Surveillance of a secure area

ABSTRACT

Embodiments of the invention are directed to a system, method, and computer program product for surveillance of a secure area. The present invention typically includes a memory, a processor, and a module configured to monitor the secure area. In this regard, an embodiment of the present invention may receive an indication that a user is within the secure area and determine, using an authentication device sensor, whether the user has the authentication device to remain within the confines of the secure area. The user may have continued access to the secure area if the authentication device detected. On the other hand, the security personnel associated with the secure area may be notified of an unauthorized user when the authentication device is not detected.

RELATED APPLICATIONS AND PRIORITY claim 35 U.S.C. §119

This application claims priority to U.S. Provisional Application No.62/032,294 filed Aug. 1, 2014, and hereby is expressly incorporated byreference herein.

BACKGROUND OF THE INVENTION

Video surveillance assures the security of a room or building by meansof monitoring a secure area (e.g., building, room, or the like) orlimiting the access to that secure area to specific people and bykeeping records of such accesses. Most security devices utilize anindividual-authentication method to limit access to specific peoplebased on security tokens such as a fob, a smart card, a mobile devicetoken, or the like and limits access to only those people who hold anallocated security token.

Nowadays, video surveillance requires a certain level of synergy. Yetthe security industry has continued to provide disparate devices, withlimited communication between the devices. Even today, with all thetechnologies available, the industry is struggling to fully succeed atbuilding security solutions that fulfill the users' true needs—acohesive surveillance device that is efficient, non-invasive,non-proprietary, and cost effective. With recent advancements insoftware technology, integration has become a popular substitute fortraditional interfacing to provide unity between video, access, andintrusion devices with built-in reporting and alert managementfunctionality.

BRIEF SUMMARY

Embodiments of the present invention address the above needs and/orachieve other advantages by providing apparatuses (e.g., a system,computer program product, and/or other device) and methods for asecurity monitoring system.

Access management controls who should be permitted access to facilitiesand restricted areas; where they can access (e.g., rooms, terminals,buildings, or the like); and when they can access these areas (e.g.,certain times of the day, certain days of the week, or the like). Inaddition to controlling passage in and out of facilities or areas,determining who belongs and who does not, access management includes theability to observe and track movement in and out of controlled/securedareas. Entities grant access for various combinations of persons andassets, depending on the needs and restrictions established by eachentity.

Typically, access management includes intrusion detection andsurveillance. Intrusion detection in general, is the ability to knowwhen a user has entered a secure area, and may include the ability todetermine the identity of that person. This method of tracking includesboth authorized and unauthorized activity, and therefore may serve asboth a staff management and security management tool. Surveillance isthe ability to monitor a specified area.

In some embodiments, a security monitoring system is presented. Thesystem comprises a memory device with computer-readable program codestored hereon; a communication device; a processing device operativelycoupled to the memory device and the communication device, wherein theprocessing device is configured to execute the computer-readable programcode to receive an indication that a user entered a secure area, whereinthe indication is based on at least a user image captured by a datacapturing device and a sensor device; determine, using an authenticationdevice sensor, whether the user has an authentication device based on atleast receiving the indication that the user entered the secure area;determine that the user does not have the authentication device;initiate a first warning as an indication that the user does not havethe authentication device; determine that the user has not produced theauthentication device a predetermined period of time after theinitiation of the first warning; and notify security personnel that theuser has not produced the authentication device a predetermined periodof time after the initiation of the first warning.

In some embodiments, the invention is further configured to determinethat the user has the authentication device; and enable the user toaccess the secure area based on at least determining that the user hasthe authentication device.

In some embodiments, the invention is further configured to extract oneor more authentication credentials associated with the user stored inthe authentication device; compare the extracted one or moreauthentication credentials to one or more authentication credentialsstored in a database to determine a match; and validate the user basedon at least determining a match between the extracted one or moreauthentication credentials with the one or more authenticationcredentials stored in the database.

In some embodiments, the invention is further configured to determine,using the authentication device sensor, that the user has produced theauthentication device within the predetermined period of time after theinitiation of the first warning; and enable the user to access thesecure area based on at least determining that the user has produced theauthentication device.

In some embodiments, the invention is further configured to flag anactivity/event associated with the user based on at least determiningthat the user has not produced the authentication device a predeterminedperiod of time after the initiation of the first warning; transmit arecorded footage of the user to the security personnel; and initiate asecond warning to indicate that the user has not produced theauthentication device a predetermined period of time after theinitiation of the first warning.

In some embodiments, the invention is configured to notify the securitypersonnel using at least one or a visual alarm, audible alarm, ane-mail, a text message, or a telecommunication device.

In one aspect, a computer implemented method for monitoring a securearea for security purposes is presented. The method comprises receiving,using a computing device processor, an indication that a user entered asecure area, wherein the indication is based on at least a user imagecaptured by an image capturing device and a motion sensor device;determining, using an authentication device sensor, whether the user iswearing an authentication device based on at least receiving theindication that the user entered the secure area; determining, using acomputing device processor, that the user is not wearing theauthentication device; initiating, using a computing device processor, afirst warning tone as an indication that the user is not wearing theauthentication device; determining, using a computing device processor,that the user has not produced the authentication device a predeterminedperiod of time after the initiation of the first warning tone; andnotifying, using a computing device processor, security personnel thatthe user has not produced the authentication device a predeterminedperiod of time after the initiation of the first warning tone.

In another aspect, a computer program product for monitoring a securearea for security purposes is presented. The computer program productcomprising a non-transitory computer-readable medium comprising codecausing a first apparatus to receive an indication that a user entered asecure area, wherein the indication is based on at least a user imagecaptured by an image capturing device and a motion sensor device;determine, using an authentication device sensor, whether the user iswearing an authentication device based on at least receiving theindication that the user entered the secure area; determine that theuser is not wearing the authentication device; initiate a first warningtone as an indication that the user is not wearing the authenticationdevice; determine that the user has not produced the authenticationdevice a predetermined period of time after the initiation of the firstwarning tone; and notify security personnel that the user has notproduced the authentication device a predetermined period of time afterthe initiation of the first warning tone.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other advantages and features of the invention, andthe manner in which the same are accomplished, will become more readilyapparent upon consideration of the following detail description of theinvention taken in conjunction with the accompanying drawings, whichillustrate preferred and exemplary embodiments and which are notnecessarily drawn to scale, wherein:

FIG. 1 illustrates a high level process flow for a security monitoringsystem, in accordance with one aspect of the invention;

FIG. 2 presents a process flow for enabling a user access to a securearea, in accordance with another embodiment of the invention;

FIG. 3 presents a process flow for enabling user access after firstwarning, in accordance with another embodiment of the invention;

FIG. 4 illustrates a process flow for notifying security personnel, inaccordance with another embodiment of the invention;

FIG. 5 presents an exemplary block diagram of the system environment 500for implementing the process flows described herein in accordance withan embodiment of the present invention; and

FIG. 6 presents an exemplary block diagram of the system environment forimplementing the process flows described herein in accordance withcontinuous monitoring of the secure area.

DETAILED DESCRIPTION OF AN EMBODIMENT OF THE INVENTION

Embodiments of the present invention now may be described more fullyhereinafter with reference to the accompanying drawings, in which some,but not all, embodiments of the invention are shown. Indeed, theinvention may be embodied in many different forms and should not beconstrued as limited to the embodiments set forth herein; rather, theseembodiments are provided so that this disclosure may satisfy applicablelegal requirements. Like numbers refer to like elements throughout.

The present invention is directed to systems, methods, and computerprogram products for a security monitoring system for controlled accessto a secure area. Typically, access readers are small devices locatedproximate to the entrances to restricted or secured areas. To gainaccess to an area, a user must present an authentication device to theaccess reader, which in turn verifies the information on theauthentication device with a back-end system. Commonly usedauthentication device include both contact and contactless smart cards.

As used herein, a “user” may be any individual requesting authorizationto access a secure area.

FIG. 1 illustrates a high level process flow for a security monitoringsystem 100 in accordance with one aspect of the invention. In oneaspect, the process flow includes receiving an indication that a user isaccessing a secure area, wherein the indication is based on at least auser image captured by a data capturing device and a sensor device, asshown in block 102. In response, the process flow includes determining,using an authentication device sensor, whether the user has anauthentication device based on at least receiving the indication thatthe user entered the secure area, as shown in block 104. In someembodiments, the process flow includes determining that the user doesnot have the authentication device, as shown in block 106. In oneaspect, the system may be configured to initiate a first warning as anindication that the user does not have the authentication device, asshown in block 108. If the user fails to produce the authenticationdevice after the lapse of the predetermined period of time, the processflow may determine that the user has not produced the authenticationdevice a predetermined period of time after the initiation of the firstwarning, as shown in block 110 and in response, notify securitypersonnel that the user has not produced the authentication device apredetermined period of time after the initiation of the first warning,as shown in block 112.

Typically, sensors/detectors are often integrated as a component of asystem that and are configured to automatically perform a task ortransmit a notification of user detection in an area. In someembodiments, the system may be configured to initiate the process flowwhen the sensor detects a user. Referring back to block 102, in oneaspect, the sensor device may be an electronic device with apredetermined detection radius. In this regard, the sensor devicedetects a user when the user is within the predetermined detectionradius of the sensor device. In another aspect, the sensor device mayuse infra-red detection to determine any disturbances in the spectrum.For purposes of this invention, a sensor device may be any electronic ormechanical device capable of detecting a user. In some embodiments, thesensor may be configured to be integrated with the image capturingdevice, whereby, an indication that a user has entered a secure area maycause the image capturing device to flag any motion proximate to thesensor that was triggered. In some embodiments, the system environmentmay include multiple sensors enabling each of the sensors to initiatethe process flow described herein. In one aspect, the sensors/detectorsmay include, but are not limited to acoustic sensors, vibration sensors,pressure sensors, proximity sensors, temperature sensors, opticalsensors, or the like.

As used herein, an “event” may include any user activity associated withthe security monitoring system. In some embodiments, the system maymaintain a record of every event associated with a user attempting togain access to a secure area and populate a database with informationassociated with the event. In this regard, the system may include anevent data recording device capable of recording information related touser access. In this way, the system may maintain a record of one ormore user events associated with the secure area. In some embodiments,the system may be configured to record one or more event informationassociated with the event. In one aspect, the one or more eventinformation may include a time and date associated with the event. Insome embodiments, the event data recorder may enable the securitypersonnel to populate the database with additional event information. Inone aspect, the security personnel may associate the event with a user.In one aspect, the system may categorize each event into one or moredifferent categories based on the nature of the event.

As used herein, a “data capturing device” may be any device capable ofrecording user activity. In one aspect, a data capturing device may bean integration of one or more data capturing devices. For purposes ofthe invention, a “data capturing device” and an “image capturing devicemay be used interchangeably. In some embodiments, the system may includeone or more image capturing devices configured to work in tandem toensure coverage of the entire secure area. In some other embodiments,the system may include an image capturing device to ensure coverage ofthe entrance/exit to the secure area. The image capturing device may beany device capable of motion picture acquisition and transmission. Inone aspect, the image capturing device may be connected to otherdevices/systems in the system environment using wired connections. Inanother aspect, the image capturing device may be integrated into asecurity system using wireless connections such as wireless local areanetworks, wireless personal area networks, or the like. In someembodiments, the image capturing device may be a smart device or anintelligent device, which in addition to the image capture circuitry, iscapable of extracting application-specific information from the capturedimages, along with generating event descriptions or making decisionsthat are used in an intelligent and automated system.

