Claims
- 1. A method for detecting a tailgating event in regard to security of a controlled access area, comprising:
(a) acquiring one or more stereoscopic images of an area of observation; (b) analyzing the one or more images using a machine vision processing system to identify and classify a first object in the area of observation, said first object having supplied an authorization with respect to the controlled access area, and further using the machine vision processing system to identify and classify a second object in the area of observation; and (c) applying one or more access control rules to the information obtained from the image analysis to determine whether the second object is attempting to breach the controlled access area by utilizing the authorization supplied by the first object in violation thereof.
- 2. The method of claim 1, in which the one or more access control rules determine whether the second object is attempting to breach the controlled access area based on proximity of the second object to the first object in the area of observation.
- 3. The method of claim 2, in which the authorization of the first object is to enter the controlled access area, and the one or more access control rules determine whether the second object is attempting to enter the controlled access area by maintaining proximity to the first object as the first object enters the controlled access area.
- 4. The method of claim 2, in which the authorization of the first object is to exit the controlled access area, and the one or more access control rules determine whether the second object is attempting to enter the controlled access area by maintaining proximity to the first object as the first object exits the controlled access area.
- 5. The method of claim 1, in which analyzing the one or more images further comprises using the machine vision processing system to identify motion of the first object and the second object.
- 6. The method of claim 5, in which the one or more access control rules determine whether the second object is attempting to breach the controlled access area based on motion of the second object relative to the first object.
- 7. The method of claim 6, in which the one or more access control rules determine whether the second object is following the motion of the first object with respect to the controlled access area.
- 8. The method of claim 1, further comprising triggering an alarm when the one or more access control rules determine that the second object is attempting to breach the controlled access area.
- 9. The method of claim 1, further comprising causing an access limiting device associated with the controlled access area to prevent breach of the controlled access area by the second object.
- 10. The method of claim 9, in which causing the access limiting device to prevent breach of the controlled access area comprises causing the access limiting device to block passage by the second object with respect to the controlled access area.
- 11. The method of claim 9, in which causing the access limiting device to prevent breach of the controlled access area comprises locking the access limiting device.
- 12. The method of claim 9, in which causing the access limiting device to prevent breach of the controlled access area comprises reversing a direction of operation of the access limiting device.
- 13. The method of claim 12, in which the access limiting device is a revolving structure and the direction of rotation of the revolving structure is reversed.
- 14. The method of claim 1, further comprising causing one or more access limiting devices to block passage of the second object and contain the second object within a defined area.
- 15. The method of claim 1, further comprising receiving access control information from an access control system and applying the one or more access control rules to the access control information in combination with the information obtained from the image analysis to determine whether the second object is attempting to breach the controlled access area.
- 16. The method of claim 15, further comprising triggering an alarm when the one or more access control rules applied to the access control information and image analysis information determine that the second object is attempting to breach the controlled access area.
- 17. The method of claim 15, further comprising causing an access limiting device associated with the controlled access area to prevent breach of the controlled access area by the second object.
- 18. The method of claim 17, in which causing the access limiting device to prevent breach of the controlled access area comprises causing the access limiting device to block passage by the second object with respect to the controlled access area.
- 19. The method of claim 17, in which causing the access limiting device to prevent breach of the controlled access area comprises locking the access limiting device.
- 20. The method of claim 17, in which causing the access limiting device to prevent breach of the controlled access area comprises reversing a direction of operation of the access limiting device.
- 21. The method of claim 20, in which the access limiting device is a revolving door and the direction of rotation of the revolving door is reversed.
- 22. The method of claim 1, in which analyzing the one or more images using a machine vision processing system further comprises using a three-dimensional surface analysis to identify the first or second object.
- 23. The method of claim 1, in which analyzing the one or more images using a machine vision processing system further comprises using a three-dimensional surface analysis to classify the first or second object.
- 24. The method of claim 1, in which the first or second object is classified as to type of object.
- 25. The method of claim 1, in which analyzing the one or more images further comprises determining the presence of a connection between the first and second objects.
- 26. The method of claim 1, further comprising recording the one or more images.
- 27. The method of claim 1, further comprising recording information obtained from the image analysis.
- 28. The method of claim 1, further comprising recording information resulting from applying the one or more access control rules to the information obtained from the image analysis.
- 29. The method of claim 1, further comprising defining a region of interest within the area of observation.
