Security and Public Safety Application for a Mobile Device with Audio/Video Analytics and Access Control Authentication
First Claim
1. A computer-implemented method for authenticating a user'"'"'s access privileges for unlocking a door secured by an access control system, said method comprising:
- assigning the user access privileges to the secured door, within the access control system;
storing one or more biometric characteristics of the user within the access control system;
coupling a client device of the user for communicating with the access control system;
associating an access card with the user;
configuring the access control system for selective enabling of an access control reader of the secured door; and
configuring the access control reader, when enabled, for verifying the access card is associated with the user, and for causing temporary unlocking of the secured door by the verified access card;
obtaining at least one of the one or more biometric characteristics using the client device, and transmitting the obtained at least one biometric characteristic to the access control system;
wherein said selective enabling of the access control reader comprises;
comparing, by the access control system, the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user; and
temporarily enabling the access control reader upon matching by the access control system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user.2. The computer-implemented method according to claim 1 wherein said selective enabling of the access control reader further comprises;
transmitting, by the client device, of its geographic location to the access control system;
verifying, by the access control system, of said transmitted geographic location of the client device being less than a threshold distance away from the access control reader; and
temporarily enabling the access control reader upon said matching by the access control system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user, and upon said verifying of threshold proximity of the client device to the access control reader.
1 Assignment
0 Petitions
Accused Products
Abstract
An access control system utilizes authorized users'"'"' mobile electronic devices for transmitting biometric identifiers in combination with using an access card for authenticating the user'"'"'s access privileges for unlocking a secure door. The system may further verify proximity of the user'"'"'s device to the access control reader, which verifies correspondence of the access card with the transmitted biometric characteristics. The system may further require entry of a PIN into the user'"'"'s device, for its transmission to the access control system for access confirmation. A scanner scans the area around its geographic location for signals emitted by mobile electronic devices, and identifies a position, a type, and an address of each device, using characteristics of the signals. Audio analytics detect/identify a position of sudden sound fluctuations indicating a gunshot/fight incident, and correlates the incident location to a device location. Video analytics correlate imaged people with detected electronic devices.
-
Citations
20 Claims
-
1. A computer-implemented method for authenticating a user'"'"'s access privileges for unlocking a door secured by an access control system, said method comprising:
-
assigning the user access privileges to the secured door, within the access control system; storing one or more biometric characteristics of the user within the access control system; coupling a client device of the user for communicating with the access control system; associating an access card with the user; configuring the access control system for selective enabling of an access control reader of the secured door; and
configuring the access control reader, when enabled, for verifying the access card is associated with the user, and for causing temporary unlocking of the secured door by the verified access card;obtaining at least one of the one or more biometric characteristics using the client device, and transmitting the obtained at least one biometric characteristic to the access control system; wherein said selective enabling of the access control reader comprises; comparing, by the access control system, the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user; and temporarily enabling the access control reader upon matching by the access control system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user. 2. The computer-implemented method according to claim 1 wherein said selective enabling of the access control reader further comprises; transmitting, by the client device, of its geographic location to the access control system; verifying, by the access control system, of said transmitted geographic location of the client device being less than a threshold distance away from the access control reader; and temporarily enabling the access control reader upon said matching by the access control system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user, and upon said verifying of threshold proximity of the client device to the access control reader. - View Dependent Claims (5, 6, 7)
-
-
3. The computer-implemented method according to claim 2 wherein said selective enabling of the access control reader further comprises:
storing a personal identification number (PIN) of the user within the access control system; configuring the access control system for comparing a number entered therein with the stored PIN of the user; and temporarily enabling the access control reader upon;
said matching by the access control system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user, upon said verifying of threshold proximity of the client device to the access control reader, and upon matching of the entered number with the stored PIN of the user.- View Dependent Claims (4)
-
8. A method of using a backend computer system and a mobile computing device of a user for adding dynamic real-time biometric authenticating of the user to an existing access control system configured for selectively unlocking a respective door, said method comprising:
-
assigning the user access privileges to the respective door in the backend computer system; storing one or more biometric characteristics of the user in the backend computer system; storing a geolocation of the respective door in the backend computer system; configuring the backend computer system for communicating with an application running on the mobile computing device of the user; configuring the access control system for receiving instructions from the backend computer system; and
configuring the access control system for unlocking the respective door when instructed by the backend computer system;using the mobile computing device for obtaining at least one of the one or more biometric characteristics, and transmitting the obtained at least one biometric characteristic to the backend computer system; transmitting the geolocation of the mobile computing device to the backend computer system; comparing, by the backend computer system, of the transmitted at least one biometric characteristic to the stored one or more biometric characteristics of the user; comparing, by the backend computer system, of the transmitted geolocation of the mobile computing device to the stored geolocation of the respective door; instructing the access control system, by the backend computer system, for temporarily unlocking the respective door, upon matching by the backend computer system of the transmitted at least one biometric characteristic with the stored one or more biometric characteristics of the user, and upon verifying that the transmitted geolocation of the mobile computing device of the user is less than a threshold distance away from the respective door. - View Dependent Claims (9, 10, 11)
-
-
12. A computer-implemented method for tracking and correlating a location of one or more mobile electronic devices in relation to an incident using a scanner, said method comprising:
-
identifying the geographic location of the scanner; continuously scanning the area around the geographic location of the scanner for signals emitted by one or more mobile electronic devices; identifying a type and an identifier of each of the one or more mobile electronic devices; determining a location of each of the one or more mobile electronic devices using characteristics of the emitted signals; detecting sound in real-time around the scanner; analyzing the detected sound using audio analytic configured for detecting sudden fluctuations in the detected sound, indicating detection of the incident; determining a geographic location of the detected incident; and correlating the geographic location of the detected incident to the geographic location of the one or more mobile electronic devices. - View Dependent Claims (13, 14)
-
-
15. A computer-implemented method for tracking and correlating a location of one or more mobile electronic devices in relation to one or more imaged people using a scanner, said method comprising:
-
identifying the geographic location of the scanner; continuously scanning the area around the geographic location of the scanner for signals emitted by one or more mobile electronic devices; identifying an identifier and a type of the one or more mobile electronic devices; determining a location of each of the one or more mobile electronic devices using characteristics of the emitted signals; imaging one more people positioned around the scanner in real-time using a camera; analyzing said imaging using video analytics configured for determining changing of an aspect ratio of each of the one or more imaged people; determining a location of each of the one or more imaged people; and pairing the geographic location of each of the one of more imaged people to the location of the one or more mobile electronic devices. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification