Risk
11/29/2010
08:41 AM
Alexander Wolfe
Alexander Wolfe
Slideshows
Connect Directly
Twitter
Facebook
RSS
E-Mail
50%
50%

5 Airport Body Scanner Patents Stripped Down

Here's a deep dive on five patents applying X-ray backscatter technology to airport contraband detection. These screening machines have been much in the news recently, amid controversy regarding both their effectiveness and the amount of radiation exposure to which travelers are subjected. The patents we'll look at are from prime players in the airport body scanner field. This list is led by Rapiscan Systems Inc. , of Torrance, Calif., which in 2009 won the TSA contract to supply whole-body imag
Previous
1 of 21
Next


The first sheet from Rapiscan's patent 7,796,733, entitled "Personnel security screening system with enhanced privacy" is shown. According to the patent document, the invention "relates to image processing techniques that employ maximum threat detection performance and minimal information loss. More particularly, the invention relates to the field of radiant energy imaging systems and methods and to image processing techniques for detecting concealed objects carried on the body or clothing of a person without compromising the privacy of the person." A further explanation delves into how contraband can be detected by X-rays: "Non-metallic objects are commonly composed of low atomic number elements similar to those of human tissue, i.e. hydrogen, carbon, nitrogen, and oxygen. Soft human tissue scatters a significant amount of X-rays due to the relatively low atomic number of hydrogen, carbon, and oxygen in relatively high concentration. Due to the high atomic number of calcium, bones near the surface of the body, comprised mainly of calcium, produce much less scatter. Concealed objects, especially metals, can be easily visualized in the images due to their significant difference in atomic composition from the background of human tissue."

For Further Reading

Wolfe's Den: Airport Scanner Patents Promise Not To Show Your 'Junk'

Previous
1 of 21
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-2977
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via unspecified vectors.

CVE-2015-2978
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to bypass authentication and complete a conference-room reservation via unspecified vectors, as demonstrated by an "unintentional reservation."

CVE-2015-2979
Published: 2015-07-29
Webservice-DIC yoyaku_v41 allows remote attackers to execute arbitrary OS commands via unspecified vectors.

CVE-2015-4286
Published: 2015-07-29
The web framework in Cisco UCS Central Software 1.3(0.99) allows remote attackers to read arbitrary files via a crafted HTTP request, aka Bug ID CSCuu41377.

CVE-2015-4290
Published: 2015-07-29
The kernel extension in Cisco AnyConnect Secure Mobility Client 4.0(2049) on OS X allows local users to cause a denial of service (panic) via vectors involving contiguous memory locations, aka Bug ID CSCut12255.

Dark Reading Radio
Archived Dark Reading Radio
What’s the future of the venerable firewall? We’ve invited two security industry leaders to make their case: Join us and bring your questions and opinions!