VIDEO IMAGE VERIFICATION SYSTEM UTILIZING INTEGRATED WIRELESS ROUTER AND WIRE-BASED COMMUNICATIONS
20170323543 · 2017-11-09
Inventors
Cpc classification
G08B13/19673
PHYSICS
H04N7/181
ELECTRICITY
H04N7/18
ELECTRICITY
G06F16/434
PHYSICS
G08B13/19656
PHYSICS
International classification
H04N7/18
ELECTRICITY
Abstract
A system and methods of digital image capture, video surveillance and, in particular, to a method for verification of integrity and validity of live or recorded images, video(s) and surveillance images and video(s), both real-time and delayed. The method, in accordance with a principle embodiment, employs the use of additional light (photonic water marks) added to images of objects and scenes The photonic water marks reflect or refract, scatter or entangle with the real objects and scenes to then be digitized with the object or scene image.
Claims
1. A method for verification of a digital image in a camera security system monitoring at least one area by at least one video camera device connected to a network, monitor and processor, the method comprising; incorporating a superimposed image having a distinguishable and difficult to imitate characteristic into the content captured by said camera, operating, at least a portion of the time, in at least one normal mode of operation-monitoring for at least one fault condition related to said superimposed image; and entering a fault mode of operation upon detecting said fault condition.
2. The method of claim 1 wherein said characteristic comprises a photonic water mark (PWM) pattern produced by a verification source of electromagnetic radiation projected into the area monitored by said camera and wherein said step of monitoring for at least one fault condition comprises calculating the presence of or absence of the PWM.
3. The method of claim 1 further comprising performing a target detection operation using a second camera device during said normal mode of operation to verify detection of a target by one of said at least one first camera devices prior to a guard interface unit being notified of the detection of said target by said first at least one camera devices; controlling said second camera device to monitor the area which was being monitored by said at least one first camera device corresponding to the detected fault condition. wherein said characteristic comprises an image electronically inserted said into the actual source of the picture or video.
4. The method of claim 1 wherein said characteristic comprises swapping frames in a randomized but recorded order and wherein said characteristics serve as unique identifiers for a frame of an image image.
5. The method of claim 3, further comprising detecting the presence of a moving target in the area being monitored by the first camera device.
6. The method of claim 2 or 3 further comprising; providing duplicate pathway pairs by duplicating elements of the security system selected from the list of camera, switch, router, feed line, projectors emitting PWMs, wi-fi connections, routing video through duplicate pathway pairs comprising said duplicated elements.
7. The method of claim 1 further comprising; displaying said video on monitors having a selective ability to display all the pixels making up the combined image, wherein said ability depends on the pattern of said characteristic.
8. The method of claim 2 further comprising; correlating each unique generated PWM with a specific time, date, device to receive the PWM and as such, when a later query is made of the data base in the verification server, the server can conduct a search of its content and find an identical match. Given the complexity of the PWM is intended to be uniquely identifiable, the time, date, image or frame of an image and device will be identified purely through analysis of only the PWM data removed from the image (or frame of a video) and processed as a pattern search.
9. The method of claim 8 wherein said pattern comprises characteristics selected from the list of photonic color, entanglement data, polarization, intensity, —timing of the PWM.
10. The method of claim 6 further comprising; generating a tampering alarm in the event that video passing through any one of said duplicate pathway pairs is different.
11. The method of claim 5 further comprising a step of GPS locating of the target.
12. The method of claim 9 further comprising digitally combining characteristics selected from said list below or above the visible spectrum, in spectral regions to which CCD or CMOS chips respond with the object or scene image
13. A closed CCTV system (C-CCTV) to watch, check and verify the monitors watched by security staff operating the system of claim 1, correlating data pertaining to said characteristic with a master verification data base.
14. A hand held portable device connected to the system of claim 13 and displaying said PWM data 410.
15. The hand held portable device of claim 14 further comprising software and hardware adapted to detect the presence or absence of the PWM and to verify for authenticity with a server.
Description
BRIEF DESCRIPTION OF DRAWINGS
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038] Referring to
[0039] Referring to
[0040] Referring to
[0041] Referring to
[0042] Referring to
[0043] Referring to
[0044] Referring to
[0045] Referring to
[0046] Data package (data burst or block) 800 will be encrypted with off the shelf encryption software, which further contained another encrypted message that tells the order of the frames either just before the data package or following the frames to which it applies. It is rotated very frequently. It can also optionally un-encrypt beyond frames, into the pixel by pixel level. 801 depicts any Pathway to the security equipment or from camera to camera, depicting how the order of frames and the special packet 800 could be randomized. 802 shows a redundant pathway to 801 which can send the frames in a different randomization scheme, to the security equipment or from camera to camera, depicting how the order of frames and the special packet 800 could be randomized.
