Polarized images for security
First Claim
1. A method for providing security for access to a goal comprising:
- receiving a first image;
receiving a second image comprising polarized data;
comparing the first image to the second image to determine if the first image and the second image are substantially the same;
in the event the first and second images are not substantially the same, denying access to the goal;
in the event the first and second images are substantially the same, determining, utilizing the polarized information, if the second image is of a three-dimensional object,in the event the second image is not of a three-dimensional object, denying access to the goal;
in the event the second image is of a three-dimensional object, determining if a micro-movement indicative of a human occurred between the first and second images;
in the event a micro-movement indicative of a human occurred between the first and second images, permitting access to the goal; and
otherwise, denying access to the goal.
1 Assignment
0 Petitions
Accused Products
Abstract
One embodiment may take the form of a method for providing security for access to a goal including storing a first image and receiving a second image comprising polarized data. The method also includes comparing the first image with the second image to determine if the first image and the second image are substantially the same. In the event the first and second images are not substantially the same, the method includes denying access to the goal. In the event the first and second images are substantially the same, the method includes determining, utilizing the polarized information, if the second image is of a three-dimensional object. Further, in the event the second image is not of a three-dimensional object, the method includes denying access to the goal and, in the event the second image is of a three-dimensional object, permitting access to the goal.
82 Citations
21 Claims
-
1. A method for providing security for access to a goal comprising:
-
receiving a first image; receiving a second image comprising polarized data; comparing the first image to the second image to determine if the first image and the second image are substantially the same; in the event the first and second images are not substantially the same, denying access to the goal; in the event the first and second images are substantially the same, determining, utilizing the polarized information, if the second image is of a three-dimensional object, in the event the second image is not of a three-dimensional object, denying access to the goal; in the event the second image is of a three-dimensional object, determining if a micro-movement indicative of a human occurred between the first and second images; in the event a micro-movement indicative of a human occurred between the first and second images, permitting access to the goal; and otherwise, denying access to the goal. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A security system comprising:
-
a polarizing image capture device; a processor coupled to the polarizing image capture device; and a storage device coupled to the processor and operative to store a group of stored images, wherein the processor is configured to compare images captured by the image capture device with at least one of the group of stored images;
wherein the processor is configured to determine if an image captured by the polarizing image capture device is of a three-dimensional object,determining if a micro-movement indicative of a human occurred between the images; in the event a micro-movement indicative of a human occurred between the images, permitting access to the goal; and otherwise, denying access to the goal. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A security system comprising:
-
a processor; and a camera coupled to the processor, the camera comprising; a photosensor; a Bayer layer; and a polarizing filter; wherein the processor is configured to analyze images captured by the camera and determine if an object in the image is a three-dimensional object based at least in part upon variance in one of a degree of polarization, angle of polarization, and surface normal of the captured image, determining if a micro-movement indicative of a human occurred between the images; in the event a micro-movement indicative of a human occurred between the images, permitting access to the goal; and otherwise, denying access to the goal. - View Dependent Claims (20)
-
-
21. A method for providing security for access to a goal comprising:
-
receiving a first image; receiving a second image comprising polarized data; comparing the first image to the second image to determine if the first image and the second image are substantially the same; in the event the first and second images are not substantially the same, denying access to the goal; in the event the first and second images are substantially the same, determining, utilizing the polarized information, if the second image is of a three-dimensional object; in the event the second image is not of a three-dimensional object, denying access to the goal; and in the event the second image is of a three-dimensional object, determining if a micro-motion occurs between the first and second images; in the event a micro-movement occurs, permitting access to the goal; and in the event a micro-movement does not occur, denying access to the goal.
-
Specification