Risk
11/29/2010
08:41 AM
Alexander Wolfe
Alexander Wolfe
Slideshows
Connect Directly
Twitter
Facebook
RSS
E-Mail
50%
50%

5 Airport Body Scanner Patents Stripped Down

Here's a deep dive on five patents applying X-ray backscatter technology to airport contraband detection. These screening machines have been much in the news recently, amid controversy regarding both their effectiveness and the amount of radiation exposure to which travelers are subjected. The patents we'll look at are from prime players in the airport body scanner field. This list is led by Rapiscan Systems Inc. , of Torrance, Calif., which in 2009 won the TSA contract to supply whole-body imag
Previous
1 of 21
Next


The first sheet from Rapiscan's patent 7,796,733, entitled "Personnel security screening system with enhanced privacy" is shown. According to the patent document, the invention "relates to image processing techniques that employ maximum threat detection performance and minimal information loss. More particularly, the invention relates to the field of radiant energy imaging systems and methods and to image processing techniques for detecting concealed objects carried on the body or clothing of a person without compromising the privacy of the person." A further explanation delves into how contraband can be detected by X-rays: "Non-metallic objects are commonly composed of low atomic number elements similar to those of human tissue, i.e. hydrogen, carbon, nitrogen, and oxygen. Soft human tissue scatters a significant amount of X-rays due to the relatively low atomic number of hydrogen, carbon, and oxygen in relatively high concentration. Due to the high atomic number of calcium, bones near the surface of the body, comprised mainly of calcium, produce much less scatter. Concealed objects, especially metals, can be easily visualized in the images due to their significant difference in atomic composition from the background of human tissue."

For Further Reading

Wolfe's Den: Airport Scanner Patents Promise Not To Show Your 'Junk'

Previous
1 of 21
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0103
Published: 2014-07-29
WebAccess in Zarafa before 7.1.10 and WebApp before 1.6 stores credentials in cleartext, which allows local Apache users to obtain sensitive information by reading the PHP session files.

CVE-2014-0475
Published: 2014-07-29
Multiple directory traversal vulnerabilities in GNU C Library (aka glibc or libc6) before 2.20 allow context-dependent attackers to bypass ForceCommand restrictions and possibly have other unspecified impact via a .. (dot dot) in a (1) LC_*, (2) LANG, or other locale environment variable.

CVE-2014-0889
Published: 2014-07-29
Multiple cross-site scripting (XSS) vulnerabilities in IBM Atlas Suite (aka Atlas Policy Suite), as used in Atlas eDiscovery Process Management through 6.0.3, Disposal and Governance Management for IT through 6.0.3, and Global Retention Policy and Schedule Management through 6.0.3, allow remote atta...

CVE-2014-2226
Published: 2014-07-29
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtains sensitive information via unspecified vectors.

CVE-2014-3020
Published: 2014-07-29
install.sh in the Embedded WebSphere Application Server (eWAS) 7.0 before FP33 in IBM Tivoli Integrated Portal (TIP) 2.1 and 2.2 sets world-writable permissions for the installRoot directory tree, which allows local users to gain privileges via a Trojan horse program.

Best of the Web
Dark Reading Radio