Method and device for detecting unauthorized transfer between persons
11783159 · 2023-10-10
Inventors
Cpc classification
F41A17/066
MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
G06K7/10297
PHYSICS
F41A17/063
MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
F41A17/06
MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
G06V40/25
PHYSICS
G06V40/10
PHYSICS
G06K17/0022
PHYSICS
International classification
G06M1/27
PHYSICS
F41A17/06
MECHANICAL ENGINEERING; LIGHTING; HEATING; WEAPONS; BLASTING
G06K17/00
PHYSICS
G06K7/10
PHYSICS
G06V40/10
PHYSICS
Abstract
A method of confirming the identity of a person who issued a token to signify eligibility for a privilege. Possession token is confirmed to be by the same person by using sensors in the token which track the movements of the person. A machine learning system is trained to evaluate the sensor data detecting transfer of possession of the token. The state of continuous possession since the token was issued or set to an enabled state is confirmed and the privilege is granted. The method of identity confirmation is used in various contexts such as for to control entry to a location, use of a facility or service. It is also useful to determine continuous possession of a weapon to prevent misuse after the weapon is stolen, dropped or lost. Servers, beacons and outside sources of data or inputs to be measured by the sensor can also be used.
Claims
1. A method of confirming identity comprising: (a) selecting a first person to be identified as having received the selection wherein the first person has possession of a device comprising a sensor; (b) activating the device on the basis of confirmation that the first person has possession of the device; and (c) evaluating data from the sensor with a machine learning model trained to detect probable transfer of the device to a second person based on the data from the sensor to make a determination that the device has probably been transferred to the second person.
2. The method of claim 1 wherein: the determination is partially on the basis of the location of the device.
3. The method of claim 1 wherein: the determination is partially on the basis of proximity to a beacon.
4. The method of claim 1 wherein: the determination is partially on the basis of data received from a sensor located away from the device.
5. The method of claim 1 wherein: the identity of the first person is changed on the basis of at least one of a signal and a measurement by a sensor.
6. The method of claim 1 wherein: the device comprises a function which has its use conditioned on the determination.
7. A method of confirming identity comprising: (a) selecting a person to be identified as having received the selection wherein the person has possession of a device comprising a sensor to track movements of the device; (b) activating the device on the basis of confirmation that the first person has possession of the device; and (c) evaluating data from the sensor with a machine learning model trained to detect probable transfer of the device away from the person based on the data from the sensor to make a determination that the device is probably no longer in the possession of the person.
8. The method of claim 7 wherein: the determination is partially on the basis of the location of the device.
9. The method of claim 7 wherein: the determination is partially on the basis of proximity to a beacon.
10. The method of claim 7 wherein: wherein the determination is partially on the basis of data received from a sensor located away from the device.
11. The method of claim 7 wherein: the identity of the person is changed on the basis of at least one of a signal and a measurement by a sensor.
12. The method of claim 7 wherein: the device comprises a function which has its use conditioned on the determination.
13. A method of confirming identity comprising: (a) confirming that a person has physical possession of a device, wherein the device comprises a sensor to detect conditions in the vicinity of the device and the device comprises a machine learning model trained to identify probable location of the device being away from the person; (b) setting a state of the device to a first value on the basis of the confirmation, (c) evaluating inputs from the sensor with the machine learning model and setting the state of the token the device to a second value on the basis of the evaluation when the evaluation determines that the location of the device is not in the vicinity of the person; and (d) determining that the person has probable possession of the device when state is set to the first value and that the person does not have probable possession of the device when the state of the device is set to the second value.
14. The method of claim 13 wherein: when the device receives a signal the state of the device is set to the first value.
15. The method of claim 13 wherein: when the device fails to receive a signal from a beacon the device is set to the second value.
16. The method of claim 13 wherein: the determination is partially on the basis of the location of the device.
17. The method of claim 13 wherein: the determination is partially on the basis of proximity to a beacon.
18. The method of claim 13 wherein: the determination is partially on the basis of data received from a sensor located away from the device.