As used herein, “accessing”, in the fields of physical security andinformation security, may refer to a selective restriction for a user toapproach, enter, use, or operate in a secure area.

In some embodiments, the motion capturing devices may be capable ofcontinuously recording activity within the secure area and store therecorded activity in a database for a predetermined period of time.After the lapse of the predetermined period of time, the system may movethe recorded activity from the database to an archive for long termstorage, thereby clearing allocated memory space for new activity data.Typically, archiving is the process of moving data that is no longeractively used to separate data storage device for long-time retention.Data archives consist of older data that may still be necessary forfuture reference, as well as data that must be retained for regulatorycompliance. Usually, data archives are indexed and have searchcapabilities so that files and parts of files can be easily located andretrieved. In some other embodiments, the motion capturing devices maybe activated by user events and may continue to record until the eventis over, or until the recording time is expired.

Referring back to block 104, typically, a user may be required toproduce an authentication device such as a secure token, a key card,proximity tag, a fob, or the like for accessing a secure area. In someembodiments, the authentication device may be an active device. In oneaspect, the active authentication device may include an on-board batteryenabling the device to periodically transmit one or more authenticationcredentials. In another embodiment, the authentication device may be abattery-assisted passive device. In one aspect, the battery-assistedpassive device may include an on-board battery configured to beactivated in the presence of the authentication device sensor. In yetanother embodiment, the authentication device may be a passive device.In one aspect, the authentication device may be capable of beingactivated by a signal transmitted from the authentication device sensor.

In some embodiments, the authentication device may be a hardware deviceconfigured to include one or more authentication credentials associatedwith the user. Some authentication devices may store cryptographic keyssuch as a digital signature, or biometric data, such as fingerprintminutiae. In this regard, the system may be configured to receive theauthentication credentials from the authentication device, compare thereceived authentication credentials with one or more authenticationcredentials stored in a database to determine a match. Typically, theone or more authentication credentials associated with the user arecreated and stored in a database when the user is initially grantedaccess to the secure area. In some embodiments, the authenticationdevice may establish confidence in user identities to be presented to aninformation system electronically. For example, the authenticationdevice may be a certified digital file capable of being integrated witha mobile device in possession of the user.

In some embodiments, the authentication device sensor may be an activedevice sensor capable of initiating authentication replied from theauthentication device. In some other embodiments, the authenticationdevice sensor may be a passive device capable of receiving one or moreauthentication credentials from an active authentication device.

Typically, the user may access a secure area by producing theauthentication device when the user is within or proximate to the securearea. Referring back to block 106, in some embodiments, although theuser may have the have the authentication device, the authenticationdevice may not be exposed to be detectable by the authentication devicesensor. This may result in the system initiating a first warning thatthe user does not have the authentication device. In addition toinitiating the first warning, the system may be flag the event andpopulate the database field with the event information including a dateand time of the first warning. Referring back to block 108, in suchsituations, the system may be configured to enable the user to producethe authentication device within a predetermined period of time afterinitiating a first warning. Referring back to block 110, if the userdoes not produce the authentication device within the predeterminedperiod of time after the initiation of the first warning, the system maynotify the security personnel.

FIG. 2 presents a process flow for enabling a user access to a securearea 200 in accordance with another embodiment of the invention. Asshown in block 202, the process flow includes determining that the userhas the authentication device. In response, the process flow includesenabling the user to access the secure area, as shown in block 204. Insome embodiments, the system may be configured to determine that theuser has the authentication periodically. In this regard, the system mayinitiate a security system to determine whether the user within thesecure area has the authentication device periodically (e.g., every fewminutes, hours, or the like). In this way, the system may be configuredto remain in a constant state of activation and determine whether theuser has the authentication device at all times when the user is withinthe secure area. This may be useful in instances when a user's access toa secure area is revoked while the user is still in within the confinesof the secure area. In such situations, the system may be configured tocontinuously monitor the secure area and determine that the user'saccess has been revoked and notify the security personnel of theimmediate breach in security.

In some embodiments, the system may be configured to establish anauthentication device to enable a user to access specific areas withinthe secure area. For example, the security monitoring device may bedeployed in an entire building with one or more independent secureareas. The system may enable the user to access specific secure areaswithin the building, thereby securing one or more specific areas withinthe building. In some other embodiments, the system may be configured todetermine an access level for the user to determine which of the one ormore secure areas the user may access. In one aspect, the access levelmay be based on a job description, a security clearance, a specificgroup, or the like.

In some embodiments, the authentication device may be integrated with anauxiliary device associated with the user. In this way, the securitymonitoring system may allow the user to access the secure area only ifthe user has the auxiliary device. For example, the security monitoringsystem may be deployed in an industrial or construction site. The systemmay then be configured to integrate the authentication device with hardhats to enforce safety measures among construction workers. In anotherexample, any facility that stores or uses a defined “highly hazardouschemical” must comply with the OSHA (Occupational Safety and HealthAdministration) and other related agencies to implement one or moreprotective gears for users working within the vicinity of the hazardousmaterial. In such cases, the system may integrate one or moreauthentication devices in each of the protective gears required by OSHAfor user to operate within the vicinity of the hazardous material.

