Technique for providing security

ABSTRACT

A method for reducing violence within crowded venues is provided. The method includes reading license plates of vehicles passing into entry ports of a parking area, and capturing facial images of persons seeking admission to the venue. A computer compares such license plates to a database of vehicle license plates associated with persons with past histories of violence. A computer also compares captured facial images to a database of facial data for persons with past violent histories. Upon detecting a match, the computer creates an alert presented to law enforcement officers to facilitate detention of such persons for investigation. Information recorded on entry tickets is scanned and saved together with the facial image of the ticket holder. If a violent act occurs, cameras within the venue capture facial images of participants. The computer matches such participants to stored identifying data to assist in the identification and apprehension of such persons.

CROSS-REFERENCE TO RELATED APPLICATION(S)

This is a continuation application of U.S. patent application Ser. No.15/716,355 filed on Sep. 26, 2017, which issued as U.S. Pat. No.10,248,849 on Apr. 2, 2019; which is a continuation application of U.S.patent application Ser. No. 14/445,915 filed on Jul. 29, 2014, whichissued as U.S. Pat. No. 9,773,161 on Sep. 26, 2017; and which is acontinuation application of U.S. patent application Ser. No. 13/451,240filed on Apr. 19, 2012, which issued as U.S. Pat. No. 8,792,677 on Jul.29, 2014, the entire disclosure of each of which is hereby incorporatedby reference.

TECHNICAL FIELD

The present disclosure relates generally to sporting events and otherlarge venue gatherings, and more particularly, to a method for improvingthe security and safety of persons attending such events.

BACKGROUND

Sporting events, such as college and professional level baseball,basketball, and football games, are often attended by tens of thousandsof sporting fans. While almost all fans are good-natured, and simplycome to have a good time cheering-on their favorite teams, there havebeen numerous occasions when persons in attendance become rowdy. Fanviolence continues to challenge the efforts of venue security staff andlocal police to protect patrons at sporting venues. For example, inAugust 2011, a fight broke out among fans attending a pre-seasonfootball game between the Oakland Raiders and the San Francisco 49ersheld at Candlestick Park, resulting in a fistfight in the stands, and asevere beating in a restroom; two shootings were later reported in theparking lot of the stadium. Recently, a legislator in the State ofCalifornia proposed legislation making it a misdemeanor for anyone addedto a “ban list” from attending a professional sporting event held withinthe State of California.

Fan violence has led to serious injuries, which cause some fans toquestion whether sports stadiums are safe for themselves and theirfamilies. Such incidents also result in increased costs to team ownersand stadium operators for additional insurance, litigation fees, andexpanded police and security presence. In turn, these increased costsare often passed along to loyal fans in the form of increased ticketprices, negatively impacting attendance and sales. Incidentally, theaforementioned problems are not limited to sporting events. The sameconcerns arise during large rock music concerts and other largeentertainment venues where crowds of fans gather.

While the problems posed by fan violence are clearly recognized, thepolice and security officials whose duty it is to maintain order havenot been able to make optimum use of available technologies to deal withsuch problems, and have, instead, been relying primarily on outdated,reactive tactics. Currently, efforts used to counter fan violence relyupon the visible presence of police and security staff interspersedthroughout the stadium to deter such incidents, and to detect andrespond to fan violence after it happens.

There are some sporting venues which require fans to pass through metaldetectors to screen out obvious weapons. In addition, some venuesinclude video cameras and recording systems to monitor or recordhigh-traffic areas of a stadium. Even when such video images aremonitored in real time, the person watching such video images cannotjudge, before the fact, whether persons being observed have violenttendencies. It is only when something appears out of the ordinary, aswhen a violent act is already in progress, that any action is taken.

Apart from conventional fan violence, our post 9-11 world also requiresteam owners and stadium operators to be consider terror attacks bysuicidal fanatics. Fears that a terrorist might strike at a sportingevent, where large crowds are gathered, are a genuine concern. Securitypersonnel routinely inspect backpacks and large purses of fans uponentry, but the identity of those fans is an unknown.

As should be apparent, current security measures employed at sportingvenues are not pro-active. In particular, they do not includesignificant operations to exclude from the venue persons who are likelyto be violent and/or dangerous.

Accordingly, it is an object of the present disclosure to make sportingvenues safer for attending fans.

It is another object of the present disclosure to reduce incidents ofphysical injuries to sporting fans as a result of violent acts of otherfans.

It is still another object of the present disclosure to reduce costsborne by team owners and stadium managers in order to provide areasonably acceptable level of safety and security.

Yet another object of the present disclosure is to provide a method ofdetecting, and excluding from the venue, persons with past histories ofviolent tendencies, preferably before they enter the venue.

A further object of the present disclosure is to assist and aid policeand venue security personnel in identifying and detaining person whoactively engage in violent acts within the venue during an event.

These and other objects of the disclosure will become more apparent tothose skilled in the art as the description of the present disclosureproceeds.

The above information is presented as background information only toassist with an understanding of the present disclosure. No determinationhas been made, and no assertion is made, as to whether any of the abovemight be applicable as prior art with regard to the present disclosure.

SUMMARY

Aspects of the present disclosure are to address at least theabove-mentioned problems and/or disadvantages and to provide at leastthe advantages described below. Accordingly, an aspect of the presentdisclosure is a method for reducing violent acts during an event held ina crowded venue, e.g., a sporting event held in a crowded stadium fullof spectators.

A method according to an embodiment of the present disclosure includesthe operation of compiling a computerized database of facial images ofpersons who are known to have been violent during similar events in thepast. In practicing one aspect of such method, spectators must enterinto the venue through one or more entry ports. A photographic facialimage is formed for each person who approaches the entry port. Acomputer is used to compare the photographic image of each personseeking entry to the facial images that were already compiled in thecomputerized database; if the computer detects a likely match betweenthe facial image of a person about to enter the venue with a facialimage already compiled in the computerized database, the computergenerates an alert. A video display is provided proximate to the entryport for use by a law enforcement officer. A law enforcement officer isstationed proximate to the video display as spectators are entering intothe venue. In those instances where the computer has detected a likelymatch between the photographic image of a person seeking entry and afacial image of a person known to have been violent during similarevents in the past, information is displayed to the law enforcementofficer on the video display. The information displayed to the lawenforcement officer alerts the law enforcement officer that a match hasbeen detected between a person seeking entry and a person known to havebeen violent during similar events in the past.

Preferably, a venue security staffer is positioned near the entry port,and near the aforementioned law enforcement officer. The law enforcementofficer, after viewing an alert, can then advise the venue securitystaffer that a person seeking entry is known to have been violent duringsimilar events in the past. The venue security staffer can then decidewhether or not to allow such person to attend the event in accordancewith the policies of the particular venue.

In practicing the present disclosure, the computerized database ofcompiled facial images of persons who are known to have been violent inthe past may be expanded to include facial images of persons subject tooutstanding arrest warrants. In this case, a law enforcement officerstationed near the entry port is promptly alerted to the detection of alikely match between the photographic image of the ticket holder and afacial image of a person known to have an outstanding warrant forarrest. The law enforcement officer can then detain such person toconfirm whether he or she is, in fact, is the same person whose arrestis being sought.

Preferably, entry tickets are distributed to persons wishing to attendthe event before such persons enter into the venue. This may includetickets issued in advance to season-ticket holders as well as ticketspurchased individually “on-line” or just outside the venue. In thiscase, a photographic image is formed of the face of each ticket holderseeking to enter into the venue before each such ticket holder presentshis or her ticket for entry. Preferably, each such ticket is received,either temporarily or permanently, by a ticket-taker stationed at theentry port. This “ticket-taker” could be an actual person, oralternatively, an automated ticket-taking machine.

In either case, the “ticket-taker” is preferably provided with anelectronic ticket reader for creating data signals that are based uponinformation recorded on each such ticket. This electronic ticket readermight, for example, be a handheld “scanning gun” operated by a humanticket taker; a scanning station provided near a human ticket taker inwhich the ticket-taker inserts each ticket; or an electronic ticketreader included within an automated ticket-taking machine. Theinformation recorded on the ticket might include, e.g., a seatassignment for the ticket holder, and possibly even the name of theperson who paid for such ticket. These data signals created by theelectronic ticket reader are preferably stored in an electronic memory.

Preferably, the method of the present disclosure also includes storing,in an electronic memory, the photographic images formed of each ticketholder who approached the entry port. The storage of the photographicimage of each ticket holder in electronic memory may be indexed to thestored data signals derived from the ticket presented by the same ticketholder; in this way, the data signals created by the electronic ticketreader, which includes seat assignment data, can easily be associatedwith the facial image of the person assigned to such seat. Were anincident of fan violence to later break out, it may be advantageous toknow what seat was assigned to a particular spectator having aparticular facial image.

Yet another aspect of the present disclosure relates to reducing violentacts at venues which provide one or more parking areas to accommodatevehicles driven by spectators wishing to attend such event. Inpracticing this aspect of the disclosure, a computerized database iscompiled of vehicle license plates associated with persons who are knownto have been violent during similar events in the past. One or moreentry ports are provided for vehicles to enter into the venue parkingarea. A license plate reader is provided at each such entry port forreading the license plate associated with each vehicle entering into theparking area; depending upon the locale, such license plate readers mayeither be directed toward front-end mounted license plates, rear-endmounted license plates, or both. A computer is used to compare thelicense plate of each vehicle seeking entry to the parking area withlicense plates compiled in the computerized database to detect a match.A law enforcement officer is stationed proximate to the parking area.Upon detection of a likely match between the license plate of a vehicleentering the parking area and a vehicle associated with a person knownto have been violent during similar events in the past, an alert isprovided to the law enforcement officer. Preferably, this alert iscommunicated by providing a video display proximate to the lawenforcement officer, and displaying on the video display the licenseplate, vehicle description, and information relating to a personassociated with such vehicle.

To further increase the effectiveness of the aforementioned method,vehicles parked in areas surrounding the venue may also be included.Preferably, a mobile license plate reader is provided in or upon a lawenforcement vehicle. By way of example, the mobile licenses plate readermay include a camera mounted proximate the roof of the law enforcementvehicle. A law enforcement officer drives such law enforcement vehiclealong streets neighboring the venue while directing the mobile licenseplate reader at license plates of parked vehicles being passed by thelaw enforcement vehicle. A computer is used to compare the license plateof each vehicle parked along such neighboring streets with licenseplates compiled in the computerized database to detect a match. If alikely match, between the license plate of a vehicle parked on aneighboring street and a vehicle associated with a person known to havebeen violent during similar events in the past, is detected, an alert iscreated to warn the law enforcement officer driving such law enforcementvehicle of the likely presence of such person near the venue.

In practicing the present disclosure, the computerized database ofcompiled vehicle license plates associated with persons who are known tohave been violent during similar events in the past may be expanded toinclude license plates of vehicles which have been reported to bestolen. In this way, a law enforcement officer, either stationed withinthe venue parking area or driving along surrounding streets, is alertedto the detection of a likely match between a license plate of a vehiclethat has entered the parking area, or which is parked nearby, and alicense plate of a vehicle which has been reported to be stolen. The lawenforcement officer can then attempt to detain the occupants of suchvehicle to investigate whether they should be arrested.

Similarly, the computerized database of compiled vehicle license platesassociated with persons who are known to have been violent duringsimilar events in the past may be expanded to include license plates ofvehicles license plates of vehicles associated with persons who aresubject to an outstanding arrest warrant. In this way, a law enforcementofficer, either stationed within the venue parking area or driving alongsurrounding streets, is alerted to the detection of a likely matchbetween a license plate of a vehicle that has entered the parking area,or which is parked nearby, and a license plate of a vehicle associatedwith a wanted person. The law enforcement officer can then attempt todetain the occupants of such vehicle to investigate whether they shouldbe arrested.

In practicing yet another aspect of the present disclosure, a method isprovided for locating unruly attendees during an event held in a crowdedvenue. Tickets are distributed to persons wishing to attend the event;each such ticket includes information identifying a seat assigned to theholder of such ticket. One or more entry ports are provided for personsholding a ticket to enter into the venue. A photographic image is formedof each ticket holder seeking to enter into the venue before each suchticket holder is permitted entry. Also, each ticket presented by eachticket holder at the entry port is electronically scanned, includinginformation identifying the seat assigned to such ticket holder. Acomputerized database is used to store the photographic image of eachticket holder coming through the entry port, along with the seatassigned to each such ticket holder.

When a violet incident breaks out among attending spectators during theevent, a facial image of the unruly attendee is captured; this ispreferably accomplished by providing one or more cameras having atelephoto lens inside the crowded venue, and directing such venuecameras at the unruly attendee to capture his or her facial image. Acomputer is then used to compare the captured facial image of the unrulyattendee with the photographic images stored in the computerizeddatabase to detect a likely match. Venue security personnel are thenalerted to the detection of a likely match between the captured image ofthe unruly attendee to a photographic image stored in the computerizeddatabase. Venue security personnel are also provided seat assignmentinformation for such unruly attendee.

Preferably, the aforementioned method of locating unruly attendeeswithin the venue includes compiling a computerized database of facialimages of persons who are known to have been violent during similarevents in the past. A computer is then used to compare the capturedfacial image of an unruly attendee to the facial images compiled in thecomputerized database to detect a likely match. One or more lawenforcement officers are stationed at the venue when a crowded event isbeing hosted. If a match is detected, an alert is provided to the lawenforcement officer, alerting the law enforcement officer to the likelymatch between the unruly attendee and a person known to have beenviolent during similar events in the past.

