Personnel authentication and tracking system
First Claim
Patent Images
1. A personnel authentication and tracking appliance comprises:
- one or more processor devices;
memory operatively coupled to the one or more processor devices, with the memory executing a computer program that configures the one or more processor devices to;
receive image data;
read tags and other credentials within a corresponding detection zone associated with the personnel authentication and tracking appliance;
authenticate the tags against an access control list;
provide counts of the number of people in the corresponding detection zone by executing an analytic algorithm to count people detected in the received image data; and
receive real time analytic algorithms to authenticate or count people detected in the received image data to modify processing on the personnel authentication and tracking appliance.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are techniques to authenticate tags passing through detection regions against an access control list, receive data that identifies a number of people passing through or within the detection regions, compare the number people identified by the received data with the number of tags identified by the system, and cause an alarm to be asserted when a discrepancy is detected in the number people identified with the number of tags in a detection region with personnel within the detection region.
-
Citations
13 Claims
-
1. A personnel authentication and tracking appliance comprises:
-
one or more processor devices; memory operatively coupled to the one or more processor devices, with the memory executing a computer program that configures the one or more processor devices to; receive image data; read tags and other credentials within a corresponding detection zone associated with the personnel authentication and tracking appliance; authenticate the tags against an access control list; provide counts of the number of people in the corresponding detection zone by executing an analytic algorithm to count people detected in the received image data; and receive real time analytic algorithms to authenticate or count people detected in the received image data to modify processing on the personnel authentication and tracking appliance. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer implemented method comprises:
-
authenticating and identifying by a personnel authentication and tracking appliance that includes a processor and memory, tags passing through detection regions with authenticating being performed with respect to an access control list; receiving by the personnel authentication and tracking appliance video data; processing the video data to count a number of people passing through or within one or more detection regions associated with the personnel authentication and tracking appliance; comparing by the personnel authentication and tracking appliance the number people counted by the received video data with the number of tags authenticated and identified by the personnel authentication and tracking appliance; and causing an alarm to be asserted when a discrepancy is detected within one or more of the detection regions. - View Dependent Claims (9, 10)
-
-
11. A system comprising:
-
one or more processors devices; and memory, in communication with the one or more processor devices, with the system configured to; receive data from plural personnel authentication and tracking appliances that authenticate and identify tags passing through corresponding detection regions against an access control list stored in the system; receive video data from one or more of the plural personnel authentication and tracking appliances, with each of the plural personnel authentication and tracking appliances associated with one or more detection regions; processing the video data to determine a count of a number of people passing through or within the detection region or regions associated with the one or more of the plural personnel authentication and tracking appliances; compare the number people identified by the received data with the number of tags identified by the system; and cause an alarm to be asserted when a discrepancy is detected in the number people identified with the number of tags in a detection region with personnel within the detection region. - View Dependent Claims (12, 13)
-
Specification