Technique for providing security to an area
First Claim
1. A method for providing security to an area, the method comprising:
- providing at least one entry port for persons to enter into a secure area;
capturing a photographic image of each person who approaches the at least one entry port seeking entry into the secure area;
comparing the photographic image of each person seeking entry into the secure area to facial images compiled in a database of facial images of persons of interest to detect a likely match; and
alerting at least one of one or more law enforcement officers or one or more security personnel of a detection of a likely match between the photographic image of the person seeking entry into the secure area and a facial image of a person of interest,wherein the comparing of the photographic image of each person seeking entry into the secure area includes transmitting the photographic image of each person seeking entry into the secure area to the database and, in response, receiving an alert that the person seeking entry into the secure area is the person of interest if the likely match is detected between the photographic image of the person seeking entry into the secure area and the facial image of the person of interest, andwherein the secure area is controlled by a first party and the database is controlled by a second party.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for reducing violence within crowded venues is provided. The method includes reading license plates of vehicles passing into entry ports of a parking area, and capturing facial images of persons seeking admission to the venue. A computer compares such license plates to a database of vehicle license plates associated with persons with past histories of violence. A computer also compares captured facial images to a database of facial data for persons with past violent histories. Upon detecting a match, the computer creates an alert presented to law enforcement officers to facilitate detention of such persons for investigation. Information recorded on entry tickets is scanned and saved together with the facial image of the ticket holder. If a violent act occurs, cameras within the venue capture facial images of participants. The computer matches such participants to stored identifying data to assist in the identification and apprehension of such persons.
-
Citations
23 Claims
-
1. A method for providing security to an area, the method comprising:
-
providing at least one entry port for persons to enter into a secure area;
capturing a photographic image of each person who approaches the at least one entry port seeking entry into the secure area;comparing the photographic image of each person seeking entry into the secure area to facial images compiled in a database of facial images of persons of interest to detect a likely match; and alerting at least one of one or more law enforcement officers or one or more security personnel of a detection of a likely match between the photographic image of the person seeking entry into the secure area and a facial image of a person of interest, wherein the comparing of the photographic image of each person seeking entry into the secure area includes transmitting the photographic image of each person seeking entry into the secure area to the database and, in response, receiving an alert that the person seeking entry into the secure area is the person of interest if the likely match is detected between the photographic image of the person seeking entry into the secure area and the facial image of the person of interest, and wherein the secure area is controlled by a first party and the database is controlled by a second party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for providing security to an area, the system comprising:
-
at least one entry port configured to admit persons seeking entry into a secure area; at least one camera configured to capture a photographic image of each person who approaches the at least one entry port seeking entry into the secure area; and a computer circuit configure to; receive a photographic image of each person who approaches the at least one entry port seeking entry into the secure area, compare the photographic image of each person seeking entry into the secure area to facial images compiled in a database of facial images of persons of interest to detect a likely match, and control to alert at least one of one or more law enforcement officers or one or more security personnel of a detection of a likely match between the photographic image of the person seeking entry into the secure area and a facial image of a person of interest, wherein the comparing of the photographic image of each person seeking entry into the secure area includes transmitting the photographic image of each person seeking entry into the secure area to the database and, in response, receiving an alert that the person seeking entry into the secure area is the person of interest if the likely match is detected between the photographic image of the person seeking entry into the secure area and the facial image of the person of interest, and wherein the secure area is controlled by a first party and the database is controlled by a second party. - View Dependent Claims (18, 19, 20, 21, 22, 23)
-
Specification