Accessing a secure region of an environment using visually identified behaviors relative to an access control device

A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visua...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Wood, Kimberly Ann, Landers, Jr., John David, Herring, Dean Frederick, Wilson, Paul Morton, Steiner, David John
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Wood, Kimberly Ann
Landers, Jr., John David
Herring, Dean Frederick
Wilson, Paul Morton
Steiner, David John
description A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10032326B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10032326B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10032326B13</originalsourceid><addsrcrecordid>eNqNjEEKwkAQBHPxIOofxgcIiQHvKop39RzGTUcH1pmwu1nw90bxAZ4aiqqeFmnrHGIUvRNThBsCKOAupmQdsRI0SzB9QhMNXy9LHNj7F0k7QukELd3w4CwW4hh7TpJByT45f-_JmaZgnlpkcZgXk459xOK3s2J5PFz2pxV6axB7dlCk5nquyrJe1-vNrqr_cd6m9UUs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><source>esp@cenet</source><creator>Wood, Kimberly Ann ; Landers, Jr., John David ; Herring, Dean Frederick ; Wilson, Paul Morton ; Steiner, David John</creator><creatorcontrib>Wood, Kimberly Ann ; Landers, Jr., John David ; Herring, Dean Frederick ; Wilson, Paul Morton ; Steiner, David John</creatorcontrib><description>A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.</description><language>eng</language><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE ; CALCULATING ; CHECKING-DEVICES ; COMPUTING ; CONTROL OR REGULATING SYSTEMS IN GENERAL ; CONTROLLING ; COUNTING ; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS ; GENERATING RANDOM NUMBERS ; HANDLING RECORD CARRIERS ; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; REGISTERING OR INDICATING THE WORKING OF MACHINES ; REGULATING ; TIME OR ATTENDANCE REGISTERS ; VOTING OR LOTTERY APPARATUS</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180724&amp;DB=EPODOC&amp;CC=US&amp;NR=10032326B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20180724&amp;DB=EPODOC&amp;CC=US&amp;NR=10032326B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Wood, Kimberly Ann</creatorcontrib><creatorcontrib>Landers, Jr., John David</creatorcontrib><creatorcontrib>Herring, Dean Frederick</creatorcontrib><creatorcontrib>Wilson, Paul Morton</creatorcontrib><creatorcontrib>Steiner, David John</creatorcontrib><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><description>A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.</description><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</subject><subject>CALCULATING</subject><subject>CHECKING-DEVICES</subject><subject>COMPUTING</subject><subject>CONTROL OR REGULATING SYSTEMS IN GENERAL</subject><subject>CONTROLLING</subject><subject>COUNTING</subject><subject>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</subject><subject>GENERATING RANDOM NUMBERS</subject><subject>HANDLING RECORD CARRIERS</subject><subject>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>REGISTERING OR INDICATING THE WORKING OF MACHINES</subject><subject>REGULATING</subject><subject>TIME OR ATTENDANCE REGISTERS</subject><subject>VOTING OR LOTTERY APPARATUS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjEEKwkAQBHPxIOofxgcIiQHvKop39RzGTUcH1pmwu1nw90bxAZ4aiqqeFmnrHGIUvRNThBsCKOAupmQdsRI0SzB9QhMNXy9LHNj7F0k7QukELd3w4CwW4hh7TpJByT45f-_JmaZgnlpkcZgXk459xOK3s2J5PFz2pxV6axB7dlCk5nquyrJe1-vNrqr_cd6m9UUs</recordid><startdate>20180724</startdate><enddate>20180724</enddate><creator>Wood, Kimberly Ann</creator><creator>Landers, Jr., John David</creator><creator>Herring, Dean Frederick</creator><creator>Wilson, Paul Morton</creator><creator>Steiner, David John</creator><scope>EVB</scope></search><sort><creationdate>20180724</creationdate><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><author>Wood, Kimberly Ann ; Landers, Jr., John David ; Herring, Dean Frederick ; Wilson, Paul Morton ; Steiner, David John</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10032326B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</topic><topic>CALCULATING</topic><topic>CHECKING-DEVICES</topic><topic>COMPUTING</topic><topic>CONTROL OR REGULATING SYSTEMS IN GENERAL</topic><topic>CONTROLLING</topic><topic>COUNTING</topic><topic>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</topic><topic>GENERATING RANDOM NUMBERS</topic><topic>HANDLING RECORD CARRIERS</topic><topic>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>REGISTERING OR INDICATING THE WORKING OF MACHINES</topic><topic>REGULATING</topic><topic>TIME OR ATTENDANCE REGISTERS</topic><topic>VOTING OR LOTTERY APPARATUS</topic><toplevel>online_resources</toplevel><creatorcontrib>Wood, Kimberly Ann</creatorcontrib><creatorcontrib>Landers, Jr., John David</creatorcontrib><creatorcontrib>Herring, Dean Frederick</creatorcontrib><creatorcontrib>Wilson, Paul Morton</creatorcontrib><creatorcontrib>Steiner, David John</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wood, Kimberly Ann</au><au>Landers, Jr., John David</au><au>Herring, Dean Frederick</au><au>Wilson, Paul Morton</au><au>Steiner, David John</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><date>2018-07-24</date><risdate>2018</risdate><abstract>A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US10032326B1
source esp@cenet
subjects ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE
CALCULATING
CHECKING-DEVICES
COMPUTING
CONTROL OR REGULATING SYSTEMS IN GENERAL
CONTROLLING
COUNTING
FUNCTIONAL ELEMENTS OF SUCH SYSTEMS
GENERATING RANDOM NUMBERS
HANDLING RECORD CARRIERS
MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
REGISTERING OR INDICATING THE WORKING OF MACHINES
REGULATING
TIME OR ATTENDANCE REGISTERS
VOTING OR LOTTERY APPARATUS
title Accessing a secure region of an environment using visually identified behaviors relative to an access control device
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T12%3A34%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Wood,%20Kimberly%20Ann&rft.date=2018-07-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10032326B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true