Risk
11/29/2010
08:41 AM
Alexander Wolfe
Alexander Wolfe
Slideshows
Connect Directly
Twitter
Facebook
RSS
E-Mail
50%
50%

5 Airport Body Scanner Patents Stripped Down

Here's a deep dive on five patents applying X-ray backscatter technology to airport contraband detection. These screening machines have been much in the news recently, amid controversy regarding both their effectiveness and the amount of radiation exposure to which travelers are subjected. The patents we'll look at are from prime players in the airport body scanner field. This list is led by Rapiscan Systems Inc. , of Torrance, Calif., which in 2009 won the TSA contract to supply whole-body imag
Previous
1 of 21
Next


The first sheet from Rapiscan's patent 7,796,733, entitled "Personnel security screening system with enhanced privacy" is shown. According to the patent document, the invention "relates to image processing techniques that employ maximum threat detection performance and minimal information loss. More particularly, the invention relates to the field of radiant energy imaging systems and methods and to image processing techniques for detecting concealed objects carried on the body or clothing of a person without compromising the privacy of the person." A further explanation delves into how contraband can be detected by X-rays: "Non-metallic objects are commonly composed of low atomic number elements similar to those of human tissue, i.e. hydrogen, carbon, nitrogen, and oxygen. Soft human tissue scatters a significant amount of X-rays due to the relatively low atomic number of hydrogen, carbon, and oxygen in relatively high concentration. Due to the high atomic number of calcium, bones near the surface of the body, comprised mainly of calcium, produce much less scatter. Concealed objects, especially metals, can be easily visualized in the images due to their significant difference in atomic composition from the background of human tissue."

For Further Reading

Wolfe's Den: Airport Scanner Patents Promise Not To Show Your 'Junk'

Previous
1 of 21
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9605
Published: 2015-09-04
WebUpgrade in Netsweeper before 3.1.10, 4.0.x before 4.0.9, and 4.1.x before 4.1.2 allows remote attackers to bypass authentication and create a system backup tarball, restart the server, or stop the filters on the server via a ' (single quote) character in the login and password parameters to webup...

CVE-2015-2990
Published: 2015-09-04
Directory traversal vulnerability in NEOJAPAN desknet NEO 2.0R1.0 through 2.5R1.4 allows remote authenticated users to read arbitrary files via a crafted parameter.

CVE-2015-2991
Published: 2015-09-04
Buffer overflow in NScripter before 3.00 allows remote attackers to execute arbitrary code via crafted save data.

CVE-2015-5612
Published: 2015-09-04
Cross-site scripting (XSS) vulnerability in October CMS build 271 and earlier allows remote attackers to inject arbitrary web script or HTML via the caption tag of a profile image.

CVE-2015-5688
Published: 2015-09-04
Directory traversal vulnerability in lib/app/index.js in Geddy before 13.0.8 for Node.js allows remote attackers to read arbitrary files via a ..%2f (dot dot encoded slash) in the PATH_INFO to the default URI.

Dark Reading Radio
Archived Dark Reading Radio
Another Black Hat is in the books and Dark Reading was there. Join the editors as they share their top stories, biggest lessons, and best conversations from the premier security conference.