Patents by Inventor Paul DeLia

Paul DeLia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8350747
    Abstract: A surveillance system is disclosed. In some embodiments, the surveillance system may include at least one controller adapted to control operation of first and second screening apparatus and to produce image data and screening data, to relate the image data to the screening data, and to produce relational information data from the related image data and screening data. In some embodiments, the system may include a first screening apparatus adapted to screen a subject in a subject position, a second screening apparatus adapted to screen the subject in the subject position, and a controller adapted to produce first and second screening data from the first and second screening apparatus, respectively, relate the first and second screening data, and to produce relational information data from the related first and second screening data.
    Type: Grant
    Filed: April 25, 2007
    Date of Patent: January 8, 2013
    Assignee: L-3 Communications Security and Detection Systems, Inc.
    Inventors: Paul DeLia, Scott T. Trosper, Thomas E. Breen, John J. Reilly, Paul J. Hurd, Michael J. Lanzaro, Maya M. Radzinski, Thomas W. Grudkowski, Edward E. Bromberg, Joseph Carter
  • Publication number: 20120105267
    Abstract: A surveillance system is disclosed. In some embodiments, the surveillance system may include at least one controller adapted to control operation of first and second screening apparatus and to produce image data and screening data, to relate the image data to the screening data, and to produce relational information data from the related image data and screening data. In some embodiments, the system may include a first screening apparatus adapted to screen a subject in a subject position, a second screening apparatus adapted to screen the subject in the subject position, and a controller adapted to produce first and second screening data from the first and second screening apparatus, respectively, relate the first and second screening data, and to produce relational information data from the related first and second screening data.
    Type: Application
    Filed: April 25, 2007
    Publication date: May 3, 2012
    Applicant: L-3 Communications Security and Detection Systems, Inc.
    Inventors: Paul DeLia, Scott T. TROSPER, Thomas E. BREEN, John J. Reilly, Paul J. Hurd, Michael J. LANZARO, Maya M. Radzinski, Thomas W. GRUDKOWSKI, Edward E. BROMBERG, Joseph Carter
  • Patent number: 7734066
    Abstract: A security system with a processor that receives information from multiple sources. The system is illustrated by a network of inspection machines at multiple locations in an airport, such as at check-in desks. These machines provide data to the processor for threat detection processing. The processor provides a central control and data integration point. Centralized control may be used to readily adapt threat detection programs and data integration may allow more accurate or more thorough threat determinations to be made. Moreover, centralized processing of computation intensive operations, such as image reconstruction, may provide for more efficient processor utilization throughout the system, providing a lower total processing cost. Additionally, centralized processing allows for human decision makers to be readily integrated into the system.
    Type: Grant
    Filed: November 19, 2004
    Date of Patent: June 8, 2010
    Assignee: L-3 Communications Security and Detection Systems, Inc.
    Inventors: Paul DeLia, John J. Reilly
  • Publication number: 20060115109
    Abstract: The application discloses a system and methods for remote access and analysis of data collected about items under inspection. The system includes a data collection station, that may include an X-ray scanner, that scans the items under inspection to obtain data about the items. The data is transmitted to one or more remote expert stations, where a remote expert analyzes the data to determine whether the item contains a potential threat, such as, for example, explosives or other contraband.
    Type: Application
    Filed: September 16, 2005
    Publication date: June 1, 2006
    Applicant: L-3 Communications Security and Detection Systems, Inc.
    Inventors: Andrea Whitson, Paul DeLia
  • Publication number: 20050198226
    Abstract: A security system with a processor that receives information from multiple sources. The system is illustrated by a network of inspection machines at multiple locations in an airport, such as at check-in desks. These machines provide data to the processor for threat detection processing. The processor provides a central control and data integration point. Centralized control may be used to readily adapt threat detection programs and data integration may allow more accurate or more thorough threat determinations to be made. Moreover, centralized processing of computation intensive operations, such as image reconstruction, may provide for more efficient processor utilization throughout the system, providing a lower total processing cost. Additionally, centralized processing allows for human decision makers to be readily integrated into the system.
    Type: Application
    Filed: November 19, 2004
    Publication date: September 8, 2005
    Inventors: Paul DeLia, John Reilly
  • Publication number: 20050110672
    Abstract: An inspection system that can detect contraband items concealed on, in or beneath an individual's clothing. The system employs mm wave radiation to detect contraband items. The system is described in connection with a check point security system that includes temperature controlled walls to enhance imaging of contraband items. Also, a mm wave camera is used in conjunction with a camera that forms visible images. To address privacy concerns of displaying images of people made with mm wave cameras that effectively “see through” clothes, the mm wave images are not displayed directly. Rather, computer processing produces indications of suspicious items from the underlying raw mm wave images. The indications of suspicious items are overlaid on the visible image.
    Type: Application
    Filed: October 12, 2004
    Publication date: May 26, 2005
    Applicant: L-3 Communications Security and Detection Systems, Inc.
    Inventors: Apostle Cardiasmenos, Paul DeLia