CA2158912A1 - System of visually monitoring and recording of controlled access entry - Google Patents
System of visually monitoring and recording of controlled access entryInfo
- Publication number
- CA2158912A1 CA2158912A1 CA002158912A CA2158912A CA2158912A1 CA 2158912 A1 CA2158912 A1 CA 2158912A1 CA 002158912 A CA002158912 A CA 002158912A CA 2158912 A CA2158912 A CA 2158912A CA 2158912 A1 CA2158912 A1 CA 2158912A1
- Authority
- CA
- Canada
- Prior art keywords
- access control
- text
- access
- control device
- text information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/253—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition visually
Landscapes
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Closed-Circuit Television Systems (AREA)
- Alarm Systems (AREA)
- Lock And Its Accessories (AREA)
- Time Recorders, Dirve Recorders, Access Control (AREA)
Abstract
An access control system for permitting or denying access to a restricted area includes an access control device capable of reading information stored on an access card and determining whether the information read from the access card corresponds with memory information stored in the access control device to permit or deny access to a restricted area. A video camera is positioned at the entry area to the restricted area to capture live video images of an individual attempting access. The access control device determines whether the card is valid or invalid and translates the information into an output having text information through a serial communications interface port or other means of transmitting data to a text overlay control device. The text overlay control device overlays the text information describing the access control event directly onto the video images received from the video camera. The text information and video images are displayed on a video monitor while also being recorded on a video cassette recorder for later viewing.
Description
21S8~1~
~ Backqround of the Invention This invention relates to a system for access control, and, in particular, to an access control system which allows for overlaying of text information directly onto live video images. This combination of text information and live video images is then displayed on a monitor.
In recent years, various types of security and access control systems have been developed to monitor entry into buildings and areas under surveillance. For example in one type of system, a video camera is positioned above a doorway to a building. An individual, attempting to enter the building, inserts an identification or access card into an access reader located at the doorway. The insertion of the card into the reader in turn activates the video camera which is preprogrammed to zoom in on the doorway area where the individual is attempting access. The video camera sends a live video image to a monitor of the individual attempting access. The monitor then displays the video image of the individual at the door. The video image may then also be recorded on a video cassette recorder ("VCR").
More particularly, when the individual inserts the card into the access reader, the reader reads the information on the card which may be stored optically, magnetically or mechanically. This information then allows an access control device, such as a sensor panel, to determine whether the card is valid or invalid as well as the individual's name, identification code and other information which may be desirable. The determination, of whether the card is valid or invalid, thereby permitting or denying entry, is referred to as "an access control event." The access control event and the individual's name, identification code, date, time, etc., are then transmitted to a printer which prints this data out as a separate log. Then if security personnel want to know who validly or invalidly entered or attempted to enter the building, such an access control system requires having to review a printout of the log while also viewing the video images recorded on the video tape to correlate the data against the video images being observed. Accordingly, it is inconvenient and difficult to coordinate a review of the video images with an inspection of the log.
It is, therefore, an object of the present invention to provide an access control system which provides both easy and convenient access to viewing text information describing access control events together with live video images on a display device while also recording the live video images with the overlayed text information for later viewing.
It is an additional object of the present invention to provide an access control system which has a simple design and is easy to view and maintain text information together with video images.
It is a further object of the present invention to provide an access control system which utilizes an access control device having a serial communications interface port or other means of transmitting data to provide text overlay information hich correlates with the video image.
It is an additional object o~ the preser-invention to have the capability cf triggering an alarmbased on text information relating to an access control event transmitted through a serial communications interface port or other means of transmitting data in an access control device.
Summary of the Invention In accordance with the principles of the present invention, the above and other objectives are realized in an access control system having an access control device capable of reading information stored on an access card and determining whether the information read from the access card corresponds with memory information stored in the access control device to permit or deny access to a restricted area. A video camera is positioned at the entry area to the restricted area to capture live video images of an individual attempting access. The access control device determines whether the card is valid or invalid -and translates the information into an output having text information through a serial communications interface port or other means of transmitting data to a text overlay control device. The text overlay control device overlays the text information describing the access control event directly onto the video images received from the video camera. The text information and video images are displayed on a video monitor while also being recorded on a video cassette recorder for later viewing.
Brief Description of the Drawinqs The above and other features and aspects of the present invention will become more apparent upon reading the following detailed description in conjunction with the accompanying drawings, in which:
FIG. 1 shows a block diagram of an access control system in accordance with the present invention; and FIG. 2 shows a block diagram of the text overlay control device of the access control system of FIG. 1.
