G08B13/19654

Security sentinel robot

A building monitoring system includes a first sensor configured to detect a first condition in the space, a second sensor configured to detect a second condition in the space, and a robotic sentinel. The robotic sentinel includes a memory for storing one or more rules each configured to identify an alert condition for the space based on the first and/or second conditions in the space, a communications module configured to communicate with a remote device over a network, and a controller operatively coupled to the sensors, the memory, and the communications module. The controller is configured to apply the one or more rules to the first and second detected conditions in the space to identify one or more alert conditions and determine what action is required by the robotic sentinel, and if action is required, command the robotic sentinel to travel to a location of the alert condition.

Data stream allocation method, system and program

Provided is a data stream allocation system capable of suppressing inequality in processing loads on a plurality of servers and delays in analysis processing at the servers when the servers analyze the objects of analysis using data streams obtained from a plurality of camera systems. The allocation determination unit 4 allocates data streams obtained from a plurality of camera systems to a plurality of servers according to the unevenness in the number of objects in the surveillance region. Then, the distribution unit 5, in accordance with the results of the allocation of the data streams to the plurality of servers, distributes each of the data streams obtained from the camera systems to the server to which the data stream has been allocated.

Integrative security system and method
11501628 · 2022-11-15 · ·

A method for monitoring and securing a facility without employing a manned control center, according to which a server acquires surveillance data from each of a plurality of distributed surveillance devices deployed within or adjacent to a given security sensitive facility. Then the server receives an intrusion alert from a guard, or from one or more of the plurality of surveillance devices to initiate a triggering event, if the acquired surveillance data is indicative of activity that has been detected at an indicated location. A first guard is alerted and presented with a full situational awareness image to assess the severity of the detected activity and the triggering event is terminated if found by the first guard to be of a low severity, or an interception operation initiated by self-dispatching or dispatching one or more additional guards to a close by location that holds tactical advantage relative to the indicated location if the triggering event was found by the first guard to be of a high severity.

Method and apparatus for increasing security at an entrance point

A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation, a security level at an entry point will be increased temporarily when a camera moves its field of view away from the entry point. The security level will return to its original state when the camera moves its field of view back to the entry point.

Apparatus, system, method and storage medium

An apparatus is provided comprising: a determination unit configured to determine a possibility of an abnormality of a subject based on images captured by a surveillance camera with an audio output function; an instruction unit configured to instruct the surveillance camera to produce audio toward the subject in response to the determination of the possibility of an abnormality; an acquisition unit configured to acquire a reaction of the subject to the audio from the surveillance camera; and a detection unit configured to detect whether the subject has an abnormality or not based on the reaction of the subject to the audio.

SECURITY SENTINEL ROBOT

A building monitoring system includes a first sensor configured to detect a first condition in the space, a second sensor configured to detect a second condition in the space, and a robotic sentinel. The robotic sentinel includes a memory for storing one or more rules each configured to identify an alert condition for the space based on the first and/or second conditions in the space, a communications module configured to communicate with a remote device over a network, and a controller operatively coupled to the sensors, the memory, and the communications module. The controller is configured to apply the one or more rules to the first and second detected conditions in the space to identify one or more alert conditions and determine what action is required by the robotic sentinel, and if action is required, command the robotic sentinel to travel to a location of the alert condition.

INTEGRATIVE SECURITY SYSTEM AND METHOD
20230132171 · 2023-04-27 ·

A method for monitoring and securing a facility without employing a manned control center, according to which a server acquires surveillance data from each of a plurality of distributed surveillance devices deployed within or adjacent to a given security sensitive facility. Then the server receives an intrusion alert from a guard, or from one or more of the plurality of surveillance devices to initiate a triggering event, if the acquired surveillance data is indicative of activity that has been detected at an indicated location. A first guard is alerted and presented with a full situational awareness image to assess the severity of the detected activity and the triggering event is terminated if found by the first guard to be of a low severity, or an interception operation initiated by self-dispatching or dispatching one or more additional guards to a close by location that holds tactical advantage relative to the indicated location if the triggering event was found by the first guard to be of a high severity.

System and method for handling data captured by a body worn camera
11632515 · 2023-04-18 · ·

A system and method for handling data captured by a body worn camera are disclosed. The system may include a body worn camera, a docking station, and a recorder. The camera may include a local storage device. The docking station may include a data interface for connecting the local storage device to the docking station, and a first network interface for connecting the docking station to the recorder. The docking station may be physically separate from the recorder. The recorder may include a second network interface for connecting the recorder to the docking station, and a recorder storage device. The recorder may be arranged to retrieve the captured data from the camera and store it in the recorder storage device, and may include a third network interface for transfer of stored data to a data management system.

Management of a security system at a premises

A security system is described for managing a premises. The security system comprises security system components and a first controller. A takeover component receives security data of the security system from the first controller. The security data is used to configure a second controller to communicate with the security system. The second controller communicates with the security system components and replaces the first controller in management of the security system.

Surveillance and monitoring system

A method and system provides centralized redundant monitoring suitable for effectively recording and tracking video monitoring systems at a plurality of remote surveillance locations. The method and system are configured to track, monitor, capture, and record video originating from transportation vehicles using a novel technological configuration that minimizes overall and sub-system downtime relative to conventional technologies. The remote surveillance locations are capable of utilizing self-healing and recovery mechanisms and reporting status information to the centralized monitoring system. The centralized monitoring system can use information received from the remote surveillance locations to remotely monitor the status of the remote surveillance systems, to initiate remotely self-healing and recovery mechanisms, and request previously recorded surveillance data and live surveillance data in real time.