G08B13/19652

Setting apparatus and setting method
09536164 · 2017-01-03 · ·

A setting apparatus for making a setting to detect that a moving object in an image has passed a line set in the image accepts designation of one of a position and a partial region in an object region in the image, and makes a setting to detect that the designated position or partial region in the object region of the moving object in the image has passed the line set in the image.

Monitoring method and camera

A method of monitoring a scene by a camera (7) comprises marking a part (14) of the scene with light having a predefined spectral content and a spatial verification pattern. An analysis image is captured of the scene by a sensor sensitive to the predefined spectral content. The analysis image is segmented based on the predefined spectral content, to find a candidate image region. A spatial pattern is detected in the candidate image region, and a characteristic of the detected spatial pattern is compared to a corresponding characteristic of the spatial verification pattern. If the characteristics match, the candidate image region is identified as a verified image region corresponding to the marked part (14) of the scene. Image data representing the scene is obtained, and image data corresponding to the verified image region is processed in a first manner, and remaining image data is processed in a second manner.

System and method for alerting and tracking with improved confidentiality
09536412 · 2017-01-03 ·

An alarm system comprising at least one first signal source communicating with a central unit configured for providing a logically true alerting signal when predetermined conditions are met. The signal sources may include transponders and a confidential list containing the relation between an RFID chip and the name of the person identified may be stored in a computer. A verification unit is connected to independent signal sources and is configured for providing a logically true verification signal when predetermined conditions are met. The signal sources may also comprise means for measuring bio-functions, and the verification unit may be carried by a safety manager. In such a case, the safety manager will also be able to confirm or reject an alerting alarm from the central unit manually. An alarm signal is activated if and only if the alerting signal is true and the verification signal is true.

SYSTEM FOR ACTIVE PARTICIPATION AND IMPROVEMENT OF SCHOOL SECURITY
20250182231 · 2025-06-05 ·

A device, system and method to log a communication device into services using a device identifier is provided. An identity management (IM) computing device receives, from a certificate authority, a first digital certificate, and further receives from a given communication device, a second digital certificate and a device identifier associated with the given communication device. The IM computing device successfully validates the second digital certificate using the first digital certificate, obtains a user identifier associated with the device identifier, and issues, to the given communication device, one or more tokens that include the user identifier, the one or more tokens enabling the given communication device to log into one or more services using the user identifier.

IDENTIFYING REGIONS OF INTEREST IN AN IMAGING FIELD OF VIEW
20250191451 · 2025-06-12 ·

The techniques described herein relate to computerized methods, systems and non-transitory computer-readable media for determining a plurality of regions of interest from an image of a scene for motion detection. The methods can include generating the regions of interest using image segmentation techniques and receiving user selection to designate one or more regions as motion detection zones. The methods can also automatically recommend motion detection zones. The methods can include subsequently capturing one or more images of a scene and performing motion detection in the one or more images of the scene using the designated motion detection zones.

Integrative security system and method
12333922 · 2025-06-17 · ·

A method for monitoring and securing a facility without employing a manned control center, according to which a server acquires surveillance data from each of a plurality of distributed surveillance devices deployed within or adjacent to a given security sensitive facility. Then the server receives an intrusion alert from a guard, or from one or more of the plurality of surveillance devices to initiate a triggering event, if the acquired surveillance data is indicative of activity that has been detected at an indicated location. A first guard is alerted and presented with a full situational awareness image to assess the severity of the detected activity and the triggering event is terminated if found by the first guard to be of a low severity, or an interception operation initiated by self-dispatching or dispatching one or more additional guards to a close by location that holds tactical advantage relative to the indicated location if the triggering event was found by the first guard to be of a high severity.

Intrusion detection system, intrusion detection method, and computer-readable medium
12361806 · 2025-07-15 · ·

A setting assistance device includes an acquisition unit, a calculation unit and a determination unit. The acquisition unit acquires coordinates designated by a user for an image capturing a three-dimensional space. The calculation unit calculates coordinates of a position located at a predetermined distance from a position of a part of the three-dimensional space relating to the acquired coordinates. The determination unit determines a region set for the acquired coordinates based on the calculated coordinates.

ELECTRONIC DEVICE, CLOUD DEVICE, CLIENT DEVICE, AND OPERATING METHODS THEREFOR

An electronic device, a cloud device, a client device, and operating methods therefor are provided. A method of operating an electronic device including a camera module configured to capture a video and having a first state, in which the camera module is activated to capture a video, includes: in response to that an event in one or more types of events is detected, in a case where the electronic device is in the first state, transmitting an alarm message indicating that the event is detected, and transmitting, as an alarm video, a video captured by the camera module after the event is detected; and after the alarm message is transmitted, in response to that an event in the one or more types of events is detected, not transmitting an alarm message indicating that the event is detected but continuing transmitting the video captured by the camera module.

Frictionless security processing

A first device is detected within a geofenced area of an establishment. A second device is determined to be within the geofenced area. A first individual associated with the first device is instructed to enter the establishment and complete a first portion of opening security procedures associated with an opening of the establishment. Upon completion of the first portion, a second individual associated with the second device is instructed to enter the establishment for a second portion of the opening security procedures. The first individual and the second individual are monitored through video feeds during the first portion and the second portion of the opening security procedures for compliance with the opening security procedures.

THROW DETECTION USING LIDAR
20250278992 · 2025-09-04 · ·

The inventive throw detection system includes a plurality of lidars positioned to cover a predetermined security area, each lidar being wirelessly connected to a computer running a program to monitor the predetermined security area. The program detects when a person throws an object from an unsecured zone to a secured zone, and sends an alert to security.