19. The method of claim 13 wherein: the identity of the person is changed on the basis of at least one of a signal and a measurement by a sensor.
20. The method of claim 13 wherein: The device comprises a function which has its use conditioned on the determination.
Description
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
(1) The features and advantages of the various embodiments disclosed herein will be better understood with respect to the drawing in which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
DETAILED DESCRIPTION OF THE INVENTION AND EMBODIMENTS
(9) Definitions
(10) The definitions given in this section are intended to apply throughout the specification and in the claims.
(11) A machine learning model is a data structure such as a neural net which has been trained to process inputs to recognize significant patterns.
(12) A privilege is a state which signifies eligibility to do, receive or possess something.
(13) Sensors
(14) There are many kinds of sensors available on the marketplace which can provide information to train a pattern recognition system or to be examined for patterns. Some of these examine the immediate situation at the identity token and measure factors such as acceleration including the direction of gravity, rotation, and even temperature. Others are active or passive devices to measure available information about the environment. They can work by a wide variety of information transmission modes such as infrared, radio, capacitance, visible light, sound or other means.
(15) In many simple embodiments the only sensor necessary would be an accelerometer. Small, fast and cheap three dimensional accelerometers are widely used and available in the market place. They can provide a rich amount of data as a function of movements in each plane and about orientation relative to gravity. In an application where one hundred percent accuracy is not necessary, they will allow simple designs for identification devices. An accelerometer can also be used to communicate with a device by means of moving the device in predetermined patterns to change modes, set parameters, etc.
(16) Gyroscopes which measure the rate of rotation in one or more planes are also available and provide a substantial amount of additional information. They are able to work in a sealed device, as are accelerometers and various other types of sensors. Working in combination with accelerometers, gyroscopes can distinguish angular rotations in vertical and horizontal planes. The patterns of movements in various planes are a rich source of patterns which can be used to distinguish transfers of an object between different persons and mere movements by a single object possessor.
(17) Sound Sensors are helpful in many embodiments. They can detect patterns such as existence of conversations between persons who might transfer a token. They can detect background noise which is correlated with location in many venues. Patterns in background or other noises can be correlated to concealment of a token in places such as a pocket. Such concealment can be correlated to transfer.
(18) Sound patterns can be correlated to location, especially taking into account specific venues. For one example, music in a night club may be muted or of a different quality in restrooms, where improper transfer of a token may be more probable.
(19) Location Sensors providing the token software with locations or data correlated to locations can be useful in many embodiments to detect token transfer. The location data can be from GPS sensors or as a range from some type of beacon or from some resource available in the venue. Locations can also be calculated by various kinds of dead reckoning based on time, acceleration or other factors.
(20) There are many miscellaneous kinds of sensors which would provide information that in various situations is useful to inform patterns for analysis to detect token transfer. This include temperature, air sampling, substance detectors, and others.
(21) Signal Reception as a Sensor and Transmitters for Same.
(22) Beacons can be established in a venue and the distance from the beacon can be a factor in patterns to be identified. There may be specific distance technology employed or simply the available or strength of the signal can be a part of the pattern. Most simply, a weak signal or long distance may be correlated with the token being hidden or being taken where transfer is hoped by the carrier to be unobserved. The source of the signal can be either a beacon designed for that purpose or some other signal source designed for a different purpose.
(23) A server or other outside source of data can be used to update parameters used as inputs by the model evaluation. Changes of privilege conditions, cancellation of privileges and changes in the patterns of movements to be evaluated can all be supplied by such data sources.
(24) Persons holding tokens can also have personal devices which may emit signals such a Bluetooth or WiFi connections or signals related to establishment of connections. A token can monitor such signals as use then as an input to combine with other inputs in analyzing patterns. This can be as simple as the token determining it is possessed by the holder of the personal device or it can be a part of a much more complex pattern search.
(25) User mobile devices have sufficient built in sensors to operate the pattern matcher and other software as an device OS application for many embodiments. Common included sensors include gyroscopes and accelerometers.
