The present invention relates to the field of image recognition systems, and more particularly to a protective covering/gear/device detection system and method for determining whether a user is wearing a protective covering as part of safety and access-control measures taken by various facilities and organizations.
Background description includes information that may be useful in understanding the present invention. It is not an admission that any of the information provided herein is prior art or relevant to the presently claimed invention, or that any publication specifically or implicitly referenced is prior art.
The COVID-19 and other infectious diseases have changed the way people and businesses operate. Social distancing is nowadays a must in order to prevent the spread of such infectious diseases. Unfortunately, with the ease of lockdowns, businesses and governments are still struggling to find solutions for securing the health and safety of their people. People need to wear face masks/face coverings as a remedy to businesses, governments and facility managers for controlling or reducing infections in business and public places such as business offices, shopping malls, hospitals, schools, and so on. People are failing to appropriately apply the face masks or face shields on a voluntary basis or apply social distancing rules which is resulting on an increasing number of infections every day. The economic situation is impacted in consequence, and the private and public sector has been desperately trying to find solutions for monitoring the appropriate use of face masks and the like by people in various places, such as indoor facilities such as malls, hospitals, company premises etc.
In many sectors, including industry and business, controlled access to specific locations, machinery, and equipment in various industries is essential for ensuring safety and security. This necessity arises because personnel can only safely and securely access these areas when equipped with the appropriate protective gear, such as hard hats, reinforced footwear, breathing apparatus, safety harnesses, protective clothing, and specialized rescue equipment. Effective management of such controlled access typically involves establishing comprehensive regulatory policies and procedures. These policies specify the necessary requirements and protocols for individuals to gain entry to restricted areas or operate specific equipment. These measures contribute to regulatory compliance, ensuring that the organization adheres to industry standards and legal requirements, prevent unauthorized entry, reduce theft, and minimize accidents or injuries. Controlled access systems can also improve operational efficiency with reduced downtime.
Traditional imaging systems, and face recognition systems fail to provide reliability in determining whether users are wearing protective face coverings such as masks/shields in controlled areas which requires complex data processing techniques which remain ineffective and overly complex, time consuming and unreliable. This is as the shapes of face coverings are indefinite and the progress of sciences in the field of artificial intelligence is still not at a level which can be relied upon for effective and accurate determination.
Traditional systems (including access controls systems) fail to provide such a control and fail to differentiate between persons using personal protective equipment such as masks/shields and people not complying with these requirements. The traditional way of controlling the use of masks/shields in controlled areas (such as malls, restaurants, etc) is to rely on human security guards at the gate entries which is ineffective in many cases, due to gaps in coverage and observational errors, leading to policy violations. This can also create conflicts among employees, causing additional risks and straining organizational relationships.
Therefore it is an object of the present invention to provide digital detection systems for wearable safety or protective coverings, methods and units which overcome the above mentioned drawbacks.
As a first aspect of the invention, there is provided a computer-implemented protective covering detection method comprising:
In an embodiment of the invention, the computer-implemented protective covering detection method further comprises obtaining an authentication or validation of the at least one model image prior to and as a condition precedent to storing the at least one model image in the computer storage medium for benchmarking purposes.
In an embodiment of the invention, the obtaining an authentication or validation of the at least one model image comprises enabling an administrator, different from the user, to authenticate or validate the at least one model image as an authentic image of the user comprising enabling the administrator to authenticate the first model image as an authentic image of the user wearing the protective covering.
In an embodiment of the invention:
In an embodiment of the invention, the processing the investigation image for determining a protection status of the user comprises comparing the investigation image to the first model image for determining if there is a match between the investigation image and the first model image, and wherein the protection status of the user is reflective of the user wearing the protective covering in case a match is found between the first model image and the investigation image, otherwise in case of mismatch between both images, the protection status of the user is reflective of the user not wearing the protective covering.
In an embodiment of the invention, the obtaining the at least one model image of the user and the obtaining an authentication or validation of the at least one model image comprise enabling the administrator to use the first and second interfaces for both obtaining and authenticating or validating the at least one model image of the user.
In an embodiment of the invention, the obtaining and authenticating or validating the at least one model image are conducted during a same time period while the administrator is in physical presence of the user, as a requirement for the authentication.
In an embodiment of the invention, the at least one model image of the user further comprises a second model image of the user without a protective covering.
