G08B13/19652

Techniques for implementing customized intrusion zones

This disclosure describes, in part, techniques for implementing customized intrusion zones for security monitoring. For instance, a user may provide (e.g., via a GUI) an indication of a physical space to be monitored. An electronic device may detect one or more objects and its respective location from radar data collected by a radar sensor. The electronic device may additionally detect one or more objects within image data captured via a camera. The electronic device may then analyze the radar data and the image data in order to determine that the object detected by the radar sensor includes the same object represented by the image data. As such, the electronic device may send an alert to one or more computing devices that may include the radar data and/or the image data.

METHODS AND DEVICES FOR PRESENTING VIDEO INFORMATION

The disclosed embodiments include a method for presenting video information. The method includes: (1) receiving user identification of a first spatial zone corresponding to a first portion of the field of view of a remote camera; (2) displaying a first outline in a first color for the first spatial zone overlaid on a visual image; (3) receiving second user identification of a second spatial zone corresponding to a second portion of the field of view of the remote camera; (4) displaying a second outline in a second color for the second spatial zone overlaid on the visual image; and (5) displaying a visual indicator indicating that motion was detected in at least one spatial zone, the visual indicator having a color corresponding to the spatial zone in which the motion was detected.

DOORBELL SYSTEM AND SECURITY METHOD THEREOF

Provided are a doorbell system and a method of operating the same. The doorbell system includes a doorbell which includes: a camera configured to obtain at least one of an image of a first object in a first region and an image of a second object in a second region closer to the doorbell than the first region; an image processor configured to detect the first object from the image of the first object, and identify the second object from the image of the second object; and an alert generator configured to select and transmit to a user terminal an alert sound or alert sound information corresponding to the identified second object.

Behavioral intrusion detection system
10186124 · 2019-01-22 ·

A security system can use video analytics and/or other input parameters to identify a theft event. Optionally, the security system can take remedial action in response. For example, the security system can use video analytics to determine that a person has reached into a shelf multiple times at a rate above a threshold, which can indicate that a thief is quickly removing items from the shelf. The security system can also use video analytics to determine that a person has reached into a shelf via a sweeping action, which can indicate that a thief is gathering and removing a large quantity of items from the shelf in one motion. In response, the security system can alert security personnel, cause a speaker to output an audible message in the target area, flag portions of the video relating to the theft event, activate or ready other sensors or systems, and/or the like.

Home alarm system
10163329 · 2018-12-25 · ·

Techniques are described for selecting an alarm state based at least in part on determining a security event related to security and automation systems. One method includes receiving, from a sensor, a first indication of a security event at the first location, determining a first threat level based on the security event, and activating a first alarm state based at least in part on the first threat level.

Anti-theft security device and perimeter detection system

A security system in accordance with an embodiment of the present invention includes a security tag operable for connection to an object, a monitoring device operable to monitor whether a party removes or attempts to remove the security tag from the object; an alarm operable to emit a tamper signal when the monitoring device indicates that a party has removed or attempted to remove the security tag from the object in an unauthorized removal condition, and a remote collector system adapted to communicate with the security tag to set the security tag in the unauthorized removal condition and an authorized removal condition, wherein upon receipt of the tamper signal, the remote collector system generates a security message.

Configurable motion detection and alerts for audio/video recording and communication devices
10152857 · 2018-12-11 · ·

Some embodiments provide a method for separating the motion detection zone(s) of an A/V recording and communication device from the motion alert zone(s) of the A/V recording and communication device. For example, an A/V recording and communication device may be configured to generate motion alerts, and to record audio and video footage, when an event is detected within a selected motion alert zone (e.g., within a defined radius around the A/V recording and communication device). However, the A/V recording and communication device may not generate a motion alert for an event detected outside of the selected motion alert zone, even though the device may still record audio and video footage for the detected event (e.g., when the event is within a selected motion detection zone).

SETTING ASSISTANCE DEVICE, SETTING ASSISTANCE METHOD, AND PROGRAM RECORDING MEDIUM
20180350212 · 2018-12-06 · ·

The conventional image surveillance technologies relevant to the present invention had the potential of failing in detection due to the intrusion duration time being set too long and thereby allowing an intruder to pass a warning line before the preset intrusion duration had elapsed. The intrusion detection device according to the present invention is provided with: a detection means that detects, in an image, an intrusion position in a specific region by an object that has intruded into the specific region; and a control means that associates the intrusion position with a prescribed time period, wherein the detection means outputs an alert when the object, in the image, has stayed in the specific region for the prescribed time period or longer.

Monitor system

A surveillance system 1, which is an example of a surveillance system to which the present invention is applied, includes a surveillance region storage means 2 and an image analyzing means 3. Also, the surveillance system 1 includes an effective area information storage means 4 and an object criterion information storage means 5. A detection subject can be detected efficiently by setting a first step criterion of whether or not a portion of an object in an image is included in a range of a surveillance region and a predetermined second step criterion and determining whether or not these criteria are met.

MONITORING AND NOTIFICATION OF DELIVERED PACKAGES

Methods, systems and computer program products for monitoring delivered packages are provided. Aspects include receiving, from a shipping information system, a first notification of an expected delivery of a package and responsively activating a smart mat and monitoring the smart mat for a delivery of the package, the delivery being indicated by a change in a weight measured by the smart mat. Aspects also include activating a camera to capture one or more images of the smart mat and the package based at least in part on detecting a change in the weight measured by the smart mat after the delivery. Aspects further include notifying one or more individuals with a second notification based on a determination that the package has been removed from the smart mat by analyzing the one or more images.