Once again, the compiled computerized database described in thepreceding paragraph may be expanded if desired to include facial imagesof persons who are subject to an outstanding arrest warrant. Uponoccurrence of a violent incident, the computer quickly compares thecaptured facial image of an unruly attendee to the facial imagescompiled in the computerized database to detect a likely match. A lawenforcement officer is then alerted if there is a likely match betweenan unruly attendee and a person subject to an outstanding warrant forarrest.

Alternatively, the compiled computerized database may be expanded ifdesired to include facial images of persons who have obtainedidentification documents from governmental authorities. Upon occurrenceof a violent incident, the computer quickly compares the captured facialimage of an unruly attendee to the facial images compiled in thecomputerized database to detect a likely match. A law enforcementofficer stationed within the venue is then alerted if there is a likelymatch between an unruly attendee and a person who has obtained agovernment-issued identification document. The law enforcement officeris thereby advised of the identity of the person to be apprehended.

Other aspects, advantages, and salient features of the disclosure willbecome apparent to those skilled in the art from the following detaileddescription, which, taken in conjunction with the annexed drawings,discloses various embodiments of the present disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certainembodiments of the present disclosure will be more apparent from thefollowing description taken in conjunction with the accompanyingdrawings, in which:

FIG. 1 is a perspective view of a stadium parking lot entry gateequipped with overhead cameras to capture and “read” license plates ofvehicles that enter according to an embodiment of the presentdisclosure.

FIG. 2 is a perspective view of a police car driving past vehiclesparked on public streets or in private lots near a stadium and equippedwith a roof-mounted license plate reader camera to capture license plateinformation for parked vehicles according to an embodiment of thepresent disclosure.

FIG. 3 is a perspective view of fans approaching a fan entry gateequipped with a digital camera imaging each fan as they approach theticket taker, a ticket scanner to scan each ticket, and a video monitorfor a law enforcement officer according to an embodiment of the presentdisclosure.

FIG. 4 is a perspective view from inside a stadium, and illustrating oneof several stadium cameras equipped with a telephoto lens for capturingimages of any fans participating in spontaneous fan violence accordingto an embodiment of the present disclosure.

FIG. 5 is a close-up view of the image provided by the camera of FIG. 4,and showing people engaged in a fight in the middle of a sports stadiumaccording to an embodiment of the present disclosure.

FIG. 6 is a block diagram showing the basic components of a system forimplementing the method according to an embodiment of the presentdisclosure.

FIG. 7 is a simplified flowchart illustrating operations performed tomonitor vehicle license plates scanned by fixed and mobile license platereaders according to an embodiment of the present disclosure.

FIG. 8 is a simplified flowchart showing operations performed as eachfan enters the stadium through a fan entry gate according to anembodiment of the present disclosure.

FIG. 9 is a simplified flowchart showing the operations performed if andwhen an instance of spontaneous fan violence occurs according to anembodiment of the present disclosure.

Throughout the drawings, it should be noted that like reference numbersare used to depict the same or similar elements, features, andstructures.

DETAILED DESCRIPTION

The following description with reference to the accompanying drawings isprovided to assist in a comprehensive understanding of variousembodiments of the present disclosure as defined by the claims and theirequivalents. It includes various specific details to assist in thatunderstanding but these are to be regarded as merely exemplary.Accordingly, those of ordinary skill in the art will recognize thatvarious changes and modifications of the various embodiments describedherein can be made without departing from the scope and spirit of thepresent disclosure. In addition, descriptions of well-known functionsand constructions may be omitted for clarity and conciseness.

The terms and words used in the following description and claims are notlimited to the bibliographical meanings, but, are merely used by theinventor to enable a clear and consistent understanding of the presentdisclosure. Accordingly, it should be apparent to those skilled in theart that the following description of various embodiments of the presentdisclosure is provided for illustration purpose only and not for thepurpose of limiting the present disclosure as defined by the appendedclaims and their equivalents.

It is to be understood that the singular forms “a,” “an,” and “the”include plural referents unless the context clearly dictates otherwise.Thus, for example, reference to “a component surface” includes referenceto one or more of such surfaces.

Referring to FIG. 1, a sporting event stadium 20 includes a parking area22 for sports fans to park their vehicles when attending a sportingevent. Vehicles entering into parking area 22 pass through one ofseveral entry ports; in FIG. 1, entry gate 24 includes a pair ofvertical uprights 26 and 28, and an elevated crossbeam 30 extendingacross the upper ends of uprights 26 and 28. If desired, gate 24 mayinclude a concrete lane divider, or median, 32 to guide enteringvehicles 34 and 36 to the right or left of median 32. While only oneparking area 22 is shown in FIG. 1, the stadium may include two or moreareas to accommodate vehicles driven by spectators wishing to attendsuch event.

As indicated above, one aspect of the present disclosure is to detectthat a vehicle associated with a person known to have violent tendencieshas entered the stadium parking area 22. Toward this purpose, cameras 38and 40 are mounted atop elevated crossbeam 30, and are directed tovisualize the front end of vehicles, like vehicles 34 and 36, as theypass through entry gate 24. Cameras 38 and 40 are preferably licenseplate readers of the type commercially available from PIPS TechnologyInc. of Knoxville, Tenn., as the Model No. P382 Integrated ALPR System.Such license plate reading systems include dual lens cameras that formboth a high-resolution monochrome image of the license plate along withan integrated color image of the overall vehicle. These cameras mayinclude onboard pulsed infrared LED's which illuminate the licenseplates being imaged even after sundown. These camera systems cantransmit data over either wireless or wired networks. They areweb-enabled and IP addressable. They can detect the presence of alicense plate for triggering a capture of the information on the licenseplate, and they also include optical character recognition (OCR) engineswhich automatically convert imaged characters on a license plate intocorresponding data characters.

In some jurisdictions, only front-mounted license plates are mandatedfor vehicles, in which case, cameras 38 and 40 are sufficient. In otherjurisdictions, only rear-mounted license plates are required; in thatcase, license plate cameras 42 and 44 may be provided for imaging rearlicense plates, for example, the rear license plates mounted on vehicles46 and 48, respectively. In still other jurisdictions, vehicles mustdisplay license plates both from the front and the rear of the vehicle,in which case cameras 38, 40, 42 and 44 may all be in use as vehiclesenter into parking gate 24. While license plate cameras 38, 40, 42, and44 are all shown in FIG. 1 as being mounted in an elevated position uponcrossbeam 30, these license plate cameras could also be mounted justabove ground level, if desired.

Reading license plates of vehicles entering the stadium parking area canincrease the safety of the parking area itself, whether or not theoccupants of a vehicle actually plan to enter the stadium proper. It isnot unusual for people to park in the stadium parking area without anyintention of buying a ticket or entering the stadium. Often people bringrecreational vehicles to conduct “tailgate” parties during which alcoholand/or drugs are abused; others come to “scalp” tickets or sellmerchandise that is unlicensed and/or counterfeit. Thus, reading licenseplates of vehicles entering the parking stadium, and checking suchlicense plates against the fusion center database, can reduce the numberof unsafe incidents within the stadium parking area.

