Continuous video monitoring using face recognition for access control
First Claim
1. A method of regulating continued access to a restricted environment, comprising:
- storing a facial representation of an individual authorized to have access to the restricted environment;
periodically acquiring a facial representation of an individual desiring continued access to the restricted environment;
determining repeatedly whether the individual seeking continued access is the authorized individual by comparing the most recently acquired representation to the stored representation to determine the degree to which the most recently acquired representation corresponds to the stored representation;
storing additional identifying features representative of an authorized individual;
acquiring additional identifying features of the individual desiring continued access to the restricted environment;
comparing the acquired additional features and the stored additional features when the degree of similarity between the most recently acquired facial representation and the stored facial representation does not confirm the identity of the individual seeking continued access;
revoking access to the restricted environment if the step of determining and the step of comparing indicate that the individual seeking continued access is not the authorized individual.
4 Assignments
0 Petitions
Accused Products
Abstract
A continuous monitoring system for regulating access to a computer system or other restricted environment is disclosed. The system employs real-time face recognition to initially detect the presence of an authorized individual and to grant the individual access to the computer system. In some embodiments, the system also employs real-time face recognition to continuously or periodically track the continued presence of the authorized individual. Access to the computer system is revoked when the individual'"'"'s presence is no longer detected. In other embodiments, the system employs a screen saver program to deny access to the computer system when a predetermined period of user inactivity is detected. Other aspects of the invention include a stranger detector which warns the authorized individual of the approach of an unauthorized individual, a multimedia messaging center which permits unauthorized individuals to leave messages for authorized individuals, and an adaptive enrollment program which permits the system to update the stored video images of authorized individuals to reflect the individuals'"'"' current appearance.
435 Citations
48 Claims
-
1. A method of regulating continued access to a restricted environment, comprising:
-
storing a facial representation of an individual authorized to have access to the restricted environment; periodically acquiring a facial representation of an individual desiring continued access to the restricted environment; determining repeatedly whether the individual seeking continued access is the authorized individual by comparing the most recently acquired representation to the stored representation to determine the degree to which the most recently acquired representation corresponds to the stored representation; storing additional identifying features representative of an authorized individual; acquiring additional identifying features of the individual desiring continued access to the restricted environment; comparing the acquired additional features and the stored additional features when the degree of similarity between the most recently acquired facial representation and the stored facial representation does not confirm the identity of the individual seeking continued access; revoking access to the restricted environment if the step of determining and the step of comparing indicate that the individual seeking continued access is not the authorized individual. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of regulating initial and continued access to a restricted environment, comprising:
-
storing facial representations of individuals authorized to have access to the restricted environment; acquiring a first representation of the face of an individual who approaches the restricted environment during a period when access to the restricted environment is impeded; comparing the first acquired representation to the stored representations; denying initial access to the restricted environment if the comparison indicates that the individual seeking initial access is not an authorized individual and granting initial access to the restricted environment if the comparison indicates that the individual seeking initial access is an authorized individual; acquiring a second facial representation of an individual desiring continued access to the restricted environment; determining whether the individual seeking continued access is the authorized individual by comparing the second acquired representation to at least one of the stored representations; revoking access to the restricted environment if the determination indicates that the individual seeking continued access is not the authorized individual; if initial access is denied, displaying a greeting to the unauthorized individual; and storing a message for an authorized individual from the unauthorized individual. - View Dependent Claims (16, 17, 18)
-
-
19. A method of regulating continued access to a restricted environment, comprising:
-
storing a facial representation of an individual authorized to have access to the restricted environment; acquiring a facial representation of an individual desiring continued access to the restricted environment; determining whether the individual seeking continued access is the authorized individual by comparing the acquired representation to the stored representation; revoking access to the restricted environment if the determination indicates that the individual seeking continued access is not the authorized individual; detecting the approach of an unauthorized second individual to the restricted environment; and revoking access of the authorized individual to the restricted environment when the approach of the unauthorized individual is detected.
-
-
20. A method of regulating initial access to a restricted environment, comprising:
-
storing a plurality of facial representations of individuals authorized to have access to the restricted environment; associating one or more words with each authorized individual; acquiring a representation of the face of an individual who approaches the restricted environment during a period when access to the restricted environment is impeded; recognizing the linguistic content of the one or more words when spoken by an individual seeking access to the restricted environment; comparing the acquired representation only against the facial representations of individuals with whom the recognized one or more words are associated; denying initial access to the restricted environment if the comparison indicates that the individual seeking initial access is not an authorized individual.
