Patent classifications
G08B13/19602
Motion detection system and method
A motion detection method includes providing a buffer including a first buffer associated with a background image and a second buffer associated with a foreground image; checking first similarity between the gray level of an input pixel and the first gray level of the first buffer; determining the input pixel as a still pixel if the first similarity is true; checking second similarity between the gray level and the second gray level of the second buffer; determining the input pixel as a moving pixel if the second similarity is false; determining the input pixel as the moving pixel if the second count value is less than the first count value; and determining the input pixel as the still pixel and swapping the first buffer with the second buffer, if the second count value is not less than the first count value.
Camera detection of human activity with co-occurrence
Methods, systems, and apparatus for camera detection of human activity with co-occurrence are disclosed. A method includes detecting a person in an image captured by a camera; in response to detecting the person in the image, determining optical flow in portions of a first set of images; determining that particular portions of the first set of images satisfy optical flow criteria; in response to determining that the particular portions of the first set of images satisfy optical flow criteria, classifying the particular portions of the first set of images as indicative of human activity; receiving a second set of images captured by the camera after the first set of images; and determining that the second set of images likely shows human activity based on analyzing portions of the second set of images that correspond to the particular portions of the first set of images classified as indicative of human activity.
Techniques for a smart monitoring system
Methods, systems, and devices that support techniques for a smart monitoring system are described. A system may monitor a physical environment using a camera-enabled device operating in a first mode of a set of modes. The system may determine one or more parameters based on the monitoring. The parameters may include an identity of an entity, a behavior of the entity, or a setting of the security and automation system, or any combination thereof. The system may perform an operation based on the one or more parameters. The techniques described herein may deter an intruder from an intended action (e.g., theft, property damage, etc.) and/or provide lighting to a user of the security and automation system, among other benefits.
Visual-based security compliance processing
Multiple cameras capture videos within a secure room. When individuals are detected as entering the room, identities of the individuals are resolved. When an asset is exposed in a field of view of one of the cameras, the individuals' eye and head movements are tracked from the videos with respect to one another and the asset. Additionally, touches made by any of the individuals on the asset are tracked from the videos. The eye and head movements are correlated with the touches or lack of touches according to a security policy for the asset. Any violations of the security policy are written to a secure audit log for the room and the asset.
IMAGING SYSTEM FOR IMMERSIVE SURVEILLANCE
Security guards at big facilities, such as airports, monitor multiple screens that display images from individual surveillance cameras dispersed throughout the facility. If a guard zooms with a particular camera, he will lose image resolution, along with perspective on the surrounding area. Embodiments of the inventive Imaging System for Immersive Surveillance (ISIS) solve these problems by combining multiple cameras in one device. When properly mounted, example ISIS systems offer 360-degree, 100-megapixel views on a single screen. (Other resolutions may also be employed.) Image-stitching software merges multiple video feeds into one scene. The system also allows operators to tag and follow targets, and can monitor restricted areas and sound an alert when intruders breach them.
Mobile video security device configured for streaming video via wireless broadband and process for implementing the same
A mobile video surveillance device includes a camera device configured to capture video images; a transceiver configured to transmit and stream the video images over a network to a video receiving computer for at least one of the following: viewing on a display, viewing on a wireless device, or storage in a database; a video capturing input device configured to receive an input to initiate operation of the camera device and initiate video streaming by the transceiver; a processor configured to control the camera device and the transceiver based on the video capturing input device; a housing configured to house the camera device, the transceiver, the video capturing input device, and the processor; and a movement detection unit configured to detect a movement.
PROGRAMMABLE DEVICES TO GENERATE ALERTS BASED UPON DETECTION OF PHYSICAL OBJECTS
A device, computer-readable medium, and method for performing a remedial action in response to detecting a presence of an object are disclosed. For example, a processor may receive a configuration file, the configuration file identifying an object, an alert, and a remedial action, detect a presence of the object, wherein the object is a triggering object relating to a mental condition of a user, send the alert to a monitoring device, in response to detecting the presence of the object, and perform the remedial action, in response to detecting the presence of the object.
Methods and Systems for Providing Event Alerts
The various embodiments described herein include methods, devices, and systems for providing event alerts. In one aspect, a method includes: (1) obtaining a first category for a first motion event, the first motion event corresponding to a first plurality of video frames; (2) sending a first alert indicative of the first category to a user; (3) after sending the first alert, obtaining a second category for a second motion event corresponding to a second plurality of video frames; (4) in accordance with a determination that the second category is the same as the first category, determining whether a predetermined amount of time has elapsed since the sending of the first alert; (5) if the predetermined amount of time has elapsed, sending a second alert indicative of the second category to the user; and (6) if the predetermined amount of time has not elapsed, forgoing sending the second alert.
METHOD OF REDUCING A FALSE TRIGGER ALARM ON A SECURITY ECOSYSTEM
A method may include receiving an event message from a home security edge device, including image data. The method may include determining whether the image data represents a false trigger event based on inputting the image data into an artificial intelligence model and/or receiving a user input. The user input may be responsive to a presentation of the image data. If the image data represents the false trigger event, the method may include generating training data for retraining the artificial model. The training data may include a portion of the image data. The method may include updating a local dataset to include the training data and training the artificial intelligence model. The method may include transmitting the training data to a central database. If the image data does not represent a false trigger event, the method may include providing a security alert for display on one or more user devices.
METHODS AND SYSTEMS FOR MONITORING AND REPORTING SECURITY BREACH OF A PROPERTY
Present disclosure describes techniques for monitoring and reporting a security breach of a property. The techniques according to the present disclosure comprise detecting at least one activity by at least one motion sensor of a plurality of motion sensors, monitoring a time period of the at least one activity and determining whether the time period of the at least one activity surpasses a predetermined time period, and if the time period of the at least one activity surpasses the predetermined time period, activating a plurality of laser curtains placed on the property, and transmitting an alert to an owner of the property. The techniques further disclose determining whether at least one laser curtain of the plurality of laser curtains is disrupted, and if the at least one laser curtain of the plurality of laser curtains is disrupted, generating an audio-visual alert to notify about the security breach to one or more people present inside and outside of the property. Accordingly, the techniques of the present disclosure facilitate minimization of false alarms and unwanted alerts.