Patent application number | Description | Published |
20090307772 | FRAMEWORK FOR SCALABLE STATE ESTIMATION USING MULTI NETWORK OBSERVATIONS - A framework for state estimation using multi-network observation. Highly scalable qualitative probabilistic algorithms may be used to combine noisy, uncertain outputs having multi-modal event data from numerous networks into a relatively accurate and coherent estimate of the system state. Models of disparate networks may be pulled together to result in unified multi-modal event data. Information from multiple networks may be graphed and analyzed. | 12-10-2009 |
20100287130 | SIGNAL MANAGEMENT SYSTEM FOR BUILDING SYSTEMS - A system and approach for efficient algorithmic signal management for buildings. When a set of signals is received, attributes of the signals may be extracted from a database. The attributes of the signals may be matched against the rule conditions in the database. The matches may be compared to the rules to find the rules which have all of the conditions satisfied. These rules may be executed to modify the further processing of the signals. A signal for instance may be an alarm. | 11-11-2010 |
20110181414 | ACCESS CONTROL SYSTEM BASED UPON BEHAVIORAL PATTERNS - A method and apparatus for detecting behavioral changes in a security system is provided. The method includes the steps of providing a secured area having a plurality of security zones where access to each is controlled by an access controller, detecting entrances to at least some of the plurality of security zones by an authorized person through respective access controllers of the plurality of zones over a predetermined previous time period, forming a probability model of entry into each of the plurality of security zones from the detected entrances over the previous time period, detecting access requests for the authorized user from the access controllers during a current time period, and generating a security alert upon determining that an access request of the current access requests exceeds a probability threshold value associated with the probability model. | 07-28-2011 |
20110307487 | SYSTEM FOR MULTI-MODAL DATA MINING AND ORGANIZATION VIA ELEMENTS CLUSTERING AND REFINEMENT - A system for obtaining data from various sources. The data may be organized into cluster sets of related items. Elements of various kinds may be pulled from the data. The elements may be put together into sets of clusters for each kind of elements. The clusters may be refined relative to one another and in view of integrated properties of the cluster sets. Elements may be added or removed from the clusters during refinement. Examples of the elements may be people and events. Examples of cluster sets of such elements may be groups and goals, respectively. | 12-15-2011 |
20120005208 | SYSTEM FOR INFORMATION DISCOVERY IN VIDEO-BASED DATA - A system for information discovery of items, such as individuals or objects, from video-based tracks. The system may compute similarities of characteristics of the items and present the results in a matrix form. A similarity portrayal may have nodes representing the items with edges between the nodes. The edges may have weights in the form of vectors indicating similarities of the characteristics between the nodes situated at the ends of the edges. The edges may be augmented with temporal and spatial properties from the tracks which cover the items. These properties may play a part in a multi-objective presentation of information about the items in terms of a negative or supportive basis. The presentation may be partitioned into clusters which may lead to a merger of items or tracks. The system may pave a way for higher-level information discovery such as video-based social networks. | 01-05-2012 |
20120330611 | MONITORING ACCESS TO A LOCATION - Devices, methods, and systems for monitoring access to a location are described herein. One or more method embodiments include determining data associated with an access event associated with a location, determining whether the access event is an anomalous access event using the data associated with the access event and a statistical model of data associated with a number of non-anomalous access events associated with the location, and assessing, if the access event is determined to be an anomalous access event, the anomalous access event. In various embodiments, assessing the anomalous access event includes at least one of determining an anomaly type associated with the anomalous access event, determining an anomaly classification confidence associated with the anomalous access event, determining an anomaly severity associated with the anomalous access event, and determining a reliability associated with the statistical model. | 12-27-2012 |
20130142438 | SYSTEM AND METHOD FOR GEOSPATIAL PARTITIONING OF A GEOGRAPHICAL REGION - An apparatus includes at least one memory unit and at least one processing unit. The memory unit is configured to receive and store information associated with a particular geographical region. The processing unit configured to execute a computer program for discretizing an image of the geographical region into a plurality of sub-regions. Using these sub-regions, the processing unit may generate a graph comprising a plurality of nodes and a plurality of edges in which the nodes comprise the sub-regions. The processing unit may also geospatially partition an image of the geographical region according to the information that is associated with each of the sub-regions. | 06-06-2013 |
20130144914 | ACQUIRING STATISTICAL ACCESS MODELS - The present disclosure provides methods, devices, and computer-readable media for acquiring statistical access models. One or more embodiments include collecting data associated with a first access profile, collecting data associated with a second access profile, determining whether the data associated with the first access profile has a particular number of characteristics in common with the data associated with the second access profile, assigning a statistical access model associated with the second access profile to the first access profile based on the particular number of characteristics that the data associated with first access profile has in common with the data associated with the second access profile, and detecting an anomalous access event based on the statistical access model. | 06-06-2013 |
20130314232 | TAILGATING DETECTION - Methods, systems, and computer-readable media for tailgating detection are described herein. One method includes collecting, via a computing device, access log data associated with a profile; processing, by a processor coupled to the computing device, the access log data to obtain a statistical access model; detecting, by the processor, a tailgating sequence based on the statistical access model; and providing, by the processor, a notification that the tailgating sequence has occurred. | 11-28-2013 |
20140266680 | System and Method of Anomaly Detection with Categorical Attributes - A method and apparatus where the method includes detecting a plurality of events related to the activities of users within a security system wherein the events are defined by a plurality of attributes, wherein at least one attribute is categorical and wherein a data distance between events is a function of event attributes, evaluating the detected events using a density based anomaly detection method f(r), where r is a size of a neighborhood around a data point, comparing a value of the evaluated expression with a margin threshold value (msg(r)) and setting an alarm upon detecting that the value exceeds the threshold value. | 09-18-2014 |
20140266683 | SYSTEM AND METHOD OF ANOMALY DETECTION - A method and apparatus wherein the method includes detecting a plurality of events within a security system, evaluating the events using one of a first expression defined by Σ | 09-18-2014 |
20150066903 | SECURITY SYSTEM OPERATOR EFFICIENCY - Systems and methods for increasing an efficiency of an operator of a security system are discussed generally herein. A system can include a memory including ontology data saved thereon, the ontology data can define interrelationships between a scanner associated with access to a room of an area under surveillance, a camera with a field of view at least partially overlapping a footprint of the room, an identifier configured to be scanned by the scanner and associated with a person, and a security policy including one or more predefined conditions, which when satisfied, indicate when a security threat exists, the security policy includes a response an operator can perform if the conditions are satisfied, and the system can include a query module configured to receive a query and search the ontology data and temporal and spatial data associated with the area under surveillance in response to receiving the query. | 03-05-2015 |