Detailed Description The access control system 10 as shown in FIG. 1 allows for monitoring of individuals entering buildings or other areas requiring some means of surveillance.
Particularly, an access control event occurs when an individual attempts to enter a building by using an identification or access card with information 215~912 concerning the individual stored therein. The information read from the card results in a determination that the access card is either a valid or invalid card being used to access the building. The access control system 10 then permits security personnel to view a display device, such as a video monitor, which displays as text information on the monitor the access control event, such as "VALID" or "DENIED INVALID", overlayed directly onto a live video image showing the individual attempting entry. Such text information being overlayed directly onto the video image enables security personnel to be immediately and easily aware of all access control events. Recording means, such as a programmed VCR, then records the combination of text information and video images together for later viewing on a recording medium, such as videotape.
The block diagram of FIG. 1 shows in greater detail the access control system 10. First and second access card readers 12, such as Sensormatic~ card readers, model no. IRWS00, are provided at entry areas to a restricted area, such as doorways of a building, along with first and second closed-circuit television ("CCTV") or video cameras 28 which monitor entry to the specified doorways. For an individual to gain entry to the building, the individual inserts an access card (not shown) into one of the access card readers. The insertion of the card triggers either the first or 215~912 second video camera depending upon which access card reader is being used. A video switcher 26 allows for viewing of a particular entrance to be switched between either the first or second camera.
The card used in the access card reader 12 may have, for example, magnetic information embedded within a magnetic strip which allows for a variety of information to be stored on the card. Such information stored on the card can include, but is not limited to, the individual's identification number, facility code number, name, address, etc. This information, read from the card reader 12 as a digital bitstream, is then sent to access control means or an access control device 14, such as a Sensormatic~ panel, model no.
SPS4. The access control device 14 compares information from the card with corresponding registered memory information stored in the memory of the access control device 14 to determine whether the information from the card corresponds with the registered information. The access control device 14 then encodes and translates the correspondence, or lack thereof, into an output having text information as an American Standard Code for Information Interchange ("ASCII" ) character string. This comparison determines whether the card used by the individual is valid or invalid in order to define an access control event. The text information or ASCII character string is in turn sent -to computing means or computer 20 through a serial communications interface port 15.
The computer 20, such as an IBM~ compatible computer configured with Sensormatic~ AC 500 software, may receive the text information coming from several access control devices and display the text information on a computer monitor 22. The access control device 14 may control up to eight access card readers at a time and the computer 20 may monitor at least one access control device. However, the access control system 10 is not limited to such a configuration but can have a variety of configurations and components in order to provide a system for permitting or denying access to a restricted area. A printer 24 attached to the computer 20 provides a print-out of the information read from the access card as well as the determination by the access control device 14 of an access control event.
The text information, as ASCII character strings, is then sent from the computer 20 to a text overlay control device 100. Video signals from the video cameras 28 of the video images at a particular entryway are also sent to the text overlay control device 100.
The text overlay control device 100 then combines the text information with the video signals to overlay the text information directly onto the video image. More particularly, the text overlay control device 100 combines the text information or ASCII character string, indicating an attempted access to a restricted area, e.g., an access control event such as VALID or DENIED INVALID, with the corresponding video images.
This combination is then displayed on a monitor 30 to allow security personnel to view the video images while also be informed of a valid or invalid entry to a restricted area by seeing such text information displayed therewith. This combination of text information and video images is also simultaneously recorded on a VCR 32 for later viewing.
FIG. 1 also shows a mouse 34 connected to the text overlay control device 100 as an input device. The mouse 34 allows security personnel additional monitoring of the access control system 10. A user utilizes the mouse 34 in order to program the text overlay control device 100 to recognize strings of text information that are indicative of particular access control events. By programming the text overlay control device 100 to recognize particular access control events, security personnel can be notified visually on the monitor 30 of these events as well as allow the VCR 32 to be triggered to begin recording the events.
Such programming is possible by the user utilizing the mouse 34 to access a menu driven software program generated by the text overlay control device 100. To program the text overlay control device 100, the user views a series of menus displayed on the monitor 30 by clicking the mouse 34. The first line of text in the window displayed on the monitor 30 is in reverse video or highlighted. By moving the mouse 34, the user can select the desired menu items. By selecting the desired menu item, a user can define the particular access control event, such as DENIED INVALID or INVALID, to program the text overlay control device 100 to respond to particular access control events as "alarm events."
