Intelligent observation and identification database system
First Claim
1. A method for identifying security investigations comprising:
- a) establishing at least one security zone;
b) positioning at least one optical input device to observe said at least one security zone;
c) connecting said at least one optical input device to a computer, said computer comprising at least one evolving database;
d) observing occurrences within said at least one security zone and communicating the observed occurrences to the at least one evolving database;
e) storing the observed occurrences within the at least one evolving database;
f) defining patterns of data from said at least one evolving database for the at least one security zone;
g) observing additional occurrences within said at least one security zone and communicating the observed additional occurrences to the at least one evolving database;
h) processing the observed additional occurrences within the computer as compared to the patterns of data from the at least one evolving database; and
i) issuing a signal to a security officer to investigate an occurrence.
2 Assignments
0 Petitions
Accused Products
Abstract
An intelligent video/audio observation and identification database system may define a security zone or group of zones. The system may identify vehicles and individuals entering or exiting the zone through image recognition of the vehicle or individual as compared to prerecorded information stored in a database. The system may alert security personnel as to warrants or other information discovered pertaining to the recognized vehicle or individual resulting from a database search. The system may compare images of a suspect vehicle, such as an undercarriage image, to standard vehicle images stored in the database and alert security personnel as to potential vehicle overloading or foreign objects detected, such as potential bombs. The system may track individuals or vehicles within a zone or between zones. The system may further learn the standard times and locations of vehicles or individuals tracked by the system and alert security personnel upon deviation from standard activity.
332 Citations
16 Claims
-
1. A method for identifying security investigations comprising:
-
a) establishing at least one security zone; b) positioning at least one optical input device to observe said at least one security zone; c) connecting said at least one optical input device to a computer, said computer comprising at least one evolving database; d) observing occurrences within said at least one security zone and communicating the observed occurrences to the at least one evolving database; e) storing the observed occurrences within the at least one evolving database; f) defining patterns of data from said at least one evolving database for the at least one security zone; g) observing additional occurrences within said at least one security zone and communicating the observed additional occurrences to the at least one evolving database; h) processing the observed additional occurrences within the computer as compared to the patterns of data from the at least one evolving database; and i) issuing a signal to a security officer to investigate an occurrence. - View Dependent Claims (2, 3, 4)
-
-
5. A method for identifying security investigations comprising:
-
a) establishing at least one security zone; b) positioning a plurality of optical input devices into each of said at least one security zones to observe each of said at least one security zones; c) connecting at least one of said plurality of optical input devices to at least one of a plurality of computers, said plurality of computers being in communication with a mainframe computer, said mainframe computer having a mainframe database, at least one of said plurality of computers comprising at least one evolving database, wherein said at least one computer receives data from at least one of said plurality of optical input devices for tracking at least one vehicle through said at least one security zone, at least one of said plurality of computers being located within each of said at least one security zones, wherein said plurality of computers are in communication with each other to compile said at least one evolving database; d) observing occurrences within said at least one security zone and communicating the observed occurrences to at least one of said plurality of computers; e) storing the observed occurrences within at least one of said plurality of computers to create at least one database for the security zone; f) processing the observed occurrences within the computer as compared to stored or retrieved data available to the computer; and g) issuing a signal to a security officer to investigate an occurrence. - View Dependent Claims (6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification