G08B13/1965

ASSET TRACKING AND NOTIFICATION PROCESSING

An asset is identified in a predefined area. The type of asset is identified through video or wireless tag identification. A security policy associated with the type of asset is obtained. Entries in an asset log are recorded based on a location of the asset, an individual handling the asset, and/or actions taken by an individual with respect to the asset based on the security policy. A real-time notification is sent when the location, the handling, and/or any of the actions warrant a notification based on the security policy.

Systems and methods for geofence security
10993073 · 2021-04-27 · ·

Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.

Detection of authorized user presence and handling of unauthenticated monitoring system commands

Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.

AUTONOMOUS HOME SECURITY DEVICES

An aerial vehicle is programmed or configured to respond to reports of events or conditions within spaces of a facility. The aerial vehicle travels to a location of a reported event or condition and captures data using onboard sensors. The aerial vehicle independently determines whether the reported event or condition is occurring, or is otherwise properly addressed by resources that are available at the location, using images or other data captured by the onboard sensors. Alternatively, the aerial vehicle transmits a request for additional resources to be provided at the location, where necessary. A map of the location generated based on images or other data captured by the onboard sensors may be utilized for any purpose, such as to make one or more recommendations of products that are appropriate for use at the facility.

System and method for managing and analyzing multimedia information
10942026 · 2021-03-09 · ·

A UAV data processing and management system is provided including an encoder broadcaster and data manager which provides end users with a single interface for searching and sharing any video or imagery source, from any device with no client software required. Data inputs to the resource can include UAV video, photos, traffic cameras, fixed surveillance systems, iOS and Android device pictures, and other data (e.g., texts, emails) and inputs from all forms of social media, such as Twitter, Instagram, Facebook, etc. The cloud based manager is built with collaboration and sharing in mind while at the same time maintaining data privacy, security protection, chain-of-custody control and audit trail maintenance. Analytic tools are integrated accordingly as plug-ins or as a store of available app resources which are easily removed, added and customized based on user needs and system requirements and cost constraints.

SYSTEM AND METHOD FOR GATE MONITORING DURING DEPARTURE OR ARRIVAL OF AN AUTONOMOUS VEHICLE
20210076010 · 2021-03-11 ·

Methods, systems, and apparatus, including computer programs encoded on a storage device, for monitoring a vehicle access point. In one aspect, a monitoring system is disclosed that includes a processor and a computer storage media storing instructions that, when executed by the processor, cause the processor to perform operations. The operations may include obtaining, by the monitoring system, monitoring system data that is generated by a first monitoring system component, determining, by the monitoring system and based on the monitoring system data, a current occupancy of a vehicle, determining, by the monitoring system and based on the current occupancy of the vehicle, whether a vehicle access point is to be monitored, and in response to determining, by the monitoring system and based on the current occupancy of the vehicle, that the vehicle is not occupied by a human occupant, using one or more second monitoring system components to monitor the vehicle access point.

ANALYZING RADIO TRANSMISSION FOR DETECTING WHETHER A DRONE IS FILMING A POINT OF INTEREST
20210049883 · 2021-02-18 ·

A system and method for identifying if a drone is illegitimately video streaming a location, object or person. An interceptor intercepts radio transmissions and identifies if a radio transmission is an FPV video transmission. A watermarker is used for emitting a periodic physical stimulus at a given frequency for a given duration. The system then verifies if there is a correlation between the video transmission and the periodic physical stimulus; and issues a privacy invasion attack notification if such a correlation is determined between the video transmission and the periodic physical stimulus.

Drone pre-surveillance

Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to pre-surveil a portion of a property. In one aspect, a system may include a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include obtaining data that is indicative of one or more acts of an occupant of the property, applying the obtained data that is indicative of one or more acts of the occupant of the property to a pre-surveillance rule, determining that the pre-surveillance rule is satisfied, determining a drone navigation path that is associated with the pre-surveillance rule, transmitting, to a drone, an instruction to perform pre-surveillance of the portion of the one or more properties using the drone navigation path.

CONTROL DEVICE AND CONTROL METHOD
20210092282 · 2021-03-25 ·

Control device, movable object, control method and program are provided. The control device includes a memory and a processor coupled to the memory. The processor is configured to: acquire first resolution information of a resolution of a camera device mounted on a movable object; determine a first geographic area according to the first resolution information; and control the movable object or the camera device, to prevent at least one of: the camera device from photographing in the first geographic area, or an image photographed by the camera device in the first geographic area from being stored.

Systems and methods for dynamically masking video and images captured by a drone device camera
10922431 · 2021-02-16 · ·

Systems and methods for dynamically masking video or images captured by a drone device camera are provided. Such systems and methods include flying the drone device proximate to a potential surveillance area while in a learning mode, capturing first video or images of the potential surveillance area, identifying first privacy masking areas in the first video or images, flying the drone device proximate to an active surveillance area while in a standard mode, capturing second video or images of the active surveillance area, identifying second privacy masking areas in the second video or images, and dynamically masking a portion of the second video or images that contains any of the first privacy masking areas or the second privacy masking areas.