Patents by Inventor James M. Connelly

James M. Connelly has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240137472
    Abstract: A method for remote identification of security threats in an imaged object including transmitting an initialization signal to a first threat detection scanner over a communication network, the first threat detection scanner being located at a separate physical location, receiving a ready-to-send signal from the first threat detection scanner, the ready-to-send signal including a storage location of a scan image generated by the first threat detection scanner for security inspection, receiving the scan image from the first threat detection scanner, transmitting, after receiving the scan image from the first threat detection scanner, a second initialization signal to a second threat detection scanner at the separate physical location, generating a threat detection report based on a rendering of the scan image, and transmitting the threat detection report to the first threat detection scanner.
    Type: Application
    Filed: December 1, 2023
    Publication date: April 25, 2024
    Applicants: CHERTOFF GROUP, LLC, IDSS HOLDINGS, INC.
    Inventors: Lee R. KAIR, Jeffery J. HAMEL, Daniel S. PODER, Metin K. ALAYBEYOGLU, George M. HARDY, III, James M. CONNELLY, Edward M. OLIN, JR.
  • Publication number: 20240137471
    Abstract: A method for remote identification of security threats in an imaged object including transmitting an initialization signal to a first threat detection scanner over a communication network, the first threat detection scanner being located at a separate physical location, receiving a ready-to-send signal from the first threat detection scanner, the ready-to-send signal including a storage location of a scan image generated by the first threat detection scanner for security inspection, receiving the scan image from the first threat detection scanner, transmitting, after receiving the scan image from the first threat detection scanner, a second initialization signal to a second threat detection scanner at the separate physical location, generating a threat detection report based on a rendering of the scan image, and transmitting the threat detection report to the first threat detection scanner.
    Type: Application
    Filed: August 7, 2023
    Publication date: April 25, 2024
    Applicants: CHERTOFF GROUP, LLC, IDSS HOLDINGS, INC.
    Inventors: Lee R. KAIR, Jeffery J. HAMEL, Daniel S. PODER, Metin K. ALAYBEYOGLU, George M. HARDY, III, James M. CONNELLY, Edward M. OLIN, JR.
  • Patent number: 7720194
    Abstract: A stand-alone inspection system operating reliably with high throughput. The system employs automated image analysis to distinguish between cleared items and suspicious items. Cleared items pass through the inspection system without stopping, but the system stops suspicious items at a predetermined location so that the alarmed items can be readily identified by an operator. The system also displays information on the items that allows an operator to confirm that the item in the predetermined location is an alarmed item. Rather than resolving the alarmed item with the system stopped, the operator records an indicia of the alarmed item and the alarmed item is removed for further inspection or other processing. The recorded indicia provides a tracking mechanism that ensures alarmed bags are resolved.
    Type: Grant
    Filed: February 6, 2008
    Date of Patent: May 18, 2010
    Assignee: L-3 Communications Security and Detection Systems Inc.
    Inventors: James M. Connelly, Paul Green, Joseph G. Nuttall
  • Patent number: 7653176
    Abstract: An angular analysis system that can be controlled to receive radiation at a defined angle from a defined focus region. The angular analysis system is used for level 2 inspection in an explosive detection system. Level 2 inspection is provided by a three-dimensional inspection system that identifies suspicious regions of items under inspection. The angular analysis system is focused to gather radiation scattered at defined angles from the suspicious regions. Focusing may be achieved in multiple dimensions by movement of source and detector assemblies in a plane parallel to a plane holding the item under inspection. Focusing is achieved by independent motion of the source and detector assemblies. This focusing arrangement provides a compact device, providing simple, low cost and accurate operation.
    Type: Grant
    Filed: June 14, 2006
    Date of Patent: January 26, 2010
    Assignee: L-3 Communications Security and Detection Systems Inc.
    Inventors: Richard C. Smith, Robert W. Madden, James M. Connelly
  • Patent number: 7519152
    Abstract: An angular analysis system that can be controlled to receive radiation at a defined angle from a defined focus region. The angular analysis system is used for level 2 inspection in an explosive detection system. Level 2 inspection is provided by a three-dimensional inspection system that identifies suspicious regions of items under inspection. The angular analysis system is focused to gather radiation scattered at defined angles from the suspicious regions. Focusing may be achieved in multiple dimensions by movement of source and detector assemblies in a plane parallel to a plane holding the item under inspection. Focusing is achieved by independent motion of the source and detector assemblies. This focusing arrangement provides a compact device, providing simple, low cost and accurate operation.
    Type: Grant
    Filed: June 14, 2006
    Date of Patent: April 14, 2009
    Assignee: L-3 Communications Security and Detection Systems, Inc.
    Inventors: Richard C. Smith, Robert W. Madden, James M. Connelly
  • Publication number: 20080198967
    Abstract: A stand-alone inspection system operating reliably with high throughput. The system employs automated image analysis to distinguish between cleared items and suspicious items. Cleared items pass through the inspection system without stopping, but the system stops suspicious items at a predetermined location so that the alarmed items can be readily identified by an operator. The system also displays information on the items that allows an operator to confirm that the item in the predetermined location is an alarmed item. Rather than resolving the alarmed item with the system stopped, the operator records an indicia of the alarmed item and the alarmed item is removed for further inspection or other processing. The recorded indicia provides a tracking mechanism that ensures alarmed bags are resolved.
    Type: Application
    Filed: February 6, 2008
    Publication date: August 21, 2008
    Inventors: James M. Connelly, Paul Green, Joseph G. Nuttall