The present invention relates generally to security access systems and methods.
More specifically, the present invention relates a system and method for a mobile application that allows the user to record a trespass incident and recognize past violators.
Trespassing is when a trespasser intentionally enters, without authorization, a predefined boundary of property legally occupied by a user or owner after the trespasser has been told not to enter. Often, the trespasser refuses to leave after being told to leave, and/or disturbs domestic animals and residents on the property, e.g., a farm, a house, a gated community, etc. Normally, a trespass notice can serve as a warning telling the trespasser to stay off the property. Additionally, the trespass notice can be given verbally and/or by giving or sending the trespasser a written trespass notice or report. In many states of the United States, if the trespasser served with a trespass notice comes back onto the property within the two years, the trespasser would be breaking the law and may be reported to the law enforcement.
In many states, laws require that there be a no-trespass warning and evidence of such a warning be giving to the trespasser before the trespass can be convicted for trespassing on the property. The user or owner of the property may bring a civil lawsuit against or even criminal charges to the trespasser in order to recover actual damages or receive compensatory relief for injury suffered as a direct result of the trespass. However, in many cases, a trespasser is verbally trespassed, but there is no written notice or record in detail for the trespass incident. Most existing security officers and/or guards may document trespass incidents in a daily log, which may lack of details, recording of no-trespass warning being given to the trespasser, intention of entry, authorization information, first-time trespasser, return trespasser, etc.
Thus, it is the objective of the present invention to provide a unique and innovative solution to the aforementioned problems, issues, and disadvantages associated with trespass incident reporting. The system and method of the present invention facilitates the trespass incident reporting through an online platform and an advanced artificial intelligence (AI) technology to execute and record every detail of the efficient and effective process.
The present invention, named “FaceScope”, comprises a system and method for facilitating effective and efficient trespass incident reporting. The system includes a camera, a processor, a communication device, a remote server, a storage device, and corresponding personal computing (PC) devices of user accounts. Each user account is associated with a property having a predefined boundary. The processor is configured to determine if a trespasser is identified using the facial images acquired by the camera and an artificial intelligence (AI) algorithm. The AI algorithm compares the acquired facial images with available facial images of user allowed persons that are authorized for the property. Once no match is found, the processor sends the property information, user information, and the acquired facial images to the remote server through the communication device, wherein the acquired facial images are matched with all facial images of trespassers in a trespasser database stored in the storage device. When there is no match found, the remote server prompts the PC device of the user to enter information for the new or first-time trespasser. Once the trespasser information is received, the remote server prompts the user's PC device to present an audio no-trespass warning message to the trespasser and at the same time record the presentation using an audio/video recorder. The user's PC device is allowed to enter additional information including, but not limited to, notes, comments, audio/video recordings, etc., and send the additional information together with the audio/video record of the no-trespass recording to the remote server. Consequently, the remote server creates a trespasser incident report that includes the property information, user information, trespasser information, acquire facial images of the trespasser, no-trespass warning audio/video recording and any additional information. Further, the remote server saves the trespasser incident report database and distributes the trespasser incident report to the corresponding PC devices of all user accounts that the remote server provides and manages.
When a match of the trespasser's acquire images is found in the trespasser database, the remote server displays on the user's PC device the information and all available trespass incident reports of the trespasser. Subsequently, the remote server prompts the user's PC device to present the no-trespass warning message to the trespasser and record the presentation at the same time. Additionally, the remote server adds the trespasser to a be-on-the-look-out (BOLO) list and distributes the BOLO list to the corresponding PC devices of all user accounts of the system. Further, the remote server allows the user's PC device to update the user allowed person saved in a user allowed person database that is stored on the storage device. The remote server also updates the trespasser database in a predefined frequency using internal and/or external databases/data sources. Thus, the system and method of the present invention offers the user an efficient and effective solution to reporting trespass incident and recognizing past violators of the user's property.
All illustrations of the drawings are for the purpose of describing selected versions of the present invention and are not intended to limit the scope of the present invention.
As can be seen in
As can be seen in
The communication device 202 may be communicatively coupled with the processor 201 and may be configured for transmitting at least one image of the trespasser between the processer 201 and the user device 231. The at least one user device 231 may be associated with at least one user account managed by the remote server 102. The remote server 102 may send prompts to and receive user entered information from the user device 231. The user entered information may include, but is not limited to, a full name, a date of birth, a driver's license number, images, video, and/or any other relevant information of the trespasser, address of the user's property, GPS (global positioning system) coordinates of the property, property description, trespass incident description, notes, date, time, etc. The at least one user device 231 may include devices such as, but is not limited to, smartphones, laptops, PCs, etc. The communication device 202 may be configured for transmitting the images of the trespasser to the remote server 102 and transmitting the trespass incident report generated by the remote server 102 to the corresponding user device 231, and/or any other PC (personal computing) device of the plurality of user accounts.
As can be seen in
As can be seen in
As can be seen in
The API 206 may comprise software instructions, when actuated, causing the processor 201 to perform operations of the method, including, but not limited to, the communication with at least one camera 204, the at least one user device 231 and the remote server 102 through the communication device 202, determining a trespasser using the AI algorithm 205, etc. Specifically, the processor 201 may be configured for determining if a trespasser on a user's property with a predefined boundary is identified using the AI algorithm 205 when the at least one facial image acquired by the at least one camera 204 is compared with the at least one facial image of the at least one user allowed person for the property and a match is found. The AI algorithm may be configured to create biometrics map data for facial features, structure, contour profile, etc., of images and the resulting data are used for matching with the map data of the at least one facial image of the at least one user allowed person. Once comparison of the at least one image of the trespasser with all available data for user allowed persons is completed and no match is found, the processor 201 sends the at least one facial image acquired by the at least one camera 204 to the remote server 102 through the communication device 202. The remote server 102 then compares the facial image of the trespasser with all available facial images of trespassers in the trespasser database 207 using the AI algorithm 205. When no match is found, the remote server 102 prompts the PC device 231 of the user through the communication device 202 to enter specific information for this new or first-time trespasser. Once the trespasser information is received through the communication device 202, the remote server 102 saves the trespasser information and the at least one facial image to the trespasser database 207. Consequently, the remote server 102 prompts the PC device 231 of the user to record, using an audio player to present an audio no-trespass warning message to the trespasser and at the same time record the presentation, using an audio/video recorder. After presentation, the recording is transmitted through the communication device 202 to the remote server 102 from the PC device 231 of the user Additionally, the processor 201 may be configured for generating at least one smart. The user's PC device is allowed to transmit any relevant information and/or recordings to the remote server 102. The remote server 102 then uses the recording, trespasser information, trespasser's image, property information, etc., and creates a trespass incident report. The trespass incident report is saved to the trespasser database 207 and distributed to the PC device 231 of the plurality of user accounts managed by the remote server 102, through the communication device 202.
As can be seen in
Subsequently, the method prompts, using the communication device 202, a personal computing (PC) device 231 of the user to enter personal information of the trespasser, wherein the trespasser is determined to be a new trespasser with no matching image using the facial recognition AI algorithm 205 through the remote server 102 (Step C). Additionally, the method receives, using the communication device 202, the personal information of the trespasser from the user's PC device 231 through the remote server 102, wherein the personal information of the trespasser is saved to the trespasser database 207 (Step D). In response to a new trespasser to the user's property, the method interacts with the corresponding PC device 231 of the user to add any relevant information of the trespasser and the at least one facial image of the trespasser to the trespasser database 207. The relevant personal information of the trespasser includes, but is not limited to, first name, last name, gender, date of birth, home address, profession, driver's license number, sate issuing the driver's license, etc.
Upon the identification of the trespasser, the method prompts, using the communication device 202, the user's PC device 231 to record, using an audio/video recorder 242, an audio no-trespass warning message presented to the trespasser using an audio player 241 (Step E). Additionally, the method presents, at the audio player 241, the entire no-trespass warning message to the trespasser, wherein the no-trespass warning message is recorded using the audio/video recorder 242 (Step F). Further, the method receives, using the communication device 202, the recording of the no-trespass warning message presented to the trespasser from the user's PC device 231 through the remote server 102 (Step G). The recoding may include other audio and/or video recording of the presentation of the no-trespass warning message, any other relevant recording, etc. Both the audio player 241 and the audio/video recorder 242 are connected to the corresponding PC device 231 of the user. Subsequently, the method generates, at the remote server 102, a trespass incident report, wherein the trespass incident report includes the user's property, the personal information of the trespasser and the recording of the no-trespass warning message, and wherein the trespass incident report is saved to the trespasser database 207 (Step H). Additionally, the trespass incident report is distributed to the PC devices of the plurality of user accounts managed by the remote server 102, using the communication device 202. Further, the at least one image of the trespasser comprises a video recording. As can be seen in
As can be seen in
As can be seen in
As can be seen in
As can be seen in
As can be seen in
As can be seen in
As can be seen in
As can be seen in
The computing device 1300 may have additional features or functionality. For example, the computing device 1300 may include additional data storage devices 203 (removable and/or non-removable) such as, for example, magnetic disks, optical disks, or tape. Such additional storage is illustrated in
The computing device 1300 may also contain a communication connection 1316 that may allow device 1300 to communicate with other computing devices 1318, such as over a network in a distributed computing environment, for example, an intranet or the Internet. Communication connection 1316 is one example of communication media. Communication media may typically be embodied by computer-readable instructions, data structures, program modules, or other data in a modulated data signal, such as a carrier wave or other transport mechanism, and includes any information delivery media. The term “modulated data signal” may describe a signal that has one or more characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media may include wired media such as a wired network or direct-wired connection, and wireless media such as acoustic, radio frequency (RF), infrared, and other wireless media. The term computer-readable media as used herein may include both storage media and communication media.
As stated above, a number of program modules and data files may be stored in system memory 1304, including operating system 1305. While executing on processing unit 1302, programming modules 1306 (e.g., application 1320 such as a media player) may perform processes including, for example, one or more stages of methods, algorithms, systems, applications, servers, databases as described above. The aforementioned process is an example, and processing unit 1302 may perform other processes. Other programming modules that may be used in accordance with embodiments of the present disclosure may include sound encoding/decoding applications, machine learning application, acoustic classifiers, etc.
Generally, consistent with embodiments of the present invention, program modules may include routines, programs, components, data structures, and other types of structures that may perform particular tasks or that may implement particular abstract data types. Moreover, embodiments of the disclosure may be practiced with other computer system configurations, including hand-held devices, general-purpose graphics processor-based systems, multiprocessor systems, microprocessor-based or programmable consumer electronics, application-specific integrated circuit-based electronics, minicomputers, mainframe computers, and the like. Embodiments of the disclosure may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
Furthermore, embodiments of the present invention may be practiced in an electrical circuit comprising discrete electronic elements, packaged or integrated electronic chips containing logic gates, a circuit utilizing a microprocessor, or on a single chip containing electronic elements or microprocessors. Embodiments of the disclosure may also be practiced using other technologies capable of performing logical operations such as, for example, AND, OR, and NOT, including but not limited to mechanical, optical, fluidic, and quantum technologies. In addition, embodiments of the disclosure may be practiced within a general-purpose computer or in any other circuits or systems.
Embodiments of the present invention, for example, may be implemented as a computer process (method), a computing system, or as an article of manufacture, such as a computer program product or computer-readable media. The computer program product may be a computer storage media readable by a computer system and encoding a computer program of instructions for executing a computer process. The computer program product may also be a propagated signal on a carrier readable by a computing system and encoding a computer program of instructions for executing a computer process. Accordingly, the present disclosure may be embodied in hardware and/or in software (including firmware, resident software, micro-code, etc.). In other words, embodiments of the present disclosure may take the form of a computer program product on a computer-usable or computer-readable storage medium having computer-usable or computer-readable program code embodied in the medium for use by or in connection with an instruction execution system. A computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
The computer-usable or computer-readable medium may be, for example but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific computer-readable medium examples (a non-exhaustive list), the computer-readable medium may include the following: an electrical connection having one or more wires, a portable computer diskette, a random-access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, and a portable compact disc read-only memory (CD-ROM). Note that the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
Embodiments of the present invention, for example, are described above with reference to block diagrams and/or operational illustrations of methods, systems, and computer program products according to embodiments of the disclosure. The functions/acts noted in the blocks may occur out of the order as shown in any flowchart. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved.
While certain embodiments of the present invention have been described, other embodiments may exist. Furthermore, although embodiments of the present disclosure have been described as being associated with data stored in memory and other storage mediums, data can also be stored on or read from other types of computer-readable media, such as secondary storage devices, like hard disks, solid-state storage (e.g., USB drive), or a CD-ROM, a carrier wave from the Internet, or other forms of RAM or ROM. Further, the disclosed methods' stages may be modified in any manner, including by reordering stages and/or inserting or deleting stages, without departing from the disclosure.
As can be seen in
The facial recognition AI technology of the present invention is:
1. Mobile—real time alerting and intelligence on demand.
2. Scalable—enterprise capability across unlimited locations
3. Accurate—the industry's most accurate face detection.
4. Private—design to protect personal privacy.
Key features of the present invention:
1. Launch app, press button to scan face of suspicious actor.
2. Take a picture of the subject.
3. Ask subject and record first and last name, date of birth, and incident site.
4. Generating a trespass statement on the screen.
5. Read the trespass statement that populates in app to violator.
6. Record the reading of the statement to the subject.
7. Embed statement along with the image of the face.
8. If suspect ever scanned again, FaceScope will display a match found.
9. Will display side by side comparison and incident log.
The present invention provides more results and better outcomes:
1. Capture the face of trespassers and violators on the properties of your clients.
2. Real-time analytics and matching at the rate of 1.1 M images per second.
3. Built with AI and deep learning technology.
4. Fully—integrated ‘No-trespass’ script and audio recording feature.
5. Automatically embed recordings into mugshots, making proof-of-action and future access a snap.
6. Built-in search feature.
7. Integrate with compatible existing eye-in-the-sky camera systems.
8. Integrate any third party or existing database of mugshots.
9. Complete incident log of every subject's history, making escalated legal actions much easier.
10. Data is stored on enterprise database servers with military-level encryption.
11. Get fast and accurate results from your boots on the ground and for your clients.
12. Fuel your sales and revenue by providing next generation security services.
Although the invention has been explained in relation to its preferred embodiment, it is to be understood that many other possible modifications and variations can be made without departing from the spirit and scope of the invention as hereinafter claimed.
The current application claims a priority to the U.S. Provisional Patent application Ser. No. 63/178,435 filed on Apr. 22, 2021.
Number | Date | Country | |
---|---|---|---|
63178435 | Apr 2021 | US |