Development of airport security inspection mode

Development of airport security inspection mode You need to go through security before you board the plane, but are you really safe for the plane? Airport security inspections are of major importance, and the key element of security screening is not easy to detect. The security inspection model is actually a combination of international rules, national policies, industry standards and norms, the status quo and trends of related technologies, security inspection business requirements, economic development status, ethnic cultural characteristics and other factors, and ultimately serves civil aviation, national and international social security. Safeguard forms and methods. The historical evolution and development of the airport security model are reviewed here, and the characteristics and application of various security inspection modes are introduced for the security inspection business.

The development and change of the airport security model and its application The airport security inspection service to ensure aviation safety is related to the safety of the lives of thousands of passengers. It is closely related to our daily lives and is also an important frontline for international anti-terrorism. Once an aviation accident occurs, the consequences will be catastrophic, and the impact on society will be enormous. The restoration of public confidence will be extremely difficult. It will even lead to war among nations and lead to major changes in international relations.

How is "airport security" defined? In China, according to the "Civil Aviation Law of the People's Republic of China" and the "Regulations on the Protection of Civil Aviation Safety of the People's Republic of China", the "Civil Aviation Inspection Rules of China" promulgated by the Civil Aviation Administration of China specifies the safety inspections (see Article 3: "The civil aviation safety inspection department (hereinafter referred to as the security inspection department) shall, in accordance with relevant laws, regulations and these rules, carry out safety inspection work (hereinafter referred to as security inspection work) to prevent entry of dangerous goods and prohibited articles that endanger aviation safety. Civil aircraft protects the safety of civil aircraft and the personnel and assets they carry.” This can be regarded as the most authoritative definition and interpretation of airport security inspections in China (hereinafter referred to as security inspections). Looking back at the United States, shortly after the "9-11 incident" in 2001, the Federal Aviation Administration’s Executive Deputy Director Monte R. Belger stated the following on the security inspection and its role in the US Senate hearing: "The purpose of aviation safety is to prevent Injuries to planes, passengers, and crew occupants, while supporting national security and anti-terrorism policies.” The broader requirements for airport security screening triggered by specific events have spread globally.

The airport security screening that the security screening mode presents to the passengers is only a small part of the surface. The security screening mode that is not known to ordinary people is a concentrated reflection and maintenance of all aspects of the security inspection industry. It may be due to the fact that it is too broad, and so far there has not been an accurate, comprehensive, and clear definition of the concept of security screening. We believe that the security inspection mode is a combination of international rules, national policies, industry standards and norms, the status quo and trends of related technologies, security inspection business requirements, economic development status, ethnic cultural characteristics, and other factors, and ultimately serves civil aviation, national and international communities. Safeguarding forms and methods of security.

The emergence and development of security inspection models are fundamentally driven by security events.

The first threat to civil aviation was hijacking. The first recorded hijackings and the first hijackings to be killed also date back to Peru in 1931 and the United States in 1939. According to statistics, between the 1948 and 1957 years after World War II, 15 hijacking incidents occurred in the world, averaging less than two a year. However, in 1969, 82 hijackings took place each year. In January alone, 8 aircraft were robbed from the United States to Cuba. This was mainly due to the bi-directional hijacking caused by the confrontation between the United States and Cuba. The United States was forced to start deploying air police in 1970, but the number was very low and effective safety measures had to be picked up from the ground. In 1972, the Federal Aviation Administration of the United States required all airlines to carry out security checks on passengers and their carry-on baggage, beginning on January 5, 1973.

With the development of popularization of civil aviation around the world and the intensification of various international nations, religions, and terrorism, the aviation safety incidents surrounding hotspots have become increasingly fierce, resulting in increasingly serious casualties, and security inspections have become popular in demand. In the course of the confrontation, the security model has gradually been shaped and improved in a targeted and predictable manner.