- 30. The method of claim 29, further comprising defining a plurality of regions of interest and applying the one or more access control rules based on the region of interest in which the first or second objects are located.
- 31. The method of claim 29, further comprising using an interactive user interface that displays the area of observation to define the region of interest.
- 32. The method of claim 1, further comprising using an interactive user interface to configure properties of the image analysis.
- 33. The method of claim 1, further comprising using an interactive user interface to configure properties of the machine vision processing system.
- 34. The method of claim 1, further comprising using an interactive user interface to configure properties of an access control system that provides access control information to the machine vision processing system.
- 35. A method for detecting unauthorized passage of an object in regard to security of a controlled access area having a designated access point, comprising:
(a) acquiring one or more stereoscopic images of an area of observation associated with the designated access point; (b) analyzing the one or more images using a machine vision processing system to identify and classify an object in the area of observation, and further to determine the direction of motion of the object with respect to the designated access point; and (c) applying one or more access control rules to the information obtained from the image analysis to determine whether the object is attempting to breach the controlled access area by using the designated access point in violation of the security of the controlled access area.
- 36. The method of claim 35, in which the designated access point is an exit-only access point and the one or more access control rules determine whether the object is attempting to enter the controlled access area through the exit-only access point.
- 37. The method of claim 35, in which the designated access point is limited to passage of objects that are classified in a defined object type and the one or more access control rules determine whether the classification of the object in the area of observation is in the defined object type.
- 38. The method of claim 37, in which the designated access point is limited to passage of objects classified as vehicles.
- 39. The method of claim 37, in which the designated access point is limited to passage of objects classified as packages.
- 40. The method of claim 37, in which the designated access point is limited to passage of objects classified as persons.
- 41. The method of claim 35, in which the designated access point is a one-way elevator and the one or more access control rules determine whether the object is attempting to enter the controlled access area via the exit of the one-way elevator.
- 42. The method of claim 35, in which the designated access point is an escalator and the one or more access control rules determine whether the object is attempting to access the controlled access area by entering the escalator in a direction opposite to the operation of the escalator.
- 43. The method of claim 35, in which the designated access point is a revolving structure and the one or more access control rules determine whether the object is attempting to access the controlled access area by entering the revolving structure in a direction opposite to the operation of the revolving structure.
- 44. The method of claim 35, in which analyzing the one or more images further comprises determining the speed of motion of the object and the one or more access control rules determine whether the speed of motion of the object indicates a thrown object.
- 45. The method of claim 35, in which analyzing the one or more images further comprises determining the trajectory of motion of the object and the one or more access control rules determine whether the trajectory of motion of the object indicates a thrown object.
- 46. The method of claim 35, further comprising triggering an alarm when the one or more access control rules determine that the object is attempting to breach the controlled access area by using the designated access point in violation of the security of the controlled access area.
- 47. The method of claim 35, further comprising causing an access limiting device associated with the designated access point to prevent breach of the controlled access area by the object.
- 48. The method of claim 47, in which causing the access limiting device to prevent breach of the controlled access area comprises causing the access limiting device to block passage by the object with respect to the designated access point.
- 49. The method of claim 47, in which causing the access limiting device to prevent breach of the controlled access area comprises locking the access limiting device.
- 50. The method of claim 35, further comprising causing one or more access limiting devices to block passage of the object at the designated access point and contain the object within a defined area.
- 51. The method of claim 35, further comprising receiving access control information from an access control system and applying the one or more access control rules to the access control information in combination with the information obtained from the image analysis to determine whether the object is attempting to breach the controlled access area.
- 52. The method of claim 51, further comprising triggering an alarm when the one or more access control rules applied to the access control information and the information obtained from the image analysis determine that the object is attempting to breach the controlled access area by using the designated access point in violation of the security of the controlled access area.
- 53. The method of claim 51, further comprising causing an access limiting device associated with the designated access point to prevent breach of the controlled access area by the object.
- 54. The method of claim 53, in which causing the access limiting device to prevent breach of the controlled access area comprises causing the access limiting device to block passage by the object with respect to the designated access point.
- 55. The method of claim 53, in which causing the access limiting device to prevent breach of the controlled access area comprises locking the access limiting device.
- 56. The method of claim 35, in which analyzing the one or more images using a machine vision processing system further comprises using a three-dimensional surface analysis to identify the object.