[0047] Referring to
[0048] Method 811 is a repeat of method 810 with some distinct differences in the data distribution and flow. 810 is intended to send the video image combined with PWM redundantly through any pathway available between the cameras 900, 901, and the main equipment 906. The difference is the distribution of the data can be broken into frames, bytes, bits and the information may be parsed and encrypted with any method suitable for protecting the data. The key distinguishing factor between method 810 and 811 is the full image with PWM is never send down any one pathway in whole, only in part.
[0049]
[0050] With method 811 Steps 1000 and 1001 are repeated identically to method 810, however the next step under method 811 is step 1005 where image frames are able to be shuffled according to a planned and known method and reconstructed at the main equipment 1004. A special data package is also embedded into the stream which may be identified and removed at the main equipment 1004. Step 1006 passes along all data from the camera to the switch. The next Step 1007 shows the switch deciding which packets to send down which pathway differing from Step 1002 in that the data on any one pathway is not the complete data to form the image, however, the data to form the image arrives at the main equipment 1004—3 times over (3 full images with PWM are received), but distributed across the 3 data pathways according to a predetermine scheme. No single pathway contains all of a single data stream. Step 1008 simply notes that alarms can be sent in similar manner on the same pathways.
[0051] In embodiments, the present invention exploits redundancy opportunities through which new forms of encryption can be introduced to further “harden” a security system, and as the herein contained methods are compatible with these means, they will be further enhanced through these redundancy opportunities in the topology, hardware and software. In embodiments, the cameras themselves are used for a number of purposes, one of which is to act as the verification light source, either through an adjunct contained in the same housing, or, a chip which functions as the inbound an outbound communications and signaling source, which indeed may be a combination ccd, digital projector, pinhole wave guides and lenses, a bona-fide QED (Quantum Entanglement Device) which implies creation of, emission of and then, collection of quantum entangled particles, such as photons, with a complete ability to perform the final decryption and verification, within the camera. Alternatively, some or all of the decryption and verification functions can be instead performed by servers or there can be a hybrid solution where the cameras and the servers perform any amount of verification the design requires, up to and including dual, redundant verification with watch dog and check sum functions. Eg the servers and cameras both, independently perform these analysis and compare their results, trip alarms and assure each and every image or video is verified and true, not clandestinely manipulated.
[0052] It may be preferable, in order to assure secure communications to and from the verification server, for remote access devices such as cell phones and tablets, or remote sessions using a remote client, to receive a water mark or other indicator which assures, at the verification server, the image being ported remotely, has been verified to contain the PWM 900. Another water mark, icon or sufficient indicator can be provided to assure the image being ported out, has been verified to be authentic.
[0053] In an embodiment, the same technique applied to the topologic design is deployed for remote access devices, wherein the remote access device must attach to the verification server using at least two different pathways so each pathway can be used redundantly to port information to the remote access device and assure, what the device can view as a still image or video, is verified authentic.
[0054] It is preferable, in cases where cameras which show a field of view that is blank (which, by way of example, may occur in an outdoor setting, in the case of an extreme fog condition, for the camera to be equipped with a micro reflector, or a separate microreflector implemented so that the verification light source can reflect some of the PWM to the camera even when there is no object in the field of view, precisely what fog can produce in terms of a precondition. In this specific setting, the timing of the PWM becomes more desirable than the light frequency or any multi-frequency pattern as the reflector will be designed to reflect a given frequency or frequency range sufficient to verify authenticity of the image. It may be preferable for the lens provided as a part of a typical CCTV camera is caused to emit its own unique signature which manifests as a fixed PWM superimposed on the additional PWM provided by this overall solution. As such, for a public enemy or wrong-doer to emulate the image or video data, they would have to know both the output of the verification light source and the camera lens unique fixed PWM. This also guards from internal attempts to modify a camera by changing its lens, as we would know and could trip an alarm if a lens is removed or replaced and the user did not request this change. Eg or if a whole camera were swapped as part of an internal espionage attempt. Mere loss of communications on any one connection can trip alarms and raise suspicions, however, a change in fixed PWM for a camera or its lens, would certainly raise multiple concerns and can raise its own unique alarm.
