Sensory Inc. | Date: 2015-08-31
Techniques for automatically triggering video surveillance using embedded voice, speech, or sound recognition are provided. In one embodiment, a computer system can receive an audio signal captured from an area to be monitored via video surveillance. The computer system can further recognize, via an embedded recognition component, a voice, speech phrase, or environmental sound in the audio signal, and can determine that the recognized voice, speech phrase, or environmental sound corresponds to a predefined trigger condition. The computer system can then automatically transmit a signal to one or more video capture devices to begin video recording of the area.
Sensory Inc. | Date: 2015-08-03
A sensory lounging chair system and method of use. The system generally includes a frame, a pump, air tubes connecting the pump to a pair of inflatable air tubes, pressure release valves, piping and hardware, a pressure sensor, and a fabric cover. In a preferred embodiment, the pump and pressure sensor are powered by a power supply connected to a terminal board, which in turn is connected to the pump and the pressure sensor. The fabric cover provides a comfortable barrier between the occupant and the air tubes, which initially are usually deflated or less than fully inflated. As the pressure in the air tubes increase, deep touch pressure is applied to the occupants body in the places where the air tubes are in contact with the occupant. Deep touch pressure is thus applied to the occupant via contact with the tubes through the fabric cover.
Sensory Inc. | Date: 2015-12-03
A sensory upright chair system to provide deep touch pressure to a person and method of use. The system includes a frame, a pump, a pair of inflatable air tubes, a pressure release valve, hoses and hardware, a pressure sensor, and a fabric cover. The pump and pressure sensor are connected to a power supply, and connected to the air tubes and pressure release valve via hoses and hardware. Switching on the power supply provides controlled inflation to the air tubes. A user sits in the chair between deflated air tubes. As the pressure in the air tubes increase, deep touch pressure is applied to the occupants body where the air tubes contact the occupant. The fabric cover provides a comfortable barrier between the occupant and the air tubes. Deep touch pressure is thus applied to the occupant via contact with the tubes through the fabric cover.
Sensory Inc. | Date: 2015-02-05
Techniques for implementing face-based authentication with situational adaptivity are provided. In one embodiment, a computing device can create an enrollment template for a user, the enrollment template being derived from one or more enrollment images of the users face and being usable by a face-based authentication system to authenticate the users identity. The computing device can further determine a first set of metadata associated with the enrollment image(s) and can store the first set of metadata with the enrollment template. At a later time (e.g., an authentication event), the computing device can capture an input image of the users face, determine a second set of metadata associated with the input image, and calculate a computational distance between the input image and the enrollment template, the calculating taking into account a degree of difference between the first and second sets of metadata. Finally, the user can be authenticated based on the distance.
Sensory Inc. | Date: 2015-02-11
Techniques for leveraging multiple biometrics for enabling user access to security metadata are provided. In one embodiment, a computing device can receive first and second biometric identifiers from a user. The computing device can further determine, via a multi-biometric authentication system, that the users identity can be verified using the first biometric identifier, but cannot be, or has not been, verified using the second biometric identifier. In response to this determination, the computing device can provide information to the user for facilitating verification of the users identity using the second biometric identifier.
Sensory Inc. | Date: 2015-01-28
Techniques for performing health and fitness monitoring via long-term temporal analysis of biometric data are provided. In one embodiment, a computing device can receive biometric data for a user that is captured via a biometric authentication system. The computing device can further extract one or more features from the biometric data pertaining to the users health, fitness, or personal appearance and can analyze the one or more features in view of previous features extracted from previous biometric data for the user. The computing device can then determine a health or fitness status (or change in status) of the user based on that analysis.
Sensory Inc. | Date: 2015-03-05
Sensory Inc. | Date: 2015-07-30
A device and method for treating restless leg syndrome by transmitting sound proximate the leg or legs of a patient with sound in the range of 20 to 100 Hertz, or 20 to 100 beats per second. The method may be accomplished using sound generators disposed within a pad or sleeve.
Sensory Inc. | Date: 2016-03-24
A control system for controlling air pressure within a sensory treatment device, such as a sensory chair or lounger. The control system includes a power source, an air pump, a pressure sensor, a pressure relief valve, and a power switch. The control system is connected to inflatable air tubes located in the sensory treatment device and is activated to inflate the inflatable air tubes to a preset upper pressure limit. The control system is further configured to cycle the pressure within the air tubes between the upper pressure limit and a preset lower pressure limit, thereby creating deep touch pressure to an occupant within the sensory treatment device.
Sensory Inc. | Date: 2015-06-24
Techniques for securely processing voice queries are provided. In one embodiment, a computing device can receive speech data corresponding to a voice query uttered by a user and, in response to the speech data, determine the users identity and a query type of the voice query. The computer device can further retrieve a first security level associated with the users identity and a second security level associated with the query type. The computing device can then determine, based on the first security level and the second security level, whether the voice query should be processed.