COMBINED SECURITY AND VIDEO CAMERA CONTROL SYSTEM
20230086809 · 2023-03-23
Inventors
Cpc classification
H04N23/617
ELECTRICITY
H04N23/661
ELECTRICITY
H04N5/272
ELECTRICITY
International classification
H04N5/272
ELECTRICITY
Abstract
A solution which targets perimeter infrastructure. The solution comprises a plugin which integrates a dedicated security video camera management system with a comprehensive security system management system. A foundation is thereby provided which utilizes many advantages that are found in the security system management system, such as the creation of entities, Event -to Actions, and role fail-over. Use of the plugin results in an overall system where operators of the security system can imbed their own images and branding on the video streams. Users can effectively brand their edge devices without having to interface with the devices directly.
Claims
1. A security management system comprising at least one video camera; and a user interface that is configured to provide that a user can use the user interface to upload and position custom image overlays on the at least one video camera while never having to enter the at least one video camera’s own interface.
2. A security management system as recited in claim 1, further comprising a plugin that integrates a dedicated security video camera management system with a comprehensive security system management system.
3. A security management system as recited in claim 1, wherein the security management system is configured to provide the creation of entities, Event - to Actions, and role fail-over.
4. A security management system as recited in claim 2, wherein the plugin initializes a data model and retrieves a Plugin ID from a server of the security system management system, wherein when the user attempts to upload a file, a Dialog window is presented, and the plugin filters the uploaded file by checking its file type.
5. A security management system as recited in claim 4, wherein the plugin converts the file, serializes the height and width of an image contained in the file, and then displays the image.
6. A security management system as recited in claim 5, wherein when the image is displayed, the plugin converts the stored serialized image into an image object.
7. A security management system as recited in claim 6, wherein when the user prompts to delete an overlay, the image is no longer rendered, is deleted from the configuration, and the configuration is serialized into a plugin role.
8. A security management system as recited in claim 7, wherein an image file gets converted into a string that can be serialized and a string is converted to a byte array that can be consumed as an image.
9. A security management system as recited in claim 8, wherein when an Update Overlay function is invoked, an old overlay is removed.
10. A security management system as recited in claim 9, wherein the plugin creates and registers request handlers for communication and user interaction.
11. A security management system as recited in claim 10, wherein the request handlers handle request commands.
12. A security management system as recited in claim 11, wherein the request commands comprise a request to update an image displayed relating to the at least one video camera.
13. A plugin that integrates a dedicated security video camera management system with a comprehensive security system management system, wherein there is a user interface that is configured to provide that a user can use the user interface to upload and position custom image overlays on the at least one video camera while never having to enter the at least one video camera’s own interface.
14. A plugin as recited in claim 13, wherein the plugin initializes a data model and retrieves a Plugin ID from a server of the security system management system, wherein when the user attempts to upload a file, a Dialog window is presented, and the plugin filters the uploaded file by checking its file type.
15. A plugin as recited in claim 14, wherein the plugin converts the file, serializes the height and width of an image contained in the file, and then displays the image.
16. A plugin as recited in claim 15, wherein when the image is displayed, the plugin converts the stored serialized image into an image object.
17. A plugin as recited in claim 16, wherein when the user prompts to delete an overlay, the image is no longer rendered, is deleted from the configuration, and the configuration is serialized into a plugin role.
18. A plugin as recited in claim 17, wherein an image file gets converted into a string that can be serialized and a string is converted to a byte array that can be consumed as an image.
19. A plugin as recited in claim 18, wherein when an Update Overlay function is invoked, an old overlay is removed.
20. A plugin as recited in claim 19, wherein the plugin creates and registers request handlers for communication and user interaction, wherein the request handlers handle request commands, wherein the request commands comprise a request to update an image displayed relating to the at least one video camera.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0012] The organization and manner of the structure and operation of the invention, together with further objects and advantages thereof, may best be understood by reference to the following description taken in connection with the accompanying drawings wherein like reference numerals identify like elements in which:
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
DESCRIPTION
[0020] While this invention may be susceptible to embodiment in different forms, there is shown in the drawings and will be described herein in detail, a specific embodiment with the understanding that the present disclosure is to be considered an exemplification of the principles of the invention and is not intended to limit the invention to that as illustrated.
[0021] All organizations have the need to monitor, maintain, and react to their critical perimeter infrastructure. Edge device interaction is vital to success in all market verticals. An embodiment of the present invention comprises a plugin which targets perimeter infrastructure by integrating a security camera management system, such as the Axis Vapix platform, with a comprehensive security system management system, such as Genetec’s Security Center software, thereby providing a plugin that builds a foundation to utilize many advantages that are found in Security Center such as the creation of native interfaces, entity management, and role failover. As a result, the overall system allows users to brand their edge devices without having to interface with the devices directly and allows images to be applied at the area level.
