Patent classifications
G08B15/007
Long-tail large scale face recognition by non-linear feature level domain adaption
A computer-implemented method, system, and computer program product are provided for facial recognition. The method includes receiving, by a processor device, a plurality of images. The method also includes extracting, by the processor device with a feature extractor utilizing a convolutional neural network (CNN) with an enlarged intra-class variance of long-tail classes, feature vectors for each of the plurality of images. The method additionally includes generating, by the processor device with a feature generator, discriminative feature vectors for each of the feature vectors. The method further includes classifying, by the processor device utilizing a fully connected classifier, an identity from the discriminative feature vector. The method also includes control an operation of a processor-based machine to react in accordance with the identity.
Method for controlling door access with improved safety
A method for controlling door access with improved safety includes connecting door locks with a control device. Through physical and electrical connection by an emergency control unit, the control device can set all door locks to a locking state and can revoke unlocking authority of all door locks. When the emergency control unit is physically disconnected from the control device, all door locks can operate independently in locking and unlocking. Furthermore, the control device is connected to at least one gunshot detection device and/or at least one fire detection device. When a gunshot event and/or a fire occurs, the door locks near the gunshot location or the fire can be rapidly locked to reduce the movement speed of the gunman and/or the spreading speed of the fire.
ACTIVE INTRUDER MITIGATION SYSTEM AND METHOD
A life safety system for mitigating injuries and fatalities to occupants of a multi-zone structure comprising a plurality of controllers, and coupled to at least one of said controllers, one or more event sensor devices and one or more locking mechanisms, the foregoing communicatively connected to a main controller and to an intelligent analysis system for identifying the nature of an event. The life safety system further comprises at least one monitoring location physically removed from at least one of said controllers and from at least one of said locking mechanisms.
METHOD FOR CONTROLLING DOOR ACCESS WITH IMPROVED SAFETY
A method for controlling door access with improved safety includes connecting door locks with a control device. Through physical and electrical connection by an emergency control unit, the control device can set all door locks to a locking state and can revoke unlocking authority of all door locks. When the emergency control unit is physically disconnected from the control device, all door locks can operate independently in locking and unlocking. Furthermore, the control device is connected to at least one gunshot detection device and/or at least one fire detection device. When a gunshot event and/or a fire occurs, the door locks near the gunshot location or the fire can be rapidly locked to reduce the movement speed of the gunman and/or the spreading speed of the fire.
SYSTEM AND METHOD FOR SUPPRESSION OF PHYSICAL THREATS
Methods and systems for the suppression of physical threats are provided. In certain embodiments, a method includes activating an alert that indicates that a threat is present within an area. The method also includes receiving the alert at a monitoring device. The method further includes identifying a location of the threat based on monitoring information acquired by the monitoring device. The method additionally includes displaying information for the threat at the monitoring device. Further, the method includes remotely controlling a threat contact device to interfere with actions of the threat based on the information for the threat.
Active intruder mitigation system and method
A life safety system for mitigating injuries and fatalities to occupants of a multi-zone structure comprising a plurality of controllers, and coupled to said controller, a plurality of digital imaging devices, a plurality of locking mechanisms, a plurality of dispersion points for the dispersion of at least one dispersible substance, and optionally a plurality of thermostatic members, the foregoing communicatively connected to an intelligent video analysis system. The life safety system further comprises at least one monitoring location physically removed from at least one of said controllers and from at least one of said dispersion points and from at least one of said locking mechanisms and from at least one of said thermostatic members.
Systems and Methods for Presenting Security Questions via Connected Security System
The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.
System for Non-Lethal Defense and Crowd Control in Public and Private Spaces
A non-lethal electronic defense device comprising one or more effects such as light, sonic, ultrasonic, infrasonic, chemical, electrical, or mechanical devices capable of causing intense sensations of disorientation, distress, incapacitation, and/or pain for the purpose of protecting a public or private space from an intruder or attacker exhibiting an intent to cause harm to physical inhabitants or destruction of property therein.
Systems, devices, and methods to electronically lure people at a building
A presence of a person at a first location within the building is detected using a sensor. Whether the presence of the person at the first location is acceptable is determined in response to detecting the presence of the person at the first location. Then, in response to determining that the presence of the person at the first location is unacceptable, an output device is triggered to output an electronic lure signal to lure the person to a second location that is distant from the first location. The electronic lure signal is based on a category of the person.
Systems and methods for presenting security questions via connected security system
The various implementations described herein include methods, devices and systems for detecting trigger events and executing security protocols. In one aspect, a method is performed at a server system that is coupled to a smart device system and a client device, the smart device system located at a premises. The server system: (1) detects an unverified user within the premises based on data collected by the smart device system, wherein the data is communicated to the server system via the wide area networks; (2) provides a notification regarding the unverified user to authorized users via the wide area networks; (3) receives, from a first authorized user, a first user input in response to the notification; and (4) in response to receiving the first user input, executes a security operation at the premises based on the first user input.