US 12,314,388 B2
Systems and methods for machine learning enhanced intelligent building access endpoint security monitoring and management
Shikhar Shrestha, Palo Alto, CA (US); Vikesh Khanna, Palo Alto, CA (US); and James Douglas Connor, Palo Alto, CA (US)
Assigned to Ambient AI, Inc., San Jose, CA (US)
Filed by Ambient AI, Inc., Palo Alto, VA (US)
Filed on Nov. 20, 2023, as Appl. No. 18/513,854.
Application 18/513,854 is a continuation of application No. 18/171,370, filed on Feb. 19, 2023, granted, now 11,861,002.
Application 18/171,370 is a continuation of application No. 17/880,476, filed on Aug. 3, 2022, granted, now 11,640,462, issued on May 2, 2023.
Application 17/880,476 is a continuation of application No. 16/696,682, filed on Nov. 26, 2019, granted, now 11,443,515, issued on Aug. 24, 2022.
Claims priority of provisional application 62/784,215, filed on Dec. 21, 2018.
Prior Publication US 2024/0095355 A1, Mar. 21, 2024
Int. Cl. G06V 20/00 (2022.01); G06F 18/21 (2023.01); G06F 18/2431 (2023.01); G06F 21/31 (2013.01); G06F 21/55 (2013.01); G06N 5/04 (2023.01); G06N 20/20 (2019.01); G06V 10/25 (2022.01); G06V 10/82 (2022.01); G06V 20/40 (2022.01); G06V 20/52 (2022.01); G06V 30/19 (2022.01); G06V 30/262 (2022.01); G08B 13/196 (2006.01); G08B 29/18 (2006.01); H04N 23/90 (2023.01); G06Q 50/26 (2012.01)
CPC G06F 21/554 (2013.01) [G06F 18/21 (2023.01); G06F 18/2431 (2023.01); G06F 21/31 (2013.01); G06N 5/04 (2013.01); G06N 20/20 (2019.01); G06V 10/25 (2022.01); G06V 10/82 (2022.01); G06V 20/41 (2022.01); G06V 20/52 (2022.01); G06V 30/19173 (2022.01); G06V 30/274 (2022.01); G08B 13/19613 (2013.01); G08B 29/188 (2013.01); H04N 23/90 (2023.01); G06Q 50/265 (2013.01); G06V 20/44 (2022.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
determining a set of values for access parameters based on data from an access point sensor;
determining a set of values for semantic parameters based on data from a camera system;
after semantic parameter determination, determining a correlation between the set of values for the access parameters and the set of values for the semantic parameters;
determining a context classification based on the correlation; and
determining a security risk based on the context classification.