Patent classifications
G08B13/19693
THREE-DIMENSIONAL INTRUSION DETECTION SYSTEM AND THREE-DIMENSIONAL INTRUSION DETECTION METHOD
An observer simply performs operations as necessary such as confirmation as to whether or not erroneous detection is made and confirmation as to whether or not intrusion detection is normal, and the observer can efficiently execute the observation operation. An observation area is captured by at least two cameras separately disposed, a plurality of camera images are acquired, a three-dimensional measurement unit performs a three-dimensional measurement for measuring a three-dimensional position of an object in the observation area based on the camera images to generate three-dimensional information of the observation area, an intrusion detector detects an object intruding into the observation area based on a change in the three-dimensional information, and a screen generator generates a map image obtained by visualizing the three-dimensional information and a mark image indicating the object intruding into the observation area, and outputs an observation screen displaying an image selected by an input operation of a user in the camera image and the map image, and the mark image.
Virtual enhancement of security monitoring
Methods, systems, and apparatus, including computer programs encoded on storage devices, for monitoring, security, and surveillance of a property. In one aspect, a system includes a virtual reality headset, a plurality of cameras, a plurality of sensors that includes a first sensor, a control unit, wherein the control unit includes a network interface, a processor, a storage device that includes instructions to perform operations that comprise receiving data from the first sensor that is indicative of an alarm event, determining a location of the first sensor, identifying a set of one or more cameras from the plurality of cameras that are associated with the first sensor, selecting a particular camera from the identified set of one or more cameras; and transmitting one or more instructions to the particular camera that command the particular camera to stream a live video feed to a user interface of the virtual reality headset.
Protection of privacy in video monitoring systems
The invention relates to a method of processing a video, including: receiving a video of a scene being monitored; generating a second video, including one or more video frames, which non-photorealistically represents the scene being monitored; analysing at least the video of the scene being monitored to determine the presence of a threat within the scene; and in the event that a threat is detected within the scene, determining metadata in relation to the threat and representing said metadata in the second video.
METHOD AND SYSTEM FOR EXPORTING VIDEO
A method of exporting video clips is provided, comprising: displaying one or more video streams from at least one security camera; selecting a video clip from a video stream of the one or more video streams, the video clip associated with a time; storing information associated with the video clip in a list of video clips, the information associated with the video clip comprising a default name, the time and a default duration of the video clip and a camera from the at least one security camera that is associated with the video stream from the one or more video streams; displaying the list of video clips; on selection of one or more video clips from the list of video clips, allowing editing of the time and the default duration of the selected one or more video clips; and exporting the selected one or more video clips to a file.
Electronic apparatus and control method thereof
An electronic apparatus for communicating with a camera, and a method thereof are disclosed. The electronic apparatus includes a display, a transceiver, and a processor to, based on receiving an image captured by a camera, control the display to display the captured image, identify an object from the displayed image, determine another camera which captures the object, match information on the other camera with information on the camera, store the information, based on receiving a user command to set a specific object as a tracking target, determine a camera which captures the specific object, based on the specific object disappearing from an image captured by the camera, as the specific object moves, determine another camera which is expected to capture the specific object based on the camera matching information, and track the specific object based on an image captured by the other camera.
WIRELESS ENVIRONMENTAL DATA CAPTURE SYSTEM AND METHOD FOR MESH NETWORKING
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
SYSTEMS AND METHODS FOR VIDEO DISPLAY
The present disclosure relates to systems and methods for video display. The system may include at least one processor that is directed to concurrently display a plurality of videos via a display device. Each of the plurality of videos may correspond to a camera channel. In response to receiving an input signal associated with at least one of the plurality of videos, the at least one processor is directed to jointly display the at least one of the plurality of videos and one or more correlated videos via the display device. The camera channels of the one or more correlated videos may be correlated with that of the at least one of the plurality of videos.
WIRELESS ENVIRONMENTAL DATA CAPTURE SYSTEM AND METHOD FOR MESH NETWORKING
A mesh network-based environmental data capture system and method for providing communication between a base system having at least one wireless input capture device ICD(s) and other ICD(s), wherein the ICD(s) are capable of smart cross-communication with each other and remote access to their inputs via a server computer, including the steps of providing this base system; at least one user accessing the ICDs and inputs remotely via a user interface through a remote server computer and/or electronic device communicating with it, for providing a secure surveillance system with extended inputs range and wireless smart cross-communication for monitoring a target environment.
Correlation system for correlating sensory events and legacy system events
Monitoring systems and methods for use in security, safety, and business process applications utilizing a correlation engine are disclosed. Sensory data from one or more sensors are captured and analyzed to detect one or more events in the sensory data. The events are correlated by a correlation engine, optionally by weighing the events based on attributes of the sensors that were used to detect the primitive events. The events are then monitored for an occurrence of one or more correlations of interest, or one or more critical events of interest. Finally, one or more actions are triggered based on a detection of one or more correlations of interest, one or more anomalous events, or one or more critical events of interest. Events may come from sensory devices, legacy systems, third-party systems, anonymous tips, and other data sources. The present invention may be used to increase business productivity by improving security, safety, and increasing profitability of business processes.
THREAT DETECTION PLATFORM WITH A PLURALITY OF SENSOR NODES
The treat detection system described here includes a plurality of nodes that may each have a differently configured set of sensors for observing the area in the vicinity of each node. The nodes provide this information to a command center and/or Internet services so that operators can ascertain the threats in an area being monitored by the plurality of nodes. Threat analytics are performed on the information provided by the sensors in the nodes to further aid the operators' understanding of the threats in the area.