2110 Newman Oct 2004 H
6801647 Arakawa Oct 2004 B1
6803997 Stanek Oct 2004 B2
6804412 Wilkinson Oct 2004 B1
6807458 Quackenbush Oct 2004 B2
6813395 Kinjo Nov 2004 B1
6825854 Beneke Nov 2004 B1
6829585 Grewal Dec 2004 B1
6837422 Meder Jan 2005 B1
6839403 Kotowski Jan 2005 B1
6839406 Ries Jan 2005 B2
6843599 Le Jan 2005 B2
6845873 Chattey Jan 2005 B1
6856272 Levitan Feb 2005 B2
6865287 Beneke Mar 2005 B1
6865509 Hsiung Mar 2005 B1
6868138 Clinthorne Mar 2005 B2
6873261 Anthony Mar 2005 B2
6876322 Keller Apr 2005 B2
6891470 Bohinc, Jr. May 2005 B2
6895072 Schrock May 2005 B2
6895338 Hsiung May 2005 B2
6899540 Neiderman May 2005 B1
6918541 Knowles Jul 2005 B2
6920197 Kang Jul 2005 B2
6922461 Kang Jul 2005 B2
6924487 Bolozdynya Aug 2005 B2
6928141 Carver Aug 2005 B2
6936828 Saccomanno Aug 2005 B2
6937692 Johnson Aug 2005 B2
6938488 Diaz Sep 2005 B2
6940943 Claus Sep 2005 B2
6950492 Besson Sep 2005 B2
6952163 Huey Oct 2005 B2
6970531 Eberhard Nov 2005 B2
6972693 Brown Dec 2005 B2
6980681 Hsieh Dec 2005 B1
6982643 Garfinkle Jan 2006 B2
6990171 Toth Jan 2006 B2
6998617 DEmilio Feb 2006 B2
7000827 Meder Feb 2006 B2
7005982 Frank Feb 2006 B1
7012256 Roos Mar 2006 B1
7020241 Beneke Mar 2006 B2
7026944 Alioto Apr 2006 B2
7030755 Bohinc, Jr. Apr 2006 B2
7043474 Mojsilovic May 2006 B2
7045787 Verbinski May 2006 B1
7046761 Ellenbogen May 2006 B2
7046768 Gilevich May 2006 B1
7050616 Hsieh May 2006 B2
7062074 Beneke Jun 2006 B1
7064336 Archer Jun 2006 B2
7065175 Green Jun 2006 B2
7068751 Toth Jun 2006 B2
7072434 Tybinkowski Jul 2006 B1
7092485 Kravis Aug 2006 B2
7098461 Endo Aug 2006 B2
7099004 Masten Aug 2006 B2
7099432 Ichihara Aug 2006 B2
7100165 Eldridge Aug 2006 B2
7103137 Seppi Sep 2006 B2
7105828 Unger Sep 2006 B2
7115875 Worstell Oct 2006 B1
7116235 Alioto Oct 2006 B2
7116749 Besson Oct 2006 B2
7130456 Hillmann Oct 2006 B2
7136716 Hsiung Nov 2006 B2
7139406 McClelland Nov 2006 B2
7142109 Frank Nov 2006 B1
7142633 Eberhard Nov 2006 B2
7151447 Willms Dec 2006 B1
7154650 Lettington Dec 2006 B2
7164138 McGregor Jan 2007 B2
7164750 Nabors Jan 2007 B2
7183554 Gallagher Feb 2007 B2
7183906 Zanovitch Feb 2007 B2
7193515 Roberts Mar 2007 B1
7203276 Arsenault Apr 2007 B2
7204125 Fine Apr 2007 B2
7207713 Lowman Apr 2007 B2
7212113 Zanovitch May 2007 B2
7212661 Samara May 2007 B2
7215738 Muenchau May 2007 B2
7233644 Bendahan Jun 2007 B1
7233682 Levine Jun 2007 B2
7244941 Roos Jul 2007 B2
7257189 Modica Aug 2007 B2
7269527 Frank Sep 2007 B1
7322745 Agrawal Jan 2008 B2
7324921 Sugahara Jan 2008 B2
7356115 Ford Apr 2008 B2
7356174 Leue Apr 2008 B2
7366282 Peschmann Apr 2008 B2
7369643 Kotowski May 2008 B2
7379530 Hoff May 2008 B2
7391028 Rubenstein Jun 2008 B1
7397891 Johnson Jul 2008 B2
7400701 Cason Jul 2008 B1
7411198 Holland Aug 2008 B1
7417440 Peschmann Aug 2008 B2
7418077 Gray Aug 2008 B2
7430479 Holslin Sep 2008 B1
7453987 Richardson Nov 2008 B1
7471764 Kaval Dec 2008 B2
7483510 Carver Jan 2009 B2
7486768 Allman Feb 2009 B2
7517149 Agrawal Apr 2009 B2
7519148 Kotowski Apr 2009 B2