In some embodiments, the one or more image capturing devices may beconfigured to determine whether the user has the authentication devicebased on at least the field of view of the one or more image capturingdevices. In one aspect, the field of view of each of the image capturingdevices may be received by a central processing unit configured tocombine each of the received field of views to enable a completecoverage of the secure area. For example, a secure area with one or moreenclosed areas may require one or more image capturing devices foradequate coverage. In some embodiments, the user may be in the field ofview of one or more image capturing devices at a time instant. Ideally,the combination of the fields of view of the one or more image capturingdevices capturing the user at that time instant are capable of receivingthe user's image from all angles, thereby avoiding a “blind spot”.

In some embodiments, the one or more image capturing devices may bepositioned in one or more access points (e.g., doors, windows, or thelike) associated with the secure area. In some other embodiments, theone or more image capturing devices may be positioned to capture theentire secure area individually or synchronously to determine whetherthe user has the authentication device, when the user is anywhere withinthe secure area. In one aspect, the one or more image capturing devicesmay be integrated with one or more authentication device sensors todetermine whether the user has an authentication device. In anotheraspect, the one or more image capturing devices may be configured todetermine whether the user has the authentication device. In thisregard, the image capturing device may be configured to capture theauthentication device within its field of view and can compare the imageauthentication device with an existing image in the database todetermine a match.

In some embodiments, the system may be configured to enable a user toaccess the secure area for a predefined period of time. In this regard,the system may enable an administrator associated with the securitymonitoring system to establish a temporary authentication device for auser. For example, a user may be a visitor scheduled to visit the securearea during a work day and assigned a temporary authentication device.In such situations, the system may be configured to enable the useraccess the secure area for a predefined period of time.

FIG. 3 presents a process flow for enabling user access after firstwarning 300 in accordance with another embodiment of the invention. Insome embodiments, the system may be configured to determine that theuser does not have the authentication device, or, the authenticationdevice is not positioned to be detectable by the system. In suchsituations, the system may be configured to initiate a first warning asan indication that the user does not have the authentication device. Insome embodiments, the warning may be a signal transmitted to by theauthentication device sensor to the authentication device on the user.In one aspect, the warning may be a vibration of the authenticationdevice indicating that the user may need to adjust the position of theauthentication device. In another aspect, the warning may be an audibletone emitted by the authentication device based on a signal transmittedby the authentication device sensor. In yet another aspect, the warningmay be visual (e.g., a blinking light). Typically, the warning may beany indication transmitted to the user that the authentication device isnot detectable. In some other embodiments, the warning may betransmitted to both the security personnel and the user simultaneouslyas an indication that the user's authentication device is not positionedto be detectable by the system.

In one aspect, the user may adjust the position of the authenticationdevice, thereby enabling the system to determine, using theauthentication device sensor, that the user has produced theauthentication device within the predetermined period of time after theinitiation of the first warning, as shown in block 302. In someembodiments, the authentication device may not be detectable due to amalfunctioning authentication device. In such situations, the user, inresponse to receiving the warning, may approach the closest securitypersonnel to examine the malfunctioning authentication device. In suchsituations, the user may be given a temporary authentication deviceuntil the malfunctioning authentication device is rectified.

In response to determining that the user has produced the authenticationdevice, the process flow includes enabling the user to access the securearea, as shown in block 304. In some embodiments, the system maydetermine that the user has the proper authentication device withauthentication credentials to remain within the confines of the securearea. In one aspect, system may record an event indicating that the userhas produced the authentication device within the predetermined periodof time after the initiation of the first warning, and populate adatabase field accordingly.

In some embodiments, the system may perform periodic status check of theone or more authentication devices, authentication device sensors, imagecapturing devices, and sensor devices to run a diagnostic test on thesystem performance. In one aspect, the periodic status check may be usedto determine that the one or more users within the confines of thesecure area are authorized personnel with adequate authenticationcredentials. In some embodiments, the period status check may determinethat the one or more devices are malfunctioning. In such situations, thesecurity personnel may be notified of the malfunctioning device toensure immediate rectification.

Embodiments of the present invention may be deployed in secure areas todetect unfavorable objects. In this regard, the system may be configuredto detect any unfavorable object in possession of the user, when theuser is within the secure area. For example, the system may beconfigured to detect objects such as firearms, unauthorized data storagedevices, objects such as hats, sunglasses, or visors determined to avoidthe image capturing devices to identify the user, or the like.

FIG. 4 illustrates a process flow for notifying security personnel 400in accordance with another embodiment of the invention. In someembodiments, the user may not have produced the authentication devicewithin a predetermined period of time after the lapse of the firstwarning. In such situations, the process flow includes flagging anactivity of the user based on at least determining that the user has notproduced the authentication device a predetermined period of time afterthe initiation of the first warning, as shown in block 402. In someembodiments, only the image capturing device proximate to the triggeredsensor may be configured to flag an event of the user in the areaproximate to the triggered sensor. In this regard, the system may beconfigured to determine the approximate location of the user based on atleast determining which of the one or more sensors were triggered. Insome other embodiment, one or more image capturing devices in the securearea adequately covering the area proximate to the triggered sensor maybe configured to flag an event of the user in the area proximate to thetriggered sensor. In response, the process flow includes transmitting arecorded footage of the user to the security personnel, as shown inblock 404. In some embodiments, the system may be configured to initiatea second warning to indicate that the user has not produced theauthentication device a predetermined period of time after theinitiation of the first warning, as shown by the process flow in block406.

FIG. 5 presents an exemplary block diagram of the system environment 500for implementing the process flows described herein in accordance withan embodiment of the present invention. As illustrated, the systemenvironment 500 includes a network 510, a system 530, an data capturingdevice 544, an access control 542, an authentication device sensor 547,a sensor and 549. Also shown in FIG. 5 is an authentication device 540associated with a user. The user may be a person who initiates thesystem function by virtue of being detected by the sensor 549. As shownin FIG. 5, the authentication device associated with the user may bedetectable by the authentication device sensor 547 to determine a useraccess via access control 542. The system described herein may bedeployed in any area that requires a secure access. In some embodiments,the area may be a room. In some other embodiments, the area may be abuilding. In one aspect, the room may be a part of the building. In suchcases, the system may be deployed for secure access to either thebuilding, or the room, or both.

