Patent classifications
G08B13/1965
ANTI-SPOOFING VISUAL AUTHENTICATION
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for visual authentication. In some implementations, a method may include obtaining images of a person at a property; detecting a discontinuity in an appearance of the person in the images of the person at the property; determining that the discontinuity does not correspond to a known occlusion; and providing an indication of a potential spoofing attack.
PROPERTY MONITORING AND MANAGEMENT USING A DRONE
Methods, systems, and apparatus, including computer programs encoded on computer-storage media, for property management and monitoring using a drone. In some implementations, images of an outside area corresponding to a property are obtained. From the images, it is determined that a person is approaching the property. A state of the property is identified. An action to perform by a drone is determined based on the images and a state of the property. The drone is instructed to navigate to the person and perform the action.
ALERTHUB SYSTEM WITH TWO TOUCH BADGE
An alert communication device, an alert activation device, and an alert management system are provided. The alert management system may include one or more alert communication devices communicatively coupled to one or more other alert communication devices and configured to provide one or more of a visual alert and an audio alert and one or more alert activation devices communicatively coupled to at least one alert communication device of the one or more alert communication devices.
FACILITY SURVEILLANCE SYSTEMS AND METHODS
Systems and methods for surveillance of a facility including facility elements. The system includes a central computing unit providing a digital model of the facility providing topological or logical or functional relationships of the facility elements, surveillance sensors adapted for surveillance of a plurality of the facility elements and for generation of surveillance data, communication means for transmitting data from the surveillance sensors to the central computing unit, and state derivation means configured to analyse the surveillance data and derive a state of a respective facility element. The central computing unit is configured to record a state pattern by combining states of at least one facility element based on at least one relationship of the facility element provided by the facility model, provide a state pattern critical-noncritical classification model which considers relationships provided by the facility model, and perform a criticality-classification based on the relationship.
AUTONOMOUS HOME SECURITY DEVICES
An aerial vehicle is programmed or configured to respond to reports of events or conditions within spaces of a facility. The aerial vehicle travels to a location of a reported event or condition and captures data using onboard sensors. The aerial vehicle independently determines whether the reported event or condition is occurring, or is otherwise properly addressed by resources that are available at the location, using images or other data captured by the onboard sensors. Alternatively, the aerial vehicle transmits a request for additional resources to be provided at the location, where necessary. A map of the location generated based on images or other data captured by the onboard sensors may be utilized for any purpose, such as to make one or more recommendations of products that are appropriate for use at the facility.
Security light-cam with cloud-based video management system
The invention concerns a system comprising a security device and a computing device. The security device may be configured to generate first video frames at a first bitrate and second video frames at a second bitrate from pixel data, store the video frames and metadata comprising index information for the video frames, communicate the second video frames and the metadata. The computing device may be configured to receive a video selection and a command from a user via an interface, display the second video frames using the interface in response to the video selection and communicate the command to the security device. The command may enable a modification to the first video frames stored on the security device using the display of the second video frames on the interface based on the metadata. The security device may generate modified first video frames in response to the command.
Methods and entities for alerting about failure of an unmanned aerial vehicle
A method performed in an unmanned aerial vehicle is provided for alerting about failure of the unmanned aerial vehicle. The method comprises identifying a malfunctioning in the unmanned aerial vehicle, and transmitting to a network node, a failure report comprising the malfunctioning and/or position of the unmanned aerial vehicle. Methods in a network node, and an unmanned aerial vehicle are also provided.
Access management system
An access management system includes a mobile device with a processor and a memory and a software platform including at least a processor and a memory. The software platform is configured to analyze data obtained from the mobile device and other devices connected to the software platform. Specifically, the software platform is operable to determine if an access key received, read, or captured by a mobile device matches an access key for an authorized account, object, device, or space for the mobile device, and to provide access to the mobile device if the access key received, read, or captured by the mobile device matches the authorized access key.
PERSONAL MONITORING APPARATUS AND METHODS
An apparatus, including a database which stores a travel itinerary or schedule of an individual; a processor; a global positioning system device; and a transmitter. The processor monitors a movement of the individual, compares information obtained by the global positioning system device with information contained in the travel itinerary or schedule, detects a deviation from an expected position, location, or travel route, and generates a message containing information regarding a date and time of the deviation and position or location information of the apparatus. The transmitter or apparatus transmits the message or information contained in the message to a drone. An operation of the drone is activated, the drone travels to the position or location of the apparatus, records video information of the apparatus or individual or of an area in a vicinity of the apparatus or individual, and transmits the video information to the user device or the computer.
Property scene adjustments
Techniques are described for detecting and handling unauthenticated commands in a property monitoring system. In some implementations, a monitoring system may include sensors located throughout a property, a monitoring control unit, and an input device. The monitoring control unit may be configured to receive data collected by the sensors, as well as an input command detected by the input device. For an input command that does not include authentication information, the monitoring control unit may generate property state information based on the sensor data, then analyze the property state data and the input command against one or more rules that relate to authorization of unauthenticated commands. Based on the analysis, the monitoring control unit may determine whether to perform the action corresponding to the input command or whether to perform another action, for example, generating and providing a notification or authorization request to a user.