For example, when an alarm event, such as "DENIED
INVALID~ occurs, the text information "DENIED INVALID"
appears on the monitor 30 thereby visually alerting security personnel. In addition, the text overlay control device 100 closes an alarm relay to begin recording the video signal from the camera 28 along with the text information "DENIED INVALID" overlayed thereon to record on the VCR 32 the "invalid" attempted entry. Further, the text overlay control device 100 triggers an audible alarm 38, such as a bell or siren, further to alert security personnel that an alarm event is occurring. In addition, a printer 36 is triggered by the text overlay control device 100 to print a hard copy of a log of the alarm events as they occur and other information from the individual's access card, such as the individual's name, address, individual's identification number, facility code number as well as the date and time.
Accordingly, by defining particular access control events as alarm events, security personnel can watch or replay on the monitor 30 the alarm event recorded by the VCR 32 to show the actual transaction along with the text information indicating the alarm event, be alerted by an audible alarm 38 and have a log printed 5 out by the printer 36 listing each alarm event, showing how frequently an alarm event occurred and the time it occurred.
FIG. 2 illustrates in greater detail the text overlay control device 100. The text overlay control device 100 includes a microprocessor 102 having a memory (not shown) for evaluating the output of the computer 20 and for determining an access control eventO The text overlay control device 100 also incorporates various types of interfaces such as a 15 printer interface 104, an alarm interface 106 ~ a VCR
control interface 108 and a mouse interface 110 to permit communication with the corresponding device.
The microprocessor 102 controls the functioning between the printer interface 104 and the printer 36, the alarm 20 interface 106 and the audible alarm 38 and the VCR
control interface 108 and the VCR 32. The mouse interface 110 is provided for connecting the mouse 34 to the microprocessor 102.
As shown in FIG. 2, the text overlay control 25 device 100 also has video signals from the video cameras 28 via the video switcher 26 passing through a video buffer and filter 120 in the text overlay control device 100. The video signal at this point takes two paths. One path feeds the video signal to a video/text multiplexer and driver 124 while the other path feeds the video signal to a sync and character generator 122.
The text information from the computer 20 is feed to 5 the microprocessor 102 in the text overlay control device 100. The microprocessor 102 then feeds this information to the sync and character generator 122.
The signal from the sync and character generator 122 is then mixed with the video signal from the output of the video buffer and filter 120 at the video/text multiplexer and driver 124. The combined video signals and text information are then displayed on a video monitor 30 while also being recorded for later viewing on the VCR 3 2.
The access control system 10 can be used for a variety of types of restricted areas. For example in an area with a small number of entrances, only a limited number of access control devices 14 are needed.
Accordingly, the information from the devices 14 can be 20 sent directly to a text overlay control device 100 without requiring the computer 20. Further, one printer may be used to generate reports for both the computer 20 and the text overlay control device 100.
In addition, recording means and recording mediums 25 can include a variety of other types of recording devices and methods. The cameras 16 can include domes or moveable cameras or pan-tilt-zoom camera assemblies to focus in on a surveillance area. Nor is the 21~8912 functioning of the VCR 32 limited to that recited above, but can be programmed in a variety of ways to record the permission and/or denial of entry into a restricted area.
Additionally, an access control event is not necessarily limited to text information which when displayed reads as "VALID", "INVALID" or "DENIED
INVALID" on the video monitor 30 but may be any sequence of characters or words which indicates authorization or denial of entry to security personnel or any other alarm event, such as detection of a fire, unauthorized intrusion, glass breaking detection, etc.
An access control event may also include text information indicating security levels, codes or other information concerning the individual which assist security personnel in monitoring access to a building or area.
In all cases it is understood that the above-described configurations are merely illustrative of the many possible specific embodiments which represent applications of the present invention. Numerous and varied other configurations, can be readily devised in accordance with the principles of the present invention without departing from the spirit and scope of the invention.
~ Backqround of the Invention This invention relates to a system for access control, and, in particular, to an access control system which allows for overlaying of text information directly onto live video images. This combination of text information and live video images is then displayed on a monitor.
