G06V40/155

DIGITAL FORENSIC IMAGE VERIFICATION SYSTEM

A digital forensic image verification system according to an embodiment of the present disclosure includes an imaging device having a imaging unit configured to produce an image, a first hash value generator configured to generate a first hash value for the image, and a transmitting unit configured to transmit the image and the first hash value; and an image storage device having a receiving unit configured to receive the image and the first hash value from the imaging device, a second hash value generator configured to generate a second hash value for the image, and a controller configured to compare the first hash value and the second hash value with each other.

Framework for analysis of body camera and sensor information

A method, computer program product, and system for initiating a responsive action to environmental factors, include a processor monitoring biometric data and movements of an individual obtained from one or more sensors proximate to the individual, to establish and continuously update, a baseline state for the individual. The processor obtains video data and audio data from a recording device worn by the individual and contemporaneous data from the one or more sensors. The processor determines, based on the contemporaneous sensor data and the baseline state, that the individual is experiencing a state inconsistent with the baseline state. The processor analyzes the video data and the audio data to identify environmental factors contributing to the state inconsistent with the baseline state. Based on identifying the environmental factors, the processor determines a responsive action to mitigate the environmental factors and initiates the responsive action.

Person-of-interest (POI) detection

Example implementations include a method, apparatus and computer-readable medium for person detection by a computer device, comprising receiving a plurality of video frames from a camera located in an environment, wherein the video frames include a depiction of a person in the environment. The implementations further include identifying attributes of the person from the video frames and comparing the attributes with attribute entries in a database of suspicious persons, wherein the database of suspicious persons includes attributes of a plurality of persons associated with an alert in the environment. The implementations include retrieving a profile indicative of an alert history of the suspicious person in response to determining a match between the attributes of the person and an entry in the database corresponding to a suspicious person, and transmitting, to a second computer device, the retrieved profile and a notification that indicates that the suspicious person is in the environment.

ELECTRONIC DEVICE WITH SENSOR MODULE

According to various example embodiments, an electronic device is disclosed. The electronic device includes a housing having a first surface facing a first direction and a second surface facing a second, opposing direction. A first area of the first surface includes a plurality of selectable input keys. A second area of the first surface excludes the plurality of keys. A sensor module, such as a fingerprint sensor, is installed to the first area.

Anonemis Research Software Hard Drive Protocol Policy Processes 2303
20240362515 · 2024-10-31 · ·

In a quantum sequence triplication embodiment with quantum operation supremacy, the algorithmic software process and system database are utilized to critically verify information by Quantum Sequence Triplication, which utilizes three qubit bits to achieve quantum supremacy without gray area bias and enables quantum supremacy in the absence of gray area bias.

FRAMEWORK FOR ANALYSIS OF BODY CAMERA AND SENSOR INFORMATION
20180114081 · 2018-04-26 ·

A method, computer program product, and system for initiating a responsive action to environmental factors, include a processor monitoring biometric data and movements of an individual obtained from one or more sensors proximate to the individual, to establish and continuously update, a baseline state for the individual. The processor obtains video data and audio data from a recording device worn by the individual and contemporaneous data from the one or more sensors. The processor determines, based on the contemporaneous sensor data and the baseline state, that the individual is experiencing a state inconsistent with the baseline state. The processor analyzes the video data and the audio data to identify environmental factors contributing to the state inconsistent with the baseline state. Based on identifying the environmental factors, the processor determines a responsive action to mitigate the environmental factors and initiates the responsive action.

Latent fingerprint detection
09897544 · 2018-02-20 · ·

Systems, devices, and methods for detecting a contaminant on a substrate are discussed herein. Variations of such systems, devices, and methods may include one or more illumination sources that emit illumination at one or more desired wavelength ranges to illuminate one or more areas on the substrate; where the desired wavelength range is one that is absorbed by the contaminant while causing the substrate to fluoresce. Such fluorescence may be detected with a visible-spectrum detector, which will also detect the contaminant as a darker contrast area against the fluorescence. In some variations, an illumination source includes a broad-spectrum light source and a waveband filtering device that filters all but the desired illumination waveband out of the broad-spectrum light generated by the broad-spectrum light source.

PERSON-OF-INTEREST (POI) DETECTION
20250029421 · 2025-01-23 ·

Example implementations include a method, apparatus and computer-readable medium for person detection by a computer device, including retrieving, from a database of suspicious persons, a profile of a person detected in at least one image, wherein the profile lists crime incidents associated with the person. The implementations include determining, using the profile, a scale of crimes committed by the person based on an amount of time between incidents of a certain type, wherein the certain type is one of theft at a store or theft of a particular product type. The implementations include determining a rank of the person in the database of suspicious persons based on a frequency and the scale of crimes committed by the person compared to other suspicious persons, and transmitting, to a second computer device, the retrieved profile and a notification that indicates that the person is detected when the rank exceeds a threshold rank.

METHODS FOR OPERATING A SECURITY SYSTEM

A method for operating a security system of a facility includes receiving a video from a video camera of the security system of the facility. An event of interest occurring in the video is identified via video analytics, and the event of interest is classified into one of plurality of event severity levels. An alert is automatically generated and sent to an operator of the security system when the event of interest is classified as having a first event severity level of the plurality of event severity levels. An alert is automatically generated and sent to a first responder when the event of interest is classified as having a second event severity level of the plurality of event severity levels.

Logical imaging apparatus and method for digital forensic triage

Disclosed herein are a logical imaging apparatus and method for digital forensic triage. The logical imaging method for digital forensic triage includes receiving files selected as a digital evidence target, creating a logical imaging file, inside of which is formatted in a predetermined file system structure, recording the selected files in accordance with the file system structure of the created logical imaging file, and storing selected file list information about a list of the recorded selected files, and creating a separate selected list information file and a separate logical imaging summary file outside the logical imaging file.