As also indicated above, the reading of license plates is not limited tothe stadium parking lot itself, and can be extended to neighboringstreets and/or surrounding private parking areas. In this regard, FIG. 2shows a police car 50 equipped with a mobile license plate readingcamera 52. Camera 52 is preferably mounted to the exterior of police car50, although a handheld camera may also be used. Camera 52 may be of thetype commercially available from PIPS Technology Inc. of Knoxville,Tenn., as the automated license plate recognition (ALPR) Slate™ camerasystem. These license plate-reading cameras have a compact, low-profiledesign that can be mounted to the roof of police car 50, just belowconventional police vehicle emergency lightbars. The Slate camerasincorporate infrared illumination, together with an infrared camera, forlicense plate imaging, as well as a color camera to provide a vehicleoverview image. The infrared light source provides adequate illuminationfor the infrared-sensitive camera irrespective of ambient conditions,yet the illuminating flash, or beam, of light is not visible to thehuman eye. These cameras also include OCR engines for rapidly convertinglicense plate images into readable characters.

While FIG. 2 shows camera 52 being mounted on the right side of policecar 50 and directed toward rear-mounted license plates of vehicles 54and 56 parked to the right side of police car 50, mobile camera 52 mayalso be mounted on the left side of police car 50 and directed towardfront-mounted license plates of vehicles parked to the left side ofpolice car 50. Mobile camera 52 may also be directed rearwardly, ratherthan forwardly, to image front-mounted license plates of vehicles parkedto the right of police car 50 within those jurisdictions requiringlicense plates to be secured to the front-end of the vehicle.Alternatively, PIPS Technology Inc. also supplies cameras that may bemounted on the rear deck of a police vehicle directed laterally awayfrom police car 50 for imaging license plates of vehicles parkedrelatively perpendicularly to the path driven by police car 50.

Mobile camera 52 may use an RS232 communication interface fortransmitting data to a mobile ALPR processor (not shown), such as theSUPEREX® III mobile ALPR processor available from PIPS Technology Inc.of Knoxville, Tenn. The mobile ALPR processor is preferably mounted inthe trunk of police car 50, and includes a dedicated processorengineered specifically for vehicle environments. This processorincludes an input terminal for coupling with a GPS receiver to recordgeographical position signals synchronously with recorded license platedata. While not shown in FIG. 2, police car 50 preferably includes avideo display monitor mounted within view of the driver for displayingalerts described in greater detail below. In this regard, a simplenetwork cable can connect the mobile ALPR processor to a laptop, MobileData Computer (MDC), or tablet PC running PAGIS™-brand in-car systemsoftware available from PIPS Technology Inc. The mobile ALPR processorcan also exchange data over the Internet, or over a private network, viaa wireless modem.

Both the fixed-base license plate-reading cameras 38, 40, 42 and 44 ofFIG. 1, and the mobile license-plate reading camera 52 of FIG. 2 readinformation appearing on a license plate associated with each vehicleviewed by such cameras. The ALPR license-plate reading camera systemsuse “frame grabber” technology to capture a snapshot of the vehicle,detect the location of the license plate within such image, and thenextract the characters appearing on the license plate for conversioninto simple textual characters using optical character recognition (OCR)software. They are capable of “reading” thousands of license plates perhour.

The law enforcement officer operating police car 50 drives police car 50along streets neighboring the stadium while directing the mobile licenseplate reader camera 52 at license plates of vehicles parked along suchneighboring streets; this may include driving alongside private parkinglots located near the stadium for imaging license plates that may beviewed from the public street. The aforementioned fixed-base and mobilelicense plate-reading cameras convert imaged license plates into textcorresponding to the letters and numbers displayed on such licenseplates. This text is then transmitted to a fusion center, in a mannerdescribed in greater detail below.

At the aforementioned fusion center, a computerized database is compiledof vehicle license plates associated with persons who are known to havebeen violent during similar events in the past; a computer in the fusioncenter compares the license plate of each vehicle seeking entry to theparking area with license plates compiled in the computerized databaseto detect a match. Likewise, the computer in the fusion center comparesthe license plate of each vehicle parked in areas neighboring thestadium with license plates compiled in the computerized database todetect a match.

During sporting events, law enforcement officers are stationed within,or proximate to stadium parking area 22. If a vehicle entering parkinggate 24 (or any of the other parking gates) bears a license plate thatmatches a vehicle associated with a person known to have been violentduring similar events in the past, or a person known to have violenttendencies, the law enforcement officers stationed in or near parkingarea 22 are alerted to such fact, including the license plate number,the appearance of the vehicle, and information identifying personsassociated with such vehicle who have a past history of violence.Preferably, such information is displayed to law enforcement officers byproviding a video display proximate each such law enforcement officerfor displaying, on the video display, the license plate, vehicledescription, and information relating to one or more persons associatedwith such vehicle. The aforementioned display may include the videotouchscreen display of a conventional “smartphone” issued to lawenforcement officers. Such law enforcement officers may then interceptsuch vehicle in parking area 22 to determine any of such violent personsare present; such law enforcement officers may also contact venuesecurity personnel to determine whether or not such person is eligiblefor attending the present event.

If desired, such alerts may be expanded to include notice of licenseplates of vehicles which have been reported to be stolen. Upon receivingsuch an alert, law enforcement officers assigned to stadium parking area22 may locate the vehicle in question, and detain its occupants forquestioning to determine if they are responsible for the theft of thevehicle. Likewise, such alerts may be expanded to include license platesof vehicles associated with persons who are subject to an outstandingwarrant for arrest. Upon receiving such an alert, law enforcementofficers assigned to stadium parking area 22 may locate the vehicle inquestion, and identify its occupants to determine whether the personsubject to a related arrest warrant is present within the vehicle.

Similarly, during sporting events, a law enforcement officer is assignedto drive police car 50 along neighboring streets surrounding stadium 20,and to image license plates of vehicles (54/56) parked along suchstreets. If any such vehicle bears a license plate that matches avehicle associated with a person known to have been violent duringsimilar events in the past, or a person known to have violenttendencies, nearby law enforcement officers are alerted to such fact,including the license plate number, the appearance of the vehicle, andinformation identifying persons associated with such vehicle who have apast history of violence. Preferably, such information is displayed tolaw enforcement officers, including the officer driving police car 50,by providing a video display proximate each such law enforcement officerfor displaying, on the video display, the license plate, vehicledescription, and information relating to one or more persons associatedwith such vehicle. Such law enforcement officers may then locate andinvestigate such vehicle to determine whether any of such violentpersons are present; such law enforcement officers may also contactvenue security personnel to keep a watchful eye for such persons in casethey attempt to enter the stadium.

As in the case of the fixed cameras monitoring the parking gates, thealerts provided in response to license plates scanned by police car 50may be expanded to include notice of license plates for stolen vehicles.Upon receiving such an alert, the officer driving police car 50 maylocate the vehicle in question, monitor the vehicle, detain anyoccupants who are still present, and warn other nearby officers toapprehend persons returning to the vehicle; a warning might also becommunicated to venue security personnel to keep watch for personssuspected of stealing such vehicle. In addition, if such alerts areexpanded to include license plates of vehicles associated with personswho are subject to an outstanding warrant for arrest, then the officerdriving police car 50 may locate the vehicle in question, monitor thevehicle, identify any occupants still present, warn other nearbyofficers to apprehend any persons returning to the vehicle, and identifyand arrest any such persons subject to an outstanding arrest warrant.The driver of police car 50 could also contact venue security personnelto keep watch for such persons in case they attempt to enter thestadium.

Referring now to FIG. 3, an entry port 60 is provided for persons toenter into stadium 20 of FIG. 1. Entry port 60 may include guide rails62 and 64 for guiding, or channeling, persons into a single-file linewhile waiting to be admitted. As shown in FIG. 3, a first person 66awaits entry into the stadium just ahead of a turnstile 68. Person 66 isfollowed by persons 70 and 72. Each of persons 66, 70 and 72 is holdingan entry ticket. In some cases, these tickets may have been mailed out,or otherwise distributed, to the ticket holders in advance of the event.In other cases, such tickets may have been claimed at a separate“will-call” booth just outside the stadium. In still other cases, suchtickets may have been purchased from a ticket booth just outside thestadium.

Each person entering through entry port 60 is greeted by a venuesecurity ticket-taker 74 at turnstile 68. A facial imaging camera 76 issupported near turnstile 68 and is directed toward persons approachingturnstile 68 to form a photographic image of each person who approaches.Facial imaging camera 76 forms a photographic image of each ticketholder seeking to enter into stadium 20 through entry port 60 beforeeach such ticket holder presents his or her ticket for entry. Camera 76is a component of a facial recognition system which captures facialimages of persons seeking entry. The captured facial images aretransmitted to a computer for comparison to a database of stored facialimages. Preferably, the facial images stored in the database are firstconverted into modeling data derived from actual facial images, ofpersons who are known to have been violent during similar events in thepast. This modeling data requires less storage space in the databasethan a conventional photographic computer image. This database may alsoinclude stored facial images (or data encoded from facial images) ofpersons who are subject to an outstanding warrant for arrest.

One such facial recognition system which has been successful in the pastis commercially available from i2 Inc. of McLean, Va. under the brandname COPLINK®, which includes a face recognition module called “FaceMatch”. While the particular algorithm used by the Face Match module isproprietary, i2 Inc. advises that its technology uses specific facialelements as anchor points within its proprietary 3D surface model of theface. The Face Match algorithm uses mathematical techniques to fit athree dimensional model of a human face on top of a two dimensionalimage. The result of applying such algorithm is referred to as an EncodeArray stored in binary format. An Encode Array is generated for everyfacial image stored in the compiled database.

Referring to FIG. 3, each facial image captured by camera 76 istransmitted to the aforementioned fusion center for real-time analysis.Face Match refers to the sampled facial image that is to be analyzedagainst the previously compiled database as the “probe” image. The probeimage submitted to the Face Match module can be in any one of thecommonly-used photographic image formats, including JPG, JPE, TIF, andBMP. If an image is presented that includes two or more facial images,the Face Match module will acquire the most dominant face. Facial imagespresented for analysis may be somewhat tilted to the right or left, solong as both of the person's eyes are visible. In order to compare theprobe facial image to those images compiled in the database, the FaceMatch module first converts the probe image into an Encode Array, usingthe same algorithm that was used to create Encode Arrays for all of theimages stored in the database.

Within the aforementioned fusion center, law enforcement officialscompile a computerized database of facial images, or more accuratelyEncode Arrays, of persons who are known to have been violent duringsimilar events in the past. A computer within the fusion center compareseach probe facial image of each person seeking entry into the stadium tothe facial images (i.e., the Encode Arrays) already compiled in thecomputerized database to detect a likely match. The Face Match module iscapable of comparing the probe image to approximately 10,000 storedfacial images in as little as one second. If a match is detected, thefusion center generates an alert.

One aspect of the present disclosure relates to the ability to storefacial images of persons entering the stadium with other information,including the seat assigned to such person. As noted above, tickets aredistributed to persons wishing to attend the event before such personsactually enter into stadium 20. Each seat provided inside stadium 20,and intended for use by a spectator, is uniquely identified (e.g., bySection, Row, and Seat Number), and each ticket identifies a particularseat reserved for use by the corresponding ticket holder. Ticket-taker74 receives and inspects the ticket of each person seeking passagethrough entry port 60. In some instances, ticket-taker 74 may take eachticket and retain at least a portion of the ticket presented by eachticket holder.

Information is printed on each ticket. At a minimum, each such ticketincludes seat assignment information designating a unique locationwithin the stadium where the holder of the ticket is permitted to sit.For tickets sold and/or distributed in advance of the event, suchtickets may also include the name, and perhaps other relatedinformation, identifying the ticket holder. Seat assignment informationand/or ticket holder identifying information is preferably recorded onthe ticket as both conventional text, and in bar code format or as amagnetically-encoded stripe, to facilitate rapid optical/electronicscanning of the information recorded on the ticket. Ticket-taker 74 mayuse a hand-operated scanner 76, or a free-standing scanner unit 78, toscan each ticket and derive the information recorded thereon. While FIG.3 illustrates a human ticket-taker 74, those skilled in the art willappreciate that an electronic ticket reader may be provided insteadproximate to turnstile 68 for creating data signals based uponinformation recorded on each such ticket. If desired, a successful scanof the information recorded on the ticket can be made a condition ofunlocking turnstile 68 so that the ticket holder may pass through.

The information scanned, or “read”, from each ticket is transmitted to acomputer database which stores both the facial image, captured by camera76, of the person who presented such ticket, and the information derivedfrom the corresponding ticket. The digitally-recorded facial image andthe scanned ticket information are indexed to each other in the computerdatabase.

Referring to FIG. 3, after passing turnstile 68, persons entering thestadium pass through a corridor 80 bounded by walls 82 and 84. A policeofficer 86 and a venue security staffer 88 are stationed at the back endof corridor 80. A video display 90 is provided proximate the back end ofcorridor 80 for use by police officer 86. Video display 90 is networkedto the aforementioned fusion center for displaying alerts to policeofficer 86. If the fusion center detects a likely match between a personpassing through corridor 80 and a person known to have been violent inthe past, the alert generated by the fusion center is displayed on videodisplay 90, along with the facial image, name, identifyingcharacteristics (e.g., tattoos, scars, etc.), past offender history,notices of outstanding warrants, terror risks, etc. Police officer 86may then take appropriate action, including detaining and/or arrestingsuch person, if he or she is the subject of an outstanding warrant orpresents a terror risk. If the alert is merely that the person has beenviolent in the past at similar events, but is not currently subject toarrest, police officer 86 may then advise venue security staffer 88 ofsuch past history. Venue security staffer 88 can then decide, perhapsafter consultation with stadium managers, whether the policies adoptedby the venue permit such person to be seated, or require that suchperson be escorted away from the stadium. While video display 90 isillustrated as a relatively large video monitor, those skilled in theart will appreciate that video display 90 could instead be the videotouchscreen display of a conventional “smartphone” issued to lawenforcement officers.

It should be noted that, while FIG. 3 only shows fans entering throughan entry port, facial recognition cameras may also be installed atticket booths and will-call boxes outside the stadium to alert a lawenforcement officer nearby that a match has been detected. In suchinstances, law enforcement officers and venue security staffersstationed just outside the stadium may then take appropriate action; ifsuch person is not immediately intercepted outside the stadium, lawenforcement officers stationed at entry ports can be alerted to be onthe watch for such person attempting to enter one of the entry ports.

It will be recalled that another aspect of the present disclosure is tolocate, identify, and help apprehend, unruly attendees during a crowdedevent. FIG. 4 shows spectators seated inside a portion of stadium 20 towatch a sporting event. All of such spectators entered into stadium 20through one of the entry ports, like that shown in FIG. 3. Thus, thefaces of all of such spectators were photographed as they approached theentry port. All of such spectators presented a ticket upon passagethrough the entry port indicating the seat assigned for such ticketholder. All of the facial images, and ticket information, gathered atsuch entry ports has been saved in an indexed fashion in a computerizeddatabase.

Referring to FIG. 4, a number of telephoto digital cameras 100 arestationed in secure areas of stadium 20. Each such camera 100 includes ahigh-powered telephoto lens 102 capable of focusing upon small groups ofspectators seated in stadium 20. Camera 100 is preferably supported upona swivel mount 104 for allowing camera 100 to be pivoted from side toside, as well as up and down. Camera 100 is operated by a venue securitystaffer, either directly or remotely, during the period of time duringwhich the sporting event is being conducted in stadium 20. If suchcameras are operated remotely, then they are provided with pan, tilt,and zoom drive systems to direct the camera toward a desired location inthe stadium where violence has broken out. Preferably, the operator ofcamera 100, and operators of similar cameras within stadium 20, cancommunicate with a central security command post to coordinate theefforts of such camera operators.

Should an outburst of violence erupt within stadium 20, venue securitypersonnel monitoring the particular section of stadium 20 in which suchoutburst arises notifies the central security command post. In turn, thecentral security command post notifies the operators of the telephotocameras 100 as to the section of stadium 20 in which violence haserupted. The operator of camera 100 then directs camera 100 toward thedesignated section of the stadium to photograph persons activelyparticipating in such disturbance. FIG. 5 is a close-up view of theimage provided by camera 100 in such an instance. Within FIG. 5, camera100 has provided facial images of two of the participants, 106 and 108.Similar telephoto cameras stationed at other parts of stadium 20 provideimages from different angles, and are able to provide facial images ofparticipants whose faces are turned away from camera 100 in FIG. 5.

Just as entry gate camera 76 in FIG. 3 provides facial images to thefusion center as fans enter stadium 20, so too, camera 100 providesfacial images to the fusion center of fans engaging in violent actswithin stadium 20. Just as the computer in the fusion center served tocompare facial images of incoming spectators to a database of personsknow to have engaged in violence in the past, in the case of violentoutbursts, the computer in the fusion center can quickly compare facialimages of trouble-making fans with facial images captured as such fansentered through entry port 60 to detect a match. Moreover, sinceinformation recorded on such person's entry ticket, including at leastthe seat assignment, was indexed in computer storage along with suchperson's facial image, the row and seat number, and possibly the name,of such violent fan, can be quickly retrieved. This information is thenprovided to law enforcement authorities and venue security staffers toaid in the identification and apprehension of the unruly attendee. Thisinformation can also be rapidly provided to venue security staffers andlaw enforcement officers stationed at stadium exit gates to help ensurethat offenders do not easily escape capture.

To further identify persons who are caught engaging in violence withinstadium 20 during a sporting event, the facial images of offenders thatare transmitted to the fusion center may be compared to an expandeddatabase of facial images maintained by government agencies, includingknown criminals, persons subject to an outstanding arrest warrant, aswell as non-criminal databases of persons who have obtainedidentification documents from governmental authorities, including, e.g.,motor vehicle driver license records. In this manner, the offenders maybe quickly identified to aid in their apprehension.

Turning to the block diagram of FIG. 6, fusion center 116 is a datacenter located remotely from stadium 20. Fusion centers were initiallyfounded in response to the terrorist attacks conducted on Sep. 11, 2001.Fusion centers are designed to share information and intelligencebetween federal, state, tribal, and local law enforcement agencies tobetter fight crime and terrorism. So-called “data fusion” facilitatesthe exchange of information from different sources, including homelandsecurity, law enforcement agencies and public safety departments, amongothers. Such sharing of information must, however, comply with federaland state laws that protect individual constitutional rights andprivacy.

In FIG. 6, fusion center 116 receives regular updates from lawenforcement agencies 118 regarding persons who have engaged in violentbehavior generally and/or who have a criminal past; these update includefacial images of such persons. Fusion center 116 processes such facialimages, using COPLINK software, to simplify such facial images to ahighly compact digital form in the manner explained above. Likewise,fusion center 116 receives regular updates regarding stolen vehicles andrelated vehicle license plates.

In FIG. 6, fusion center 116 is also shown communicating with HomelandSecurity Center 120. Homeland Security Center 120 is federally-operatedand maintains its own closely-guarded database of information relatingto national security issues. The amount of information provided byHomeland Security Center 120 to fusion center 116 is likely to beclosely controlled. On the other hand, information received by fusioncenter 116 may be passed on to Homeland Security Center 120 and/or aHomeland Security official in real time. Homeland Security center 120can do its own search, using its own guarded database, on data cominginto fusion center 116 to detect the presence of persons and/or vehicleswhich relate to a potential national security interest. In such aninstance, Homeland Security Center 120 can signal fusion center 116 withits own alerts, which fusion center 116 may then convey to local policepatrolling the stadium.

In addition, fusion center 116 is coupled to a national fan violencedatabase 122. Fan violence database 122 stores facial image data,related identification, and vehicle license plate information for fanswho have engaged in violence in the past while attending sportingevents, or other activities held in crowded venues. As new acts ofviolence arise, fusion center 116 updates fan violence database 122 toadd information regarding new and repeat offenders.

Fusion center 116 is coupled to each of one or more participatingstadiums and/or venues over a high speed Internet Gateway 110. At thestadium-end of high speed Internet Gateway 110, a number ofseparately-addressable input and output components are networked tofusion center 116. For example, license plate reader cameras 42 and 44of FIG. 1 send license plate information over Gateway 110 to fusioncenter 116. Similarly, mobile license plate reader camera 52 of FIG. 2sends license plate information, via a radio modem 112, over Gateway 110to fusion center 116. Fusion center 116, in turn, processes such licenseplate information, compares it to license plates for vehicles associatedwith those who have engaged in violence, persons who are subject toarrest warrants and/or stolen vehicles, and transmits alerts to videomonitors 114 (installed either within the stadium parking area 22 shownin FIG. 1, or within police car 50 in FIG. 2) to signal that a violentfan may be trying to enter the stadium, or that a wanted criminal ispresent.