- 57. The method of claim 35, in which analyzing the one or more images using a machine vision processing system further comprises using a three-dimensional surface analysis to classify the object.
- 58. The method of claim 35, further comprising recording the one or more images.
- 59. The method of claim 35, further comprising recording information obtained from the image analysis.
- 60. The method of claim 35, further comprising recording information resulting from applying the one or more access control rules to the information obtained from the image analysis.
- 61. The method of claim 35, further comprising defining a region of interest within the area of observation.
- 62. The method of claim 61, further comprising defining a plurality of regions of interest and applying the one or more access control rules based on the region of interest in which the object is located.
- 63. The method of claim 61, further comprising using an interactive user interface that displays the area of observation to define the region of interest.
- 64. The method of claim 35, further comprising using an interactive user interface to configure properties of the image analysis.
- 65. The method of claim 35, further comprising using an interactive user interface to configure properties of the machine vision processing system.
- 66. The method of claim 35, further comprising using an interactive user interface to configure properties of an access control system that provides access control information to the machine vision processing system.
- 67. An apparatus for detecting a security violation with respect to a controlled access area, comprising:
(a) a stereoscopic imaging device for acquiring one or more stereographic images of an area of observation; and (b) a machine vision processing system in communication with the stereoscopic imaging device to receive the one or more images, the machine vision processing system being further configured to analyze the one or more images to identify and classify an object in the area of observation, and apply one or more access control rules to determine whether the object is attempting to breach the controlled access area in violation of security of the controlled access area.
- 68. The apparatus of claim 67, in which the object in the area of observation is a suspect object, the apparatus further comprising a position sensor disposed on a background object in the area of observation, the machine vision processing system being further configured to use information received from the position sensor to define the background object from the suspect object.
- 69. The apparatus of claim 68, in which the position sensor is disposed on a door.
- 70. The apparatus of claim 68, in which the machine vision processing system is further configured to perform a calibration procedure that correlates position sensor information to a position of the background object for determining a background image.
- 71. The apparatus of claim 67, in which the controlled access area has a designated access point, the machine vision processing system being further configured to determine the direction of motion of the object with respect to the designated access point and apply the one or more access control rules to determine whether the object is attempting to breach the controlled access area by using the designated access point in violation of the security of the controlled access area.
- 72. The apparatus of claim 71, in which the machine vision processing system is further configured to analyze the one or more images to determine the speed of motion of the object and apply the one or more access control rules to determine whether the speed of motion of the object indicates a thrown object.
- 73. The apparatus of claim 71, in which the machine vision processing system is further configured to analyze the one or more images to determine the trajectory of motion of the object and apply the one or more access control rules to determine whether the trajectory of motion of the object indicates a thrown object.
- 74. The apparatus of claim 67, further comprising an alarm that is triggered when the one or more access control rules determine that the object is attempting to breach the controlled access area in violation of the security of the controlled access area.
- 75. The apparatus of claim 67, in which the object in the area of observation is a second object, the machine vision processing system being further configured to identify and classify a first object in the area of observation having supplied an authorization with respect to the controlled access area, and to apply the one or more access control rules to determine whether the second object is attempting to breach the controlled access area by utilizing the authorization supplied by the first object in violation thereof.
- 76. The apparatus of claim 75, in which the one or more access control rules are configured to determine whether the second object is attempting to breach the controlled access area based on proximity of the second object to the first object in the area of observation.
- 77. The apparatus of claim 76, in which the authorization of the first object is to enter the controlled access area, and the one or more access control rules are configured to determine whether the second object is attempting to enter the controlled access area by maintaining proximity to the first object as the first object enters the controlled access area.
- 78. The apparatus of claim 76, in which the authorization of the first object is to exit the controlled access area, and the one or more access control rules are configured to determine whether the second object is attempting to enter the controlled access area by maintaining proximity to the first object as the first object exits the controlled access area.
- 79. The apparatus of claim 67, further comprising an access control system associated with the controlled access area in which the access control system is configured to receive information from the object for accessing the controlled access area.
- 80. The apparatus of claim 79, further comprising an access limiting device in communication with the access control system, in which the access control system is configured to control the operation of the access limiting device.
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims the benefit of the filing date of U.S. Provisional Application No. 60/370,837, filed Apr. 8, 2002, the entire disclosure of which is incorporated herein by reference.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60370837 |
Apr 2002 |
US |