In recent years, various types of security and access control systems have been developed to monitor entry into buildings and areas under surveillance. For example in one type of system, a video camera is positioned above a doorway to a building. An individual, attempting to enter the building, inserts an identification or access card into an access reader located at the doorway. The insertion of the card into the reader in turn activates the video camera which is preprogrammed to zoom in on the doorway area where the individual is attempting access. The video camera sends a live video image to a monitor of the individual attempting access. The monitor then displays the video image of the individual at the door. The video image may then also be recorded on a video cassette recorder ("VCR").
More particularly, when the individual inserts the card into the access reader, the reader reads the information on the card which may be stored optically, magnetically or mechanically. This information then allows an access control device, such as a sensor panel, to determine whether the card is valid or invalid as well as the individual's name, identification code and other information which may be desirable. The determination, of whether the card is valid or invalid, thereby permitting or denying entry, is referred to as "an access control event." The access control event and the individual's name, identification code, date, time, etc., are then transmitted to a printer which prints this data out as a separate log. Then if security personnel want to know who validly or invalidly entered or attempted to enter the building, such an access control system requires having to review a printout of the log while also viewing the video images recorded on the video tape to correlate the data against the video images being observed. Accordingly, it is inconvenient and difficult to coordinate a review of the video images with an inspection of the log.
It is, therefore, an object of the present invention to provide an access control system which provides both easy and convenient access to viewing text information describing access control events together with live video images on a display device while also recording the live video images with the overlayed text information for later viewing.
It is an additional object of the present invention to provide an access control system which has a simple design and is easy to view and maintain text information together with video images.
It is a further object of the present invention to provide an access control system which utilizes an access control device having a serial communications interface port or other means of transmitting data to provide text overlay information hich correlates with the video image.
It is an additional object o~ the preser-invention to have the capability cf triggering an alarmbased on text information relating to an access control event transmitted through a serial communications interface port or other means of transmitting data in an access control device.
Summary of the Invention In accordance with the principles of the present invention, the above and other objectives are realized in an access control system having an access control device capable of reading information stored on an access card and determining whether the information read from the access card corresponds with memory information stored in the access control device to permit or deny access to a restricted area. A video camera is positioned at the entry area to the restricted area to capture live video images of an individual attempting access. The access control device determines whether the card is valid or invalid -and translates the information into an output having text information through a serial communications interface port or other means of transmitting data to a text overlay control device. The text overlay control device overlays the text information describing the access control event directly onto the video images received from the video camera. The text information and video images are displayed on a video monitor while also being recorded on a video cassette recorder for later viewing.
Brief Description of the Drawinqs The above and other features and aspects of the present invention will become more apparent upon reading the following detailed description in conjunction with the accompanying drawings, in which:
FIG. 1 shows a block diagram of an access control system in accordance with the present invention; and FIG. 2 shows a block diagram of the text overlay control device of the access control system of FIG. 1.
Detailed Description The access control system 10 as shown in FIG. 1 allows for monitoring of individuals entering buildings or other areas requiring some means of surveillance.
Particularly, an access control event occurs when an individual attempts to enter a building by using an identification or access card with information 215~912 concerning the individual stored therein. The information read from the card results in a determination that the access card is either a valid or invalid card being used to access the building. The access control system 10 then permits security personnel to view a display device, such as a video monitor, which displays as text information on the monitor the access control event, such as "VALID" or "DENIED INVALID", overlayed directly onto a live video image showing the individual attempting entry. Such text information being overlayed directly onto the video image enables security personnel to be immediately and easily aware of all access control events. Recording means, such as a programmed VCR, then records the combination of text information and video images together for later viewing on a recording medium, such as videotape.
The block diagram of FIG. 1 shows in greater detail the access control system 10. First and second access card readers 12, such as Sensormatic~ card readers, model no. IRWS00, are provided at entry areas to a restricted area, such as doorways of a building, along with first and second closed-circuit television ("CCTV") or video cameras 28 which monitor entry to the specified doorways. For an individual to gain entry to the building, the individual inserts an access card (not shown) into one of the access card readers. The insertion of the card triggers either the first or 215~912 second video camera depending upon which access card reader is being used. A video switcher 26 allows for viewing of a particular entrance to be switched between either the first or second camera.
The card used in the access card reader 12 may have, for example, magnetic information embedded within a magnetic strip which allows for a variety of information to be stored on the card. Such information stored on the card can include, but is not limited to, the individual's identification number, facility code number, name, address, etc. This information, read from the card reader 12 as a digital bitstream, is then sent to access control means or an access control device 14, such as a Sensormatic~ panel, model no.
