摘要:
Systems, methods, and computer-readable and executable instructions are provided for providing a universal access device. Providing a universal access device can include storing access data for each of a number RFID readers, wherein each of the RFID readers accepts a particular RFID protocol. Providing a universal access device can also include selecting a particular RFID protocol for one of the number of RFID readers while the universal access device is within an activation zone of the RFID reader. Furthermore, providing a universal access device can include providing the access data for the particular RFID reader via the particular RFID protocol.
摘要:
A vehicle screening system for screening vehicles and occupants for entrance to a secured facility. The system can include a processor and an interface that communicates with the processor, wherein the interface displays identification information extracted from a vehicle occupant associated with a vehicle for processing by the processor. Additionally, a plurality of controls are associated with the interface and the processor, wherein the plurality of controls permit facilitates the handling and management of the information extracted from the vehicle occupant in order to permit or deny the vehicle occupant and the vehicle entry to a secured facility through a security gate.
摘要:
A vehicle screening system for screening vehicles and occupants for entrance to a secured facility is disclosed. The system can include a processor and an interface that communicates with the processor, wherein the interface displays identification information extracted from a vehicle occupant associated with a vehicle for processing by the processor. Additionally, a plurality of controls are associated with the interface and the processor, wherein the plurality of controls facilitates the handling and management of the information extracted from the vehicle occupant to either permit or deny the vehicle occupant and the vehicle entry to a secured facility through a security gate.
摘要:
A method and system for selecting and allocating high confidence biometric data. A combination of presented identification information along with gathered biometric data are associated with an entity separated by a sensor trigger. For example, presenting a driver's license in addition to automated gathering and identification of face, iris, voice, or any other combination of biometrics can be implemented in the context of gathering and selecting biometric data. Such a method and system solves the problem of harvesting sensor data from disparate sources together to form a more strongly identified individual user profile with appropriate related identifying information.
摘要:
A vehicle screening method and system. A vehicle occupant can be identified utilizing one or more biometric identifiers input by or obtained from the vehicle occupant via a biometric input device. A barcode can also be provided by the vehicle occupant from a scanned card or other structure upon which the barcode is maintained. Additionally, a unique identification number can be provided by the user in order to match the unique identification number against a database of identification numbers, thereby permitting the vehicle occupant to be remotely screened and verified for entry into a secure facility based on the biometric identifier(s), the barcode and the unique identification number.
摘要:
A vehicle screening method and system. A vehicle occupant can be identified utilizing one or more biometric identifiers input by or obtained from the vehicle occupant via a biometric input device. A barcode can also be provided by the vehicle occupant from a scanned card or other structure upon which the barcode is maintained. Additionally, a unique identification number can be provided by the user in order to match the unique identification number against a database of identification numbers, thereby permitting the vehicle occupant to be remotely screened and verified for entry into a secure facility based on the biometric identifier(s), the barcode and the unique identification number.
摘要:
A system for augmenting security sensor accuracy and reduction of false alarm signals. The system includes the security sensor system along with an external sensor system for measuring the effect of environmental conditions on the security sensors and further includes a sensor data augmentation component to adjust the sensitivity of the security sensors according to measured environmental conditions. Weather sensors and video sensors are two preferred external sensor systems.
摘要:
A “be on the look out” or BOLO device is an unsupervised device that can be deployed at a particular location to watch for a specific target or person. A camera produces scene images that the BOLO device analyzes to determine if they contain a pattern matching a target descriptor. If a matching pattern is found, then the BOLO device emits an alarm signal. The alarm signal can contain the BOLO device's location or identification. A location database can produce the device's location when given the device's identification. A target transmitter can supply new target descriptors to deployed BOLO devices.
摘要:
A system for augmenting security sensor accuracy and reduction of false alarm signals. The system includes the security sensor system along with an external sensor system for measuring the effect of environmental conditions on the security sensors and further includes a sensor data augmentation component to adjust the sensitivity of the security sensors according to measured environmental conditions. Weather sensors and video sensors are two preferred external sensor systems.
摘要:
A “be on the look out” or BOLO device is an unsupervised device that can be deployed at a particular location to watch for a specific target or person. A camera produces scene images that the BOLO device analyzes to determine if they contain a pattern matching a target descriptor. If a matching pattern is found, then the BOLO device emits an alarm signal. The alarm signal can contain the BOLO device's location or identification. A location database can produce the device's location when given the device's identification. A target transmitter can supply new target descriptors to deployed BOLO devices.