G08B13/19613

TEMPORARY ANALYTIC WITHIN SECURITY SYSTEM SITE
20220366275 · 2022-11-17 ·

A computer-implemented method includes detecting, by operation of video analytics, an object within a portion of initial video captured by a security camera. The security camera is within and forms a part of a security system site. The computer-implemented method also includes transmitting, to at least one computing device that is remote from the security system site, a request that includes video data. The request relates to the object and the initial video. A response is received from the at least one computing device. The response includes computer readable instructions, retrieved from storage remote from the security system site, for at least one temporary analytic. The at least one temporary analytic is initiated to act upon the initial video or subsequent video captured by the security camera.

Dynamic video analytics rules based on human conversation

At least one detected natural language phrase in audio describes at least one expected future object activity in a definable physical or geographic region. For each of one or more potential video analytic rules that are derivable from the at least one natural language phrase, whether compatibility with corresponding workflow requirements of an entity exists may be determined, such that one, some or all of the one or more potential video analytic rules are confirmed as one or more workflow-compatible video analytic rules. The one or more workflow-compatible video analytic rules are implemented within a video security system for respective one or more periods of time. For each of the implemented video analytic rules, a notification may be generated: when a rule violation of the respective video analytic rule triggers an event; or following expiry of the respective period of time of the one or more periods of time.

Skip-scanning identification method, apparatus, and self-service checkout terminal and system

Embodiments of the present invention provide a skip-scanning identification method and apparatus, a self-service cash register terminal and system. The method includes: obtaining a video of a user scanning an item; determining posture data of the user based on the obtained video; determining, according to the posture data of the user, a time period in which a scanning action of the user takes place; receiving a scanning result of the item; and determining whether the user has skipped scanning the item based on the scanning result and the time period.

Image processing method, an image processing apparatus, and a surveillance system

An image processing method including: capturing changes in a monitored scene; and performing a sparse feature calculation on the changes in the monitored scene to obtain a sparse feature map.

Security device with user-configurable motion detection settings
11501618 · 2022-11-15 · ·

A security device has user-configurable motion detection settings. The security device includes at least one camera configured to capture sequential frames of image data within a field of view; at least one processor; memory communicatively coupled with the processor(s); a location setting, stored in the memory, defining whether or not the security device is located at a common access area; and machine readable instructions stored in the memory. The machine readable instructions are executable by the processor(s) to determine the image data indicates motion; and determine that the motion indicates lingering presence at the common access area. In certain embodiments, the machine readable instructions are executable by the processor(s) to determine, from the image data, that the average ambient light over a daily period varies less than a light variation threshold, and configure the location setting to indicate that the security device is located at the common access area.

3D surveillance system comprising LiDAR and multispectral imaging for object classification

A surveillance system for detecting an object within a monitored infrastructure and to a hybrid 3D surveying device, wherein a LiDAR device is configured that scanning is carried out with respect to two essentially orthogonal axes and wherein the LiDAR device comprises a cover mounted on the base, such that the base and the cover form an enclosure that encloses all moving parts of the LiDAR device, wherein the cover is configured to be opaque for visible light and translucent for the wavelength range of the LiDAR transmission radiation. The system further comprises a computing unit configured for processing the LiDAR measurement data to generate a 3D point cloud of the monitored infrastructure, and an object detector configured for classification of the object based on the 3D point cloud.

SYSTEMS, METHODS AND DEVICES FOR MONITORING GAMING TABLES
20230032920 · 2023-02-02 ·

Embodiments described herein relate to systems, methods and devices for monitoring table activities at gaming tables in casinos and other gaming establishments. For example, embodiments described herein relate to systems, methods and devices for monitoring card game activities at gaming tables and transfers of chips between one or more players and a dealer. Embodiments described herein may include devices and systems particularly configured to monitor table activities that include betting activities and the transfer of chips (e.g. between a player and a dealer, or between a first player and a second player) at gaming tables to determine bet data including a number of chips in a betting area of the gaming table, a total value of chips in the betting area, the number of chips in a chip tray, a total value of chips in the chip tray, and so on.

GESTURE BASED INTERFACE FOR A PREMISES SECURITY SYSTEM
20230096207 · 2023-03-30 ·

A control device in a premises security system configured to communicate with a premises device that includes a radar sensor for sensing hand gestures is provided. The control device receives signaling from the premises device indicative of a hand gesture, performs a first correlation of the hand gesture to a predetermined premises security system command, performs a second correlation of a verbal security password, a speaker voice recognition, a presence of the user's phone near the control device, a presence of a registered wearable near the control device, a camera viewing a registered home occupant inside the premises, or biometrics to the predetermined premises security system command, and performs a first action based on the first correlation and second correlation, such as arming or disarming the premises security system.

Movable image recording device and vehicle provided with such device

Image recording device provided with a fixed part for at least partial inclusion in and/or on the body of a motor vehicle, and a movable part which comprises at least one optical element, the optical element comprising at least one optical sensor and/or a lens unit, and an adjustment device provided with a power source, for adjusting the movable part between a first position and a second position, wherein during use in the first position the movable part is wholly or partly included in the body, and in the second position the movable part extends at an angle with respect to the body, such that at least the optical element carried by the movable part extends at least partly outside the body, wherein the movable part pivots from the second position about a, preferably substantially vertical, axis to the first position and vice versa.

Identifying user-item interactions in an automated facility

Techniques for employing user interfaces to output information indicative of events occurring in an inventory facility, and receive feedback from a human regarding the events are described herein. In one implementation, an event may take place in an inventory facility, such as a customer taking an item from an inventory location, returning an item to an inventory location, and so forth. An automated system of an inventory management system may process sensor data collected by sensors in the inventory facility to determine details of the event. In some examples, the inventory management system is unable to determine with a high level of confidence what occurred during the event. The inventory management system may provide the sensor data to a human associate through an associate interface, and receive input regarding details of the event from the human associate through the associate interface.