US 12,118,085 B2
Systems and methods for machine learning enhanced intelligent building access endpoint security monitoring and management
Shikhar Shrestha, San Jose, CA (US); Vikesh Khanna, San Jose, CA (US); and James Douglas Connor, San Jose, CA (US)
Assigned to Ambient AI, Inc., San Jose, CA (US)
Filed by Ambient AI, Inc., San Jose, CA (US)
Filed on Sep. 20, 2023, as Appl. No. 18/370,523.
Application 18/370,523 is a continuation of application No. 18/171,370, filed on Feb. 19, 2023, granted, now 11,861,002.
Application 18/171,370 is a continuation of application No. 17/880,476, filed on Aug. 3, 2022, granted, now 11,640,462, issued on May 2, 2023.
Application 17/880,476 is a continuation of application No. 16/696,682, filed on Nov. 26, 2019, granted, now 11,443,515, issued on Sep. 13, 2022.
Claims priority of provisional application 62/784,215, filed on Dec. 21, 2018.
Prior Publication US 2024/0012905 A1, Jan. 11, 2024
Int. Cl. G06F 21/55 (2013.01); G06F 18/21 (2023.01); G06F 18/2431 (2023.01); G06F 21/31 (2013.01); G06N 5/04 (2023.01); G06N 20/20 (2019.01); G06V 10/25 (2022.01); G06V 10/82 (2022.01); G06V 20/40 (2022.01); G06V 20/52 (2022.01); G06V 30/19 (2022.01); G06V 30/262 (2022.01); G08B 13/196 (2006.01); G08B 29/18 (2006.01); H04N 23/90 (2023.01); G06Q 50/26 (2012.01); G06V 10/00 (2022.01)
CPC G06F 21/554 (2013.01) [G06F 18/21 (2023.01); G06F 18/2431 (2023.01); G06F 21/31 (2013.01); G06N 5/04 (2013.01); G06N 20/20 (2019.01); G06V 10/25 (2022.01); G06V 10/82 (2022.01); G06V 20/41 (2022.01); G06V 20/52 (2022.01); G06V 30/19173 (2022.01); G06V 30/274 (2022.01); G08B 13/19613 (2013.01); G08B 29/188 (2013.01); H04N 23/90 (2023.01); G06Q 50/265 (2013.01); G06V 20/44 (2022.01)] 19 Claims
OG exemplary drawing
 
1. A method, comprising:
determining a set of access primitives based on a first set of signals from an access point state sensor;
determining a set of authorization primitives based on a second set of signals from a security credentialing system;
determining a set of semantic primitives based on a third set of signals from a camera system;
determining a correlation between the set of access primitives, the set of semantic primitives, and the set of authorization primitives;
determining a context classification based on the correlation; and
based on the correlation, determining a security risk associated with the context classification.