Automatic configuration of analytics rules for a camera

    公开(公告)号:US11869239B2

    公开(公告)日:2024-01-09

    申请号:US16996604

    申请日:2020-08-18

    CPC classification number: G06V20/41 H04N23/62 H04N23/681 G06V20/44

    Abstract: Example implementations include a method, apparatus and computer-readable medium for controlling a camera, comprising receiving a video sequence of a scene. The method includes determining one or more scene description metadata in the scene from the video sequence. The method includes identifying one or more scene object types in the scene based on the one or more scene description metadata. The method includes determining one or more rules based on one or both of the scene description metadata or the scene object types, each rule configured to generate an event based on a detected object following a rule-specific pattern of behavior. The method includes applying the one or more rules to operation of the camera.

    Systems and methods of enforcing dynamic thresholds of social distancing rules

    公开(公告)号:US11763662B2

    公开(公告)日:2023-09-19

    申请号:US17210276

    申请日:2021-03-23

    CPC classification number: G08B21/245 G06V10/40 G06V20/52 G06V40/171 G06V40/172

    Abstract: Example aspects include a method, apparatus and computer-readable medium of enforcing dynamic social distancing rules, comprising monitoring video frames of one or more video feeds, classifying a plurality of persons in the video frames, calculating respective distances between each person of the plurality of persons and remaining persons of the plurality of persons, detecting mask usage of the plurality of persons, measuring a dwell time of the plurality of persons, determining whether the plurality of persons are in violation of the dynamic social distancing rules, and generating an alert. The mask usage indicating whether each person of the plurality of persons is wearing a mask. The dwell time indicating a duration of time that each person of the plurality of persons has been within a proximity threshold to the remaining persons of the plurality of persons.

    Systems and methods for access control using multi-factor validation

    公开(公告)号:US11688219B2

    公开(公告)日:2023-06-27

    申请号:US17230847

    申请日:2021-04-14

    CPC classification number: G07C9/22 G07C9/00309 G07C2009/00769

    Abstract: Aspects of the present disclosure provide systems and methods for access control using multi-factor validation. In an example, an access control system is designed to be used in conjunction with a first recognition system, such as facial recognition system, a gait recognition system, or audio recognition system, that uses a confidence level to determine whether individuals are authorized to access a restricted area. When the first recognition system is unable to confidently identify the individual, a second recognition system, such as a mobile device system or access card system, may be used to provide second factor verification. Further, stored recognition data may be updated to include information gathered by the first recognition system in response to use of the second factor verification.

    Frictionless access control system for a building

    公开(公告)号:US11145151B2

    公开(公告)日:2021-10-12

    申请号:US16294744

    申请日:2019-03-06

    Abstract: An access control system (ACS) for a building includes an access reader, a camera, and an access controller. The access reader is configured to read an access credential provided by a person at an access point and generate ACS data including the access credential. The camera is configured to capture facial recognition system (FRS) data including an image of the person at the access point. The access controller is configured to determine whether the access credential is valid based on the ACS data, determine whether the person is recognized based on the FRS data, grant or deny access to the person through the access point based on whether the access credential is valid and whether the person is recognized, and generate and store one or more of a plurality of access events. Each of the access events corresponds to a different combination of whether the access credential is valid and whether the person is recognized.

Patent Agency Ranking