“Seeds” security model In fact, the concept of security model is not clearly defined at home and abroad, but the industry in order to briefly describe the status of a certain security applications, and use some of the image characteristics of words to indicate its characteristics. In the early days, the most common form of security in the world was to set up the first security line at the entrance of the airport terminal building, equipped with security inspection equipment, and set up a second security inspection line in the terminal building to provide baggage and personal security. equipment. The inspection method is as follows: The first security line checks all the passenger's baggage (delivery and hand-carry), but the person does not check; after the passenger completes the check-in formalities, the second line checks the hand baggage and the person. Because its original intention is to plan the entire departure terminal area as a safe area, our industry is vividly called a safe “big circle”. The check-in service is also called "foyer entrance type" security mode. This model played an early role, that is, in the near future, this security model can still be seen at airports in some countries and regions. However, this model has exposed a large number of potential safety hazards and inefficiencies. For example, if the checked baggage is returned to the passengers' hands, the passenger’s personal body has not been checked, the hand baggage is repeatedly checked, and there are still problems such as poor service image. .

"Counter-style" security model In the 1980s, China's airports still used the "big sheep" model that was once popular in the world, but the problems and drawbacks of commonness began to appear. In May 5th, 1983, the Zhuo Changren hijacking incident and the numerous mainland hijacking incidents in the 1990s, especially in 1993, led China’s Civil Aviation Administration to resolutely initiate and fully implement the “process transformation” and proposed that “the handling of the running baggage be 100% complete”. The checked baggage cannot be returned to the passengers' goal. So the so-called "counter model" came into being, will be transferred to check baggage security work into the background process, check baggage after security checks will not return to the hands of passengers, eliminating the existing process safety hazards. This model is more suitable for the characteristics of China's national conditions, more in line with the needs of passengers for humanity, and allows the terminal lobby to save space for passengers, and can further optimize the use of airport space.

The earliest counter model was first applied at the original Kai Tak Airport in Hong Kong in 1991. The main body of the system was constructed with the dual-channel X-ray inspection equipment of the First Institute of the Ministry of Public Security. The design concept of the system is to move the first security inspection line back to the check-in counter, combining the characteristics of the check-in counter two-set, equipped with dual-channel X-ray security inspection equipment, and equipped with one-on-one security inspectors to ensure that the inspection Luggage can no longer be returned to passengers. The dual-channel security inspection equipment solved the actual needs of the civil aviation security inspection process at that time and was widely used and well received once it was launched.

Afterwards, it further cooperated with the “Process Transformation” of the Civil Aviation Administration of China, and tackled issues such as excessive personnel waste and image inconvenience caused by the counter mode of local security screening staff. The First Institute of the Ministry of Public Security took the lead in developing the first generation of the industry using modern IT technology. All-digital hierarchical management security system, integrated FISCAN single and dual-channel security inspection equipment, and successfully put into operation in Guangzhou Baiyun Airport and Shenyang Taoxian Airport in late 1993 and early 1994. Subsequently, the FISCAN hierarchical management and security inspection system was universally applied throughout the country's airports. After nearly 20 years of development of the fourth-generation system, it has been the de facto "counter-type" security inspection system standard in the industry.

It can be said that the "counter-type" security inspection mode is marked by the digitization, networking, and informatization pioneered by the security inspection industry. It has created a new international security inspection model, making the security system of China's mainstream airports have long been efficient and safe. Far more than the major foreign airports.

The "Main Belt" security model that took place on December 21, 1988 in the Lockerbie crash was a typical event, signaling a shift in the form of hijacking to a more terrifying bombing. While successfully developing the explosive detection and security screening equipment for handling baggage, it also poses a challenge to the existing security inspection mode. This is due to the large, secondary, and expensive prices of explosive detection and security inspection equipment. The volume is too large and it will occupy a large area of ​​check-in halls at the counter. The equipment is too heavy. It is impossible to carry so many heavy equipment on the check-in hall on the second floor of the terminal. The price is too expensive. Can not afford it at all. Therefore, the security line is moved back again, and the explosive detection and security inspection equipment is installed on the main belt and becomes the most possible solution, thus forming a multi-level system (three or five levels). This is the “main band mode” and It can be called "embedded mode". The "Main Belt Mode" system of the First Research Institute of the Ministry of Public Security has been put into use at domestic airports and exported overseas.

