Accessing a secure region of an environment using visually identified behaviors relative to an access control device
A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visua...
Gespeichert in:
Hauptverfasser: | , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Wood, Kimberly Ann Landers, Jr., John David Herring, Dean Frederick Wilson, Paul Morton Steiner, David John |
description | A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US10032326B1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US10032326B1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US10032326B13</originalsourceid><addsrcrecordid>eNqNjEEKwkAQBHPxIOofxgcIiQHvKop39RzGTUcH1pmwu1nw90bxAZ4aiqqeFmnrHGIUvRNThBsCKOAupmQdsRI0SzB9QhMNXy9LHNj7F0k7QukELd3w4CwW4hh7TpJByT45f-_JmaZgnlpkcZgXk459xOK3s2J5PFz2pxV6axB7dlCk5nquyrJe1-vNrqr_cd6m9UUs</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><source>esp@cenet</source><creator>Wood, Kimberly Ann ; Landers, Jr., John David ; Herring, Dean Frederick ; Wilson, Paul Morton ; Steiner, David John</creator><creatorcontrib>Wood, Kimberly Ann ; Landers, Jr., John David ; Herring, Dean Frederick ; Wilson, Paul Morton ; Steiner, David John</creatorcontrib><description>A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.</description><language>eng</language><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE ; CALCULATING ; CHECKING-DEVICES ; COMPUTING ; CONTROL OR REGULATING SYSTEMS IN GENERAL ; CONTROLLING ; COUNTING ; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS ; GENERATING RANDOM NUMBERS ; HANDLING RECORD CARRIERS ; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; REGISTERING OR INDICATING THE WORKING OF MACHINES ; REGULATING ; TIME OR ATTENDANCE REGISTERS ; VOTING OR LOTTERY APPARATUS</subject><creationdate>2018</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180724&DB=EPODOC&CC=US&NR=10032326B1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20180724&DB=EPODOC&CC=US&NR=10032326B1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Wood, Kimberly Ann</creatorcontrib><creatorcontrib>Landers, Jr., John David</creatorcontrib><creatorcontrib>Herring, Dean Frederick</creatorcontrib><creatorcontrib>Wilson, Paul Morton</creatorcontrib><creatorcontrib>Steiner, David John</creatorcontrib><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><description>A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.</description><subject>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</subject><subject>CALCULATING</subject><subject>CHECKING-DEVICES</subject><subject>COMPUTING</subject><subject>CONTROL OR REGULATING SYSTEMS IN GENERAL</subject><subject>CONTROLLING</subject><subject>COUNTING</subject><subject>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</subject><subject>GENERATING RANDOM NUMBERS</subject><subject>HANDLING RECORD CARRIERS</subject><subject>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>REGISTERING OR INDICATING THE WORKING OF MACHINES</subject><subject>REGULATING</subject><subject>TIME OR ATTENDANCE REGISTERS</subject><subject>VOTING OR LOTTERY APPARATUS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2018</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNjEEKwkAQBHPxIOofxgcIiQHvKop39RzGTUcH1pmwu1nw90bxAZ4aiqqeFmnrHGIUvRNThBsCKOAupmQdsRI0SzB9QhMNXy9LHNj7F0k7QukELd3w4CwW4hh7TpJByT45f-_JmaZgnlpkcZgXk459xOK3s2J5PFz2pxV6axB7dlCk5nquyrJe1-vNrqr_cd6m9UUs</recordid><startdate>20180724</startdate><enddate>20180724</enddate><creator>Wood, Kimberly Ann</creator><creator>Landers, Jr., John David</creator><creator>Herring, Dean Frederick</creator><creator>Wilson, Paul Morton</creator><creator>Steiner, David John</creator><scope>EVB</scope></search><sort><creationdate>20180724</creationdate><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><author>Wood, Kimberly Ann ; Landers, Jr., John David ; Herring, Dean Frederick ; Wilson, Paul Morton ; Steiner, David John</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US10032326B13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2018</creationdate><topic>ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE</topic><topic>CALCULATING</topic><topic>CHECKING-DEVICES</topic><topic>COMPUTING</topic><topic>CONTROL OR REGULATING SYSTEMS IN GENERAL</topic><topic>CONTROLLING</topic><topic>COUNTING</topic><topic>FUNCTIONAL ELEMENTS OF SUCH SYSTEMS</topic><topic>GENERATING RANDOM NUMBERS</topic><topic>HANDLING RECORD CARRIERS</topic><topic>MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>REGISTERING OR INDICATING THE WORKING OF MACHINES</topic><topic>REGULATING</topic><topic>TIME OR ATTENDANCE REGISTERS</topic><topic>VOTING OR LOTTERY APPARATUS</topic><toplevel>online_resources</toplevel><creatorcontrib>Wood, Kimberly Ann</creatorcontrib><creatorcontrib>Landers, Jr., John David</creatorcontrib><creatorcontrib>Herring, Dean Frederick</creatorcontrib><creatorcontrib>Wilson, Paul Morton</creatorcontrib><creatorcontrib>Steiner, David John</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wood, Kimberly Ann</au><au>Landers, Jr., John David</au><au>Herring, Dean Frederick</au><au>Wilson, Paul Morton</au><au>Steiner, David John</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Accessing a secure region of an environment using visually identified behaviors relative to an access control device</title><date>2018-07-24</date><risdate>2018</risdate><abstract>A method, computer program product, and system are disclosed for facilitating access by a first person to a secure region within an environment having a plurality of items, wherein the secure region is at least partly defined by an access control device. The method acquires, using at least one visual sensor disposed within the environment, first image information including the first person and the access control device. The method identifies the first person using image analysis performed on the first image information. Further, the method identifies, using image analysis a first behavior of the first person relative to the access control device. Upon determining the first behavior corresponds to a predefined visual access behavior, and the security level of the first person satisfies a predetermined threshold security level associated with the access control device, deactivating a security element to permit the first person to physically access the secure region.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US10032326B1 |
source | esp@cenet |
subjects | ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDEDFOR ELSEWHERE CALCULATING CHECKING-DEVICES COMPUTING CONTROL OR REGULATING SYSTEMS IN GENERAL CONTROLLING COUNTING FUNCTIONAL ELEMENTS OF SUCH SYSTEMS GENERATING RANDOM NUMBERS HANDLING RECORD CARRIERS MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS ORELEMENTS PHYSICS PRESENTATION OF DATA RECOGNITION OF DATA RECORD CARRIERS REGISTERING OR INDICATING THE WORKING OF MACHINES REGULATING TIME OR ATTENDANCE REGISTERS VOTING OR LOTTERY APPARATUS |
title | Accessing a secure region of an environment using visually identified behaviors relative to an access control device |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-02T12%3A34%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Wood,%20Kimberly%20Ann&rft.date=2018-07-24&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS10032326B1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |