Search

US-20260125225-A1 - BYPASS OF ITEMS IN A SECURITY LANE OF A SECURITY CHECKPOINT

US20260125225A1US 20260125225 A1US20260125225 A1US 20260125225A1US-20260125225-A1

Abstract

A security lane for security checkpoint includes an X-ray scanner system, a conveyor system, and a side buffer. The X-ray scanner system may be configured to determine threat status of items at least partially based on image data of the item; The conveyor system may be configured to move items along a primary path and move items along a secondary path. The side buffer may be configured to move items on and off the primary path of the conveyor system, and to move items on and off the secondary path of the conveyor system.

Inventors

  • Andrew Iannetti
  • Sevag Minas Zoboyan
  • Steven Urchuk
  • Tom Ripp

Assignees

  • ANALOGIC CORPORATION

Dates

Publication Date
20260507
Application Date
20250926

Claims (1)

  1. 1 . A security lane for security checkpoint, comprising: an X-ray scanner configured to determine threat status of items at least partially based on image data of the item; a conveyor configured to move items along a primary path and move items along a secondary path; a holding area, the holding area distinct and separate from the primary path of the conveyor and the secondary path of the conveyor; a side buffer configured to move items on and off the primary path of the conveyor, to move items on and off the secondary path of the conveyor, and to move items to and away from the holding area; and a controller to manage the security lane, the controller configured to control movement of an item in the side buffer at least partially responsive to a pending determination of a threat status of the item.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS This application is a continuation of U.S. patent application Ser. No. 18/792,352, filed Aug. 1, 2024, which claims the benefit under 35 U.S. C. § 119(e) of U.S. Provisional Patent Application Ser. No. 63/566,117, filed Mar. 15, 2024, the disclosure of each of which is hereby incorporated herein in its entirety by this reference. TECHNICAL FIELD One or more embodiments relate to a security lane of a security checkpoint and bypass of items therein. BACKGROUND Threat screening of items is performed at security checkpoints in airports, cargo screening facilities, and other sites. BRIEF DESCRIPTION OF THE DRAWINGS To easily identify the discussion of any particular element or act, the most significant digit or digits in a reference number refer to the figure number in which that element is first introduced. The patent or application file contains at least one drawing executed in color. Copies of this patent or patent application publication with color drawing(s) will be provided by the Office upon request and payment of the necessary fee. FIG. 1 is a diagram depicting an X-ray scanner system configured to perform CT scanning. FIG. 2 is a perspective side view of a security baggage system that includes an X-ray scanner system 100 of FIG. 1. FIG. 3 is a schematic diagram of a typical security lane at a security checkpoint, in accordance with the state of the art. FIG. 4, FIG. 5, FIG. 6, FIG. 7 and FIG. 8 illustrate various configurations of security lanes, in accordance with one or more embodiments. FIG. 9, FIG. 10, FIG. 11, FIG. 12, and FIG. 13 are flow diagrams depicting example processes related to operation of a side buffer that does not include a high threat holding area for security lane. FIG. 14, FIG. 15, FIG. 16, and FIG. 17 are flow diagrams depicting example processes related to operation of a side buffer that does not include a high threat holding area for security lane. FIG. 18, FIG. 19, FIG. 20, FIG. 21, FIG. 22, FIG. 23, FIG. 24, FIG. 25, FIG. 26, and FIG. 27 are schematic diagrams collectively illustrating an example single divest process in accordance with one or more embodiments. FIG. 28, FIG. 29, FIG. 30, FIG. 31, FIG. 32, FIG. 33, FIG. 34, FIG. 35, FIG. 36, FIG. 37, FIG. 38, FIG. 39, FIG. 40, FIG. 41, FIG. 42, FIG. 43, FIG. 44, FIG. 45, FIG. 46, FIG. 47, and FIG. 48 are schematic diagrams collectively illustrating an example double divest process in accordance with one or more embodiments. FIG. 49 is a block diagram depicting a system for controlling movement of an item through a security lane, in accordance with one or more embodiments. FIG. 50 illustrates a security lane with a side-buffer that facilitates one input to many input paths to many detectors, in accordance with one or more examples. DETAILED DESCRIPTION In the following detailed description, reference is made to the accompanying drawings, which form a part hereof, and in which are shown, by way of illustration, specific examples of embodiments in which the present disclosure may be practiced. These embodiments are described in sufficient detail to enable a person of ordinary skill in the art to practice the present disclosure. However, other embodiments may be utilized, and structural, material, and process changes may be made without departing from the scope of the disclosure. The illustrations presented herein are not meant to be actual views of any particular method, system, device, or structure, but are merely idealized representations that are employed to describe the embodiments of the present disclosure. The drawings presented herein are not necessarily drawn to scale. Similar structures or components in the various drawings may retain the same or similar numbering for the convenience of the reader; however, the similarity in numbering does not mean that the structures or components are necessarily identical in size, composition, configuration, or any other property. The following description may include examples to help enable one of ordinary skill in the art to practice the disclosed embodiments. The use of the terms “exemplary,” “by example,” and “for example,” means that the related description is explanatory, and though the scope of the disclosure is intended to encompass the examples and legal equivalents, the use of such terms is not intended to limit the scope of an embodiment or this disclosure to the specified components, steps, features, functions, or the like. It will be readily understood that the components of the embodiments as generally described herein and illustrated in the drawing could be arranged and designed in a wide variety of different configurations. Thus, the following description of various embodiments is not intended to limit the scope of the present disclosure, but is merely representative of various embodiments. While the various aspects of the embodiments may be presented in drawings, the drawings are not necessarily drawn to scale unless specifically i