SPS4. The access control device 14 compares information from the card with corresponding registered memory information stored in the memory of the access control device 14 to determine whether the information from the card corresponds with the registered information. The access control device 14 then encodes and translates the correspondence, or lack thereof, into an output having text information as an American Standard Code for Information Interchange ("ASCII" ) character string. This comparison determines whether the card used by the individual is valid or invalid in order to define an access control event. The text information or ASCII character string is in turn sent -to computing means or computer 20 through a serial communications interface port 15.
The computer 20, such as an IBM~ compatible computer configured with Sensormatic~ AC 500 software, may receive the text information coming from several access control devices and display the text information on a computer monitor 22. The access control device 14 may control up to eight access card readers at a time and the computer 20 may monitor at least one access control device. However, the access control system 10 is not limited to such a configuration but can have a variety of configurations and components in order to provide a system for permitting or denying access to a restricted area. A printer 24 attached to the computer 20 provides a print-out of the information read from the access card as well as the determination by the access control device 14 of an access control event.
The text information, as ASCII character strings, is then sent from the computer 20 to a text overlay control device 100. Video signals from the video cameras 28 of the video images at a particular entryway are also sent to the text overlay control device 100.
The text overlay control device 100 then combines the text information with the video signals to overlay the text information directly onto the video image. More particularly, the text overlay control device 100 combines the text information or ASCII character string, indicating an attempted access to a restricted area, e.g., an access control event such as VALID or DENIED INVALID, with the corresponding video images.
This combination is then displayed on a monitor 30 to allow security personnel to view the video images while also be informed of a valid or invalid entry to a restricted area by seeing such text information displayed therewith. This combination of text information and video images is also simultaneously recorded on a VCR 32 for later viewing.
FIG. 1 also shows a mouse 34 connected to the text overlay control device 100 as an input device. The mouse 34 allows security personnel additional monitoring of the access control system 10. A user utilizes the mouse 34 in order to program the text overlay control device 100 to recognize strings of text information that are indicative of particular access control events. By programming the text overlay control device 100 to recognize particular access control events, security personnel can be notified visually on the monitor 30 of these events as well as allow the VCR 32 to be triggered to begin recording the events.
Such programming is possible by the user utilizing the mouse 34 to access a menu driven software program generated by the text overlay control device 100. To program the text overlay control device 100, the user views a series of menus displayed on the monitor 30 by clicking the mouse 34. The first line of text in the window displayed on the monitor 30 is in reverse video or highlighted. By moving the mouse 34, the user can select the desired menu items. By selecting the desired menu item, a user can define the particular access control event, such as DENIED INVALID or INVALID, to program the text overlay control device 100 to respond to particular access control events as "alarm events."
For example, when an alarm event, such as "DENIED
INVALID~ occurs, the text information "DENIED INVALID"
appears on the monitor 30 thereby visually alerting security personnel. In addition, the text overlay control device 100 closes an alarm relay to begin recording the video signal from the camera 28 along with the text information "DENIED INVALID" overlayed thereon to record on the VCR 32 the "invalid" attempted entry. Further, the text overlay control device 100 triggers an audible alarm 38, such as a bell or siren, further to alert security personnel that an alarm event is occurring. In addition, a printer 36 is triggered by the text overlay control device 100 to print a hard copy of a log of the alarm events as they occur and other information from the individual's access card, such as the individual's name, address, individual's identification number, facility code number as well as the date and time.
Accordingly, by defining particular access control events as alarm events, security personnel can watch or replay on the monitor 30 the alarm event recorded by the VCR 32 to show the actual transaction along with the text information indicating the alarm event, be alerted by an audible alarm 38 and have a log printed 5 out by the printer 36 listing each alarm event, showing how frequently an alarm event occurred and the time it occurred.
FIG. 2 illustrates in greater detail the text overlay control device 100. The text overlay control device 100 includes a microprocessor 102 having a memory (not shown) for evaluating the output of the computer 20 and for determining an access control eventO The text overlay control device 100 also incorporates various types of interfaces such as a 15 printer interface 104, an alarm interface 106 ~ a VCR
control interface 108 and a mouse interface 110 to permit communication with the corresponding device.
The microprocessor 102 controls the functioning between the printer interface 104 and the printer 36, the alarm 20 interface 106 and the audible alarm 38 and the VCR
control interface 108 and the VCR 32. The mouse interface 110 is provided for connecting the mouse 34 to the microprocessor 102.
As shown in FIG. 2, the text overlay control 25 device 100 also has video signals from the video cameras 28 via the video switcher 26 passing through a video buffer and filter 120 in the text overlay control device 100. The video signal at this point takes two paths. One path feeds the video signal to a video/text multiplexer and driver 124 while the other path feeds the video signal to a sync and character generator 122.
The text information from the computer 20 is feed to 5 the microprocessor 102 in the text overlay control device 100. The microprocessor 102 then feeds this information to the sync and character generator 122.
The signal from the sync and character generator 122 is then mixed with the video signal from the output of the video buffer and filter 120 at the video/text multiplexer and driver 124. The combined video signals and text information are then displayed on a video monitor 30 while also being recorded for later viewing on the VCR 3 2.
The access control system 10 can be used for a variety of types of restricted areas. For example in an area with a small number of entrances, only a limited number of access control devices 14 are needed.
Accordingly, the information from the devices 14 can be 20 sent directly to a text overlay control device 100 without requiring the computer 20. Further, one printer may be used to generate reports for both the computer 20 and the text overlay control device 100.
In addition, recording means and recording mediums 25 can include a variety of other types of recording devices and methods. The cameras 16 can include domes or moveable cameras or pan-tilt-zoom camera assemblies to focus in on a surveillance area. Nor is the 21~8912 functioning of the VCR 32 limited to that recited above, but can be programmed in a variety of ways to record the permission and/or denial of entry into a restricted area.
Additionally, an access control event is not necessarily limited to text information which when displayed reads as "VALID", "INVALID" or "DENIED
INVALID" on the video monitor 30 but may be any sequence of characters or words which indicates authorization or denial of entry to security personnel or any other alarm event, such as detection of a fire, unauthorized intrusion, glass breaking detection, etc.
An access control event may also include text information indicating security levels, codes or other information concerning the individual which assist security personnel in monitoring access to a building or area.
In all cases it is understood that the above-described configurations are merely illustrative of the many possible specific embodiments which represent applications of the present invention. Numerous and varied other configurations, can be readily devised in accordance with the principles of the present invention without departing from the spirit and scope of the invention.
Claims (17)
1. An access control system for permitting or denying entry into a restricted area to an individual using an access card to gain entry into said restricted area comprising:
an access card reader for reading information from the access card, said access card reader located at an entry area of said restricted area;
access control means for determining whether said information read by said access card reader corresponds with memory information stored in said access control means to permit or deny entry into the restricted area and for converting said information into an output having text information describing an access control event;
a video camera for providing video images of the entry area and positioned at said entry area;
a text overlay control device connected to said video camera and said access control means for overlaying the text information from said access control means onto said video images corresponding to said access control event; and a display device for displaying said video images overlayed with said text information from said text overlay control device describing said access control event.
an access card reader for reading information from the access card, said access card reader located at an entry area of said restricted area;
access control means for determining whether said information read by said access card reader corresponds with memory information stored in said access control means to permit or deny entry into the restricted area and for converting said information into an output having text information describing an access control event;
a video camera for providing video images of the entry area and positioned at said entry area;
a text overlay control device connected to said video camera and said access control means for overlaying the text information from said access control means onto said video images corresponding to said access control event; and a display device for displaying said video images overlayed with said text information from said text overlay control device describing said access control event.
2. An access control system in accordance with claim 1, wherein said display device displays the text information describing the access control event of a denial or acceptance of entry into the restricted area.
3. An access control system in accordance with claim 2, wherein said access control means includes a serial communications interface port for transmitting the output having the text information to said text overlay control device
4. An access control system in accordance with claim 3, wherein said text information describing the access control event is an American Standard Code for Information Interchange ("ASCII") character string.
5. An access control system in accordance with claim 4, further comprising:
recording means for recording said video images overlayed with said text information describing said access control event from said text overlay control device on a recording medium.
recording means for recording said video images overlayed with said text information describing said access control event from said text overlay control device on a recording medium.
6. An access control system in accordance with claim 5, wherein said text overlay control device further controls a printer to print a log of the text information.
7. An access control system in accordance with claim 6, wherein said text overlay control device further controls an audible alarm to sound alerting personnel of the access control event.
8. An access control system in accordance with claim 1, wherein said display device displays the text information describing the access control event of a denial or acceptance of entry into the restricted area.
9. An access control system in accordance with claim 8, wherein said text overlay control device identifies the text information as an alarm event and transmits the text information indicating the alarm event to said display device, said display device displays the text information thereby alerting personnel that the alarm event is occurring.
10. An access control system in accordance with claim 9, wherein said text overlay control device triggers a printer to print a log of the text information based upon the text overlay control device identifying the text information as the alarm event.
11. An access control system in accordance with claim 10, wherein said text overlay control device triggers an audible alarm to sound based upon the text overlay control device identifying the text information as the alarm event.
12. An access control system in accordance with claim 11, wherein said text overlay control device triggers recording means to record said video images overlayed with said text information on a recording medium based upon the text overlay control device identifying the text information as the alarm event.
13. An access control system for permitting or denying entry into a restricted area to an individual using an access card to gain entry into said restricted area comprising:
an access card reader for reading information from the access card, said access card reader located at an entry area of said restricted area;
access control means for determining whether said information read by said access card reader corresponds with memory information stored in said access control means to permit or deny entry into the restricted area and for converting said information into an output having text information describing an access control event;
a video camera for providing video images of the entry area and positioned at said entry area;
computing means connected to said access control means for controlling the functioning of said access control means and said video camera, for receiving and storing the output having the text information from said access control means and for sending the output having the text information to said text overlay control device;
a text overlay control device connected to said video camera and said computing means for overlaying the text information from said computing means onto said video images corresponding to said access control event; and a display device for displaying said video images overlayed with said text information from said text overlay control device describing said access control event.
an access card reader for reading information from the access card, said access card reader located at an entry area of said restricted area;
access control means for determining whether said information read by said access card reader corresponds with memory information stored in said access control means to permit or deny entry into the restricted area and for converting said information into an output having text information describing an access control event;
a video camera for providing video images of the entry area and positioned at said entry area;
computing means connected to said access control means for controlling the functioning of said access control means and said video camera, for receiving and storing the output having the text information from said access control means and for sending the output having the text information to said text overlay control device;
a text overlay control device connected to said video camera and said computing means for overlaying the text information from said computing means onto said video images corresponding to said access control event; and a display device for displaying said video images overlayed with said text information from said text overlay control device describing said access control event.
14. An access control system in accordance with claim 13, wherein said display device displays the text information describing the access control event of a denial or acceptance of entry into the restricted area.
15. An access control system in accordance with claim 14, further comprising:
recording means for recording said video images overlayed with said text information describing said access control event from said text overlay control device on a recording medium.
recording means for recording said video images overlayed with said text information describing said access control event from said text overlay control device on a recording medium.
16. An access control system in accordance with claim 15, wherein said text overlay control device further controls a printer to print a log of the text information.
17. An access control system in accordance with claim 16, wherein said text overlay control device further controls an audible alarm to sound alerting personnel of the access control event.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US37926195A | 1995-01-27 | 1995-01-27 | |
US08/379,261 | 1995-01-27 |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2158912A1 true CA2158912A1 (en) | 1996-07-28 |
Family
ID=23496508
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002158912A Abandoned CA2158912A1 (en) | 1995-01-27 | 1995-09-22 | System of visually monitoring and recording of controlled access entry |