7525101 Grodzins Apr 2009 B2
7526064 Akery Apr 2009 B2
7529341 Schlomka May 2009 B2
7550738 DeVito Jun 2009 B1
7579845 Peschmann Aug 2009 B2
7592601 Frank Sep 2009 B2
7660388 Gray Feb 2010 B2
7720194 Connelly May 2010 B2
7720195 Allman May 2010 B2
7734066 DeLia Jun 2010 B2
7734102 Bergeron Jun 2010 B2
7742568 Smith Jun 2010 B2
7759649 Frank Jul 2010 B2
7769132 Hurd Aug 2010 B1
7769133 Carver Aug 2010 B2
7783004 Kotowski Aug 2010 B2
7783005 Kaval Aug 2010 B2
7792248 Strecker Sep 2010 B2
7813540 Kraft Oct 2010 B1
7817776 Agrawal Oct 2010 B2
7851766 Frank Dec 2010 B2
7856081 Peschmann Dec 2010 B2
7860213 Akery Dec 2010 B2
7876879 Morton Jan 2011 B2
7876880 Kotowski Jan 2011 B2
7899232 Gudmundson Mar 2011 B2
7915596 Clothier Mar 2011 B2
7928400 Diawara Apr 2011 B1
7963695 Kotowski Jun 2011 B2
7973697 Reilly Jul 2011 B2
7982191 Friedman Jul 2011 B2
7991133 Mills Aug 2011 B2
7995705 Allman Aug 2011 B2
8054938 Kaval Nov 2011 B2
8059781 Agrawal Nov 2011 B2
8073099 Niu Dec 2011 B2
8135110 Morton Mar 2012 B2
8138770 Peschmann Mar 2012 B2
8170177 Akery May 2012 B2
8173970 Inbar May 2012 B2
8243167 Liang Aug 2012 B2
8243876 Morton Aug 2012 B2
8275091 Morton Sep 2012 B2
8304740 Frank Nov 2012 B1
8356937 Kotowski Jan 2013 B2
8385501 Allman Feb 2013 B2
8389942 Morton Mar 2013 B2
8428217 Peschmann Apr 2013 B2
8433036 Morton Apr 2013 B2
8457275 Akery Jun 2013 B2
8472583 Star-Lack Jun 2013 B2
8483356 Bendahan Jul 2013 B2
8491189 Kotowski Jul 2013 B2
8503605 Morton Aug 2013 B2
8579506 Morton Nov 2013 B2
8644453 Morton Feb 2014 B2
8668386 Morton Mar 2014 B2
8674706 Peschmann Mar 2014 B2
8687765 Kotowski Apr 2014 B2
8735833 Morto May 2014 B2
8750452 Kaval Jun 2014 B2
8774357 Morton Jul 2014 B2
8798232 Bendahan Aug 2014 B2
8831176 Morto Sep 2014 B2
8837670 Akery Sep 2014 B2
8840303 Morton Sep 2014 B2
8908831 Bendahan Dec 2014 B2
8929509 Morton Jan 2015 B2
8958526 Morton Feb 2015 B2
8971485 Morton Mar 2015 B2
8993970 Morton Mar 2015 B2
9020095 Morton Apr 2015 B2
9020096 Allman Apr 2015 B2
9025731 Kotowski May 2015 B2
9042511 Peschmann May 2015 B2
9052403 Morton Jun 2015 B2
9057679 Morton Jun 2015 B2
9086497 Bendahan Jul 2015 B2
9111331 Parikh Aug 2015 B2
9121958 Morton Sep 2015 B2
9158027 Morton Oct 2015 B2
9218933 Langeveld Dec 2015 B2
9223049 Kotowski Dec 2015 B2
9223050 Kaval Dec 2015 B2
9223052 Morton Dec 2015 B2
9268058 Peschmann Feb 2016 B2
9274065 Morton Mar 2016 B2
9279901 Akery Mar 2016 B2
9285498 Carver Mar 2016 B2
9310322 Panesar Apr 2016 B2
9310323 Bendahan Apr 2016 B2
9316760 Bendahan Apr 2016 B2
9329285 Gozani May 2016 B2
9332624 Morton May 2016 B2
10074166 Kang Sep 2018 B2
20010016030 Nicolas Aug 2001 A1
20010021013 Hecht Sep 2001 A1
20010021244 Suzuki Sep 2001 A1
20010028696 Yamada Oct 2001 A1
20010033636 Hartick Oct 2001 A1
20010038681 Stanton Nov 2001 A1
20010038705 Rubbert Nov 2001 A1
20010038707 Ohara Nov 2001 A1
20010048734 Uppaluri Dec 2001 A1
20010053197 Murayama Dec 2001 A1
20020000916 Richards Jan 2002 A1
20020001366 Tamura Jan 2002 A1
20020015475 Matsumoto Feb 2002 A1