[0055] In an embodiment, special software module within any servers serving the security network (or servers station on networks for public or private use) is used to calculate the presence of or absence of the PWMs, providing needed confirmations and alarms in real time. These software modules, particularly used to detect the presence of absence of the PWM, could also conceivably preside is client side software, but they would need constant streaming updates from a server to know the change in PWM applied to each distinct picture, video, frame from a video and the like. Client side is less preferred as it is more exposed and requires client protection, versus, using a central server, however, client side may have a preference to reduce latency in an overall complex system.
[0056] In a related embodiment, special software module generates the PWMs which is emitted with a certain predetermined timing, a flash pattern of on off, or intensity levels (different intensities as a function, predictably and programmable(y) changing over time). These flash patterns can also be intensity patterns from low intensity to high, and may be applied to specific frequencies or images being output to then reflect back to the digital camera for superimposition over the actual image. Understanding that these PWMs are gathered with the images and videos, the emitters will be shown to be in proximity of a given camera. Hence the software which generates the PWMs can also generate a time date stamp (synchronized to a reliable clock) for each unique, novel PWM, it's sunsequent assignment to a given camera and time of day and date assigned is then stored by the software (calculated, stored and able to be queried) and thus the PWM, each being unique, is associated with each image or video and within a given video, each frame. This completes a cycle of generation of unique, novel PWMs which can be generated as frequently as needed to mark each frame of image uptake, or less frequently if desired. it may either be preferable to provide a central or, alternatively, a distributed verification system in accordance with the present invention. This system interestingly, need not be connected to the digital recording unit (DVR, Digital Video Recorder) via a communications network. The central or distributed verification system can detect presence and absence of PWMs in real time and set off alarms when the PWM anticipated is absent. The PWM in question is unique and novel enough to provide a match in a data base which calls up the very image to which it has been assigned, including down to the frame if frame by frame PWMs are a requirement. Hence, we could keep two different distinct DVR data bases. One is the images and videos with the PWMs superimposed and able to be played back. Another data base could do the same, only sort on the PWM time-date instead of the DVRs own internal time date stamp(s) or, even more interestingly, separate the PWM from the image or video and keep the two separate, able to be reliably recombined and compared to what is stored in the DVR for further proof of original image and video, assuring there is no corruption or meddling with the original images and videos, even as tight and tedious as frame by frame and pixel by pixel verification. it is preferable for the central verification system to detect and analyze the correlated PWMs by monitoring a security monitor through yet another complete digital CCTV system (for this purpose, hence the name “verification system”) to verify that the assigned monitor is actually displaying its assigned scene, through DSP techniques performed in the video controller which feeds directly to the given monitor. Usually, the digitized image or video, is received by a video processor board or memory and before it is then shared to a monitor or display, it can be digital signal processed (DSP) which as is known to those of skill, may further include artificially intelligent software.
[0057] In another embodiment, the monitors themselves either can or cannot display all the pixels making up the combined image or video with its PWMs. Logically, this means a monitor that either can or cannot display the light in the frequencies below and above the visible spectrum. This means the PWMs which are below, in and above the visible spectrum will be displayed, or on a more standard monitor, only the PWMs which are visible would be displayed.
[0058] In an embodiment, a closed CCTV system (C-CCTV) is provided to watch the monitors the security staff watch, to check and verify the PWMs are present and correct, correlated and time date correct simply by reaching into the master verification data base and performing the comparison but from a visibly acquired new recording taken from the very screen the security staff use, rather than to perform this task from any point within the cctv security system. This “wholly outside looking in” solution forces an evil doer or public enemy to have to hack two systems at once, to eliminate the real time alarms and divert the security staff from true images. We also provide redundancies with intrusion detection so that the evil doer would then have to simultaneously cut into 4 different places, also knowing the very next encrypted PWM. Since the closed CCTV system (C-CCTV) is ideally not on any network at all, this makes it very difficult for the public enemy or hacker to surprise the system, overall, and divert the security staff to false imagery or video shots. it may be preferable for the central verification system generate an audit trail data base, however, the main thrust of the invention is to provide automated, intelligent and real time event alerts so the evil doer and public enemy will be thwarted in real time and not get away with any trickery or diversion.
