Patent classifications
G08B13/19615
LOW-POWER-CONSUMPTION AUDIO/VIDEO RECORDING AND COMMUNICATION DOORBELL
An audio/video (A/V) recording and communication doorbell, including a camera, a speaker, a microphone, a power manager, a battery, an AC/DC rectifier, and a DC/DC converter. The doorbell is configured for connection to an external AC power source through the AC/DC rectifier and the DC/DC converter. The power manager is configured to draw power, up to a threshold power, from the AC power source and to draw supplemental power from the battery such that the power drawn from the AC power source never exceeds the threshold power. The present A/V recording and communication doorbell can thus be connected to an existing household AC power supply and an existing doorbell signaling device without causing inadvertent sounding of the signaling device.
Audio/Video Recording and Communication Devices
An audio/video (A/V) recording and communication doorbell comprises a camera, a front button, and a motion sensor. The camera and the motion sensor are configured to work in tandem to detect motion in a field of view of the A/V recording and communication doorbell, such that a first one of the camera and the motion sensor detects motion and the other one of the camera and the motion sensor independently verifies the motion detection before an alert is sent to a user's client device. In this manner, user alerts from false alarm motion detections are reduced.
System for generating drone video feed overlays based on property monitoring system data
A monitoring system that is configured to monitor a property is disclosed. The monitoring system includes a sensor that is configured to generate sensor data that reflects an attribute of a property. The monitoring system further includes a drone that generates image data, location data, and orientation data. The monitoring system further includes a monitor control unit. The monitor control unit is configured to receive the sensor data, the location data, and the orientation data. The monitor control unit is configured to determine that an event has occurred at the property and a location of the event within the property. The monitor control unit is configured to generate a graphical overlay based on the event, the location data, and the orientation data. The monitor control unit is configured to generate a graphical interface. The monitor control unit is configured to output the graphical interface.
TARGETED VIDEO SURVEILLANCE PROCESSING
Provided herein are systems and methods for implementing a video surveillance system. In one or more examples, the improved system can include a video managing system that applies one or more watchlists, to video footage captured by surveillance cameras to apply one or more processing policies indicated by the one or more watchlists. In some embodiments, a watchlist may indicate a plurality of events of interest (e.g., specific classes of objects, a presence of one or more persons, or one or more persons of interest, etc.) that should be detected from video footage. Through these mechanisms, video processing can be increased since the types of events of interest that need to be detected within the video footage are reduced. Non-transitory storage requirements are reduced, and human labor requirements to monitor, analyze, and review video surveillance footage is reduced.
System and method for dynamically ordering video channels according to rank of abnormal detection
A system and method for dynamically ordering video streams on display in a command and control system according to video content, including obtaining a plurality of video streams captured by a plurality of respective video cameras; extracting features from the plurality of video streams; calculating abnormality scores for the extracted features, wherein each abnormality score measures a likelihood that a corresponding feature is an abnormal feature; calculating a current rank for ordering each of the plurality of video streams based on current and past abnormality scores of the features extracted from the video stream; and displaying a subgroup of the plurality of video streams having the highest subset of current ranks based on abnormality scores.
Security system with face recognition
An intelligent face recognition system for an installed security system can include a camera and a local or remote video processor including a face recognition engine. The video processor can be configured to receive the image information from the one or more cameras, and generate an alert for communication to a user device based on a recognition event in the environment. In an example, the face recognition engine is configured to apply machine learning to analyze images from the camera and determine whether the images include or correspond to an enrolled face, and the face recognition engine is configured to provide the recognition event based on the determination.
Methods and apparatus for automated surveillance systems
Systems and methods to automate both emergency identification and emergency response to minimize response time while optimizing the dispatching of different types of first responders are provided. The system may include an automation system. The automation system may receive a plurality of data elements from a plurality of sensors. The automation system may extract a set of features from the plurality of data elements. The automation system may identify an emergency situation based on the set of features and a set of rules. The automation system may assess the priority of the emergency situation based on a set of data elements associated with the emergency situation and a set of policies. The automation system may select a responder in response to the identified emergency situation. The automation system may dispatch the selected responder to an area related to the identified emergency situation.
Information processing device and information processing method
An information processing device including a communication portion capable of receiving sensor data detected from a plurality of sensors arranged in predetermined regions and transmitting control signals to a plurality of actuators arranged around the sensors such that the actuators are, at least one by one, associated with each of the sensors. The information processing device further includes a control portion that performs control such that the sensor arranged in a specific region determined not to have an ideal situation is specified on the basis of the sensor data detected from the plurality of sensors, the actuator corresponding to the specified sensor is specified from the plurality of actuators, and the control signal for bringing the specific region into the ideal situation is generated and transmitted to the specified actuator through the communication portion.
Video analytics system
A security system can use video analytics and/or other input parameters to identify a theft event. Optionally, the security system can take remedial action in response. For example, the security system can use video analytics to determine that a person has reached into a shelf multiple times at a rate above a threshold, which can indicate that a thief is quickly removing items from the shelf. The security system can also use video analytics to determine that a person has reached into a shelf via a sweeping action, which can indicate that a thief is gathering and removing a large quantity of items from the shelf in one motion. In response, the security system can alert security personnel, cause a speaker to output an audible message in the target area, flag portions of the video relating to the theft event, activate or ready other sensors or systems, and/or the like.
Asset tracking and notification processing
An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.