20020016546 Cerofolini Feb 2002 A1
20020017620 Oomori Feb 2002 A1
20020018199 Blumenfeld Feb 2002 A1
20020024016 Endo Feb 2002 A1
20020027970 Chapman Mar 2002 A1
20020028994 Kamiyama Mar 2002 A1
20020031246 Kawano Mar 2002 A1
20020037068 Oikawa Mar 2002 A1
20020044691 Matsugu Apr 2002 A1
20020049660 Obrador Apr 2002 A1
20020054694 Vachtsevanos May 2002 A1
20020067259 Fufidio Jun 2002 A1
20020067793 Stierstorfer Jun 2002 A1
20020085046 Furuta Jul 2002 A1
20020088952 Rao Jul 2002 A1
20020094062 Dolazza Jul 2002 A1
20020094064 Zhou Jul 2002 A1
20020094119 Sahadevan Jul 2002 A1
20020098518 Levinson Jul 2002 A1
20020106052 Menhardt Aug 2002 A1
20020122528 Besson Sep 2002 A1
20020124664 Call Sep 2002 A1
20020126800 Matsumoto Sep 2002 A1
20020127586 Mortensen Sep 2002 A1
20020141625 Nelson Oct 2002 A1
20020150200 Zonneveld Oct 2002 A1
20020161534 Adler Oct 2002 A1
20020168083 Garms Nov 2002 A1
20020168657 Chen Nov 2002 A1
20020172324 Ellengogen Nov 2002 A1
20020172409 Saito Nov 2002 A1
20020175291 Reeder Nov 2002 A1
20020175921 Xu Nov 2002 A1
20020176351 Masaki Nov 2002 A1
20020176534 Meder Nov 2002 A1
20020186862 McClelland Dec 2002 A1
20020188197 Bishop Dec 2002 A1
20020191209 Yasumaru Dec 2002 A1
20020198731 Barnes Dec 2002 A1
20030012420 Verwoerd Jan 2003 A1
20030023469 Lee Jan 2003 A1
20030023592 Modica Jan 2003 A1
20030024315 Merkel Feb 2003 A1
20030031289 Hsieh Feb 2003 A1
20030031291 Yamamoto Feb 2003 A1
20030036006 Feke Feb 2003 A1
20030038945 Mahner Feb 2003 A1
20030043964 Sorenson Mar 2003 A1
20030068557 Kumashiro Apr 2003 A1
20030072414 Sakaida Apr 2003 A1
20030072418 Albagli Apr 2003 A1
20030072484 Kokko Apr 2003 A1
20030076924 Mario Apr 2003 A1
20030081720 Swift May 2003 A1
20030081859 Kasutani May 2003 A1
20030082516 Straus May 2003 A1
20030085163 Chan May 2003 A1
20030085348 Megerle May 2003 A1
20030085353 Almogy May 2003 A1
20030091145 Mohr May 2003 A1
20030095633 VanWoezik May 2003 A1
20030095692 Mundy May 2003 A1
20030108150 Franke Jun 2003 A1
20030128812 Appleby Jul 2003 A1
20030138147 Ongkojoyo Jul 2003 A1
20030144800 Davis Jul 2003 A1
20030148393 Woodbury Aug 2003 A1
20030149346 Arnone Aug 2003 A1
20030165213 Maglich Sep 2003 A1
20030179853 Amemiya Sep 2003 A1
20030194121 Eberhard Oct 2003 A1
20030201394 Peoples Oct 2003 A1
20030205676 Nelson Nov 2003 A1
20030206649 Moshe Nov 2003 A1
20030210139 Brooks Nov 2003 A1
20030215051 Suzuki Nov 2003 A1
20030215054 Fenkart Nov 2003 A1
20030215143 Zakrzewski Nov 2003 A1
20030231788 Yukhin Dec 2003 A1
20030231791 Torre-Bueno Dec 2003 A1
20040012853 Garcia Jan 2004 A1
20040013239 Gregerson Jan 2004 A1
20040016271 Shah Jan 2004 A1
20040017882 Misawa Jan 2004 A1
20040017883 Takagi Jan 2004 A1
20040017888 Seppi Jan 2004 A1
20040017935 Avinash Jan 2004 A1
20040022425 Avinash Feb 2004 A1
20040027127 Mills Feb 2004 A1
20040037462 Lewis Feb 2004 A1
20040041082 Harmon Mar 2004 A1
20040051030 Olszak Mar 2004 A1
20040051265 Nadeau Mar 2004 A1
20040062342 Cahill Apr 2004 A1
20040062349 Schuster Apr 2004 A1
