Intrusion Detection
First Claim
1. An intrusion detector comprising:
- an interface to receive video stream data from a camera and token data; and
a processor to execute operations including;
receiving the video stream data and the token data; and
determining whether a person in the video stream data is carrying a token based upon whether the token data is associated with the person;
wherein, if the person is determined to not be carrying a token, identifying the person as unauthorized.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed is an intrusion detector that may be used to determine if a person is authorized or unauthorized based upon the person carrying a token in an area being monitored for security. The intrusion detector may include: an interface and processor. The interface may receive video stream data from a camera and token data. The processor may execute operations including: receiving the video stream data and the token data and determining whether a person in the video stream data is carrying a token based upon whether the token data is associated with the person. If the person is determined to not be carrying a token, the person may be displayed as unauthorized.
23 Citations
56 Claims
-
1. An intrusion detector comprising:
-
an interface to receive video stream data from a camera and token data; and a processor to execute operations including; receiving the video stream data and the token data; and determining whether a person in the video stream data is carrying a token based upon whether the token data is associated with the person; wherein, if the person is determined to not be carrying a token, identifying the person as unauthorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method comprising:
-
receiving video stream data from a camera and token data; and determining whether a person in the video stream data is carrying a token based upon whether the token data is associated with the person; wherein, if the person is determined to not be carrying a token, identifying the person as unauthorized. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer program product executed at an intrusion detector comprising:
-
a computer-readable medium comprising code for; receiving video stream data from a camera and token data; and determining whether a person in the video stream data is carrying a token based upon whether the token data is associated with the person; wherein, if the person is determined to not be carrying a token, identifying the person as unauthorized. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. An intrusion detector comprising:
-
means for receiving video stream data from a camera and token data; and means for determining whether a person in the video stream data is carrying a token based upon whether the token data is associated with the person; wherein, if the person is determined to not be carrying a token, means for identifying the person as unauthorized. - View Dependent Claims (34, 35, 36, 37, 38, 39, 40, 41)
-
-
42. A token to be carried by a person, the token comprising:
-
an interface; a processor to execute operations including commanding the interface to periodically transmit an identification signal to a node, wherein an intrusion detector receives video stream data from a camera and token data from the node which is based upon the identification signal from the token, the intrusion detector to determine whether the person in the video stream data is carrying the token based upon whether the token data is associated with the person, and if so, displays the person as authorized; and a power supply to power the interface and the processor. - View Dependent Claims (43, 44, 45, 46)
-
-
47. A computer program product executed at a token carried by a person comprising:
-
a computer-readable medium comprising code for; commanding an interface to periodically transmit an identification signal to a node, wherein an intrusion detector receives video stream data from a camera and token data from the node which is based upon the identification signal from the token, the intrusion detector to determine whether the person in the video stream data is carrying the token based upon whether the token data is associated with the person, and if so, determines the person is authorized and displays the person as authorized. - View Dependent Claims (48, 49, 50, 51)
-
-
52. A token to be carried by a person, the token comprising:
means for commanding an interface to periodically transmit an identification signal to a node, wherein an intrusion detector receives video stream data from a camera and token data from the node which is based upon the identification signal from the token, the intrusion detector to determine whether the person in the video stream data is carrying the token based upon whether the token data is associated with the person, and if so, determines the person is authorized and displays the person as authorized. - View Dependent Claims (53, 54, 55, 56)
Specification