[0059] In an exemplary embodiment, in order to cost effectively address several security hardening aspects of the invention, a wireless router is proposed for inclusion side by side with the active components of a digital camera, within its housing and with the opportunity to share any hard wire data transfer connections and power sources. This means, to cut costs, the camera and its router can share the hard wire connection to independently send data across the data medium the wire represents (eg Cat 5, Cat 6, 10 Base T, 100/1000 Base T, Giga speed) Also, it is preferred that the camera have a short life battery internal to its housing to allow the router and the camera to continue to operate, even if all lines to the device are cut or tampered with.
[0060] Yet another embodiment allows the router to be a Wi Fi and to generate multiple Wi Fi connection types which work simultaneously.
[0061] It may be preferable to allow each router to have a hard partition within which it is impossible to log new devices once a technician sets the router to allow certain allowed devices to communicate through the router in wireless format(s). The camera may pass intrusion data to the router to transport to a security center, monitoring stations, software equipped to receive the intrusion information and generate necessary alarms.
[0062] It is preferable to add a light source to the camera which can be independently addressed and controlled apart from the router or the camera.
[0063] It is preferable to include light sources within the CCD chip of the camera, the very element which converts analog images (photons) to voltage values and then to data, may also emit light and do so in patterns, with an array that is independently addressable pixel by pixel and may include light below the human visible range, through the visible range and above the visible range. This may take advantage of analog lenses, pinhole lenses and photonic wave guides to accomplish certain technical feats.
[0064] It is preferable to cause either a simple “verification light source” or the more complex integrated CCD chip light source to emit patterns which are then timed to be captured by way of reflection off of the objects in the field of view of the camera for conversion to digital data which is then transported as with other digital CCTV type cameras over the available transport media (wire, fiber, wireless or combinations of these).
[0065] Another embodiment causes each camera to send its video or still image in full, through a primary pathway and again, over a secondary pathway or more than two pathways in whole, or in part, with or without further encryption but with software present at the opposite end or ends to generate a final verified image or video with the intact ability to identify and trip any needed alarms.
[0066] Another embodiment allows the received images or videos to be cross compared for differences, where there should be no difference in a redundant image received and if there were, an alarm would be recognized, set and identified to the users of the system in real time. A central database is constructed which records what light patterns were sent to which light emitters according to a very accurate clock and high reliability synchronization of all elements of the system. The system should use modern methods to assure all devices have accurate synchronized time recorded wherever there is an internal clock (eg in the camera element, in the router, in the light emitting devices). Each still image or video image can be split into an image devoid of the light pattern and the reflected light pattern itself can be stored in its own related file for each still image or each frame of each video recording.
[0067] It is preferable to provide an “Al” like software to alert users that an image or frame was received where the light pattern co-recorded, separated and compared to what the central data base knows should be the pattern, varies too far from the required settings to be “authentic” causing the users to question the authenticity and determine why the still image or video failed to pass this test. One answer could be, an object was introduced within the field of view which substantially altered the image thereafter, such as hanging a large mirror in the field of view, or a hanging planter very close to the camera lens. At first, this would trip settings which decide that in the field of view, too much percentage of pixels where the light patterns were reflecting (refracting, diffracting, scattering, entangling), have changed. The users then decide what the change means and can tell the system to allow only once, or, change settings to allow the new object in the field of view to stay in its place and no longer give false triggers. Eg once its there, and it has changed the pattern substantially, it may stay if the override is pressed once, because the maximum change to net sum pattern received has already happened and the mirror is now stationary. Another event could be a large mobile cleaning machine which reflects so much of the “verification light source” as to cause the alarm each time the cleaning machine enters the field of view. In an embodiment, to inhibit this event, again the “Al” software is programmed to identify the object and track its use and pattern so as to suppress alarms when the machine is in use but only the alarms raised by the machine's presence in a field of view.
[0068] It is preferable to place cameras in strategic locations so as to monitor one another by way of line of site. Another embodiment mandates the use of camera placement so as to generate a mesh of cameras which monitor one another through line of site so that no single camera is ever not in the line of site of another. It is preferable to place cameras so each camera is in line of site of at least 2 other cameras. It is preferable to prove the image a security station is receiving on its monitor, is congruent with the image the actual camera captured. To do this, a high rate of speed “digital verification camera” may be placed behind and in line of site contact with the monitor or monitors so that the image this particular camera captures is clear and precise enough for the image to be cross compared to the image the remote digital camera captured and transported to the monitoring station and to all of the recording devices. A 60 HZ refresh rate on a monitor normally causes digital and analog cameras to record images of the display surface which are unintelligible. Through synchronization of the timing or a vast increase in the sampling rate, this issue is completely overcome and perfect duplicate images can be copied from the monitoring screen by the digital verification camera, then processed in a new network (verification network) cross compared to the cctv security network and if there is a failure in congruence, an alarm can be set.