As shown in FIG. 5, the system 530, the access control 542, the datacapturing device 544, the sensor 549, and the authentication devicesensor 547 are each operatively and selectively connected to the network510, which may include one or more separate networks. In addition, thenetwork 510 may include a telecommunication network, local area network(LAN), a wide area network (WAN), and/or a global area network (GAN),such as the Internet. It will also be understood that the network 510may be secure and/or unsecure and may also include wireless and/or wiredand/or optical interconnection technology.

As shown in FIG. 5, the system environment 500 includes a sensor 549configured to detect the presence of the user entering a secure area.The sensor 549 is operatively and selectively connected to the user andthe data capturing device 544 via the network 510 to activate the datacapturing device 544 in response to detecting a user. The data capturingdevice 544 includes a memory 546 capable of storing any image/videocaptured and transmitting the capture image/video to the system 530 viathe network 510.

As shown in FIG. 5, the system environment 500 includes anauthentication device sensor 547 operatively and selectively connectedthe system 530 via the network 510 and the user. In one aspect, theauthentication device is configured to extract authenticationcredentials from the authentication device 540 associated with the userand transmit the information to the system 530 via the network 510.

As shown in FIG. 5, the system environment 500 includes an accesscontrol 542 operatively and selectively connected to the system 530 viathe network 510. Typically, the access control 542 is physicallyconnected to the secure area to enable user access. The access control542 may include an alert module (not shown) to notify security personnelif the user entering the restricted area without proper credentials. Insome embodiments, the system environment may not include an accesscontrol 542.

FIG. 5 also illustrates a system 530, in accordance with an embodimentof the present invention. The system 530 may refer to the “apparatus”described herein. The system 530 may include any computerized apparatusthat can be configured to perform any one or more of the functions ofthe system 530 described and/or contemplated herein. In accordance withsome embodiments, for example, the system 530 may include a computernetwork, an engine, a platform, a server, a database system, a front endsystem, a back end system, a personal computer system, and/or the like.Therefore, the system 530 may be a server managed by the entity. Thesystem 530 may be located at the facility associated with the entity orremotely from the facility associated with the entity. In someembodiments, such as the one illustrated in FIG. 5, the system 530includes a communication interface 532, a processor 534, and a memory536, which includes a system application 537 and a structured database538 stored therein. As shown, the communication interface 532 isoperatively and selectively connected to the processor 534, which isoperatively and selectively connected to the memory 536.

Each communication interface described herein, including thecommunication interface 532, generally includes hardware, and, in someinstances, software, that enables the system 530, to transport, send,receive, and/or otherwise communicate information to and/or from the oneor more other systems on the network 510. For example, the communicationinterface 532 of the system 530 may include a wireless transceiver,modem, server, electrical connection, and/or other electronic devicethat operatively connects the system 530 to another system such as theaccess control 542. The wireless transceiver may include a radio circuitto enable wireless transmission and reception of information.

Each processor described herein, including the processor 534, generallyincludes circuitry for implementing the audio, visual, and/or logicfunctions of the user input system 540. For example, the processor mayinclude a digital signal processor device, a microprocessor device, andvarious analog-to-digital converters, digital-to-analog converters, andother support circuits. Control and signal processing functions of thesystem in which the processor resides may be allocated between thesedevices according to their respective capabilities. The processor mayalso include functionality to operate one or more software programsbased at least partially on computer-executable program code portionsthereof, which may be stored, for example, in a memory device, such asin the user application 547 of the memory 546 of the user input system540.

Each memory device described herein, including the memory 536 forstoring the system application 537 and other information, may includeany computer-readable medium. For example, memory may include volatilememory, such as volatile random access memory (RAM) having a cache areafor the temporary storage of information. Memory may also includenon-volatile memory, which may be embedded and/or may be removable. Thenon-volatile memory may additionally or alternatively include an EEPROM,flash memory, and/or the like. The memory may store any one or more ofpieces of information and data used by the system in which it resides toimplement the functions of that system.

It will be understood that the system application 537 may be configuredto implement any one or more portions of the various user interfacesand/or process flow described herein. The system application 537 mayinteract with the user application 547. It will also be understood that,in some embodiments, the memory includes other applications. It willalso be understood that, in some embodiments, the system application 537is configured to communicate with the data capturing device 544, theaccess control 542, sensor 549, and authentication device sensor 547.

It will be further understood that, in some embodiments, the systemapplication 537 includes computer-executable program code portions forinstructing the processor 534 to perform any one or more of thefunctions of the system application 537 described and/or contemplatedherein. In some embodiments, the system application 537 may includeand/or use one or more network and/or system communication protocols.

In addition to the system application 537, the memory 536 also includesthe structured database 538. As used herein, the structured database 538may be one or more distinct and/or remote databases. In someembodiments, the structured database 538 is not located within thesystem and is instead located remotely from the system. In someembodiments, the structured database 538 stores information or datadescribed herein.

It will be understood that the structured database 538 may include anyone or more storage devices, including, but not limited to, datastores,databases, and/or any of the other storage devices typically associatedwith a computer system. It will also be understood that the structureddatabase 538 may store information in any known way, such as, forexample, by using one or more computer codes and/or languages,alphanumeric character strings, data sets, figures, tables, charts,links, documents, and/or the like. Further, in some embodiments, thestructured database 538 may include information associated with one ormore applications, such as, for example, the system application 537. Itwill also be understood that, in some embodiments, the structureddatabase 538 provides a substantially real-time representation of theinformation stored therein, so that, for example, when the processor 534accesses the structured database 538, the information stored therein iscurrent or substantially current.

It will be understood that the embodiment of the system environmentillustrated in FIG. 5 is exemplary and that other embodiments may vary.As another example, in some embodiments, the system 530 includes more,less, or different components. As another example, in some embodiments,some or all of the portions of the system environment 500 may becombined into a single portion. Likewise, in some embodiments, some orall of the portions of the system 530 may be separated into two or moredistinct portions.

In addition, the various portions of the system environment 500 may bemaintained for and/or by the same or separate parties. It will also beunderstood that the system 530 may include and/or implement anyembodiment of the present invention described and/or contemplatedherein. For example, in some embodiments, the system 530 is configuredto implement any one or more of the embodiments of the process flowsdescribed and/or contemplated herein in connection any process flowdescribed herein.

FIG. 6 presents an exemplary block diagram of the system environment 600for implementing the process flows described herein in accordance withcontinuous monitoring of the secure area. As illustrated, the systemenvironment 600 includes a network 610, a system 630, an image capturingdevice 644, an authentication device sensor 647, a sensor and 649. Alsoshown in FIG. 5 is an authentication device 640 associated with a user.The user may be a person who initiates the system function by virtue ofbeing detected by the sensor 649. As shown in FIG. 5, the authenticationdevice associated with the user may be detectable by the authenticationdevice sensor 647 to determine a user access via access control 642. Insome embodiments, the system described herein may be deployed in asecure area that requires the user to continuously requireauthentication within the confines of the secure area. In anotherembodiment, the system described herein may be deployed in an accessarea to determine whether the user has the authentication device beforegaining access to the secure area. The system 630, the image capturingdevice 644, the sensor 649, and the authentication device sensor 647 areeach operatively and selectively connected to the network 610, which mayinclude one or more separate networks.

For example, the system may be deployed at an airport gate wherein oneor more passengers are in the ticketed area waiting to board a flight.Typically, the TSA (Transport Security Administration) physically checksthe validity of each passenger's boarding pass against an airlinedatabase to determine whether the passenger is eligible to board theflight in that airport on that day. In such situations, this system maybe integrated with the airline database to assign each passenger with atemporary authentication device capable of being detected byauthentication device sensor. The secured areas of the airport mayinclude one or more image capturing devices, sensors, and one or moreauthentication device sensors capable of detecting the authenticationdevices assigned to each passenger and employee. In one aspect, theauthentication device may be issued to passengers and authorized personsas a temporary authorization to be in the secured area as well asproviding boarding access to the passenger's boarding pass for theduration of the flight. In another aspect, the authentication device maybe issued to passengers as a temporary boarding pass with a temporaryboarding access for the duration of the flight.

FIG. 6 also illustrates a system 630, in accordance with an embodimentof the present invention. The system 630 may refer to the “apparatus”described herein. The system 530 may include any computerized apparatusthat can be configured to perform any one or more of the functions ofthe system 630 described and/or contemplated herein. In accordance withsome embodiments, for example, the system 630 may include a computernetwork, an engine, a platform, a server, a database system, a front endsystem, a back end system, a personal computer system, and/or the like.Therefore, the system 630 may be a server managed by the entity. Thesystem 630 may be located at the facility associated with the entity orremotely from the facility associated with the entity. In someembodiments, such as the one illustrated in FIG. 5, the system 630includes a communication interface 632, a processor 634, and a memory636, which includes a system application 637 and a structured database638 stored therein. As shown, the communication interface 632 isoperatively and selectively connected to the processor 634, which isoperatively and selectively connected to the memory 636.

In accordance with embodiments of the invention, the term “module” withrespect to a system may refer to a hardware component of the system, asoftware component of the system, or a component of the system thatincludes both hardware and software. As used herein, a module mayinclude one or more modules, where each module may reside in separatepieces of hardware or software.

Although many embodiments of the present invention have just beendescribed above, the present invention may be embodied in many differentforms and should not be construed as limited to the embodiments setforth herein; rather, these embodiments are provided so that thisdisclosure will satisfy applicable legal requirements. Also, it will beunderstood that, where possible, any of the advantages, features,functions, devices, and/or operational aspects of any of the embodimentsof the present invention described and/or contemplated herein may beincluded in any of the other embodiments of the present inventiondescribed and/or contemplated herein, and/or vice versa. In addition,where possible, any terms expressed in the singular form herein aremeant to also include the plural form and/or vice versa, unlessexplicitly stated otherwise. Accordingly, the terms “a” and/or “an”shall mean “one or more,” even though the phrase “one or more” is alsoused herein. Like numbers refer to like elements throughout.

As will be appreciated by one of ordinary skill in the art in view ofthis disclosure, the present invention may include and/or be embodied asan apparatus (including, for example, a system, machine, device,computer program product, and/or the like), as a method (including, forexample, a business method, computer-implemented process, and/or thelike), or as any combination of the foregoing. Accordingly, embodimentsof the present invention may take the form of an entirely businessmethod embodiment, an entirely software embodiment (including firmware,resident software, micro-code, stored procedures in a database, or thelike), an entirely hardware embodiment, or an embodiment combiningbusiness method, software, and hardware aspects that may generally bereferred to herein as a “system.” Furthermore, embodiments of thepresent invention may take the form of a computer program product thatincludes a computer-readable storage medium having one or morecomputer-executable program code portions stored therein. As usedherein, a processor, which may include one or more processors, may be“configured to” perform a certain function in a variety of ways,including, for example, by having one or more general-purpose circuitsperform the function by executing one or more computer-executableprogram code portions embodied in a computer-readable medium, and/or byhaving one or more application-specific circuits perform the function.

