Method for suspect identification using scanning of surveillance media
First Claim
1. A method for criminal suspect identification, comprising the computer-implemented steps of:
- monitoring and recording video information at a location;
responsive to an event trigger, in real time, analyzing the video for identifying physical characteristics of any persons in the video;
compiling an identification profile for each person in the video, wherein the identification profile includes distinguishing physical characteristics extracted from the video information; and
transmitting the identification profiles to security agents.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, program and apparatus for criminal suspect identification are provided. The invention comprises monitoring and recording video information at a location, and responsive to an event trigger analyzing the video in real time for identifying physical characteristics of any persons in the video. The invention compiles an identification profile for each person in the video, wherein the identification profile includes distinguishing physical characteristics extracted from the video information. The identification profiles are then transmitted to law enforcement authorities. The invention further comprises scanning previously stored video information of the location and comparing, by means of image recognition, physical characteristics in the identification profiles with images in the stored video. The invention determines any matches between identification profiles and images in the stored video, updates the identification profiles with additional information from matched images and transmits the updated identification profile to the authorities.
-
Citations
20 Claims
-
1. A method for criminal suspect identification, comprising the computer-implemented steps of:
-
monitoring and recording video information at a location;
responsive to an event trigger, in real time, analyzing the video for identifying physical characteristics of any persons in the video;
compiling an identification profile for each person in the video, wherein the identification profile includes distinguishing physical characteristics extracted from the video information; and
transmitting the identification profiles to security agents. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product in a computer readable medium for use in a data processing system, for criminal suspect identification, the computer program product comprising:
-
first instructions for monitoring and recording video information at a location;
second instructions, responsive to an event trigger, in real time, for analyzing the video for identifying physical characteristics of any persons in the video;
third instructions for compiling an identification profile for each person in the video, wherein the identification profile includes distinguishing physical characteristics extracted from the video information; and
fourth instructions for transmitting the identification profiles to security agents. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 20)
-
-
19. A system for criminal suspect identification, comprising:
-
video devices that monitor and record video information at a location;
a biometrics component, responsive to an event trigger, in real time, that analyzes the video for identifying physical characteristics of any persons in the video;
a biometrics profiling component that compiles an identification profile for each person in the video, wherein the identification profile includes distinguishing physical characteristics extracted from the video information; and
a first communication component that transmits the identification profiles to security agents.
-
Specification