G08B13/19682

SECURITY ECOSYSTEM
20230047463 · 2023-02-16 ·

A system, method, and apparatus for implementing workflows across multiple differing systems and devices is provided herein. During operation, a workflow is automatically generated based upon a high probability of overloading resources with a current workflow. In particular, a workstation (or server) detects a high probability that a resource will be overloaded if a particular trigger is implemented. The workstation (or server) then determines an alternate trigger to reduce the chances that a resource will be overloaded. The alternate trigger and action can then be implemented or suggested as a newly-created workflow.

Systems and methods for security data analysis and display

Systems and methods are provided for improved security services. In one aspect, a method is provided for controlling an autonomous data machine situated near a monitored environment. The method comprises: obtaining security data from a plurality of data sources; analyzing the security data to generate an analysis result; determining, based on the analysis result, an action to be performed by the autonomous data machine; and transmitting a command to the autonomous data machine causing it to perform the action.

Methods and Systems for Detecting Persons in a Smart Home Environment

The various implementations described herein include methods, devices, and systems for detecting motion and persons. In one aspect, a method is performed at a smart home system that includes a video camera, a server system, and a client device. The video camera captures video and audio, and wirelessly communicates, via the server system, the captured data to the client device. The server system: (1) receives and stores the captured data from the video camera; (2) determines whether an event has occurred, including detected motion; (3) in accordance with a determination that the event has occurred, identifies video and audio corresponding to the event; and (4) classifies the event. The client device receives information indicative of the identified events, displays a user interface for reviewing the video and audio stored by the remote server system, and displays the at least one classification for the event.

Mobile video security device configured for streaming video via wireless broadband and process for implementing the same
11710393 · 2023-07-25 · ·

A mobile video surveillance device includes a camera device configured to capture video images; a transceiver configured to transmit and stream the video images over a network to a video receiving computer for at least one of the following: viewing on a display, viewing on a wireless device, or storage in a database; a video capturing input device configured to receive an input to initiate operation of the camera device and initiate video streaming by the transceiver; a processor configured to control the camera device and the transceiver based on the video capturing input device; a housing configured to house the camera device, the transceiver, the video capturing input device, and the processor; and a movement detection unit configured to detect a movement.

Methods and Systems for Providing Intelligent Alerts for Events

The various embodiments described herein include methods, devices, and systems for providing event alerts. In one aspect, a method includes: (1) receiving a plurality of video frames from a camera, the plurality of video frames including a motion event candidate; (2) categorizing the motion event candidate by processing the plurality of video frames, the categorizing including: (a) associating the motion event candidate with a first category of a plurality of motion event categories; and (b) generating a confidence level for the association of the motion event candidate with the first category; and (3) sending an alert indicative of the first category and the confidence level to a user associated with the camera.

PORTABLE DIGITAL VIDEO CAMERA CONFIGURED FOR REMOTE IMAGE ACQUISITION CONTROL AND VIEWING

A wearable digital video camera (10) is equipped with wireless connection protocol and global navigation and location positioning system technology to provide remote image acquisition control and viewing. The Bluetooth® packet-based open wireless technology standard protocol (400) is preferred for use in providing control signals or streaming data to the digital video camera and for accessing image content stored on or streaming from the digital video camera. The GPS technology (402) is preferred for use in tracking of the location of the digital video camera as it records image information. A rotating mount (300) with a locking member (330) on the camera housing (22) allows adjustment of the pointing angle of the wearable digital video camera when it is attached to a mounting surface.

Video streaming user interface with data from multiple sources

A management server receives a request to view video content; access a stream of video content corresponding to the request; access and store, in one or more databases, metadata associated with the video content, wherein the metadata includes a plurality of detections and was generated by the video gateway device based on an analysis of the video content and previously uploaded to a remote computing device; generating and causing display of a user interface that includes: the stream of the video content, a seek bar configured to be manipulated by a user so that the user can navigate through the video content, and the metadata overlaid on the seek bar such that the plurality of detections are overlaid at locations on the seek bar corresponding to when the plurality of detections were detected.

System and Method for Facilitating Trespass Incident Reporting
20230019721 · 2023-01-19 ·

A system and method to facilitate trespass incident reporting. The system includes a camera, a processor, a communication device, a remote server, a storage device, and a user personal computing (PC) device. The processor aids in identifying a trespasser using the facial images acquired by the camera through a visual comparison with known trespassers. The processor sends the acquired facial images to the remote server through the communication device. Then the acquired facial images are matched with images of trespassers in a trespasser database stored on the storage device. When no match is found, the remote server prompts the user's PC device to enter information for the first-time trespasser, and to present an audio no-trespass warning message to the trespasser while concurrently recording the presentation using an audio/video recorder. With the no-trespass recording, a trespasser incident report is created and distributed to all users.

SYSTEMS AND METHODS FOR PROVIDING PERSONALIZED AND CONTEXTUALIZED ENVIRONMENT SECURITY INFORMATION
20230011396 · 2023-01-12 ·

Disclosed herein are apparatuses and methods for providing personalized and contextualized environment security information. An implementation may comprise collecting a plurality of sensor data from a plurality of sensors located in an environment, detecting a security event in the environment based on at least a portion of the plurality of sensor data, and generating contextual information for the security event based on at least a larger portion of the plurality of sensor data. The implementation may further comprise detecting a first user accessing security information for the environment on an output device, retrieving a user profile of the first user, and generating a remediation conversation based on the user profile, the security event, and the contextual information. The implementation may further comprise outputting at least a first portion of the remediation conversation on the output device.

COMPUTER IMPLEMENTED METHOD AND APPARATUS FOR OPERATING A VIDEO MANAGEMENT SYSTEM
20230010834 · 2023-01-12 ·

A computer implemented method of operating a video management system, the method comprising inputting, into the video management system, a plurality of virtual video streams generated by virtual video cameras within a dynamic 3D virtual environment; receiving, in the computer, at least one command from a user indicative of an instruction to alter a functioning of the dynamic 3D virtual environment and/or a functioning of the video management system; and displaying on a display, from the video management system, at least one virtual video stream and/or at least one alert, alarm and/or message implementing at least one alteration caused by the received command.