Patent classifications
G08B13/1965
Aerial imaging privacy enhancement system
A camera-based security system protects an asset by detecting an aerial surveillor and consequently storing notifications into a video archive, alerting to an operator console, and actuating privation apparatus. One or more cameras provides video streams to a processor which derives object motion. Attributes of object motion trigger notification to record and alert on conditions associated with an aerial surveillor. Tracking of pixels, pixel blocks, and motion vectors enable rules based determination of an airborne surveillance vehicle according to characteristic hovering or lingering by masking LSB of accumulated positive and negative movements. Actuators cause privation enhancement apparatus to obfuscate the protected asset (structure, area, or volume) or to interpose between the protected asset and the surveillor. The method traces a travel path of an object; and determines a ray from a private property to a surveillor drone.
Monitoring System for Monitoring Unattended Services
Methods, systems, and apparatus, including computer programs encoded on a storage device, for accommodating unattended services at a property. In one aspect, a monitoring system is disclosed that includes a processor and a storage device storing instructions that, when executed by the processor, cause the processor to perform operations. The operations can include receiving a request to enter the property to perform the unattended service, configuring the monitoring system to allow access to a first portion of the property associated with the unattended service without triggering an alarm event, obtaining image data of the property after the monitoring system is configured to allow access to the first portion of the property, determining, based on the obtained image data, that an unattended service provider has entered into a second, different portion of the property, and triggering an alarm event.
LIGHT IRRADIATION DEVICE AND LIGHT IRRADIATION SYSTEM
A light irradiation device includes: at least one imaging means that images a monitoring region to continue to accurately irradiate a moving target with light; at least one projection means that irradiates the monitoring region with signal light; a control means that controls the imaging means to image the monitoring region and controls the projection means to emit the signal light; at least one propeller that moves the own device in the air; and a flight control means that controls flight of the own device by controlling the propeller, the control means controlling, when recognizing a light irradiation target to be irradiated with the signal light on image data imaged by the imaging means, the projection means to emit the signal light toward the light irradiation target.
LIGHT IRRADIATION DEVICE AND LIGHT IRRADIATION SYSTEM
A light irradiation device includes: at least one imaging means that images a monitoring region to continue to accurately irradiate a moving target with light; at least one projection means that irradiates the monitoring region with signal light; a control means that controls the imaging means to image the monitoring region and controls the projection means to emit the signal light; at least one propeller that moves the own device in the air; and a flight control means that controls flight of the own device by controlling the propeller, the control means controlling, when recognizing a light irradiation target to be irradiated with the signal light on image data imaged by the imaging means, the projection means to emit the signal light toward the light irradiation target.
Method of preparing and/or carrying out a ground survey in a region of interest and related apparatus
The method comprises triggering at least an event of the preparation and/or of the carrying out of the ground survey in a predetermined area of the region of interest; flying at least a presence detector able to detect the presence of a human and/or of an animal and/or of civil facilities in the predetermined area of the region of interest; before triggering the event, detecting presence of a human and/or of an animal and/or of civil facilities in the predetermined area with the presence detector; controlling the triggering of the event based on the results of the detection of a human and/or of an animal and/or of civil facilities made with the presence detector.
INVESTIGATION GENERATION IN AN OBSERVATION AND SURVEILLANCE SYSTEM
The present disclosure is directed to systems and methods for generating investigations of user behavior. In an example embodiment, the system includes a video camera configured to capture video of user activity, a video analytic module to perform real-time video processing of the captured video to generate non-video data from video, and a computer configured to receive the video and the non-video data from the video camera. In some embodiments, the video camera is at least one of a traffic camera or an aerial drone camera. The computer includes a video analytics module configured to analyze one of video and non-video data to identify occurrences of particular user behavior, and an investigation generation module configured to generate an investigation containing at least one video sequence of the particular user behavior. In some embodiments, the investigation is generated in near real time. The particular user behavior may be defined as an action, an inaction, a movement, a plurality of event occurrences, a temporal event and/or an externally-generated event.
Anti-spoofing visual authentication
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
DRONE CONTROL DEVICE
In one general aspect, a drone control device includes a body, a motor that is configured to move the body, a network module, an input module, and a processor. The network module is configured to communicate with a security system that monitors a property and receive data associated with a location within the property. The input module is configured to receive user input. The processor is configured to perform operations that include: determine, from among the location within the property and other locations within the property, a target location within the property; move the body to the target location within the property by providing a signal to the motor; receive, from the input module, input data that is associated with an operation of the security system; and in response to receiving the input data, perform the operation of the security system.
SYSTEMS AND METHODS FOR DYNAMICALLY MASKING VIDEO AND IMAGES CAPTURED A DRONE DEVICE CAMERA
Systems and methods for dynamically masking video or images captured by a drone device camera are provided. Such systems and methods include flying the drone device proximate to a potential surveillance area while in a learning mode, capturing first video or images of the potential surveillance area, identifying first privacy masking areas in the first video or images, flying the drone device proximate to an active surveillance area while in a standard mode, capturing second video or images of the active surveillance area, identifying second privacy masking areas in the the second video or images, and dynamically masking a portion of the second video or images that contains any of the first privacy masking areas or the second privacy masking areas.
DETECTION OF AUTHORIZED USER PRESENCE AND HANDLING OF UNAUTHENTICATED MONITORING SYSTEM COMMANDS
Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.