G08B13/1965

DETECTION OF AUTHORIZED USER PRESENCE AND HANDLING OF UNAUTHENTICATED MONITORING SYSTEM COMMANDS

Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.

VIDEO IDENTIFICATION AND ANALYTICAL RECOGNITION SYSTEM
20200221054 · 2020-07-09 ·

An analytical recognition system is includes a video camera configured to capture video data of a subject and an antenna configured to capture mobile communication device data relating to a mobile communication device of the subject. The system further includes a data analytics module configured to: analyze the video data to determine at least one of a physical attribute or a movement attribute of the subject and generate; generate a first certainty match value based on the at least one of the physical attribute or the movement attribute of the subject; and perform a facial recognition analysis of the subject to obtain facial recognition data. The data analytics module is further configured to generate a second certainty match value based on the facial recognition data; generate a third certainty match value based on the mobile communication device data; and generate a combined certainty match value based on the first certainty match value, the second certainty match value, and the third certainty match value.

SYSTEMS AND METHODS FOR GEOFENCE SECURITY
20200196092 · 2020-06-18 · ·

Systems and methods for geofence information delivery are disclosed. A multiplicity of devices constructed and configured in network communication in a region of interest via a peer-to-peer network. The multiplicity of devices store cached geofence information for the region of interest. The multiplicity of devices on the peer-to-peer network are operable to convert between an IP address and a geographic location. Each of the multiplicity of devices is operable to query peer devices on the peer-to-peer network for geofences associated with an IP address or a geographic location. At least one peer device is operable to deliver one or more geofences associated with the IP address to the querying device via zero-configuration networking or web service.

METHODS AND ENTITIES FOR ALERTING ABOUT FAILURE OF AN UNMANNED AERIAL VEHICLE

A method (20) performed in a network node (4) is provided for alerting about failure of an unmanned aerial vehicle (2). The method (20) comprises receiving (21) a failure report from an unmanned aerial vehicle (2), obtaining (22) an estimated crash point for the unmanned aerial vehicle (2), and sending (23), based on the obtained estimated crash point, warning signals to communication devices (3) residing within a defined area. Methods in an unmanned aerial vehicle and in a network entity, and a network node, unmanned aerial vehicle, network entity, computer programs and computer program products are also provided.

REMOTE MONITORING SYSTEM AND MONITORING SERVER

In a monitoring area such as a resort house area that a user cannot directly monitor, a vehicle owned by the user performs patrol driving to capture an image of a surrounding state and transmits the image to a user terminal and a monitoring server as imaging data. The monitoring server analyzes the imaging data transmitted from the vehicle to determine whether an abnormality occurs in the monitoring area or not, and notifies the user terminal and the vehicle of a determination result. When the vehicle receives an abnormality notice from the monitoring server, the vehicle notifies outside that the abnormality occurs by light or sound.

System and method for monitoring a property using drone beacons

Methods, systems, and apparatus, including computer programs encoded on a storage device, for monitoring a property using drone beacons. In one aspect, a monitoring system is disclosed that includes a drone, a drone beacon, a component, a processor, and a computer storage media storing instructions that, when executed by the processor, cause the processor to perform operations. The operations may include obtaining drone beacon data generated by the drone beacon, determining a location of the drone beacon based on the drone beacon data, after determining the location of the drone beacon, transmitting, to the drone, a first instruction to navigate towards the location of the drone beacon, after deploying the drone, obtaining component data generated by the component, and after obtaining the component data, transmitting, to the drone, a second instruction to navigate towards a different location than the location of the drone beacon based on the component data.

Drone pre-surveillance

Methods, systems, and apparatus, including computer programs encoded on a storage device, for using a drone to pre-surveil a portion of a property. In one aspect, a system may include a monitoring unit. The monitoring unit may include a network interface, a processor, and a storage device that includes instructions to cause the processor to perform operations. The operations may include obtaining data that is indicative of one or more acts of an occupant of the property, applying the obtained data that is indicative of one or more acts of the occupant of the property to a pre-surveillance rule, determining that the pre-surveillance rule is satisfied, determining a drone navigation path that is associated with the pre-surveillance rule, transmitting, to a drone, an instruction to perform pre-surveillance of the portion of the one or more properties using the drone navigation path.

Systems and methods for geofence security

The present invention is directed to methods and systems for enforcing at least one rule within a geofence. The rule is enforced by a fencing agent on an Unmanned Aerial Vehicle (UAV). The geofence is defined by a plurality of geographic designators, with the plurality of geographic designators each being associated with an Internet Protocol (IP) address, preferably an IPv6 address.

ALERTHUB SYSTEM WITH TWO TOUCH BADGE
20200160691 · 2020-05-21 ·

An alert communication device, an alert activation device, and an alert management system are provided. The alert management system may include one or more alert communication devices communicatively coupled to one or more other alert communication devices and configured to provide one or more of a visual alert and an audio alert and one or more alert activation devices communicatively coupled to at least one alert communication device of the one or more alert communication devices.

Investigation generation in an observation and surveillance system
10657755 · 2020-05-19 ·

The present disclosure is directed to systems and methods for generating investigations of user behavior. In an example embodiment, the system includes a video camera configured to capture video of user activity, a video analytic module to perform real-time video processing of the captured video to generate non-video data from video, and a computer configured to receive the video and the non-video data from the video camera. In some embodiments, the video camera is at least one of a traffic camera or an aerial drone camera. The computer includes a video analytics module configured to analyze one of video and non-video data to identify occurrences of particular user behavior, and an investigation generation module configured to generate an investigation containing at least one video sequence of the particular user behavior. In some embodiments, the investigation is generated in near real time. The particular user behavior may be defined as an action, an inaction, a movement, a plurality of event occurrences, a temporal event and/or an externally-generated event.