Likewise, entry port cameras 76/176 are coupled through Gateway 110 tofusion center 116 to transmit facial images of fans seeking entry intostadium 20. Fusion center 116 compares such facial images to facialimage data of known offenders, and if a likely match is detected, fusioncenter 116 transmits an alert for display on stadium-based videomonitors 90 to advise of such match. Ticket scanners 76/176 are alsocoupled to fusion center 116 via Gateway 110 for forwarding seatassignment data, and possibly identification information, scanned fromthe ticket presented by each such fan at entry gate 60. Fusion center116 can store such scanned ticket data indexed to facial image data forthe fan who presented such ticket; should an act of violence laterbreakout, fusion center 116 can quickly find and retrieve data storedfor such fan.

Additionally, stadium telephoto facial cameras 100/200 (see FIG. 4) arecoupled to fusion center 116 over Gateway 110. If an act of violencebreaks out, fusion center 116 can quickly compare captured facial imagesof the offenders to facial images of fans admitted that day to helpidentify and locate such offenders. Moreover, fusion center 116 can alsocompare captured facial images of the offenders with all facial imagedata available to fusion center 116, from homeland security, lawenforcement agencies, licensing records, etc., to better identify suchoffenders.

FIG. 7 is a simplified flowchart that illustrates the operationsperformed to process license plate information provided by a localstadium to fusion center 116 of FIG. 6 according to an embodiment of thepresent disclosure. In FIG. 7, box 124 represents the transmission ofvehicle license plate data “read” by cameras 38, 40, 42, and 44 of FIG.1, and by camera 52 of FIG. 2. Box 126 represents the operationperformed in fusion center 116 of comparing each received vehiclelicense plate to previously-compiled license plates: a) associated withspectators who have engaged in violent activities in the past; b)license plates associated with persons subject to arrest warrants;and/or c) vehicles which have been reported stolen. Decision box 128represents the operation of deciding whether or not a match has beendetected. If not, control returns back to box 124 to await transmissionof license plate data for another vehicle.

On the other hand, if a match is detected, box 132 represents theoperation performed by fusion center 116 of transmitting an alert fordisplay to police working around stadium 20, either within parking area22 (see FIG. 1) if the vehicle has entered the stadium parking area, orto a police officer driving police car 50 (see FIG. 2). This alert mightinclude, for example, the name and address of persons known to beassociated with such vehicle, past violent histories of such persons,arrest warrants outstanding for such persons, and/or summaries of stolenvehicle reports matching such vehicle. Based upon such alert, policeofficers can locate and detain the vehicle and any suspects present inthe vehicle, as indicated by box 134.

FIG. 8 is a simplified flowchart of the operations performed inconjunction with the fan entry ports to prevent those tending towardviolence from being admitted into stadium 20 according to an embodimentof the present disclosure. Boxes 202 and 204 represent the operations ofcapturing facial images of incoming fans and transmitting such images tofusion center 116. While such images are preferably captured as fansstand in line to present their tickets for admission, such images mayadditionally be captured as fans claim tickets from a will-call booth,or as they purchase tickets at the stadium ticket office. At fusioncenter 116, those captured images are compared to facial images ofpersons who are known to have engaged in violence in the past at similarevents, as indicated by box 206 in FIG. 8. As noted above, box 206 mayalso include the operation of comparing such facial images topreviously-compiled images of persons with histories of criminalviolence, persons subject to arrest warrants, and/or persons suspectedof engaging in terrorist activities.

Decision box 208 in FIG. 8 represents the computerized operation ofdetermining whether a match has been detected between the facial imagetransmitted by the stadium and one of the facial images already storedin one of the target databases. If no such match is detected, controlpasses via path 210 to box 216 for storing such facial image withinformation derived from the ticket presented by such person. In thisregard, box 212 represents the operation of scanning such informationfrom the person's ticket, and box 214 represents the operation oftransmitting such information to fusion center 116 so that it can besaved in an indexed fashion together with the captured facial image ofsuch person.

In contrast, if decision box 208 determines that a match has beendetected, then fusion center 116 transmits an alert, as indicated by box218, for display to police stationed at the respective entry gate, asindicated by box 220. For example, such alert might be displayed onvideo monitor 90 at entry gate 60, indicating that a person seekingentry needs to be detained or arrested. Referring to box 222, if suchperson is not currently subject to arrest, but has been known to engagein violence at similar events in the past, the alerted police officercan notify a venue security staffer, who can make a decision whether toadmit, or deny admission to, such fan. If such person is subject toarrest, the police officer can take appropriate action.

The process by which the present disclosure is preferably used fordealing with an incident of violence is illustrated in the flowchart ofFIG. 9. In such instance, one or more operators of the telephoto stadiumcameras (100, 200) are directed to focus upon the participants, asindicated by box 300. The facial images of the participants aretransmitted to fusion center 116, as indicated by box 302. Fusion center116 first compares the received facial images to the “event database”created as the fans filled the stadium earlier that day, as indicated bybox 304. Decision box 306 represents the operation of using the computerat fusion center 116 to determine whether the facial image of aparticipant has been matched to a person earlier admitted into thestadium. If so, fusion center 116 transmits, to law enforcement andvenue security personnel working at stadium 20, an image of the fan, hisor her assigned seat, and any other information that was derived fromthe ticket presented by such fan upon entering the stadium, as indicatedby box 308. Box 310 represents the operation of detaining and arrestingsuch fan. Were such fan to attempt to escape by heading for an exit, asindicated by box 312, venue security staffers and/or police located nearexit gates have information they need to identify the offender, and tostop or monitor the person making such escape.

If for some reason, decision box 306 is unable to detect a match usingthe “event database” created earlier that day, the captured facial imageof the offender can still be compared to more general,previously-compiled databases, to identify the offender, as indicated bybox 318. Note that this operation might be performed even in the casethat the offender is matched within the “event database”, simply toobtain additional identifying information concerning such person. If amatch is detected, as per decision box 320, pertinent information istransmitted by fusion center 116 to police stationed at the stadium, asindicated by box 322. One alert might be transmitted, via path 328, topolice for detaining and arresting the offender inside the stadium (seebox 310). A second alert might be sent, via path 330, to police andvenue security staffers posted near exit gates (see box 312). Invirtually all such instances, information concerning such outbreak ofviolence is added to the violent fan database (see 122 in FIG. 6), asindicated by box 316 in FIG. 9.

