G08B15/007

MONITORING SYSTEM TO IDENTIFY UNREGISTERED PERSONS ENTERING PREMISES AND TO SECURE ROOMS CONTAINING REGISTERED OCCUPANTS

The disclosed embodiments provide an improved monitoring and security system to identify the presence of persons within a premises, to track the relative location of the person as he or she traverse the premises, and to generate an alert and optionally enter a lockdown mode if the person does not possess a pre-registered computing device or wireless transceiver. In the lockdown mode, doors optionally can be shut and locked through remote or local control or automatically if the distance between the person and the particular door falls below a predetermined threshold.

Active intruder mitigation system and method

A life safety system for mitigating injuries and fatalities to occupants of a multi-zone structure comprising a plurality of controllers, and coupled to at least one of said controllers, one or more event sensor devices and one or more locking mechanisms, the foregoing communicatively connected to a main controller and to an intelligent analysis system for identifying the nature of an event. The life safety system further comprises at least one monitoring location physically removed from at least one of said controllers and from at least one of said locking mechanisms.

Apparatus and system for capturing criminals
10891841 · 2021-01-12 ·

Disclosed is an overhead criminal capturing system comprised of joysticks, buttons, video display, microphone, speaker and a virtual reality headset remotely controlling an electrically motorized mechanical gripper that is attached to an electrically motorized mechanical arm that is attached to an electrically motorized wall and ceiling mounted rail system.

Systems and Methods for Presenting Security Questions via Connected Security System
20200394901 · 2020-12-17 ·

The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.

SYSTEMS AND METHODS FOR PROTECTING OCCUPANTS FROM AN ATTACK
20200388119 · 2020-12-10 ·

A warning system and deterrence system for attacks on a location is provided, along with the method of warning about and deterring an attack is provided. Other embodiments are also disclosed herein.

Long-tail large scale face recognition by non-linear feature level domain adaptation

A computer-implemented method, system, and computer program product are provided for facial recognition. The method includes receiving, by a processor device, a plurality of images. The method also includes extracting, by the processor device with a feature extractor utilizing a convolutional neural network (CNN) with an enlarged intra-class variance of long-tail classes, feature vectors for each of the plurality of images. The method additionally includes generating, by the processor device with a feature generator, discriminative feature vectors for each of the feature vectors. The method further includes classifying, by the processor device utilizing a fully connected classifier, an identity from the discriminative feature vector. The method also includes control an operation of a processor-based machine to react in accordance with the identity.

Long-tail large scale face recognition by non-linear feature level domain adaptation

A computer-implemented method, system, and computer program product are provided for facial recognition. The method includes receiving, by a processor device, a plurality of images. The method also includes extracting, by the processor device with a feature extractor utilizing a convolutional neural network (CNN) with an enlarged intra-class variance of long-tail classes, feature vectors for each of the plurality of images. The method additionally includes generating, by the processor device with a feature generator, discriminative feature vectors for each of the feature vectors. The method further includes classifying, by the processor device utilizing a fully connected classifier, an identity from the discriminative feature vector. The method also includes control an operation of a processor-based machine to react in accordance with the identity.

Long-tail large scale face recognition by non-linear feature level domain adaptation

A computer-implemented method, system, and computer program product are provided for facial recognition. The method includes receiving, by a processor device, a plurality of images. The method also includes extracting, by the processor device with a feature extractor utilizing a convolutional neural network (CNN) with an enlarged intra-class variance of long-tail classes, feature vectors for each of the plurality of images. The method additionally includes generating, by the processor device with a feature generator, discriminative feature vectors for each of the feature vectors. The method further includes classifying, by the processor device utilizing a fully connected classifier, an identity from the discriminative feature vector. The method also includes control an operation of a processor-based machine to react in accordance with the identity.

Apparatus and system for capturing criminals.
20200286349 · 2020-09-10 ·

Disclosed is an overhead criminal capturing system comprised of joysticks, buttons, video display, microphone, speaker and a virtual reality headset remotely controlling an electrically motorized mechanical gripper that is attached to an electrically motorized mechanical arm that is attached to an electrically motorized wall and ceiling mounted rail system.

Systems and methods for presenting security questions via connected security system
10762772 · 2020-09-01 · ·

The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.