Patent classifications
G08B13/196
Battery efficient wireless network connection and registration for a low-power device
A client device is configured to communicate with an access point over a wireless network, exchanging data with the access point over a selected communication channel. The client device stores an identifier of the selected communication channel. After the wireless connection to the access point has ended, the client device initiates a process to reconnect to the access point over the selected communication channel using the stored identifier.
Techniques for a smart monitoring system
Methods, systems, and devices that support techniques for a smart monitoring system are described. A system may monitor a physical environment using a camera-enabled device operating in a first mode of a set of modes. The system may determine one or more parameters based on the monitoring. The parameters may include an identity of an entity, a behavior of the entity, or a setting of the security and automation system, or any combination thereof. The system may perform an operation based on the one or more parameters. The techniques described herein may deter an intruder from an intended action (e.g., theft, property damage, etc.) and/or provide lighting to a user of the security and automation system, among other benefits.
Visual-based security compliance processing
Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
IMAGING SYSTEM FOR IMMERSIVE SURVEILLANCE
Security guards at big facilities, such as airports, monitor multiple screens that display images from individual surveillance cameras dispersed throughout the facility. If a guard zooms with a particular camera, he will lose image resolution, along with perspective on the surrounding area. Embodiments of the inventive Imaging System for Immersive Surveillance (ISIS) solve these problems by combining multiple cameras in one device. When properly mounted, example ISIS systems offer 360-degree, 100-megapixel views on a single screen. (Other resolutions may also be employed.) Image-stitching software merges multiple video feeds into one scene. The system also allows operators to tag and follow targets, and can monitor restricted areas and sound an alert when intruders breach them.
Methods and Systems for Detecting Persons in a Smart Home Environment
The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.
Methods and Systems for Detecting Persons in a Smart Home Environment
The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.
Theft prediction and tracking system
Systems and methods for detecting potential theft and identifying individuals having a history of committing theft use an electromagnetic emission associated with a personal electronic device associated with an individual is received from at least one of a sensor that is coupled to at least one of a traffic camera or an aerial drone camera. One or more signal properties of the electromagnetic emission are analyzed to determine an emission signature. Video data and video analytics are correlated with the emission signature to identify the individual having possession of the item. The emission signature and video data are stored for later use during a checkout procedure. If an emission signature detected at a checkout station matches that of the individual having possession of the item, and the item is not processed through the checkout station, an alert is issued and the individual is flagged as a potential shoplifter.
Targeted video surveillance processing
Provided herein are systems and methods for implementing a video surveillance system. In one or more examples, the improved system can include a video managing system that applies one or more watchlists, to video footage captured by surveillance cameras to apply one or more processing policies indicated by the one or more watchlists. In some embodiments, a watchlist may indicate a plurality of events of interest (e.g., specific classes of objects, a presence of one or more persons, or one or more persons of interest, etc.) that should be detected from video footage. Through these mechanisms, video processing can be increased since the types of events of interest that need to be detected within the video footage are reduced. Non-transitory storage requirements are reduced, and human labor requirements to monitor, analyze, and review video surveillance footage is reduced.
Mobile video security device configured for streaming video via wireless broadband and process for implementing the same
A mobile video surveillance device includes a camera device configured to capture video images; a transceiver configured to transmit and stream the video images over a network to a video receiving computer for at least one of the following: viewing on a display, viewing on a wireless device, or storage in a database; a video capturing input device configured to receive an input to initiate operation of the camera device and initiate video streaming by the transceiver; a processor configured to control the camera device and the transceiver based on the video capturing input device; a housing configured to house the camera device, the transceiver, the video capturing input device, and the processor; and a movement detection unit configured to detect a movement.
SYSTEM FOR AND METHOD OF DETERRING THEFT OF ITEMS FROM A VENUE
Theft of an item from a department of a venue having a department-specific, point-of-sale (POS) station for completing a transaction of the item prior to authorized removal of the item from the department, is deterred by sensing and tracking movement of a target associated with the item from the department by deploying a plurality of sensing units overhead at the venue, and by generating an alert when the sensing units sense and track that the target associated with the item has bypassed the department-specific POS station without the transaction having been completed for the item at the department-specific POS station. Security personnel execute a theft-deterrent action in response to the alert.