However, it should be noted that the requirements of China’s civil aviation security regulations must be open for inspection when the passengers are present. The counter mode can be used to complete the opening inspection on the spot in time, while the main band mode requires layers of passengers to be intercepted. Return in time, so it has a greater impact on the normal flow of passengers. Although foreign regulations can force open inspections, it will ultimately affect the image of the service. In order to reduce the opening rate, the scope of inspection and control of contraband in the main band mode has also been reduced to varying degrees. In addition, foreign countries can accept the level of baggage images passed by the first-class security inspection equipment without the need for secondary work such as manual interpretation. In order to improve safety, the domestic government still requires that all images be sent to secondary judgement, and thus to the security inspectors. The quantity produced different needs. Therefore, if the explosive detection and security inspection equipment can be made small, light, and the price is greatly reduced, so that the security inspection equipment with explosive detection capabilities can be installed at the counter, then the counter mode is superior to the master only in terms of security mode. Belt mode.

The travel inspection business model above describes the changes in the business model of airport inspections, as well as the existence of the travel inspection business model. Airport security inspections The personal security inspection equipment is used to inspect passengers. With the occurrence of various related civil aviation security incidents, the technology and rules of travel inspection are constantly changing.

The early travel inspection equipment was a stand-alone way of working. In order to achieve centralized storage of images for easy review, the first institute of the Ministry of Public Security in 2001 took the lead in launching the first hierarchical management system for travel inspection. In order to achieve correspondence between people, at present the domestic airport generally adopts security inspection information management system.

The "5-7 air crash" occurred in China in 2002 and the "Trans-Atlantic Plan" that was attempted in the United Kingdom to fly more than 10 liquid bombs flying to the United States and Canada in 2006, making the control of liquids under the security rules. Strictly rigorous, inspection regulations and test methods have also been introduced. Manufacturers are also actively developing inspection equipment that can detect dangerous liquids such as flammable and explosive. In addition, the "9-11 incident" and the "Christmas bomb incident" on December 25, 2009 (commonly referred to as the "trousers bomb incident") have made the development and application of the new technology for controversial passengers' body-imaging inspections persistent. Discuss hot spots.

The overall solution model Today, the airport security business model has begun to enter the needs of the overall solution phase, requiring security companies to provide security coverage of various business related to airport security systems, and information is completely without technical bottlenecks to share. Based on the comprehensive architecture-based airport hierarchical management security inspection product line built over the years, using the “systems system” research and development ideas, the first institute of the Ministry of Public Security launched the airport security inspection layered management information system overall solution in 2010. .

Hierarchical management of the overall airport solution for the security inspection system product line First, the overall solution has broken the status of “information isolated islands” of past departments or service subsystems, and covered the services of multiple security-related departments in the airport through a unified network. This is the so-called "large security check" (or "joint check") concept. These joint inspection units include security inspection, customs, inspection and quarantine, public security, and national security agencies. In particular, it fully satisfies the security inspection business. It accommodates check-in baggage inspection, passenger hand baggage inspection, passenger certificate inspection, passenger personal check, baggage check, goods and cargo inspection, CT line inspection in the first-line security inspection business. Package inspection, liquid inspection, CCTV monitoring, and security personnel training and assessment in the management of second-line security inspections, handling of security inspection emergencies, anti-hijacker emergency enquiries, comprehensive security information management, etc. Through the airport security inspection hierarchical management information system, the airport security related departments can complete their work more conveniently and efficiently by comprehensively researching, judging and utilizing information on a centralized, unified and information-rich integrated service platform.