[0022] Due to the sizing of letters, some Figures had to be broken up into multiple Figures. In this case, letters were used in the Figure numbering. For example,
[0023]
[0024]
[0025]
[0047] Check Firmware Version determines which version of the Vapix API to use. If the firmware is older than version 7, use the old API. If the firmware is version 8 or newer, use Dynamic overlays. If the firmware is newer than 7.10 but older than version 8, use the newer Vapix API. Otherwise default to the old API.
[0048] Use Dynamic overlays looks at the processor chip of the Camera. If the chip type is of “Artpec-7” use Dynamic Overlays when making API calls.
[0049] Enable Overlay also looks at the processor chip of the Camera. If the chip type is of “Artpec” enable Overlays when making API calls.
[0050] Is Amberella Chip looks that the processor chip of the Camera if the chip type is of “Amberella”.
[0051] Is Camera Valid determines if the camera is in the correct state to accept Vapix call. The camera must be manufactured by Axis and be online.
[0052] Determine API version is an inclusive function that utilizes several of the ones listed above to determine the API version to use. It first checks for the Amberella chip, then if to use Dynamic overlays, and finally calls Check Firmware Version. [0053] Vapix Helper sends the following Vapix commands [0054] 1. Delete Overlay [0055] 2. Restart Camera [0056] 3. Upload File to new Camera [0057] 4. Translate Overlay on new Camera [0058] 5. Check Processor Chip [0059] 6. Add Dynamic Image [0060] 7. Set Dynamic Image
[0061]
[0062]
[0063]
[0064] Async Add identifies if the function requires a chip check and performs one if needed. It then checks if the camera is valid and its required API version. Update Overlay is invoked followed by a reboot.
[0065] Delete Overlay Override gets a list of cameras and invokes Async Delete on each camera.
[0066] Async Delete gets the camera and the corresponding video unit. If the camera is valid, the processor chip and API version are determind. Remove Any Overlay is invoked followed by a reboot.
[0067] Get Plugin Config gets the role and its configuration.
[0068] Get Vapix Role gets the plugin role.
[0069] Prefetch Areas Async gets all areas and updates a collection of Area IDs
[0070] Add Update Collection gets an Area using the supplied ID. If it is not already cached in the collection, store the area ID and corresponding camera IDs.
[0071] Get Configured Overlay gets the plugin role and its configuration followed by retrieving the requested Overlay Configuration.
[0072] Get Alternate IP gets the plugin role and creates a Genetec System Configuration object. Next a Genetec custom field is identified, and its value retrieved on the specified video unit. If the value of the custom field is null, return the video unit’s IP address otherwise return the value of the custom field.
[0073] Engine Entities Added is the method subscribed to the Genetec Entity Added Event. Iterate through the collection of Entities that were added. Any Entities of type Area are passed to the Add Update Collection.
[0074] Engine Entities Invalidated is the method subscribed to the Genetec Entity Invalidated Event. Iterate through the collection of Entities that were modified. With a Configured Overlay, if there were cameras added invoke Add Overlay. If a camera was removed, invoke Remove Overlay. The collection is then updated.
[0075] Engine Entities Removed is the method subscribed to the Genetec Entity Removed Event. Iterate through the collection of Entities that were removed. If the Entity is of type Area, Check if it is the collection. If so, the plugin role and overlay configuration are retrieved. The overlay configuration is deleted and then the collection is reserialzed into the plugin role.
[0076] A plugin in accordance with an embodiment of the invention allows for users to brand their edge devices (i.e., video cameras) without having to interface with the devices directly. The plugin presents the ability to upload and position custom image overlays on network cameras while never having to enter the camera’s own interface or be within physical proximity of the device. Typically, a user must have knowledge of a video camera’s network address and authentication credentials in order to interact with the camera’s direct interface. This interaction would require the user to leave prior engagements in order to facilitate this interaction. The plugin in accordance with an embodiment of the invention provides a solution by automating this and providing commands that the VMS invokes to create an environment that reduces this burden to the operator.
[0077]
[0078] While the foregoing description was specific to the integration of Axis Vapix and Genetec’s Security Center, an embodiment of the present invention can be configured to effectively merge the functionality of two other systems while still staying within the scope of the present invention.
[0079] While a specific embodiment of the invention has been shown and described, it is envisioned that those skilled in the art may devise various modifications without departing from the spirit and scope of the present invention.