20040062351 Yoshioka Apr 2004 A1
20040066882 Eberhard Apr 2004 A1
20040066884 HermannClaus Apr 2004 A1
20040066890 Dalmijn Apr 2004 A1
20040075058 Blevis Apr 2004 A1
20040080315 Beevor Apr 2004 A1
20040082846 Johnson Apr 2004 A1
20040083958 Saidman May 2004 A1
20040086075 Hein May 2004 A1
20040086078 Adams May 2004 A1
20040086160 Zimmermann May 2004 A1
20040087844 Yen May 2004 A1
20040101097 Wakayama May 2004 A1
20040101098 Bijjani May 2004 A1
20040102700 Asafusa May 2004 A1
20040109231 Haisch Jun 2004 A1
20040119591 Peeters Jun 2004 A1
20040120009 White Jun 2004 A1
20040120454 Ellenbogen Jun 2004 A1
20040120857 Smith Jun 2004 A1
20040126895 Overbeck Jul 2004 A1
20040134986 Studer Jul 2004 A1
20040141056 Izumi Jul 2004 A1
20040141584 Bernardi Jul 2004 A1
20040142386 Rigler Jul 2004 A1
20040148137 Zerwekh Jul 2004 A1
20040160599 Hamamatsu Aug 2004 A1
20040161073 Nokita Aug 2004 A1
20040175041 Miller Sep 2004 A1
20040176677 Hwu Sep 2004 A1
20040179647 Zhao Sep 2004 A1
20040202154 Aklepi Oct 2004 A1
20040212492 Boesch Oct 2004 A1
20040212499 Bohinc Oct 2004 A1
20040213377 Endo Oct 2004 A1
20040213600 Watanabe Oct 2004 A1
20040218729 Xue Nov 2004 A1
20040225222 Zeng Nov 2004 A1
20040232054 Brown Nov 2004 A1
20040236520 Williams Nov 2004 A1
20040240612 Suzuki Dec 2004 A1
20040247071 Dafni Dec 2004 A1
20040247171 Hashimoto Dec 2004 A1
20040251415 Verbinski Dec 2004 A1
20040252024 Huey Dec 2004 A1
20040252870 Reeves Dec 2004 A1
20040253660 Gibbs Dec 2004 A1
20040256565 Adams Dec 2004 A1
20040258198 Carver Dec 2004 A1
20040258202 Wernick Dec 2004 A1
20040263379 Keller Dec 2004 A1
20040264624 Tanaka Dec 2004 A1
20040264648 Claus Dec 2004 A1
20040265175 Witty Dec 2004 A1
20050001728 Appelt Jan 2005 A1
20050008119 McClelland Jan 2005 A1
20050008203 Dixon Jan 2005 A1
20050011849 Chattey Jan 2005 A1
20050017181 Kearfott Jan 2005 A1
20050018812 Wolfs Jan 2005 A1
20050023477 Archer Feb 2005 A1
20050023479 Grodzins Feb 2005 A1
20050024199 Huey Feb 2005 A1
20050025280 Schulte Feb 2005 A1
20050025350 Engelbart Feb 2005 A1
20050025377 Avinash Feb 2005 A1
20050029460 Iwatschenko-Borho Feb 2005 A1
20050031069 Kaucic Feb 2005 A1
20050031076 McClelland Feb 2005 A1
20050053307 Nose Mar 2005 A1
20050057354 Jenkins Mar 2005 A1
20050058242 Peschmann Mar 2005 A1
20050058350 Dugan Mar 2005 A1
20050061955 Endo Mar 2005 A1
20050069085 Lewis Mar 2005 A1
20050074088 Ichihara Apr 2005 A1
20050085721 Fauver Apr 2005 A1
20050094856 Warren May 2005 A1
20050098728 Alfano May 2005 A1
20050100135 Lowman May 2005 A1
20050105665 Grodzins May 2005 A1
20050105680 Nabors May 2005 A1
20050110672 Cardiasmenos May 2005 A1
20050111618 Sommer May 2005 A1
20050113961 Sabol May 2005 A1
20050117683 Mishin Jun 2005 A1
20050117693 Miyano Jun 2005 A1
20050117700 Peschmann Jun 2005 A1
20050123093 Lawaczeck Jun 2005 A1
20050123174 Gorsky Jun 2005 A1
20050128069 Skatter Jun 2005 A1
20050133708 Eberhard Jun 2005 A1
20050135535 Wallace Jun 2005 A1
20050135668 Polichar Jun 2005 A1
20050147199 Dunham Jul 2005 A1
20050153356 Okawa Jul 2005 A1