It will be understood that any suitable computer-readable medium may beutilized. The computer-readable medium may include, but is not limitedto, a non-transitory computer-readable medium, such as a tangibleelectronic, magnetic, optical, electromagnetic, infrared, and/orsemiconductor system, device, and/or other apparatus. For example, insome embodiments, the non-transitory computer-readable medium includes atangible medium such as a portable computer diskette, a hard disk, arandom access memory (RAM), a read-only memory (ROM), an erasableprogrammable read-only memory (EPROM or Flash memory), a compact discread-only memory (CD-ROM), and/or some other tangible optical and/ormagnetic storage device. In other embodiments of the present invention,however, the computer-readable medium may be transitory, such as, forexample, a propagation signal including computer-executable program codeportions embodied therein.

Some embodiments of the present invention are described herein withreference to flowchart illustrations and/or block diagrams of apparatusand/or methods. It will be understood that each block included in theflowchart illustrations and/or block diagrams, and/or combinations ofblocks included in the flowchart illustrations and/or block diagrams,may be implemented by one or more computer-executable program codeportions. These one or more computer-executable program code portionsmay be provided to a processor of a general purpose computer, specialpurpose computer, and/or some other programmable data processingapparatus in order to produce a particular machine, such that the one ormore computer-executable program code portions, which execute via theprocessor of the computer and/or other programmable data processingapparatus, create mechanisms for implementing the steps and/or functionsrepresented by the flowchart(s) and/or block diagram block(s).

One or more computer-executable program code portions may be stored in atransitory and/or non-transitory computer-readable medium (e.g. amemory) that can direct, instruct, and/or cause a computer and/or otherprogrammable data processing apparatus to function in a particularmanner, such that the computer-executable program code portions storedin the computer-readable medium produce an article of manufactureincluding instruction mechanisms which implement the steps and/orfunctions specified in the flowchart(s) and/or block diagram block(s).

The one or more computer-executable program code portions may also beloaded onto a computer and/or other programmable data processingapparatus to cause a series of operational steps to be performed on thecomputer and/or other programmable apparatus. In some embodiments, thisproduces a computer-implemented process such that the one or morecomputer-executable program code portions which execute on the computerand/or other programmable apparatus provide operational steps toimplement the steps specified in the flowchart(s) and/or the functionsspecified in the block diagram block(s). Alternatively,computer-implemented steps may be combined with, and/or replaced with,operator- and/or human-implemented steps in order to carry out anembodiment of the present invention.

The one or more computer-executable program code portions for carryingout operations of the present invention may include object-oriented,scripted, and/or unscripted programming languages, such as, for example,Java, Perl, Smalltalk, C++, SAS, SQL, Python, Objective C, JavaScript,and/or the like. In some embodiments, the one or morecomputer-executable program code portions for carrying out operations ofembodiments of the present invention are written in conventionalprocedural programming languages, such as the “C” programming languagesand/or similar programming languages. The computer program code mayalternatively or additionally be written in one or more multi-paradigmprogramming languages, such as, for example, F#.

While certain exemplary embodiments have been described and shown in theaccompanying drawings, it is to be understood that such embodiments aremerely illustrative of and not restrictive on the broad invention, andthat this invention not be limited to the specific constructions andarrangements shown and described, since various other changes,combinations, omissions, modifications and substitutions, in addition tothose set forth in the above paragraphs, are possible. Those skilled inthe art will appreciate that various adaptations, modifications, andcombinations of the just described embodiments can be configured withoutdeparting from the scope and spirit of the invention. Therefore, it isto be understood that, within the scope of the appended claims, theinvention may be practiced other than as specifically described herein.