Secondly, based on the open architecture design, the system implements interfaces with airport baggage handling systems, departure systems, clock systems, flight information integration systems, boarding gate systems, and other systems, through the integration of related information and associated applications. Improving the efficiency and quality of collaborative work among the various business-related departments. At the same time, this open architecture also facilitates the expansion of system scale and new business functions. For example, during the operation of the system, the function of “passing passengers only through identity cards” was added to meet the new business needs of the airlines and provide more personalized services for passengers. Another example is the application of metropolitan area network technology, the system has also expanded the realization of the "urban terminal" function, passengers in the "city" can be easily completed prior to the security check of baggage, and then "lightly loaded" to the airport. In addition, for an international metropolis, which usually has multiple airports, the system provides cross-airport security services to facilitate passengers to transit.

The overall solution for the airport security inspection layered management information system is applicable to large and medium-sized airports, especially large-scale hub airports with complex environments. The most typical case is the Shanghai Hongqiao integrated transport hub security management layered management system, which integrates aviation, railways, magnetic levitation, urban rail transit, highway passenger transport, city buses, taxis and other transportation methods, the system in 2010 March 16 was put into operation and provided advanced technical support for the successful hosting of the Shanghai World Expo.

Conclusion In summary, users can use security models that suit their characteristics based on the size of the airport and the requirements and design of the security inspection. In general, the development of security inspections and their design can be summarized as the following basic points.

Incident correlation: From the above description, it can be seen that the adoption of a security check mode is usually triggered by a specific civil aviation security incident. The so-called “magic heights and high levels of ten feet” will make the design of future security inspection models more forward-looking. Sex.

Based on best practices: The status of security inspection technology development plays a role in promoting or constraining. Whether a security inspection model can eventually be popularized is largely based on the effectiveness of a security system's best practices.

Multidimensional people: The security inspection mode is sharpened by the parties involved in the security inspection process in the process of both collaborative promotion and mutual restraint. These stakeholders include: end-users, tenderers, bidders and manufacturers, professional consulting agencies, The success of a security model depends on the full participation of relevant parties, such as maintenance agencies, governments, and functional departments at all levels, testing and testing agencies.

The complexity of the system interface: An efficient and perfect security model depends on the establishment of an interface between the security system and multiple low-power systems at the airport and information exchange. Its design criteria are high system cohesion and loose coupling of interfaces.

Scalability: A security model must have a thorough research and sufficient pre-judgment on the future international situation, national policies, industry evolution, technology development, and demand trends, reflecting flexible scalability.

The trend of standardization: The formation of security inspection models involves planning, design, implementation, testing, evaluation, review, review, approval, etc., showing a trend of standardization and periodical progress.

The balance of performance and cost: The successful completion of the security model, avoiding the trade-off between performance and cost, is also the result of multi-stakeholder game.

High-confidence system and software engineering: The security model has the distinctive features of software-intensive, life-critical, safety-critical, and mission-critical. It must be supported by high-trust system engineering and software engineering.

Safety First: The last but most important thing is that the safety inspection mode must reflect safety first everywhere.

Rapid prototyping with 3D Printing is the quick, easy, cost effective way to turn great ideas into successful products. Do you need concept modeling to put your newest ideas to the test? What about functional prototyping to gauge performance before committing to costly production tooling? Rapid prototyping solutions from Stratasys will give you the flexibility to create, test and refine in ways you never thought possible so you can go to market faster than ever before.


Everyone knows that 3D printing is an excellent way to produce prototypes for concept review or form-fit-function testing, but the examples listed are evidence that it`s becoming an increasingly popular method for producing [real" parts. This is especially true when volumes are low enough that casting and molding are not cost effective, or where part complexity prohibits processes like machining. Before you begin work on your next medical device or aerospace component, however, consider the following:


Technology: PFMOLD uses three different additive manufacturing processes: direct metal laser sintering (DMLS), selective laser sintering (SLS), and stereolithography (SL). By virtue of its ability to create fully dense metal parts on demand, DMLS is a tested and proven option for end-use applications, although SLS is often an excellent solution for low-volume plastic end-use components. SL has always been a prototype-centric process, although secondary coating technologies exist to add durability to SL`s resin-based parts.


3D printing

3D Printing

3D Printing,Rapid Prototype,Zinc Casting Mold,2k Molding

PF Mold Co., Ltd. , http://www.pf-mold.com