Those skilled in the art will now appreciate that an improved method hasbeen described for making stadiums, sporting venues, and other crowdedvenues, safer for attending fans. The new method lessens risk ofphysical injuries to attending fans, and reduces costs of team owners,promoters, and venue managers, while providing a reasonably acceptablelevel of safety and security. Applicant's above-described method servesto detect, and exclude from the venue, persons known to have beenviolent in the past, in most instances before they even enter the venue.It is also likely to assist law enforcement officers in catching wantedcriminals, and in recovering stolen vehicles.

While the present disclosure has been shown and described with referenceto various embodiments thereof, it will be understood by those skilledin the art that various changes in form and details may be made thereinwithout departing from the spirit and scope of the present disclosure asdefined by the appended claims and their equivalents.

What is claimed is:
 1. A system for providing security, the systemcomprising: at least one camera configured to capture a photographicimage of a person in view of the at least one camera; and a computercircuit configured to: receive the captured photographic image of theperson in view of at least one camera, transmit the capturedphotographic image of the person in view of the at least one camera fora process to be performed for comparing the captured photographic imageof the person in view of the at least one camera to facial images ofpersons of interest included in a database to detect a likely match,receive an alert that the person in view of the at least one camera is aperson of interest in response to a detection of the likely matchbetween the captured photographic image of the person in view of the atleast one camera and a facial image of the person of interest, andcontrol to alert at least one of one or more law enforcement officers orone or more security personnel of the detection of the likely matchbetween the captured photographic image of the person in view of the atleast one camera and the facial image of the person of interest, whereinthe system is controlled by a first party and the database is controlledby a second party.
 2. The system recited by claim 1, wherein thecomputer circuit is further configured to: determine or receivecredentials presented by the person in view of the at least one camera,and index the captured photographic image of the person in view of theat least one camera to the credentials.
 3. The system recited by claim1, wherein the computer circuit is further configured to: determine orreceive credentials presented by the person in view of the at least onecamera, wherein each of the credentials identifies an area acorresponding credentials holder is authorized for.
 4. The systemrecited by claim 1, wherein the facial images of persons of interestincluded in the database comprises facial images of persons who aresubject to an outstanding warrant for arrest, and wherein the computercircuit, to alert the at least one of the one or more law enforcementofficers or the one or more security personnel of the detection, isfurther configured to alert the at least one of the one or more lawenforcement officers or the one or more security personnel of adetection of the likely match between the captured photographic image ofthe person in view of the at least one camera and a facial image of aperson known to have an outstanding warrant for arrest.
 5. The systemrecited by claim 1, wherein the database is remotely located from the atleast one camera.
 6. The system recited by claim 1, wherein the databaseis at least one of a database of a fusion center or a databasecontrolled by the fusion center.
 7. The system recited by claim 1,wherein the database is a database at least one of providing data to afusion center or receiving data from the fusion center.
 8. The systemrecited by claim 1, wherein the database is at least one of: a databasecontrolled by at least one of at least one federal agency, a least onestate agency, at least one tribal agency, or at least one local lawenforcement agency, or a database controlled by homeland security. 9.The system recited by claim 1, wherein the database is at least one of:a database at least one of providing data to or receiving data from atleast one of at least one federal agency, a least one state agency, atleast one tribal agency, or at least one local law enforcement agency,or a database at least one of providing data to homeland security orreceiving data from homeland security.
 10. The system recited by claim1, wherein the database is a database that is at least one of acommercially owned, privately owned, municipality owned, or publiclyowned.
 11. The system recited by claim 1, wherein the database is adatabase configured to comply with at least one of federal laws, statelaws, or individual constitutional rights and privacy.
 12. A method forproviding security, the method comprising: receiving a photographicimage captured by at least one camera of a person in view of the atleast one camera; transmitting the captured photographic image of theperson in view of the at least one camera for a process to be performedfor comparing the captured photographic image of the person in view ofthe at least one camera to facial images of persons of interest includedin a database to detect a likely match; receiving an alert that theperson in view of the at least one camera is a person of interest inresponse to a detection of the likely match between the capturedphotographic image of the person in view of the at least one camera anda facial image of the person of interest; and alerting at least one ofone or more law enforcement officers or one or more security personnelof the detection of the likely match between the captured photographicimage of the person in view of the at least one camera and the facialimage of the person of interest, wherein the at least one camera iscontrolled by a first party and the database is controlled by a secondparty.
 13. The method recited by claim 12, further comprising:determining or receiving credentials presented by the person in view ofthe at least one camera, wherein the captured photographic image of theperson in view of the at least one camera is indexed to the credentials.14. The method recited by claim 12, further comprising: determining orreceiving credentials presented by the person in view of the at leastone camera, wherein each of the credentials identifies an area acorresponding credentials holder is authorized for.
 15. The methodrecited by claim 12, wherein the facial images of persons of interestincluded in the database comprises facial images of persons who aresubject to an outstanding warrant for arrest, and wherein the alertingof the at least one of the one or more law enforcement officers or theone or more security personnel of the detection further comprisesalerting the at least one of the one or more law enforcement officers orthe one or more security personnel of a detection of the likely matchbetween the captured photographic image of the person in view of the atleast one camera and a facial image of a person known to have anoutstanding warrant for arrest.
 16. The method recited by claim 12,wherein the database is remotely located from the at least one camera.17. The method recited by claim 12, wherein the database is at least oneof a database of a fusion center or a database controlled by the fusioncenter.
 18. The method recited by claim 12, wherein the database is adatabase at least one of providing data to a fusion center or receivingdata from the fusion center.
 19. The method recited by claim 12, whereinthe database is at least one of: a database controlled by at least oneof at least one federal agency, a least one state agency, at least onetribal agency, or at least one local law enforcement agency, or adatabase controlled by homeland security.
 20. The method recited byclaim 12, wherein the database is at least one of: a database at leastone of providing data to or receiving data from at least one of at leastone federal agency, a least one state agency, at least one tribalagency, or at least one local law enforcement agency, or a database atleast one of providing data to homeland security or receiving data fromhomeland security.
 21. The method recited by claim 12, wherein thedatabase is a database that is at least one of a commercially owned,privately owned, municipality owned, or publicly owned.
 22. The methodrecited by claim 12, wherein the database is a database configured tocomply with at least one of federal laws, state laws, or individualconstitutional rights and privacy.
 23. A non-transitory computerreadable medium including instructions, which when executed by acomputer circuit, causes the computer circuit to control to perform amethod comprising: receiving a photographic image captured by at leastone camera of a person in view of the at least one camera; transmittingthe captured photographic image of the person in view of the at leastone camera for a process to be performed for comparing the capturedphotographic image of the person in view of the at least one camera tofacial images of persons of interest included in a database to detect alikely match; receiving an alert that the person in view of the at leastone camera is a person of interest in response to a detection of thelikely match between the captured photographic image of the person inview of the at least one camera and a facial image of the person ofinterest; and alerting at least one of one or more law enforcementofficers or one or more security personnel of the detection of thelikely match between the captured photographic image of the person inview of the at least one camera and the facial image of the person ofinterest, wherein the at least one camera is controlled by a first partyand the database is controlled by a second party.