What is claimed is:
 1. A security monitoring system, the systemcomprising: a memory device with computer-readable program code storedhereon; a communication device; a processing device operatively coupledto the memory device and the communication device, wherein theprocessing device is configured to execute the computer-readable programcode to: receive an indication that a user entered a secure area,wherein the indication is based on at least a user image captured by animage capturing device and a motion sensor device; determine, using anauthentication device sensor, whether the user is wearing anauthentication device based on at least receiving the indication thatthe user entered the secure area; determine that the user is not wearingthe authentication device; initiate a first warning tone as anindication that the user is not wearing the authentication device;determine that the user has not produced the authentication device apredetermined period of time after the initiation of the first warningtone; and notify security personnel that the user has not produced theauthentication device a predetermined period of time after theinitiation of the first warning tone.
 2. The system of claim 1, whereinthe processing device is configured to pause the image capturing devicebased on at least determining, using the authentication device sensor,that the user is wearing the authentication device, wherein pausing theimage capturing device further comprises temporarily deactivating themotion sensor security system for a predetermined period of time; andenable the user to enter the secure area within the predetermined periodof time after the motion sensor security system is temporarilydeactivated.
 3. The system of claim 2, wherein the processing device isfurther configured to resume the image capturing device a predeterminedperiod of time after enabling the user to enter the secure area.
 4. Thesystem of claim 1, wherein the processing device is further configuredto extract one or more authentication credentials associated with theuser stored in the authentication device; compare the extracted one ormore authentication credentials to one or more authenticationcredentials stored in a database to determine a match; and validate theuser based on at least determining a match between the extracted one ormore authentication credentials with the one or more authenticationcredentials stored in the database.
 5. The system of claim 1, whereinthe processing device is further configured to determine, using theauthentication device sensor, that the user has produced theauthentication device within the predetermined period of time after theinitiation of the first warning tone; pause the image capturing device,wherein pausing the image capturing device further comprises temporarilydeactivating the motion sensor security system for a predeterminedperiod of time; and enable the user to enter the secure area within thepredetermined period of time after the motion sensor security system istemporarily deactivated.
 6. The system of claim 1, wherein theprocessing device is further configured to record a footage of the userfor a predetermined period of time based on at least determining thatthe user has not produced the authentication device a predeterminedperiod of time after the initiation of the first warning tone; transmitthe recorded footage to the security personnel; and initiate a secondwarning tone to indicate that the user has not produced theauthentication device a predetermined period of time after theinitiation of the first warning tone.
 7. The system of claim 1, whereinthe processing device is configured to notify the security personnelusing at least one or a visual alarm, audible alarm, an e-mail, a textmessage, or a telecommunication device.
 8. A computer implemented methodfor monitoring a secure area for security purposes, the methodcomprising: receiving, using a computing device processor, an indicationthat a user entered a secure area, wherein the indication is based on atleast a user image captured by an image capturing device and a motionsensor device; determining, using an authentication device sensor,whether the user is wearing an authentication device based on at leastreceiving the indication that the user entered the secure area;determining, using a computing device processor, that the user is notwearing the authentication device; initiating, using a computing deviceprocessor, a first warning tone as an indication that the user is notwearing the authentication device; determining, using a computing deviceprocessor, that the user has not produced the authentication device apredetermined period of time after the initiation of the first warningtone; and notifying, using a computing device processor, securitypersonnel that the user has not produced the authentication device apredetermined period of time after the initiation of the first warningtone.
 9. The method of claim 8, wherein determining further comprisespausing the image capturing device based on at least determining, usingthe authentication device sensor, that the user is wearing theauthentication device, wherein pausing the image capturing devicefurther comprises temporarily deactivating the motion sensor securitysystem for a predetermined period of time; and enable the user to enterthe secure area within the predetermined period of time after the motionsensor security system is temporarily deactivated.
 10. The method ofclaim 9, wherein determining further comprises resuming the imagecapturing device a predetermined period of time after enabling the userto enter the secure area.
 11. The method of claim 8, wherein determiningfurther comprises extracting one or more authentication credentialsassociated with the user stored in the authentication device; comparethe extracted one or more authentication credentials to one or moreauthentication credentials stored in a database to determine a match;and validate the user based on at least determining a match between theextracted one or more authentication credentials with the one or moreauthentication credentials stored in the database.
 12. The method ofclaim 8, wherein determining further comprises determining, using theauthentication device sensor, that the user has produced theauthentication device within the predetermined period of time after theinitiation of the first warning tone; pause the image capturing device,wherein pausing the image capturing device further comprises temporarilydeactivating the motion sensor security system for a predeterminedperiod of time; and enable the user to enter the secure area within thepredetermined period of time after the motion sensor security system istemporarily deactivated.
 13. The method of claim 8, wherein notifyingfurther comprises recording a footage of the user for a predeterminedperiod of time based on at least determining that the user has notproduced the authentication device a predetermined period of time afterthe initiation of the first warning tone; transmit the recorded footageto the security personnel; and initiate a second warning tone toindicate that the user has not produced the authentication device apredetermined period of time after the initiation of the first warningtone.
 14. The method of claim 8, wherein notifying further comprisesnotifying the security personnel using at least one or a visual alarm,audible alarm, an e-mail, a text message, or a telecommunication device.15. A computer program product for monitoring a secure area for securitypurposes, the computer program product comprising a non-transitorycomputer-readable medium comprising code causing a first apparatus to:receive an indication that a user entered a secure area, wherein theindication is based on at least a user image captured by an imagecapturing device and a motion sensor device; determine, using anauthentication device sensor, whether the user is wearing anauthentication device based on at least receiving the indication thatthe user entered the secure area; determine that the user is not wearingthe authentication device; initiate a first warning tone as anindication that the user is not wearing the authentication device;determine that the user has not produced the authentication device apredetermined period of time after the initiation of the first warningtone; and notify security personnel that the user has not produced theauthentication device a predetermined period of time after theinitiation of the first warning tone.
 16. The computer program productof claim 15, wherein the first apparatus is configured to pause theimage capturing device based on at least determining, using theauthentication device sensor, that the user is wearing theauthentication device, wherein pausing the image capturing devicefurther comprises temporarily deactivating the motion sensor securitysystem for a predetermined period of time; and enable the user to enterthe secure area within the predetermined period of time after the motionsensor security system is temporarily deactivated.
 17. The computerprogram product of claim 15, wherein the first apparatus is furtherconfigured to resume the image capturing device a predetermined periodof time after enabling the user to enter the secure area.
 18. Thecomputer program product of claim 15, wherein the first apparatus isfurther configured to extract one or more authentication credentialsassociated with the user stored in the authentication device; comparethe extracted one or more authentication credentials to one or moreauthentication credentials stored in a database to determine a match;and validate the user based on at least determining a match between theextracted one or more authentication credentials with the one or moreauthentication credentials stored in the database.
 19. The computerprogram product of claim 15, wherein the first apparatus is furtherconfigured to determine, using the authentication device sensor, thatthe user has produced the authentication device within the predeterminedperiod of time after the initiation of the first warning tone; pause theimage capturing device, wherein pausing the image capturing devicefurther comprises temporarily deactivating the motion sensor securitysystem for a predetermined period of time; and enable the user to enterthe secure area within the predetermined period of time after the motionsensor security system is temporarily deactivated.
 20. The computerprogram product of claim 15, wherein the first apparatus is furtherconfigured to record a footage of the user for a predetermined period oftime based on at least determining that the user has not produced theauthentication device a predetermined period of time after theinitiation of the first warning tone; transmit the recorded footage tothe security personnel; and initiate a second warning tone to indicatethat the user has not produced the authentication device a predeterminedperiod of time after the initiation of the first warning tone.