[0069] All of the herein contained embodiments can equally apply to the digital verification of images or videos taken by other cameras such as stand-alone portable cameras or that which a portable device may contain as a side benefit, such as a cell phone, tablet or laptop PC. Digital verification cameras could be wireless devices worn by security staff as wearable electronics, such as head set, glasses or clip on. There are two uses of the term “pattern” which effect context of the embodiments. Both may be implied in accordance with the context of the embodiment. One is the actual light pattern in terms of a still image made of light. An example would be a logo, and this includes mixing colors in the pattern image all inclusive, below, within and above the visible spectrum. Another is the on off pattern of each pixel or verification light source, which may be coded and unique, non repeating but known to a central data base as to the moment of its creation, its pattern as displayed and its pattern as a function of time (pattern in this specific sub context meaning on off per pixel or per light source including non digital light sources, which could be optionally used) to be used as a form of visual water mark. Visual means visual in terms of any means to “see” the patterns, even when they are not visible to human eyes, due to the fact that the software (digital signal processing) can see all light patterns and alert the user if there is any significant event determined by any aspect of the pattern, its presence, absence or failure to be congruent to an anticipated pattern based on the real time stamp of the event, image or video in question.
[0070] In another embodiment, light sources which emit dual color or multi color in known spectral breakdowns are used to further complicate the reflected, refracted, diffracted, scattered or entangled composite image. In another embodiment, the light source could approach the complexity of or literally be a digtal projector, allowing for a vastly complex photonic signal and pattern inclusive of individual pixels being turned on, off, their intensity being altered per predefined scope of the predetermined PWM. In another embodiment, the light source approaching or approximating the function of a digital projector, could be built in to the same CCD chip as the camera functions upon, and this general idea is covered in the figures below.
[0071] In an embodiment, the mesh wire patterns and wifi connectivity can be creatively used as shown in figures, to send redundant data streams from any camera to any camera and to the central DVR. The use of frames within the digitzation standards are useful and these are discussed in the figures below. However, the invention is not intended to be limited to the use of standardized methods of sending digital data from cameras to DVRs and explicitly, the invention can support the idea of splitting frames and even splitting sets of pixels down to individual pixels for further encryption and creative use of the connectivity means to reach the necessary elements to function as a complete CCTV system. In so doing, with the topology set to instantly detect intrusion or a cut of a line (or disconnect) these extra means of encryption ensure more rapid detection means and act as a further thwart to intrusion in a maximally secure CCTV deployment using these embodiments. Nothing herein is intended to limit or preclude known and unknown use of encryption, digital data standards for movement of data, and creative use of any and all pathways provided to help improve the impregnability, security, assured certification of real, live image and all other aspects of the invention.
[0072] In an embodiment, TDR (Time Domain reflectometer and OTDR (Optical Time Domain Reflectometer) functionality in the form of scavenging (scavenging power and out of band or in band signal) microchip sets may be built into the outputs and inputs of each hard wire (or fiber) connection, allowing for accurate measurement of the length of each piece of wiring. This testing can be implemented to run continuous, so as to thwart any attempt to bypass a wire or fiber segment. The wireless routers may also be equipped with rfid technology or other distance or auto location gauging technology so as to allow for the routers, once installed and set for operation, to be able to produce an alarm for any significant movement of any one router relative to the others. The camera mount which is able to be re-adjusted to change the primary view angle of the camera may be equipped with a position sensor, reporting any attempt to re-position the camera at any time. Even the central control elements of the system, essentially all pieces, could be similarly equipped and wired (or fiber connected) to protect from any manipulation of any element. These additions assist in utterly securing the physical aspects of the system. When technicians first install a system or attempt to rearrange a system, these elements will raise alarms unless the technician first orders the system to allow the specific change or ignore alarms on a segment or a system component. The system shall restore the segment automatically in a certain time frame when the command is entered to ignore a segment, to assure the technician does not omit the restoration, or the owner of the system can set the system to not allow this blocking, raising alarms whenever a technician implements temporarily disruptive change which raises and holds these forms of alarm(s) until the segment is put back into service. To harden other elements, any possible piece of add-on hardware, wire or fiber, could be similarly equipped which may include memory sticks or chips put into the system, batteries and battery back up systems, keyboards, mice, displays, display adaptors each intending to shut out loopholes where a public enemy or wrong doer could intrude into the system. To set a unique identifier or encryption key into a new piece of hardware, the central equipment may be under lock and key, could be required for access to connect up the new piece of equipment and then “burn in” as a one time event, the new identifiers. This way, for a wrong doer or public enemy to create a piece of equipment that can be attached to the system, they first have to have access to this secure (physically secure, as under lock and key) central piece of equipment, typically a server serving as a verification server, DVR or both. In yet a deeper hardening step, the unique identifier added in will be limited as to its life, so the technical person or user setting the unique id into the component then must get the component to its position and put it in service, or the main system will lock out that piece of equipment until a new unique identifier is set into the item in question. If too many items are attempted to be attached in succession, yet another alarm can trip and no new additions will be allowed. This thwarts hackers who feel they are going to sneak past this element through a rapid trial and error approach.
