摘要:
A credentialing system comprises an identity source storing identity attributes for users, identity wallets for users that enable access to the identity attributes in the identity source, and identity brokers for accessing the identity source on behalf of access control systems of organizations. This system can address both the data privacy and trust issues allowing a non-authoritative identity source in a distributed environment to be used for all identity purposes through the ability to broker the identity and attributes of the identity across any number of physical or logical credentials and across different organizations. The system further implements an identity score stored along with identity attributes. The score rates the strength of the identity from the global non-authoritative source.
摘要:
An identity token based access control system and method is disclosed. A distributed security system that manages access to business and/or governmental entities creates an identity credential for a user and obtains or generates a globally unique identity token for the user, and loads the identity credential and the identity token onto a user device. The user then presents the user device including the identity credential and the identity token to an access control system (ACS) of the security system of the business entity that generated the identity token to obtain access to its security system, or to an ACS of a security system of one or more third party business entities that support the use of identity tokens to obtain access to the security systems of the third party business entities. The identity tokens are preferably random numbers or strings. The identity credentials typically include biometric information for users.
摘要:
An access control system and method for monitoring a public access point are disclosed. The system includes a positioning unit that tracks locations of users carrying user devices relative to the public access point, where the user devices transmit user information identifying the users via wireless signals. The system determines whether the users are authorized to pass through the access point based on the wireless signals from the user devices. Public access points include security checkpoints at government buildings, airports, amusement parks, and universities, in examples. In embodiments, biometric identifiers are obtained from the users when the users are preferably located within a threshold area of the public access points, and the system confirms the identity of the authorized users via the biometric identifiers to enable the users to pass through the public access points. Additionally, the system can assist in evacuation of users based on their tracked locations.
摘要:
A security camera system detects misting within the transparent portion of the security camera system by analyzing the actual images that are captured by the security camera system in order to determine whether or not there is misting on the transparent portion. Specifically, video analytics are applied to detect areas of the scene that appear to be out of focus as a result of misting of the transparent portion of the security camera system, also known as the bubble. The system uses, in a preferred embodiment, an edge-detection algorithm to look for areas of the scene that appear to have gone out of focus. When these are detected, the condensation mitigation system is activated in order to remove any misting.
摘要:
A video monitoring and analysis system detect subjects when they are entering and/or exiting from a room. The system enables a user to define a portal, such as doorway of the room. The system then monitors the movement of foreground objects in the room. Objects that appear only in the portal are classified as passing by the portal, e.g., doorway. Objects that initially appear in the portal and then are detected moving within the room are classified as having entered the room. Objects that are in the room and then disappear within the portal are classified as having exited the room. The system further has provisions for generating real-time alerts and performing forensic searches.
摘要:
A method and system for converting privacy zone corner points in a still image to PTZ coordinates using the equations for distance along the great circles of a sphere, where the sphere is defined along the pan-tilt axes of a PTZ camera with radius equal to the focal length of the image. The method includes receiving planar coordinate data defining a plurality of privacy zone corner points, the planar coordinate data taken from a still image, converting each privacy zone corner point to corresponding spherical coordinates, converting each of the corresponding spherical coordinates to corresponding PTZ coordinates, and storing the corresponding PTZ coordinates in a storage device. The stored PTZ coordinates may then be transmitted to a computer monitor. The motor of the PTZ camera moves the camera according to the PTZ coordinates until the privacy zone corner points appear at the substantial center of the monitor screen.
摘要:
An EAS security tag for providing both EAS and battery recharging features within one tag. The tag includes a rechargeable battery and an antenna having a magnetic core and at least one coil winding disposed around at least a portion of the core. The antenna supplies a voltage corresponding to a first frequency or a second frequency when placed within a magnetic field. The tag also includes an EAS circuit having a resonant frequency corresponding to the first frequency, and an energy harvesting circuit having a resonant frequency corresponding to the second frequency, where the battery recharging circuit recharges the rechargeable battery. Depending upon the magnetic field that the tag is exposed to, either the EAS circuit is enabled thus allowing for EAS detection or the energy harvesting circuit is enabled allowing for the battery to be recharged.
摘要:
A radio frequency identification ("RFID") hybrid packet radio is provided having full duplex operability. The RFID packet radio includes an antenna and a radio that receives and transmits a packet radio signal and a RFID signal. A processor is provided in communication with the radio to perform signal detection and demodulation with respect to the RFID signal. A transmit path is provided to transport the packet radio signal and the RFID signal from the radio to the antenna. The RFID packet radio includes a first receive path for transporting a received packet radio signal from the antenna to the radio and a second receive path, different from the first receive path, to transport a received RFID signal from the antenna to the processor. The first receive path and the second receive path enable simultaneous transmission and reception of RFID signals.
摘要:
A method and tag for decoding a signal received from a radio frequency identification ("RFID") reader. A signal is received from the RFID reader in which the signal has a series of pulses. A time frame between receipt of two consecutive pulses is measured to determine whether the pulses represent zero bits or one bits. A total pulse duration is calculated in which the total pulse duration represents a sum of the measured time frames for the signal. A command is decoded. The decoding is based on the total duration of the two pulses.