REFERENCE IMAGE ENROLLMENT AND EVOLUTION FOR SECURITY SYSTEMS

    公开(公告)号:US20240184868A1

    公开(公告)日:2024-06-06

    申请号:US18427370

    申请日:2024-01-30

    CPC classification number: G06F21/32 G06F18/22 G06N3/08 G06V20/56 G06V40/172

    Abstract: Person or object authentication can be performed using artificial intelligence-enabled systems. Reference information, such as for use in comparisons or assessments for authentication, can be updated over time to accommodate changes in an individual's appearance, voice, or behavior. In an example, reference information can be updated automatically with test data, or reference information can be updated conditionally, based on instructions from a system administrator. Various types of media can be used for authentication, including image information, audio information, or biometric information. In an example, authentication can be performed wholly or partially at an edge device such as a security panel in an installed security system.

    Audio type detection
    3.
    发明授权

    公开(公告)号:US12142261B2

    公开(公告)日:2024-11-12

    申请号:US17203269

    申请日:2021-03-16

    Abstract: Artificial intelligence-based processing can be used to classify audio information received from an audio input unit. In an example, audio information can be received from a microphone configured to monitor an environment. A processor circuit can identify identifying one or more features of the audio information received from the microphone and use a first applied machine learning algorithm to analyze the one or more features and determine whether the audio information includes an indication of an abnormal event in the environment. In an example, the processor circuit can use a different second applied machine learning algorithm, such as a neural network-based deep learning algorithm, to analyze the same one or more features and classify the audio information as including an indication of a particular event type in the environment.

    Enrollment System with Continuous Learning and Confirmation

    公开(公告)号:US20220292170A1

    公开(公告)日:2022-09-15

    申请号:US17200584

    申请日:2021-03-12

    Abstract: Person or object authentication can be performed using artificial intelligence-enabled systems. Reference information, such as for use in comparisons or assessments for authentication, can be updated over time to accommodate changes in an individual's appearance, voice, or behavior. In an example, reference information can be updated automatically with test data, or reference information can be updated conditionally, based on instructions from a system administrator. Various types of media can be used for authentication, including image information, audio information, or biometric information. In an example, authentication can be performed wholly or partially at an edge device such as a security panel in an installed security system.

    SYSTEM AND METHOD FOR SCALABLE VIDEO CLOUD SERVICES
    7.
    发明申请
    SYSTEM AND METHOD FOR SCALABLE VIDEO CLOUD SERVICES 审中-公开
    可扩展视频云服务的系统和方法

    公开(公告)号:US20150022666A1

    公开(公告)日:2015-01-22

    申请号:US14337962

    申请日:2014-07-22

    Abstract: Methods of monitoring real-world environments using a plurality of processor controlled Internet video cameras, scalable cloud computing technology, and various Internet connected smartphones and tablet computers. The system is designed to use cloud computing technology, including automated service provisioning, automated virtual machine migration services, RESTful API, and various firewall traversing methods to scale to up to millions of cameras and beyond. The integrity of the system is maintained by requiring that the various video cameras continually send “heartbeat” camera status messages to the cloud servers. The video cameras can optionally also be configured to automatically detect various events occurring in their local environments, report these events to clients, and stream event video data either directly or indirectly to the clients, or alternatively save the video data in various scalable third party cloud storage systems such as the Amazon S3 service. Time expiring tokens and encryption keys help ensure system security.

    Abstract translation: 使用多个处理器控制的因特网摄像机,可扩展的云计算技术以及各种因特网连接的智能电话和平板计算机监视现实环境的方法。 该系统旨在使用云计算技术,包括自动化服务配置,自动化虚拟机迁移服务,RESTful API和各种防火墙穿越方法,以扩展到数百万台摄像机及以上。 通过要求各种摄像机连续向云服务器发送“心跳”摄像机状态消息来维持系统的完整性。 视频摄像机还可以被配置为自动检测在其本地环境中发生的各种事件,将这些事件报告给客户端,以及将事件视频数据直接或间接地传送到客户端,或者将视频数据保存在各种可扩展的第三方云 存储系统,如Amazon S3服务。 时间到期令牌和加密密钥有助于确保系统安全。

    MULTIPLE-FACTOR RECOGNITION AND VALIDATION FOR SECURITY SYSTEMS

    公开(公告)号:US20250014409A1

    公开(公告)日:2025-01-09

    申请号:US18735963

    申请日:2024-06-06

    Abstract: A security system can conditionally grant or deny access to a protected area using an artificial intelligence system to analyze images. In an example, an access control method can include receiving candidate information about a face and gesture from a first individual and receiving other image information from or about a second individual. The candidate information can be analyzed using a neural network-based recognition processor that can provide a first recognition result indicating whether the first individual corresponds to a first enrollee of the security system, and can provide a second recognition result indicating whether the second individual corresponds to a second enrollee of the security system. The example method can include receiving a passcode, such as from the first individual. Access can be conditionally granted or denied based on the passcode and the recognition results.

    MULTIPLE-FACTOR RECOGNITION AND VALIDATION FOR SECURITY SYSTEMS

    公开(公告)号:US20230351831A1

    公开(公告)日:2023-11-02

    申请号:US18197562

    申请日:2023-05-15

    Abstract: A security system can conditionally grant or deny access to a protected area using an artificial intelligence system to analyze images. In an example, an access control method can include receiving candidate information about a face and gesture from a first individual and receiving other image information from or about a second individual. The candidate information can be analyzed using a neural network-based recognition processor that can provide a first recognition result indicating whether the first individual corresponds to a first enrollee of the security system, and can provide a second recognition result indicating whether the second individual corresponds to a second enrollee of the security system. The example method can include receiving a passcode, such as from the first individual. Access can be conditionally granted or denied based on the passcode and the recognition results.

    AUDIO TYPE DETECTION
    10.
    发明申请

    公开(公告)号:US20210210074A1

    公开(公告)日:2021-07-08

    申请号:US17203269

    申请日:2021-03-16

    Abstract: Artificial intelligence-based processing can be used to classify audio information received from an audio input unit. In an example, audio information can be received from a microphone configured to monitor an environment. A processor circuit can identify identifying one or more features of the audio information received from the microphone and use a first applied machine learning algorithm to analyze the one or more features and determine whether the audio information includes an indication of an abnormal event in the environment. In an example, the processor circuit can use a different second applied machine learning algorithm, such as a neural network-based deep learning algorithm, to analyze the same one or more features and classify the audio information as including an indication of a particular event type in the environment.

Patent Agency Ranking