[0073] In an embodiment, artificial intelligence and artificially intelligent software could be deployed into all elements with emphasis on the DVR, for analysis of patterns from which any break in the pattern could indicate an attempt at clandestine intrusion. An example would be to apply pattern analysis to static video images inclusive of the PWM, to assure change in viewed elements are not part of a manipulation scheme to mask an attempt to alter, steal, replace or counterfeit any object in the field of view or commit any form of undesirable act without the security guard and the recorded image catching the event. The PWM data is unchanging during this artificial intelligence analysis, hence its constant presence acts as a watch dog feature. The critical elements, such as a camera, could be equipped with biometric and multibiometric elements capable of sensing the unique identity of the technician or a card (or app in a cell phone) the technician carries. The device could raise alarms and permanently turn on an alarm to indicate an unidentified attempt to tamper or, an unauthorized user who attempted to tamper with, remove, replace or adjust a given piece of the system, such as a server, camera or any other critical element we wish to equip in this manner. The bio sensor(s) could be a small portable device which attach(s) to the system element to temporarily provide the bio sensor array for the device to keep costs down. Cell phones using NFC(s) could perform this task. The communications protocol between any of these portable devices and the fixed elements of the system could use industry standard or proprietary programs which further harden and protect the handshake and data passage elements of the biosensor attachment to any given device.
[0074] In an embodiment, a camera equipped with PWM detecting technology, the ability to “see” the PWM, can also use the same detecting technology to read a device capable of emitting PWMs or other photonic data carried on the person of individuals who pass through these various fields of view a camera will “see” per its domain or anticipated field of view. Emission of a PWM is not intended to be exclusively limited to things people carry or, reflections from objects in a field of view. Objects in a field of view could also be equipped to communicate with the verification server and emit deliberate PWMs that are unique per unit of time, to be received by any camera(s) in the associated line of sight. These additional objects in a field of view could be light fixtures, smoke and fire detectors, motion detectors, break in detectors, glass break detectors, chemical detectors, other electronic and sensor type devices to thwart any attempt to either add fake items of this nature to a premises, or, swap out, modify or bug” any item in a field of view. As such, the central equipment can be equipped with software to attempt to identify the identity of each individual person or mammal (living creature) and object with emphasis on electronic objects, in its field of view and any device a person or mammal (animal, robot) may be carrying. If the portable device carried by a human, animal, robot or drone emits data that uniquely identifies the device, that information can be cross referenced to the video derived identity of the individual carrying the device to then draw an automated conclusion and assign a certainty (weight or factor) such as “individual X, identified with 99.99% certainty just through video analysis is carrying device Y with 100% certainty as to the unique device” and the PWMs further provide the specific camera, date, time, that a PWM and all other elements appeared to have not been tampered with 99.9999% certain for the given image, video segment or stored recording.
