Methods and apparatus for establishing exit/entry criteria for a secure location
First Claim
1. A method of monitoring a secure location comprising:
- providing one or more sensors that monitor the secure location, each sensor generating sensor data;
establishing a plurality of policy regions for the secure location employing world coordinates, wherein at least two of the policy regions overlap and form an overlapping policy region, wherein each of the policy regions including the overlapping policy region respectively establishing one or more alarm criterion for at least one of objects entering the respective policy region and/or objects exiting the respective policy region;
tracking an object within the secure location using the sensor data from the one or more sensors; and
determining if the sensor data indicates that the object has violated one or more alarm criterion of the policy regions,wherein an alarm criterion of at least one of the policy regions causes;
an alarm to be triggered if the object enters the a least one policy region but not if the object exits the at least one policy region;
an alarm to be triggered if the object exits the policy region but not if the object enters the policy region;
oran alarm to be triggered if the object enters the at least one policy region from a first side of the policy region and exits the policy region from a second side of the at least one policy region.
7 Assignments
0 Petitions
Accused Products
Abstract
In some embodiments, a method of monitoring a secure location is provided that includes (1) providing one or more sensors that monitor the secure location, each sensor generating sensor data; (2) establishing a policy region for the secure location employing world coordinates, the policy region establishing one or more alarm criterion for at least one of objects entering the policy region and objects exiting the policy region; (3) tracking an object within the secure location using the sensor data from the one or more sensors; and (4) determining if the sensor data indicates that the object has violated one or more alarm criterion of the policy region. Numerous other embodiments are provided.
-
Citations
21 Claims
-
1. A method of monitoring a secure location comprising:
-
providing one or more sensors that monitor the secure location, each sensor generating sensor data; establishing a plurality of policy regions for the secure location employing world coordinates, wherein at least two of the policy regions overlap and form an overlapping policy region, wherein each of the policy regions including the overlapping policy region respectively establishing one or more alarm criterion for at least one of objects entering the respective policy region and/or objects exiting the respective policy region; tracking an object within the secure location using the sensor data from the one or more sensors; and determining if the sensor data indicates that the object has violated one or more alarm criterion of the policy regions, wherein an alarm criterion of at least one of the policy regions causes; an alarm to be triggered if the object enters the a least one policy region but not if the object exits the at least one policy region; an alarm to be triggered if the object exits the policy region but not if the object enters the policy region;
oran alarm to be triggered if the object enters the at least one policy region from a first side of the policy region and exits the policy region from a second side of the at least one policy region. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of monitoring a secure location comprising:
-
providing one or more sensors that monitor the secure location, each sensor generating sensor data; establishing a plurality of policy regions for the secure location employing world coordinates, which policy regions respectively establish alarm criterion for objects entering and/or exiting the policy region, wherein at least two of the policy regions overlap and form an overlapping policy region, wherein the overlapping policy region creates a safe entry for one of the policy regions that establishes an alarm criterion for objects entering and/or exiting the policy region; tracking an object within the secure location using the sensor data from the one or more sensors; and determining if the sensor data indicates that the object has violated one or more alarm criterion of the policy regions.
-
-
12. A system for monitoring a secure location comprising:
-
one or more sensors that monitor the secure location, each sensor generating sensor data; and a controller coupled to the one or more sensors, which controller includes a processor configured to; receive sensor data from the one or more sensors; allow a user to establish a plurality of policy regions for the secure location employing world coordinates, wherein at least two of the policy regions overlap and form an overlapping policy regions, wherein each of the policy regions including the overlapping policy regions respectively establishing one or more alarm criterion for at least one of objects entering the respective policy region and/or objects exiting the respective policy region; track an object within the secure location using the received sensor data; and determining if the received sensor data indicates that the object has violated one or more alarm criterion of the policy regions, wherein an alarm criterion of at least one of the policy regions causes; an alarm to be triggered if the object enters the at least one policy region but not if the object exits the at least one policy region; an alarm to be triggered if the object exits the at least one policy region but not if the object enters the at least one policy region;
oran alarm to be triggered if the object enters the at least one policy region from a first side of the at least one policy region and exits the at least one policy region from a second side of the at least one policy region. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method of monitoring a secure location comprising:
-
providing one or more sensors that monitor the secure location, each sensor generating pixel data; establishing a plurality of polygon-shaped policy regions for the secure location employing world coordinates, wherein at least two of the policy regions overlap and form an overlapping policy regions, wherein each of the policy regions including the overlapping policy regions respectively establishing one or more alarm criterion for at least one of objects entering the policy region and/or at least one of objects exiting the policy region; converting pixel data from the one or more sensors to world coordinate sensor data;
tracking a position of an object within the secure location using the world coordinate sensor data;determining if the world coordinate sensor data indicates that the object has violated one or more alarm criterion of the policy regions; and triggering an alarm if the world coordinate sensor data indicates that the object has violated the one or more alarm criterion of the policy regions.
-
-
21. A system for monitoring a secure location comprising:
-
one or more sensors that monitor the secure location, each sensor generating world coordinate sensor data; and a controller coupled to the one or more sensors, which controller includes a processor configured to; allow a user to establish a plurality of polygon-shaped policy regions for the secure location employing world coordinates, which policy regions respectively establish alarm criterion for objects entering and/or exiting the policy region, wherein at least two of the policy regions overlap and form an overlapping policy region, wherein the overlapping policy region creates a safe entry for one of the policy regions that establishes an alarm criterion for objects entering and/or exiting the policy region; track a position of an object within the secure location using the world coordinate sensor data; determine if the world coordinate sensor data indicates that the object has violated one or more alarm criterion of the policy regions; and trigger an alarm if the world coordinate sensor data indicates that the object has violated the one or more alarm criterion of the policy regions.
-
Specification