Active presence detection with depth sensing
First Claim
Patent Images
1. A computer-implemented method for monitoring an operator'"'"'s use of a secure system, the method comprising:
- (a) defining a detection zone extending from an operator terminal of the secure system to a depth boundary spaced apart from the operator terminal and corresponding to a distance from the operator terminal beyond which an operator cannot interact with the secure system;
(b) using a depth-sensing camera system co-located with the operator terminal to acquire a series of images of one or more objects within the detection zone;
(c) using the depth-sensing camera to measure distances from the operator terminal to the one or more objects in the series of images;
(d) determining whether any of the one or more objects within the detection zone is a face, and, if so, associating the face with an operator;
(e) following association of a detected face with the operator, using the depthsensing camera to track the distance from the operator terminal to the detected face and, if the distance extends beyond the depth boundary, signaling a walk-away event; and
wherein step (d) comprises identifying, among a plurality of faces present within the detection zone, the face closest to the secure system based on distances to the plurality of faces measured using the depth-sensing camera and computationally associating that face with the operator.
7 Assignments
0 Petitions
Accused Products
Abstract
In vision-based authentication platforms for secure resources such as computer systems, false positives and/or false negatives in the detection of walk-away events are reduced or eliminated by incorporating depth information into tracking authenticated system operators.
-
Citations
19 Claims
-
1. A computer-implemented method for monitoring an operator'"'"'s use of a secure system, the method comprising:
-
(a) defining a detection zone extending from an operator terminal of the secure system to a depth boundary spaced apart from the operator terminal and corresponding to a distance from the operator terminal beyond which an operator cannot interact with the secure system; (b) using a depth-sensing camera system co-located with the operator terminal to acquire a series of images of one or more objects within the detection zone; (c) using the depth-sensing camera to measure distances from the operator terminal to the one or more objects in the series of images; (d) determining whether any of the one or more objects within the detection zone is a face, and, if so, associating the face with an operator; (e) following association of a detected face with the operator, using the depthsensing camera to track the distance from the operator terminal to the detected face and, if the distance extends beyond the depth boundary, signaling a walk-away event; and wherein step (d) comprises identifying, among a plurality of faces present within the detection zone, the face closest to the secure system based on distances to the plurality of faces measured using the depth-sensing camera and computationally associating that face with the operator.
-
-
2. A computer-implemented method for monitoring an operator'"'"'s use of a secure system, the method comprising:
-
(a) defining a detection zone extending from an operator terminal of the secure system to a depth boundary spaced apart from the operator terminal and corresponding to a distance from the operator terminal beyond which an operator cannot interact with the secure system; (b) using a depth-sensing camera system co-located with the operator terminal to acquire a series of images of one or more objects within the detection zone; (c) using the depth-sensing camera to measure distances from the operator terminal to the one or more objects in the series of images; (d) determining whether any of the one or more objects within the detection zone is a face, and, if so, associating the face with an operator; (e) following association of a detected face with the operator, using the depthsensing camera to track the distance from the operator terminal to the detected face and, if the distance extends beyond the depth boundary, signaling a walk-away event; and wherein step (d) comprises analyzing relative depth information measured with the depth-sensing camera to discriminate between faces and two-dimensional images thereof.
-
-
3. A computer-implemented method for monitoring an operator'"'"'s use of a secure system, the method comprising:
-
(a) defining a detection zone extending from an operator terminal of the secure system to a depth boundary spaced apart from the operator terminal and corresponding to a distance from the operator terminal beyond which an operator cannot interact with the secure system; (b) using a depth-sensing camera system co-located with the operator terminal to acquire a series of images of one or more objects within the detection zone; (c) using the depth-sensing camera to measure distances from the operator terminal to the one or more objects in the series of images; (d) determining whether any of the one or more objects within the detection zone is a face, and, if so, associating the face with an operator; (e) following association of a detected face with the operator, using the depthsensing camera to track the distance from the operator terminal to the detected face and, if the distance extends beyond the depth boundary, signaling a walk-away event; and wherein step (e) comprises tracking a collection of trackable key features associated with the operator between the successive images based, at least in part, on distances associated therewith. - View Dependent Claims (4, 5)
-
-
6. A computer-implemented method for monitoring an operator'"'"'s use of a secure system, the method comprising:
-
(a) defining a detection zone extending from an operator terminal of the secure system to a depth boundary spaced apart from the operator terminal and corresponding to a distance from the operator terminal beyond which an operator cannot interact with the secure system; (b) using a depth-sensing camera system co-located with the operator terminal to acquire a series of images of one or more objects within the detection zone; (c) using the depth-sensing camera to measure distances from the operator terminal to the one or more objects in the series of images; (d) determining whether any of the one or more objects within the detection zone is a face, and, if so, associating the face with an operator; (e) following association of a detected face with the operator, using the depthsensing camera to track the distance from the operator terminal to the detected face and, if the distance extends beyond the depth boundary, signaling a walk-away event; and wherein step (e) further comprises periodically restarting the tracking based on at least one of re-detection of the face or detection of a headshoulder portion associated with the operator, the at least one of re-detection of the face or detection of the head-shoulder portion being based at least in part on the distances measured using the depth-sensing camera. - View Dependent Claims (7, 8)
-
-
9. An access-control system for monitoring an operator'"'"'s use of a secure system, comprising:
-
a depth-sensing camera system co-located with an operator terminal of the secure system; and a computational facility including a processor and associated memory, the memory storing instructions, for execution by the processor, for; (i) defining a detection zone extending from the operator terminal to a depth boundary spaced apart from the operator terminal and corresponding to a distance from the operator terminal beyond which an operator cannot interact with the secure system; (ii) analyzing images of one or more objects acquired by the depth-sensing camera to determine whether any of the one or more objects within the detection zone is a face, and, if so, associating the face with an operator; and (iii) following association of a detected face with the operator, tracking a distance from the operator terminal to the detected face using distance information acquired by the depth-sensing camera and, if the distance extends beyond the depth boundary, signaling a walk-away event. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
Specification