[0075] Recordings made which can include the certainty factor assigned to elements, such as a fixed scene, a changing scene, authorized people or animal(s) movement, unauthorized actions or activities, technician activities can then be assigned a certainty factor and automatically order historic or real time events for review by a security office, so the events of a given day can be reviewed either as they unfold, or in arrears. Because security staff are typically assigned more than one camera to be responsible for, these automations assist in making certain human eyes are put upon any suspicious activity more so than activities which are less suspicious or not suspicious at all. A video of a technician who forgot a protocol and tripped an alarm would be assigned a 100% certainty as to unauthorized action, and the action could be deemed “maximally suspicious” even though it does not mean the technician's mistake was an deliberate attempt to intrude. This weighting for all recorded images provides critical information and it should always be considered one of the best ways to try to defeat this system is through an existing technician, by gaining his/her complicity, commonly referred to as an “inside job”. If the cards or apps the technicians carry can sense biometrically, the level of nervousness of the individual, that can be included in the certainty factor for weighting elements. This can apply to any and all staff who have anything at all to do with the use of the system.
[0076] To provide more use of the DVR, the concept of access controls could be added to the DVR such that access points on a security system can be integrated into the DVR function wherein, users who, in order to gain access to an area, must input data using a portable device that provides biometric or multibiometric data, to open an egress or ingress apparatus, will be assigned a certainty factor associated with their identity and the identity if their biometric device, which then couples to the certainty factor and identity factors the DVR applies to the recorded and real time images.
[0077] This cross integration couples the DVR to the access control system(s) to provide certainty as to the identity of people or animals in the field(s) of view, and then assign risk percentages to events and each individual person or animal in an event, so a security guard can constantly have “eyes on” the events and individuals most suspicious. This part of the system can be a toggle, wherein its always on, but displaying the data in real time or during a recording review, can be turned on and off. The certainty factors can be tied to the individual people or animals in a given scene, with movable animations that attempt to avoid overlap and show the tie to the individual graphically, as well as the certainty factor the individual or animal was generating at the moment in question. If every person or animal had a device which measures their biometrics (or multi biometrics) and from these data the degree of mood or nervousness could be passed, then individuals in a crowd could be singled out and identified as to their potential threat level. The access controls are also subject to emitting PWMs on their own, so a public enemy or wrong doer does not try to replace or tamper with these types of electronic systems and their peripherals.
[0078] The verification server generating the PWMs, which serve as unique identifiers for a frame of an image or a still image, may correlate each unique generated PWM with a specific time, date, device to receive the PWM and as such, when a later query is made of the data base in the verification server, the server can conduct a search of its content and find an identical match. Given the complexity of the PWM is intended to be uniquely identifiable, the time, date, image or frame of an image and device will be identified purely through analysis of only the PWM data removed from the image (or frame of a video) and processed as a pattern search. The pattern can be one of photonic color, entanglement data, polarization, intensity, on off blink patterns and may also exhibit monochrome attributes as well as multi-color, either as a single beam or as a projected image. The quantum entangled data may also provide yet another layer of data which may include time, date, device through which the quantum entangled data was directed and device intended to receive the PWM with quantum entangled data. eg digital projector 2234 projecting a PWM xxxxx could be one device, and “Camera 144” could be the intended receiving device.
[0079] All devices making up a system, including access devices, sensors, fire detect, smoke detect, camera, server, video monitor, peripheral such as a mouse, memory stick, down to the smallest logical common denominator, may be equipped with NFC (Near Field Communications) RFID (Radio Frequency Interface Device) and GPS (Global Positioning System) or GPS substitute technology. The combination of PWM and these aforementioned locating technologies provided in each piece of a system, allows for registration during initial installation thus assuring that to swap out or intrude upon, clandestinely or intentionally, any one component of the system, the operators of the system will be alerted to the change. These pieces making up a system are continuously in communication with one another, ideally, with battery support built into cameras which the switches and routers found inside the cameras may operate from during power failure, thus assuring there is simply no moment of less protection in a given system opening it up to a quick intrusion or clandestine plant of electronics which are intended to thwart the function and security of the system. One of skill will readily recognize, the addition of any one component requires the logging and registration of location provision mechanisms such as GPS, any unique identifier the hardware provides during handshake, and then, an anticipated PWM must appear in the device, if it is in the field of view of a camera. Hence, three levels of protection are provided so a clandestine device may not be attached or, an existing component may not be undesirably altered, modified or tampered with during operation.
[0080] Many modifications and other embodiments of the disclosure will come to mind to one skilled in the art to which this disclosure pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the disclosure is not to be limited to the specific embodiments disclosed herein and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
[0081] Individuals of skill, once reviewing this invention with particularity to the network structures, isolation of certain servers, use of software and placement of legacy and new devices, will see there are further permutations in practicing the use of these teachings. Accordingly, not every possible use or layout is shown, yet the invention is applicable to any and all cctv settings currently in use.