-
-
21. A continuous monitoring system for regulating access to a restricted environment, comprising:
-
a CPU; a memory connected to the CPU; a tracking path stored in the memory comprising data regarding an individual authorized to have access to the restricted environment; the tracking path comprising at least a facial representation of the authorized individual; a video input device connected to the CPU and having a field of view; an image translator resident in the CPU for repeatedly receiving images in the field of view and generating therefrom data regarding an individual located in the field of view; a comparator resident in the CPU for repeatedly comparing the generated data with the tracking path, the results of each comparison constituting a comparison result; an access control device resident in the CPU operative in response to the comparison results; wherein the generated data comprises a facial representation of the individual in the field of view when it is possible to acquire a facial representation of the individual; wherein the tracking path and the generated data further comprise additional identifying data regarding the authorized individual located in the field of view; and wherein the comparator compares the additional generated data and the additional tracking path data when it is impossible to acquire a facial representation of the individual in the field of view. - View Dependent Claims (22, 23, 24, 25, 26, 27)
-
-
28. A monitoring system for regulating continued access to a restricted environment, comprising:
-
means for storing a facial representation of an individual authorized to have access to the restricted environment; means for acquiring a facial representation of an individual desiring continued access to the restricted environment; means for repeatedly determining whether the individual seeking continued access is the authorized individual by comparing the acquired representation and the stored representation; means for revoking access to the restricted environment if the determination indicates that the individual seeking continued access is not the authorized individual; second means for storing additional identifying features representative of an authorized individual; second means for acquiring additional identifying features of an individual desiring continued access to the restricted environment; wherein the means for determining comprises a means for comparing the acquired additional features and the stored additional features when the degree of similarity between the most recently acquired facial representation and the stored facial representation does not confirm the identity of the individual seeking continued access. - View Dependent Claims (29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A monitoring system for regulating initial and continued access to a restricted environment, comprising:
-
means for storing facial representations of individuals authorized to have access to the restricted environment; means for acquiring a first representation of the face of an individual who approaches the restricted environment during a period when access to the restricted environment is impeded; face recognition means for comparing the first acquired representation to the stored representations; means for denying initial access to the restricted environment if the comparison indicates that the individual seeking initial access is not an authorized individual and for granting initial access to the restricted environment if the comparison indicates that the individual seeking initial access is an authorized individual; means for acquiring subsequent facial representations of an individual desiring continued access to the restricted environment; means for repeatedly determining whether the individual seeking continued access is the authorized individual by comparing the subsequent acquired representations and at least one of the stored representations; means for revoking access to the restricted environment if the means for determining determines that the individual seeking continued access is not the authorized individual; means, operative upon detection of an unauthorized individual, for displaying a greeting to the unauthorized individual and message means for enabling the unauthorized individual to leave a message for an authorized individual. - View Dependent Claims (44, 45, 46)
-
-
47. A monitoring system for regulating continued access to a restricted environment, comprising:
-
means for storing a facial representation of an individual authorized to have access to the restricted environment; means for acquiring a facial representation of an individual desiring continued access to the restricted environment; means for repeatedly determining whether the individual seeking continued access is the authorized individual by comparing the acquired representation and the stored representation; means for revoking access to the restricted environment if the determination indicates that the individual seeking continued access is not the authorized individual; means for detecting the approach of an unauthorized second individual to the restricted environment; and means, triggered by detection of the unauthorized second individual, for revoking access of the authorized individual to the restricted environment.
-
-
48. A system for regulating initial access to a restricted environment, comprising:
-
means for storing a plurality of facial representations of individuals authorized to have access to the restricted environment; means for associating one or more words with each authorized individual; means for acquiring a representation of the face of an individual who approaches the restricted envioronment during a period when access to the restricted environment is impeded; means for recognizing the linguistic content of the one or more words when spoken by an individual seeking access to the restricted environment; means for comparing the acquired representation only against the facial representations of individuals with whom the one or more words are associated; and means for denying intial access to the restricted environment if the comparsion indicates that the individual seeking initial access is not an authorized individual.
-
Specification