Patent application number | Description | Published |
20120169879 | DETECTING RETAIL SHRINKAGE USING BEHAVIORAL ANALYTICS - Methods, devices, and systems for detecting retail shrinkage using behavior analytics are described herein. The retail shrinkage may be due to, for example, sweethearting, although embodiments of the present disclosure are not so limited and can be used to detect other forms of retail shrinkage as well. One or more device embodiments include a memory, and a processor coupled to the memory. The processor is configured to execute executable instructions stored in the memory to receive data associated with behavior of an individual and use the data associated with the behavior of the individual to determine whether the behavior of the individual is irregular to detect retail shrinkage. | 07-05-2012 |
20120330611 | MONITORING ACCESS TO A LOCATION - Devices, methods, and systems for monitoring access to a location are described herein. One or more method embodiments include determining data associated with an access event associated with a location, determining whether the access event is an anomalous access event using the data associated with the access event and a statistical model of data associated with a number of non-anomalous access events associated with the location, and assessing, if the access event is determined to be an anomalous access event, the anomalous access event. In various embodiments, assessing the anomalous access event includes at least one of determining an anomaly type associated with the anomalous access event, determining an anomaly classification confidence associated with the anomalous access event, determining an anomaly severity associated with the anomalous access event, and determining a reliability associated with the statistical model. | 12-27-2012 |
20130144914 | ACQUIRING STATISTICAL ACCESS MODELS - The present disclosure provides methods, devices, and computer-readable media for acquiring statistical access models. One or more embodiments include collecting data associated with a first access profile, collecting data associated with a second access profile, determining whether the data associated with the first access profile has a particular number of characteristics in common with the data associated with the second access profile, assigning a statistical access model associated with the second access profile to the first access profile based on the particular number of characteristics that the data associated with first access profile has in common with the data associated with the second access profile, and detecting an anomalous access event based on the statistical access model. | 06-06-2013 |
20130207775 | BOOTSTRAPPING ACCESS MODELS IN THE ABSENCE OF TRAINING DATA - A plurality of access models comprise patterns of accesses to resources protected by an Access Control System (ACS). The access models are used to classify the accesses to the resources as either normal or anomalous. The system stores attributes for the individuals for whom the access models are available, receives attributes of an individual not associated with an access model, and compares the attributes of the individual not associated with an access model to the attributes of the individuals for whom access models are available. The system further selects an access model for the individual not associated with an access model based on the comparison, and uses the selected access model for the individual not associated with an access model to classify access to the one or more resources protected by the ACS by the individual not associated with an access model as either normal or anomalous. | 08-15-2013 |
20130329944 | TRACKING AIRCRAFT IN A TAXI AREA - Tracking aircraft in a taxi area is described herein. One method includes receiving a video image of an aircraft while the aircraft is taxiing, determining a portion of the video image associated with the aircraft, determining a geographical track associated with the aircraft based, at least in part, on the portion of the video image, and mapping the determined geographical track to a coordinate system display while the aircraft is taxiing. | 12-12-2013 |
20130335571 | VISION BASED TARGET TRACKING FOR CONSTRAINED ENVIRONMENTS - A system and method includes obtaining and storing video frames from a series of video frames on a computer readable storage device, calculating probability estimates for target locations in each frame for targets in a constrained environment, and determining candidate target locations in each frame. | 12-19-2013 |
20140266680 | System and Method of Anomaly Detection with Categorical Attributes - A method and apparatus where the method includes detecting a plurality of events related to the activities of users within a security system wherein the events are defined by a plurality of attributes, wherein at least one attribute is categorical and wherein a data distance between events is a function of event attributes, evaluating the detected events using a density based anomaly detection method f(r), where r is a size of a neighborhood around a data point, comparing a value of the evaluated expression with a margin threshold value (msg(r)) and setting an alarm upon detecting that the value exceeds the threshold value. | 09-18-2014 |
20140266683 | SYSTEM AND METHOD OF ANOMALY DETECTION - A method and apparatus wherein the method includes detecting a plurality of events within a security system, evaluating the events using one of a first expression defined by Σ | 09-18-2014 |
20150066903 | SECURITY SYSTEM OPERATOR EFFICIENCY - Systems and methods for increasing an efficiency of an operator of a security system are discussed generally herein. A system can include a memory including ontology data saved thereon, the ontology data can define interrelationships between a scanner associated with access to a room of an area under surveillance, a camera with a field of view at least partially overlapping a footprint of the room, an identifier configured to be scanned by the scanner and associated with a person, and a security policy including one or more predefined conditions, which when satisfied, indicate when a security threat exists, the security policy includes a response an operator can perform if the conditions are satisfied, and the system can include a query module configured to receive a query and search the ontology data and temporal and spatial data associated with the area under surveillance in response to receiving the query. | 03-05-2015 |
20150066963 | STRUCTURED EVENT LOG DATA ENTRY FROM OPERATOR REVIEWED PROPOSED TEXT PATTERNS - A method of structured event log data entry. A structured event log data entry algorithm is provided including a text parser which utilizes stored information including a vocabulary for a human operated process defining classes representing structured information including structured events and structured devices, linguistic patterns for plain text analysis, and relationships between the classes. A pattern proposer utilizes stored linking relations establishing links between the classes and the linguistic patterns. An operator in the system records a plain text event log entry describing an event that occurred in the system into a memory accessible by a processor implementing the algorithm. The text parser implements automatic pattern evaluating the log entry for a matching of any portion of any of the linguistic patterns. The pattern proposer presents a proposed structured event log entry including a structured event and/or structured device for the operator to review whenever the matching is successful. | 03-05-2015 |