Security and Public Safety Application for a Mobile Device with Audio/Video Analytics and Access Control Authentication
First Claim
1. A computer-implemented method for authenticating a user'"'"'s access privileges for unlocking a door secured by an access control system, said method comprising:
- assigning the user access privileges to the secured door, within the access control system;
storing one or more biometric characteristics of the user within the access control system;
coupling a client device of the user to the access control system;
associating a key card with the user;
configuring the access control system for selective enabling of an access control reader of the secured door; and
configuring the access control reader, when enabled, for verifying the key card is associated with the user, and for causing temporary unlocking of the secured door by the verified key card;
configuring the client device for obtaining at least one of the one or more biometric characteristics, and for transmitting the obtained at least one biometric characteristic to the access control system;
wherein said selective enabling of the access control reader comprises;
comparing, by the access control system, the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user; and
temporarily enabling the access control reader upon matching by the access control system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control system utilizes authorized users'"'"' mobile electronic devices for transmitting biometric identifiers in combination with using a key card, for authenticating the user'"'"'s access privileges for unlocking a secure door. The system may further verify proximity of the user'"'"'s device to the access control reader, which verifies correspondence of the key card with the transmitted biometric characteristics. The system may further require entry of a PIN into the user'"'"'s device, for its transmission to the access control system for access confirmation. A scanner scans the area around its geographic location for search signals emitted by mobile electronic devices, and identifies a position, a type, and an address of each device, using characteristics of the search signals. Audio analytics detect/identify a position of sudden sound fluctuations indicating a gunshot/fight incident, and correlates the incident location to a device location. Video analytics correlate imaged people with detected electronic devices.
-
Citations
20 Claims
-
1. A computer-implemented method for authenticating a user'"'"'s access privileges for unlocking a door secured by an access control system, said method comprising:
-
assigning the user access privileges to the secured door, within the access control system; storing one or more biometric characteristics of the user within the access control system; coupling a client device of the user to the access control system; associating a key card with the user; configuring the access control system for selective enabling of an access control reader of the secured door; and
configuring the access control reader, when enabled, for verifying the key card is associated with the user, and for causing temporary unlocking of the secured door by the verified key card;configuring the client device for obtaining at least one of the one or more biometric characteristics, and for transmitting the obtained at least one biometric characteristic to the access control system; wherein said selective enabling of the access control reader comprises; comparing, by the access control system, the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user; and temporarily enabling the access control reader upon matching by the access control system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A computer-implemented method for tracking and correlating a location of one or more mobile electronic devices in relation to an aggression incident using a scanner, said method comprising:
-
configuring the scanner for continuously acquiring its current geographic location; configuring the scanner for scanning the area around its geographic location for search signals emitted by one or more mobile electronic devices; configuring the scanner for identifying a type and an address of each of the one or more mobile electronic devices; determining a location of each of the one or more mobile electronic devices using characteristics of the emitted search signals; detecting sound in real-time around the scanner using a microphone; analyzing the detected sound using audio analytics configured for detecting sudden sound fluctuations, indicating detection of at least one of a gunshot incident and a fight incident; determining a geographic location of each of the at least one detected incident; and
correlating the geographic location of each of the at least one detected incident to the geographic location of the one or more mobile electronic devices. - View Dependent Claims (13, 14)
-
-
15. A computer-implemented method for tracking and correlating a location of one or more mobile electronic devices in relation to one or more imaged people using a scanner, said method comprising:
-
configuring the scanner for continuously acquiring its current geographic location;
configuring the scanner for scanning the area around its geographic location for searchsignals emitted by one or more mobile electronic devices; configuring the scanner for identifying an address and a type of the one or more mobile electronic devices; determining a location of each of the one or more mobile electronic devices using characteristics of the emitted search signals; imaging one or more people positioned around the scanner in real-time using a camera; analyzing said imaging using video analytics configured for determining an aspect ratio of each of the one or more imaged people; determining a location of each of the one or more imaged people; and pairing the geographic location of each of the one or more imaged people to the location of the one or more mobile electronic devices. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification