| CPC G06V 20/52 (2022.01) [G06F 21/316 (2013.01); G06F 21/32 (2013.01); G06F 21/83 (2013.01); G06F 2221/2111 (2013.01)] | 20 Claims |

|
1. A computer-implemented method for monitoring use of a secure system, the method comprising:
defining a detection zone extending from an operator terminal of the secure system to a depth boundary spaced apart from the operator terminal and corresponding to a distance from the operator terminal beyond which an operator cannot interact with the secure system;
detecting one or more operators associated with the secure system;
for each of the operators, (i) authenticating the operator and initiating a session for the operator on the operator terminal, (ii) detecting a walk-away event of the operator using a depth-sensing camera system co-located with the operator terminal based on the operator being detected beyond the depth boundary, and (iii) responsive to the walk-away event is being detected, starting a re-entry timer associated with the operator;
upon expiration of the re-entry timer associated with a respective operator, closing the session of the respective operator and logging the respective operator out of the secure system;
detecting a face within the detection zone using the depth-sensing camera system;
determining that the face corresponds to the respective operator; and
when the re-entry timer associated with the respective operator has not expired and the detected face corresponds to the respective operator, re-validating the session for the respective operator on the operator terminal without requiring additional authentication.
|