Intrusion detection
First Claim
Patent Images
1. An intrusion detector comprising:
- an interface to receive video stream data from a camera and token data; and
a processor to execute operations including;
receiving the video stream data and the token data, the token data comprising position data associated with a token, the position data being calculated using triangulation based on a plurality of nodes with known locations; and
determining whether a person in the video stream data is carrying the token based upon the position data being associated with the token and with the person;
wherein, when the person in the video stream data is determined to not be carrying the token associated with the calculated position data, identifying the person in the video stream data as unauthorized.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is an intrusion detector that may be used to determine if a person is authorized or unauthorized based upon the person carrying a token in an area being monitored for security. The intrusion detector may include: an interface and processor. The interface may receive video stream data from a camera and token data. The processor may execute operations including: receiving the video stream data and the token data and determining whether a person in the video stream data is carrying a token based upon whether the token data is associated with the person. If the person is determined to not be carrying a token, the person may be displayed as unauthorized.
14 Citations
37 Claims
-
1. An intrusion detector comprising:
-
an interface to receive video stream data from a camera and token data; and a processor to execute operations including; receiving the video stream data and the token data, the token data comprising position data associated with a token, the position data being calculated using triangulation based on a plurality of nodes with known locations; and determining whether a person in the video stream data is carrying the token based upon the position data being associated with the token and with the person; wherein, when the person in the video stream data is determined to not be carrying the token associated with the calculated position data, identifying the person in the video stream data as unauthorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method comprising:
-
receiving video stream data from a camera and token data, the token data comprising position data associated with a token, the position data being calculated using triangulation based on a plurality of nodes with known locations; and determining whether a person in the video stream data is carrying the token based upon the position data being associated with the token and with the person; wherein, when the person in the video stream data is determined to not be carrying the token associated with the calculated position data, identifying the person in the video stream data as unauthorized. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
-
21. A non-transitory computer-readable medium comprising code which, when executed by a processor of an intrusion detector, causes the processor to perform a method comprising:
-
receiving video stream data from a camera and token data, the token data comprising position data associated with a token, the position data being calculated using triangulation based on a plurality of nodes with known locations; and determining whether a person in the video stream data is carrying the token based upon the position data being associated with the token and with the person; wherein, when the person in the video stream data is determined to not be carrying the token associated with the calculated position data, identifying the person in the video stream data as unauthorized. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. An intrusion detector comprising:
-
means for receiving video stream data from a camera and token data, the token data comprising position data associated with a token, the position data being calculated using triangulation based on a plurality of nodes with known locations; and means for determining whether a person in the video stream data is carrying the token based upon the position data being associated with the token and with the person; wherein, when the person in the video stream data is determined to not be carrying the token associated with the calculated position data, identifying the person in the video stream data as unauthorized. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37)
-
Specification