(26) States
(27) The Green State denotes that the token is allowing exercise of a granted privilege on the basis of a determination that transfer has not occurred.
(28) The Red State denotes that transfer has been detected or suspected and the privilege is to be denied.
(29) In many applications a substantial number of false entries to the red state may be acceptable. Particularly if there is a convenient means for the token holder to have the state reset. The decision parameters would be set to values that depend upon both the accuracy of the system and the requirements of the application.
(30) Learning State The token may reactivate if it is determined by the sensor that the token is currently possessed by a user from a previous activation. If the sensor is gathering information to return from a red state to a green state, it is said to be in the learning state.
(31) Handoff to additional users may be permitted in certain embodiments. The possible rules for allowed handoff without change to the red state include location, existence of a permission signal and determination that the handoff is to a person granted the privilege.
(32) Pattern Matching Software
(33) Various type of systems for pattern matching have been developed, but implementation as neural nets are rapidly replacing most older methods because of the straightforward method of development and because of effectiveness. Neural nets require substantial amounts of processing for training but once trained are easily implemented in devices for use and very quick to evaluate particular cases.
(34) The problem to be solved in most embodiments of the current invention is to classify at each time the inputs of the available sensors which have been gathered over a portion of the preceding time periods into two classes based on whether or not a suspected transfer of the token has occurred. Because of this structure of the problem an LSTM or GRU recurrent layer is appropriate. This allows for learning to take into account both short and long term time based features of the sensor input.
(35) Implementation of neural networks and other structures for pattern matching is now a well known art. Courses for teaching the methods needed are available online to be audited by anyone at Stanford University and MIT. Course assignments are comparable in complexity to the required effort to implement most embodiments of the methods herein.
(36) An important advantage of pattern matching by neural network is that it is not necessary for the implementer to understand or find patterns. The task in designing such a system is to provide a rich source of inputs that are correlated with the desired states to be distinguished. The correlation does not have to be with each input but can be with an unknown function of many inputs.
(37) Pattern Matching for Acoustics
(38) Methods for methods for detection of acoustic scenes and events have become well known in the artificial intelligence community. Many papers and explanations of such methods are available from the Proceedings of the Detection and Classification of Acoustic Scenes and events 2015 Workshop (DCASE2016) held by the Tampere University of Technology of Finland. The kinds of events to have patterns recognized in the tracking of possession of tokens are of the same structure as acoustic events and can be handled by the same methods. It would often be helpful to make simple adjustments in the methods such as adopting an appropriate time scale and adapting the preprocessing to the sensors used.
DETAILED DESCRIPTION OF THE DRAWING AND CERTAIN EMBODIMENTS
(39) Referring to
(40) In a simple preferred embodiment, the sensors are an accelerometer and a gyroscope each with three axes, the power source is a small battery and the communication chip is an RF-id chip with one input that turns off the RF-id when the device is in the red state. The pattern recognition engine is in this embodiment pre-trained to detect patterns associated with exchange of the device between persons. To eliminate the need for an additional input signaling the need to reset the device the accelerometer can be given pre-defined motions in a reset device to notify the processing chip. The display is a two-color LED which signifies the red and green states with the corresponding colors.
(41) Referring to
(42) Referring to
(43) The user then engages in activities 33 which may not allow supervision by the venue other than by the sensors of the token. The function of the token is to determine if the token remains in the possession of the same user. The sensors pass information to the pattern matching computer and if no transfer is detected the token remains in a “Green” state. If the pattern matching software deems a transfer has been made the state is set to “Red.” When the user wants to use a controlled privilege, there is a checking of the state of the token 35. This can be visual by venue personnel or by some automated means such a video scanning or communication by the token to an appropriate reader. If the state is “Green” then the privilege is allowed 36. If the state is “Red” than the privilege is denied. In this particular embodiment, the user is sent back to the entrance window (22 of
(44) Referring to
(45) The first step of the development is to accumulate 50 a data set for training and testing. A device is constructed similar to that of
(46) In this and related embodiments, a step in the development which might be started in parallel with data collection is the design of an appropriate neural network. The sizing of the layers and the setting of various factors in the neural net which are in addition to the factors and values (parameters) that are adjusted in training are collectively referred to as hyperparameters to distinguish them from the “parameters” which are adjusted in training the neural network. The hyperparameters are initialized 51 to appropriate values. In some systems that are taught hyperparameters are adjusted during the course of training but are distinct from trainable parameters because the adjustments are on the basis of the progress of the training rather than being direct functions of the data.
