Method and apparatus for processing sensor data of detected objects
First Claim
1. A method, comprising:
- detecting, by a system including a processor, a presence of an object from sensor data;
retrieving, by the system from a memory device, a plurality of biometric profiles;
classifying, by the system, the object as an authorized object responsive to determining from the sensor data that the object is correlated to a biometric profile of the plurality of biometric profiles;
responsive to determining that the object is an authorized person;
identifying, by the system and from the profile, a service associated with the person and a command for controlling the service,enabling, by the system, the service for use by equipment of the person, andmonitoring, by the system, the command invoked by the equipment of the person;
responsive to determining that the object is an unauthorized person;
enabling, by the system, communication with the unauthorized person, anddisengaging, by the system, an alarm responsive to an input indicating recognition of the unauthorized person.
1 Assignment
0 Petitions
Accused Products
Abstract
A system that incorporates teachings of the subject disclosure may include, for example, a method for detecting, by a system including at least one processor, a presence of an object from sensor data generated by a sensor device, retrieving, by the system, from a memory device a plurality of profiles biometrically descriptive of approved objects, asserting, by the system, an alarm responsive to determining from the sensor data that the detected object is not biometrically correlated to any of the plurality of profiles, classifying, by the system, the detected object as an authorized object responsive to determining from the sensor data that the detected object is biometrically correlated to at least one of the plurality of profiles, and notifying, by the system, at least one neighboring device responsive to asserting the alarm or responsive to classifying the detected object as the authorized object. Other embodiments are disclosed.
-
Citations
20 Claims
-
1. A method, comprising:
-
detecting, by a system including a processor, a presence of an object from sensor data; retrieving, by the system from a memory device, a plurality of biometric profiles; classifying, by the system, the object as an authorized object responsive to determining from the sensor data that the object is correlated to a biometric profile of the plurality of biometric profiles; responsive to determining that the object is an authorized person; identifying, by the system and from the profile, a service associated with the person and a command for controlling the service, enabling, by the system, the service for use by equipment of the person, and monitoring, by the system, the command invoked by the equipment of the person; responsive to determining that the object is an unauthorized person; enabling, by the system, communication with the unauthorized person, and disengaging, by the system, an alarm responsive to an input indicating recognition of the unauthorized person. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A device, comprising:
-
a processor; and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations comprising; detecting a presence of an object from sensor data, wherein the sensor data is from; retrieving from a memory device a plurality of biometric profiles, wherein the plurality of biometric profiles comprises a biometric signature of a person; classifying the object as an authorized object responsive to determining from the sensor data that the object is correlated to a biometric profile of the plurality of biometric profiles; responsive to determining that the object is an authorized person; identifying, from the profile, a service associated with the person and a command for controlling the service, enabling the service for use by equipment of the person, and monitoring the command invoked by the equipment of the person; responsive to determining that the object is an unauthorized person; enabling communication with the unauthorized person, and disengaging an alarm responsive to an input indicating recognition of the unauthorized person. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A non-transitory machine-readable storage medium, comprising executable instructions that, when executed by a processor, facilitate performance of operations comprising:
-
detecting a presence of an object from sensor data, wherein the sensor data is from an imaging sensor, a depth sensor, or both; retrieving from a memory device a plurality of biometric profiles, wherein the plurality of biometric profiles comprises a biometric signature of a person; classifying the object as an authorized object responsive to determining from the sensor data that the object is correlated to a biometric profile of the plurality of biometric profiles; responsive to determining that the object is an authorized person; identifying, from the profile, a service associated with the person and a command for controlling the service, enabling the service for use by equipment of the person, and monitoring the command invoked by the equipment of the person; responsive to determining that the object is an unauthorized person;
enabling communication with the unauthorized person, anddisengaging an alarm responsive to an input indicating recognition of the unauthorized person. - View Dependent Claims (17, 18, 19, 20)
-
Specification