MULTIPLE-FACTOR RECOGNITION AND VALIDATION FOR SECURITY SYSTEMS

    公开(公告)号:US20220292902A1

    公开(公告)日:2022-09-15

    申请号:US17200611

    申请日:2021-03-12

    Abstract: A security system can conditionally grant or deny access to a protected area using an artificial intelligence system to analyze images. In an example, an access control method can include receiving candidate information about a face and gesture from a first individual and receiving other image information from or about a second individual. The candidate information can be analyzed using a neural network-based recognition processor that can provide a first recognition result indicating whether the first individual corresponds to a first enrollee of the security system, and can provide a second recognition result indicating whether the second individual corresponds to a second enrollee of the security system. The example method can include receiving a passcode, such as from the first individual. Access can be conditionally granted or denied based on the passcode and the recognition results.

    System and method for scalable cloud services

    公开(公告)号:US10142381B2

    公开(公告)日:2018-11-27

    申请号:US15463516

    申请日:2017-03-20

    Abstract: The invention is based, in part, on a system for allowing at least one client to real-time monitor and, or playback at least one real-world recognized event via at least one processor-controlled video camera, said system comprising: a processor; a non-transitory storage medium coupled to the processor; encoded instructions stored in the non-transitory storage medium, which when executed by the processor, cause the processor to: detect a threshold-grade event from audio-video data of a real-world environment captured from a processor-controlled video camera by an event detection module within an event management system applying event detection parameters; analyze the threshold-grade event for categorization into any one of a recognized event by an event recognition module within the event management system applying event recognition parameters; transmit at least any one of a single stream of the recognized event and, or a single stream of a audio-video sequence succeeding and, or preceding the recognized event to a client device; and facilitate at least any one of a user defined playback of the single stream of the recognized event, user defined monitoring of the audio-video sequence preceding and, or succeeding the recognized event, and, or remote provisioning of the processor-controlled video camera, whereby the playback and, or provisioning is facilitated via a client device user interface.

    Audio type detection
    16.
    发明授权

    公开(公告)号:US12142261B2

    公开(公告)日:2024-11-12

    申请号:US17203269

    申请日:2021-03-16

    Abstract: Artificial intelligence-based processing can be used to classify audio information received from an audio input unit. In an example, audio information can be received from a microphone configured to monitor an environment. A processor circuit can identify identifying one or more features of the audio information received from the microphone and use a first applied machine learning algorithm to analyze the one or more features and determine whether the audio information includes an indication of an abnormal event in the environment. In an example, the processor circuit can use a different second applied machine learning algorithm, such as a neural network-based deep learning algorithm, to analyze the same one or more features and classify the audio information as including an indication of a particular event type in the environment.

    Enrollment System with Continuous Learning and Confirmation

    公开(公告)号:US20220292170A1

    公开(公告)日:2022-09-15

    申请号:US17200584

    申请日:2021-03-12

    Abstract: Person or object authentication can be performed using artificial intelligence-enabled systems. Reference information, such as for use in comparisons or assessments for authentication, can be updated over time to accommodate changes in an individual's appearance, voice, or behavior. In an example, reference information can be updated automatically with test data, or reference information can be updated conditionally, based on instructions from a system administrator. Various types of media can be used for authentication, including image information, audio information, or biometric information. In an example, authentication can be performed wholly or partially at an edge device such as a security panel in an installed security system.

Patent Agency Ranking