In an embodiment of the invention, the processing the investigation image for determining a protection status of the user comprises comparing the investigation image to the second model image for determining if there is a match between the investigation image and the second model image, and wherein the protection status of the user is reflective of the user not wearing the protective covering in case a match is found between the second model image and the investigation image.
In an embodiment of the invention, the at least one model image comprises a series of images related to the user and the first model image of the user comprises a series of images of the user wearing a protective covering from various angular perspectives.
In an embodiment of the invention, the at least one model image comprises a series of images related to the user and the first model image comprises a series of images of the user wearing various types of eligible protective coverings.
In an embodiment of the invention, the output protective covering detection signal is an access control signal for controlling access of the user to an access-controlled area based on the determined protection status of the user, where the user is granted access to the access-controlled area in case the user is determined to be wearing the protective covering and the user is denied access to the access-controlled area in case the user is determined not to be wearing the protective covering as reflected by the protection status of the user.
In an embodiment of the invention, the output signal is a notification signal for notifying an administrator or a regulator about the protection status of the user, comprising a breach of safety notification in case the user is determined not to be wearing the protective covering.
In an embodiment of the invention, the output signal is a time-sensitive data record stored in a safety database for tracking the protection status of the user, wherein the safety database receives and stores time-sensitive data records reflecting the protection status of the user over a period of time.
In an embodiment of the invention, the at least a part of the actions are conducted using a mobile device associated to the user.
In an embodiment of the invention, the mobile device is an iPhone using Apple's iPhone image authentication system by setting at least two user profiles: a) a first user profile with a protective covering comprising the first model image; b) a second user profile without a protective covering comprising the second model image.
As a further aspect of the invention, there is provided a protective covering detection system comprising:
In an embodiment of the invention, the protective covering detection system further comprises an authentication or validation unit connected to the image capturing unit and to the computer storage medium for obtaining an authentication or validation of the at least one model image prior to and as a condition precedent to storing the at least one model image in the computer storage medium for benchmarking purposes.
In an embodiment of the invention, the obtaining an authentication or validation of the at least one model image comprises enabling an administrator, different from the user, to authenticate or validate the at least one model image as an authentic image of the user comprising enabling the administrator to authenticate the first model image as an authentic image of the user wearing the protective covering.
In an embodiment of the invention, the protective covering detection system further comprises:
In an embodiment of the invention, the processing the investigation image for determining a protection status of the user comprises comparing the investigation image to the first model image for determining if there is a match between the investigation image and the first model image, and wherein the protection status of the user is reflective of the user wearing the protective covering in case a match is found between the first model image and the investigation image, otherwise in case of mismatch between both images, the protection status of the user is reflective of the user not wearing the protective covering.
In an embodiment of the invention, the obtaining the at least one model image of the user and the obtaining an authentication or validation of the at least one model image comprise enabling the administrator to use the first and second interfaces for both obtaining and authenticating the at least one model image of the user.
In an embodiment of the invention, the obtaining and authenticating or validating the at least one model image are conducted during a same time period while the administrator is in physical presence of the user, as a requirement for the authentication or validation.
In an embodiment of the invention, the at least one model image of the user further comprises a second model image of the user without a protective covering.
In an embodiment of the invention, the processing the investigation image for determining a protection status of the user comprises comparing the investigation image to the second model image for determining if there is a match between the investigation image and the second model image, and wherein the protection status of the user is reflective of the user not wearing the protective covering in case a match is found between the second model image and the investigation image.
In an embodiment of the invention, the at least one model image comprises a series of images related to the user and the first model image of the user comprises a series of images of the user wearing a protective covering from various angular perspectives.
In an embodiment of the invention, the at least one model image comprises a series of images related to the user and the first model image comprises a series of images of the user wearing various types of eligible protective coverings.
In an embodiment of the invention, the output signal is an access control signal for controlling access to the user to an access-controlled area based on the determined protection status of the user, where the user is granted access to the access-controlled area in case the user is determined to be wearing the protective covering and the user is denied access to the access-controlled area in case the user is determined not to be wearing the protective covering as reflected by the protection status of the user.
In an embodiment of the invention, the output signal is a notification signal for notifying an administrator or a regulator about the protection status of the user, comprising a breach of safety notification in case the user is determined not to be wearing the protective covering.
In an embodiment of the invention, the output signal is a time-sensitive data record stored in a safety database for tracking the protection status of the user, wherein the safety database receives and stores time-sensitive data records reflecting the protection status of the user over a period of time.