Country Status (6)
Country | Link |
---|---|
EP (1) | EP0724235A3 (en) |
JP (1) | JPH08240044A (en) |
AR (1) | AR001065A1 (en) |
AU (1) | AU3293395A (en) |
BR (1) | BR9600214A (en) |
CA (1) | CA2158912A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10248863B2 (en) | 2016-06-15 | 2019-04-02 | International Business Machines Corporation | Augemented video analytics for testing internet of things (IoT) devices |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5159006B2 (en) | 2000-05-25 | 2013-03-06 | インベンテイオ・アクテイエンゲゼルシヤフト | How to start a procedure in a building |
GB2368955A (en) * | 2000-07-12 | 2002-05-15 | Network Systems Group Ltd | Intercom and supervisory system recording image of caller |
US6504479B1 (en) * | 2000-09-07 | 2003-01-07 | Comtrak Technologies Llc | Integrated security system |
ES2381292B1 (en) * | 2009-12-01 | 2013-04-15 | Segur Parking, S.L. | SYSTEM OF ACCESS TO COLLECTIVE RESTRICTED ACCESS AND ASSOCIATED PROCEDURE |
US9513364B2 (en) * | 2014-04-02 | 2016-12-06 | Tyco Fire & Security Gmbh | Personnel authentication and tracking system |
CN105809757A (en) * | 2014-12-31 | 2016-07-27 | 青岛中科软件股份有限公司 | Commercial attendance system |
WO2019100385A1 (en) * | 2017-11-27 | 2019-05-31 | 齐心商用设备(深圳)有限公司 | Attendance machine and attendance method for attendance machine |
JP7437521B2 (en) * | 2020-09-16 | 2024-02-22 | 株式会社日立製作所 | In-building traffic flow setting device and in-building traffic flow setting method |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS56149880A (en) * | 1980-04-23 | 1981-11-19 | Mitsubishi Electric Corp | Video camera equipment |
US4821118A (en) * | 1986-10-09 | 1989-04-11 | Advanced Identification Systems, Inc. | Video image system for personal identification |
US4879747A (en) * | 1988-03-21 | 1989-11-07 | Leighton Frank T | Method and system for personal identification |
GB2223614A (en) * | 1988-08-30 | 1990-04-11 | Gerald Victor Waring | Identity verification |
US4991008A (en) * | 1988-12-01 | 1991-02-05 | Intec Video Systems, Inc. | Automatic transaction surveillance system |
JP2793658B2 (en) * | 1988-12-28 | 1998-09-03 | 沖電気工業株式会社 | Automatic screening device |
US5384846A (en) * | 1993-04-26 | 1995-01-24 | Pitney Bowes Inc. | System and apparatus for controlled production of a secure identification card |
-
1995
- 1995-09-22 CA CA002158912A patent/CA2158912A1/en not_active Abandoned
- 1995-09-27 AU AU32933/95A patent/AU3293395A/en not_active Abandoned
- 1995-12-22 EP EP95120470A patent/EP0724235A3/en not_active Withdrawn
-
1996
- 1996-01-03 AR AR33491696A patent/AR001065A1/en unknown
- 1996-01-25 BR BR9600214A patent/BR9600214A/en not_active Application Discontinuation
- 1996-01-29 JP JP8034388A patent/JPH08240044A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10248863B2 (en) | 2016-06-15 | 2019-04-02 | International Business Machines Corporation | Augemented video analytics for testing internet of things (IoT) devices |
US10565451B2 (en) | 2016-06-15 | 2020-02-18 | International Business Machines Corporation | Augmented video analytics for testing internet of things (IoT) devices |
Also Published As
Publication number | Publication date |
---|---|
JPH08240044A (en) | 1996-09-17 |
AU3293395A (en) | 1996-08-08 |
AR001065A1 (en) | 1997-09-24 |
EP0724235A2 (en) | 1996-07-31 |
BR9600214A (en) | 1998-01-06 |
EP0724235A3 (en) | 1998-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1533768B1 (en) | Portable security system | |
EP1279150B1 (en) | Surveillance system with camera | |
EP1346328B1 (en) | Method and apparatus to reduce false alarms in exit/entrance situations for residential security monitoring | |
US20020163577A1 (en) | Event detection in a video recording system | |
US20050132414A1 (en) | Networked video surveillance system | |
KR20050007293A (en) | Integrated visualization of security information for an individual | |
AU2000241410A1 (en) | Surveillance system with camera | |
WO2012081857A2 (en) | System for monitoring the misuse of image information | |
JP7176036B2 (en) | Linked monitoring equipment | |
EP0724235A2 (en) | System of visually monitoring and recording of controlled access entry | |
US20090153660A1 (en) | Surveillance system and method including active alert function | |
KR20010007700A (en) | Security system and method for monitoring image data at outside | |
JPH0686295A (en) | Monitor camera device | |
JPH09198538A (en) | Entrance and exit management terminal equipment | |
JP2000295598A (en) | Remote monitor system | |
JP2005094642A (en) | Surveillance camera system | |
KR19990073948A (en) | Access Control System Using Image | |
KR100664648B1 (en) | Clint terminal apparatus for security management system via internet | |
WO1998032106A1 (en) | Video security systems | |
KR20010100587A (en) | Intelligent prevention system | |
KR100367965B1 (en) | A position intensive shooting system of watching camera by wireless remote control | |
TWI488151B (en) | Access security system with video surveillance and method for the same | |
KR100437731B1 (en) | Monitoring system and method thereof | |
JP2000132774A (en) | Intruder monitoring system | |
Klasen et al. | Video coding for next-generation surveillance systems |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |