Patent classifications
G08B13/196
METHODS AND SYSTEMS FOR DETECTING A TAILGATING EVENT AT AN ACCESS POINT CONTROLLED BY AN ACCESS CONTROL SYSTEM
Apparatus and methods for controlling access to a restricted area by an access control device includes obtaining a first image using a first sensor mounted at a first location. A second image is obtained using a second sensor mounted at a location different from a location of the first sensor. The second image is processed, using the second sensor, to obtain information regarding the detected objects in the second image. The information regarding the detected objects is sent from the second sensor to the first sensor. The first sensor compares the received information with a number of objects detected using the first image. A tailgating event is identified, in response to determining that the number of objects detected using the first image does not match the information regarding the number of objects detected using the second image. A tailgating notification is outputted, by the first sensor, indicating a tailgating event.
METHODS AND SYSTEMS FOR DETECTING A TAILGATING EVENT AT AN ACCESS POINT CONTROLLED BY AN ACCESS CONTROL SYSTEM
Apparatus and methods for controlling access to a restricted area by an access control device includes obtaining a first image using a first sensor mounted at a first location. A second image is obtained using a second sensor mounted at a location different from a location of the first sensor. The second image is processed, using the second sensor, to obtain information regarding the detected objects in the second image. The information regarding the detected objects is sent from the second sensor to the first sensor. The first sensor compares the received information with a number of objects detected using the first image. A tailgating event is identified, in response to determining that the number of objects detected using the first image does not match the information regarding the number of objects detected using the second image. A tailgating notification is outputted, by the first sensor, indicating a tailgating event.
System for inventory management
Sensor-equipped display management systems and methods that may be used to calculate a number of products removed from a display management system based upon motion of one or more mechanisms within the display management system. Additionally, the systems and methods may be used to detect patterns from the sensor data, which may be indicative of attempted theft of products stored within the display management system.
Motion detection system and method
A motion detection method includes providing a buffer including a first buffer associated with a background image and a second buffer associated with a foreground image; checking first similarity between the gray level of an input pixel and the first gray level of the first buffer; determining the input pixel as a still pixel if the first similarity is true; checking second similarity between the gray level and the second gray level of the second buffer; determining the input pixel as a moving pixel if the second similarity is false; determining the input pixel as the moving pixel if the second count value is less than the first count value; and determining the input pixel as the still pixel and swapping the first buffer with the second buffer, if the second count value is not less than the first count value.
Multi-services gateway device at user premises
An application gateway including application service programming positioned at a user premises can provide voice controlled and managed services to a user and one or more endpoint devices associated with the application gateway. The application gateway can be controlled remotely by the application service provider through a service management center and configured to execute an application service provided from the application service provider. The application gateway can execute the application service at the user premises upon voice command by a user and independent of application services executing on the application service provider's network. An application service logic manager can communicate with an application service enforcement manager to verify that the request conforms with the policy and usage rules associated with the application service in order to authorize execution of the application service on the application gateway, either directly or through endpoint devices.
Camera detection of human activity with co-occurrence
Methods, systems, and apparatus for camera detection of human activity with co-occurrence are disclosed. A method includes detecting a person in an image captured by a camera; in response to detecting the person in the image, determining optical flow in portions of a first set of images; determining that particular portions of the first set of images satisfy optical flow criteria; in response to determining that the particular portions of the first set of images satisfy optical flow criteria, classifying the particular portions of the first set of images as indicative of human activity; receiving a second set of images captured by the camera after the first set of images; and determining that the second set of images likely shows human activity based on analyzing portions of the second set of images that correspond to the particular portions of the first set of images classified as indicative of human activity.
Security Device
A security device is disclosed comprising a main housing, a power supply housing releasable from the main housing and a release arrangement configured to provide a release process in which the power supply housing is moveable from an installed configuration to a released configuration via a partially released configuration. A power connection is provided for supply of power to the security device when the power supply housing is in the partially released configuration. Processing circuitry is configured to obtain power via the power connection and receive an indication that the power supply housing has moved from the installed configuration and/or to the partially released configuration.
METHOD, APPARATUS, AND SYSTEM FOR PROTECTING PRIVATE INFORMATION FROM ILLEGAL PHOTOGRAPHY BY UNMANNED AERIAL VEHICLE
Provided is a method of protecting private information from illegal photography by an unmanned aerial vehicle, which includes receiving information about an area to capture, from the unmanned aerial vehicle or an unmanned aerial vehicle pilot, in advance, by wired or wireless communication, transmitting the information about an area to capture, to a private information protection subject who wants to protect private information about the area to capture, by wired or wireless communication, receiving information about a first action to protect private information accompanying image capturing, from the private information protection subject, by wired or wireless communication, and transmitting the information about a first action to protect private information, the information being received from the private information protection subject, to the unmanned aerial vehicle or the unmanned aerial vehicle pilot who is going to capture an image, by wired or wireless communication.
METHODS AND APPARATUSES FOR EARLY WARNING OF CLIMBING BEHAVIORS, ELECTRONIC DEVICES AND STORAGE MEDIA
A method and an apparatus for early warning of climbing behaviors, an electronic device, and a storage medium are disclosed. The method includes: acquiring video image data including a monitored target and at least one object (11); acquiring behavior information of the at least one object when it is determined that the at least one object enters a target area corresponding to the monitored target (12); marking video frames in which the at least one object is included when it is determined that the behavior information indicates that the at least one object climbs the monitored target (13). By marking the video frames in the video image data, the behavior of the object climbing the monitored target can be found in time, and the management efficiency can be improved.
ACCESS MANAGEMENT SYSTEM
An access management system includes a mobile device with a processor and a memory and a software platform including at least a processor and a memory. The software platform is configured to analyze data obtained from the mobile device and other devices connected to the software platform. Specifically, the software platform is operable to determine if an access key received, read, or captured by a mobile device matches an access key for an authorized account, object, device, or space for the mobile device, and to provide access to the mobile device if the access key received, read, or captured by the mobile device matches the authorized access key.