Patent classifications
G07C9/15
Sensor for access control reader for anti-tailgating applications
An apparatus includes an interface and a processor. The interface may be configured to receive pixel data corresponding to an entrance of a secured area. The processor may be configured to process the pixel data arranged as video frames, perform computer vision operations to detect objects, extract characteristics about the objects, determine a number of people in the video frames, receive an authorization signal from an access control device and generate a control signal. The authorization signal may be used by the access control device to grant access to the secured area. The number of people in the video frames may be determined after the authorization signal is received. The control signal may be generated when the number of people is greater than a number of entrants permitted by the authorization signal. The control signal may provide an indication of unauthorized access to the secured area.
Sensor for access control reader for anti-tailgating applications
An apparatus includes an interface and a processor. The interface may be configured to receive pixel data corresponding to an entrance of a secured area. The processor may be configured to process the pixel data arranged as video frames, perform computer vision operations to detect objects, extract characteristics about the objects, determine a number of people in the video frames, receive an authorization signal from an access control device and generate a control signal. The authorization signal may be used by the access control device to grant access to the secured area. The number of people in the video frames may be determined after the authorization signal is received. The control signal may be generated when the number of people is greater than a number of entrants permitted by the authorization signal. The control signal may provide an indication of unauthorized access to the secured area.
DEVICE FOR CHECKING ACCESS PERMISSIONS
A device for checking access permissions includes an access area with guidance devices for forming an access lane for separating people or objects, in which blocking and/or signal means define an access threshold. A gate controller having a Bluetooth radio interface allows an access permission to be read from mobile data carriers, and positive validation of the access permission results in the access controller releasing the blocking and/or signal means and thus allowing separate passage through the access threshold. An access lane has an associated multiphase antenna group, the transmission/reception antennas of which are actuated by a Bluetooth transceiver module via an antenna feed network in such a way that at least two antenna lobes form that are at different distances from the access threshold as seen in the direction of access.
AUTHENTICATION METHOD, STORAGE MEDIUM, AND INFORMATION PROCESSING DEVICE
An authentication method for a computer to execute a process includes determining whether a face image that satisfies a first criterion is included in a first captured image captured by a camera that is provided so as to include a face of a person who is about to pass through a gate in an imaging range, when biometric information is acquired by a sensor provided in the gate; when the face image that satisfies the first criterion is included, performing authentication by using the face image included in the first captured image and the biometric information; when the face image that satisfies the first criterion is not included, instructing the camera to capture a second image; and performing authentication by using a face image included in the second captured image and the biometric information.
AUTHENTICATION METHOD, STORAGE MEDIUM, AND INFORMATION PROCESSING DEVICE
An authentication method for a computer to execute a process includes determining whether a face image that satisfies a first criterion is included in a first captured image captured by a camera that is provided so as to include a face of a person who is about to pass through a gate in an imaging range, when biometric information is acquired by a sensor provided in the gate; when the face image that satisfies the first criterion is included, performing authentication by using the face image included in the first captured image and the biometric information; when the face image that satisfies the first criterion is not included, instructing the camera to capture a second image; and performing authentication by using a face image included in the second captured image and the biometric information.
VENUE ENTRY SYSTEM AND METHOD
A mobile security system used to manage pedestrian activities from a perimeter of a venue to a point of entry to the venue and into the venue. The mobile security system includes a portable hub unit configured to be located at the point of entry to the venue. The hub unit includes at least one touchless screening lane that defines a path through the hub unit. The hub unit also includes at least one external screening device that screens for security threats external to the hub unit, and a plurality of lane screening devices associated with the at least one screening lane to screen for security threats within the at least one screening lane. The hub unit further includes a processing unit configured to receive data and characterize the received data as being indicative of one or more security threats or a non-security threat.
VENUE ENTRY SYSTEM AND METHOD
A mobile security system used to manage pedestrian activities from a perimeter of a venue to a point of entry to the venue and into the venue. The mobile security system includes a portable hub unit configured to be located at the point of entry to the venue. The hub unit includes at least one touchless screening lane that defines a path through the hub unit. The hub unit also includes at least one external screening device that screens for security threats external to the hub unit, and a plurality of lane screening devices associated with the at least one screening lane to screen for security threats within the at least one screening lane. The hub unit further includes a processing unit configured to receive data and characterize the received data as being indicative of one or more security threats or a non-security threat.
Airborne organic matter detection system and method
An aerosol detection system for detecting airborne organic matter, the detection system including a corridor extending along a longitudinal axis and having first and second ends; an access gate connected to the first end of the corridor and configured to control access of an individual to the corridor; a person detection system located in the corridor and configured to determine the presence of the individual inside the corridor; and a testing set configured to generate an air puff, which directs an exhaled breath of the individual for determining a presence of the airborne organic matter. The corridor has a width w.sub.c that allows movement of a single individual past the testing set.
Airborne organic matter detection system and method
An aerosol detection system for detecting airborne organic matter, the detection system including a corridor extending along a longitudinal axis and having first and second ends; an access gate connected to the first end of the corridor and configured to control access of an individual to the corridor; a person detection system located in the corridor and configured to determine the presence of the individual inside the corridor; and a testing set configured to generate an air puff, which directs an exhaled breath of the individual for determining a presence of the airborne organic matter. The corridor has a width w.sub.c that allows movement of a single individual past the testing set.
Access control method for persons and vehicles and system for carrying out the method
An access control method in an access control system that comprises at least one access control device with an antenna (2, 3, 4). Verification of an access authorization is based on analysis of a beacon transmitted by a first wireless communication standard. The beacon contains an ID to which a unique identifier (TID) of the data carrier and a unique beacon ID of the data carrier (1) transmitting the beacon is assigned. The unique identifier and unique beacon ID allows positive beacon identification. The identification and localization of the data carriers (1) is realized by analyzing the RSSIs of the transmitted beacons. The unique beacon IDs ensure that the RSSI values of the same respective beacon of a data carrier (1) are used in the course of the RSSI analysis. The closest data carrier (1) is determined, during the RSSI analysis, and the transmitted ID is analyzed to grant access.