Patent classifications
G08B13/1965
Method for allowing drone activity to modify event detection by a monitoring system
Methods, systems, and apparatus, including computer programs encoded on a storage device, for enabling drone activity in a property monitored by a property monitoring system without triggering a false alarm. In one aspect, the method includes actions of obtaining a location of the drone, identifying a first sensor installed at the property that is within a predetermined distance of the drone, detecting first sensor data generated by the first sensor that is within a predetermined distance of the drone, wherein the first sensor data includes data that is indicative of an event, determining whether a second sensor that is mounted to the drone is generating second sensor data that corroborates the event indicated by the first sensor data, and disregarding, by the property monitoring system, the first sensor data in determining whether to trigger an alarm.
DISTRIBUTED SECURITY SYSTEM USING POSITION TRACKING
Systems, methods, and computer program products for securing a device or an asset attached thereto. The positions of a plurality of devices are monitored, and based on the positions, a determination is made as to whether a threshold condition has been violated. If the threshold condition has been violated, a notification signal is transmitted from a monitored device to one or more of the other devices to alert a responder that the monitored device is at risk of being lost. In response to the threshold condition being violated, the monitored device may also record and/or transmit data for display to the responder to help prevent the loss, or facilitate the recovery of the monitored device and/or an asset attached to the monitored device.
SURVEILLANCE SYSTEM, UNMANNED FLYING OBJECT, AND SURVEILLANCE METHOD
A surveillance system includes an unmanned flying object information management part configured to store information on each of a plurality of unmanned flying objects including a predetermined flying pattern of each of the unmanned flying objects, each of the unmanned flying objects including a surveillance apparatus and being configured to move in the predetermined flying pattern; an unmanned flying object selection part configured to select at least one of the unmanned flying objects to which the surveillance of a surveillance target is requested, based on a predetermined switching condition and information received from each of the unmanned flying objects; and a surveillance instruction part configured to instruct the selected unmanned flying object(s) to surveil the surveillance target by transmitting identification information of the surveillance target to the selected unmanned flying object(s).
FACIAL DETECTION AND RECOGNITION FOR PEDESTRIAN TRAFFIC
A method for facial analytics includes capturing a series of images of individuals from a camera into a circular buffer and selecting a plurality of images from the buffer for analysis in response to a trigger event, wherein the plurality of images are chronologically proximate before and/or after the trigger event in time. The method includes analyzing the plurality of images to determine image quality and selecting one of the plurality of images based on image quality to form a cropped facial image most likely to result in positive facial recognition matching. Methods of signaling to control the pedestrian traffic flow can maximize the individuals' facial alignment to the capturing camera's field of view. Non-relevant facial images associated with individuals outside a given region of interest can be discarded. Facial recognition is run on the resultant cropped facial image. Output can be displayed with information from the facial recognition.
DRONE-AUGMENTED EMERGENCY RESPONSE SERVICES
Methods, systems, and apparatus, including computer programs encoded on storage devices, for drone-augmented emergency response services. In one aspect, a monitoring system, comprising: a plurality of monitoring control units, and a monitoring application server, wherein the monitoring application server includes a network interface, one or more processors, and one or more storage devices that include instructions to perform operations. The operations include receiving an emergency event notification from a first monitoring control unit of the plurality of monitoring control units, determining a type of emergency event, and a location associated with the emergency event notification, identifying one or more drones that can be deployed to the location associated with the emergency event, and transmitting an instruction to a monitoring station server associated with a drone base station to deploy the one or more identified drones to the location associated with the emergency event.
Drone-augmented emergency response services
Methods, systems, and apparatus, including computer programs encoded on storage devices, for drone-augmented emergency response services. In one aspect, a monitoring system, comprising: a plurality of monitoring control units, and a monitoring application server, wherein the monitoring application server includes a network interface, one or more processors, and one or more storage devices that include instructions to perform operations. The operations include receiving an emergency event notification from a first monitoring control unit of the plurality of monitoring control units, determining a type of emergency event, and a location associated with the emergency event notification, identifying one or more drones that can be deployed to the location associated with the emergency event, and transmitting an instruction to a monitoring station server associated with a drone base station to deploy the one or more identified drones to the location associated with the emergency event.
Method for allowing drone activity to modify event detection by a monitoring system
Methods, systems, and apparatus, including computer programs encoded on a storage device, for enabling drone activity in a property monitored by a property monitoring system without triggering a false alarm. In one aspect, the method includes actions of obtaining a location of the drone, identifying a first sensor installed at the property that is within a predetermined distance of the drone, detecting first sensor data generated by the first sensor that is within a predetermined distance of the drone, wherein the first sensor data includes data that is indicative of an event, determining whether a second sensor that is mounted to the drone is generating second sensor data that corroborates the event indicated by the first sensor data, and disregarding, by the property monitoring system, the first sensor data in determining whether to trigger an alarm.
Light irradiation device and light irradiation system
A light irradiation device includes: at least one imaging means that images a monitoring region to continue to accurately irradiate a moving target with light; at least one projection means that irradiates the monitoring region with signal light; a control means that controls the imaging means to image the monitoring region and controls the projection means to emit the signal light; at least one propeller that moves the own device in the air; and a flight control means that controls flight of the own device by controlling the propeller, the control means controlling, when recognizing a light irradiation target to be irradiated with the signal light on image data imaged by the imaging means, the projection means to emit the signal light toward the light irradiation target.
System And Method For Identifying And Mitigating A Threat In A Facility
A system for mitigating a threat in a facility according to the present disclosure includes a threat identification module and at least one group of drones. The threat identification module is configured to generate a threat identification signal indicating that the threat has been identified in the facility and transmit the threat identification signal to a central command center. The at least one group of drones is configured to move toward the threat in response to at least one of the threat identification signal and a command from the central command center.
Tethered drone system with surveillance data management
In one embodiment, the disclosure provides a method of event auditing. The method of event auditing includes receiving sensor data at a base station from a sensor of an unmanned aerial vehicle (UAV), transmitting a controls signal to the UAV based on the sensor data, communicatively coupling the base station with an external evidenced repository, formatting a portion of the sensor data, and transmitting the formatted sensor data to the external evidence repository. In some embodiments, the base station is mounted to an anchor vehicle. In some embodiments, the UAV is communicatively coupled with the base station via a tether. In some embodiments, the formatting the sensor data includes formatting a second portion of sensor data to generate formatted sensor data based, at least in part, on an identity of the external evidence repository.