20050156734 Zerwekh Jul 2005 A1
20050157842 Agrawal Jul 2005 A1
20050157844 Bernardi Jul 2005 A1
20050163354 Ziegler Jul 2005 A1
20050169421 Muenchau Aug 2005 A1
20050173284 Ambrefe Aug 2005 A1
20050189412 Hudnut Sep 2005 A1
20050190882 McGuire Sep 2005 A1
20050198226 DeLia Sep 2005 A1
20050205793 Bohinc Sep 2005 A1
20050206514 Zanovitch Sep 2005 A1
20050207655 Chopra Sep 2005 A1
20050212913 Richter Sep 2005 A1
20050216294 Labow Sep 2005 A1
20050219523 Onuma Oct 2005 A1
20050220247 Ruddy Oct 2005 A1
20050220264 Homegger Oct 2005 A1
20050224719 Polichar Oct 2005 A1
20050226375 Eberhard Oct 2005 A1
20050240858 Croft Oct 2005 A1
20050248450 Zanovitch Nov 2005 A1
20050249416 Leue Nov 2005 A1
20050251397 Zanovitch Nov 2005 A1
20050251398 Zanovitch Nov 2005 A1
20050258372 McGregor Nov 2005 A1
20050259868 Sones Nov 2005 A1
20050265517 Gary Dec 2005 A1
20050271184 Ovadia Dec 2005 A1
20050275545 Alioto Dec 2005 A1
20050275831 Silver Dec 2005 A1
20050276443 Slamani Dec 2005 A1
20050279936 Litman Dec 2005 A1
20050283079 Steen Dec 2005 A1
20060000911 Stekel Jan 2006 A1
20060002504 DeMan Jan 2006 A1
20060008054 Ohara Jan 2006 A1
20060009269 Hoskinson Jan 2006 A1
20060013455 Watson Jan 2006 A1
20060013464 Ramsay Jan 2006 A1
20060017605 Lovberg Jan 2006 A1
20060018434 Jacobs Jan 2006 A1
20060018517 Chen Jan 2006 A1
20060019409 Nelson Jan 2006 A1
20060027751 Kurita Feb 2006 A1
20060034503 Shimayama Feb 2006 A1
20060036167 Shina Feb 2006 A1
20060045235 Bruder Mar 2006 A1
20060045323 Ateya Mar 2006 A1
20060056584 Allman Mar 2006 A1
20060064246 Medberry Mar 2006 A1
20060065844 Zelakiewicz Mar 2006 A1
20060072702 Chapman Apr 2006 A1
20060083418 Watson Apr 2006 A1
20060084872 Ichikawa Apr 2006 A1
20060086794 Knowles Apr 2006 A1
20060093088 Sowerby May 2006 A1
20060097171 Balchunas May 2006 A1
20060098773 Peschmann May 2006 A1
20060098842 Levine May 2006 A1
20060098866 Whitson May 2006 A1
20060109949 Tkaczyk May 2006 A1
20060114477 Cox Jun 2006 A1
20060115044 Wu Jun 2006 A1
20060115109 Whitson Jun 2006 A1
20060116566 Bruijns Jun 2006 A1
20060119837 Raguin Jun 2006 A1
20060133650 Xie Jun 2006 A1
20060133659 Hammond Jun 2006 A1
20060138331 Guillebaud Jun 2006 A1
20060140341 Carver Jun 2006 A1
20060141615 Lu Jun 2006 A1
20060142662 VanBeek Jun 2006 A1
20060142984 Weese Jun 2006 A1
20060173268 Mullick Aug 2006 A1
20060176062 Yang Aug 2006 A1
20060182221 Bernhardt Aug 2006 A1
20060203960 Schlomka Sep 2006 A1
20060204080 Sones Sep 2006 A1
20060215811 Modica Sep 2006 A1
20060249685 Tanaka Nov 2006 A1
20060255929 Zanovitch Nov 2006 A1
20060257005 Bergeron Nov 2006 A1
20060262902 Wattenburg Nov 2006 A1
20060269135 Ramsay Nov 2006 A1
20060273257 Roos Dec 2006 A1
20060274916 Chan Dec 2006 A1
20060282886 Gaug Dec 2006 A1
20060284094 Inbar Dec 2006 A1
20070001123 Andrews Jan 2007 A1
20070003122 Sirohey Jan 2007 A1
20070058037 Bergeron Mar 2007 A1
20070083414 Krohn Apr 2007 A1
20070085010 Letant Apr 2007 A1
20070118399 Avinash May 2007 A1
20070140423 Foland Jun 2007 A1
20070147585 Eilbert Jun 2007 A1
20070156281 Leung Jul 2007 A1
20070165777 Anwar Jul 2007 A1
20070168467 Hu Jul 2007 A1
20070172129 Tortora Jul 2007 A1
20070189454 Georgeson Aug 2007 A1
20070194909 Garfield Aug 2007 A1
20070195994 McClelland Aug 2007 A1
20070200566 Clark Aug 2007 A1
20070206719 Suryanarayanan Sep 2007 A1
20070210255 Bjorkholm Sep 2007 A1
20070210921 Volpi Sep 2007 A1
20070228284 Polichar Oct 2007 A1
20070237293 Singh Oct 2007 A1
20070269005 Chalmers Nov 2007 A1
20070280502 Paresi Dec 2007 A1
20070290136 Ivan Dec 2007 A1
20080023631 Majors Jan 2008 A1
20080037707 Rothschild Feb 2008 A1
20080048872 Frank Feb 2008 A1
20080075230 Oreper Mar 2008 A1
20080084963 Clayton Apr 2008 A1
20080118021 Dutta May 2008 A1
20080128624 Cooke Jun 2008 A1
20080130839 Rogers Jun 2008 A1
20080152082 Bouchard Jun 2008 A1
20080159591 Ruedin Jul 2008 A1
20080170670 Bhatt Jul 2008 A1
20080198967 Connelly Aug 2008 A1
20080198970 Kirshner Aug 2008 A1
20080205594 Bjorkholm Aug 2008 A1
20080230709 Tkaczyk Sep 2008 A1
20080236275 Breed Oct 2008 A1
20080253653 Gable Oct 2008 A1
20080260097 Anwar Oct 2008 A1
20080304622 Morton Dec 2008 A1
20090014662 Suhami Jan 2009 A1
20090034790 Song Feb 2009 A1
20090067575 Seppi Mar 2009 A1
20090086907 Smith Apr 2009 A1
20090116617 Mastronardi May 2009 A1
20090127459 Neustadter May 2009 A1
20090168964 Safai Jul 2009 A1
20090174554 Bergeron Jul 2009 A1
20090236531 Frank Sep 2009 A1
20090238336 Akery Sep 2009 A1
20090245462 Agrawal Oct 2009 A1
20090257555 Chalmers Oct 2009 A1
20090283690 Bendahan Nov 2009 A1
20090285353 Ellenbogen Nov 2009 A1
20090316851 Oosaka Dec 2009 A1
20090323894 Hu Dec 2009 A1
20100020937 Hautmann Jan 2010 A1
20100161504 Casey Jun 2010 A1
20100177868 Smith Jul 2010 A1
20100177873 Chen Jul 2010 A1
20100295689 Armistead Nov 2010 A1
20100303287 Morton Dec 2010 A1
20110019797 Morton Jan 2011 A1
20110019799 Shedlock Jan 2011 A1
20110038453 Morton Feb 2011 A1
20110060426 Morton Mar 2011 A1
20110064192 Morton Mar 2011 A1
20110075808 Rothschild Mar 2011 A1
20110129063 Bendahan Jun 2011 A1
20110172972 Gudmundson Jul 2011 A1
20110204243 Bendahan Aug 2011 A1
20110235777 Gozani Sep 2011 A1
20110266643 Engelmann Nov 2011 A1
20120093367 Gudmundson Apr 2012 A1
20120099710 Kotowski Apr 2012 A1
20120104276 Miller May 2012 A1
20120105267 DeLia May 2012 A1
20120116720 Klann May 2012 A1
20130001048 Panesar Jan 2013 A1
20140185771 Morton Jul 2014 A1
20140197321 Bendahan Jul 2014 A1
20150036798 Morton Feb 2015 A1
20150078519 Morton Mar 2015 A1
20150301220 Morton Oct 2015 A1
20150325010 Bedford Nov 2015 A1
20150355117 Morton Dec 2015 A1
20150355369 Morton Dec 2015 A1
20160025889 Morton Jan 2016 A1
20160033674 Allman Feb 2016 A1
Foreign Referenced Citations (54)
Number Date Country
2574402 Jan 2006 CA
2319958 Mar 2007 CA
2307439 Jul 2008 CA
101303317 Nov 2008 CN
0077018 Apr 1983 EP
0455177 Nov 1991 EP
0459648 Dec 1991 EP
0577380 Jan 1994 EP
0919186 Jun 1999 EP
1413898 Apr 2004 EP
2270547 Jan 2011 EP
2158572 Nov 1985 GB
2255634 Nov 1992 GB
2110037 Jun 1993 GB
2277013 Oct 1994 GB
2368764 May 2002 GB
2409268 Jun 2005 GB
2424065 Sep 2006 GB
2438317 Nov 2007 GB
H0422897 Jan 1992 JP
2001233440 Aug 2001 JP
2003287507 Oct 2003 JP
2005257400 Sep 2005 JP
1992003837 Mar 1992 WO
9855851 Dec 1998 WO
2000049428 Aug 2000 WO
2002082290 Oct 2002 WO
2003069498 Aug 2003 WO
2004010127 Jan 2004 WO
2004010162 Jan 2004 WO
2003107113 May 2004 WO
2005086616 Sep 2005 WO
2005098400 Oct 2005 WO
2006036076 Apr 2006 WO
2006053279 May 2006 WO
2006078691 Jul 2006 WO
2006119603 Nov 2006 WO
2006119605 Nov 2006 WO
2006119605 Nov 2006 WO
2007035359 Mar 2007 WO
2007055720 May 2007 WO
2007068933 Jun 2007 WO
2007103216 Sep 2007 WO
2008017983 Feb 2008 WO
2009106803 Sep 2009 WO
2009143169 Nov 2009 WO
2011069024 Jun 2011 WO
2011091070 Jul 2011 WO
2013116549 Aug 2013 WO
2013119423 Aug 2013 WO
2014107675 Jul 2014 WO
2014121097 Aug 2014 WO
2014124152 Aug 2014 WO
2016011205 Jan 2016 WO
Non-Patent Literature Citations (58)
Entry
ClearView Workstation, L3 Security & Detection Systems, Jun. 9, 2011.
Office Action dated Dec. 27, 2017 for U.S. Appl. No. 15/455,436; (pp. 1-28).
International Search Report for PCT/US10/58809; Rapiscan Systems Inc.; dated Apr. 19, 2011.
Mobile X-Ray Inspection Systems, Internet Citation, Feb. 12, 2007, pp. 1-2, URL:http://web.archive.org/web/20070212000928/http://www.bombdetecti- on.com/cat--details.php?catid=20.
Molchanov P A et al: ‘Nanosecond gated optical sensors for ocean optic applications’ Sensors Applications Symposium, 2006. Proceedings of the 2006 IEEE Houston, Texas,USA Feb. 7-9, 2006, Piscataway, NJ, USA,IEEE, Feb. 7, 2006 (Feb. 7, 2006) , pp. 147-150, XP010917671 ISBN: 978-0/7803-9580-0.
Smith C. R. et al: ‘Application of 450 kV computed tomography to engine blocks with steel liners’ Materials Evaluation vol. 65, No. 5, 2007, pp. 458-461, XP055108238.
CRS Report for Congress, Aviation Security Technologies and Procedures: Screening Passengers and Baggage, Oct. 26, 2001, pp. 1-12.
Written Opinion on Patentability for PCT/US11/21758; dated Jul. 7, 2011; Rapiscan Systems.
International Search Report and Written Opinion for PCT/US12/54110, dated Dec. 24, 2012.
International Search Report for PCT/US11/21758; dated Jul. 7, 2011, Rapiscan Systems Inc.
International Search Report for PCT/US13/24191, Rapiscan Systems Inc., dated Jun. 25, 2013.
Written Opinion of the International Searching Authority for PCT/US2014/015126, dated May 27, 2014.
International Search Report for PCT/US13/23676, dated Jun. 28, 2013.
Notice of Allowance dated Mar. 16, 2015 for U.S. Appl. No. 13/606,442.
International Search Report for PCT/GB2009/000497, dated Jan. 22, 2010.
International Search Report for PCT/US14/56652, dated Apr. 27, 2015.
First Examination Report for Australian Application No. 2012304490, dated Jul. 7, 2014.
International Preliminary Report on Patentability for PCT/US2014/014198, dated Aug. 4, 2015.
International Preliminary Report on Patentability for PCT/US11/21758, dated Jul. 7, 2011.
International Search Report for PCT/US14/14198, dated May 16, 2014.
International Search Report for PCT/US2014/015126, dated May 27, 2014.
International Search Report for PCT/US2015/040653, dated Dec. 16, 2015.
International Search Report for PCT/US2014/010370, dated May 13, 2014.
Supplementary European Search Report for EP12830287, dated Feb. 27, 2015.
Examination Report for GB14049951, dated Jun. 26, 2015.
International Search Report for PCT/GB09/00575, dated Apr. 7, 2010.
First Office Action for Chinese Patent Application No. CN201280054643.3, dated Aug. 27, 2015.
Examination Report for GB14049951, dated Dec. 4, 2015.
Office Action dated Mar. 7, 2016 for U.S. Appl. No. 14/739,329.
Office Action dated May 14, 2014 for U.S. Appl. No. 13/606,442.
“ClearView Workstation Cargo Inspection Workstation,” L-3 Communications Security & Detection Systems, Jul. 27, 2011, 2 pages.
Examination Report for EP12830287.4, dated Jan. 18, 2016.
Office Action for JP2014529885, dated Jan. 28, 2016.
Examination Report for EP12830287.4, dated Oct. 31, 2016.
Examination Report for GB14049951, dated Jun. 27, 2016.
Notice of Allowance dated Dec. 12, 2016 for U.S. Appl. No. 14/739,329.
Third Office Action for Chinese Patent Application No. CN201280054643.3, dated Nov. 22, 2016.
Office Action dated Jul. 26, 2018 for U.S. Appl. No. 15/455,436 (pp. 1-14).
Horner et al., “Phase-Only Matched Filtering”, Applied Optics, vol. 23, No. 6, Mar. 15, 1994, pp. 812-816.
Mahalanobis, et al. “Minimum Average Correlation Energy Filters”, Applied Optics, vol. 26, No. 17, pp. 3633-3640, Sep. 1987.
Kumar et al. “Spatial frequency domain image processing for biometric recognition”, Biometrics ICIP Conference 2002.
Caulfield, et al. “Improved Discrimination in Optical Character Recognition”, Applied Optics, vol. 8, pp. 2354-2356, Nov. 1969.
Morin, et al. “Optical Character Recognition (OCR) in Uncontrolled Environments Using Optical Correlators”, Proc. SPIE Int. Soc. Opt. Eng. 3715, 346; 1999.
International Search Report for PCT/US2012/054110, dated Dec. 24, 2012.
Notification of Preliminary Refusal for Korean Patent Application No. 10-2014-70008915, dated Oct. 22, 2018.
Office Action for Canadian Patent Application No. 2849398, dated Sep. 21, 2018.
International Search Report for PCT/US2017/017642, dated Jun. 29, 2017.
Pre-Examination Report for Brazilian Patent Application No. PI908881-4, dated Nov. 7, 2018.
Viggo Butler and Robert W. Poole, Jr., Rethinking Checked-Baggage Screening, Reason Public Policy Institute, Policy Study 297, Jul. 2002.
McLay, Laura A., Jacobson, Sheldon H., and Kobza, John E., A multilevel passenger screening problem for aviation security, Naval Research Logistics (NRL), vol. 53, issue 3, pp. 183-197, 2006.
Sun Olapiriyakul and Sanchoy Das, Design and analysis of a two-stage security screening and inspection system, Journal of Air Transport Management, vol. 13, Issue 2, Mar. 2007, pp. 67-74.
Kelly Leone and Rongfang (Rachel) Liu, The key design parameters of checked baggage security screening systems in airports, Journal of Air Transport Management, vol. 11, Issue 2, Mar. 2005, pp. 69-78.
Summons to attend oral proceedings for EP097149108, Jun. 2, 2015.
First Examination Report for Indian Patent Application No. 6409/DELNP/2010, dated Apr. 26, 2017.
Notification of Re-Examination for CN201280054643.3, dated Apr. 2018.
Examination Report for 2304/DELNP/2014, dated Apr. 12, 2018.
Notification of Re-Examination for CN201280054643.3, dated Oct. 30, 2018.
Office Action dated May 13, 2019 for U.S. Appl. No. 16/248,547.
Related Publications (1)
Number Date Country
20200073008 A1 Mar 2020 US
Provisional Applications (1)
Number Date Country
61532093 Sep 2011 US
Continuations (4)
Number Date Country
Parent 16248547 Jan 2019 US
Child 16678668 US
Parent 15455436 Mar 2017 US
Child 16248547 US
Parent 14739329 Jun 2015 US
Child 15455436 US
Parent 13606442 Sep 2012 US
Child 14739329 US