US 12,242,655 B2
System and method for security management though forensic analysis of images of scenes
Ian Roche, Glanmire (IE); Philip E. Hummel, San Jose, CA (US); and Dharmesh M. Patel, Round Rock, TX (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Dec. 20, 2022, as Appl. No. 18/068,766.
Prior Publication US 2024/0202371 A1, Jun. 20, 2024
Int. Cl. G06F 21/62 (2013.01)
CPC G06F 21/629 (2013.01) 20 Claims
OG exemplary drawing
 
1. A method for prioritizing allocation of limited computing resources of a data processing system, the method comprising:
obtaining an identifier;
obtaining schedule data using the identifier, the schedule data specifying a start position and a presumed stop position for a person, the person being presumed to traverse to the presumed stop position from the start position;
performing a forensic search of sensor data for instances of appearances of the person identified by the identifier to obtain position data for the person;
generating a path based on the position data, the path being followed by the person after the person leaves the start position specified by the schedule data;
obtaining training data based on the path and the schedule data; and
allocating the limited computing resources of the data processing system based on the training data to modify a level of surveillance of the person.