In an embodiment of the invention, at least a part of the system components are part of a mobile device associated to the user, and at least a part of protective covering detection system actions are conducted by the mobile device.
In an embodiment of the invention, the mobile device is an iPhone using Apple's iPhone image authentication system by setting at least two user profiles: a) a first user profile with a protective covering comprising the first model image; b) a second user profile without a protective covering comprising the second model image.
As a further aspect of the invention, there is provided an access control system for controlling access of users to an access-controlled area based on access-controlled conditions comprising whether the users are wearing or not wearing protective coverings, the access control system being connected/configured to be connected to the protective covering detection system according to the various embodiments of the present invention for controlling access of users to the access-controlled based on the output signals of the protective covering detection system.
In an embodiment of the invention, the access control system further comprises the protective covering detection system according to the various embodiments of the present invention.
In an embodiment of the invention, the controlled area is an airport, a hospital, a building, a company premises, a shopping mall, an elevator, or any other indoor facility.
In an embodiment of the invention, the controlled area is the airport and wherein the protective covering detection system is integrated to the immigration authentication system, wherein the administrator is an immigration officer and the protective covering is a face mask/shield.
As a further aspect of the present invention, there is provided a surveillance system for surveilling safety of users within a controlled area based on safety criteria comprising whether the users are wearing or not wearing protective coverings, the surveillance system being connected/configured to be connected to the protective covering detection system, in accordance to the various embodiments of the present invention for controlling safety of the users within the controlled zone based on the output signals of the protective covering detection system.
In an embodiment of the invention, the surveillance system further comprising the protective covering detection system according to the various embodiments of the present invention.
In an embodiment of the invention, the controlled area is an airport, a hospital, a building, a company premises, a shopping mall, an elevator, or any other indoor facility.
In an embodiment of the invention, the controlled area is the airport and wherein the protective covering detection system is integrated to the immigration authentication system, wherein the administrator is an immigration officer and the protective covering is a face mask/shield.
As another aspect of the invention, there is provided a computer-implemented protective covering detection method comprising:
In an embodiment of the invention, the investigation system determines that the user is wearing a protective covering in the investigation image in case there is a high accuracy match between investigation image and the first model image.
In an embodiment of the invention:
In an embodiment of the invention:
In an embodiment of the invention, the method is conducted by a communication device in communication with the investigation system via a wireless data network.
In an embodiment of the invention, the communication device is a mobile device.
In an embodiment of the invention, the mobile device is an iPhone using Apple's iPhone image authentication system by setting at least two user profiles: a) a first user profile with a protective covering comprising the first model image; b) a second user profile without a protective covering comprising a second model image.
As a further aspect of the invention, there is provided a protective covering detection system comprising:
In an embodiment of the invention, the investigation system determines that the user is wearing a protective covering in the investigation image in case there is a high accuracy match between investigation image and the first model image.
In an embodiment of the invention:
In an embodiment of the invention:
In an embodiment of the invention, the system is part of a communication device in communication with the investigation system via a wireless data network.
In an embodiment of the invention, the communication device is a mobile device.
In an embodiment of the invention, the mobile device is an iPhone using Apple's iPhone image authentication system by setting at least two user profiles: a) a first user profile with a protective covering comprising the first model image; b) a second user profile without a protective covering comprising a second model image.
The subject matter that is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other aspects, features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
The aspects of the invention will be described in conjunction with
There is provided a protective covering detection system 10 for detecting whether a user is wearing a protective covering at any given time using image recognition. The protective covering detection system 10 is configured to obtain an image of the user with the protective covering, validate the image of the user wearing the protective covering in order to confirm validity of the image, and as a subsequent step use the validated image of the user with the protective covering as a model image for benchmarking purposes. The model image is preferably a head profile of the user wearing a protective covering. A protective covering investigation unit 60 compares the model image to an investigation image captured by an imaging system during an investigation process to determine whether the user in the investigation image is wearing the protective covering. The protective covering investigation unit 60 determines whether an exact match is found between both images (the model image and the investigation image). The protective covering investigation unit 60 can be part of, or can be connected to, a safety surveillance system 200, an access control system 100 or any other system requiring protective covering use detection. The protective covering detection system 10 enables a user friendly, robust and expedite protective covering recognition process since it is based on an exact matching analysis. The images according to the various embodiments of the invention are preferably digital images.
In an embodiment of the invention, a protective covering is any type of object, device, shield, barrier or garment, of any material, designed to be worn by a person to cover partially or totally, any part of the body for the purpose of protection against environmental hazards, impacts, or contaminants, such as for infection control protection purposes, or occupational safety and health administration. A protective covering comprises various types of protective gear or personal protective equipment such as any one, any combination, or all of: gloves, masks, shields, helmet, headtops, protective eyewear, hard-hats, gown, reinforced foot protection, breathing apparatus, safety harnesses, protective clothing, fire ground safety and rescue gear, ear protection, knee pads and the like.
In an embodiment of the invention, the validation of the image is an authentication by a third party—preferably an administrator—that the provided proposed user image is a true and valid image of the user wearing the protective covering.
In an embodiment of the invention, the validation/authentication action is conducted by a third party administrator, different from the user, who is authorized by an administration or management body to provide such a validation/authentication. The third party administrator can be a public or private person or entity, such as a public immigration official, a public notary, a security guard or any other person with administrative responsibilities in a private establishment such as a university, a shopping mall, a company, and the like. In an embodiment of the invention, the protective covering detection system 10 comprises a Model image Selection Unit 20 and a Protective covering Investigation Unit 60 comprising at least one computer processor or controller configured to perform computer instructions stored a prior in a computer memory.
The Model image Selection unit 20 comprises an image capturing unit for obtaining at least one model image of the user for use as benchmarking purposes and a validation unit for validating, by an administrator different from the user, the at least one model image of the user as a condition precedent for the at least one model image to be used for benchmarking purposes by the Protective covering Investigation Unit 60.
In an embodiment of the invention, the at least one model image is a digital image.
In an embodiment of the invention, the at least one model image of the user comprises one or more images of the user wearing a protective covering. In an embodiment of the invention, the at least one model image of the user also comprises one or more images of the user without a protective covering.
In an embodiment of the invention, a plurality of images of the user wearing the protective covering are obtained from various perspectives to enhance the accuracy level of the benchmarking and comparison process during the investigation analysis conducted by the protective covering investigation unit 60. The plurality of images of the user wearing the protective covering preferably comprise a front view, a first side view, a second side view, a top perspective view and a bottom perspective view.
In an embodiment of the invention, the digital image captured is a three dimensional image and the investigation analysis (also called image processing analysis) conducted by the protective covering investigation unit 60 uses a 3D face recognition technique.
In an embodiment of the invention, the at least one model image of the user without the protective covering preferably comprises a plurality of images of the user without the protective covering obtained from various perspectives to enhance the accuracy level of the benchmarking and comparison process down the road. The plurality of images of the user without the protective covering preferably comprise a front view, a first side view, a second side view, a top perspective view and a bottom perspective view.
In an embodiment of the invention, the at least one model image of the user with the protective covering comprises a plurality of images of the user with various types of protective coverings. This is in case the user uses various types of protective coverings at various occasions and wishes to be recognized using any one of these protective coverings during an investigation process. The system in this case can validate the various user images with the various types of protective coverings such that, during an investigation process by the protective covering investigation unit 60, the protective covering investigation unit 60 can recognize the user wearing any one of these pre-validated protective coverings.
In an embodiment of the invention, the Model Image Selection Unit 20 comprises a first User Interface (also called user interface 1) for obtaining the at least one model image of the user in one of the available modes including without limitation, capturing a picture of the user in real time, uploading a pre-stored picture of the user from a computer storage medium, receiving from an external device a picture of the user in real time through a wired or wireless network 45. The first user interface is configured to enable taking, uploading, receiving or otherwise capturing model images of the user with and without a protective covering. The first user interface can be used by a user or a third party (such as an administrator) for obtaining the user's images.
In an embodiment of the invention, the first user interface comprises (or is connected to) a camera for capturing an image of the user in real time. The image capturing (such as taking a picture of the user) can be triggered by the user himself, or by an administrator different from the user who will be required to validate the picture during the validation process, or by a third party different from the user and the administrator (depending on the application).
In an embodiment of the invention, the first user interface is configured to enable the user to take pictures of himself to constitute the at least one model image. In an embodiment of the invention where the user wears a protective covering for the face or head of the user comprising a face mask, shield, helmet, a head top and the like, the pictures are preferably head profile pictures of the user in order to provide a better clarity and accuracy of the face features of the user and the protective covering features used thereby. In another embodiment of the invention, the first user interface is configured to enable another party (such as the administrator) to take the pictures of the user to constitute the at least one model image. This depends on the configuration and the design of the protective covering detection system 10 depending on the application. This is a preferred embodiment in the scenario where the same administrator is at the same time taking the user's model images and validating these.
In an embodiment of the invention, the Model Image Selection Unit 20 is part of a Protective covering Detection System 10 used by an administrative body (of a certain public or private entity or organization). In this case, the first user interface can comprise a press or touch button connected to a camera (external or internal to the system) configured to activate the camera for capturing an image of the user while the user is located in front of the camera sensor. The image of the user is obtained by the Image Capturing Unit.
In an embodiment of the invention, the Model Image Selection Unit 20 is part of a user device (such as a mobile application running on a user mobile device 50). In this case, the first user interface can be configured on said mobile application for enabling the user to take a self-image (picture) to constitute the at least one model image (which is required to be subsequently validated by an administrator). The first user interface in this case comprises a mechanism for enabling the user to activate the camera such as a touch or press button. The first user interface is connected to the mobile device 50 camera in this case for activating the camera, and the camera is connected to the image capturing unit for obtaining the image captured by the camera. The at least one model image can also be stored in the mobile storage medium and uploaded by the user using another touch or press button of the first user interface. Also, the first user interface can have a further touch or press button to enable the user to upload a pre-stored image from the cloud or another local or remote computer storage device or medium.
In an embodiment of the invention, the validation unit is connected to the image capturing unit for receiving and obtaining a validation of the at least one model image from an administrator different from the user. The administrator is a trusted person or entity being recognized as having authority to validate the at least one model image such as administration or management in a private or public entity or a person appointed thereby, or an administrator or officer in a private or public entity. A validation of the at least one model image preferably comprises an authentication of the at least one model image as a true and authentic image of the user. If the model image is an image of the user wearing a protective covering, the validation of the image is an authentication that the image is a true representation of the user wearing a protective covering.
In an embodiment of the invention, the Model Image Selection Unit 20 comprises a second user interface (user interface 2) for enabling an administrator to validate the at least one model image of the user using the second user interface. In an embodiment of the invention, the first and second user interfaces are distinct user interfaces, particularly when the image capturing and the image validation are conducted separately and remotely one from the other.
In another embodiment, the first and second user interfaces are integrated within the same interface, particularly when the Model Image Selection Unit 20 is designed such that the image capturing process and the validation process are both conducted by the administrator himself or when these processes are conducted by various parties but at a same time and in physical presence of each other such that a same user interface can be used. For example, the Model Image Selection Unit 20 can be part of a mobile device 50 running a suitable mobile application, and the user can use the user interface of his mobile device 50 as the first user interface to capture his image and then hand his mobile device 50 to the administrator to use the user interface of the mobile device 50 as the second user interface to enter the validation code for the validation of the image captured by the user. The validation unit can communicate wirelessly with a remote code validation database (such as via Bluetooth) to confirm the validity of the validation code as being originated by an approved administrator.
In an embodiment of the invention, the at least one model image comprises one or more first model images with the user wearing a protective covering and one or more second model images of the user not wearing a protective covering. The first and second model images are classified as such and stored in their respective databases. The first model images are stored in a first database comprising the first model images of the user wearing a protective covering, and the second model images are stored in a second database comprising the second model images of the user not wearing a protective covering. Both the first and second databases are part of the validated user images database. Each digital image stored is therefore preferably classified as a first model image (with a protective covering) or a second model image (without a protective covering). This classification is important for the simplification of the image analysis process during the investigation process.
In an embodiment of the invention, the validation of the at least one model image comprises obtaining a validation code (or authentication code) in connection with the validated/authenticated at least one model image. The validation code is associated and stored in connection with the at least one validated model image. The validation code can be a QR code for example, or any other suitable digital stamp. The validation code can also be printed out on the protective covering itself for user/image identification purposes during an investigation process by the protective covering investigation unit 60 during the investigation process.
In an embodiment of the invention, the validation code comprises a digital stamp having an expiry date/time such that the validation code is only available for a specific period of time. The expiry date/time can be set a priori at the time of the initial validation of the model image, or alternatively defined a posteriori after the initial validation which can be based for example on the occurrence of an incident or event such as a safety breach by the user. Preferably, the digital stamp comprises an indication of the expiry date/time which can be extracted while scanning the image during the investigation process.
In an embodiment of the invention, the validation code is digitally applied on the validated image itself. The validation code can be associated to a unique identifier enabling to uniquely identify the validated image and/or the associated user. During the investigation process, in case a match is found between the investigation image and the model image, the validation code can be captured and mapped to the associated user such that the identity of the user is automatically identified. The validation code also enables to prove evidence that the model image has already been authenticated. In an embodiment of the invention, the authentication codes are stored in a database accessible for cross-checking as a proof of evidence of the authenticity of the validation code itself.
In an embodiment of the invention, the protective covering validation unit stores the successfully validated model images in a database storing the validated user model images (also called the user validated images database).
In an embodiment of the invention, the Model Image Selection Unit 20 further comprises a second User Interface (also called user interface 2) connected to the validation unit for enabling an administrator, different from the user, to validate the at least one model image.
In an embodiment of the invention, the user interface is configured to request the administrator to approve or reject a model image as part of the image validation process.
In an embodiment of the invention, the second user interface is provided at an administrator portal and the second user interface comprises a touch or press button for approving or rejecting the model image.
In an embodiment of the invention, the first and second user interfaces are a single interface enabling the administrator to capture an image of the user in real time and simultaneously (or within a very short time period, preferably less than 2 minutes) validating the image for storage inside the validated user images database. According to this embodiment, the Model image Selection Unit 20 is preferably provided in an Administrator Device under the full control and authority of the administrator.
In an embodiment of the invention, the Model Image Selection Unit 20 is an independent device used by administration of an access-controlled area (such as a building, a shopping mall, airport, company premises, factory or industrial area or any other facility) or part of their access-controlled system for granting access only to users wearing protective coverings and for monitoring the use of these protective coverings within the controlled area.
According to this example, users must present at a validation desk at the access-controlled entry and have their pictures wearing the protective coverings validated by the facility administration. This comprises selecting the at least one model image comprising a first model image with the user wearing the protective covering and having this at least one model image validated/authenticated by the administrator. The validated at least one model image is then stored inside the validated user images database which is accessible to the protective covering investigation unit 60. An image of the user accessing the access-controlled area (the investigation image) will be captured by an imaging system, and sent to the protective covering investigation unit 60 for determining whether the user is wearing a protective covering. The imaging system can for example comprise a camera at the access-controlled entry connected to the protective covering investigation unit 60.
In an embodiment of the invention, the protective covering investigation unit 60 comprises an image processing unit and an investigation user images database. The investigation user images database is connected to an imaging system for receiving the investigation images which needs to be investigated. The image processing unit, comprising a computer processing unit, is connected to the validated user model images database and to the investigation user images database for obtaining the validated model images and investigation images of the user, respectively from the validated user model images database and the investigation images database. The image processing unit conducts an imaging analysis using a computer algorithm for comparing both images (the model image and the investigation image) for determining if there is a match between both and for determining a protection status of the user (whether or not he is wearing a protective covering) based the imaging analysis.
In an exemplary embodiment of the invention with an application to an access-control system, the imaging processing unit compares the investigation image to the validated at least one model image of the user stored a priori inside the validated user model images database, and if a match is found with the first model image (user wearing a protective covering) it sends a signal to the access control system 100 with an indication of a successful match and confirmation that the user is wearing the protective covering. The control access system provides access to the user on this basis. If no match is found between both images by the imaging processing unit, the protective covering investigation unit 60 concludes that the user is not wearing a protective covering and access is denied to the user.
In an embodiment of the invention, the user can register and get his at least one model image validated once, and then use the access control system 100 as long as the validated at least one model image is still applicable (same protective covering is being used for example).
In an embodiment of the invention, the user can also register and validate multiple first model images with various protective coverings respectively and have all of these first model images validated and stored inside the validated user images database for use during the investigation process. In this case, the user will be determined by the protective covering investigation unit 60 as wearing a protective covering if at least one of these model images is a match with the picture captured in the investigation image at the time of access control. The user can also provide a second model image with without a protective covering. In this case, this second model image is also validated and mapped in the system as being associated to the user face profile without a protective covering and used during the investigation process. In this case, if there is a match between this second model image and the image of the user as captured in the investigation image at the time of access control, the protective covering investigation unit 60 concludes that the user is not wearing a protective covering and sends a signal in that effect to the access control system 100 to deny access to the user inside the controlled area.
In an embodiment of the invention, the imaging processing unit can also apply an algorithm using both the first model image (the user with a protective covering) and the second model image (the user without a protective covering) during the investigation process where both first and second model images are used to provide a higher accuracy rate of the determination made by the imaging processing unit. The comparison process by the imaging processing unit of the investigation unit is conducted in a simple and quick manner as this requires an exact match comparison and not a complex face recognition analysis and approximations since the investigation unit is looking for an identical or quasi identical match between the investigation image and the model images.
The access-control system 100 can be part of a wide range of systems such as immigration control or custom systems, elevator access control system, building access control systems, shopping malls access control systems, access control to factory/industry premises or its specific areas, premises access control systems (for external or internal doors) and so on. In an embodiment of the invention, the access control system 100 is associated to an elevator where users are controlled access using the protective covering detection system 10 based on whether they are wearing or not wearing a face mask. In an embodiment of the invention, the Model image Selection Unit 20 is an independent device, or part of another device, used by or related to an administrative authority such as an immigration control or customs authority.
In an embodiment of the invention, users (example travelers in the case of an airport application) get their model images captured by the Model Image Selection Unit 20 when they present for administrative control at the access-controlled gate (for example, the immigration control at the access-controlled entry point). These model images, comprising the model images of the users wearing the face masks as the protective covering, are stored inside the validated user model images database which is accessible to the protective covering investigation unit 60 during a subsequent investigation process by the protective covering investigation unit 60. The surveillance imaging system inside the controlled zone (for example, the airport) allows the administrative authority (for example, the airport authority) to monitor the use of face masks by users (example, travelers) by capturing the users' images while they are inside the controlled zone (example the travelers' images in the case of the airport application while they are inside the airport) and sending these to the Protective covering Investigation Unit 60 for processing these captured images (called investigation images) based on the pre-stored model images of the users (example travelers in the example of an airport application). For any particular user (for example, a specific traveler), the Protective covering Investigation Unit 60 would search for a match between an investigation image captured by the controlled area surveillance imaging system 200 and the pre-stored user model image wearing the face mask. If no match is found, a traveler is found to be in breach of the safety measures by not wearing the face mask. If a match is found, then the user is determined to be in compliance with the safety measures by wearing the face mask.
In an embodiment of the invention, the user is first being identified by the protective covering investigation unit 60 using a user identifier before an investigation is conducted by the investigation unit. In this case, the investigation conducted by the investigation unit is targeted to user model images stored in related to that specific user only (eliminating the need to run a search based on all the stored model images in the scenario where the user is not identified a prior before the investigation process is initiated).
In an embodiment of the invention, the user is identified first through a user identification system connected to the protective covering detection system 10 (and particularly to the protective covering investigation unit 60). The user identification system identifies the user and sends the user identifier to the protective covering investigation unit 60. The protective covering investigation unit 60 then extracts the model images associated to that specific identified user from the validated model images database and runs the imaging analysis with the comparison between the images to determine whether the user is wearing the protective covering.
In an embodiment of the invention, the user identification system is part of the protective covering investigation unit 60. The user can be triggered to provide his user identifier first, for identifying the user and tailoring the search. The identity of the user can also be obtained using any other suitable means.
In an embodiment of the invention, at the time of validation of the user model images by the validation unit, a validation code is stored in connection with the at least one validated model image and the associated identity of the user, and in this case the validation code is further communicated to the user for future user identification purposes. During the investigation process (which happens at a future time subsequent to the validation process), the validation code is obtained from the user in order to first identify the user and/or the associated validated model image, and as such further used for targeting the search and the comparison process. Depending on the application, the protective covering investigation unit 60 can trigger the user to enter the user code through a user interface or alternatively the protective covering investigation unit 60 can be configured to automatically obtain the user code from the user.
In an embodiment of the invention, the validation code is printed on the protective covering used by the user for purposes of identification. The validation code can be a QR code for example uniquely identifying the user and/or the digital model image of the user. The investigation image would in that case comprise an image of the user wearing the protective covering with the validation code appearing of the protective covering. The validation code is interpreted by the protective covering investigation unit 60 for identifying the user and/or the related model image of the user stored inside the validated user images database. A targeted search and matching comparison is then made on that basis.
It should be understood that the proposed protective covering detection system 10 is a requirement for purposes of protective covering use detection even if a validation code is applied. This is as a detection of a validation code alone (without image comparison analysis as proposed herein) is not sufficient to confirm or affirm a protective covering use by the user, as a breaching user would still be able to trick the system by having the system detect the validation code (positioned on the protective covering) without however wearing the protective covering (as for example the user can be holding the face mask in his hands, instead of wearing it on his face).
As another aspect of the invention, there is provided protective covering detection methods, preferably computer-implemented methods.
In an embodiment of the invention, there is provided a protective covering detection method comprising: a) enabling a user to provide an image of the user wearing a protective covering; b) enabling an administrator, different from the user, to validate the image of the user wearing the protective covering; in case of a successful validation of the user image by the administrator, providing the validated first model image to a protective covering investigation unit or device for benchmarking purposes during an investigation process. The method is preferably computer-implemented using a computer processor or controller part of a computer server.
In an embodiment of the invention, there is provided a protective covering detection method comprising: a) obtaining a model image of the user wearing a protective covering; b) obtaining a validation of the user model image from an administrator different from the user; c) storing the user model image in a computer storage medium after validation for benchmarking purposes; d) obtaining an investigation image of the user for investigation in order to determine whether a protective covering is worn by the user; e) comparing the investigation image with the user model image using a computer processor for determining whether there is a match; f) determining a protection status of the user in the investigation image based on the comparison; If a match is found: the protection status is reflective of the user is wearing a protective covering; Otherwise: the protection status will be reflective of the user not wearing a protective covering; g) generating an output computer signal based on the determined protection status. The method is preferably computer-implemented, partially or totally, using one or more computer processors.
In an embodiment of the invention, there is provided a protective covering detection method comprising: a) obtaining a validated first model image of the user wearing a protective covering; b) obtaining a validated second model image of the user without a protective covering; c) storing the first and second model images of the user in a computer storage medium for benchmarking purposes; d) obtaining an investigation image of the user for investigation on whether a protective covering is used; e) processing, using a computer processor, the investigation image with the user model images with and without a protective covering for determining a protection status of the user including whether the user is wearing a protective covering in the investigation image; f) determining a protection status of the user in the investigation image based on the processing; g) Generating an output computer signal based on the determined protection status. The method is preferably computer-implemented, partially or totally, using one or more computer processors.
In an embodiment of the invention, there is provided a protective covering detection method comprising: a) using a mobile device 50 for setting at least one picture profile (model image) with a protective covering; b) preferably, using the mobile device 50 for setting at least one picture profile (model image) without a protective covering; c) using the mobile device 50 for sharing the at least one first and second picture profiles with an administrator device using a wireless network such as Bluetooth; d) receiving from the administrator at the mobile device 50 a digital validation, such as a digital code stamp, of the first and second picture profiles (model images); e) using the mobile device 50 for sharing the digitally validated first and second picture profiles (model images) with a protective covering investigation unit 60, device or system for benchmarking purposes during an investigation process such as in the frame of an access control to a controlled area or safety surveillance. The method is preferably computer-implemented, partially or totally, using one or more computer processors. The mobile device 50 can be a smart device, such as an IPhone or IPad or any other type of smart devices.
The various components of the systems, devices and units can be running on a single computer, computing server or device or can be distributed over a plurality of computing servers or devices with local or remote connection there between when required. The various actions of the methods described under the various embodiments of the invention can also be running over various computer components distributed over a plurality of computer devices or servers connected locally or remotely through a wireless data network. The way of distributing the various components of the systems, devices and units according to the various embodiments of the present invention is a question of design, based on the specific application. The same thing apply for the described methods.
In an embodiment of the invention, there is provided an access-control system 100 comprising the protective covering investigation system or the protective covering investigation unit 60 in accordance with the various embodiments of the present invention.
In an embodiment of the invention, there is provided a safety surveillance system 200 comprising an imaging surveillance system and a protective covering investigation system or a protective covering investigation unit 60 in accordance with the various embodiments of the present invention.
Many changes, modifications, variations and other uses and applications of the subject invention will become apparent to those skilled in the art after considering this specification and the accompanying drawings, which disclose the preferred embodiments thereof. All such changes, modifications, variations and other uses and applications, which do not depart from the spirit and scope of the invention, are deemed to be covered by the invention, which is to be limited only by the claims, which follow.
This patent application is a Continuation-In-Part of U.S. patent application Ser. No. 17/394,873 filed on Aug. 5, 2021, and claims priority from U.S. Provisional Patent Application No. 63/061,320 filed Aug. 5, 2020. This patent application is herein incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
63061320 | Aug 2020 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 17394873 | Aug 2021 | US |
Child | 18794623 | US |