-
公开(公告)号:US11962697B2
公开(公告)日:2024-04-16
申请号:US17484712
申请日:2021-09-24
Applicant: Johnson Controls Tyco IP Holdings LLP
Inventor: Gopal Paripally , Jason M. Ouellette , Peter Lawrence
IPC: H04L9/32
CPC classification number: H04L9/32
Abstract: Disclosed herein are apparatuses and methods for tracking chain of custody of a security camera using blockchain. An implementation may comprise receiving and granting a request for custody of a security camera by a first operator. The implementation further includes generating a block of a blockchain comprising identifiers of the first operator, security camera, and timestamp. The implementation includes distributing the blockchain to a plurality of nodes in a blockchain network. For each indication received of activity associated with usage and custody of the security camera to be recorded on the blockchain, the implementation includes generating a new block on the blockchain recording the activity. The implementation further includes receiving and verifying an authenticity a video clip from the security camera based on each activity recorded in the blockchain. In response to determining that the video clip is not authentic, the implementation includes generating an alert indicating inauthenticity.
-
公开(公告)号:US20240386708A1
公开(公告)日:2024-11-21
申请号:US18320052
申请日:2023-05-18
Applicant: Johnson Controls Tyco IP Holdings LLP
Inventor: Terence NEILL , William Thomas Calvert , Peter Lawrence
IPC: G06V10/776 , G06V10/26 , G06V10/764
Abstract: Example implementations include a method, apparatus and computer-readable medium for object classification, including executing a multi-class object classification model (OCM) on an input image depicting an object, wherein the multi-class OCM is configured to output, for each respective class of a plurality of classes, a respective confidence score indicative of a likelihood of the object being of a member the respective class. The implementations further include detecting a plurality of confidence scores outputted by the multi-class OCM that are within a threshold range, wherein classes associated with the plurality of confidence scores are candidate classes of the object. Additionally, the implementations further include executing, on the input image, a single-class OCM for each of the candidate classes and outputting a final class for the object in the input image based on a result of each single-class OCM.
-
公开(公告)号:US11769381B2
公开(公告)日:2023-09-26
申请号:US17380929
申请日:2021-07-20
Applicant: JOHNSON CONTROLS TYCO IP HOLDINGS, LLP
Inventor: Jason Ouellette , James Bauerle , Allen Houston , Peter Lawrence , Kapang Lam
CPC classification number: G08B7/066 , G05B15/02 , G06Q10/20 , G06Q40/08 , G06Q50/26 , G06Q90/205 , G08B21/02 , G05D1/0212
Abstract: Disclosed herein are apparatuses and methods for managing building pathway information. A building and/or security management system can detect, based on receiving input from multiple sensor devices, a possible safety issue in a first pathway to an egress of a building, determine, based on detecting the possible safety issue and based on information regarding other pathways in the building, a second pathway to the egress of the building, and indicate at least the second pathway to another system.
-
公开(公告)号:US11749038B2
公开(公告)日:2023-09-05
申请号:US17057476
申请日:2019-05-20
Applicant: Johnson Controls Tyco IP Holdings LLP
Inventor: Terence Neill , Anne Gallagher , Derek J. Boyes , Peter Lawrence
CPC classification number: G07C9/00563 , G06F16/53 , G06V40/168 , G06V40/172 , G06V40/20 , G08B7/06
Abstract: An access control system can include a camera that detects an image regarding a subject, a database maintaining information, a facial recognizer that receives the image and identifies a facial feature of the subject based on the received image and the facial information maintained by the database, and a processor to alert security or another user when an authorized user accessing an area of a building is under duress, when an unauthorized user is accessing an area of a building by tailgating after an authorized user, when an authorized user has not provided two-factor authentication, or when an authorized user is in a particular area of the building.
-
-
-