-
公开(公告)号:US11869239B2
公开(公告)日:2024-01-09
申请号:US16996604
申请日:2020-08-18
Applicant: Johnson Controls Tyco IP Holdings LLP
Inventor: William T. Calvert , Terence Neill
CPC classification number: G06V20/41 , H04N23/62 , H04N23/681 , G06V20/44
Abstract: Example implementations include a method, apparatus and computer-readable medium for controlling a camera, comprising receiving a video sequence of a scene. The method includes determining one or more scene description metadata in the scene from the video sequence. The method includes identifying one or more scene object types in the scene based on the one or more scene description metadata. The method includes determining one or more rules based on one or both of the scene description metadata or the scene object types, each rule configured to generate an event based on a detected object following a rule-specific pattern of behavior. The method includes applying the one or more rules to operation of the camera.
-
公开(公告)号:US11696024B2
公开(公告)日:2023-07-04
申请号:US16996688
申请日:2020-08-18
Applicant: JOHNSON CONTROLS TYCO IP HOLDINGS LLP
Inventor: William T. Calvert , Terence Neill
IPC: H04N23/62 , H04N23/617 , H04N23/667 , H04N7/18 , H04N1/32 , G06F18/24 , H04N101/00
CPC classification number: H04N23/667 , G06F18/24 , H04N1/32106 , H04N7/183 , H04N23/617 , H04N23/62 , H04N2101/00 , H04N2201/3226 , H04N2201/3228 , H04N2201/3276 , H04N2201/3277
Abstract: Example implementations include a method, apparatus and computer-readable medium for configuring profiles for a camera, comprising receiving video from the camera. The implementations further include classifying a first scene of the first video stream. Additionally, the implementations further include determining a first metadata for the first scene. Additionally, the implementations further include selecting a first profile for the camera based on the first metadata, wherein the first profile comprises one or more configuration parameters, wherein values of each of the one or more configuration parameters of the first profile are based on the first metadata. Additionally, the implementations further include configuring the camera with the first profile.
-
公开(公告)号:US11763662B2
公开(公告)日:2023-09-19
申请号:US17210276
申请日:2021-03-23
Applicant: Johnson Controls Tyco IP Holdings LLP
Inventor: Terence Neill , Alexis B. Ehrlich
CPC classification number: G08B21/245 , G06V10/40 , G06V20/52 , G06V40/171 , G06V40/172
Abstract: Example aspects include a method, apparatus and computer-readable medium of enforcing dynamic social distancing rules, comprising monitoring video frames of one or more video feeds, classifying a plurality of persons in the video frames, calculating respective distances between each person of the plurality of persons and remaining persons of the plurality of persons, detecting mask usage of the plurality of persons, measuring a dwell time of the plurality of persons, determining whether the plurality of persons are in violation of the dynamic social distancing rules, and generating an alert. The mask usage indicating whether each person of the plurality of persons is wearing a mask. The dwell time indicating a duration of time that each person of the plurality of persons has been within a proximity threshold to the remaining persons of the plurality of persons.
-
公开(公告)号:US11749038B2
公开(公告)日:2023-09-05
申请号:US17057476
申请日:2019-05-20
Applicant: Johnson Controls Tyco IP Holdings LLP
Inventor: Terence Neill , Anne Gallagher , Derek J. Boyes , Peter Lawrence
CPC classification number: G07C9/00563 , G06F16/53 , G06V40/168 , G06V40/172 , G06V40/20 , G08B7/06
Abstract: An access control system can include a camera that detects an image regarding a subject, a database maintaining information, a facial recognizer that receives the image and identifies a facial feature of the subject based on the received image and the facial information maintained by the database, and a processor to alert security or another user when an authorized user accessing an area of a building is under duress, when an unauthorized user is accessing an area of a building by tailgating after an authorized user, when an authorized user has not provided two-factor authentication, or when an authorized user is in a particular area of the building.
-
公开(公告)号:US11688219B2
公开(公告)日:2023-06-27
申请号:US17230847
申请日:2021-04-14
Applicant: Johnson Controls Tyco IP Holdings LLP
Inventor: Walter A. Martin , Terence Neill
CPC classification number: G07C9/22 , G07C9/00309 , G07C2009/00769
Abstract: Aspects of the present disclosure provide systems and methods for access control using multi-factor validation. In an example, an access control system is designed to be used in conjunction with a first recognition system, such as facial recognition system, a gait recognition system, or audio recognition system, that uses a confidence level to determine whether individuals are authorized to access a restricted area. When the first recognition system is unable to confidently identify the individual, a second recognition system, such as a mobile device system or access card system, may be used to provide second factor verification. Further, stored recognition data may be updated to include information gathered by the first recognition system in response to use of the second factor verification.
-
公开(公告)号:US11145151B2
公开(公告)日:2021-10-12
申请号:US16294744
申请日:2019-03-06
Applicant: JOHNSON CONTROLS TYCO IP HOLDINGS LLP
Inventor: Anne Gallagher , Peter Ainsworth , Terence Neill , Derek J. Boyes , Youngchoon Park , Sudhi R. Sinha , Erik S. Paulson , Richard J. Campero
Abstract: An access control system (ACS) for a building includes an access reader, a camera, and an access controller. The access reader is configured to read an access credential provided by a person at an access point and generate ACS data including the access credential. The camera is configured to capture facial recognition system (FRS) data including an image of the person at the access point. The access controller is configured to determine whether the access credential is valid based on the ACS data, determine whether the person is recognized based on the FRS data, grant or deny access to the person through the access point based on whether the access credential is valid and whether the person is recognized, and generate and store one or more of a plurality of access events. Each of the access events corresponds to a different combination of whether the access credential is valid and whether the person is recognized.
-
-
-
-
-