(47) The next step is to initialize 52 the parameters which are to be trained. Appropriate initialization is necessary for reasonably rapid convergence of the neural net. A number of techniques are taught to product an initial set of values which produced good training progress.
(48) The network is then trained 53 by passing data set items through the network as implemented on a training processor. Because training requires larger processing power and time than use of the network after training special powerful processors are used for this step. The training process adjusts the parameters incrementally on the basis of the output of the neural network. The hyperparameters specify the methods of calculating the adjustment to parameters. Generally the output of the network is used to back propagate through the network to provide further input to the adjustments. The items in the training portion of the dataset are used repeatedly while the convergence of the network is observed 54 by processes in the training data processor.
(49) If the convergence is judged 55 not to be adequate the training is stopped, the hyperparameters are adjusted 56, the neural network is reinitialized and the training process is repeated until satisfactory convergence is obtained. The smaller portion of the data set which has been retained and not used for training is then passed 57 through the neural network (classified) and the output is checked 58 for accuracy. If accuracy is not sufficient for the goals of the particular system being developed then the net structure is made larger 59 and the training process is repeated until satisfactory accuracy is obtained.
(50) The trained neural network is then downloaded 60 to the target device, which is then ready for system testing 61.
(51) Referring to
(52) The user's mobile device 204 now uses its sensors to track potential transfers of the device which remains in the green state until the pattern matching software in the device determine that the device has been or may have been transferred to another person. When the user 203 wants to exercise a controlled privilege the screen of the device 205 is displayed. It shows the state (here green) and exercise of the privilege is allowed. The screen may be observed 206 by personnel 207 of the venue or it may be checked by an automatic means such as a video scanner with image recognition software.
(53) Referring to
(54) In the depicted scenario three customers are seated at a table requesting service of alcoholic beverages. Customer 210 has been vetted for age and has a token which is in the green state because the customer has continuously had possession since it was issued and activated. Customer 211 had a token but gave it to underage Customer 212, who therefore has a token in the red state. Customer 211 does not have a token at all. Waiter 213 is checking eligibility of customer 210 with a scanner 214. Customer 210 is eligible and is being served 215. When customers 211 or 212 request service, they will not be found eligible and will be restricted to ordering non-alcoholic beverages. This scanner in one embodiment is an application on the electronic tablet used by the waiter to take orders. It communicates with the tokens with a radio system such a Bluetooth. In the depicted case the nearest token is found to be in the green state.
(55) The scanner may be obvious to the customers as shown here in cases where the venue wants to make enforcement of the age rule obvious or it may be hidden and only visible to staff in other cases. In some implementations the customers own device 204 may implement the function of sensing by the token and the function of the token signifying the authorization of a privilege may be in another object. That object in the scenarios of
(56) Referring to
(57) This embodiment works to prevent unauthorized use of the firearm after it has left control of the authorized user. The training set for a neural net for this token would normally be focused on the type of transfers feared for firearms. For example, they would include having the firearm grabbed by someone other than the authorized user and leaving the firearm in a bathroom stall. In a more tightly focused case an additional sensor could determine that the firearm had left the carriers holster. The identification token as an additional output which serves to disable discharge of the firearm when the chips is in a particular “red” state. The token is trained to detect transfers of possession, especially those where the firearm is taken forcefully from the authorized person and those where the forearm is left unguarded and picked up by an unauthorized person. A short range communication link resets the chip when it is in the specific holster worn by the authorized person.